نتایج جستجو برای: bad mouthing attack

تعداد نتایج: 110943  

Journal: :iranian red crescent medical journal 0
fereshteh aein nursing faculty, shahrekord university of medical sciences, shahrekord, ir iran; nursing faculty, shahrekord university of medical sciences, rahmatieeh, shahrekord, ir iran. tel: +98-9131024581 masoumeh delaram nursing faculty, shahrekord university of medical sciences, shahrekord, ir iran

background: the manner in which healthcare professionals deliver bad news affects the way it is received, interpreted, understood, and dealt with. despite the fact that clinicians are responsible for breaking bad news, it has been shown that they lack skills necessary to perform this task. objectives: the purpose of this study was to explore iranian mothers’ experiences to receive bad news abou...

1997
Christoph Bregler Michele Covell Malcolm Slaney

Video Rewrite uses existing footage to create automatically new video of a person mouthing words that she did not speak in the original footage. Video Rewrite uses computer-vision techniques to track points on the speaker’s mouth in the training footage, and morphing techniques to combine these mouth gestures into the final video sequence. The new video combines the dynamics of the original act...

Journal: :isecure, the isc international journal of information security 0
p. rastegari department of electrical and computer engineering, isfahan university of technology, isfahan, iran m. berenjkoub department of electrical and computer engineering, isfahan university of technology, isfahan, iran

certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...

Journal: :Symmetry 2023

As a new cyber-attack method in power cyber physical systems, false-data-injection attacks (FDIAs) mainly disturb the operating state of systems by tampering with measurement data sensors, thereby avoiding bad-data detection grid and threatening security systems. However, existing FDIA methods usually only focus on feature extraction between false normal data, ignoring correlation that easily p...

2002
Timothy K. Tsai Navjot Singh

Libsafe is a practical solution that protects against the most common forms of buffer overflow attacks. Such attacks often result in granting the attacker full privileges on the target system. Libsafe is implemented as a shared library that intercepts calls to vulnerable standard library functions. Based on an inspection of the process stack and the function arguments, Libsafe ensures that no r...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده ادبیات، زبانهای خارجی و تاریخ 1388

hadafe asliye in payanname, yaftane olguyi baraye tahlile baste esteariy va chand manayi fel haye hessi dar zabane farsi ast. yafte haye pajuheshe hazer, moayyede an ast ke baste esteariye felhaye hessi dar zabane farsi, az rahgozare chand manayi , be ijade mafahime entezaei mi anjamad. dar zabane farsi basamade voghue anasore hoze haye vajeganiye mortabet ba fel haye hessi hengame sherkat jost...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید