Furthermore, cavitated CSR nanoparticles allow for the creation of a shear band and the increase in the shear band zone, therefore, preventing the increase in the fragility of the material.
Digital certificates, on the other hand, can be considered the core of a PKI because they are used to create a linkage between the public key and the subject of a given certificate.
One must admit, though, that the lack of proper corporate ethics and the inability of the organization to establish control over the production process are not the only factors that triggered the disaster.
Considering that the organisation uses various sources of the remote access and communication between the offices, it is necessary to ensure the high-quality protection of employees' and Woltech's data.
First, the trainees had to fly in the second seat to get a feel for the flight, and then learn to drive the plane on the ground, much like a car.
The fire was not just a tragedy for the families of the victims. It was the beginning of a change in the safety and social policies for the working class.
The crew was able to land the plane without conventional control at the airport of Sioux City, but the right-wing of the airliner hit the runway, and the plane broken into several parts.
The entire process from extracting natural gas to delivering it to the market will be modified by the FLNG model, which makes FLNG a game-changer in the industry.
Therefore, it is paramount to be aware of risk factors and causes of fatigue among air traffic controllers, and use methods which would allow for mitigating these factors and causes.
The most valuable assessment tool to determine occupational hazards is surveying air traffic controllers who undergo the daily stress of the job.
This is necessary to reduce the complexity of the network and make the best use of automated processes and the creation of a responsive infrastructure.
The concept of a physical threat is usually described as an incident that can end up in the loss of sensitive data or serious damage to the company's information system.
Given the tight schedule of these participants, and the limited time that the researcher had to conduct the study, a small sample of 20 participants was selected. The researcher explained to them the relevance of [...]
Industrial hygiene can be described as the "science and art" dedicated to detecting, assessing, and managing those factors and stressors present in the workplace that can affect workers' health or well-being negatively or cause them [...]
Airline workers are habitually exposed to numerous hazards, the significance of which can vary from minor to immediately dangerous to life and health. It is worth remembering that eye PPE can limit the field of [...]
Concurrently, the team can order the required replacement parts; they can clean the parts of the system that have been taken out of it in the deconstruction process, and apply restorative techniques to the outer [...]
0 and define the number of features that make it a system at the confluence of technical and social innovation, it is necessary to summarize the data reported by previous researchers in the field.
In comparison to the uncertainties and challenges of the 19th and 20th centuries, the goals of the people who live today, in the 21st century, are rather clear and definite.
The structural dimension of an organization refers to concepts that point to the internal environment of the organization. Organizational culture refers to the dominant practices, such as the modes of communication and the hierarchy of [...]
The barcode reads at the cash register, while the data of inventory sales transmit the information to a wider system that calculates the statistics.
The literature review reveals that plenty of research studies on the topic of aviation training are directed at the provision of security and safety to both the crew and the passengers.
The concept of extreme programming is essential in an organization and can be applied in management through team work. Integration of programming teams within other aspects of the organizations is important in strengthening the coordination [...]
The camera scans the face and if the scan is registered in the database, then the door lock opens and the person can enter the dorm.
The Internet is an opportunity to save time, find the required information, and use global connections, as well a threat of being isolated, misunderstood, and mislead; therefore, such factors as fashion, the role of parents, [...]
It shows that criminals may use the same methods as police officers and also indicates that the storage of personal information in cyberspace is related to major safety risks.
From the consumer's point of view, any mobile application is good if it is of interest to the public and covers a large target audience.
Therefore, the proper functioning of the transformers is an essential part to maintain the performance of the power distribution system. Corrective maintenance is done when the transformer breaks down, preventive maintenance is the process of [...]
A wireless sensor network can be characterized as a self-designed framework of remote systems to screen physical or ecological conditions such as temperature, sound, vibration, weight, movement, or contaminations and to pass information through the [...]
Among the goals of hackers in attacks on the critical IoT of smart cities, there is the intentional organization of accidents or power outages, theft of personal information of users, interception of control of devices [...]
The effective operation of organizations in the aviation sector calls for the safety of employees. They are meant to uphold the safety of the employees both on the runway and in the aircraft.
The development of an adequate information system to improve risk assessment in the police department is important since almost all duties of law enforcement officers expose them to daily liability episodes. The development of an [...]
The organization has to have an eye for the presence of null bytes and the location of shellcode to counterattack the exploiters of this type of malicious attack.
In this paper, the researcher seeks to discuss the impact of technology on social and economic events in the twenty-first century.
The implementation process was scheduled to commence with the infrastructural development of the web-based system and upload all school data into the system.
In addition to the protection of the firms' network, the IT firms must maintain the physical security of the computers. Physical security is important since it helps to protect the privacy of the data stored [...]
However, the research on this topic is extensive and shows the impact of technology to be a positive one. Further research on this and other topics should be considered due to the widespread presence of [...]
At the end of the project, the cost implication for the Park Hyatt Sydney amounted to $89,140, which is inclusive of the direct costs of changes in the design, consultancy, and labor.
Second, preparedness and being alert on the possible attacks on the transport system is also a priority area of the transport sector.
Finally, a comparison of advantages and disadvantages of vision systems and inspection should help to clarify the benefits and the possible impact of this technology being implemented by one of the American firms on people, [...]
The paper will include a description of the event and provide recommendations for strengthening the security of the company's IT assets.
In his book A Whole New Mind, Daniel Pink focuses on a discussion of one of the major changes in the modern society that have occurred under the influence of such professes as industrialization and [...]
Also, having created a book dedicated just to the creation of presentations at school, the author pointed out the importance of this skill, as well as its complex nature and a variety of components that [...]
Richardson provides a number of ideas concerning the application of all of these resources for the purpose of creating the innovative and interactive teaching process and the kind of learning that is connected to the [...]
The purpose of this case study is to discuss the role of the US-CERT in disaster and recovery management, the importance of the ICS-CERT for addressing the Stuxnet problem, the role of alternate sites in [...]
The next type of measure should include standards for the appropriate use of computers and other electronic devices that provide access to protected information.
For instance, it is possible to recommend the implementation of the technology of GIS in Dubai with the purpose of facilitation of car parking in the city.
Although the technical part of the Blackboard program is designed to be helpful and comfortable for students, its conception might be somewhat misunderstood by the users due to the fact that the system is new [...]
Therefore, a citizen of the future in Dubai would be able to connect to a mobile or wi-fi signal from every device at any location to access information and services.
In the aircraft industry, productivity is not hard to measure due to the transparency of annual reports and a rather visible impact of the core variables on the success of the company.
In that way, for the higher educational institutions and their representatives to be able to communicate successfully with the students' many universities and colleges start to create their own campus websites with libraries and helpful [...]
The obligatory convergence from the entrance ramp to the correct path of the road is demonstrated by a 'virtual vehicle' remaining toward the end of the blending path.
Since both projects are supposed to be signed with the leaders of the institutions that are under the state regulation, it can be assumed that the provisions of the Model Construction Project Contract are applicable [...]
By and large, Google Chrome is designed with a powerful defense mechanism to ensure the security of users on the web.
Considering the volume of air traffic, airports, and operators in the US, the FAA has extensive rules and regulations. To a large extent, GCAA has followed the rules and regulations of the FAA on many [...]
The incompatibility of older software and the enhanced capabilities of the new operating system in some cases force users to upgrade to perform their job, meaning that they would not have a choice but receive [...]
This paper aims to discuss the distinct types of these systems, to describe the interrelations between them, and to provide positive and negative features.
It is crucial for the team to be provided with instrumental and technical resources to react to the threats effectively. It is advisable to measure the effectiveness of the team in handling the incidents.
This classification is grounded in a collection of rules that designate the relations between subjects and objects due to the fact that the former can obtain access to the latter.
The PKI is the totality of the elements necessary to apply the public key methods with the use of the hierarchical trust model.
The results suggest the lack of identity for the profession on the global scale due to the lack of consensus regarding the common descriptor, the scarcity of common standards, terminology, and bodies of knowledge, and [...]
The information revealed by the author is likely to be beneficial for those individuals who are occupied in various fields but provide cost management services in the framework of the global construction industry.
It is possible to observe that of the better policies, which are proposed in the research and which could be applied to the sphere of civil engineering, is the development and use of new tools [...]
The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
The amount of EMF generated, measured in watts per meter square, by cell phones is in the range of 0. Many of these materials such as lead, nickel, mercury, and the chemicals are toxic.
This subdivision contributes to the appearance of the debates related to the negotiation of the time barrier and moving in time from the past to the future and on the contrary, from the future to [...]
There are at least three major ways to redeem the value of video games in the context of the development of cutting-edge learning tools based on the same format that developers use to provide violent [...]
The success of this invention can be attributed to the development of broadband Internet services that are available in different parts and regions across the globe.
To determine the feasibility of the solution for the proposed experimentation, the researchers have reviewed the existing literature to find support for the intervention and justify its effective potential. Since engineering is a practical science, [...]
On the other hand, it is limited since a person willing to post information to its website or edit the already available information has to have access to a computer connected to the internet.
The components of JTA are budding and consist of interfaces, services areas, and standards that are compatible with the requirement of the DoD's architecture.
It is a scope of study that explores how individuals view and ponder about computer related technologies, and also investigates both the human restrictions and the features that advance usability of computer structures.
In the Defense Health IT System, the employees are able to access to programs, files, data from a database and documents elsewhere, while being in different location in the organization.
First, people had to use the tactics they utilized moving on the land, but the use of radio, radar, and, finally, satellites enabled people to improve navigation significantly.
This enhances the campus ecosystem which comprises of the student information system and mainly deals with the integration of departments as well as regulation of the flow of work within the respective departments.
Nevertheless, as the socio-cultural progress in this part of the world continued to gain a powerful momentum, the idea of using lenses to create optical devices began to appeal to more and more intellectually advanced [...]
Some experts also point out that it is more problematic to control learners within the e-learning model than in the framework of the traditional system.
Drones are an emerging sector of the aviation industry that has been received differently by the public primarily due to the possibility of misuse, infringement of privacy, and military use in combat.
Because internet and cyberspace are fast becoming a fundamental part of the society, all people should have knowledge about the dangers and damages of cyber tort.
The Turkish courts, which were the subject of his study, could adopt specific guidelines to enhance effectiveness and the ease of IT compliance audits.
The major asset of the present research is that the T-test will indicate the students' performance progression. The paired sample T-test is the core of the proposed quantitative research, which is designed to establish if [...]
The theory suggests that for the successful implementation of the project the limiting factors must be recognized early in the process.
In this regard, the iron triangle becomes not the only measure that could be used to evaluate the nature of a particular business, its outcomes, and success as new and significant criteria appear.
The further investigation likewise revealed that the attack was conducted by the so-called "outsider" an illegitimate user that accessed the system due to the flaws in the information security system.
Despite the overwhelming popularity of Apple's products and lifestyle that the company promotes, it is worth noticing that in 2015 the market share of Apple in the USA has fallen to its lowest point for [...]
The present paper describes the benefits of the technology and assesses the outcomes of the integration of in-house HR systems with Oracle, productivity changes, preservation of time, and mail administration under the new circumstances.
The project manager communicated with the leaders of the teams to ensure efficient collaboration between all the groups involved. The project manager expressed the willingness to meet the needs and wants of the community.
This fatal accident led to the death of all the passengers and members of the crew. The second framework that can be used to analyze the role of human factors in aviation accidents is the [...]
For instance, Volti specifically warns the reader that the perspective on the technology that is presented in the chapter "Winners and Losers" may be "a bit negative" and makes sure to mention the positive effects [...]
The BOKs used in the field of project management are the APM's BOK and the PMBOK created in the United States and the United Kingdom.
The article "They are attacking you: learn the three types of hackers' was written by Jonathan Nichols and explores the three main types of hackers that attack organizations and their clients, and the factors that [...]
Traditionally, the scope of PM is defined by the differences between the goals of a particular project and the tools that are used to attain the set objectives.
As reported by Gowers, Elsevier has earned the title of a "gorilla of scholarly publishers" because of the way it manages the business and the knowledge that is available to it, the access to which [...]
The present work deals with the issue of DDoS attacks and builds a case on one of the well-known IT companies to single out the problem, the immediate solutions and preventive practices, and the lessons [...]
The example of Deutsche Telekom proves the importance of the development of cybersecurity programs and strategies to protect users and their interests.
According to researchers, combining two types of electricity generation into one textile paves the way for developing garments that could provide their own source of energy to power devices such as smart phones or global [...]
In a year, the company will position its app in the market as the only app for gadgets to promote verbal interaction in workplaces, homes, and learning institutions.
The most widely known example is algorithmic trading which allows the business to evaluate the price of the trade, assess the risks related to the trade, and calculate the time necessary for the trade.
Such changes can be seen in the way of living of people nowadays, as well as in the status of development in the majority of the countries.
In other countries where religion plays a key role in the values and norms of the people, suicide is a topic that is rarely discussed.
The most promising direction in a new generation of mobile networking is the use of millimeter-wave band transmission, which has the potential to fulfill some of the criteria specified above.