نتایج جستجو برای: telecommunication system
تعداد نتایج: 2237004 فیلتر نتایج به سال:
امروزه می توان شبکه های umts یا به عبارتی شبکه های نسل سوم موبایل را جایگزین مناسبی برای ارسال اطلاعات در شبکه های سیمی دانست. نیاز به گسترش شبکه های موبایل و دسترسی کاربران به اینترنت باعث توسعه شبکه های بی سیم موبایل قدیمی همانند gsm و ایجاد شبکه های نسل 5/2 و یا همان شبکه های gprs که با بهبود سرعت و کیفیت زیر ساخت شبکه های موبایل، نسل سوم موبایل و یا همان umts گردیده است. یکی از چالش های ا...
چکیده ندارد.
چکیده ندارد.
Aspects of a draft version of the Aeronautical Telecommunications Network (ATN) Standards and Recommended Practices (SARPs) under development by ISO-compliant committees of the International Civil Aviation Organization (ICAO) have been mathematically modelled using a formal description technique. The ATN SARPs are a specification for a global telecommunications network for air traffic control s...
With increasing use of information systems, many organizations are outsourcing information security protection to a managed security service provider (MSSP). However, diagnosing the risk of an information system requires special expertise, which could be costly and difficult to acquire. The MSSP may exploit their professional advantage and provide fraudulent diagnosis of clients’ vulnerabilitie...
Information security is one of the top problems of business executive and information system managers alike. Pervasive use of information technology in all aspects of business today as well as highlighted need for regulatory compliance calls for analysis of information systems in their entirety – going beyond technical aspects and considering people and organizations as well. In my dissertation...
This paper concentrates on analyzing and discussing the basic secure service: key management (PKey). By adding a security service layer, PKey is carefully built on the base of a routing and location layer to simple the application development. According as the layered architecture of PKey, some key protocols of PKey, which include key producing, retrieving and transferring, are designed and ana...
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage , a...
With the evolution of IoT embedded devices and their broad application, security has become crucial. Security comes at a cost to these limited devices in terms of energy. However, evaluating security cost is not straightforward, as there are many factors involved, such as the employed security services and type of hardware. This research studies the impact of duty cycle protocols on security co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید