نتایج جستجو برای: telecommunication system

تعداد نتایج: 2237004  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی امیرکبیر(پلی تکنیک تهران) - دانشکده مهندسی کامپیوتر 1386

امروزه می توان شبکه های umts یا به عبارتی شبکه های نسل سوم موبایل را جایگزین مناسبی برای ارسال اطلاعات در شبکه های سیمی دانست. نیاز به گسترش شبکه های موبایل و دسترسی کاربران به اینترنت باعث توسعه شبکه های بی سیم موبایل قدیمی همانند gsm و ایجاد شبکه های نسل 5/2 و یا همان شبکه های gprs که با بهبود سرعت و کیفیت زیر ساخت شبکه های موبایل، نسل سوم موبایل و یا همان umts گردیده است. یکی از چالش های ا...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1387

چکیده ندارد.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده فنی و مهندسی 1388

چکیده ندارد.

1997
James H. Andrews Nancy A. Day Jeffrey J. Joyce

Aspects of a draft version of the Aeronautical Telecommunications Network (ATN) Standards and Recommended Practices (SARPs) under development by ISO-compliant committees of the International Civil Aviation Organization (ICAO) have been mathematically modelled using a formal description technique. The ATN SARPs are a specification for a global telecommunications network for air traffic control s...

Journal: :Journal of Telecommunications and the Digital Economy 2015

2013
Ping Fan Ke Kai Lung Hui Wei T. Yue

With increasing use of information systems, many organizations are outsourcing information security protection to a managed security service provider (MSSP). However, diagnosing the risk of an information system requires special expertise, which could be costly and difficult to acquire. The MSSP may exploit their professional advantage and provide fraudulent diagnosis of clients’ vulnerabilitie...

2006
Dmitry Zhdanov

Information security is one of the top problems of business executive and information system managers alike. Pervasive use of information technology in all aspects of business today as well as highlighted need for regulatory compliance calls for analysis of information systems in their entirety – going beyond technical aspects and considering people and organizations as well. In my dissertation...

2003
Shijie Zhou Zhiguang Qin Jinde Liu

This paper concentrates on analyzing and discussing the basic secure service: key management (PKey). By adding a security service layer, PKey is carefully built on the base of a routing and location layer to simple the application development. According as the layered architecture of PKey, some key protocols of PKey, which include key producing, retrieving and transferring, are designed and ana...

1999

A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage , a...

2018
Sultan Alharby Jeff Reeve Alex Weddell Nick Harris

With the evolution of IoT embedded devices and their broad application, security has become crucial. Security comes at a cost to these limited devices in terms of energy. However, evaluating security cost is not straightforward, as there are many factors involved, such as the employed security services and type of hardware. This research studies the impact of duty cycle protocols on security co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید