نتایج جستجو برای: access methods

تعداد نتایج: 2144363  

Journal: :International Journal of Methods in Psychiatric Research 2020

Journal: :IEEE ACM Transactions on Networking 2021

List-based caches can offer lower miss rates than single-list caches, but their analysis is challenging due to state space explosion. In this setting, we propose novel methods analyze performance for a general class of list-based with tree structure, non-uniform access items and lists, random or first-in first-out replacement policies. Even though the underlying Markov process shown admit produ...

Journal: :International Journal of Multiple Research Approaches 2013

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

<span lang="EN-GB">The progressions in telecommunication beyond the 5<sup>th</sup> generation have created a need to improve research drifts. The current 5G study has an important focus on non-orthogonal multiple access (NOMA) technology. sparse code (SCMA) is promising technique within NOMA, enhancing multi-user handling capability of next-generation communication. In SCMA sp...

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی استان فارس - دانشکده دندانپزشکی 1380

چکیده ندارد.

Journal: :Journal of information processing 2023

Fraudulent access by way of nInternet banking, credit cards and e-commerce are a serious problem. Fraudsters intend to steal credentials log in these websites many ways such as phishing, malware infection, list based attack etc. There products services prevent fraudulent like fraud detection software multi-factor authentication, however have issues installation costs, accuracy operation cost. S...

Background Adequate access to health services has tremendous effects on the usefulness and efficiency of health care. Therefore, this study aimed to investigate the access of girls under the age of 14 years old to pharmacies in Kermanshah, Iran. Materials and Methods In this cross-sectional study, the access of Results In terms of access to 25 pharmacies through walking, the findings revealed ...

ژورنال: محاسبات نرم 2019

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید