نتایج جستجو برای: enhancement of security structures

تعداد نتایج: 21213857  

Journal: :IEEE Transactions on Image Processing 2019

Journal: :JCS 2014
V. Kaviha V. Kannan S. Ravi

Real-time data packet sources are required to remain robust against different security threats. This study proposes a real-time secure scheduling strategy for data transmission to enhance the communication throughput and reduce the overheads. The proposed system combines real-time scheduling with security service enhancement, error detection and realtime scheduler based on EDF algorithm using u...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

seismic retrofit strategies have been developed in the past few decades following the introduction of new seismic provisions and the availability of advanced materials and methods. it can be observed that new approaches to deal with more lateral forces are more innovative and more energy absorbent. in line with this, there is a growing trend toward the use of steel shear walls as a system with ...

Anuj Kumar Agarwal P.K Singh Rohit Sharma

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

Anuj Kumar Agarwal P.K Singh Rohit Sharma

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

2014
D. N. Rewadkar Sampurna Khot

The real-time applications with security requirements are emerging in various areas including government, education and business. However conventional real-time scheduling algorithms failed to fulfill the security requirements of real-time applications. In this paper, a GAIA methodology that analyses and design multi-agent system. This methodology combines the functionality of real time schedul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید