Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Critical Security Theory

Shear strength of a bulk material in differing states of dilation is a key property of interest for flow considerations. The conventional hopper design method for mass flow is based upon critical state theory, and a Jenike shear cell is used to secure yield locus values upon which a design procedure is based. This technique is universally accepted, but not widely used for small hoppers for various reasons. Significant cost and expertise is required to obtain accurate values, compared with full-scale trials and... [Pg.9]

RESEARCH UNIVERSITIES ARE IN THE MIDST OF MAJOR CHANGE. Historically, the research universities have been supported by the Government with two theories in mind (1) national security is important, and science and technology are critical to a strong defense and (2) human health is important. The interest in human health persists, an interest in national security persists, but the adversary has given up. The Soviet Union no longer exists. The question now is, What is the rationale for the support of universities—support in the post-Cold War era The Department of Defense, which has nurtured an important set of activities, has a role in electronics and devices, structural materials, and high-performance or advanced-performance materials. [Pg.49]

The presentation will review the theory of tomographic imaging, then discuss a range of applications to the overall security problem, the relevant system configurations in each case, the achievable performance and critical factors, and identify promising areas for future research. [Pg.171]

Watt, D.C. October 1990. Critical Afterthoughts and Alternative Historico-Literary Theories, Intelligence and National Security 5 4, pp. 212-25. [Pg.215]

This newly established ISARCS symposium provided an exclusive forum for exchanging views on the theory and practice for architecting critical systems. Such systems are characterized by the perceived severity of consequences that faults or attacks may cause, and architecting them requires appropriate means to assure that they will fulfill their specified services in a dependable and secure manner. [Pg.198]

In contrast to the original spectacular success of the statistical theory, the failure to secure any very significant understanding of the relatively rather small deviations from the theory, despite repeated attempts over a period of 30 years, is disappointing. In a sense, perhaps, there are two many available explanations, and too few critical data by which they may be tested. (Treloar, 1975). [Pg.58]

For comparison of concepts used in practice for system risk management and for trade-off with system risk from the viewpoint of their capability to ensure the hiunan system security we use the quantity criticality and the procedure based on the Multiatribute Utility Theory (MUT) (Keeny Raiffa 1976) with the statement the higher, the worse . The criticality is given by level of integral risk in which the main role is played by level of cross-sectional risks (Prochazkova 201 lb). [Pg.1467]

Wynjones, R. (1999) Security, Strategy, and Critical Theory. London Lynne Rienner. [Pg.225]


See other pages where Critical Security Theory is mentioned: [Pg.222]    [Pg.222]    [Pg.222]    [Pg.222]    [Pg.222]    [Pg.222]    [Pg.1034]    [Pg.572]    [Pg.454]    [Pg.196]    [Pg.58]    [Pg.27]    [Pg.9]    [Pg.169]    [Pg.325]    [Pg.424]    [Pg.1072]    [Pg.58]    [Pg.30]    [Pg.88]    [Pg.392]    [Pg.211]    [Pg.214]    [Pg.1463]    [Pg.2]    [Pg.7]    [Pg.915]    [Pg.257]    [Pg.315]   


SEARCH



Critical theory

© 2024 chempedia.info