نتایج جستجو برای: growth of task security

تعداد نتایج: 21269144  

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

2011
Mohit Wadhwa Suresh Kumar

The current generation of the Internet is based on IPV4 protocol.IPV4 has been a great success on that time but due to less address space and lack of security it does not fulfil the requirement of the exponential growth of the internet. Because of limited address space and lack of security IPV4 is replaced by IPV6, proposed by the network working group of the Internet Engineering Task Force (IE...

Journal: :محیط شناسی 0
عباس مصلّی نژاد

security building processes after world war ii, were under the influence of realistic thoughts. this was considered a reaction to idealistic and institutional approaches. critical school attempted to criticize classical and structural realism. new security theoreticians emphasize on extended subjects and diverse threats and believe it to be beyond the competition of countries. they believe that...

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1392

like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان 1390

عنوان: بررسی اوضاع فرهنگی گیلان (از انقلاب مشروطیت تا به قدرت رسیدن رضا شاه ) نویسنده: افضل افشاری سال :90-1389 استاد راهنما: دکتر ابوطالب سلطانیان استاد راهنما: دکتر حسن کهنسال واجارگاه چکیده: این پژوهش می کوشد اوضاع فرهنگی گیلان را از دور? مشروطیت تا ظهور رضا خان بررسی نماید و کم و کیف آن را آشکار سازد. انقلاب مشروطیت دو دستاورد مهم فرهنگی را در پی داشت؛ یکی انتشار گسترد? مطبوعات د...

ژورنال: مدیریت شهری 2016
Arian Mehr, Alireza, Doosti, Habib, Ghorbani, Vahid, Khoshro, Qasim, Mohammadi Asl, Mohammad,

Threats are one of the most fundamental problems of our modern societies that daily will affect citizens in urban spaces. This becomes more problematic when the people in their everyday living spaces encounter with behaviors that cause lack of security and should have been feel comfort and their families used these spaces freely. This causes many problems for citizens. In today cities because o...

Hoseini, Seyed Reza, Kazemi Najafabadi, Mostafa,

One of the important distinctions of the Islamic Social Security model with conventional patterns is the very constructive and essential role of social inequality and voluntary participation. Revitalizing this sector in line with the needs of the day and advances in information technology requires research and cultural work by influential social authorities and institutions. In the Islamic view...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...

2006
Dimitris K. Tasoulis Elena C. Laskari Gerasimos C. Meletiou Michael N. Vrahatis

The exponential growth of databases containing personal information has rendered the task of extracting high quality information from collections of such databases very important. This task is hindered by the security concerns that arise, due to the confidentiality of the data records, and the reluctance of the organizations to disclose their data. This paper proposes a clustering algorithmic s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید