نتایج جستجو برای: security sense

تعداد نتایج: 322501  

In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...

2013
Pete Keleher Bobby Bhattacharjee Neil Spring Vassilios Lekakis Yunus Basagalar

This paper describes the design, implementation, and performance of Neo, a wide-area file system whose security architecture is based on the chit. Chits are instantiations of capabilities that capitalize on the strengths of traditional capabilities (flexible granularity, rights tied to naming, non-traditional identities) while mitigating the drawbacks (revocation, accountability, lack of confin...

Journal: :international journal of architecture and urban development 2013
abbas yazdanfar sepideh ghaemmaghami paniz ahmadpour

security is one of the most critical factors affecting the quality of urban spaces. nowadays, most of these spaces have become merely pathways with neither social life nor sense of belonging to it. insufficiency of public surveillance along with weak sense of control and surveillance results in spaces with high crime rate. in the late 60s and early 70s, high crime statistics in open urban space...

2006
M. Omar Faruque Sarker ChangHwan Kim Bum-Jae You Mohammed Golam Sadi

Distributed processing capabilities of robotic-applications using state-of-the-art component-based middleware and mobile-agent software technologies are continuously helping to develop more powerful intelligent robots. These application development frameworks provide several attractive conceptual solutions for network-based operations, however, these benefits cannot be realized unless the appro...

Journal: :Journal of the American Academy of Audiology 2001
T Mann K Cuttler C Campbell

Certain risk factors result in a higher incidence of delayed-onset hearing loss. Ten subjects who passed auditory brainstem response birth screenings and later returned with bilateral sensorineural hearing loss are examined in this report. Although not all subjects in this report had respiratory distress, this study reveals a high correlation between mechanical ventilation and delayed-onset hea...

Journal: :Disasters 2011
Robert L Hawkins Katherine Maurer

Using the concept of ontological security, this paper examines the physical and psychological loss of home and community following Hurricane Katrina. This qualitative longitudinal study includes 40 heads of households with school-age children who lived in New Orleans during Hurricane Katrina. Participants describe a breakdown in their social fabric at the individual and structural/community lev...

2007
Mario Mikulincer Phillip R. Shaver

In this article, we conceptualize the sense of attachment security as an inner resource and present theory and research on the broaden and build cycle of attachment security generated by the actual or symbolic encounter with external or internalized loving and caring relationship partners. We also propose that the body of research stimulated by attachment theory offers productive hints about in...

2004
Stanislaw Jarecki

We look at a different security property one might require of encryption, namely one-way security. The notion is natural and seems like a minimal requirement on an encryption scheme. It makes sense for both symmetric and public-key encryption schemes. To make the discussion more concrete, we look at the so-called “textbook” variant of the RSA encryption, and see how to pick keys in relation to ...

2002
Adrian Kent

In quantum cryptography, the level of security attainable by a protocol which implements a particular task N times bears no simple relation to the level of security attainable by a protocol implementing the task once. Useful partial security, and even near-perfect security in an appropriate sense, can be obtained for N copies of a task which itself cannot be securely implemented. We illustrate ...

2001
Christian Schwingenschlögl Andreas Pilz

– Nobody is really responsible for security management. – A wrong sense for security, i.e. someone did a security check years ago and there was no related activity afterwards. – Securing the Network is often considered a "non-productive" task. Unfortunately, this attitude is not likely to be changed before a major security incident occurs. But as everyone knows the alarm systems installed direc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید