Search results for "Security"
showing 10 items of 1693 documents
Valsts ekonomiskās drošības indikatoru prognozēšanas matemātiskais modelis
2006
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study
2022
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…
Machine-learned models for the performance of six different solar PV technologies under the tropical environment
2020
Due to the recent environmental concerns and long-term challenges in energy security, the Global energy scenarios are shifting more towards sustainable and renewable energy resources. Brunei has planned to increase the use of cleaner energy technologies by contributing 10 percent or 954 GWh of renewable energy in its power generation mix by 2035. Out of the available renewable options, solar is the most promising one for Brunei, for example, the daily average solar installation is around 5kWh per day [1]. Though solar energy is an abundant resource, for optimally designing and successfully managing solar power projects, its availability in different time scales are to be analyzed and unders…
Modelling, simulation and characterization of a supercapacitor
2020
In the last decade, the issue of air pollution or the reduction of CO2 emissions has become of extreme interest both for civil society and then for the industrial and scientific research world. For this reason, the scientific research on automotive is called to answer with increasingly innovative solutions. One of the principal subjects are the storage and the utilization of the electric energy for electrical and hybrid vehicles. Nowadays, supercapacitors are getting more and more attention because of their characteristics that allow them to be a bridge between electrolytic capacitors and batteries in several application such as bust-mode energy delivery, regenerative breaks and so on. The …
"Table 3" of "Lowest Q**2 measurement of the gamma* p --> delta reaction: Probing the pionic contribution."
2006
Measured value of SIG(C=LT) as a function of the pion angle relative to thevirtual photon direction.
"Table 2" of "Lowest Q**2 measurement of the gamma* p --> delta reaction: Probing the pionic contribution."
2006
Measured value of SIG(C=TT) as a function of the pion angle relative to thevirtual photon direction.
Early detection of contamination and defect in foodstuffs by electronic nose: A review
2017
Abstract Electronic nose (e-nose) has emerged as a potential instrument in various areas of food safety assessment for rapid early detection of contamination and defect in food production chain. E-nose is an innovative measurement system designed for detecting and discriminating complex odors through mimicking the working mechanism and the principal building blocks of the mammalian olfactory system. This paper describes a literature update of the applications of the e-nose for ensuring health and safety in the food industry. Finally, its future trend, perspectives and challenging problem are also mentioned.
Disaster Prevention Integrated into Commonly Used Web Rendered Systems with GIS Capabilities
2014
The end of the 20th century brought a remarkable increase in the field of positioning techniques and communications, making them visible and available to the public, which led to an unprecedented interconnectivity. At the same time, disasters are part of our life. Regardless of their nature, measures can be taken, in order to prevent and mitigate their effects, by anticipative preparation or by avoiding the calamity area (if possible). To this end, this paper presents an integrated system, composed of a software component, a hardware component, and a decision-making human element, all having the declared role of diminishing or eliminating human and material losses.
Publish-subscribe smartphone sensing platform for the acute phase of a disaster: A framework for emergency management support
2014
The advanced sensors embedded in modern smartphones opens up for novel research opportunities, as for instance manifested in the field of mobile phone sensing. Most notable is perhaps research activities within human activity recognition and context-aware applications. Along a similar vein, the SmartRescue project targets monitoring of both hazard developments as well as tracking of people in a disaster, taking advantage of smartphone sensing, processing and communication capabilities. The goal is to help crisis managers and the public in early hazard detection, hazard prediction, and in the forming of risk minimizing evacuation plans when disaster strikes. In this paper we propose a novel …
How communities' perceptions of disasters influence disaster response: managing landslides on Mount Elgon, Uganda
2014
The aim of this paper is to assess the role of people's perception in disaster management. It is based on a study carried out along the slopes of Mount Elgon in Eastern Uganda. People living in the study area have experienced a number of landslides, but the landslide in 2010 had the most far-reaching effects on community livelihoods and resulted in a major setback to development efforts in the area. Experiences of landslides have enabled the local people to develop a number of interpretations of the causes and effects of the phenomena. The study revealed that community members did not share uniform perceptions. Whereas some members advanced technical or physical explanations for the 2010 di…