نتایج جستجو برای: keywords victim
تعداد نتایج: 1984901 فیلتر نتایج به سال:
The study of victims domestic violence is an urgent issue. To eradicate intra-family violence, we must investigate not only the identity perpetrator, but also victim, forget. Since victim and perpetrator have a close relationship connections with each other. Analyzing it possible to classify them by age; gender; role status; moral psychological characteristics; severity crime from which ...
A hierarchical framework is proposed to address the issues of modeling different type of words in keyword spotting (KWS). Keyword models are built at various levels according to the availability of training set resources for each individual word. The proposed approach improves the performance of KWS even when no training speech is available for the keywords. It also suggests an easier way to co...
boolean byte class double else extends final finally float if implements int interface long native new private public return short static super synchronized this throw throws transient try void volatile while ( ) [ ] { } ; , . = Figure 1: Java keywords.
This paper compares the risk factors for becoming a victim of two types of phishing: high-tech phishing (using malicious software) and low-tech phishing (using e-mails and telephone calls). These risk factors are linked to possibilities for situational crime prevention. Data from a cybercrime victim survey in the Netherlands (n=10,316) is used. Based on routine activity theory, the multivariate...
Today with the rapid growth of telecommunications equipment, electronic and developing more and more networks of power, influence of electromagnetic waves on one another has become hot topic discussions. So in this article, this issue and appropriate mechanisms for EMC operations have been presented. First, a source of alternating current (50 Hz) and a clear victim in a certain distance from th...
The aim of this paper is to explore the security issues that significantly affect the performance of Mobile Adhoc Networks (MANET)and limit the services provided to their intended users. The MANETs are more vulnerable to Distributed Denial of Service attacks (DDoS) because of their properties like shared medium, dynamic topologies etc. A DDoS attack is a coordinated attempt made by malicious us...
A defense strategy against denial-of-service attacks is to trace the source of every attack packet for the sake of penalizing the attacker or isolating him from the network. An IP traceback scheme proposed by the authors suggests that routers notify the victim of their presence in the attack path by inserting traceback information on routed packets. With the received information, the victim ini...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید