نتایج جستجو برای: secure mother
تعداد نتایج: 101974 فیلتر نتایج به سال:
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
This interactive demo features MIXER, a Virtual Learning Environment (VLE) consisting of synthetic characters representing the various actors in a scenario group difference scenario. MIXER creates virtual dramas by using interactive narrative with those characters. The goal is to enable children to identify social rule differences, by interacting with one of the characters to which they become ...
We report the discovery of a new X-ray transient AGN, RX J1624.9+7554. This object appeared to be bright in the ROSAT All-Sky Survey, but had turned off in two pointed observations about one and a half years later. The optical identification spectrum shows a non-emission line spectrum of a spiral galaxy at z=0.064. We will discuss several hypotheses that can explain the peculiar behaviour of th...
Existing interlinking tools focus on finding similarity relationships between entities of distinct RDF datasets by generating owl:sameAs links. These approaches address the detection of equivalence relations between entities. However, in some contexts, more complex relations are required, and the links to be defined follow more sophisticated patterns. This paper introduces Link++, an approach t...
In this paper, we evaluate query suggestion for Boolean queries in a news monitoring system. Users of this system receive news articles that match their running query on a daily basis. Because the news for a topic continuously changes, the queries need regular updating. We first investigated the users’ working process through interviews and then evaluated multiple query suggestion methods based...
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
objective: to determine the effectiveness of counseling in reducing anxiety of nulliparous pregnant women. materials and methods: in this quasi-experimental study, 110 nulliparous pregnant women were selected out of all pregnant women referring to fatemieh hospital in hamadan, iran. then, the subjects were divided into two groups in experimental and control (55 women in each). the data were col...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید