How to Protect Water Resources in Hanoi

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to protect biometric templates

In addition to the inherent qualities that biometrics posses, powerful signal processing tools enabled widespread deployment of the biometric-based identification/verification systems. However, due to the nature of biometric data, well-established cryptographic tools (such as hashing, encryption, etc.) are not sufficient for solving one of the most important problems related to biometric system...

متن کامل

How to protect the protector?

This paper describes ongoing research to harden the lower part of the software stack, normally not covered by existing software-based fault-tolerance mechanisms. I discuss a combination of four techniques to harden the operating system kernel against hardware faults: resilient data structures, asynchronous checks, restartable OS services, and message protection. I present initial performance re...

متن کامل

How to Protect Fly Photoreceptors

December 2006 | Volume 4 | Issue 12 | e418 Most governments around the world set conservation policy based on the assumption that resource exploitation and species protection can co-exist in the same place. These policies have led to Orwellian “marine protected areas” that host commercial fi shing operations, leading one to wonder who’s protecting whom. A new study reveals the danger of this ap...

متن کامل

how to protect young researchers from research misconduct

سخن سردبیر editorial مجله دانشگاه علوم پزشکی رفسنجان دوره 13، بهمن 1393، 1020-1019       چگونه می توان پژوهشگران جوان را از سوء رفتارهای پژوهشی حفظ نمود   how to protect young researchers from research misconduct    محسن رضائیان[1] m. rezaeian     در سخن سردبیری شماره قبل مجله دانشگاه ]1[، با انواع سوء رفتارهای پژوهشی و طبقه بندی آن ها به تقلب های پژوهشی و رفتارهای پژوهشی ابهام برانگیز آشنا شدی...

متن کامل

How to Protect Yourself without Perfect Shredding

Erasing old data and keys is an important capability of honest parties in cryptographic protocols. It is useful in many settings, including proactive security in the presence of a mobile adversary, adaptive security in the presence of an adaptive adversary, forward security, and intrusion resilience. Some of these settings, such as achieving proactive security, is provably impossible without so...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis

سال: 2009

ISSN: 2199-9201,1619-7623

DOI: 10.14512/tatup.18.2.77