Gotowa bibliografia na temat „Remote data integrity checking”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Remote data integrity checking”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Remote data integrity checking"

1

Mohamed Sheriff S, R. "Integrating RSA Encryption in Remote Data Integrity Checking." International Journal of Science and Research (IJSR) 13, no. 4 (2024): 800–804. http://dx.doi.org/10.21275/mr24405171146.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

A., Nagesh, and Qurratul Ain Javeria. "Remote Data Integrity Check." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 661–64. https://doi.org/10.35940/ijeat.E9780.069520.

Pełny tekst źródła
Streszczenie:
In Cloud Storage Server, data integrity plays an important role, given cloud clients might not be aware whether the data is safe or has been tampered with. This system introduces identity-based signature algorithms to protect data that belongs to the data owner and gets the status of cloud data by means of verification through signatures. Since it is practically not possible for the data owner to be available online all the time for checking cloud data integrity, Third party auditor is tasked with verifying the data integrity every time instead of data owner. The Third party auditors should no
Style APA, Harvard, Vancouver, ISO itp.
3

B P,Sadhana, Sunil. "Remote Data Integrity Checking in Cloud Storage." International Journal of Advances in Scientific Research and Engineering 4, no. 7 (2018): 40–43. http://dx.doi.org/10.31695/ijasre.2018.32789.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Fan, X., G. Yang, Y. Mu, and Y. Yu. "On Indistinguishability in Remote Data Integrity Checking." Computer Journal 58, no. 4 (2013): 823–30. http://dx.doi.org/10.1093/comjnl/bxt137.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chen, Bo, and Reza Curtmola. "Remote data integrity checking with server-side repair1." Journal of Computer Security 25, no. 6 (2017): 537–84. http://dx.doi.org/10.3233/jcs-16868.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kulkarni, Neha Narayan, and Shitalkumar A. Jain. "Checking integrity of data and recovery in the cloud environment." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 2 (2019): 626–33. https://doi.org/10.11591/ijeecs.v13.i2.pp626-633.

Pełny tekst źródła
Streszczenie:
Cloud computing provides many services to access them dynamically over the internet as per the user's demand. The data is growing in tremendous amount and it should be managed correctly where storage service proves efficient. The Data stored online can be hacked by the third party so to secure this data verifying integrity is essential. Because of the human error or natural disaster, the data may get deleted from the cloud servers. Therefore, there is a requirement of improving the existing algorithm to recover data efficiently. Many algorithms are proposed, but they lack in efficiency, co
Style APA, Harvard, Vancouver, ISO itp.
7

N. Saranya, N. Saranya, and Dr V. Thiagarasu Dr.V.Thiagarasu. "A Quasigroup Encryption Based Remote Data Integrity Checking Protocol for Secured Online Storage Services." International Journal of Scientific Research 2, no. 2 (2012): 55–57. http://dx.doi.org/10.15373/22778179/feb2013/22.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Wu, Tong, Guomin Yang, Yi Mu, Rongmao Chen, and Shengmin Xu. "Privacy-enhanced remote data integrity checking with updatable timestamp." Information Sciences 527 (July 2020): 210–26. http://dx.doi.org/10.1016/j.ins.2020.03.057.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ushamani, G. D* Dr Y.C Kiran. "SECURE AND EFFICIENT DATA INTEGRITY PROOF AND RECOVERING DATA FOR IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING IN CLOUD COMPUTING (IB-PODUC)." Global Journal of Engineering Science and Research Management 4, no. 5 (2017): 51–57. https://doi.org/10.5281/zenodo.573506.

Pełny tekst źródła
Streszczenie:
More customers might need to store their data to PCS (open cloud servers) alongside the fast change of distributed computing. New security issues must be explained with a specific end goal to help more customers process their data in people in general cloud. Right when the customers is constrained to get to PCS, he will appoint its intermediary too handle his data and exchange them. On the other hand, remote data coordinating checking is additionally an imperative security issue in broad daylight distributed storage. It makes the customers check whether their outsourced data is kept set up wit
Style APA, Harvard, Vancouver, ISO itp.
10

B.V.Satya Vara Prasad, B., Ch Hari Kishan, S. P. Praveen, and Ch Mani Teja. "Identity-Based Data integrity checking in public cloud with bilinear pairings." International Journal of Engineering & Technology 7, no. 2.7 (2018): 209. http://dx.doi.org/10.14419/ijet.v7i2.7.10294.

Pełny tekst źródła
Streszczenie:
A consistently expanding number of clients should need to stock their information in servers that are public close by the quick headway of cloud computing. Novel security issues must be grasped remembering the true objective to empower more number of customers to process their information in broad daylight. Exactly when the user is confined to get to PCS, then they will assign its intermediary to process their information and transfer them. However remote information trustworthiness inspection is in like manner a basic security issue in broad daylight distributed storing. This impacts the clie
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Remote data integrity checking"

1

Mandadi, Harsha. "Remote Integrity Checking using Multiple PUF based Component Identifiers." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78200.

Pełny tekst źródła
Streszczenie:
Modern Printed Circuit Boards (PCB) contain sophisticated and valuable electronic components, and this makes them a prime target for counterfeiting. In this thesis, we consider a method to test if a PCB is genuine. One high-level solution is to use a secret identifier of the board, together with a cryptographic authentication protocol. We describe a mechanism that authenticates all major components of PCB as part of attesting the PCB. Our authentication protocol constructs the fingerprint of PCB by extracting hardware fingerprint from the components on PCB and cryptographically combining the f
Style APA, Harvard, Vancouver, ISO itp.
2

Clarke, Dwaine E. (Dwaine Errol) 1976. "Towards constant bandwidth overhead integrity checking of untrusted data." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33936.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.<br>Includes bibliographical references (leaves 137-140).<br>We present a trace-hash scheme and an adaptive tree-trace scheme to improve the performance of checking the integrity of arbitrarily-large untrusted data, when using only a small fixed-sized trusted state. Currently, hash trees are used to check the data. In many systems that use hash trees, programs perform many data operations before performing a critical operation that exports a result outside of the program's executio
Style APA, Harvard, Vancouver, ISO itp.
3

Wonjiga, Amir Teshome. "User-centric security monitoring in cloud environments." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S080.

Pełny tekst źródła
Streszczenie:
Les fournisseurs de services reconnaissent le problème de confiance et fournissent une garantie par le biais d'un contrat appelé Service Level Agreement (SLA). Presque tous les SLAs existants ne traitent que des fonctionnalités du nuage informatique et ne garantissent donc pas l'aspect sécurité des services hébergés pour les locataires. Comme le nuage informatique continue d'être de plus en plus intégré, il est nécessaire d'avoir des services de supervision de la sécurité propres a l'utilisateur, qui sont fondés sur les exigences des locataires. Cet aspect de supervision de la sécurité du syst
Style APA, Harvard, Vancouver, ISO itp.
4

Jenkins, William George. "Real-time vehicle performance monitoring with data integrity." Master's thesis, Mississippi State : Mississippi State University, 2006. http://sun.library.msstate.edu/ETD-db/ETD-browse/browse.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Young, Steven D. "On The Development Of In-Flight Autonomous Integrity Monitoring Of Stored Geo-Spatial Data Using Forward-Looking Remote Sensing Technology." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1113854420.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Hung, Shih-Cheng, and 洪士城. "An Intelligent Data Integrity Checking Mechanism for Developing E-Commerce Agents." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/70409966670613927500.

Pełny tekst źródła
Streszczenie:
碩士<br>國立暨南國際大學<br>資訊管理學系<br>90<br>As the Internet and World Wide Web become popular, the network has apparently been an important part of our daily lives. Network users can get various information without being limitedly time and space. The enrichment and variety of information in computer networks has brought the critical problem of applying the information from the ”the derivation of information” to “the search of proper information.” The characteristics of Intelligent agent, including communication, cooperation, negotiation, and conflict resolution, can help network users get useful informa
Style APA, Harvard, Vancouver, ISO itp.
7

Chen, Jia-Ling, and 陳佳伶. "A Mechanism for Data Integrity Checking with Selective Capability and Its Application to Auditing Securities Transaction Databases." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/96568550818222764090.

Pełny tekst źródła
Streszczenie:
碩士<br>長庚大學<br>資訊管理研究所<br>95<br>In certain environments for e-commerce, large transactional data are accumulated and stored into databases. This type of database has structural relationship among different data, such as time order of transactions. Therefore, it is necessary for checking both integrity of data content and structural relationship. Taking into consideration of efficiency, this thesis proposes a method for this purpose. This paper studies certain structural features existing in this type of database, considers the need of integrity checking on a selective base, and thereby proposes
Style APA, Harvard, Vancouver, ISO itp.
8

Lopes, José Pedro Silva. "Ontology-driven metamodeling towards hypervisor design automation: runtime security and data integrity." Master's thesis, 2017. http://hdl.handle.net/1822/59264.

Pełny tekst źródła
Streszczenie:
Dissertação de mestrado em Engenharia Eletrónica Industrial e Computadores<br>One of the most popular cyber-attack vectors to compromise computer systems is related to memory corruption. Memory corruption is one of the most prevalent and devastating vulnerabilities. The widespread adoption of virtualization technology in embedded systems generally and naively accepts Virtual Machine Manager (VMM) or hypervisor software as the Trusted Computing Base (TCB). As a software component, vulnerabilities can still be present, allowing attackers to subvert it alike Operating Systems (OSs). Virtuali
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Remote data integrity checking"

1

Devmane, Vidyullata Sawant. Integrity Checking Techniques to Secure Data in Cloud. Blurb, 2021.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Remote data integrity checking"

1

Wang, Huaqun, and Jiguo Li. "Private Certificate-Based Remote Data Integrity Checking in Public Clouds." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21398-9_45.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Zhang, Yongchun, Yingpeng Sang, Zhicheng Xi, and Hanrui Zhong. "Lattice Based Multi-replica Remote Data Integrity Checking for Data Storage on Cloud." In Parallel Architectures, Algorithms and Programming. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2767-8_39.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ashok Reddy, P., K. Nagaraju, K. Kalyani, M. Lakshmipathi, and V. Lakshmi Prasanna. "Identity-Based Remote Data Integrity Checking Using Lattice Approach by Third-Party Auditor." In Advances in Intelligent Systems and Computing. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7330-6_38.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Pragathy, V. Y., and L. Yamuna Devi. "Enhanced Dynamic Remote Data Possession Checking Protocol with Unlimited Number of Verifications and Public Verifiability for Ensuring Cloud Data Integrity." In Advances in Data-Driven Computing and Intelligent Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9531-8_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Zeng, Ke. "Publicly Verifiable Remote Data Integrity." In Information and Communications Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Feng, Yiteng, Yi Mu, Guomin Yang, and Joseph K. Liu. "A New Public Remote Integrity Checking Scheme with User Privacy." In Information Security and Privacy. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19962-7_22.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Zhou, Rui, Zhu Ai, Jun Hu, et al. "Data Integrity Checking for iSCSI with Dm-verity." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-7262-5_79.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Yang, Changsong, Xiaoling Tao, Sufang Wang, and Feng Zhao. "Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage." In Wireless Algorithms, Systems, and Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59016-1_51.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Liu, Hongyu, Leiting Chen, and Liyao Zeng. "Cloud Data Integrity Checking with Deduplication for Confidential Data Storage." In Cyberspace Safety and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69471-9_34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Yang, Jun, and Shujuan Li. "Searchable Public Key Encryption Scheme with Data Integrity Checking." In Advances on Broad-Band Wireless Computing, Communication and Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49106-6_34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Remote data integrity checking"

1

Sunkireddy, Sravanthi, and Ayad Barsoum. "Remote Data Integrity for Cloud Based Storage System." In SSPC 2016 Greencoat. SSPC, 2016. https://doi.org/10.5006/s2016-00068.

Pełny tekst źródła
Streszczenie:
Abstract Cloud computing provides a reliable and robust infrastructure for users to remotely store and access huge amount of data. However, data integrity in the cloud is a major security concern for data owners no longer physically possess their sensitive data. To mitigate this challenge, remote data integrity has been proposed as a mechanism to enable data owners to verify the correctness of their outsourced data. The remote verification process needs to be done with reduced communication, computation and storage overhead. That is why traditional cryptographic primitives for data integrity b
Style APA, Harvard, Vancouver, ISO itp.
2

Chowdary, N. Sampreeth, Shashank Kadiyala, V. Esther Jyothi, P. Srinandan, S. Phani Praveen, and P. Bhanu Prakash. "Identity and Proxy Orientation Based Remote Data Integration Checking and Uploading in Public Clouds." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11064101.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Floria, Robert, and Alfonso Garcia. "Aggregating and Standardizing Disjointed Integrity Management Data." In CONFERENCE 2022. AMPP, 2022. https://doi.org/10.5006/c2022-17646.

Pełny tekst źródła
Streszczenie:
Abstract Data management is a critical component of an integrity management plan. Current products and services in the integrity management sector can generate an enormous amount of uncontrolled and disjointed data, housed on multiple platforms. This text examines methods of mapping and linking multiple data sources to achieve optimal data usefulness, while reducing redundant data, through use of spatial and relational techniques. By defining relationships between fixed points, linear values can be generated from calibrated routes. Developing methods to introduce new data, standardized from sp
Style APA, Harvard, Vancouver, ISO itp.
4

Held, Craig. "Implementing Remote Wireless Monitoring of Pipeline Integrity and Cathodic Protection." In CORROSION 2010. NACE International, 2010. https://doi.org/10.5006/c2010-10028.

Pełny tekst źródła
Streszczenie:
Abstract Energy and pipeline companies are wrestling to meet new, more strict, state and federal pipeline integrity requirements while trying to control operating costs. Unfortunate pipeline news events made corrosion and cathodic protection front page news. This elevated concerns to the extent that the U.S. Congress and several states are now working on legislation directed specifically toward cathodic protection practices. In addition, the U.S. Department of Transportation has shown new interest in regulating compliance, making adherence even more important in today’s world. Many companies a
Style APA, Harvard, Vancouver, ISO itp.
5

da Costa, Tony, and Matt Barrett. "Improving Cathodic Protection Monitoring Data in the Time of IIoT and Big Data." In CORROSION 2021. AMPP, 2021. https://doi.org/10.5006/c2021-16259.

Pełny tekst źródła
Streszczenie:
ABSTRACT This paper explores the advances in remote monitoring technology and the enhancements that can be made to ensure that pipeline integrity is maximized while operational efficiencies are optimized. Specifically focusing on the data that is generated by cathodic protection and pipeline integrity monitoring devices (e.g. rectifier monitoring), this paper explores how data analytics techniques, such as artificial intelligence and machine learning algorithms, can shine a light on historically ‘dark’ data, improving pipeline integrity operations and the safety of workers and the broader publ
Style APA, Harvard, Vancouver, ISO itp.
6

Sharma, Prafull, Freddie Talbot, and Phil Yule. "Corrosion Under Insulation (CUI) Remote Monitoring - Case Study and Experiences from Saudi Arabia." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00282.

Pełny tekst źródła
Streszczenie:
This paper explores the effective management of CUI risk through the deployment and assessment of remote monitoring technology in Saudi Arabia. It highlights Corrosion Under Insulation (CUI), a concealed danger that can jeopardize asset integrity, especially in the region's harsh climatic conditions. By utilizing remote monitoring, a predictive strategy is developed—one that improves safety and optimizes costs. Envision using digital data and predictive tools to address hard-to-detect corrosion like CUI. The approach described combines this data to enable asset owners to prioritize inspections
Style APA, Harvard, Vancouver, ISO itp.
7

Hill, D., S. Marion, F. Ayello, L. Cunci, and N. Sridhar. "Use of Sensor Systems for Remote Monitoring of Corrosion and Structural Health: Case Studies." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09457.

Pełny tekst źródła
Streszczenie:
Abstract Corrosion-related failures are usually a surprise; perhaps they could have been avoided if a real-time monitoring tool was in place. However, collection of data in remote places is a necessary function of a successful corrosion sensor network. For example, pipelines running through mountainous and forested regions in the wilderness of Alaska are just as susceptible to corrosion and integrity threats as those running parallel to subway tunnels in New York City, though accessibility may be easier in New York. Corrosion of materials is perhaps the biggest threat to the integrity of compl
Style APA, Harvard, Vancouver, ISO itp.
8

Stubelj, Ivan Ruiz, Heitor Ruschmann, Kjell Wold, and Jan Olaf Gomnaes. "Pipeline Predictive Analitics Trough On-Line Remote Corrosion Monitoring." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-12899.

Pełny tekst źródła
Streszczenie:
Abstract Pipelines are vast and complex networks, delivering fossil fuel from remote locations to gas processing facilities, refineries, petrochemical manufacturers, and refined products, and all the way to end users. Pipeline operators rely on Pipeline Integrity Management (PIM) frameworks and Asset Performance Management (APM) systems to conduct safe and reliable hydrocarbon transportation operations, cope with local regulations, maximize transportation capacity. and identify integrity threats. Internal and external corrosion are leading causes of incidents in pipelines that can lead to spil
Style APA, Harvard, Vancouver, ISO itp.
9

Jenkins, Walt. "A Database and Query System for Refinery Vessels." In CORROSION 1994. NACE International, 1994. https://doi.org/10.5006/c1994-94524.

Pełny tekst źródła
Streszczenie:
Abstract Maintaining pressure vessel integrity has always required accurate and complete record keeping. The presence of OSHA 1910, however, requires record keeping that is even more accurate and--more importantly--accessible on demand. All chemical process industries, and especially refineries, are challenged to find better ways to document the inspection and maintenance work they perform. This paper discusses a software program that provides a comprehensive, user-friendly approach to this problem. It provides: A Data Entry and Recovery System for all sections of every pressure vessel in a re
Style APA, Harvard, Vancouver, ISO itp.
10

Juzga, Giovanni A., and William L. Garcia. "SIGCO (Corrosion Management Information System): Platform for Managing Corrosion Processes and Integrity in Oilfield Facilities." In LatinCORR 2023. AMPP, 2023. https://doi.org/10.5006/lac23-20553.

Pełny tekst źródła
Streszczenie:
Extended Abstract SIGCO is an informatic platform developed for the administration and management of internal and external corrosion processes in metallic vessels and pipelines. The software has two interfaces: A Desktop application where operational information and data gathered during routines of fluid characterization, corrosion monitoring and chemical injection can be uploaded. For convenience, and additional web interface, which allows the remote generation and visualization of reports (generates maps and diagrams with critical zones by Corrosion-Scale), has been developed. SIGCO has been
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Remote data integrity checking"

1

Derby, Martin, and Mark Saunders. PR635-203904-R01 In-situ Instrumentation and Remote Sensing Methods for Slope Monitoring for Pipelines. Pipeline Research Council International, Inc. (PRCI), 2022. http://dx.doi.org/10.55274/r0012207.

Pełny tekst źródła
Streszczenie:
This research project will focus on a comparison of several in-situ methods and two remote sensing technologies, GBInSAR and InSAR. Geo-monuments and extensometers were used to measure the changes in surface movements (i.e., tension cracks) over time, and then compared to GBInSAR data for accuracy. This research project includes a comparison of spatial and in-situ monitoring systems that was performed on a steep slope with natural gas pipeline located in the Appalachian region of the United States. This report includes an integrated approach to characterize landside movement using the GBInSAR,
Style APA, Harvard, Vancouver, ISO itp.
2

Yoel, David, Tina Sicilia, Matthew Bogaart, and Jeremy Fernandes. PR-417-203902-R01 Remote Sensing and Leak Detection Platform That Can Deploy Multiple Sensor Types. Pipeline Research Council International, Inc. (PRCI), 2024. http://dx.doi.org/10.55274/r0000052.

Pełny tekst źródła
Streszczenie:
The PRCI Project #417-203902 - ROW 3-1-A Final Report is attached for Member review and comment. The report includes a summary of all work completed in all Tasks which include: - Catalog, taxonomy, and sample data set for the threats detected. - Benchmarks of the sensitivity, accuracy, reliability, and robustness of an automated multi sensor, multi-threat detection and near real-time reporting comparing performance on conventional aircraft and UAS. - Technical synopsis for operators on integrating automated near real-time aerial threat reports into pipeline performance and safety improvement p
Style APA, Harvard, Vancouver, ISO itp.
3

Perez-Vincent, Santiago M., Verónica Abril, Cynthia Chen, Teniola Tayo, and Andres Urrego Jimenez. Crime Underreporting in Latin America and the Caribbean. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013215.

Pełny tekst źródła
Streszczenie:
Crime underreporting poses a significant challenge for governments and law enforcement agencies. This study examines the extent, characteristics, and drivers of crime underreporting and provides evidence-based policy recommendations to address it. Using information from victimization surveys from 10 Latin American and Caribbean countries, the analysis reveals widespread crime underreporting, with an average of approximately three out of four crimes not reported in the countries examined. Low and heterogenous reporting rates point to potential biases in official crime statistics, with certain c
Style APA, Harvard, Vancouver, ISO itp.
4

Galili, Naftali, Roger P. Rohrbach, Itzhak Shmulevich, Yoram Fuchs, and Giora Zauberman. Non-Destructive Quality Sensing of High-Value Agricultural Commodities Through Response Analysis. United States Department of Agriculture, 1994. http://dx.doi.org/10.32747/1994.7570549.bard.

Pełny tekst źródła
Streszczenie:
The objectives of this project were to develop nondestructive methods for detection of internal properties and firmness of fruits and vegetables. One method was based on a soft piezoelectric film transducer developed in the Technion, for analysis of fruit response to low-energy excitation. The second method was a dot-matrix piezoelectric transducer of North Carolina State University, developed for contact-pressure analysis of fruit during impact. Two research teams, one in Israel and the other in North Carolina, coordinated their research effort according to the specific objectives of the proj
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!