نتایج جستجو برای: heterogeneous security complex
تعداد نتایج: 1059368 فیلتر نتایج به سال:
The evolution journey of optical network (ON) towards heterogeneous and flexible frameworks with high order applications is continued from the last decade. Furthermore, prominence security, amount transmitted data, bandwidth, dependable presentation are heightened. performance ON degraded in view various natures attacks at physical layer, such as service disrupting access to carrier data. In de...
Heterogeneous clustered sensor networks (HCSNs) help meet the cost, lifetime, and scalability requirements of real applications. However, the security solution should be reconsidered for their unique properties, such as uneven resources and innetwork processing. In this paper, we provide a resource oriented security solution (ROSS) to protect the network connectivity of HCSNs. ROSS is a robust ...
determination of uranium in natural water and complex solutions using ion exchange chromatography: a combined procedure using ion exchange chromatography and uv-vis spectrophotometry techniques has been developed to measure uranum in natural water and complex solutions. after conditicing , one hundred milli liters of sample solutions have been passed through an ion exchange column,pachked with ...
Knowledge transfer was the most important factors of success for organizations in today's complex and changing environment as one of aspects of knowledge management. The aim of this study was to investigate the relationship between intrinsic motivation and extrinsic motivation by transfer the employee’s knowledge in social security organizations in Kerman. The method research is descriptive and...
Secure time synchronization is one of the key concerns for some sophisticated sensor network applications. Most existing time synchronization protocols are affected by almost all attacks. In this paper we consider heterogeneous sensor networks (HSNs) as a model for our proposed novel time synchronization protocol based on pairing and identity based cryptography (IBC). This is the first approach...
Feature extraction and feature selection are the first tasks in pre-processing of input logs in order to detect cyber security threats and attacks while utilizing machine learning. When it comes to the analysis of heterogeneous data derived from different sources, these tasks are found to be time-consuming and difficult to be managed efficiently. In this paper, we present an approach for handli...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید