نتایج جستجو برای: protection support

تعداد نتایج: 823733  

2009
Jorg Kaiser Karol Czaja

The paper describes ACOM (Access Control Monitor), a hardware device which we developed to enforce run time protection in an persistent object-oriented system. To obtain a wide acceptance, the efSiciency of these systems must be comparable to conventional language systems. One of the key issues is to exploit the efJiciency of virtual memory management of contemporary processors. We will argue t...

Journal: :The Proceedings of the Nutrition Society 2003
Maureen A Murtaugh David R Jacobs Brenda Jacob Lyn M Steffen Leonard Marquart

The epidemic of type 2 diabetes among children, adolescents and adults is increasing along with the increasing prevalence of overweight and obesity. Overweight is the most powerful modifiable risk factor for type 2 diabetes. Intake of wholegrain foods may reduce diabetes risk. Three prospective studies in 160000 men and women examined the relationship of whole-grain or cereal-fibre intake with ...

2016
Lu Peng

Computer networking makes every computer component vulnerable to security attacks. Examples of such attacks include injection of malicious codes (e.g., buffer overflow), denial of service (DoS) attacks, and passive eavesdropping between CPU cores and off-chip devices. Also off-chip or on-chip devices taken over by an adversary can launch attacks to other components of a computer. Pure software ...

Journal: :زیست شناسی جانوری تجربی 0
آزاده بجلی دانشجوی کارشناسی ارشد، واحد ارسنجان، دانشگاه آزاد اسلامی، ارسنجان، ایران امید طبیعی عضو هیات علمی گروه منابع طبیعی، واحد ارسنجان، دانشگاه آزاد اسلامی، ارسنجان، ایران

abstract the aim of this study is to determine the level of people’s awareness and willingness towards the protection of persian wild ass (equus hemionus onager), to recommend solutions that can improve management and conservation of this species. in this descriptive-analytical study, 660 people from fars province were chosen via the clustered method. a questionnaire comprising items about the ...

,

Background: With the idea of victim protection emerging and the emergence of supportive victimology in the twentieth century, the forgotten position of the victim in the criminal process has been restored and its findings expressed in the form of universal standards for victim protection. Support for the victim is indispensable and indisputable in criminal proceedings. This support has various ...

احمدی کومله, صنم, خطیبی, نرجس خاتون, عباسی ابیانه, نوشین, ممی یانلو, هایده,

  Abstract   Background & Aim: Providing protection strategies against depression or anxiety after coronary artery bypass surgery has been recommend by different studies. Accordingly this study was conducted to investigate the relationship between perceived social support and depression and anxiety before and after surgery in patients undergoing coronary artery bypass graft in 201...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده علوم انسانی و اجتماعی 1386

چکیده ندارد.

2005
Marinus Maris Winelis Kavelaars

Given increasingly tight rules of engagement for military operations, the demand for advanced surveillance systems rises accordingly. Moreover, there is a tendency to reduce the number of personnel for maintenance and operation of support systems. Typical surveillance tasks include support for securing compounds in hostile environments, protection of provision routes, protection of forces in ha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید