Academic literature on the topic 'Protection tools'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection tools.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Protection tools"

1

Lai, Jessica C., and Samuel I. Becher. "Protecting Consumer Protection." Victoria University of Wellington Law Review 49, no. 2 (2018): 259. http://dx.doi.org/10.26686/vuwlr.v49i2.5324.

Full text
Abstract:
Recent consumer law cases are shaping consumer law in an unwarranted way. The courts have acknowledged the importance of advancing consumer law and protecting consumers, however, upon closer examination it is questionable whether courts are employing the right framework, tools and considerations. By analysing recent country of origin cases this article identifies some potentially worrying ways in which the courts have eroded consumer law rather than strengthening it. In particular, such cases allow the proprietary interest of goodwill to creep into the Fair Trading Act 1986 (FTA). Doing so, ev
APA, Harvard, Vancouver, ISO, and other styles
2

O. E., Rubtsov, Norkina A. N., and Chicherov K.A. "Information Protection Tools for Android-based Mobile Devices." KnE Social Sciences 3, no. 2 (2018): 235. http://dx.doi.org/10.18502/kss.v3i2.1548.

Full text
Abstract:
Presently, the issue of protecting information and personal data contained in mobile devices is of vital importance. The use of cutting-edge powerful smartphones presented by manufacturers as a substitute for personal computers, laptops and tablets, stresses the need for utilizing both built-in free information protection features and special antivirus software manufactured by recognized global developers. The article reveals the effectiveness of using built-in information protection tools for Android-based mobile devices and presents a comparative characteristic of similar tools applied with
APA, Harvard, Vancouver, ISO, and other styles
3

Tan, Raymond R. "Computational tools for environmental protection." Clean Technologies and Environmental Policy 8, no. 2 (2006): 69. http://dx.doi.org/10.1007/s10098-006-0042-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mamanazarov, Sardor. "Methods and Tools for Personal Data Protection in Big Data: Analysis of Uzbekistan’s Legal Framework." International Journal of Law and Policy 3, no. 4 (2025): 20–40. https://doi.org/10.59022/ijlp.322.

Full text
Abstract:
This study examines methods and tools for protecting personal data in the Big Data context, with a focus on Uzbekistan’s legal framework. The research analyzes anonymization, pseudonymization, privacy notices, privacy impact assessments, privacy by design, and ethical approaches to data protection. Through comparative analysis with international standards such as GDPR, the study identifies significant gaps in Uzbekistan’s “On Personal Data” law, which lacks specific provisions on modern data protection tools. Research findings reveal that while basic protections exist, Uzbekistan’s legislation
APA, Harvard, Vancouver, ISO, and other styles
5

Forte, Dario. "Fragmentation Attacks: Protection Tools and Techniques." Network Security 2001, no. 12 (2001): 12–13. http://dx.doi.org/10.1016/s1353-4858(01)01219-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

McClure, Ben. "Security tools, specs offer more protection." Computers & Security 17, no. 3 (1998): 226–27. http://dx.doi.org/10.1016/s0167-4048(98)80332-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ogilvie, E. Wendy. "LOCAL GOVERNMENT TOOLS FOR RESOURCE PROTECTION." Proceedings of the Water Environment Federation 2004, no. 4 (2004): 296–310. http://dx.doi.org/10.2175/193864704790896603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schueler, Beth A., Stephen Balter, and Donald L. Miller. "Radiation Protection Tools in Interventional Radiology." Journal of the American College of Radiology 9, no. 11 (2012): 844–45. http://dx.doi.org/10.1016/j.jacr.2012.08.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zomignani Barboza, Júlia, and Paul De Hert. "Data Protection Impact Assessment: A Protection Tool for Migrants Using ICT Solutions." Social Sciences 10, no. 12 (2021): 466. http://dx.doi.org/10.3390/socsci10120466.

Full text
Abstract:
Smart devices have become ubiquitous in everyday life, and it is commonplace that migrants are among the users of connected tools. With the realization that migrants rely on connectivity for multiple purposes, including to access information and services, many initiatives started working on developing ICT tools to assist migrants to integrate into their new society. Technological tools, however, come with inherent risks, many of which are linked to the processing of personal data of their users. This is especially true for migrants, who are often vulnerable due to their migration status, which
APA, Harvard, Vancouver, ISO, and other styles
10

Fedele, Giorgia, Federica Bove, Elisa González-Domínguez, and Vittorio Rossi. "Modelling Biocontrol Agents as Plant Protection Tools." Biology and Life Sciences Forum 4, no. 1 (2020): 75. http://dx.doi.org/10.3390/iecps2020-08631.

Full text
Abstract:
In recent years, researchers have increasingly explored sustainable tools for plant protection against pathogens, including the use of biological control agents (BCAs), which have the potential to complement or replace chemical fungicides. However, global reliance on their use remains relatively insignificant and the factors influencing their efficacy remain unclear. The complex interactions among a target pathogen, a host plant, and the BCA population in a changing environment can be studied by process-based, weather-driven mathematical models, able to interpret the combined effects on BCA ef
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Protection tools"

1

Viking, Pontus. "Comparison of Dynamic Buffer Overflow Protection Tools." Thesis, Linköping University, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-6008.

Full text
Abstract:
<p>As intrusion attacks on systems become more and more complex, the tools trying to stop these attacks must follow. This thesis has developed a testbed to test and evaluated three freely available protection tools for the GNU/Linux platform to see how they fare against attacks.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Sheng, Ming. "Sizing Stream Setback Using GIS Tools for Stream Protection." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345049852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ristanovic, Dragan. "New methodology for transmission line relay testing and evaluation using advanced tools." Texas A&M University, 2003. http://hdl.handle.net/1969.1/355.

Full text
Abstract:
Protective relays are important parts of the power system. The protection guards valuable equipment, and protective relays play a vital role in performing the task. The relay detects fault conditions within an assigned area, opens and closes output contacts to cause the operation of other devices under its control. The relay acts to operate the appropriate circuit breakers to prevent damage to personnel and property. To ensure consistent reliability and proper operation, protective relay equipment must be evaluated and tested. The importance of the relay evaluation issue is linked to capabili
APA, Harvard, Vancouver, ISO, and other styles
4

Mauwa, Hope. "Information security awareness: generic content, tools and techniques." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/560.

Full text
Abstract:
In today’s computing environment, awareness programmes play a much more important role in organizations’ complete information security programmes. Information security awareness programmes are there to change behaviour or reinforce good security practices, and provide a baseline of security knowledge for all information users. Security awareness is a learning process, which changes individual and organizational attitudes and perceptions so that the importance of security and the adverse consequences of its failure are realized. Therefore, with proper awareness, employees become the most effect
APA, Harvard, Vancouver, ISO, and other styles
5

Ismaïl, Mohamed Amine. "Study and optimization of data protection, bandwidth usage and simulation tools for wireless networks." Nice, 2010. http://www.theses.fr/2010NICE4074.

Full text
Abstract:
La conception de systèmes de communication sans fil supportant les services émergents suscite de plus en plus d'intérêt et ne cesse de poser des problèmes et des défis techniques à la communauté scientifique. Dans cette thèse, nous avons adressé trois de ces problèmes. La première contribution porte sur la fiabilisation des liaisons sans fil et en particulier sur la protection des données contre les évanouissements de longue durée dans le cadre d'un lien "satellite vers mobile". Nous avons proposé un algorithme innovant, appelé Codage Multi-rafale Glissant (CMRG), qui étend la protection “intr
APA, Harvard, Vancouver, ISO, and other styles
6

Rickard, Darcel. "Community Based Coastal Monitoring: Developing Tools For Sustainable Management." The University of Waikato, 2008. http://hdl.handle.net/10289/2247.

Full text
Abstract:
Burgeoning coastal development, recreational use, and the future affects of climate change are placing increasing strain on regulators to manage risk associated with coastal hazards. Low-lying coastal communities in particular are vulnerable to a range of natural hazards including coastal erosion, storm surge inundation, tsunami and water safety that come with varying levels of risk to life and property. New Zealand's coastal hazard monitoring network is patchy and resources are limited. As a consequence there is considerable potential for coastal communities are going to need to take a more
APA, Harvard, Vancouver, ISO, and other styles
7

Gjeci, Alessia <1997&gt. "THE TOOLS FOR THE FIGHT AGAINST COUNTERFEITING AND THE PROTECTION OF PATENTS IN CHINA. THE COMPROMEC-YIAO CASE STUDY." Master's Degree Thesis, Università Ca' Foscari Venezia, 2022. http://hdl.handle.net/10579/21019.

Full text
Abstract:
During the 21st century, China abandoned its marginal position within the world scenario, transforming its role from a secondary country into a leading country, to the point that it has undoubtedly become the largest economic power in the world. Furthermore, the high growth rates recorded by China in the new millennium indicate that the economic miracle continues even now and does not seem to stop. However, if on the one hand this economic miracle has elevated the country raising it to the level of Western powers up to surpassing them, on the other hand it hides dark sides that can lead to hig
APA, Harvard, Vancouver, ISO, and other styles
8

Tritilanunt, Suratose. "Protocol engineering for protection against denial-of-service attacks." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/26277/1/Suratose_Tritilanunt_Thesis.pdf.

Full text
Abstract:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentic
APA, Harvard, Vancouver, ISO, and other styles
9

Tritilanunt, Suratose. "Protocol engineering for protection against denial-of-service attacks." Queensland University of Technology, 2009. http://eprints.qut.edu.au/26277/.

Full text
Abstract:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentic
APA, Harvard, Vancouver, ISO, and other styles
10

Sinkevych, Andrii. "Comparative Analysis of the Activities of the HELCOM and the Black Sea Commissions as Tools in Regional Environmental Cooperation." Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-239161.

Full text
Abstract:
Regional cooperation around inland seas plays an important role in environmental protection as it can involve all countries from the catchment area. Two regional organizations, HELCOM in the Baltic Sea and BSC in the Black Sea regions serve as intermediary for joint efforts and have the same tasks in protection of their respective seas. While HELCOM operates in a region recognized as a role model of regional cooperation, the BSC suffers from poorer intergovernmental relations. The task set was to analyze and compare the two commissions with each other so that similar and dissimilar features co
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Protection tools"

1

United States. Environmental Protection Agency. Office of Research and Development. ORD information tools. U.S. Environmental Protection Agency, Research and Development, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baldoni, Roberto, and Gregory Chockler. Collaborative financial infrastructure protection: Tools, abstractions, and middleware. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Congress. Office of Technology Assessment., ed. Environmental policy tools: A user's guide. Office of Technology Assessment, Congress of the U.S., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Environmental Protection Agency. Information Access Branch. Access EPA: Public information tools. Information Access Branch, Information Management and Services Division, U.S. Environmental Protection Agency, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cecchini, Simone. Towards universal social protection: Latin American pathways and policy tools. Edited by Rossel Odriozola Cecilia editor. Economic Commission for Latin America and the Caribbean (ECLAC), 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schankerman, Mark. Damages and injunctions in the protection of proprietary research tools. National Bureau of Economic Research, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

F, Zala Laszlo, and NASA Glenn Research Center, eds. Energy management control systems--tools for energy savings andenvironmental protection. National Aeronautics and Space Administration, Glenn Research Center, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jan, Kanclirz, and Baskin Brian, eds. Netcat power tools. Syngress Publishing, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

J, Baldwin, ed. Whole earth ecolog: The best of environmental tools & ideas. Harmony Books, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Grafkina, Marina. Labor protection. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1173489.

Full text
Abstract:
The textbook contains information on the legal, regulatory, organizational, and technical bases of labor protection; on the identification of dangerous and harmful factors; and on the impact of various negative factors on human health. Methods and means of protecting a person from the effects of harmful and dangerous industrial factors are disclosed. Meets the requirements of the federal state educational standards of secondary vocational education of the latest generation, approximate educational programs (in terms of the discipline "Labor Protection") in the specialties 15.02.15 "Technology
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Protection tools"

1

Webber, D. B. "Intellectual Property Protection for IT Developments — The Debate Continues." In Advanced IT Tools. Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34979-4_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stergiopoulos, George, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, and Dimitris Gritzalis. "Classification and Comparison of Critical Infrastructure Protection Tools." In Critical Infrastructure Protection X. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48737-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kaksonen, Rauli, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, and Juha Röning. "100 Popular Open-Source Infosec Tools." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bobzin, K., W. Michaeli, N. Bagcivan, P. Immich, F. Klaiber, and S. Theiß. "Chromium Based PVD Coatings for Injection Moulding Tools." In Friction, Wear and Wear Protection. Wiley-VCH Verlag GmbH & Co. KGaA, 2011. http://dx.doi.org/10.1002/9783527628513.ch97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tamò-Larrieux, Aurelia. "Technical Tools and Designs for Data Protection." In Law, Governance and Technology Series. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98624-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ishii, Shinji. "A new copyright protection scheme using the multiple RSA cryptosystems in personal cards for network shopping." In Advanced IT Tools. Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34979-4_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Laurenson, Thomas. "Performance Analysis of File Carving Tools." In Security and Privacy Protection in Information Processing Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Körber, Michael, Anatoli Kalysch, Werner Massonne, and Zinaida Benenson. "Usability of Antivirus Tools in a Threat Detection Scenario." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Erichsen, Augusto G., Anderson L. Sartor, Jeckson D. Souza, Monica M. Pereira, Stephan Wong, and Antonio C. S. Beck. "ISA-DTMR: Selective Protection in Configurable Heterogeneous Multicores." In Applied Reconfigurable Computing. Architectures, Tools, and Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78890-6_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khader, I., S. Fünfschilling, A. Kailer, and R. Oberacker. "The Behavior of Silicon Nitride Tools in Hot Rolling Copper Wire." In Friction, Wear and Wear Protection. Wiley-VCH Verlag GmbH & Co. KGaA, 2011. http://dx.doi.org/10.1002/9783527628513.ch48.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Protection tools"

1

Zhang, Daniel. "Event Analysis: Innovative Tools and Strategies for Protection Engineers." In 2025 78th Annual Conference for Protective Relay Engineers (CFPR). IEEE, 2025. https://doi.org/10.1109/cfpr67343.2025.11013652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Balážová, Kristýna, Štěpán Galle, Anna Kandlová, and Tomáš Bendl. "AI IN ENVIRONMENTAL EDUCATION: TOOLS, TRENDS, AND FUTURE DIRECTIONS." In Public recreation and landscape protection - with respect hand in hand… Mendel University in Brno, 2025. https://doi.org/10.11118/978-80-7701-025-2-0028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Palgutová, Silvia, Kristína Pramuková, Miriama Javorská, and Ľubomír Štrba. "ONLINE TOOLS FOR GEOHERITAGE INTERPRETATION BOTH IN FORMAL AND INFORMAL EDUCATION." In Public recreation and landscape protection - with respect hand in hand… Mendel University in Brno, 2025. https://doi.org/10.11118/978-80-7701-025-2-0197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mulder, Zachary, Steve Wagner, Jared Fleming, et al. "Safeguarding Pump Stations: Ensuring Adequate Cathodic Protection with Advanced Monitoring Tools." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00559.

Full text
Abstract:
In the water and wastewater industries, corrosion protection typically prioritizes water mains and related components, often overlooking critical infrastructure such as sewage pump stations. However, it is crucial to ensure that the carbon steel walls of pump station dry wells receive adequate cathodic protection (CP) and meet the minimum -850mV CP criterion. Acknowledging this need, the Ottawa County Sanitary Engineering Department proactively implemented impressed current CP systems across its pump stations, aiming for optimal performance and long-term asset protection. This paper demonstrat
APA, Harvard, Vancouver, ISO, and other styles
5

Stevens, Ken, and K. Daniel Efird. "Corrosion Protection for Bolting in Marine Environments." In CORROSION 2003. NACE International, 2003. https://doi.org/10.5006/c2003-03252.

Full text
Abstract:
Abstract The nut and bolt thread protector system is a patented, ultraviolet stabilized polyethylene thread protector which seals nut and bolt threads in pressurized grease to effectively prevent corrosion and provide protection against physical damage. Laboratory corrosion testing has shown no corrosion on bolting using this system in 90-day ASTM B 117 salt spray tests and in 60-day wet sour gas tests. The system has proven its effectiveness for the corrosion protection of bolting in many marine applications. The corrosion protection provided allows removing the nut from the bolt after long e
APA, Harvard, Vancouver, ISO, and other styles
6

Rakers, Nicole, Mary Lyn Lim, Michael McCarthy, James Begley, and Arif Mubarok. "Efficacy of Zinc Content in Sacrificial Protection of Coatings." In Coatings+ 2021. SSPC, 2021. https://doi.org/10.5006/s2021-00018.

Full text
Abstract:
Abstract Zinc rich coatings have long been used in the protective coatings industry as one of the primary means of steel substrate protection against corrosion. The primary protection mechanism has historically been galvanic sacrificial loss of zinc metal and the simultaneous formation of protective zinc oxides and salts. Various standards and customer specifications exist to ensure that the coating will provide the necessary corrosion protection for the life of the asset. As dictated by standards and specifications, a minimum of 65 wt. % and upwards of 80 wt. % zinc is often found in the indu
APA, Harvard, Vancouver, ISO, and other styles
7

Ellor, James A. "Electrostatic Modeling of Cathodic Protection Systems." In CORROSION 2006. NACE International, 2006. https://doi.org/10.5006/c2006-06108.

Full text
Abstract:
Abstract The following paper provides a method to estimate current distribution of cathodic protection systems using a simple electrostatic model in a common spreadsheet. The model is intended to allow for a rapid analysis of current distribution, polarization, and circuit resistance without having to resort to more complex BEM-type tools. The model is based on the representation of anodes and cathodes by simple charges.
APA, Harvard, Vancouver, ISO, and other styles
8

Yee, Geary G., and Michael R. Whitbeck. "A Microbiologically Influenced Corrosion Study in Fire Protection Systems." In CORROSION 2004. NACE International, 2004. https://doi.org/10.5006/c2004-04602.

Full text
Abstract:
Abstract Several analytical and microbiological tools were explored for use in detecting and diagnosing microbiologically influenced corrosion (MIC) in failed fire protection systems obtained from seven different sites. The tools used in this study included microbial community analysis, immunoassay analysis, ion chromatography, sulfide testing, and scanning electron microscopy. Since detecting and diagnosing MIC in failed systems is not a simple and definitive process, employment of a combination of different analyses increased the accuracy for a proper diagnosis.
APA, Harvard, Vancouver, ISO, and other styles
9

Whitmore, David W. "Impressed Current and Galvanic Discrete Anode Cathodic Protection for Corrosion Protection of Concrete Structures." In CORROSION 2002. NACE International, 2002. https://doi.org/10.5006/c2002-02263.

Full text
Abstract:
Abstract Chloride induced corrosion is recognized as a significant disease in the nation’s concrete infrastructure. Government agencies and private owners are forced to contend with the rising costs of maintaining their failing structures. In response to this need, a number of electrochemical techniques have been developed over the last two decades in order to provide some relief from the normal regime of ‘chip and patch’ repair, or whole-scale structure replacement. This paper will provide an overview of the various corrosion mitigation techniques available and then focus on two innovative me
APA, Harvard, Vancouver, ISO, and other styles
10

Buchbach, Sascha, Peter Plagemann, and Andreas W. Momber. "Effects on the Edge Corrosion Protection Capacity of Organic Coatings." In SSPC 2011. SSPC, 2011. https://doi.org/10.5006/s2011-00051.

Full text
Abstract:
Abstract The paper reports about the results of laboratory investigations on edges prepared with different tools and painted with different coating systems for applications in water ballast tanks. The laboratory test scenarios were already described in a presentation delivered at PACE 2010, and this paper is the second part of that presentation. The results of the first part of the study can be summarised as follows (1): -Edge preparation tool, edge geometry (radius) and paint system had all notable effects on the corrosion protection performance of the protective coating systems.-The assessme
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Protection tools"

1

Rosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schankerman, Mark, and Suzanne Scotchmer. Damages and Injunctions in the Protection of Proprietary Research Tools. National Bureau of Economic Research, 1999. http://dx.doi.org/10.3386/w7086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shchurenko, Anastasia. PATENT PROTECTION OF MODERN SMART TECHNOLOGIES. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3045.

Full text
Abstract:
FORMING THE BASIS OF A PATENT APPLICATION TO PROTECT THE TECHNOLOGY FOR PRODUCING SMART COMPOSITE CONFECTIONERY PRODUCTS AND HOMOGENIZED BEVERAGES. Using TRIZ and ARIZ analytical tools when preparing a provisional patent application to the US Patent Office. The specialization of the technical solution underlying the application is the production technology of composite confectionery products and smart combined food drinks (drinking emulsions) with a high degree of homogenization.
APA, Harvard, Vancouver, ISO, and other styles
4

Roth, Stephen. The Integration of Building Information Modeling with Fire Protection Systems, Software, and Workflows. SFPE Foundation, 2024. https://doi.org/10.64167/f99p-f0cf.

Full text
Abstract:
The objectives of this SFPE Foundation research project were to (1) investigate existing software tools and schemas, and the integration of these schemas into building information modeling (BIM) to fire engineering workflows; (2) Interview various stakeholders, including fire engineers, members of the SFPE Foundation, building owners, and BIM and analysis software vendors; (3) After careful analysis, select the best tools and workflows and incorporate them into a final user report. This research project focuses on three overriding themes in relation to fire protection engineering: software too
APA, Harvard, Vancouver, ISO, and other styles
5

Yam, Eileen, and Tracy McClair. Advancing Integrated Family Planning (FP)/HIV Counseling with Evidence (ADVICE): Review of FP decision support tools and HIV vulnerability assessment tools. Population Council, 2021. http://dx.doi.org/10.31899/sbsr2021.1012.

Full text
Abstract:
This review identified innovative approaches to broadening both the platforms through which FP decision support is offered (digital or otherwise), as well as the timing of lending that support (i.e., during pre-consultation time). In addition, by focusing on the HIV vulnerability domains that are particularly relevant to FP clients, developers of future FP decision support tools can incorporate questions and lines of inquiry that explore whether and how clients’ behaviors and characteristics may place them at increased risk of HIV acquisition and inform their contraceptive choices to optimize
APA, Harvard, Vancouver, ISO, and other styles
6

Wade, Colleen, Daniel Nilsson, Greg Baker, and Per Olsson. Fire Engineering Practitioner Tools: A Survey and Analysis of Needs. SFPE Foundation, 2021. https://doi.org/10.64167/a9sb-38ak.

Full text
Abstract:
This project was carried out for the Society of Fire Protection Engineers (SFPE) Research Foundation. The objectives of the project, in relation to fire engineering tools, were to understand the common tasks and workflow of practising fire engineers, identify the tools needed by them and the current gaps between the common practices and available practical tools. Given this knowledge, future work to fill these gaps and develop new tools can be proposed.
APA, Harvard, Vancouver, ISO, and other styles
7

Acharya, Malhar, Ritika Divekar, Behailu Getachew, Krittika Gorur, and Joel Mumo. Can comprehensive and context-specific tools capture working conditions of CDWs for better interventions? Busara, 2024. http://dx.doi.org/10.62372/qvei1463.

Full text
Abstract:
Enabling child protection by building comprehensive, context-specific tools to capture child domestic worker environments. Child domestic work can deprive children of their right to education, expose them to physical and emotional abuse, and stunt their physical and cognitive development. Moreover, engaging in domestic work at a young age can perpetuate a cycle of poverty, denying children the opportunity to break free from socioeconomic constraints and limiting their potential for a better future.
APA, Harvard, Vancouver, ISO, and other styles
8

Sett, Dominic, Florian Waldschmidt, Alvaro Rojas-Ferreira, et al. Climate and disaster risk analytics tool for adaptive social protection. United Nations University - Institute for Environment and Human Security, 2022. http://dx.doi.org/10.53324/wnsg2302.

Full text
Abstract:
Adaptive Social Protection (ASP) as discussed in this report is an approach to enhance the well-being of communities at risk. As an integrated approach, ASP builds on the interface of Disaster Risk Management (DRM), Climate Change Adaptation (CCA) and Social Protection (SP) to address interconnected risks by building resilience, thereby overcoming the shortcomings of traditionally sectoral approaches. The design of meaningful ASP measures needs to be informed by specific information on risk, risk drivers and impacts on communities at risk. In contrast, a limited understanding of risk and its d
APA, Harvard, Vancouver, ISO, and other styles
9

Marer, Ofir, Neili Carolina Bermudez Plaza, Alexandre Bagolle, and Luis Tejerina. Building Adaptative Social Protection Systems in Latin America and the Caribbean. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013253.

Full text
Abstract:
The Social Protection and Health (SPH) Division of the IDB hosted its annual Regional Policy Dialogue (RPD) on Adaptive Social Protection Systems from June 17th to 19th, 2024, in Lima, Peru. This event aimed to address the increasing vulnerability of households to natural disasters, economic disruptions, and health crises, many of which are exacerbated by climate change. With over 78 million people living in high-risk areas in Latin America and the Caribbean (LAC), the dialogue was crucial for fostering resilient social protection systems. The RPD brought together over 120 participants from 31
APA, Harvard, Vancouver, ISO, and other styles
10

Roth, Stephen. The Integration of Building Information Modeling with Fire Protection Systems, Software, and Workflows: A User Guide. SFPE Foundation, 2024. https://doi.org/10.64167/zt9s-1rs2.

Full text
Abstract:
In the field of fire engineering, Building Information Modeling (BIM) integration has emerged as a way for fire engineers (FEs) to design and implement fire safety measures in buildings. As buildings and infrastructure become more complex and the demand for efficient fire safety solutions grows, the synergy between BIM and fire engineering software becomes more important. The integration of BIM and fire engineering enables comprehensive 3D modeling of building elements and systems to design robust fire protection systems and serve as a data repository for software tools that identify potential
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!