نتایج جستجو برای: having possession bakhtegan

تعداد نتایج: 254899  

2013
Kavitha Murugesan Shilpa Sudheendran

The most common method used for user security is textual passwords. But they are vulnerable to eves dropping, dictionary attack, shoulder surfing etc. To address this problem, text can be combined with colors to generate session passwords called hybrid textual authentication for authentication in multi – cloud. Provable data possession is a technique for ensuring data integrity. We present a co...

Journal: :iran agricultural research 2008
h. abbaslou a. abtahi

pedogenesis and clay mineralogy of soils and rock samples were studied in a transect of calcareous, gypsiferous, saline soils and sediments of bakhtegan lake bank in southern iran. the main objectives of study were to determine the occurrence of clay minerals and factors controlling their distribution pattern and relative abundance in soils and parent materials. the soil parent material is high...

Journal: :international journal of advanced biological and biomedical research 2013
ayat rohina ayob baharani fard nader kazemi kazem abadi asghar mohammadi

several empirical methods for flood flow rate estimation have been presented. in this study,eight new empirical runoff estimation method including dredge & burge, bourges, inglis, faning, hyderabad, burkli ziegler, cramar and possenti were calculated in bakhtegan watershed which is located in fars province. after studying empirical methods for annual flood flow rate estimation and comparing...

2015
Angelo De Caro Vincenzo Iovino Adam O'Neill

Deniable encryption, first introduced by Canetti et al. (CRYPTO 1997), allows a sender and/or receiver of encrypted communication to produce fake but authentic-looking coins and/or secret keys that “open” the communication to a different message. Here we initiate its study for the more general case of functional encryption (FE), as introduced by Boneh et al. (TCC 2011), wherein a receiver in po...

2005
Frans Ilkka Mäyrä

The Exorcist (1971; “E”) by William Peter Blatty, one of horror’s all time greatest bestsellers, starts off with three quotations and three names. The first quotation is from the Bible, from the famous possession narrative in the gospel of Luke (8:27-30). The second is an excerpt from a FBI recording of two Mafia killers laughing and discussing how they had hung their victim on a meat hook and ...

2016
Pedro Vicente-Vila Carlos Lago-Peñas

The aim of this study was to identify which variables were the best predictors of success in futsal ball possession when controlling for space and task related indicators, situational variables and the participation of the goalkeeper as a regular field player or not (5 vs. 4 or 4 vs. 4). The sample consisted of 326 situations of ball possession corresponding to 31 matches played by a team from ...

Journal: :Psychiatric services 2010
Richard A Van Dorn Jeffrey W Swanson Marvin S Swartz Christine M Wilder Lorna L Moser Allison R Gilbert Andrew M Cislo Pamela Clark Robbins

OBJECTIVE This study examined whether persons with mental illness who undergo a period of involuntary outpatient commitment continue to receive prescribed medications and avoid psychiatric hospitalization after outpatient commitment ends. METHODS Data on Medicaid pharmacy fills and inpatient treatment were used to describe patterns of medication possession and hospitalization for persons with...

2014
JIM WARREN YULONG GU JOHN KENNELLY TAI BOYCE

Introduction: The Caring Does Matter (CDM) programme aims to improve medication adherence amongst Pacific patients with high cardiovascular disease (CVD) risk. This paper examines CDM baseline (preintervention) data for patterns of poor medication adherence. Methods: Electronic medical records from 14 general practices are analysed with respect to prescribing patterns for antihypertensive, chol...

Journal: :Emulations - Revue de sciences sociales 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید