نتایج جستجو برای: http
تعداد نتایج: 132199 فیلتر نتایج به سال:
Excessive fluoride ingestion has been identified as a risk factor for fluorosis and oxidative stress. The present study was aimed to evaluate vitamin E in combination with methionine and Lcarnosine as a potential natural antioxidant to mitigate the effects of sodium fluoride on hematological indices, DNA damage, pancreatic digestive enzyme activities and histological structure of pancreas throu...
Recent work has emphasized the importance of pure delay components as well as rate components in the user perceived performance of elastic Internet applications, namely Web browsing. “Fun factors” have been previously introduced to describe the obtained performance with respect to the maximum possible performance on a scale of zero (no fun) to one (maximum fun). In this paper, several options f...
2 Robot Design 3 2.1 Mechanical Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Localisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Rubbish detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.4 Classification of Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.5 The main control cycle . ....
It has been understood for some time that arbitrary data, including the communications associated with malicious backdoors and Trojan horses, can be tunnelled by subverting the HTTP protocol. Although there are a number of demonstration programs openly available, the risks associated with this vulnerability have not been characterised in the literature. This research investigates the nature of ...
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies have raised public concerns on Internet privacy because they can be exploited by third-parties to track user behaviors and build user profiles. In addition, stolen cookies may also incur severe security problems. However,...
That's it, a book to wait for in this month. Even you have wanted for long time for releasing this book http pocket reference hypertext transfer protocol; you may not be able to get in some stress. Should you go around and seek fro the book until you really get it? Are you sure? Are you that free? This condition will force you to always end up to get a book. But now, we are coming to give you e...
Mobile users traveling by car, bus, or train usually experience varying connectivity characteristics while they are on their way, including unpredictable (loss of) network access, changes in a data rate, and the like. In short, they operate in a challenged networking environment that is not well suited for many Internet applications. While different approaches have been developed to specificall...
Version 2 of the Hypertext Transfer Protocol (HTTP/2) was finalized in May 2015 as RFC 7540. It addresses well-known problems with HTTP/1.1 (e.g., head of line blocking and redundant headers) and introduces new features (e.g., server push and content priority). Though HTTP/2 is designed to be the future of the web, it remains unclear whether the web will—or should—hop on board. To shed light on...
This memo explains how to use the Upgrade mechanism in HTTP/1.1 to initiate Transport Layer Security (TLS) over an existing TCP connection. This allows unsecured and secured HTTP traffic to share the same well known port (in this case, http: at 80 rather than https: at 443). It also enables "virtual hosting," so a single HTTP + TLS server can disambiguate traffic intended for several hostnames ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید