نتایج جستجو برای: keywords notional security

تعداد نتایج: 2121554  

2014

Visual Cryptography (VC), proposed by Naor and Shamir, has numerous uses, including visual authentication and identification, image encryption and steganography for security purpose, and. In this paper Contrast the visual information based on pseudo randomization and pixel reversal using sigmoid function is also proposed. Keywords— Information hiding, Information Security, Halftone image, Visua...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

2010
Yuki Shiroma Hironori Washizaki Yoshiaki Fukazawa Atsuto Kubo Nobukazu Yoshioka Eduardo B. Fernandez

The spread of software services through the Internet has increased the importance of software security. Security patterns is a tool that helps developers, architects and security specialists utilize security experts’ knowledge and standardize how they respond to security threats. Security patterns contain recurring solutions about security problems. However, there is a possibility that develope...

2014
Reshma Patil

Wireless Sensor Network are special kind of Ad-hoc networks. There are number of application for wireless sensor networks like military, healthcare and civil areas and security is important for many of them. However WSN suffers from many constraints like low computation capability, small memory, limited energy resources, lack of infrastructure which impose security challenge. Traditional securi...

2006
A. Eduardo Gatto

In this paper we present several proofs on the extension of M. Riesz fractional integration and di¤erentiation to the contexts of spaces of homogeneous type and measure metric spaces with non-doubling measures. 1. Introduction, some de…nitions, and a basic lemma Professor M. Ash asked me to write a survey article on some of the results that Stephen Vági and I obtained in the nineties on fractio...

Journal: :Porta Linguarum Revista Interuniversitaria de Didáctica de las Lenguas Extranjeras 2006

Journal: :Koinon 2021

The article emphasizes specific features of the Soviet film avant-garde 1920s. Whereas Western version did not trust physical reality, abandon it. On contrary, domestic turned its attention to surrounding reality and used it as building blocks new art. A historical becomes a artistic reality. In cinema, rejection past, which is traditional for art avant-garde, means theatrical cup-and-saucer pl...

2001
Murat Aygun

A conceptual model is presented for building elements to enable performance simulation. The proposal enshrines three interrelated subsystems. The first two are concerned with constraints and performance requirements respectively as notional entities and the third with physical objects related to buildings, e.g. elements. The notional subsystem for representing the performance requirements compr...

2012

Until recently it would have been unusual to consider classifying population movements and refugees as security problem. However, efforts at shaping our world to make ourselves secure have paradoxically led to ever greater insecurity. The feeling of uncertainty, pertinent throughout all discourses of security, has led to the creation of security production into seemingly benign routines of ever...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید