نتایج جستجو برای: providing environmental infrastructures

تعداد نتایج: 626103  

2012
Luigi Coppolino Salvatore D'Antonio Valerio Formicola Luigi Romano

Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory Control And Data Acquisition (SCADA) systems are increasing and becoming more sophisticated. Typically, SCADA has been designed without having security in mind, which is indeed approached by reusing solutions to protect solely Information Technology (IT) based infrastructures, such as the Security Informati...

2011
Alberto Guadagnini

The Doctoral Programme in Water Engineering is coordinated by the Department of Hydraulic, Environmental, Infrastructures, and Surveying Engineering (DIIAR). It offers technical/scientific curricula geared to the design, planning and management of sustainable development strategies related to the interactions between human life and environment in all aspect involving water. The programme is foc...

2007
Laura Díaz Sergio Costa Carlos Granell Michael Gould

Current geo web services and spatial data infrastructures support effectively the most common requirements and needs of spatial information users, such as discovering, accessing and visualization datasets. However, specialized users like water scientists carry out time-consuming tasks for capturing, analyzing and processing huge volumes of hydrological data by using commonly traditional GIS too...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده مدیریت 1391

one of the most important factors in study of project’s , is the study of environmental opportunities factors the permanent study of environmental opportunity factors . the study of permanent environmental changing and knowing golden threats’ cooperate with possible threats and at the result in structure forming and future skeleton of organization has a vital effects . the petrochemical industr...

2011
Marco Gavanelli Fabrizio Riguzzi Michela Milano Davide Sottara Alessandro Cangini Paolo Cagnoli

Strategic Environmental Assessment (SEA) is used to evaluate the environmental effects of regional plans and programs. SEA expresses dependencies between plan activities (infrastructures, plants, resource extractions, buildings, etc.) and environmental pressures, and between these and environmental receptors. In this paper we employ fuzzy logic and many-valued logics together with numeric trans...

2002
Ian Williamson

There is a great amount of effort worldwide to understand the problems of shelter, access to land and security of tenure for the urban poor, but very little attention to the mechanics of policy implementation. In other words there is little attention to the practical or “engineering” side of designing, building and managing land administration infrastructures which facilitate shelter, security ...

2010
Martin Adelantado Pierre Siron Jean-Baptiste Chaudron

Our work takes place in the context of the HLA standard and its application in real-time systems context. The HLA standard is inadequate for taking into consideration the different constraints involved in real-time computer systems. Many works have been invested in order to providing real-time capabilities to Run Time Infrastructures (RTI) to run real time simulation. Most of these initiatives ...

2012
Cristina Alcaraz Javier López

Control and situational awareness are two very important aspects within critical control systems, since potential faults or anomalous behaviors could lead to serious consequences by hiding the real status of supervised critical infrastructures. Examples of these infrastructures are energy generation, transmission or distribution systems that belong to Smart Grid systems. Given the importance of...

2007
Valerio Venturi Morris Riedel Ahmed Shiraz Memon M. Shahbaz Memon Federico Stagni Bernd Schuller Daniel Mallmann Bastian Tweddell Alberto Gianoli Sven van den Berghe David F. Snelling Achim Streit

In recent years, the Virtual Organization Membership Service (VOMS) emerged within Grid infrastructures providing dynamic, fine-grained, access control needed to enable resource sharing across Virtual Organization (VOs). VOMS allows to manage authorization information in a VO scope to enforce agreements established between VOs and resource owners. VOMS is used for authorization in the EGEE and ...

2003
Job Asheri Chaula Louise Yngström Stewart Kowalski

Public Key Infrastructures (PKIs) are currently being deployed in increasing sizes, numbers, fast changing technologies, and varying environments but our operational experience to date has been limited to a relatively small scale and small number of environments. Consequently, some open technical and environmental interoperability problems about the ways in which PKIs will be organized and oper...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید