نتایج جستجو برای: supply security aspects

تعداد نتایج: 658145  

ژورنال: حقوق پزشکی 2017
آزاد دوین, علی, زمانی, سید قاسم,

Social security as a social and historical phenomenon, is being considered as the result of economic and social development process especially in developing industrial societies proposed as the individual security requirements against the social risks but its legal norms in the human right framework needs international community attention on the basis of issuing international documents, rules a...

2008
Evangelos D. Frangopoulos Mariki M. Eloff Lucas M. Venter

Social Engineering (SE) threats have constituted a reality for Information Technology (IT) systems for many years. Yet, even the latest editions of the generally accepted Information Security (IS) standards and best practices directives do not effectively address the Social Engineering aspect of IS defences. SE attacks target the human element of IS by exploiting human relations to the maximum ...

2008
Andreas Sewe Christoph Bockisch Mira Mezini

Various aspect-oriented languages, e.g., AspectJ, AspectWerkz, and JAsCo, have been proposed as extensions to one particular object-oriented base language, namely Java. But these extensions do not fully take the interactions with the Java 2 security model into account. In particular, the implementation technique of advice weaving gives rise to two security issues: the erroneous assignment of as...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده مهندسی برق و کامپیوتر 1391

many mobile and off-grid devices include electronics and other electrical consumers like servo drives, which need a quite low supply power. since the price for photovoltaic modules drops continuously, photovoltaic power supply is interesting in more and more applications. in solar powered systems, a battery is needed to store energy for the night and cloudy periods. the power electronics of suc...

2004
H. L. Jonker S. Mauw

Acquiring digital media over the Internet has become commonplace in recent years. Companies are looking into ways to sell their content (music, movies, etc.) over the Internet without the buyer being able to further distribute the work. Digital Rights Management (DRM) systems address this; their main goal is to enable authorised users to access a version of digital content on the terms for whic...

2013
Mohd Muntjir

Sensor networks are amassed wireless networks of small, lowcost sensors that collect and propagate environmental data. The emerging field of wireless sensor networks integrates sensing, computation, and communication into a single device. The power of wireless sensor networks verifies in the capability to deploy huge numbers of small nodes that collaborates and configure them. Wireless sensor n...

2014
Marieke Huisman

• Joshua Guttman in “Establishing and preserving protocol security goals” proposes a model-theoretic approach to the verification of security properties, where the models are executions, and the security goals are implications over the geometric fragment of predicate logic. This methodology also leads to a new reading of protocol refinement and transformation, and offers the possibility of reas...

2013
Vasilios Kotsis Christina Antza Stella Stabouli

The story of vascular ageing was first described in the seventeenth century when Thomas Sydenham wrote that ‘A man is as old as his arteries’. This aphorism was returned to publicity lately when Peter Nilsson reintroduced the concept of early vascular ageing. As vascular ageing is described a gradual process involving biochemical, enzymatic, and cellular changes of the vasculature and modificat...

2010
Michael Yampolsky Carolyn M. Salafia Oleksandr Shlakhter Danielle Haas Barbara Eucker John Thorp

Abnormality of the placental vasculature affects placental thickness. Abstract. 31 Background. Our empirical modeling suggests that deformation of placental vascular growth is 32

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید