نتایج جستجو برای: private speech

تعداد نتایج: 216352  

Abdollah Moossavi, Enayatollah Bakhshi, Seyed Basir Hashemi Younes Lotfi Zahra Jeddi

Background: Variability in speech performance is a major concern for children with cochlear implants (CIs). Spectral resolution is an important acoustic component in speech perception. Considerable variability and limitations of spectral resolution in children with CIs may lead to individual differences in speech performance. The aim of this study was to assess the correlation between auditory ...

Guita Movallali,

Objectives: This paper studies the effect of Persian Cued Speech on the perception of Persian language phonemes and monosyllabic words with and without sound in hearing impaired children. Cued Speech is a sound based mode of communication for hearing impaired people that is comprised of a limited series of hand complements and the normal pattern of speech. And it is shown that it effectively ca...

2002
Päivi Kallio Jarkko Holappa Pavel Ivanchev

Attacks against the information flowing on the Internet cause a serious security threat nowadays, and force the developers to consider the system security aspects. This paper presents the use and suitability of Virtual Private Networks (VPNs) in the prevention of security breaches. An Open Service Gateway Initiative (OSGi) platform is presented and integration with VPN is studied as a case stud...

2015
Gail Truman Jaime Henderson

This poster session describes the selection criteria and process used for evaluating three repository software offerings and cloud platforms, with pros and cons. It describes implementation of workflows, representations of PREMIS metadata for objects in the repository, documenting fixity checks performed on datastreams, mapping of “rights” elements in DC datastreams to PREMIS “rightsExtension” ...

2002
Nikos Manouselis Demetrios Sampson

In this paper, we present a multi-criteria decision aid methodology optimizing the performance of Service Provider Agents in a Virtual Private Network, according to the Specifications posed by the Foundation for Intelligent Physical Agents (FIPA). We enhance the basic protocol steps for a service brokering procedure, and apply the methodology to a specific case of Network Providers: the Interne...

Journal: :RFC 2005
Benson Schliesser Thomas D. Nadeau

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes Textual ...

2003
Gustav Rosenbaum William Lau Sanjay Jha

VPN services has been around for decades but it did not get wide-spread usage until recently. A combination of new VPN technologies, network technologies and business communication requirements are the driving force behind the VPN services. This survey gives an overview of the recent approaches of VPN solutions and compare their scalability and flexibility aspects. The survey also categorises V...

Journal: :Telematics and Informatics 2014
Cheng-Yuan Ku Pei-Chen Sung Wen-Huai Hsieh

Although the policy of the separation of dispensing from the medical practice (SDMP) has been promoted by the Department of Health (DOH) in Taiwan for many years, it has never been significantly successful. Instead of transferring prescriptions to the insurance-contracted pharmacy (ICP) in the community, most of the patients still fill their prescriptions in the hospital or clinic. This is beca...

2002
Michael Altenhofen Joachim Schaper

This paper provides an overview on a German lighthouse research project called L3 in the area of e-learning systems that supply e-learning services via a virtual private network. More specifically this paper focuses on a new approach of meta-tagging learning elements to enable the flexible execution of courses depending on the individual learning style of the student. The notion of a content ag...

Journal: :CoRR 2013
Osuolale Abdulrahamon Tiamiyu

Though objectives of trusted routing and virtual private networks (VPN) data transfer methods are to guarantee data transfer securely to from senders to receivers over public networks like Internet yet there are paramount differences between the two methods. This paper analyses their differences.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید