نتایج جستجو برای: have always brought about security challenge
تعداد نتایج: 3825509 فیلتر نتایج به سال:
Due to special conditions of Iran; i.e., neighboring to major centers of drug production in Afghanistan during the last few decades, it was the passageway of the drug to Europe. Moreover, because of appropriate context of social, economic and cultural situations, there was an increased addiction and drug trafficking in Iran. It is obvious that a lot of people would be involved directly and indi...
INTRODUCTION The diagnosis and management of gastrointestinal bleeding have always been a challenge to clinicians. In most patients, the source of bleeding is easily identified during conventional upper and/or lower gastrointestinal endoscopies. A significant progress in the evaluation of patients with obscure gastrointestinal bleeding was brought by the advent of capsule endoscopy. Since colon...
The new millennium has brought about an increase in the use of business intelligence and knowledge management systems. The very foundations of these systems are the multitude of source databases that store the data. The ability to derive information from these databases is brought about by means of data integration. With the current emphasis on security in all walks of information and communica...
VANET are becoming active area of research and devel- opment because it has potential to increase road safety, convenience and comfort to drivers & passengers. A Lot of research work on VANET have done in area of Quali- ty of Service (QoS), routing and security. These concepts relate the facing challenges for technology in VANET. We present a overview of challenges in VANET. Firstly ,we have di...
Sensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes etc. However, wireless sensor networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the network...
this study focuses on jane austens representation of her heroines in two of her novels: pride and prejudice, and mansfield park. i have concentrated only on a single idea: how jane austen takes her heroines through a course of psychogical reformation to which almost everything else in her novel is subsidiary. although i have discussed only pride and prejudice, we can trace austens carefully pla...
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
Web services enable application integration and data sharing in a platform neutral, language independent environment for both business and science. This increases the degree of exposure of critical resources which poses new challenges to securing data and service. The existing technologies such as VPN, firewall, NAT and SSL are examples of either intra-corporate domain or point-to-point solutio...
this study attempts to investigate the effect of peers’ revision in comparison to that of the teacher, and whether peers’ comments and teachers’ comments facilitate students’ revision? if yes, which one is more effective? also attempts have been made to see which aspects of language are more highlighted by peers versus teachers when commenting. besides, it is investigating the student’s attitud...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید