نتایج جستجو برای: order and security

تعداد نتایج: 16911382  

Journal: :space ontology international journal 0
mozhgan nozari m.s graduate of urban planning, qazvin islamic azad university, faculty of urban design and planning, qazvin, iran mehrdad mazloumi assistant professor of urban design and planning, faculty of architecture and urbanism, qazvin islamic azad university, qazvin, iran esmaeil salehi associate professor of environmental planning, management and education, faculty of environment, university of tehran, tehran, iran.

since, in the same vein as public spaces, urban green spaces play a significant role in establishing social interactions in the iranian cities, security concerns need to be taken more seriously in such places than other social environments, the insufficiency of which could diminish their functional capacity. this could in turn lead to a source of subsequent difficulties in urban spaces. therefo...

2010
Karthikeyan Bhargavan Cédric Fournet Nataliya Guts

We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate chains, secure logs for multi-party games, and XML digital signatures. These applications are beyond the reach of automated cryptographic verifiers such as ProVerif, since they require some form of induction. They can be verified...

Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و - پژوهشکده علوم نانو 1392

among the low–dimensional allotropes of carbon, nanotubes and graphene have attracted very much attention from nano–science and nanotechnology specialists. they have been proposed as building blocks in nanometer device engineering. however, these structures are not defect–free. in this thesis, we focused on defective carbon nanotubes and graphene, and studied the effect of couple of very common...

In the present century, the emergence of issues such as population growth, public demand for living or working in urban centers, increasing use of land have allowed for existence of high rise residential complexes necessary in most major cities of the world. Despite their benefits and advantages, high-rise residential complexes have also given rise to some limitations and threats and have gr...

Journal: :نظریه های اجتماعی متفکران مسلمان 0
فریبا شایگان دانشیار دانشگاه علوم انتظامی امین

there are a variety of definitions about social security and threats indicating a lack of consensus on this issue, and not considering the impact of social conditions of different countries. thus, although in a scientific study considering other viewpoints can be useful, in order to be practical, we should indigenously note indigenous conditions and domestic scholar’s comments. based on this id...

Popular upheavals and regional developments in the Islamic world began in 2011, which began with the uprising of the Tunisian people, and then spread to other countries in the Arab world, including Egypt, Bahrain and Yemen. Major changes in the periphery of Iran were considered. Which affects the national security of the various countries of the region, including Iran. This paper, by descripti...

2001
Wolfram Conen Reinhold Klapsing

RDF may be considered as an application of XML intended to interoperably exchange semantics between Web applications. In its current form, this objective may be hard to reach. Even if the semantical gems hidden in the RDF/RDFS specification are precisely captured, as, for example, in the axiomatic formalizations currently available, the useabilty of RDF’s concepts and constraints is limited: RD...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید