Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Computer security --- Computer engineering --- Reverse engineering.
Choose an application
This work deals with the design, fabrication and quality control of microstructured lenses for headlamp projection systems. An algorithm is described to structure smooth lens surfaces. The data transfer for manufacturing steel tools for the injection molding process is explained. A reverse engineering process used to qualify the tools is presented.
Electrical engineering --- Scheinwerfer --- Linsen --- Mikrostruktur --- Flächenrückführung --- Headlamp --- Lens --- Microstructure --- Reverse Engineering
Choose an application
L'ingénierie inverse (ou reverse engineering), qui consiste dans l'opération de désassemblage d'un objet pour en comprendre le fonctionnement, constitue une pratique courante depuis l'Antiquité. La place grandissante de l'innovation dans l'économie, la mondialisation des échanges, la numérisation généralisée sont autant de développements récents invitant à examiner l'appréhension de ce phénomène par le droit. Si l'ingénierie inverse ne connaît aujourd'hui ni définition générale ni régime propre en droit français, elle n'en demeure pas moins visée directement par certaines dispositions juridiques (en droit d'auteur et en droit du secret des affaires), tandis que d'autres branches du droit peuvent également être sollicitées. Cet ouvrage esquisse les fondements d'un "droit de l'ingénierie inverse".
Ingénierie --- Rétro-ingénierie (informatique) --- Droit. --- Ingénierie --- Rétro-ingénierie (informatique) --- 347.77 --- 34:681.3 --- 34:681.3 Informaticarecht --- Informaticarecht --- 347.77 Industrieel eigendomsrecht. Commercieel eigendomsrecht. Geestelijk eigendomsrecht --- Industrieel eigendomsrecht. Commercieel eigendomsrecht. Geestelijk eigendomsrecht --- Engineering law --- Reverse engineering --- Rétro-ingénierie --- Droit --- Law and legislation
Choose an application
This Special Issue book focuses on the theory and practice of search engine optimization (SEO). It is intended for anyone who publishes content online and it includes five peer-reviewed papers from various researchers. More specifically, the book includes theoretical and case study contributions which review and synthesize important aspects, including, but not limited to, the following themes: theory of SEO, different types of SEO, SEO criteria evaluation, search engine algorithms, social media and SEO, and SEO applications in various industries, as well as SEO on media websites. The book aims to give a better understanding of the importance of SEO in the current state of the Internet and online information search. Even though SEO is widely used by marketing practitioners, there is a relatively small amount of academic research that systematically attempts to capture this phenomenon and its impact across different industries. Thus, this collection of studies offers useful insights, as well as a valuable resource that intends to open the door for future SEO-related research.
Information technology industries --- SEO --- search engine optimization --- website ranking --- ranking factors --- news websites --- Greece --- Cyprus --- comments --- ASEO --- reverse engineering --- citations --- google scholar --- microsoft academic --- web of science --- WoS --- scopus --- indicators --- algorithms --- relevance ranking --- citation databases --- academic search engines --- website quality --- web presence --- academic rankings --- accessibility --- search engines --- search --- online journalism --- media websites --- news content --- news articles --- n/a
Choose an application
This Special Issue book focuses on the theory and practice of search engine optimization (SEO). It is intended for anyone who publishes content online and it includes five peer-reviewed papers from various researchers. More specifically, the book includes theoretical and case study contributions which review and synthesize important aspects, including, but not limited to, the following themes: theory of SEO, different types of SEO, SEO criteria evaluation, search engine algorithms, social media and SEO, and SEO applications in various industries, as well as SEO on media websites. The book aims to give a better understanding of the importance of SEO in the current state of the Internet and online information search. Even though SEO is widely used by marketing practitioners, there is a relatively small amount of academic research that systematically attempts to capture this phenomenon and its impact across different industries. Thus, this collection of studies offers useful insights, as well as a valuable resource that intends to open the door for future SEO-related research.
SEO --- search engine optimization --- website ranking --- ranking factors --- news websites --- Greece --- Cyprus --- comments --- ASEO --- reverse engineering --- citations --- google scholar --- microsoft academic --- web of science --- WoS --- scopus --- indicators --- algorithms --- relevance ranking --- citation databases --- academic search engines --- website quality --- web presence --- academic rankings --- accessibility --- search engines --- search --- online journalism --- media websites --- news content --- news articles --- n/a
Choose an application
This Special Issue book focuses on the theory and practice of search engine optimization (SEO). It is intended for anyone who publishes content online and it includes five peer-reviewed papers from various researchers. More specifically, the book includes theoretical and case study contributions which review and synthesize important aspects, including, but not limited to, the following themes: theory of SEO, different types of SEO, SEO criteria evaluation, search engine algorithms, social media and SEO, and SEO applications in various industries, as well as SEO on media websites. The book aims to give a better understanding of the importance of SEO in the current state of the Internet and online information search. Even though SEO is widely used by marketing practitioners, there is a relatively small amount of academic research that systematically attempts to capture this phenomenon and its impact across different industries. Thus, this collection of studies offers useful insights, as well as a valuable resource that intends to open the door for future SEO-related research.
Information technology industries --- SEO --- search engine optimization --- website ranking --- ranking factors --- news websites --- Greece --- Cyprus --- comments --- ASEO --- reverse engineering --- citations --- google scholar --- microsoft academic --- web of science --- WoS --- scopus --- indicators --- algorithms --- relevance ranking --- citation databases --- academic search engines --- website quality --- web presence --- academic rankings --- accessibility --- search engines --- search --- online journalism --- media websites --- news content --- news articles
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
Technology: general issues --- industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
Technology: general issues --- industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
Modern engineering practice requires advanced numerical modeling because, among other things, it reduces the costs associated with prototyping or predicting the occurrence of potentially dangerous situations during operation in certain defined conditions. Thus far, different methods have been used to implement the real structure into the numerical version. The most popular uses have been variations of the finite element method (FEM). The aim of this Special Issue has been to familiarize the reader with the latest applications of the FEM for the modeling and analysis of diverse mechanical problems. Authors are encouraged to provide a concise description of the specific application or a potential application of the Special Issue.
Technology: general issues --- numerical modeling --- finite volumne method --- underground coal mine --- endogenous fires --- spontaneous combustion --- longwall --- ventilation system --- shot peening --- quantitative description of peening coverage --- high peening coverage --- Almen intensity --- residual compressive stress --- hybrid composite --- damage --- aramid fiber --- carbon fiber --- finite element method --- delamination --- cut bar method --- thermal conductivity --- steady-state --- heat lakes --- finite element modeling --- aluminum conductor steel-reinforced cable --- bend deformation --- stress --- friction coefficient --- wind loads --- fatigue fracture --- FEM --- SFEM --- active periodic structures --- smart materials --- PCHE --- misalignment --- channel --- utilization factor --- torsion springs --- FEA --- NURBS --- applied load --- local behaviors --- drill pipe joint --- design --- sealing properties --- experiment --- bias tire --- textile cord --- shrinkage --- rubber --- inflation analysis --- nondestructive inspection --- crack detection --- low loading --- surface profile --- turbine blade --- finite element analysis --- swingarm --- single-sided --- Finite Elements Analysis (FEA) --- three-wheel motorcycle --- topology optimization --- collision modeling --- mechanical parameters --- contact detection --- web deformation --- strain deviation --- design of experiment --- roll-to-roll process --- solid mechanics --- finite elements --- hp-adaptivity --- numerical locking --- detection --- assessment --- resolution --- equilibrated residual method --- sensitivity analysis --- p-enrichment --- bell crank --- natural frequency --- reverse engineering --- vibrometer --- Abaqus --- numerical simulation --- biomechanics --- head injury --- safety --- injury criteria --- disability --- driver --- HALE UAV --- generative modelling --- thin-layer composite structure --- electro-mechanical systems --- piezoelectrics --- hierarchical models --- first-order models --- transition models --- hpq/hp-approximations --- adaptivity --- stress gradients --- convergence --- damage detection
Listing 1 - 10 of 12 | << page >> |
Sort by
|