|
|
|
Zhi Shan, Yuling Liang, Zhiwu Yu and Huihua Chen
China has emerged as a prominent global player in the field of railways, with numerous railway construction projects spanning across diverse locations. Railway bridges, as a crucial component of railway construction, warrant significant attention. Meta-a...
ver más
|
|
|
|
|
|
|
David Olson and Bongsug (Kevin) Chae
This study examined the Security and Exchange Commission (SEC) annual reports of selected logistics firms over the period from 2006 through 2021 for risk management terms. The purpose was to identify which risks are considered most important in supply ch...
ver más
|
|
|
|
|
|
|
Edina Jencová, Peter Ko?cák and Martina Ko?cáková
Queueing theory is currently a widely used method for optimizing activities not only in air transport but also in other sectors, in both production and the use of personnel. Using this theory, it is possible to simulate in advance various scenarios that ...
ver más
|
|
|
|
|
|
|
Anastasia Isakova,Vadim Sharmaev
Pág. 77 - 83
A construction area is an object of an increased risk zone for everyone who is on it, therefore, the security measures imposed on this territory must be strictly observed. Often, the process of observing safety precautions is formal and consists in condu...
ver más
|
|
|
|
|
|
|
Yingxiang Wu, Xigui Tao and Yijiang Xue
The ricochet phenomenon has been studied worldwide for a long time in consideration of its significance in ballistics. A ricochet projectile has proven to be worthless to its launcher, as warheads fail to penetrate the interior of targets and strike the ...
ver más
|
|
|
|
|
|
|
Iosif Progoulakis, Nikitas Nikitakos, Paul Rohmeyer, Barry Bunin, Dimitrios Dalaklis and Stavros Karamperidis
In an ever-evolving technological industry, the oil and gas sector is already moving forward through the adaptation of Industry 4.0 and the adaptation of advanced cyber technologies through Oil and Gas 4.0. As IT/OT (information technology/operational te...
ver más
|
|
|
|
|
|
|
Tianfang Sun, Pin Yang, Mengming Li and Shan Liao
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence, han...
ver más
|
|
|
|
|
|
|
Nisha Rawindaran, Ambikesh Jayal, Edmond Prakash and Chaminda Hewage
Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. With an increase in more wired and wireless connections and devices on SME networks, unpredictable mali...
ver más
|
|
|
|
|
|
|
Oleh Zachko, Dmytro Kobylkin, Oleh Kovalchuk, Viacheslav Markov
Pág. 49 - 56
The subject of the study is the personnel management information system. Infrastructure design processes of the framework model of complex socio-technical systems for project management and human resource management programs, formation of a database of m...
ver más
|
|
|
|
|
|
|
George Hatzivasilis, Sotiris Ioannidis, Michail Smyrlis, George Spanoudakis, Fulvio Frati, Ludger Goeke, Torsten Hildebrandt, George Tsakirakis, Fotis Oikonomou, George Leftheriotis and Hristo Koshutanski
Nowadays, more-and-more cyber-security training is emerging as an essential process for the lifelong personnel education in organizations, especially for those which operate critical infrastructures. This is due to security breaches on popular services t...
ver más
|
|
|
|