نتایج جستجو برای: especially security needs
تعداد نتایج: 778134 فیلتر نتایج به سال:
social happiness is one of the humanity’s most necessary innate needs and which plays a crucial role in the sublimity of individuals and society. reaching this would occur once individual has either physical or mental health. one of the effective factors in increasing the amount of individuals’ social happiness especially in women is providing them with mental dimension of security e.g. felling...
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
With the advent and development of the Internet of Things, new needs arose and more attention was paid to these needs. These needs include: low power consumption, low area consumption, low supply voltage, higher security and so on. Many solutions have been proposed to improve each one of these needs. In this paper, we try to reduce the power consumption and enhance the security by using SPGAL, ...
In the past, the majority of the computer security officers had difficulty in convincing management to allocate financial resources for IT security. However, with the emergence of electronic commerce and varied legislation, organisations appear to have understood the necessity for computer security, especially data security. Currently, in most organisations, security officers focus on IT securi...
This presentation will discuss the need for national-level organizational strategies to effectively combat cyber security threats and cybercrime. In many countries, new agencies have been established and/or new roles have been allotted to existing agencies to cope with the needs for cyber security or fighting against cybercrime. The two pillars of organizational structure and functions (i.e., s...
The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and digital certificates that are used to achieve data protection during data transfer. The paper also discusses the security require...
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
In football industry, the sports managers should include meeting of demands and needs of spectators on their agenda. However, this study aimed to determine the needs of spectators in Iranian Football Premier League. For this purpose, Kansei engineering method, Kano model, and Taguchi method were used to collect data. First, the emotional needs (41 needs) of spectators were identified. Using Kan...
The history of human societies has been and will be concomitant with concerns such as hunger, unemployment, poverty, disability, losing parents, accidents and catastrophes, being stranded, health and medical care needs. These concerns and the like have become the focus of serious attention of individuals, societies, governments, parties as well as diverse intellectual tendencies and value syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید