Дисертації з теми "Security current"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Security current".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Carlsson, Fredrik, and Klas-Göran Eriksson. "Comparison of security level and current consumption of security implementations for MQTT." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40760.
Повний текст джерелаKashfi, Hamid. "Evaluation of Current Practical Attacks Against RFID Technology." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37766.
Повний текст джерелаGao, Li Li. "Security in VoIP-Current Situation and Necessary Development." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7921.
Повний текст джерелаNowadays, VoIP is getting more and more popular. It helps company to reduce cost, extends service to remote area, produce more service opportunities, etc. Besides these advantages, VoIP also put forward security problems.
In this paper, we introduce the popular protocols in VoIP and their security mechanisms, by introducing threats to VoIP, we point out the vulnerabilities with the security mechanisms of each VoIP protocol, and give recommendation for each VoIP protocol. In the conclusion part, we evaluate the vulnerabilities of each protocol, and point out in the future, with better protocol architecture, enhanced security policies, VoIP will has a brighter future.
Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Повний текст джерелаZahidi, Salman. "Biometrics - Evaluation of Current Situation." Thesis, Linköpings universitet, Informationskodning, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73230.
Повний текст джерелаBuzdugan, Maria. "Current and emerging air cargo security and facilitation issues." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99128.
Повний текст джерелаQiang, Hao. "E-book Security: An Analysis of Current Protection Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1876.
Повний текст джерелаE-books have a wide range of application spheres from rich-media presentations to web site archiving, from writing to financial statement. They make publishing, storing and distributing of information quite simple. As a new publication technique, the main concern with e-books is the copyright infringement. To prevent e-books from free duplication and distribution, different security mechanisms are used in their publishing and distributing processes. By investigating and analyzing Digital Rights Management (DRM) and Electronic Book Exchange (EBX), this thesis presents some security issues that the e-book industry are or should be aware. Various security problems and possible solutions are highlighted by means of two case studies.
Horvat, Marko. "Formal analysis of modern security protocols in current standards." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:64d55401-82e1-4fb9-ad0b-73caf2236595.
Повний текст джерелаHove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.
Повний текст джерелаYousef, Paul. "GSM-Security: A Survey and Evaluation of the Current Situation." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2273.
Повний текст джерелаThe Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality.
The important aspects of the system that need protection are described, along with the implementation of mechanisms used for the protection. It appears that many of the very valuable aspects of GSM can be attacked.
The anonymity of a GSM user is compromised resulting in the attacker being able to observe the time, rate, length, sources or destinations of e g calls. Even tracking a subscriber’s movements becomes possible. However, a passive attack is not sufficient to perform these attacks. The attacker needs to mount an active attack using equipment offering base station functionality.
Authentication is a crucial aspect of a wireless communication system due to the nature of the medium used, i e the radio link that is available to every one and not only the legitimate entities. Even the authentication mechanisms are attacked. It is possible to clone a subscription either by having physical access to the smart card or over the air interface. Cloning a subscription over the air requires base station functionality.
The most obvious threat against communication systems is eavesdropping on conversations. The privacy of GSM conversations is protected using some version of the A5 algorithm. There are several impressive cryptanalytical attacks against these algorithms, that break the encryption and make it possible to eavesdrop in real-time. Most of these algorithms require, however, extensive computation power and unrealistic quantities of known plaintext, which make it difficult to use them in practice. Difficulties using cryptanalytical attacks to break the confidentiality of GSM calls does not mean that conversations are well protected. Loopholes in the protocols used in GSM make it possible for an outsider, with access to sufficient equipment, to eavesdrop on conversations in real-time.
In the presence of these threats and vulnerabilities it is justified to wonder whether GSM provides sufficient security for users with very valuable information to communicate. These users may be military organisations, senior management personnel in large companies etc. GSM’s current security model does note provide sufficient protection for these entities. An additional layer of security should be added to the current security model.
Lensing, Daniel Paul. "Social Security: an evaluation of current problems and proposed solutions." Kansas State University, 2014. http://hdl.handle.net/2097/18219.
Повний текст джерелаDepartment of Economics
William F. Blankenau
This paper examines several different issues which could make the various Social Security programs insolvent. I evaluate each cause and how it is related to the problems experienced by each program to determine potential policy changes. I draw the majority of my data and information from peer-reviewed scholarly articles, as well as government agencies such as the Social Security Administration, Bureau of Labor Statistics, and the Congressional Research Service. Section 1 of the paper explains the history of the Social Security program and the circumstances creating it. Section 2 goes into greater detail explaining different issues which could make the system insolvent. These areas are: earnings inequality, changes in healthcare, increased life expectancy, changes in the dependency ratio, general trust fund issues, disability trust fund issues, political climate, and recessions/reduced earnings. In Section 3, I evaluate two different proposed plans to fix Social Security. The first plan is an academic plan, the Diamond-Orszag Plan; the second is a plan created by a think-tank, The Heritage Plan. Section 4 gives a conclusion of the implications of the paper and explains the benefits and drawbacks of the two evaluated plans. After evaluating all the problems with Social Security and the two proposed plans, I come to the conclusion that neither plan would be ideal by itself. The Diamond-Orszag Plan is the most politically feasible plan, as it doesn’t change the framework of the current program. A combination of the two plans would be most beneficial, as The Heritage Plan has policy specifically targeting the problems with the Medicare system, where the Diamond-Orszag Plan does not. The three different plans for changing the disability system I evaluate in Section 2.5 are specific, targeted plans and could be a nice addition to a plan such as the Diamond-Orszag Plan. In any case, the sooner politicians finally start taking Social Security’s instability seriously, the better. The longer we wait, the more complex and difficult the problem will become.
Schmidlin, Marco. "Swiss Armed Forces XXI - the answer to current or future threats." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSchmidlin.pdf.
Повний текст джерелаThesis advisor(s): Donald Abenheim. Includes bibliographical references (p. 107-115). Also available online.
Komissar, A. "Providing protection of institutions of banks under current conditions." Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/33555.
Повний текст джерелаIheagwara, Charles M. "The strategic implications of the current Internet design for cyber security." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/67554.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (p. 87-89).
In the last two decades, the Internet system has evolved from a collection point of a few networks to a worldwide interconnection of millions of networks and users who connect to transact virtually all kinds of business. The evolved network system is also known as Cyberspace. The use of Cyberspace is now greatly expanded to all fields of human endeavor by far exceeding the original design projection. And even though, the Internet architecture and design has been robust enough to accommodate the extended domains of uses and applications, it has also become a medium used to launch all sorts of Cyber attacks that results into several undesirable consequences to users. This thesis analyzes the current Internet system architecture and design and how their flaws are exploited to launch Cyber attacks; evaluates reports from Internet traffic monitoring activities and research reports from several organizations; provides a mapping of Cyber attacks to Internet architecture and design flaw origin; conducts Internet system stakeholder analysis; derives strategic implications of the impact of Internet system weaknesses on Cyber security; and makes recommendations on the broader issues of developing effective strategies to implement Cyber security in enterprise systems that have increasingly become complex. From a global architectural design perspective, the study conducted demonstrates that although the Internet is a robust design, the lack of any means of authentication on the system is primarily responsible for the host of Cyber security issues and thus has become the bane of the system. Following the analysis, extrapolation of facts and by inferences we conclude that the myriad of Cyber security problems will remain and continue on the current exponential growth path until the Internet and in particular the TCP/IP stack is given the ability to authenticate and that only through a collaborative effort by all stakeholders of the Internet system can the other major Cyber security issues be resolved especially as it relates to envisioning and fashioning new Cyber security centric technologies.
by Charles M. Iheagwara.
S.M.in Engineering and Management
Gregson-Green, Lucy E. "Resilience, security, and the railway station : a unique case study of the current and future resilience to security threats." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/33411.
Повний текст джерелаNilsson, Sebastian. "The Current State of DDoS Defense." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.
Повний текст джерелаWhalen, Timothy J. "Human factors in Coast Guard Computer Security - an analysis of current awareness and potential techniques to improve security program viability." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397600.
Повний текст джерелаThesis advisor(s): Irvine, Cynthia E. ; Brinkley, Douglas E. "June 2001". Includes bibliographical references (p. 103-104). Also available online.
Довга, Любов Вікторівна, Любовь Викторовна Довга, and Liubov Viktorivna Dovha. "Current trends and management features of the regions ecologicaly safe development." Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/45312.
Повний текст джерелаGraham, Janice M. "Current development and prospects for the future : French security policy in a changing world." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28087.
Повний текст джерелаAzhar, Mahmood Javed. "Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7470.
Повний текст джерелаLundberg, Karl Johan. "Investigating the current state of securityfor small sized web applications." Thesis, Linköpings universitet, Databas och informationsteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-89160.
Повний текст джерелаWählisch, Matthias [Verfasser]. "Measuring and Implementing Internet Backbone Security : Current Challenges, Upcoming Deployment, and Future Trends / Matthias Wählisch." Berlin : Freie Universität Berlin, 2016. http://d-nb.info/1084634392/34.
Повний текст джерелаRosenberg, Magdalena. "Survival Time : A Survey on the Current Survival Time for an Unprotected Public System." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23199.
Повний текст джерелаKozicka, Marta [Verfasser]. "Policies for Food Security in India: An Assessment of Current Policies and Reform Options / Marta Kozicka." Bonn : Universitäts- und Landesbibliothek Bonn, 2016. http://d-nb.info/1118720881/34.
Повний текст джерелаSchreck, Thomas [Verfasser], and Felix [Gutachter] Freiling. "IT Security Incident Response: Current State, Emerging Problems, and New Approaches / Thomas Schreck ; Gutachter: Felix Freiling." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2018. http://d-nb.info/1150966696/34.
Повний текст джерелаMcClellan, Kevin K. "Are the U.S. Navy's current procedures for responding to homeland defense and security tasking adequately designed?" Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FMcClellan.pdf.
Повний текст джерелаThesis Advisor(s): McMaster, Michael T. ; Dahl, Erik. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Homeland defense, Homeland Security, maritime homeland defense, Maritime Homeland Security, joint, Navy, command and control, Northern Command, NORTHCOM, defense support of civil authorities. Includes bibliographical references (p. 69-74). Also available in print.
Neibaur, Elena E. "Sustainability Analysis of Domestic Rainwater Harvesting Systems for Current and Future Water Security in Rural Mexico." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2245.
Повний текст джерелаRubio, Castro Ana María. "Current challenges in legal and political thought." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/118447.
Повний текст джерелаEn el artículo se analizan los debates teóricos sobre la igualdad y la justicia que representa la dimensión estructural e institucional de la política en el marco de una constitucionalidad rígida de los derechos fundamentales, así como los cambios en proceso a los que están sometidos el derecho y la política en España como consecuencia de la globalización de la producción económica y de la cultura. Las actuaciones realizadas por el ejecutivo español en los últimos años permiten hablar del retorno de las viejas jerarquías socio-económicas y de claros obstáculos al desarrollo de un pensamiento jurídico-político alternativo. Por estas razones se defiende la necesidad de redefinir el sujeto político colectivo (construir un nuevo nosotros) y de desarrollar un nuevo modelo de Estado en el que prime la solidaridad frente al miedo y la seguridad.
Kalyani, Radha Padma. "A nonlinear optimization approach for UPFC power flow control and voltage security." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/pdf/Kalyani_completeThesis_09007dcc80438f59.pdf.
Повний текст джерелаVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed November 29, 2007) Includes bibliographical references.
Cruz, Victor F. "Utilizing current commercial-off-the-shelf facial-recognition and public live video streaming to enhance national security." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43898.
Повний текст джерелаThe nation’s security depends in part on proactive approaches and methods to evolving technologies for identifying persons of interest, enemies of state (foreign and domestic), potential acts of terrorism, and foreign intelligence. Currently, state and federal entities operate passive surveillance technologies with biometrics to identify and curtail national security threats, so as to act within the confines of the Act for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism. However, such surveillance technologies are implemented independently by state and federal agencies, which cause a significant delay in the identification of persons of interest. Consequently, acts of terrorism on U.S. soil as well as U.S. assets abroad that could have otherwise been prevented may occur. This thesis proposes a generic interoperability technology approach that considers the networking of public live video streaming with state and federal surveillance technologies (including traffic cameras integrated with facial recognition technologies) interlinked with the National Criminal Information Center and Federal Terrorist Screening Database. Requirements surrounding data format and transmission protocols were studied, and concerns regarding existing need to know requirements are addressed. The interoperability, or systems of systems approach, and concept of operation is applied to further the enhancement of and fill a capability gap by providing actionable intelligence in real-time using biometrics technologies.
Skora, Patrick W. "Analysis of security sector reform in post-conflict Sierra Leone a comparison of current versus historical capabilities /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FSkora.pdf.
Повний текст джерелаThesis Advisor(s): Lawson, Letitia. Second Reader: Mensch, Eugene M. "March 2010." Description based on title screen as viewed on April 23, 2010. Author(s) subject terms: Sierra Leone, Post-Conflict, Security Sector Reform, SSR, RSLAF, SLP, Police, Sierra Leone military. Includes bibliographical references (p. 49-60). Also available in print.
Uino, Siiri. "What is the situation in Finland’s and Sweden’s security policy and what are their choices with it? : Analyses of the security policy from the past years in Finland and Sweden and about their current challenges." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-56280.
Повний текст джерелаSumner, Kristine. "AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2475.
Повний текст джерелаPh.D.
Department of Criminal Justice and Legal Studies
Health and Public Affairs
Public Affairs PhD
Berg, Anthon, and Felicia Svantesson. "Is your electric vehicle plotting against you? : An investigation of the ISO 15118 standard and current security implementations." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44918.
Повний текст джерелаGamarra, Vílchez Leopoldo. "Balance of the Labor Policy of the Current Government." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/118483.
Повний текст джерелаEl presente trabajo se propone analizar la política laboral del actual Gobierno peruano. Empezaremos con algunas consideraciones sobre el contexto económico y social del período 2011-2015 y específicamente sobre el concepto de la precariedad en el empleo. Luego, analizaremos los cambios más importantes en materia laboral y previsional; finalmente, expondremos algunas propuestas como medidas concretas respecto a la búsqueda de solución de los problemas tratados.
Dike, Samuel Chisa. "Legislating security of supply of petroleum resources in Nigeria : current practice, new direction and lessons from Brazil, Norway and the UK." Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=211108.
Повний текст джерелаPapadaki, Evangelia. "What amendments need to be made to the current EU legal framework to better address the security obligations of data controllers?" Thesis, University of Southampton, 2018. https://eprints.soton.ac.uk/421046/.
Повний текст джерелаMeyer, Ross H. "SOF regional engagement : an analysis of the effectiveness of current attempts to shape future battlefields /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMeyer.pdf.
Повний текст джерелаBjoerkan, Maren. "International displacement and state compliance with international human rights standards: the current protection of internally displaced persons' right to physical security in Nigeria." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/28030.
Повний текст джерелаDóša, Vladimír. "Výstavba datových center." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-223046.
Повний текст джерелаŠumberák, David. "Přístrojový transformátor proudu 12kV, 4000//5/5A." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220954.
Повний текст джерелаRensema, Dirk-Jan. "The Current State of Progressive Web Apps : A study on the performance, compatibility, consistency, security and privacy, and user and business impact of progressive web apps." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-78904.
Повний текст джерелаWilliams, Todd Austin. "Then and now a comparsion of the attacks of December 7, 1941 and September 11, 2001 as seen in the New York Times with an analysis of the construction of the current threat to the National Security /." Ohio : Ohio University, 2003. http://www.ohiolink.edu/etd/view.cgi?ohiou1060033786.
Повний текст джерелаБанникова, Ю. С., та J. S. Bannikova. "Совершенствование государственного аудита в системе финансовой безопасности России на примере Счетной палаты : магистерская диссертация". Master's thesis, б. и, 2020. http://hdl.handle.net/10995/94150.
Повний текст джерелаThe master's thesis is devoted to the areas of improvement of state audit in the financial security system of Russia on the example of the accounting chamber. The final qualifying work consists of an introduction, three chapters, conclusion, list of sources used, and appendices. In the first Chapter, the theoretical aspects of the state's financial security are considered, and current threats are identified. The second Chapter analyzes and evaluates the activities of the accounting chamber for 2017-2019. The third Chapter suggests ways to improve the efficiency of the accounting chamber.
Yehorova, Victoria, and Вікторія Олександрівна Єгорова. "Controllers (PLC) safety (safety relay). Overview. Primary requirements. Features of the application." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50754.
Повний текст джерелаMany machines and robots require safety circuits to stop all or part of an operation in the event of an emergency event. These safety circuits are typically configured using safety relays, or a safety-rated programmable logic controller (PLC) or other safety-rated controller. One or more multi-function safety relays can often be used to replace many basic single-function safety relays, simplifying installations and saving money. In other cases, multi-function safety relays can be used instead of a safety-rated PLC, resulting in substantial savings while streamlining implementation and maintenance. Most safety relay designs have traditionally used safety relays constructed with internal electromechanical, forceguided relays. The key advantage here is voltage flexibility, as nearly any typical control voltage can be switched. Typical voltages include: 5 V DC,12 V DC, 24 V DC, 120 V AC and 230 V AC. The nominal current at 24 V DC is about 6 amps for a resistive-based load. Contrast this with a safety controller. A safety controller is a solid-state device. This means that its outputs are “transistorized” and only designed to switch 24 V DC at a typical maximum of 2 amps. If you plan on controlling a higher power relay or contactor, then these outputs will work fine. However, if you are using a safety relay to control the final load switching using voltages other than 24 V DC, then this is an important consideration. Safety controllers are typically modular, so safety I/O can be added. The safety I/O expansion modules are either solid-state or electromechanical. If safety controller expansion modules are needed, these costs will be an important consideration. Expansion modules can also be added to a safety relay system.
Багато машин і роботів потребують ланцюгів безпеки, щоб зупинити всю або частину операції у випадку надзвичайної події. Ці схеми безпеки зазвичай конфігуруються з використанням реле безпеки, або програмованого логічного контролера (PLC) з оцінкою безпеки або іншого контролера з оцінкою безпеки. Одне або кілька багатофункціональних реле безпеки часто можна використовувати для заміни багатьох основних однофункціональних реле безпеки, спрощуючи монтаж та заощаджуючи гроші. В інших випадках замість ПЛК із рейтингом безпеки можна використовувати багатофункціональні реле безпеки, що призводить до значної економії при спрощенні впровадження та технічного обслуговування. У більшості конструкцій реле безпеки традиційно використовуються реле безпеки, виготовлені з внутрішніми електромеханічними реле, що керуються силою. Ключовою перевагою тут є гнучкість напруги, оскільки майже будь-яка типова керуюча напруга може перемикатися. Типові напруги включають: 5 В постійного струму, 12 В постійного струму, 24 В постійного струму, 120 В змінного струму та 230 В змінного струму. Номінальний струм при 24 В постійного струму становить близько 6 ампер для резистивного навантаження. Порівняйте це з контролером безпеки. Контролер безпеки – це твердотільний пристрій. Це означає, що його виходи “транзисторовані” і призначені лише для перемикання 24 В постійного струму на типовий максимум 2 ампер. Якщо ви плануєте керувати реле або контактором більшої потужності, тоді ці виходи будуть працювати нормально. Однак, якщо ви використовуєте реле безпеки для управління кінцевим перемиканням навантаження з напругою, відмінною від 24 В постійного струму, то це є важливим фактором. Контролери безпеки, як правило, модульні, тому можна додати введення-виведення безпеки. Модулі розширення вводу-виводу безпеки є або твердотільними, або електромеханічними. Якщо потрібні модулі розширення контролера безпеки, ці витрати будуть важливим фактором. Модулі розширення також можуть бути додані до системи реле безпеки.
Suchomel, Lukáš. "Analýza kritických míst v silniční dopravě v okrese Ústí nad Orlicí." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2017. http://www.nusl.cz/ntk/nusl-316993.
Повний текст джерелаHromek, Lukáš. "Posouzení a vyhodnocení bezpečnosti u el. strojů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242123.
Повний текст джерелаCheng, Carol Shaoyu. "A hybrid approach to power system voltage security assessment." Diss., Georgia Institute of Technology, 1991. http://hdl.handle.net/1853/15469.
Повний текст джерелаHsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.
Повний текст джерелаKounelis, Ioannis. "Secure and Trusted Mobile Commerce System based on Virtual Currencies." Doctoral thesis, KTH, Kommunikationssystem, CoS, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166701.
Повний текст джерелаQC 20150521