نتایج جستجو برای: knowledge storage and security
تعداد نتایج: 16904841 فیلتر نتایج به سال:
The broadly accepted and undisputed economic benefits notwithstanding, cloud computing, and particularly cloud storage, raises many security-related and legal qualms: Every enterprise considering to utilize cloud storage has to deal with compliance and security restrictions. In order to address these, cloud providers offer more and more security mechanisms for their services. At closer inspecti...
چکیده: پژوهش حاضر به بررسی تطبیقی اعتماد اجتماعی در بین دبیران زن و مرد مقطع راهنمایی شهر ایلام می پردازد. امروزه در جوامع شاهد گسترش ارتباطات هستیم و با توجه به این که دامنه کنش های اجتماعی از حد روابط با آشنایان و دوستان فراتر رفته و به تعامل با کنشگران غربیه و نا آشنا گسترش یافته است، لزوم وجود اعتماد، بیش از پیش احساس می شود. اما با توجه به نقش دبیران در نهادهای آموزشی، در انتقال ارزش ها و...
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, but it is not obvious what precise security properties are required for encryption. Furthermore, cloud storage providers often use techniques such as data deduplication for improving efficiency which restricts the application of semant...
With ever increasing storage demands and management costs, object based storage is on the verge of becoming the next standard storage interface. The American National Standards Institute (ANSI) ratified the object based storage interface standard (also referred to as OSD T-10) in January 2005. In this paper we present our experiences building a reference implementation of the T10 standard based...
the present research was conducted to explore the effect of employing two language teaching approaches, i.e. schema-based instruction (sbi) and translation-based instruction (tbi), on vocabulary knowledge, structure and reading comprehension ability of forty one female students learning english in grade one senior high school in rivash, kuhsorkh, iran. while sbi focuses on schemata, i.e. words ...
Abstract Background Assuring safety and survival of blood in vitro depends on anti-coagulation substances, blood bag characteristics, storage conditions, and transport of blood. Besides, careful selection and screening of donors as well as blood tests can minimize the transmission risk of blood-transmissible pathogens and optimize blood health. The aim of this study was to assay the level of ...
Epistemic concepts, and in some cases epistemic logic, have been used in security research to formalize security properties of systems. This survey illustrates some of these uses by focusing on confidentiality in the context of cryptographic protocols, and in the context of multi-level security systems. Security: the state of being free from danger or threat. (New Oxford American Dictionary)
Background and Aim: Due to the extensive use of knowledge intelligence, the future of countries depend on the application of specialized knowledge-based social networks. Thus, it is noteworthy to highlight the important role of the professionals. The key indicators of a model for knowledge sharing of Iranian experts, in experts’ social networks has been identified. Methods: For this purpose, ex...
introduction: the manual and paper-based process of production and storage of medical records in iran have led to difficulties in filing and retrieval of the medical records. one of the usual solutions is using computerized medical records via electronic storage of paper-based medical records. the aim of this study was to recognize using computerized medical records in nine selected hospitals. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید