首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
化学工业   1篇
建筑科学   2篇
原子能技术   1篇
自动化技术   7篇
  2020年   1篇
  2019年   1篇
  2017年   1篇
  2013年   1篇
  2009年   3篇
  2008年   2篇
  2007年   1篇
  1975年   1篇
排序方式: 共有11条查询结果,搜索用时 46 毫秒
1.
In May 2009 the Information Security Group, Royal Holloway, became host to a medical sociologist from St. George’s Hospital, University of London, under EPSRC’s discipline hopping scheme. As part of this knowledge transfer activity, a sociotechnical study group was formed comprising computer scientists, mathematicians, organisational researchers and a sociologist. The focus of this group is to consider different avenues of sociotechnical research in information security. This article briefly outlines some of the areas of research where sociotechnical studies might contribute to information security management.  相似文献   
2.
In organisations where information security has historically been a part of management and for which the risk assessment methodologies have been designed there are established methods for communicating risk. This is the case for example in the banking and military sectors. However in organisations where information security is not embedded into management thinking and where the relationship between information security and the business is less clear-cut, communicating the risks to the business is less straightforward. In such circumstances it has been observed during field research that information security risk assessments frequently output findings to which the business cannot relate and the process is consequently often viewed as a “tick box” exercise, as opposed to one that provides real value to the business. In such a situation the information security risk assessment is divorced from the business process and not embedded into the organisation’s processes or thinking. The research for this paper was undertaken in order to identify what needs to be done in order to ensure that businesses of this type find the risk assessment process valuable in practice. Lizzie Coles-Kemp is a postgraduate research student in Computer Science and Richard E. Overill is a Senior Lecturer in Computer Science.  相似文献   
3.
4.
Blends of brominated epoxy (BE) and conventional epoxy resins were studied following curing with aliphatic triethylenetetramine (TETA), etheric (polyether diamine‐ PEA4), and aromatic (3,3′‐diamino diphenyl sulfone [DDS]) hardeners. The addition of BE resulted in an increase in Tg in all tested blends. Blends with 50 wt% BE cured with TETA demonstrated an increase in flexural modulus and flexural strength, while preserving the elongation. Blends with 40 wt% BE cured with PEA4 and 50 wt% BE cured with DDS resulted in a significant enhanced tensile elongation. The shear strength of all cured systems decreased moderately with the addition of BE exhibiting a mixed mode failure. Analysis of the fracture morphology using electron microscopy supported the increase of toughness levels as a result of incorporating BE to conventional epoxy. A unique nodular and rough fracture morphology was obtained, which is related to a toughening mechanism caused by the addition of BE. It was concluded that blends of BE and conventional epoxy could be used as structural adhesives having high Tg, enhanced mechanical properties and increased toughness. POLYM. ENG. SCI., 59:206–215, 2019. © 2018 Society of Plastics Engineers  相似文献   
5.
PrepHub Nepal     
This article documents an action-research and collaborative-design process for building a disaster-prepared public space and water infrastructure in Thecho, Nepal. When the 2015 Gorkha earthquake devastated the country, public open spaces provided safety and resources post-disaster. The project identifies the paati, an existing public space typology, as the genius loci and embeds the paatis with new public infrastructure. Combining earthquake reconstruction, historical preservation, and risk reduction, the intervention provides improved daily water access and a safe space to gather post-disaster. Documenting and reflecting on this process illustrates the importance of ethnographic fieldwork and local partnerships in designing for a disaster-prepared public realm.  相似文献   
6.
The aim of this article is to present the case for a closer examination of the privacy and consent dialogues that take place during the use of on-line services. This article explores the concepts of privacy and consent in on-line services, discusses the facets of both concepts and presents a case study from Sunderland City Council to illustrate the complexity of deploying privacy and consent dialogue within on-line services. The article concludes with an outline of how enhanced understanding of privacy and consent concepts can result in improved tools to support dialogue and result in a negotiated understanding of the privacy that can be expected and the consent that it is required. This rationale is the underpinning of the VOME project – Visualisation and Other Methods of Expression – funded by TSB, EPSRC and ESRC.  相似文献   
7.
8.
9.
10.
Meteorological datasets are continuously getting larger, as a result of increasing computer power allowing models to be run at higher resolutions and for longer time periods. This is making it increasingly difficult to analyse these datasets at a single location. A web application has been developed to address this problem. The web application allows storm identification and tracking software to be executed from a web browser. It accesses remote datasets using the OPeNDAP protocol and makes use of distributed computing techniques with Condor. The web application currently enables users to compute storm tracks from the National Centers for Environmental Prediction (NCEP) re-analysis and ensemble prediction datasets, which are both archived in the USA. A list of jobs can be constructed and executed across multiple computers to reduce computation time. The progress of each job can be monitored and once completed, the computed storm tracks can be downloaded and plotted in a web browser. Applications of the web application are also discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号