Academic literature on the topic 'Methods of protection and defence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Methods of protection and defence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Methods of protection and defence"

1

Khisamova, R. V. "Digital (Self)-Defence by The Example of The Children’s Rights Protection." Theoretical and Applied Law, no. 3 (October 8, 2024): 87–95. http://dx.doi.org/10.22394/3034-2813-2024-3-87-95.

Full text
Abstract:
In relation to the sphere of legal protection the author considers two legal phenomena: “digital self-protection” and “digital protection of rights”. Relaying on examples of actions taken by parents in order to protect the children’s rights on Internet, the author comes to the conclusion that the digital methods of protecting the right that exist today in practice can be considered by modern jurisprudence as alternative ways to protect the right or form a new legal institution of “digital self-protection”.
APA, Harvard, Vancouver, ISO, and other styles
2

Loo, Bee Wah, Pei Ling Tan, Siew Kian Tey, and Wan Yoke Chin. "Authentication Methods Selection in Information Security through Hybrid AHP and EGT." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 2 (2024): 171–85. http://dx.doi.org/10.37934/araset.50.2.171185.

Full text
Abstract:
The information security leader frequently encounters the challenge of choosing the appropriate defence strategy. Effective multi-criteria decision-making (MCDM) is essential in the field of information security for determining the optimal strategies that involve more than one party. To address this challenge, we propose a hybrid model that combines the strengths of the Analytic Hierarchy Process (AHP) with Evolutionary Game Theory (EGT). The hybrid model helps the information security leader assess the criteria for security controls and make the optimal decisions to protect the organization's
APA, Harvard, Vancouver, ISO, and other styles
3

Harmata, Władysław, and Marek Witczak. "Defence against weapons of mass destruction. Technical and functional solutions in personal protection for Territorial Defence Forces." Bulletin of the Military University of Technology 67, no. 2 (2018): 145–68. http://dx.doi.org/10.5604/01.3001.0012.0984.

Full text
Abstract:
The paper characterises methods of defence for use against weapons of mass destruction, as a form of troop protection system in the event of a contamination (infection) hazard from both the functional and the task-oriented perspective. The basic equipment of troops are described, taking into account the classification of equipment and the means used for: identification of the contamination, protection from the contamination, and the elimination of the contamination in terms of personal protection. Keywords: protection against weapons of mass destruction, equipment, personal protection of soldi
APA, Harvard, Vancouver, ISO, and other styles
4

Nemailal, Tarafder. "Defence Textiles Types with Materials and Methods of Manufacturing-A Review." Journal of Industrial Mechanics 4, no. 2 (2019): 25–33. https://doi.org/10.5281/zenodo.3361358.

Full text
Abstract:
Textiles always have an important role in providing huge support to the defence personnel in various ways. It has played a vital role in providing protection to certain extent to the soldiers. Modern days defence is dealing with high performance textiles. Functional textiles have wide applications in defence. Examples of such textiles are like parachute fabric, three layer breathable fabric, camouflage printed fabric, flame retardant fabric, Thermoplastic Polyurethane Urethanes (TPU) coated fabric, etc. It is a great challenge to the system designers for defence departments to satisfy the conf
APA, Harvard, Vancouver, ISO, and other styles
5

Zolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and Current Status of Defence Information Security in Ukraine." Hasanuddin Law Review 8, no. 1 (2022): 18. http://dx.doi.org/10.20956/halrev.v8i1.3582.

Full text
Abstract:
Relevance of the article - security has always been one of the priority issues of state policy. Considering that the defence forces are an inseparable part of state security, studying their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the information society, the information technology of the Ukrainian defence forces must adapt to the current challenges and threats, to ensure proper protection of information of strategic importance to the state and collected, consolidated and stored by the defence for
APA, Harvard, Vancouver, ISO, and other styles
6

Zolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and current status of defence information security in Ukraine." Linguistics and Culture Review 5, S3 (2021): 513–24. http://dx.doi.org/10.21744/lingcure.v5ns3.1545.

Full text
Abstract:
Relevance of the article - security has always been one of the priority issues of state policy, and considering the fact that the defense forces are an inseparable part of state security, the study of their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the information society, the information technology of the Ukrainian defence forces must adapt to the current challenges and threats, to ensure proper protection of information of strategic importance to the state and collected, consolidated and stored b
APA, Harvard, Vancouver, ISO, and other styles
7

SHYSHKA, Y. "Protection of human rights and freedoms in the information sphere." INFORMATION AND LAW, no. 1(10) (January 10, 2014): 101–5. http://dx.doi.org/10.37750/2616-6798.2014.1(10).272433.

Full text
Abstract:
The base categories of defence of information rights are examined in the article. On the basis of analysis of current domestic legislation conclusions are drawn in relation to the types of human and citizens’ information rights. The methods of defence of information rights are explored, recommendations of their application are given.
APA, Harvard, Vancouver, ISO, and other styles
8

Melnyk, Dmytro. "PROTECTION OF NATIONAL CRITICAL INFORMATION INFRASTRUCTURE: ISSUES OF THE DAY AND SOLUTIONS." Administrative law and process, no. 3(38) (2022): 5–16. http://dx.doi.org/10.17721/2227-796x.2022.3.01.

Full text
Abstract:
Advantages of the modern digital world and development of information technologies stipulated appearance of new threats to national security in an information sphere. All more frequent by the objects of cyberattacs, amount and power of which grows constantly, the information resources of financial institutions, enterprises of transport and power engineering, public organs, which guarantee security, defense, safety in case of disasters. Therefore a research purpose is a search of solutions of issues of the day for protection of national critical information infrastructure. Methods. For implemen
APA, Harvard, Vancouver, ISO, and other styles
9

Stochaj, Justyna. "Outline of the Concept of the Population Protection and Civil Defence System in the Context of Contemporary Statutory Regulations." Safety & Fire Technology 65, no. 1 (2025): 42–54. https://doi.org/10.12845/sft.65.1.2025.4.

Full text
Abstract:
Aim: Development of an outline of the concept of the civil protection and civil defence system in the context of modern statutory regulations, including selected elements such as: the general characteristics of the functioning of the civil protection system and its transformation into a civil defence system under martial law or a state of war, the entities and subsystems of the civil protection and civil defence system and the dependencies that exist between them, taking into account the administrative division of the country. Project and methods: The study formulated the following main resear
APA, Harvard, Vancouver, ISO, and other styles
10

Mykhailovskyi, Denys, and Ihor Skliarov. "Methods of calculation and engineering protection of critical infrastructure objects and other strategic facilities against long-range projectiles." Strength of Materials and Theory of Structures, no. 111 (November 24, 2023): 155–71. http://dx.doi.org/10.32347/2410-2547.2023.111.155-171.

Full text
Abstract:
Relevance. One of the key areas of russia's military operations against Ukraine is the destruction of critical infrastructure objects (CIO) of strategic importance. The main types of enemy means for air strikes on CIO are air-launched, ground-launched and water-launched missiles, as well as barrage munitions. The vast majority of the CIO were built in Ukraine above ground, without any engineering structural protection systems to counter air threats, explosions or other impacts related to military operations. The importance of developing the most effective methods of engineering structural prot
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Methods of protection and defence"

1

Flucke, Josefine. "Architecture of defence, preservation of life." Master's thesis, Universidade de Lisboa, Faculdade de Arquitetura, 2019. http://hdl.handle.net/10400.5/19074.

Full text
Abstract:
Dissertação de Mestrado Integrado em Arquitetura, com a especialização em Arquitetura apresentada na Faculdade de Arquitetura da Universidade de Lisboa para obtenção do grau de Mestre.<br>This final work consists of an architectural rehabilitation project of a military ruin in Portugal. The re-invention, the re-thinking of places connected to a time of war are important tasks in the current architectural discussion. Those forgotten sites have kept precious landscapes untouched from overbuilding, and with their strange structures created sites of value today. Transforming a military building,
APA, Harvard, Vancouver, ISO, and other styles
2

Simpson, Katherine Hannah. "Public choice for flood defence." Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/22596.

Full text
Abstract:
Why do we want to value the environment? Environmental assets provide a flow of goods and services over time which benefit mankind. Valuing these services contributes towards their protection and enhancement, however many of these benefits cannot be valued in traditional markets and as such rely on non-market valuation techniques. One of these is contingent valuation (CV) which directly asks respondents whether they are willing to pay for an improvement in the good or service. This thesis seeks to explore methodological issues associated with this method by undertaking a CV survey to elicit wi
APA, Harvard, Vancouver, ISO, and other styles
3

Borysenkov, Dmytro, and Serhii Rozhok. "Features of national cyber defence." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50755.

Full text
Abstract:
1. AP NEWS. Ukraine pushes ahead with plans to secure NATO membership. Retrieved on 25/02/2021 from https://www.apnews.com/dff40992fcc446f6808d02d03b35e4bc 2. Cyberdominance. Ukraine as a NATO Centre of Excellence: Information Warfare. Retrieved on 24/02/2021 from https://www.cyberdominance.com/cyberdominance/ukraine-as-anato-centre-of-excellence-information-warfare/?history=0&pfid=1&sample=2&ref=0 3. Nekrasov V, Polyakova A (2017) This is war: Ukraine was shaken by the largest cyberattack in history. Ekonomichna Pravda (Text in Ukrainian). Retrieved on 24/02/2021 from http://www.epravda
APA, Harvard, Vancouver, ISO, and other styles
4

Karus, Vahur. "Statemaking, warmaking och protection ur Estlands perspektiv." Thesis, Försvarshögskolan, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1209.

Full text
Abstract:
Stater är de enda legitima enskilda aktörerna i det internationella systemet. Varje enskild statsträvar alltid att främja sina egna säkerhetsintressen liksom handelspolitiska och kulturellaintressen och staten gör detta genom olika medel som t.ex. diplomati och ekonomi för att baranämna några. Men utöver dessa medel har staten alltid haft förmågan att utöva våldsmakt bådemot andra stater och sina egna invånare. Våldsutövandet har också varit grunden för den modernastaten. Krigföring och våldsutövande har i sin tur givit upphov till en komplex byråkrati,skatteväsende och centralstyre i syfte at
APA, Harvard, Vancouver, ISO, and other styles
5

Unnikrishnan, Suraj. "Adaptive Envelope Protection Methods for Aircraft." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11478.

Full text
Abstract:
Carefree handling refers to the ability of a pilot to operate an aircraft without the need to continuously monitor aircraft operating limits. At the heart of all carefree handling or maneuvering systems, also referred to as envelope protection systems, are algorithms and methods for predicting future limit violations. Recently, envelope protection methods that have gained more acceptance, translate limit proximity information to its equivalent in the control channel. Envelope protection algorithms either use very small prediction horizon or are static methods with no capability to adapt to cha
APA, Harvard, Vancouver, ISO, and other styles
6

Aderam, Henry Ndejapo Tshapumba. "Consumer protection in online payment methods." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73435.

Full text
Abstract:
This research focuses on online payment methods which are premised on electronic funds transfer. It is a general discourse that the use of online payment methods is risky. It is held that the fear of fraud and abuse of a payment system is at the focal point of such risk. Banks which provide these payment systems are usually not prepared to negotiate with their prospective customers. Resultantly, banks contract out of the risk associated with online payments, specifically the liability for unauthorized electronic funds transfers. This culminates in bank’s customers bearing the majority of tha
APA, Harvard, Vancouver, ISO, and other styles
7

Karlsson, Terése. "Contingency planning for Bofors Defence AB, an application of existing methods." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1639.

Full text
Abstract:
<p>Bofors Defence AB is in the process of updating and documenting the company’s routines for information security. The object is to be certified according to the standard ISO 17799-1 during 2003. Among other things updating means that the company will be provided with contingency plans who should insure a reliable IT-environment. Basically it is all about protecting the company’s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities. The aim of the Thesis was to apply existing methods in the making of contingency plans. T
APA, Harvard, Vancouver, ISO, and other styles
8

Ormondroyd, Graham A. "An investigation of novel wood protection methods." Thesis, Bangor University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.445093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Spivak, I. S., and L. P. Iarmak. "Methods of protection (pelleting) of nitrogen fertilizers." Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/28676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Якушко, Сергій Іванович, Сергей Иванович Якушко, Serhii Ivanovych Yakushko, and I. S. Spivak. "Methods of protection (pelleting) of nitrogen fertilizers." Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/25807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Methods of protection and defence"

1

Harries, Nicola Denise. Dawlish Warren, Devon: Changing shape and protection of the spit, with the use of coastal defence methods. Queen Mary and Westfield College, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Torsten, Sohns, Voicu Victor A, and NATO Advanced Research Workshop on Antidotes, Protectors, and Decorporators--a New Approach in the Area of Disarmament: From Military towards Environmental Purposes (1998 : Bucharest, Romania), eds. NBC risks: Current capabilities and future perspectives for protection. Kluwer Academic Publishers, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

National Council on Radiation Protection and Measurements. Radiological health protection issues associated with use of active detection technology systems for detection of radioactive threat materials. National Council on Radiation Protection and Measurements, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Deschaux-Dutard, Delphine, ed. Research Methods in Defence Studies. Routledge, 2020. http://dx.doi.org/10.4324/9780429198236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Soomere, Tarmo, and Ewald Quak, eds. Preventive Methods for Coastal Protection. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00440-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ontario. Ministry of Agriculture and Food. Freeze Protection Methods For Crops. s.n, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jeschke, Peter, Wolfgang Krämer, Ulrich Schirmer, and Matthias Witschel, eds. Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2012. http://dx.doi.org/10.1002/9783527655908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vincent, Charles, B. Panneton, and F. Fleurat-Lessard, eds. Physical Control Methods in Plant Protection. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-662-04584-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mahdavi Tabatabaei, Naser, Ersan Kabalci, and Nicu Bizon, eds. Microgrid Architectures, Control and Protection Methods. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-23723-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

1959-, Butler Frances, and British Institute of Human Rights, eds. Human rights protection: Methods and effectiveness. Kluwer Law International, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Methods of protection and defence"

1

Ricci, Angela, Silvia Sabbadini, Laura Miozzi, Bruno Mezzetti, and Emanuela Noris. "Host-induced gene silencing and spray-induced gene silencing for crop protection against viruses." In RNAi for plant improvement and protection. CABI, 2021. http://dx.doi.org/10.1079/9781789248890.0008.

Full text
Abstract:
Abstract Since the beginning of agriculture, plant virus diseases have been a strong challenge for farming. Following its discovery at the very beginning of the 1990s, the RNA interference (RNAi) mechanism has been widely studied and exploited as an integrative tool to obtain resistance to viruses in several plant species, with high target-sequence specificity. In this chapter, we describe and review the major aspects of host-induced gene silencing (HIGS), as one of the possible plant defence methods, using genetic engineering techniques. In particular, we focus our attention on the use of RNA
APA, Harvard, Vancouver, ISO, and other styles
2

Ricci, Angela, Silvia Sabbadini, Laura Miozzi, Bruno Mezzetti, and Emanuela Noris. "Host-induced gene silencing and spray-induced gene silencing for crop protection against viruses." In RNAi for plant improvement and protection. CABI, 2021. http://dx.doi.org/10.1079/9781789248890.0072.

Full text
Abstract:
Abstract Since the beginning of agriculture, plant virus diseases have been a strong challenge for farming. Following its discovery at the very beginning of the 1990s, the RNA interference (RNAi) mechanism has been widely studied and exploited as an integrative tool to obtain resistance to viruses in several plant species, with high target-sequence specificity. In this chapter, we describe and review the major aspects of host-induced gene silencing (HIGS), as one of the possible plant defence methods, using genetic engineering techniques. In particular, we focus our attention on the use of RNA
APA, Harvard, Vancouver, ISO, and other styles
3

Khudaverdyan, Surik, Ashok Vaseashta, Mane Khachatryan, Mihail Lapkis, and Sergey Rudenko. "New Method of Optical Spectroscopy for Environmental Protection and Safety." In Functional Nanostructures and Sensors for CBRN Defence and Environmental Safety and Security. Springer Netherlands, 2020. http://dx.doi.org/10.1007/978-94-024-1909-2_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wuwang, Yanxiu, and Gunther Schiefer. "Consumer-Friendly Methods for Privacy Protection Against Cleaning Robots." In Attacks and Defenses for the Internet-of-Things. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21311-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lehmann, Paul V., Zhigang Liu, Noémi Becza, Alexis V. Valente, Junbo Wang, and Greg A. Kirchenbaum. "Monitoring Memory B Cells by Next-Generation ImmunoSpot® Provides Insights into Humoral Immunity that Measurements of Circulating Antibodies Do Not Reveal." In Methods in Molecular Biology. Springer US, 2024. http://dx.doi.org/10.1007/978-1-0716-3690-9_11.

Full text
Abstract:
AbstractMemory B cells (Bmem) provide the second wall of adaptive humoral host defense upon specific antigen rechallenge when the first wall, consisting of preformed antibodies originating from a preceding antibody response, fails. This is the case, as recently experienced with SARS-CoV-2 infections and previously with seasonal influenza, when levels of neutralizing antibodies decline or when variant viruses arise that evade such. While in these instances, reinfection can occur, in both scenarios, the rapid engagement of preexisting Bmem into the recall response can still confer immune protect
APA, Harvard, Vancouver, ISO, and other styles
6

Bateman, I. J., R. K. Turner, R. J. T. Klein, and I. H. Langford. "The Application of the Cost Benefit Method to Sea Defence and Coastal Protection Management in England." In Studies in Ecological Economics. Springer Netherlands, 2001. http://dx.doi.org/10.1007/978-94-015-9755-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Reddy, P. Parvatha. "Plant Defence Activators." In Recent advances in crop protection. Springer India, 2012. http://dx.doi.org/10.1007/978-81-322-0723-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Keay, Andrew. "The Wrongful Trading Defence." In Company Directors' Liability and Creditor Protection. Informa Law from Routledge, 2023. http://dx.doi.org/10.4324/9780429266232-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Deschaux-Dutard, Delphine. "Methods In Defence Studies." In Routledge Handbook Of Defence Studies. Routledge, 2018. http://dx.doi.org/10.4324/9781315650463-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Millan, Matteo. "From “state protection” to “private defence”." In Corporate Policing, Yellow Unionism, and Strikebreaking, 1890–1930. Routledge, 2020. http://dx.doi.org/10.4324/9780429354243-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Methods of protection and defence"

1

Weber, Grace, Bobbi Jo Merten, and Jessica D. Torrey. "Comparison of Cathodic Disbondment Test Methods for Water Infrastructure Coatings." In CORROSION 2018. NACE International, 2018. https://doi.org/10.5006/c2018-10914.

Full text
Abstract:
Abstract Protective coatings are used ubiquitously as the primary means of corrosion defense for buried or immersed metallic structures. Cathodic protection is often used in conjunction with coatings as a secondary means of corrosion protection, however it can also have detrimental effects on the coating itself if not properly applied. Cathodic disbondment testing is used to measure a coating's susceptibility to loss of adhesion to the substrate due to cathodic polarization. NACE recently published a new cathodic disbondment test method, TM0115-2015, Cathodic Disbondment Test for Coated Steel
APA, Harvard, Vancouver, ISO, and other styles
2

Davis, Guy D., Terry G. Vargo, Andrew W. Dalgleish, and Douglas Deason. "Corrosion Protection and Health Monitoring by Smart Appliqués." In CORROSION 2005. NACE International, 2005. https://doi.org/10.5006/c2005-05205.

Full text
Abstract:
Abstract Corrosion of test assets and other structures used by the Missile Defense Agency (MDA) and other DOD branches is an ongoing maintenance and reliability issue. The tropical marine environment, such as the Marshall Islands or the Hawaiian Islands, is highly corrosive and improved corrosion protection and control (CPC) methods are needed to protect valuable and critical assets and infrastructure. A solution to this corrosion problem is smart appliqués that provide excellent corrosion protection and health monitoring to alert an inspector if the appliqué has been damaged or has deteriorat
APA, Harvard, Vancouver, ISO, and other styles
3

Minxu, Lu, Zhao Xinwei, Luo Jinheng, and Bai Zhenquan. "In-Service Oil and Gas Pipeline Safety Assessment Practice and Progress in China." In CORROSION 2003. NACE International, 2003. https://doi.org/10.5006/c2003-03152.

Full text
Abstract:
Abstract In the paper, the status quo and development trend were introduced of Chinese Oil and Gas pipeline industry, the significance of safety assessment for oil and gas pipeline was also expounded. The category was summarized of safety assessment, the safety assessment methods for defect containing pipeline and their progress were generalized. The safety assessment for oil and gas pipeline can be categorized as three aspects: the safety assessment of geological disaster, the integrity assessment for defect containing pipeline, and the effective protective life prediction for protection coat
APA, Harvard, Vancouver, ISO, and other styles
4

Gintert, Lawrence A., Robert B. Mason, and Donald R. Skelton. "Development of a Joint Test Protocol for Validation of Alternatives to Corrosion Prevention for Military Ground Vehicle Body Panels." In CORROSION 2003. NACE International, 2003. https://doi.org/10.5006/c2003-03222.

Full text
Abstract:
Abstract The cost impact for Department of Defense (DoD) equipment due to corrosion warrants the high priority placed on evaluating new techniques for corrosion control. The development of a Joint Test Protocol (JTP) for alternatives to current corrosion protection methods used on ground vehicle body panels has been accomplished under the US Army Corrosion Measurement and Control (CM&amp;C) program as part of the National Defense Center for Environmental Excellence (NDCEE) contract. Stakeholders representing various disciplines within the DoD and original equipment manufacturers (OEMs) contrib
APA, Harvard, Vancouver, ISO, and other styles
5

Lilly, Alexander, Mirella Vargas, Erica Macha, Steven Kopitzke, James Dante, and Victor Rodriguez-Santiago. "The Development of a New Accelerated Corrosion Test Method Using Controlled Relative Humidity." In CONFERENCE 2023. AMPP, 2023. https://doi.org/10.5006/c2023-19475.

Full text
Abstract:
Abstract As the Department of Defense transitions away from the use of hexavalent chromium due to health concerns and increasing regulations, new corrosion protection technologies must be developed and validated. In order to more quickly and reliably evaluate these technologies, accelerated corrosion tests that more accurately mimic operational environments are needed. The development of a new accelerated corrosion test method is discussed in this work. Six test methods were designed to explore the effect of relative humidity cycling, electrolyte deposition duration &amp; frequency, and test a
APA, Harvard, Vancouver, ISO, and other styles
6

Dunmire, D., and G. Keller. "Partnering with SSPC in the Pacific Rim." In SSPC 2013 Greencoat. SSPC, 2013. https://doi.org/10.5006/s2013-00016.

Full text
Abstract:
Abstract The Society for Preventive Coatings (SSPC) has been an essential partner with the Department of Defense in the fight against corrosion for nearly 10 years. Since 2003, SSPC’s leadership and expertise in corrosion management, prevention and control has been a very important factor in our success at combating the insidious and pervasive effects of corrosion on our facilities and equipment. SSPC’s efforts have covered the spectrum of corrosion curriculum development; in-class and on-the-job training for technicians and managers; development and improvement of corrosion-related specificat
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Hui, Sreelakshmi Sreeharan, and Homero Casteneda. "Indirect Inspection-based Bayesian Machine Learning Model for Probabilistic Coating Defect Severity Interpretation." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00400.

Full text
Abstract:
Abstract Corrosion pit nucleation and propagation in underground pipelines vary by geographic position along the pipeline right of way (RoW). Effective pipeline integrity management requires both the modeling of corrosion initiation/propagation and the integration of field-acquired data. To mitigate external corrosion, onshore pipelines use barrier coatings and either sacrificial or impressed current cathodic protection (CP) systems. Pipeline integrity is monitored through direct and/or indirect assessments. In this work, we focused on leveraging indirect methods, such as close interval potent
APA, Harvard, Vancouver, ISO, and other styles
8

Raghav, K., G. N. V. Prasad, S. Sripad Kulkarni, and Yashas V. "CanSat Deployment: Electrothermal and Electromechanical Methods." In 2024 IEEE Space, Aerospace and Defence Conference (SPACE). IEEE, 2024. http://dx.doi.org/10.1109/space63117.2024.10667925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shukla, Pavan K., Roderick E. Fuentes, Andrew Nordquist, Bruce J. Wiersma, and Ingrid Pederson. "Effectiveness of Vapor Corrosion Inhibitors under Elevated Chloride Conditions for Aboveground Storage Tank Application." In CONFERENCE 2024. AMPP, 2024. https://doi.org/10.5006/c2024-20791.

Full text
Abstract:
Abstract The sand quality used to construct the tank pad is an important contributing factor to the rate of corrosion that occurs on the soil-side of the aboveground storage tanks (ASTs) floor plates. Clean sand that meets specific criteria provides the first line of defense for mitigation of tank floor corrosion. However, it has been observed that the sand quality used for some existing tanks differ greatly from the specifications provided in the API 651 standard; this could be partially due to initial sand quality not meeting the specification, and partially due to the environmental effects
APA, Harvard, Vancouver, ISO, and other styles
10

Janucki, Jacek, and Jan Owsik. "An optical method for document protection against counterfeit." In European Symposium on Optics and Photonics for Defence and Security, edited by David H. Titterton. SPIE, 2004. http://dx.doi.org/10.1117/12.578035.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Methods of protection and defence"

1

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and
APA, Harvard, Vancouver, ISO, and other styles
2

Leventis, Nicholas, Chariklia Sotiriou-Leventis, Lokeswarappa Dharani, et al. Advanced Polymer Systems for Defence Applications: Power Generation, Protection and Sensing. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada614979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Piesciorovsky, Emilio, and Ben Ollis. Literature Review: Methods for Microgrid Protection. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1724463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gudimov, V. N., and S. G. Samochvalova. Software visualization of cryptographic protection methods. Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2025. https://doi.org/10.12731/ofernio.2025.25460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Manral, V., M. Bhatia, J. Jaeggli, and R. White. Issues with Existing Cryptographic Protection Methods for Routing Protocols. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rosati, Julie D. Functional Design of Breakwaters for Shore Protection: Empirical Methods. Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada228024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ball, Sydney J., Thomas L. Wilson Jr, and Richard Thomas Wood. Advanced Control and Protection system Design Methods for Modular HTGRs. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1047629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ramirez, T. L., K. M. Reed, M. R. Perry, C. M. Grove, and D. E. Molnar. Evaluation of Test Methods and Requirements for Respiratory Protection Systems 21. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada262466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chang, LiWu. Statistical Sensitive Data Protection and Inference Prevention with Decision Tree Methods. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada465138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chang, LiWu, and James Tracy. Multi-Dimensional Inference and Confidential Data Protection with Decision Tree Methods. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada465156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!