نتایج جستجو برای: order and security

تعداد نتایج: 16911382  

Journal: :Social Choice and Welfare 2008
Rebeca A. Echávarri Iñaki Permanyer

In this paper, we present an innovative approach for ranking profiles of capability sets on the basis of equity. An interesting way of capturing the notion of equity is to take into account the extent to which each of the different functioning vectors is shared by the population under consideration (of size n). This is done by defining the ‘common capability sets’ enjoyed by k individuals as th...

Journal: :New Global Studies 2021

Abstract In this essay we argue for the utility of moving from a “national” to an “entangled global” perspective on security. Focusing post-1945 international context, discuss how concept “globality” can inform and reframe our understanding transnational security dynamics help move us beyond traditional state-centric frameworks. Such enables better historical events contemporary than classical ...

Journal: :مدیریت اطلاعات سلامت 0
حمید سپهردوست استادیار، اقتصاد، دانشکده ی اقتصاد و علوم اجتماعی، دانشگاه بوعلی سینا، همدان، ایران الهام رجبی کارشناس ارشد، اقتصاد، دانشکده ی اقتصاد و علوم اجتماعی، دانشگاه بوعلی سینا، همدان، ایران

introduction: iran's social security organization provides hospital services through direct treatment system (hospitals owned by the organization) and indirect treatment system (purchasing of hospital services and other health care services from other providers). the current research aims to assess technical performance and determine the relationship between activity size and efficiency level o...

Journal: :international journal of travel medicine and global health 0
peter p. felkai head of department, travel medicine chair, internal medicine faculty, debrecen medical school, hungary

the massive restrain security measurements at the airports very much impress the health status of the healthy and sick passengers alike. the security check is undisputedly a harassment – the confiscation of fluids, the limited movement on the airplane results in a stressful situation and put a harmful effect on healthy traveler and an even more harmful one on the sick. this kind of problem coul...

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

,

Background: In specific criminal law, security crimes are of special importance for the whole society and the country due to their harmful effects on the public. One of these cases is the study of evidence in crimes against security that the manner and method of detection and investigation of perpetrators of crimes against security is different from other crimes. The purpose of explaining the c...

,

Background: In specific criminal law, security crimes are of special importance due to their harmful effects on the whole society and the country. One of the reasons for studying crimes against security is that the way and method of discovering and investigating the perpetrators of crimes against security is different from other crimes. The purpose of explaining the limitations and deviations f...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1388

abstract sensitive and precise voltammetric methods for the determination of trace amounts of furaldehydes, mainly as furfural (f) and 5-hydroxymethyl-2-furaldehyde (hmf), in waste waters and other matrices is described. determination of total furaldehyde at < ?g g-1 levels in alkaline buffered aqueous media was individually investigated. by the use of ordinary swv and adsorptive square wave ...

1994
S. W. Smith J. D. Tygar

Partial order time expresses issues central to many problems in asynchronous distributed systems, but suffers from inherent security and privacy risks. Secure partial order clocks provide a general method to develop application protocols that transparently protect against these risks. Our previous Signed Vector Timestamp protocol provides a partial order time service with some security: no one ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید