نتایج جستجو برای: keywords notional security
تعداد نتایج: 2121554 فیلتر نتایج به سال:
Visual Cryptography (VC), proposed by Naor and Shamir, has numerous uses, including visual authentication and identification, image encryption and steganography for security purpose, and. In this paper Contrast the visual information based on pseudo randomization and pixel reversal using sigmoid function is also proposed. Keywords— Information hiding, Information Security, Halftone image, Visua...
abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
The spread of software services through the Internet has increased the importance of software security. Security patterns is a tool that helps developers, architects and security specialists utilize security experts’ knowledge and standardize how they respond to security threats. Security patterns contain recurring solutions about security problems. However, there is a possibility that develope...
Wireless Sensor Network are special kind of Ad-hoc networks. There are number of application for wireless sensor networks like military, healthcare and civil areas and security is important for many of them. However WSN suffers from many constraints like low computation capability, small memory, limited energy resources, lack of infrastructure which impose security challenge. Traditional securi...
In this paper we present several proofs on the extension of M. Riesz fractional integration and di¤erentiation to the contexts of spaces of homogeneous type and measure metric spaces with non-doubling measures. 1. Introduction, some de nitions, and a basic lemma Professor M. Ash asked me to write a survey article on some of the results that Stephen Vági and I obtained in the nineties on fractio...
The article emphasizes specific features of the Soviet film avant-garde 1920s. Whereas Western version did not trust physical reality, abandon it. On contrary, domestic turned its attention to surrounding reality and used it as building blocks new art. A historical becomes a artistic reality. In cinema, rejection past, which is traditional for art avant-garde, means theatrical cup-and-saucer pl...
A conceptual model is presented for building elements to enable performance simulation. The proposal enshrines three interrelated subsystems. The first two are concerned with constraints and performance requirements respectively as notional entities and the third with physical objects related to buildings, e.g. elements. The notional subsystem for representing the performance requirements compr...
Until recently it would have been unusual to consider classifying population movements and refugees as security problem. However, efforts at shaping our world to make ourselves secure have paradoxically led to ever greater insecurity. The feeling of uncertainty, pertinent throughout all discourses of security, has led to the creation of security production into seemingly benign routines of ever...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید