نتایج جستجو برای: after receiving this alerting message
تعداد نتایج: 6974929 فیلتر نتایج به سال:
The literature on the electronic mail game shows that players’ mutual expectations may lock them into requiring an inefficiently large number of confirmations and confirmations of confirmations from one another. This paper shows that this result hinges on the assumption that, with the exception of the first message, each player can only send a message when receiving an immediately preceding mes...
Vehicular ad hoc networks (VANETs) are receiving increasing attention from academics due to the various applications and potential tremendous benefits they offer for future VANET users. Safety information exchange enables lifecritical applications, such as the alerting functionality during medical emergencies, and thus, plays a key role in VANET applications. In a VANET, vehicles rely on the in...
In this paper, Cryptography and Steganography techniques are combined to enhance the security level of data communication over an unsafe distributed network. The standard LSB(Least Significant Bit) steganography method is also modified by digitally signing a information of starting position of hided message in image, so that any other third person can’t determine the position of beginning of hi...
Here, A and B are the identities of the two communicating parties, Alice and Bob. EncPKB (·) is the public key encryption algorithm with respect to Bob’s public key PKB, while EK(·) denotes a symmetric encryption algorithm associated with a session key K. After receiving the expected information from Alice, Bob first decrypts EncPKB (K) to get the session key K using his private key SKB, and th...
abstract the following study, in the first place, attempted to examine the effect of less experienced teachers participation in experienced teachers classes on their own skills and teaching methodology, in the second place, attempted to find out the role of teachers training in students achievements. for this purpose, 21 efl teachers were selected according to available sampling in kish l...
introduction transfusion of red blood cells is a key component in the resuscitation of massively hemorrhaging patients post-injury. little is known about the functional status of patients at discharge or the outcome of patients after discharge from acute hospitalization. we assessed the changes among major trauma patients who had received massive transfusions. materials and methods this article...
the present study was an attempt to compare the effect of peer metalinguistic corrective feedback on elementary and intermediate efl learners speaking ability to see which level benefits more from this type of feedback. to this end, 117 female efl learners at grade 3, al-zahra high school in kermanshah, iran were non-randomly chosen. the homogeneity of the participants was attained through a pi...
Traditional mobile phones have been used for alerting purposes by utilizing their SMS and cell broadcasting features. They do however not suit for demanding alerting and command purposes, for the observation of special forces, rescue officers and civilians, or for the post-evaluation of the operation. Current 3G and 4G/LTE smartphones can do all this, but the empirical evidence is missing. This...
after intravenous use of oral high dose Presumed ocular candidiasis in drug misusers service Email alerting the top right corner of the online article.
Traditional methods for message authentication are based on the cryptographic verification of received data using some sort of a shared secret. While this task is not critical for traditional networks, Wireless Sensor Networks (WSNs) may pay a high price for the gained protection – sensor nodes are forced to invest their already scarce resources in receiving a message and executing cryptographi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید