Добірка наукової літератури з теми "Protection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Protection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Protection"
Lai, Jessica C., and Samuel I. Becher. "Protecting Consumer Protection." Victoria University of Wellington Law Review 49, no. 2 (August 1, 2018): 259. http://dx.doi.org/10.26686/vuwlr.v49i2.5324.
Повний текст джерелаMasson, Judith. "Police protection - protecting whom?" Journal of Social Welfare and Family Law 24, no. 2 (March 2002): 157–73. http://dx.doi.org/10.1080/09649060210136229.
Повний текст джерелаGauci, Jean-Pierre. "Protecting Trafficked Persons through Refugee Protection." Social Sciences 11, no. 7 (July 8, 2022): 294. http://dx.doi.org/10.3390/socsci11070294.
Повний текст джерелаPérez-Molina, M. J., P. Eguía, D. M. Larruskain, I. Aranzabal, and E. Torres. "Performance of a protection system for DC grids." Renewable Energy and Power Quality Journal 20 (September 2022): 18–23. http://dx.doi.org/10.24084/repqj20.209.
Повний текст джерелаFick, Sarah, and Michel Vols. "Best Protection Against Eviction?" European Journal of Comparative Law and Governance 3, no. 1 (February 21, 2016): 40–69. http://dx.doi.org/10.1163/22134514-00301002.
Повний текст джерелаWrennall, Lynne. "Surveillance and Child Protection: De-mystifying the Trojan Horse." Surveillance & Society 7, no. 3/4 (July 6, 2010): 304–24. http://dx.doi.org/10.24908/ss.v7i3/4.4158.
Повний текст джерелаMonika, Monika, and Jarosław Frydrych. "Olej ochronny o niskiej lepkości do czasowej ochrony elementów metalowych przed korozją." Nafta-Gaz 76, no. 11 (November 2020): 864–69. http://dx.doi.org/10.18668/ng.2020.11.12.
Повний текст джерелаLuckock, Barry. "Protecting Powers: Emergency Intervention for Children's Protection." Child & Family Social Work 12, no. 4 (November 2007): 442–43. http://dx.doi.org/10.1111/j.1365-2206.2007.00522.x.
Повний текст джерелаScotuzzi, C. A. S., and J. M. Adam. "School Protection System: Protecting Who, from Whom?" Procedia - Social and Behavioral Sciences 55 (October 2012): 429–34. http://dx.doi.org/10.1016/j.sbspro.2012.09.521.
Повний текст джерелаReichrath, Priv Doz Dr med Jörg. "Protecting against adverse effects of sun protection." Journal of the American Academy of Dermatology 49, no. 6 (December 2003): 1204–6. http://dx.doi.org/10.1016/s0190-9622(03)02142-x.
Повний текст джерелаДисертації з теми "Protection"
Aranda, Ligia Esther. "Protecting CHAAC's gift--groundwater protection in Yucatan, Mexico." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/63206.
Повний текст джерелаKoval, L. A., and T. N. Burenko. "Environmental protection." Thesis, Вид-во СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/17562.
Повний текст джерелаClausen, Jenelle. "Asset Protection." Bowling Green State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1429269560.
Повний текст джерелаBradley, Lucy. "Frost Protection." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1998. http://hdl.handle.net/10150/144680.
Повний текст джерелаThe variation of the first and the last frost date is due to differences in elevation, density of population and several other factor, including a variation in temperature from year to year. All these variations make it more difficult to protect plants. To adequately protect your plants from frost damage you need to understand cold weather; how plants respond to cold; how heat is transferred; how to prevent frost damage; symptoms of frost damage and how to care for plants that have been damaged by frost.
Stevens, Katy. "Thermophysiological comfort and water resistant protection in soft shell protective garments." Thesis, University of Leeds, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.493789.
Повний текст джерелаGerhardsson, Daniel. "Starter Motor Protection." Thesis, Linköping University, Vehicular Systems, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57309.
Повний текст джерелаStarter motors are sensitive for overheating. By estimating the temperature and
preventing cranking in time, there is an option to avoid the dangerous temperatures.
The truck manufacturer Scania CV AB proposed a master thesis that
should evaluate the need of an overheating protection for the starter motor.
The aim is to evaluate any positive effects of implementing an algorithm that
can estimate the brush temperature instead of using the available time constrain,
which allows 35 seconds of cranking with a following 2 seconds delay, allowing the
crank shaft to stop before a new start attempt is allowed. To achieve high load
on the starter motor and high temperature in the brushes, tests were performed
under
Initial testing on truck, under normal temperatures, showed that the batteries
could not run the starter motor long enough to reach high temperatures in the
brushes. This is believed to be caused by the voltage drop between the batteries
and the starter motor, causing the starter motor to run in an operating area it
is not optimized for. There are several other problems which gives a higher load
on the engine, for example oil viscosity, resulting in higher currents, but those are
not mentioned in this report.
Three different models are compared, Two State Model, Single State Model
and a Time Constrained Model. Tests and verifications show that the Two State
Model is superior when it comes to protecting the starter motor from overheating
and at the same time maximizing the cranking time. The major difference between
the Two State Model and the Single State Model are the cooling characteristics.
In the Single State Model the brush temperature drops quickly to the outside
temperature while in the Two State Model the brush temperature drops to a
second state temperature instead of the outside temperature. With the currently
implemented time constrain it is possible to overheat the starter motor. The
algorithms are optimized under cold conditions, due to problems in reaching high
temperatures under warmer conditions.
−20 Celsius.
Mellstrand, Per. "Informed system protection /." Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2007. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/169a9a18d7974145c12572f00031dd2b?OpenDocument.
Повний текст джерелаInuwa, A. D. "Smart motor protection." Thesis, University of Sussex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431615.
Повний текст джерелаSvensson, Niklas, and Martin Holmberg. "Offshore cable protection." Thesis, Linnéuniversitetet, Institutionen för maskinteknik (MT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34775.
Повний текст джерелаShwani, Hazim G. "Critical infrastructure protection." Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555605.
Повний текст джерелаThis research study focused on identifying the protection of critical infrastructures and enhancing cybersecurity. The most recent cyber practice that is in place to protect critical infrastructures was also explored. From the literature review, it was concluded there are security loopholes in critical infrastructures. The study also uncovered that the federal government uses the newest cybersecurity tools, but does not share cyber vulnerabilities and risks with the private sector operating the infrastructures. The study also included an in-depth examination of Congressional documents pertaining to cybersecurity. However, it concluded that implementing rules and regulations is an ardouous step for the US Congress due to conflicts of interest. Finaly, the studied uncovered robust training, information sharing, and a contingency plan as the DHS's strategy to adapt to cyber threats that are emerging. Key Words: Critical Infrastructure, Cybersecurity.
Книги з теми "Protection"
Munger, Charles G. Corrosion protection by protective coatings. 2nd ed. Houston, TX: National Association of Corrosion Engineers, 1999.
Знайти повний текст джерелаInstitution, British Standards. Protective clothing - protection against liquid chemicals. London: B.S.I, 1995.
Знайти повний текст джерелаInstitution, British Standards. Protective clothing - protection against liquid chemicals -. London: B.S.I, 1995.
Знайти повний текст джерелаHarry, Ferguson, McNamara Tony, and Institute of Public Administration (Dublin, Ireland), eds. Protecting Irish children: Investigation, protection & welfare. Dublin: Institute of Public Administration, 1996.
Знайти повний текст джерелаShapiro, Gregg. Protection. Arlington, Va: Gival Press, 2008.
Знайти повний текст джерелаBill, James. Protection. Woodstock, Vt: Foul Play Press, 1992.
Знайти повний текст джерелаBill, James. Protection. London: Robinson, 2008.
Знайти повний текст джерелаMoffat, G. J. Protection. London: Headline, 2013.
Знайти повний текст джерелаBill, James. Protection. London: Penguin, 1989.
Знайти повний текст джерелаInstitution, British Standards. Protective clothing: Protection against heat and flame. London: B.S.I., 1987.
Знайти повний текст джерелаЧастини книг з теми "Protection"
Slim, Hugo, and Andrew Bonwick. "Prelims - Protection." In Protection, 1–10. Rugby, Warwickshire, United Kingdom: Oxfam Publishing, 2005. http://dx.doi.org/10.3362/9780855988869.000.
Повний текст джерелаSlim, Hugo, and Andrew Bonwick. "1. Protection." In Protection, 11–118. Rugby, Warwickshire, United Kingdom: Oxfam Publishing, 2005. http://dx.doi.org/10.3362/9780855988869.001.
Повний текст джерелаLister, A. M., and R. D. Eager. "Protection." In Fundamentals of Operating Systems, 140–52. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4757-2252-9_9.
Повний текст джерелаAycock, John. "Protection." In Retrogame Archeology, 145–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30004-7_7.
Повний текст джерелаIwasa, Yukikazu. "PROTECTION." In Case Studies in Superconducting Magnets, 1–78. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/b112047_8.
Повний текст джерелаJacobs, Marius. "Protection." In The Tropical Rain Forest, 237–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-72793-1_18.
Повний текст джерелаMaier, Martin. "Protection." In Metropolitan Area WDM Networks, 251–61. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0511-2_9.
Повний текст джерелаCapra, L. G. "Protection." In The Care of the Cancer Patient, 435–42. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18386-9_25.
Повний текст джерелаCetindamar, Dilek, Rob Phaal, and David Probert. "Protection." In Technology Management, 125–40. London: Macmillan Education UK, 2010. http://dx.doi.org/10.1007/978-1-349-92389-2_6.
Повний текст джерелаScaddan, Brian. "Protection." In Electrical Installation Work, 219–31. 10th ed. London: Routledge, 2022. http://dx.doi.org/10.1201/9781003324324-17.
Повний текст джерелаТези доповідей конференцій з теми "Protection"
Jeličić, Mladen. "Protection of Victims of Domestic Violence in Misdemeanor Procedure." In The Position of Victims in the Republic of Serbia. Institute of Criminological and Sociological Research, 2024. http://dx.doi.org/10.47152/palic2024.6.
Повний текст джерелаde Souza, Alisson Barbosa, Antonio Sergio de S Vieira, Jessyca Alencar L. e Silva, Alencar L. e Silva, and Joaquim Celestino Junior. "Survivability on optical networks: Protecting the protection." In 2009 International Conference on Ultra Modern Telecommunications & Workshops. ICUMT 2009. IEEE, 2009. http://dx.doi.org/10.1109/icumt.2009.5345521.
Повний текст джерелаMuntiyono, Samun Haris, Budi Nuryono, Andrew Ghea Mahardika, Hetty Fadriani, and Iman Hidayat. "Protection of Construction Workers with Personal Protective Equipment." In 1st Paris Van Java International Seminar on Health, Economics, Social Science and Humanities (PVJ-ISHESSH 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210304.085.
Повний текст джерелаPentreath, R. J. "Protecting animals within a revised radiological protection framework." In The Sixth International Symposium on the System of Radiological Protection. SAGE Publications Ltd., 2023. http://dx.doi.org/10.54320/gqqa6177.
Повний текст джерелаSummers, Angela E., and Bryan A. Zachary. "High Integrity Protection Systems." In ASME/JSME 2004 Pressure Vessels and Piping Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/pvp2004-3021.
Повний текст джерелаMiryasova, Lyudmila I., Shi Yongxing, Natalia N. Muravyeva, and Olga V. Dymchenko. "Realisation of the Russian customs policy in the conditions of protection of the national market." In Sustainable and Innovative Development in the Global Digital Age. Dela Press Publishing House, 2022. http://dx.doi.org/10.56199/dpcsebm.yghb1113.
Повний текст джерелаIlar, M., and M. Wittwer. "Numerical Generator Protection Offers New Benefits of Gas Turbines." In ASME 1992 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1992. http://dx.doi.org/10.1115/92-gt-268.
Повний текст джерела"Fengxiang Color Protection Digital Protection in Shaanxi." In 2018 4th International Conference on Education & Training, Management and Humanities Science. Clausius Scientific Press, 2018. http://dx.doi.org/10.23977/etmhs.2018.29180.
Повний текст джерелаZhang, Hao, Jinghan He, Tony Yip, and Z. Q. Bo. "Accelerate protection scheme in integrated protection system." In 2011 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies" (ISGT Europe). IEEE, 2011. http://dx.doi.org/10.1109/isgteurope.2011.6162719.
Повний текст джерелаШагапов, Илдар, and Рауф Яппаров. "ABOUTTECHNICALMEANS OF PROTECTION IN PROTECTION OF INFORMATION." In Информационные технологии обеспечения комплексной безопасности в цифровом обществе: сборник материалов V Всероссийской молодежной научно-практической конференции. Baskir State University, 2022. http://dx.doi.org/10.33184/itokbco-2022-05-20.10.
Повний текст джерелаЗвіти організацій з теми "Protection"
Imai, Susumu, Hajime Katayama, and Kala Krishna. Protection for Sale or Surge Protection? Cambridge, MA: National Bureau of Economic Research, May 2006. http://dx.doi.org/10.3386/w12258.
Повний текст джерелаFry, R. J. M. (Radiation protection). Office of Scientific and Technical Information (OSTI), December 1986. http://dx.doi.org/10.2172/5601696.
Повний текст джерелаCanavan, G. H. Force protection. Office of Scientific and Technical Information (OSTI), December 1998. http://dx.doi.org/10.2172/562589.
Повний текст джерелаCohen, Fred. Information Protection. Fort Belvoir, VA: Defense Technical Information Center, July 1987. http://dx.doi.org/10.21236/ada236208.
Повний текст джерелаSwaja, R. (Radiation protection). Office of Scientific and Technical Information (OSTI), May 1988. http://dx.doi.org/10.2172/7043227.
Повний текст джерелаSecrest, Jana, Jordan Douglas, and Stephanie Archuleta. Radiation Protection. Office of Scientific and Technical Information (OSTI), November 2023. http://dx.doi.org/10.2172/2205033.
Повний текст джерелаCochran, Lainy, and Kevin Hart. Environmental Protection Agency Drinking Water Protective Action Guides Implementation Recommendations. Office of Scientific and Technical Information (OSTI), December 2021. http://dx.doi.org/10.2172/1835989.
Повний текст джерелаSeverino, Felipe, Meta Brown, and Rajashri Chakrabarti. Personal Bankruptcy Protection and Household Debt. Federal Reserve Bank of New York, April 2024. http://dx.doi.org/10.59576/sr.1099.
Повний текст джерелаTomko, John S., and Jr. Critical Infrastructure Protection. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada401004.
Повний текст джерелаSaadawi, Tarek, Jr Jordan, and Louis. Cyber Infrastructure Protection. Fort Belvoir, VA: Defense Technical Information Center, May 2011. http://dx.doi.org/10.21236/ada543040.
Повний текст джерела