نتایج جستجو برای: security system
تعداد نتایج: 2351256 فیلتر نتایج به سال:
in the decentralized international system and lack of central authority, the first objective, priority and precedence of states, is maintenance of national security and preservation of self. from the past, durable national security provision has been include ,three readily type: 1. military readily2. political readily 3. economic readily. but economic factors of national security by the end col...
This paper addresses the bidding problem faced by a virtual power plant (VPP) in energy, spinning reserve service, and reactive power service market simultaneously. Therefore, a non-equilibrium model based on security constraints price-based unit commitment (SCPBUC), which is take into account the supply-demand balancing and security constraints of VPP, is proposed. By the presented model, VPP ...
Background and purpose: Today, with the advent of electronic medical record system (EMRS) the security and confidentiality of information ought to be reasonably considered. The purpose of this study was to assess the privacy and security requirements for implementation of EMRS in all hospitals in Isfahan in 2014. Materials and methods: An analysis framework was used in an applied study perform...
The growing attention in food security has suggested many approaches to develop a society free from hunger and malnutrition. Methodological approaches are mostly used to overcome the challenges of food security, but food insecurity is more than mere availability and access to food. Cultural and social dimensions and their intricacies to achieve food security are mostly missing from the lite...
quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. however, an important question arises with respect to the accuracy of input parameters. in practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
Introduction: Everyone in the community has this right that to have a “decent work”. The “decent Work” program is one of the strategies of the International Labor Organization in the field of labor and social security. This program implies that each individual:1) Have access to employment in equal conditions, 2) as a result of employment, having the right to social dialogue, 3) having fundament...
Introduction: Everyone in the community has this right that to have a “decent work”. The “decent Work” program is one of the strategies of the International Labor Organization in the field of labor and social security. This program implies that each individual:1) Have access to employment in equal conditions, 2) as a result of employment, having the right to social dialogue, 3) having fundament...
In this study, the impact of youth identity crisis is investigated on the national security of the Islamic Republic of Iran. The research method is qualitative; the library method is used for data collection; and data analysis is carried out with descriptive-analytical method. The main research question is how does the identity crisis in youth affect the national security of the Islamic Republi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید