Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Practicality of risk analyses of establishments
TIBKAT | 2020|Keywords: Engineering ; Safety measures, Industrial safety -
Safety and security engineering VIII
TIBKAT | 2020|Keywords: Engineering ; Safety measures, Industrial safety -
Analysis of the assurance of work experience for university graduates in the context of Industry 4.0
TIBKAT | 2020|Keywords: Engineering ; Safety measures, Industrial safety -
Prediction of sediment disasters due to short-duration heavy rain in mountainous areas based on real-time rainfall observations
TIBKAT | 2020|Keywords: Engineering ; Safety measures, Industrial safety -
Secured Forensic Framework for Various Users in the Virtualized Environment of Cloud
TIBKAT | 2020|Keywords: Computer security -
IoE-Enabled Smart Embedded System: An Innovative Way of Learning
TIBKAT | 2020|Keywords: Computer security -
ICT for HR in an Industrial Organisation for a Small but High-Impact Process (a Case Study of RINL, Visakhapatnam Steel Plant, India)
TIBKAT | 2020|Keywords: Computer security -
#BiggBoss - Long-Run Event Detection and Sentiment Mining in Twitter
TIBKAT | 2020|Keywords: Computer security -
Wi-Fi-Based Portable Weather Station for Monitoring Temperature, Relative Humidity, Pressure, Precipitation, Wind Speed and Direction
TIBKAT | 2020|Keywords: Computer security -
Empowering Textile Crafts Through the Internet of Things Technology
TIBKAT | 2020|Keywords: Computer security -
Assessing the Smart Readiness of Local Councils in Mauritius
TIBKAT | 2020|Keywords: Computer security -
Multispectral Satellite Image Classification Based on Bare Bone Fireworks Algorithm
TIBKAT | 2020|Keywords: Computer security -
User Review Classification and Star Rating Prediction by Sentimental Analysis and Machine Learning Classifiers
TIBKAT | 2020|Keywords: Computer security -
An Approach Toward More Accurate Forecasts of Air Pollution Levels Through Fog Computing and IoT
TIBKAT | 2020|Keywords: Computer security -
Sensoponics: IoT-Enabled Automated Smart Irrigation and Soil Composition Monitoring System .
TIBKAT | 2020|Keywords: Computer security -
Innovating Digital Consumer Services in Wealth Management Ecosystem an Anthropomorphic Approach
TIBKAT | 2020|Keywords: Computer security -
An Exhaustive Study of Dominant Features for Natural Gas Consumption
TIBKAT | 2020|Keywords: Computer security -
Template Matching for Automatic Number Plate Recognition System with Optical Character Recognition
TIBKAT | 2020|Keywords: Computer security -
Flow Shop Scheduling in Which Processing Time Connected with Probabilities and Job Delay Due to Maintenance for M * N Machine
TIBKAT | 2020|Keywords: Computer security -
Artificial Neural Network-Based Crop Yield Prediction Using NDVI, SPI, VCI Feature Vectors
TIBKAT | 2020|Keywords: Computer security -
Detection of Liaison Between Health Outcome and Web Search
TIBKAT | 2020|Keywords: Computer security -
An Improved Approach to Background Removal Using Haar-Based Preprocessing for Phase Features
TIBKAT | 2020|Keywords: Computer security -
BrownBoost Classifier-Based Bloom Hash Data Storage for Healthcare Big Data Analytics
TIBKAT | 2020|Keywords: Computer security -
Visual Analytics Toward Prediction of Employee Erosion Through Data Science Tools
TIBKAT | 2020|Keywords: Computer security -
Automated Socio-psycho-economic Knowledge Behavior Classified in E-Commerce Applying Various Machine Learning Techniques
TIBKAT | 2020|Keywords: Computer security -
Safe Navigation for Elderly and Visually Impaired People Using Adhesive Tactile Walking Surface Indicators in Home Environment
TIBKAT | 2020|Keywords: Computer security -
A Review on Implementation of Digital Image Watermarking Techniques Using LSB and DWT
TIBKAT | 2020|Keywords: Computer security -
Integrated Use of AHP and GIS Techniques for Selection of Artificial Water Recharge Sites
TIBKAT | 2020|Keywords: Computer security -
Signal Integrity Analysis for Diameter-Dependent Mixed Carbon Nanotube Bundle Interconnects
TIBKAT | 2020|Keywords: Computer security -
Random-opposition-based Learning for Computational Intelligence
TIBKAT | 2020|Keywords: Computer security -
Novel Concept of Spelling Correction for Semantic Tourism Search Interface
TIBKAT | 2020|Keywords: Computer security -
Analytical Assessment of Nature-Inspired Metaheuristic Algorithms to Elucidate Assembly Line Task Scheduling Problem
TIBKAT | 2020|Keywords: Computer security -
Automotive Vehicle-to-Everything (V2X) Communication Using IoT
TIBKAT | 2020|Keywords: Computer security -
Implementation of Dalal and Triggs Algorithm to Detect and Track Human and Non-Human Classifications by Using Histogram-OrientedGradient Approach
TIBKAT | 2020|Keywords: Computer security -
Simulation Platforms for Wireless Sensor Networks: How to Select?
TIBKAT | 2020|Keywords: Computer security -
The Economics of ‘Make in India’ Over ‘Buy (Import)’ Decision in Selected Technologies for the Indian Navy
TIBKAT | 2020|Keywords: Computer security -
Efficient Implementation of Carry-Skip Adder Using CSMT Adder and PPA
TIBKAT | 2020|Keywords: Computer security -
AmbuPod a Family-Owned Social Enterprise for Inclusive Quality Health care in India
TIBKAT | 2020|Keywords: Computer security -
A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks
Online Contents | 2020|Keywords: Security localization -
Security for cyber-physical systems: Secure control against known-plaintext attack
Online Contents | 2020|Keywords: security -
The safety critical systems handbook : a straightforward guide to functional safety: IEC 61508 (2010 edition), IEC 61511 (2015 edition) : also related guidance on cyber security & including machinery and other idustrial sectors
TIBKAT | 2020|Keywords: Industrial safety, Industrial safety ; Standards -
Sentence-Level Emotion Detection from Text Based on Semantic Rules
TIBKAT | 2020|Keywords: Computer security -
Extensible Attribute Similarity Data Mining for Categorical Data Streams in Web Usage Framework
TIBKAT | 2020|Keywords: Computer security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.