نتایج جستجو برای: implementation of access control

تعداد نتایج: 21307868  

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده علوم انسانی 1390

this study examined the effects of collaborative strategic reading and direct instruction in persuasion on iranian high school students persuasive writing and attitudes. students in three intact classes were assigned to one of three treatment conditions: collaborative strategic reading and direct instruction in persuasion or direct instruction in persuasion or a control group. treatment effects...

ارومیه ای, نادیا, بانشی, محمدرضا, مهرالحسنی, محمد حسین, میرزایی, سعید, یزدی, وحید,

Background and Objectives: Urban family physician program(UFPP), a program for improving equity in access to, financing, and quality of health services, is piloting in two provinces of Fars and Mazandaran, Iran since 2012. This study aimed to examine the association between the implementation of program and financial protection measures.   Methods: This cross-sectional, ecological study was p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده اقتصاد و علوم اجتماعی 1390

abstract deviation or in other words committing a crime is literally a social problem. this research that was conducted in 1389 and 1390 has tried to investigate the causes of crimes committed by young male inmates qazvin central prison and effective variables on their tendency to deviation. accordingly after collecting theoretical framework and offering theoretical model including both hirsch...

2000
Sylvia Osborn Ravi Sandhu Qamar Munawer

Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general enough to simulate the traditional methods. In this paper we provide systematic constructions for various common forms of both of the tradition...

Journal: :تحقیقات کتابداری و اطلاع رسانی دانشگاهی 0
عادله اسعدی شالی دکتر معصومه باقری

purpose: clinical librarianship is a tool for evidence based medicine that intends to improve health professionals' access to information. this research, studies the feasibility of implement of clinical librarianship program in the hospital libraries of tabriz university of medical science. methodology: this paper is a descriptive research. hospital libraries of tabriz medical university a...

2016
Mehmet Soysal

Non-stationary stochastic lot sizing problem appears in many industrial environments where demand is nonstationary and stochastic, and replenishments require fixed freight fees. This paper presents the cost performance assessment of three inventory control strategies proposed for the stochastic lot sizing problem, namely Hua et al. (2008)’s strategy (HYHX), Tarim and Kingsman (2006)’s model (TK...

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

پایان نامه :0 1374

the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...

2004
Vijayalakshmi Atluri Janice Warner

The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC), comprised of three layers: coalition, role and user-object. Our model enables translation of coalition level policies to implementation level access control in a manner similar to that of the layers of the TCP/IP p...

In this paper, we present a modeling and implementation of new control schemes for an isolated photovoltaic (PV) using a fuzzy logic controller (FLC). The PV system is connected to a load through a DC-DC boost converter. The FLC controller provides the appropriate duty cycle (D) to the DC-DC converter for the PV system to generate maximum power. Using FLC controller block in MATLABTM/Simulink e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید