Essays about: "Security Patterns"
Showing result 21 - 25 of 145 essays containing the words Security Patterns.
-
21. Skötselns roll för ett samspel mellan trygghet och biologisk mångfald i samhällsnära naturreservat : en fallstudie på Öresundsparken i Lomma kommun
University essay from SLU/Dept. of Landscape Architecture, Planning and Management (from 130101)Abstract : Biologisk mångfald har stor betydelse för våra ekosystem och ekosystemtjänster, och bör finnas i åtanke vid utformning av naturreservat och andra grönområden. Men att enbart fokusera på biologisk mångfald i vegetation kan ha negativa konsekvenser för människors trygghet. READ MORE
-
22. The Russian Playbook : Using History & Path Dependence to Analyse How Russia Operationalises Grand Strategy in Ukraine, Georgia, and Moldova.
University essay from Linköpings universitet/Statsvetenskap; Linköpings universitet/Filosofiska fakultetenAbstract : To predict and prevent future armed conflicts like Russia’s war against Georgia in 2008 and Ukraine in 2022, there is more value in knowing how these wars occurred rather than why they occurred. The Russian Playbook is built from three distinct “plays” employed by Moscow and organised in the theoretical framework of Historical Institutionalism through Path Dependence modelling. READ MORE
-
23. Utmarken - envisioning Skåne's new edible landscapes
University essay from Lunds universitet/Institutionen för arkitektur och byggd miljöAbstract : Planet earth is getting hotter and regional climates are becoming increasingly unpredictable across the globe. Cities and communities on all continents are already impacted by the changing climate, but also by two other crises – the fossil-energy decent and the 6th mass extinction event. READ MORE
-
24. Facial recognition techniques comparison for in-field applications : Database setup and environmental influence of the access control
University essay from Uppsala universitet/Avdelningen för visuell information och interaktionAbstract : A currently ongoing project at Stanley Security is to develop a facial recognition system as access control system to prevent theft of heavy vehicles for terrorist purposes. As of today, there are several providers of facial recognition techniques and the spectrum ranges from multi dollar licenses to easy access open source. READ MORE
-
25. Trends and scientometrics in cyber security research
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : To look for scientific literature, there are specialized databases and search engines to simplify the process. In order to quickly assess the quality of a given paper, there are different indices meant to quantify the success and impact an author has had within the scientific community. READ MORE