نتایج جستجو برای: after receiving this alerting message

تعداد نتایج: 6974929  

Journal: :Games and Economic Behavior 2008
Kris De Jaegher

The literature on the electronic mail game shows that players’ mutual expectations may lock them into requiring an inefficiently large number of confirmations and confirmations of confirmations from one another. This paper shows that this result hinges on the assumption that, with the exception of the first message, each player can only send a message when receiving an immediately preceding mes...

2014
Shahnawaj Khan Naveen Chauhan

Vehicular ad hoc networks (VANETs) are receiving increasing attention from academics due to the various applications and potential tremendous benefits they offer for future VANET users. Safety information exchange enables lifecritical applications, such as the alerting functionality during medical emergencies, and thus, plays a key role in VANET applications. In a VANET, vehicles rely on the in...

2013
Neha Agrawal Sourabh Singh Verma

In this paper, Cryptography and Steganography techniques are combined to enhance the security level of data communication over an unsafe distributed network. The standard LSB(Least Significant Bit) steganography method is also modified by digitally signing a information of starting position of hided message in image, so that any other third person can’t determine the position of beginning of hi...

2007
Guilin Wang

Here, A and B are the identities of the two communicating parties, Alice and Bob. EncPKB (·) is the public key encryption algorithm with respect to Bob’s public key PKB, while EK(·) denotes a symmetric encryption algorithm associated with a session key K. After receiving the expected information from Alice, Bob first decrypts EncPKB (K) to get the session key K using his private key SKB, and th...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده علوم انسانی 1391

abstract the following study, in the first place, attempted to examine the effect of less experienced teachers participation in experienced teachers classes on their own skills and teaching methodology, in the second place, attempted to find out the role of teachers training in students achievements. for this purpose, 21 efl teachers were selected according to available sampling in kish l...

Journal: :trauma monthly 0
elham sepahvand department of paramedics, lorestan university of medical sciences, khorramabad, iran maryam mirzaeii department of nursing, jahrom university of medical sciences, jahrom, iran mohammad javad imanipour department of paramedics, lorestan university of medical sciences, khorramabad, iran

introduction transfusion of red blood cells is a key component in the resuscitation of massively hemorrhaging patients post-injury. little is known about the functional status of patients at discharge or the outcome of patients after discharge from acute hospitalization. we assessed the changes among major trauma patients who had received massive transfusions. materials and methods this article...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1392

the present study was an attempt to compare the effect of peer metalinguistic corrective feedback on elementary and intermediate efl learners speaking ability to see which level benefits more from this type of feedback. to this end, 117 female efl learners at grade 3, al-zahra high school in kermanshah, iran were non-randomly chosen. the homogeneity of the participants was attained through a pi...

2013
Jaana Kuula Pauli Kettunen Vili Auvinen Santtu Viitanen Olli Kauppinen Tuomo Korhonen

Traditional mobile phones have been used for alerting purposes by utilizing their SMS and cell broadcasting features. They do however not suit for demanding alerting and command purposes, for the observation of special forces, rescue officers and civilians, or for the post-evaluation of the operation. Current 3G and 4G/LTE smartphones can do all this, but the empirical evidence is missing. This...

2010
T Bourcier V Borderie

after intravenous use of oral high dose Presumed ocular candidiasis in drug misusers service Email alerting the top right corner of the online article.

2008
Adam Bachorek Ivan Martinovic Jens B. Schmitt

Traditional methods for message authentication are based on the cryptographic verification of received data using some sort of a shared secret. While this task is not critical for traditional networks, Wireless Sensor Networks (WSNs) may pay a high price for the gained protection – sensor nodes are forced to invest their already scarce resources in receiving a message and executing cryptographi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید