نتایج جستجو برای: security sense
تعداد نتایج: 322501 فیلتر نتایج به سال:
In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...
This paper describes the design, implementation, and performance of Neo, a wide-area file system whose security architecture is based on the chit. Chits are instantiations of capabilities that capitalize on the strengths of traditional capabilities (flexible granularity, rights tied to naming, non-traditional identities) while mitigating the drawbacks (revocation, accountability, lack of confin...
security is one of the most critical factors affecting the quality of urban spaces. nowadays, most of these spaces have become merely pathways with neither social life nor sense of belonging to it. insufficiency of public surveillance along with weak sense of control and surveillance results in spaces with high crime rate. in the late 60s and early 70s, high crime statistics in open urban space...
Distributed processing capabilities of robotic-applications using state-of-the-art component-based middleware and mobile-agent software technologies are continuously helping to develop more powerful intelligent robots. These application development frameworks provide several attractive conceptual solutions for network-based operations, however, these benefits cannot be realized unless the appro...
Certain risk factors result in a higher incidence of delayed-onset hearing loss. Ten subjects who passed auditory brainstem response birth screenings and later returned with bilateral sensorineural hearing loss are examined in this report. Although not all subjects in this report had respiratory distress, this study reveals a high correlation between mechanical ventilation and delayed-onset hea...
Using the concept of ontological security, this paper examines the physical and psychological loss of home and community following Hurricane Katrina. This qualitative longitudinal study includes 40 heads of households with school-age children who lived in New Orleans during Hurricane Katrina. Participants describe a breakdown in their social fabric at the individual and structural/community lev...
In this article, we conceptualize the sense of attachment security as an inner resource and present theory and research on the broaden and build cycle of attachment security generated by the actual or symbolic encounter with external or internalized loving and caring relationship partners. We also propose that the body of research stimulated by attachment theory offers productive hints about in...
We look at a different security property one might require of encryption, namely one-way security. The notion is natural and seems like a minimal requirement on an encryption scheme. It makes sense for both symmetric and public-key encryption schemes. To make the discussion more concrete, we look at the so-called “textbook” variant of the RSA encryption, and see how to pick keys in relation to ...
In quantum cryptography, the level of security attainable by a protocol which implements a particular task N times bears no simple relation to the level of security attainable by a protocol implementing the task once. Useful partial security, and even near-perfect security in an appropriate sense, can be obtained for N copies of a task which itself cannot be securely implemented. We illustrate ...
– Nobody is really responsible for security management. – A wrong sense for security, i.e. someone did a security check years ago and there was no related activity afterwards. – Securing the Network is often considered a "non-productive" task. Unfortunately, this attitude is not likely to be changed before a major security incident occurs. But as everyone knows the alarm systems installed direc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید