نتایج جستجو برای: knowledge storage and security

تعداد نتایج: 16904841  

Introduction: The need to design and establish an integrated knowledge management system is one of the strategic issues of the social security organization. The present research was conducted with the aim of developing a model of Internal organizational factors effective on tacit knowledge management of social security organization with the Grounded Theory approach. Method: The current study i...

Journal: :Systems Science & Control Engineering 2022

This article presents the concept of improving security information systems intended for storing knowledge in organizations. It is designed to protect from leakage, theft or destruction, but without denying access its resources employees. possible thanks introduction so-called and sharing groups (S&S groups) that have two attributes at same time – level sharing. The proposed also assumes assign...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1389

methodology non-native participants in this study were sixty ba students majoring in english literature and teaching english as a foreign language at khayyam university of mashhad. they were senior students, between 21 to 24 years old, who had studied english for at least three and a half years and had passed several courses including grammar, reading, conversation, and writing. this was assum...

ژورنال: پیاورد سلامت 2020
Hosseini, Foroughosadat , Ronaghi, Mohammad Hossein ,

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

2016
Yong Yu Yannan Li Man Ho Au Willy Susilo Kim-Kwang Raymond Choo Xinpeng Zhang

Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user's private auditing key (as well as the authenticators those keys are associated with) without the user's re-possession of the data...

2016
P Ramakrishna M Ravikanth

Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We prese...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

abstract a fundamental study of “historio-graphic metafiction” and “literary genres”, as introduced in “new historical philosophy”, and tracing them in the works of julian barnes having studied the two novels, the porcupine and arthur & george, by julian barnes, the researcher has applied linda hutcheon’s historio-graphic metafictional theories to them. the thesis is divided into five cha...

پایان نامه :0 1375

investigation the archetype of mother can help the reader to understand poes works, especially his fiction, better, if not fully. motivated by internal and external drives to get into the universe in its manifold form poe was impelled to art and, from various modes of art, to symbolism. how much was poe successful to produce works of art has been a matter of dispute among critics. however, ther...

2015
Yazan Alshboul Raj Kumar Nepali Yong Wang

Big data is an emerging term referring to the process of managing huge amount of data from different sources, such as, DBMS, log files, postings of social media. Big data (text, number, images... etc.) could be divided into different forms: structured, semi-structured, and unstructured. Big data could be further described by some attributes like velocity, volume, variety, value, and complexity....

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1390

learning a second or foreign language requires the manipulation of four main skills, namely, listening, reading, speaking, and writing which lead to effective communication. it is obvious that vocabulary is an indispensible part of any communication, so without a vocabulary, no meaningful communication can take place and meaningful communication relies heavily on vocabulary. one fundamental fac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید