Academic literature on the topic 'Link / compromise'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Link / compromise.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Link / compromise"

1

Yeremenko, Oleksandra, Mykhailo Persikov, Valentyn Lemeshko, and Bassam Altaki. "Research and Development of the Secure Routing Flow-Based Model with Load Balancing." Problemi telekomunìkacìj, no. 2(29) (December 22, 2021): 3–14. http://dx.doi.org/10.30837/pt.2021.2.01.

Full text
Abstract:
The article is devoted to developing and researching the model of secure routing with load balancing in SD-WAN-based networks. In addition, an analysis of numerical research results using Python, GEKKO Optimization Suite, and NumPy has been carried out. The technical task of secure routing with load balancing was formulated as an optimization problem with quadratic optimality criterion. Such a criterion form allows for balancing the flow shares transmitting in the network. The simulation results showed that the link load (namely, the transmitted part of the flow) under study decreases with an
APA, Harvard, Vancouver, ISO, and other styles
2

Mangel, Marc, and Jimmie McEver. "Modeling Coupled Nonlinear Multilayered Dynamics: Cyber Attack and Disruption of an Electric Grid." Complexity 2021 (September 6, 2021): 1–19. http://dx.doi.org/10.1155/2021/5584123.

Full text
Abstract:
We study the consequences of cyberattack, defense, and recovery in systems for which a physical system is enabled by a cyber system by extending previous applications of models from the population biology of disease to the cyber system and coupling the state of the cyber system to the physical system, using the synchronous model for the electric grid. In analogy to disease models in which individuals are susceptible, infected, or recovered, in the cyber system, components can be uncompromised and vulnerable to attack, uncompromised and temporarily invulnerable to attack, compromised, or reset
APA, Harvard, Vancouver, ISO, and other styles
3

Hiscock, Natalie, and Bente Klarlund Pedersen. "Exercise-induced immunodepression– plasma glutamine is not the link." Journal of Applied Physiology 93, no. 3 (2002): 813–22. http://dx.doi.org/10.1152/japplphysiol.00048.2002.

Full text
Abstract:
The amino acid glutamine is known to be important for the function of some immune cells in vitro. It has been proposed that the decrease in plasma glutamine concentration in relation to catabolic conditions, including prolonged, exhaustive exercise, results in a lack of glutamine for these cells and may be responsible for the transient immunodepression commonly observed after acute, exhaustive exercise. It has been unclear, however, whether the magnitude of the observed decrease in plasma glutamine concentration would be great enough to compromise the function of immune cells. In fact, intrace
APA, Harvard, Vancouver, ISO, and other styles
4

Lemeshko, Oleksandr, Yurii Hrachov, and Batoul Sleiman. "Research of the Secure Routing Method of Confidential Messages on Disjoint Paths." Problemi telekomunìkacìj, no. 2(27) (December 11, 2020): 43–55. http://dx.doi.org/10.30837/pt.2020.2.04.

Full text
Abstract:
The article proposes a secure routing method of confidential messages in a telecommunication network by disjoint paths and its research results. The presented method of disjoint paths secure routing of confidential messages is based on the sequential solution of two optimization problems: calculating disjoint routes and secure balancing of confidential message fragments on a set of precalculated paths. An optimization model was chosen to determine the set of routes, namely, to calculate the maximum number of disjoint paths, including communication links with minimum compromise probability. Add
APA, Harvard, Vancouver, ISO, and other styles
5

Dertschnig, Simone, Gretel Nusspaumer, Robert Ivanek, Mathias M. Hauri-Hohl, Georg A. Holländer, and Werner Krenger. "Epithelial cytoprotection sustains ectopic expression of tissue-restricted antigens in the thymus during murine acute GVHD." Blood 122, no. 5 (2013): 837–41. http://dx.doi.org/10.1182/blood-2012-12-474759.

Full text
Abstract:
Key Points Acute GVHD predisposes to autoimmune chronic GVHD, but it is currently unclear how autoimmunity is linked to antecedent alloimmunity. Loss of central tolerance induction that occurs via functional compromise of thymic epithelial cells may provide such a pathogenic link.
APA, Harvard, Vancouver, ISO, and other styles
6

Ncubukezit, Tabisa. "Human Errors: A Cybersecurity Concern and the Weakest Link to Small Businesses." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 395–403. http://dx.doi.org/10.34190/iccws.17.1.51.

Full text
Abstract:
Cybersecurity is essential for all organizations, especially during this menacing Covid-19 global pandemic. The sudden transition of leaving the offices to work from home – the 'new normal' – has introduced information security-related risks associated with human factors. For example, both criminals and employees use the same platform for information exchange but with starkly different intentions. But both their actions compromise information and computer security. Criminals intentionally exploit systems to gain unauthorized access for their benefit, while employees make careless mistakes, lea
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Wenqian, Huihui Zhang, Shujun Liu, et al. "Excessive CD11c+Tbet+B cells promote aberrant TFHdifferentiation and affinity-based germinal center selection in lupus." Proceedings of the National Academy of Sciences 116, no. 37 (2019): 18550–60. http://dx.doi.org/10.1073/pnas.1901340116.

Full text
Abstract:
Excessive self-reactive and inadequate affinity-matured antigen-specific antibody responses have been reported to coexist in lupus, with elusive cellular and molecular mechanisms. Here, we report that the antigen-specific germinal center (GC) response―a process critical for antibody affinity maturation―is compromised in murine lupus models. Importantly, this defect can be triggered by excessive autoimmunity-relevant CD11c+Tbet+age-associated B cells (ABCs). In B cell-intrinsic Ship-deficient (ShipΔB) lupus mice, excessive CD11c+Tbet+ABCs induce deregulated follicular T-helper (TFH) cell differ
APA, Harvard, Vancouver, ISO, and other styles
8

Roland, C. M. "UNCONVENTIONAL RUBBER NETWORKS: CIRCUMVENTING THE COMPROMISE BETWEEN STIFFNESS AND STRENGTH." Rubber Chemistry and Technology 86, no. 3 (2013): 351–66. http://dx.doi.org/10.5254/rct.13.86988.

Full text
Abstract:
ABSTRACT The failure properties of rubbery networks exhibit a maximum as a function of cross-link density or modulus. To avoid excess creep, elastomers are usually formulated such that their state of cure falls past this maximum, which means there is an inevitable compromise between modulus and failure properties (stiffness and strength). This review describes various approaches to circumventing the problem by the use of unconventional network structures. The obtainable improvements in mechanical properties can be substantial (e.g., threefold increases or greater in strength), although these m
APA, Harvard, Vancouver, ISO, and other styles
9

Ngcobo, Senzo, and Colin D. Reddy. "Exploring the Link between Organisational Performance Pressures and the Factors that Compromise Ethical Leadership." Athens Journal of Business & Economics 10, no. 2 (2024): 139–58. http://dx.doi.org/10.30958/ajbe.10-2-4.

Full text
Abstract:
Purpose: This research paper explores the link between threat-appraised organizational performance pressure and factors that compromise ethical leadership. Design/Methodology/Approach: The study uses a qualitative approach, using a rank-type Delphi method and administered questionnaires to 40 academic and practitioner experts and 10 organisational leaders. The collected data was analysed through qualitative comparative analysis (QCA). Results: The findings provide empirical evidence of the detrimental impact of threat-appraised performance pressure on ethical leadership behaviour. Four themes
APA, Harvard, Vancouver, ISO, and other styles
10

Gallaher, Keith J., Braxton Strickland, Kimberly Pickett, and Jan M. Carter. "Life-threatening cardiac hypertrophy associated with dexamethasone treatment of bronchopulmonary dysplasia." Cardiology in the Young 6, no. 4 (1996): 337–40. http://dx.doi.org/10.1017/s104795110000398x.

Full text
Abstract:
SummaryWe report the case of an infant who developed severe cardiac compromise due to hypertrophic obstructive cardiomyopathy that developed while he was being treated with dexamethasone for bronchopulmonary dysplasia. This case is illustrative, as previous reports have described steroid-induced hypertrophic obstructive cardiomyopathy as being transient and benign. In this infant, the hypertrophic obstructive cardiomyopathy, waxed, waned, waxed, and waned again during two courses of dexamethasone, thus strengthening a causal link with steroid therapy. A high index of suspicion of hypertrophic
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Link / compromise"

1

Santos, Mariana Cabugueira Custódio dos. "In-between : um mediador urbano." Master's thesis, Universidade de Lisboa. Faculdade de Arquitetura, 2014. http://hdl.handle.net/10400.5/7941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

De, Stefano Giulia <1996&gt. "Redgauntlet, the Strategy of Oppositions, and the Logic of Compromise." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/18808.

Full text
Abstract:
Lo scopo di questa tesi è analizzare Redgauntlet di Sir Walter Scott (1824) in termini di opposizione tra i valori contrastanti che pervadono il romanzo e il loro compromesso. Per esplorare questo tema su diversi livelli, questo lavoro è diviso in tre sezioni dedicate rispettivamente a struttura, eventi e personaggi. Più specificamente, il primo capitolo esplorerà le opposizioni tra finzione e realtà trasmesse attraverso l'ispirazione autobiografica dietro il testo e l'analisi delle diverse forme narrative impiegate nel romanzo. Ciò porterà ad un ulteriore studio della struttura eclettica del
APA, Harvard, Vancouver, ISO, and other styles
3

Tomasi, Luana <1996&gt. "Pere Portabella: el encuentro entre cine experimental y compromiso político en la España tardofranquista." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/17083.

Full text
Abstract:
Esta tesis analiza dos películas de Pere Portabella, "Nocturn 29 "(1968) y "Umbracle" (1972), filmadas durante el tardofranquismo, al margen de los circuitos cinematográficos oficiales, con el fin de evidenciar cómo el compromiso en la lucha antifranquista del director catalán se expresa en estas dos películas mediante recursos cinematográficos formales. En el primer capítulo, a partir del marco cinematográfico de los años sesenta y setenta, se ilustra la trayectoria profesional del cineasta, destacando algunos azarosos encuentros que proporcionan a Portabella relevantes amistades-colaboradore
APA, Harvard, Vancouver, ISO, and other styles
4

Luthfa, Karim Sabrina. "The Uncertainty-Embedded Innovation Process : A study of how uncertainty emerges in the innovation process and of how firms address that to create novelty." Doctoral thesis, Högskolan i Halmstad, Centrum för innovations-, entreprenörskaps- och lärandeforskning (CIEL), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-33850.

Full text
Abstract:
Despite much discussion in the literature of uncertainties in relation to the innovation process, there is little knowledge of how they emerge in this process. This thesis accordingly aims to understand how uncertainty emerges in the innovation process and how firms address that uncertainty to create novelty from the process. Uncertainty is embedded in the innovation process (Jalonen, 2012), which implies that it is not only a factor affecting the innovation process but also an outcome of the process itself. To fulfil the purpose of this study, it is important to understand how the innovation
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Link / compromise"

1

Cook, Lisa L. The compromise of the blood-brain barrier, accumulation of mast cells, and infiltration of mononuclear cells in Lewis rats: A link between multiple sclerosis and covert epileptic seizures. Laurentian University, Behavioural Neuroscience Program, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Faiella, Chris. Personal injury settlement agreements line by line: A detailed look at personal injury settlement agreements and how to change them to meet your clients' needs. Aspatore, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Intellectual compromise: The bottom line. Paragon House, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Salton, Herman T. Morality. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198733591.003.0010.

Full text
Abstract:
This chapter traces the link between the muscular approach to peacekeeping advocated by Boutros-Ghali early in his term, the ‘moral’ purpose he attached to his role as Secretary-General, his predilection for DPA over DPKO, and his performance in Rwanda. Following a chronological trajectory from 1990 to 1994, the chapter considers that link by exploring the idea of UN ‘moral authority’ and the reasons behind Boutros-Ghali’s support for it. The chapter then contrasts such an idea with Boutros-Ghali’s relations with Presidents Mitterrand of France, Habyarimana of Rwanda, and Mubarak of Egypt. Thr
APA, Harvard, Vancouver, ISO, and other styles
5

Mauro, Aaron. The Language of Cyber Attacks. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350354715.

Full text
Abstract:
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages?This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, t
APA, Harvard, Vancouver, ISO, and other styles
6

Bennett, Steven C., and Chris J. Lopata. Commercial Settlement Agreements Line by Line: A Detailed Look at Commercial Settlement Agreements and How to Change Them to Meet Your Clients' Needs. Thomson Reuters Westlaw, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stahn, Carsten, and Jens Iverson, eds. Just Peace After Conflict. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198823285.001.0001.

Full text
Abstract:
The interplay between peace and justice plays an important role in almost any contemporary conflict. Peace and conflict studies have generally devoted more attention to conflict than to peace. Peace is often described in adjectives, such as negative/positive peace, liberal peace or democratic peace. But what elements make a peace just? Just war theory, peacebuilding, or transitional justice provide different perspectives on the dialectic relation between peace and justice and the methods of establishing peace after conflict. Experiences such as the Colombian peace process show that peace is in
APA, Harvard, Vancouver, ISO, and other styles
8

Beyond religious right and secular left rhetoric: The road to compromise. Palgrave Macmillan, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Como, David R. “Lawless Tyranny” and “Destructive Accommodation”. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199541911.003.0006.

Full text
Abstract:
This chapter explains how the outbreak of the civil war led to serious divisions within parliament’s camp. These divisions, over the nature of the war, the character and function of the king, and the propriety of negotiation and compromise with the royalists, reflected and further intensified shifts in the nature of political ideology. These emergent ideological shifts, first articulated in the petitions and pressure campaigns of hard-line supporters in the city, were bolstered by the publication of tracts and pamphlets, which revealed the increasingly radical tenor of the political thought ge
APA, Harvard, Vancouver, ISO, and other styles
10

I Fórum Internacional de Gestão do Trabalho e Educação Permanente em Saúde. Editora Udesc, 2021. http://dx.doi.org/10.5965/9786588565292.

Full text
Abstract:
Frente a situação mundial decorrente da pandemia pelo novo Coronavírus (COVID-19), o distanciamento social exige a compreensão de que a participação em eventos científicos na modalidade presencial não é viável neste momento. Assim, o Mestrado Profissional em Enfermagem na Atenção Primária à Saúde da Universidade do Estado de Santa Catarina (MPEAPS/UDESC) assumiu o compromisso social no desenvolvimento deste evento no formato totalmente on-line.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Link / compromise"

1

Ravi Kumar, Patchmuthu, Perianayagam Herbert Raj, and Perianayagam Jelciana. "A Framework to Detect Compromised Websites Using Link Structure Anomalies." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03302-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Garzilli, Francesca, Federica Vingelli, and Valentina Vittiglio. "Shifting Risk into Productivity: Inclusive and Regenerative Approaches Within Compromised Contexts in Peri-Urban Areas." In Regenerative Territories. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78536-9_3.

Full text
Abstract:
AbstractRecent international—UN-Habitat and European Environment Agency—and Italian reports have pointed out that urbanization is incessantly expanding at the expense of biodiversity and of rural lands. The radical growth of land consumption and change of land-use contribute to the increase of territorial risks and vulnerability. In particular, such phenomena are more visible within the peri-urban interface, considered as hybrid and malleable areas straddling between city and countryside realities. Even in the absence of a univocal definition, peri-urban is understood as a space where urban expansion occurs. Moreover, it emerges that such space also lacks local governance. Such uncertainty of form, identity and regulation catches the attention of a new urban agenda, which considers the peri-urban the most suitable place where to enact social, ecological and economic challenging changes. In this light, this paper aims to underline how peri-urban areas, although ecologically, socially and weak from a legislation point of view, constitute challenging territories to enact regenerative design and practices. In particular, new policies in sustainable agriculture are considered as potential solutions for the rapid soil consumption in Europe. Therefore, Campania region has been taken as our case study, because the region has a long history of agricultural practices and currently, it is closely linked to risk dynamics. It also represents an emblematic example for its innate exposure to natural hazards (related to its geological nature and geographical location), and for the ongoing man-made risks as causes of ecological and territorial damages. Moreover, land consumption in the region reached a record level in 2019, with 10% of agricultural land lost in a year (corresponding to 140,033 hectares). More than 70% of the consumed lands coincided with areas already exposed to natural hazards, both seismic and hydrogeological (Munafò, 2020). This paper assesses the results of an experimental application developed as part of the REPAiR (This research has been conducted within the framework of the European Horizon 2020 funded research “REPAiR: REsource Management in Peri-urban AReas: Going Beyond Urban Metabolism” [http://h2020repair.eu/]. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 688920. This article reflects only the author’s view. The Commission is not responsible for any use that may be made of the information it contains). Horizon 2020 European research project. We argue that the project results underline the relationship between the peri-urban interface and the soil regeneration through eco-innovative solutions. This has allowed us to link the spatial condition of the peri-urban with the production of waste and its subsequent recycle. This paper aims to further explore the research field experimented during REPAiR, expanding the materials available on the peri-urban and adding information with respect to the risk to which these places are linked.
APA, Harvard, Vancouver, ISO, and other styles
3

Hoanca, Bogdan, and Kenrick Mock. "Effects of Digital Convergence on Social Engineering Attack Channels." In Social Computing. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-984-7.ch115.

Full text
Abstract:
Social engineering refers to the practice of manipulating people to divulge confidential information that can then be used to compromise an information system. In many cases, people, not technology, form the weakest link in the security of an information system. This chapter discusses the problem of social engineering and then examines new social engineering threats that arise as voice, data, and video networks converge. In particular, converged networks give the social engineer multiple channels of attack to influence a user and compromise a system. On the other hand, these networks also support new tools that can help combat social engineering. However, no tool can substitute for educational efforts that make users aware of the problem of social engineering and policies that must be followed to prevent social engineering from occurring.
APA, Harvard, Vancouver, ISO, and other styles
4

Hoanca, Bogdan. "Effects of Digital Convergence on Social Engineering Attack Channels." In Networking and Telecommunications. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch082.

Full text
Abstract:
Social engineering refers to the practice of manipulating people to divulge confidential information that can then be used to compromise an information system. In many cases, people, not technology, form the weakest link in the security of an information system. This chapter discusses the problem of social engineering and then examines new social engineering threats that arise as voice, data, and video networks converge. In particular, converged networks give the social engineer multiple channels of attack to influence a user and compromise a system. On the other hand, these networks also support new tools that can help combat social engineering. However, no tool can substitute for educational efforts that make users aware of the problem of social engineering and policies that must be followed to prevent social engineering from occurring.
APA, Harvard, Vancouver, ISO, and other styles
5

Saeed, Rashid A., Mohammad Hasan, and Rania A. Mokhtar. "The Comparison between WLAN and Femtocell." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0092-8.ch003.

Full text
Abstract:
The communication link of femtocell may be one of Wide Area Network (WAN) technologies, such as, Asymmetric Digital Subscriber Line (ADSL). Femtocell used a public network to establish connectivity between femtocell and core network elements where there are a set of challenges to the operators. However, femtocells use IP Network as a backhaul architecture instead of conventional cellular network infrastructure, so that Femtocells and WiFi infrastructure networks can come to a compromise as they have a lot of common iterative and inter-related technologies and activities. This raises the question as to whether femtocell technology will substitute the existing WiFi technology. By carefully analyzing the similarities and differences between the two technologies one can find this answer. This chapter provides a technical comparison between Femtocells and WiFi in terms of architecture, operation, and standards.
APA, Harvard, Vancouver, ISO, and other styles
6

Tlale, Lloyd Daniel. "Achieving Positive Social Trajectory Development for the Well-Being of Black Students." In Advances in Educational Marketing, Administration, and Leadership. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-7090-9.ch008.

Full text
Abstract:
Many studies that focus on Black students examine risk factors and their link with negative outcomes. With societal existences such as racism, discrimination, and prejudice, Black students face challenges that can compromise their health and overall well-being. A series of subject-related keywords was used to extract potentially relevant articles and relevant texts from three electronic databases (Directory of Open Access Journals [DOAJ], Education Resources Information Center [ERIC], and Google Scholar). The findings show that there is a need for groundbreaking strategies involving promotion for reform school discipline practices.
APA, Harvard, Vancouver, ISO, and other styles
7

Dade-Robertson, Christine. "Architecture as Evidence: E. A. Freeman and Harold’s Church." In Making History. British Academy, 2015. http://dx.doi.org/10.5871/bacad/9780197265871.003.0009.

Full text
Abstract:
E. A. Freeman maintained that he always sought the truth in his historical research. He asserted that ‘personal theories’ and ‘national prejudices’ had no place in the study of history, but did his actions always match the rhetoric? This essay focuses on Freeman’s hero-worship of Harold, the last Anglo Saxon king, and his quest to prove Harold’s link with Waltham Abbey. This quest became a personal obsession which was to embroil him in a controversy which, many have argued, led him to compromise his academic principles and to allow ‘romantic nationalism’ to get in the way of the objective search for truth.
APA, Harvard, Vancouver, ISO, and other styles
8

Gallagher, Noelle. "Foreigners." In Itch, Clap, Pox. Yale University Press, 2019. http://dx.doi.org/10.12987/yale/9780300217056.003.0004.

Full text
Abstract:
This chapter asks what imaginative representations of venereal disease say about Restoration and eighteenth-century attitudes toward the geographically, politically, or nationally “foreign.” More specifically, it suggests that while some experts have argued for a link “between imagining disease and imagining foreignness,” venereal disease in the eighteenth-century imagination was ultimately associated less with the foreign other than with what might be called the foreign self: attributed more often to allies or rivals than to outright enemies, it provided a means of vilifying not those who remained completely outside the nation, but those who influenced or infiltrated it—those, in other words, who threatened to compromise the boundaries between foreigner and native.
APA, Harvard, Vancouver, ISO, and other styles
9

Peddi, Sarita, and Geetha Manoharan. "Research Issues and Challenges in Higher Education." In Social Implications of Research in Higher Education. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-0654-4.ch011.

Full text
Abstract:
Research in higher education advances knowledge, policy, and practices across fields. However, several academic difficulties might compromise study findings' legitimacy and usefulness. This chapter addresses ethics, funding, multidisciplinary collaboration, and publish or perish in higher education research. Data protection, informed consent, and responsible research are our ethical priorities. Limited financial resources may restrict academic study scope and depth. Since complex social issues require varied viewpoints and knowledge, interdisciplinary collaboration is essential. Additionally, this chapter discusses extrinsic cultural influences, such as the need for quick results and research agenda bias. These complex issues will be examined to create a framework for understanding higher education research's societal impacts. In the end, the chapter aims to encourage researchers, politicians, and institutional leaders to consider how research may improve society. Together, academics can better link research goals with societal needs.
APA, Harvard, Vancouver, ISO, and other styles
10

Razibul Islam, A. H. M., Rashida Begum, and A. B. M. Shawkat Ali. "Trends and Prospects of Telemedicine." In Handbook of Research on Modern Systems Analysis and Design Technologies and Applications. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-887-1.ch032.

Full text
Abstract:
Recent development in telecommunication and information technologies came up with several technology options for telemedicine applications in hospitals and for medics for quality healthcare to patients. The research trends therefore need to be addressed for the proper deployment of technologies in a clinical setting or in a telemedicine environment with the adaptive compromise of technology and suitability. In this chapter, along with a description of the research trends and system design issues concerned with telemedicine, a mobile telemedicine system architecture and design have been proposed. Other current telemedicine technology options and prospects and challenges of future research in this emerging area are also described to indicate the possible future research challenges. Research in telemedicine is a future to provide improved and quality access to the healthcare professionals and patients. Therefore, developing telemedicine systems with state-of-the-art technologies is of paramount importance and hence, this chapter would link up an important step in system analysis and design perspective to this evolving research arena.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Link / compromise"

1

Childers, Darrell. "Critical Challenges and Design Choices in Massively Parallel Optical Links." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.w4a.2.

Full text
Abstract:
Currently, multifiber ferrules are extremely precise optomechanical devices that achieve submicron lateral alignment and physical contact. Greatly increasing the fiber count in ferrules will pose significant challenges, necessitating compromises in both connector performance and functionality. Full-text article not available; see video presentation
APA, Harvard, Vancouver, ISO, and other styles
2

Simon, Philip D., Gordon A. Jensen, and John W. Bissell. "Pre-construction HVAC Interference Predictive Modeling, Mitigation Installation and Follow up Testing on a 130 Mile Long 345 kV Transmission Line/Crude Pipeline Collocation." In CORROSION 2010. NACE International, 2010. https://doi.org/10.5006/c2010-10116.

Full text
Abstract:
Abstract This paper presents data and analysis from a case history involving the mitigation of AC interference on multiple crude pipelines in a 130mile (210 km) long collocation with a new 345 kV High Voltage Alternating Current (HVAC) power transmission line. The configuration was significantly more complicated than the stated capacity of the predictive modeling software used. However, with some compromises, predictive modeling using the software provided useful results and allowed for the design of a successful mitigation system. Actual field data is compared to predicted AC interference lev
APA, Harvard, Vancouver, ISO, and other styles
3

Greenberger, Stuart, Teresa Elliott, and Kai Looijenga. "Waterline Protection in a Downtown Electric Rail Corridor." In CORROSION 2008. NACE International, 2008. https://doi.org/10.5006/c2008-08157.

Full text
Abstract:
Abstract The design criteria for an electric rail line servicing the center of downtown Portland, Oregon required ”boot” type rail insulation and a 10-ft separation between the track slab and paralleling waterlines. Crossing waterlines were isolated with casings or sleeves for a 10-ft distance from the track slab. Where there was not adequate clearance for the specified separation between the track slab and neighboring waterlines, there were compromises to Portland Water Bureau’s design standard and the track slab was additionally insulated with a secondary liner. This paper describes the desi
APA, Harvard, Vancouver, ISO, and other styles
4

Rakoczy, Anna M., Lukasz Porzyc, and Diogo Ribeiro. "Predicting long-term service performance of a prestressed concrete bridge using a probabilistic method and remote bridge inspection technologies." In IABSE Congress, San José 2024: Beyond Structural Engineering in a Changing World. International Association for Bridge and Structural Engineering (IABSE), 2024. https://doi.org/10.2749/sanjose.2024.0987.

Full text
Abstract:
&lt;p&gt;The bridge structures are exposed to numerous live loads and environmental cycles during their service, which can cause degradation, defects, and reduction of the bridge capacity. As the capacity of the bridge reduces over time, the reliability index also reduces, which indicates the safety of bridge operation is compromised. Fitness for Service (FFS) assessment, which uses probabilistic methods and is supplemented by and consistent with detailed technical inspections of the structures, provides most accurate assessment of the expected bridge service. This article presents a probabili
APA, Harvard, Vancouver, ISO, and other styles
5

Finneran, Shane, and Barry Krebs. "Advances in HVAC Transmission Industry and Its Effects on Pipeline Induced AC Corrosion." In CORROSION 2014. NACE International, 2014. https://doi.org/10.5006/c2014-4421.

Full text
Abstract:
Abstract Pipelines collocated in close proximity to high voltage alternating current (HVAC) transmission lines may be subjected to electrical interference from capacitive, electromagnetic inductive and conductive effects. If these effects are high enough they may pose a safety hazard to personnel, or may compromise the integrity of the pipeline. The effects of HVAC interference from a personnel safety and corrosion risk standpoint are well documented, however recent developments in the electric power transmission industry have driven trends toward increasing HVAC transmission line voltages and
APA, Harvard, Vancouver, ISO, and other styles
6

Eslami, Maryam, and Marc Singer. "Study of Inhibition Efficiency of Model Volatile Corrosion Inhibitors in the Presence of n-Heptane." In CONFERENCE 2022. AMPP, 2022. https://doi.org/10.5006/c2022-18003.

Full text
Abstract:
Abstract Volatile corrosion inhibitors (VCIs), such as thiol- and amine- based formulations, can be used to mitigate top of the line corrosion (TLC) that occurs during transportation of wet gas via transmission pipeline. However, the presence of condensable hydrocarbons can compromise VCI inhibition efficiency. This phenomenon can be related to the higher solubility of VCIs in the hydrocarbon phase, compared to water, which leads to a deleterious partitioning effect. This partitioning can happen both in the bulk fluid at the bottom of the line, hindering the evaporation of VCIs, and in any con
APA, Harvard, Vancouver, ISO, and other styles
7

Kemp, David, Barry Krebs, and Shane Finneran. "Minimizing HVAC Interference on Pipelines through Transmission Line Design Optimization." In CORROSION 2018. NACE International, 2018. https://doi.org/10.5006/c2018-11285.

Full text
Abstract:
Abstract AC interference on pipelines in the nearby vicinity of HVAC transmission lines has become increasingly prevalent in industry as shared utility corridors have become more widespread. These AC interference levels, if severe enough, can present a shock hazard to anyone who may come into contact with exposed portions of the pipeline. Additionally, the integrity of the pipeline can be compromised as a result of accelerated AC corrosion and/or damage from a fault incident from nearby transmission line structures. AC interference levels can be predicted using a number of different methods in
APA, Harvard, Vancouver, ISO, and other styles
8

Desjardins, Guy. "Corrosion Rate and Severity Results from In-Line-Inspection Data." In CORROSION 2001. NACE International, 2001. https://doi.org/10.5006/c2001-01624.

Full text
Abstract:
Abstract Pipeline operators are increasingly using in-line inspections to maintain the integrity of their pipelines. Inspection tool vendors, in turn, have been steadily improving the technology to give in-line inspections greater accuracy and resolution. In-line inspections enable the pipeline operator to address the most severe defects on the pipeline. Over the last several years, Morrison Scientific has developed methods of adding another dimension to inspection data. That dimension is corrosion rate. Two methods exist: The first method estimates bulk corrosion rates from a single inspectio
APA, Harvard, Vancouver, ISO, and other styles
9

Cawley, Alec, and Peter Owen. "Digital Acquisition without Compromise-the Missing Link." In SMPTE Advanced Television and Electronic Imaging Conference. IEEE, 1995. http://dx.doi.org/10.5594/m00846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Naheed, Maimoona, Hasan Mahmood, and Iqbal Murtza. "Secure multipath routing using link compromise metric in mobile ad hoc networks." In 2015 Symposium on Recent Advances in Electrical Engineering (RAEE). IEEE, 2015. http://dx.doi.org/10.1109/raee.2015.7352761.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Link / compromise"

1

Marsden, Eric, Romuald Perinet, and Jean Pariès. Articulation between compliance and initiative in safety management. Foundation for an industrial safety culture, 2024. http://dx.doi.org/10.57071/903aci.

Full text
Abstract:
Safety in complex systems is produced by two complementary reservoirs: procedural compliance (the anticipation of potential hazards and implementation of procedures and other preventive barriers, also called “rule-based safety”) and initiative (the actions of competent front-line workers who react appropriately to conditions in real-time, also called “managed safety”). This document analyses the articulation between these two sources of safety, and the way in which it may evolve given changes in the industrial world and in societal expectations. It suggests moving past a view of these two form
APA, Harvard, Vancouver, ISO, and other styles
2

Kwun, H. L51694 Investigation of Techniques for Bulk Stress Measurement on Exposed Pipelines-Phases I and II. Pipeline Research Council International, Inc. (PRCI), 1993. http://dx.doi.org/10.55274/r0010318.

Full text
Abstract:
Differential movement of a buried pipeline resulting from terrain instabilities such as subsidence, fault slippage, frost heave, ice scouring, soil movement, and landslide can create localized areas of high stress in a pipeline. These areas may be susceptible to mechanical failure and therefore may compromise the structural integrity of the line. Nondestructive testing (NDT) methods that can detect high-stress regions and measure the magnitude of the stress in the pipeline are needed to determine if or when remedial action must be taken to prevent stress-related damage. The areas of high stres
APA, Harvard, Vancouver, ISO, and other styles
3

Sampayo, Andrés Miguel, Yann Basset, Ana Beatriz Franco Cuervo, et al. Revista Divulgación Científica Universidad del Rosario No. 7. Universidad del Rosario, 2024. http://dx.doi.org/10.12804/dvcn_10336.42817_num7.

Full text
Abstract:
Los logros que podemos documentar en este número de nuestra revista Divulgación Científica son una muestra de lo anterior. Cada una de las investigaciones sobre las que presentamos artículos en esta ocasión son el resultado del trabajo que con un rotundo compromiso realizan cada una de las personas que nos acompañan en esta entrega. Podemos contar con estos testimonios gracias a que trabajamos con varios periodistas científicos, y los desarrollos a los cuales pueden acercarse nuestros lectores por medio del ejemplar que tienen en sus manos o de los links a los que pueden acceder en el universo
APA, Harvard, Vancouver, ISO, and other styles
4

Olsen. L51740 Evaluation of the Structural Integrity of Cold Field-Bent Pipe. Pipeline Research Council International, Inc. (PRCI), 1996. http://dx.doi.org/10.55274/r0010361.

Full text
Abstract:
During recent pipeline construction seasons, there have been reported difficulties in cold field bending different joints of line pipe produced by the same manufacturer during a particular production run. These difficulties were typically manifested as an inability to achieve bends of one to one-and-a-half degrees per diameter in the pipe without forming ripples. Some of these problems could be traced to poor bending practices, i.e., inappropriate bending machine set-up and operator inexperience. However, it was observed that even with proper machine set-up and experienced operators, some "bad
APA, Harvard, Vancouver, ISO, and other styles
5

Harslett, Philip. The GTAP Data Base Construction Procedure. GTAP Working Paper, 2013. http://dx.doi.org/10.21642/gtap.wp76.

Full text
Abstract:
The GTAP Data Base provides a consistent snapshot of the global economy. It consists of a set of product-by-industry input output tables that represent the structures of more than 100 economies and are linked by bilateral merchandise and cross-border services trade. It is used to support a variety of models that are built to analyse policy changes. The database is assembled using regional input-output tables and data on trade, energy, protection and macroeconomic aggregates from a variety of international sources. The incompatibilities inherent in the data mean that many compromises are requir
APA, Harvard, Vancouver, ISO, and other styles
6

Down, Murray. PR-686-183908-R01 InSAR Monitoring of Pipeline Geohazards in Vegetated and Very Large Non-Vegetated Areas. Pipeline Research Council International, Inc. (PRCI), 2020. http://dx.doi.org/10.55274/r0011679.

Full text
Abstract:
Located on the west side of the Appalachian Mountains, a 14-inch diameter pipeline runs from Kenova to Columbus carrying gasoline and distillates and a 24-inch diameter pipeline runs from Owensboro to Catlettsburg carrying crude products. In 2014, ground movement was identified along the pipeline corridor in an area that was primarily dominated by vegetation. Displacement events similar to this, whether known or unknown have the potential to compromise pipeline integrity. The Appalachian Mountain region is almost entirely classed as high landslide susceptibility by the United States Geological
APA, Harvard, Vancouver, ISO, and other styles
7

Lee-Jeffs, Ann, and Joanna Safi. Textile Circularity and the Sustainability Model of New Mobility. SAE International, 2024. http://dx.doi.org/10.4271/epr2024006.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;The world is on a “take-make-waste,” linear-growth economic trajectory where products are bought, used, and then discarded in direct progression with little to no consideration for recycling or reuse. This unsustainable path now requires an urgent call to action for all sectors in the global society: circularity is a must to restore the health of the planet and people. However, carbon-rich textile waste could potentially become a next-generation feedstock, and the mobility sector has the capacity to mobilize ecologically
APA, Harvard, Vancouver, ISO, and other styles
8

Krause, Thomas, Mehrdad Keshefi, Ross Underhill, and Lynann Clapham. PR652-203801-R02 Magnetic Object Model for Large Standoff Magnetometry Measurement. Pipeline Research Council International, Inc. (PRCI), 2021. http://dx.doi.org/10.55274/r0012151.

Full text
Abstract:
Ferromagnetic pipeline steel may exhibit magnetization, even in the absence of applied magnetic fields, due to remnant fields or the presence of pipe wall stress. Remnant magnetization may be present from previous or existing exposure to a magnetic field, while pipe wall stress induced magnetization can result from line pressure, environmental stresses due to settling or geohazard conditions, and residual stresses due to nonuniform plastic deformation caused by manufacturing processes, installation or operating conditions. The local stress state of the pipeline may also be altered by corrosion
APA, Harvard, Vancouver, ISO, and other styles
9

Sessa, Guido, and Gregory Martin. role of FLS3 and BSK830 in pattern-triggered immunity in tomato. United States Department of Agriculture, 2016. http://dx.doi.org/10.32747/2016.7604270.bard.

Full text
Abstract:
Pattern-recognition receptors (PRRs) located on the plant cell surface initiate immune responses by perceiving conserved pathogen molecules known as pathogen-associated molecular patterns (PAMPs). PRRs typically function in multiprotein complexes that include transmembrane and cytoplasmickinases and contribute to the initiation and signaling of pattern-triggered immunity (PTI). An important challenge is to identify molecular components of PRR complexes and downstream signaling pathways, and to understand the molecular mechanisms that mediate their function. In research activities supported by
APA, Harvard, Vancouver, ISO, and other styles
10

Horwitz, Benjamin A., and Barbara Gillian Turgeon. Fungal Iron Acquisition, Oxidative Stress and Virulence in the Cochliobolus-maize Interaction. United States Department of Agriculture, 2012. http://dx.doi.org/10.32747/2012.7709885.bard.

Full text
Abstract:
Our project focused on genes for high affinity iron acquisition in Cochliobolus heterostrophus, a necrotrophic pathogen of maize, and their intertwined relationship to oxidative stress status and virulence of the fungus on the host. An intriguing question was why mutants lacking the nonribosomal peptide synthetase (NRPS) gene (NPS6) responsible for synthesis of the extracellular siderophore, coprogen, are sensitive to oxidative stress. Our overall objective was to understand the mechanistic connection between iron stress and oxidative stress as related to virulence of a plant pathogen to its h
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!