نتایج جستجو برای: keywords victim

تعداد نتایج: 1984901  

Journal: : 2022

  The study of victims domestic violence is an urgent issue. To eradicate intra-family violence, we must investigate not only the identity perpetrator, but also victim, forget. Since victim and perpetrator have a close relationship connections with each other. Analyzing it possible to classify them by age; gender; role status; moral psychological characteristics; severity crime from which ...

Journal: :Portugaliae Electrochimica Acta 2007

Journal: :Journal of English Linguistics 2004

2013
I-Fan Chen Chin-Hui Lee

A hierarchical framework is proposed to address the issues of modeling different type of words in keyword spotting (KWS). Keyword models are built at various levels according to the availability of training set resources for each individual word. The proposed approach improves the performance of KWS even when no training speech is available for the keywords. It also suggests an easier way to co...

Journal: :Journal of Object Technology 2007
Mourad Debbabi M. Fourati

boolean byte class double else extends final finally float if implements int interface long native new private public return short static super synchronized this throw throws transient try void volatile while ( ) [ ] { } ; , . = Figure 1: Java keywords.

Journal: :CoRR 2015
Eric Rutger Leukfeldt

This paper compares the risk factors for becoming a victim of two types of phishing: high-tech phishing (using malicious software) and low-tech phishing (using e-mails and telephone calls). These risk factors are linked to possibilities for situational crime prevention. Data from a cybercrime victim survey in the Netherlands (n=10,316) is used. Based on routine activity theory, the multivariate...

2012
Diako Azizi

Today with the rapid growth of telecommunications equipment, electronic and developing more and more networks of power, influence of electromagnetic waves on one another has become hot topic discussions. So in this article, this issue and appropriate mechanisms for EMC operations have been presented. First, a source of alternating current (50 Hz) and a clear victim in a certain distance from th...

2012
Gurjinder Kaur

The aim of this paper is to explore the security issues that significantly affect the performance of Mobile Adhoc Networks (MANET)and limit the services provided to their intended users. The MANETs are more vulnerable to Distributed Denial of Service attacks (DDoS) because of their properties like shared medium, dynamic topologies etc. A DDoS attack is a coordinated attempt made by malicious us...

2005
Rafael P. Laufer Pedro B. Velloso Daniel de O. Cunha Carlos M. B. Duarte

A defense strategy against denial-of-service attacks is to trace the source of every attack packet for the sake of penalizing the attacker or isolating him from the network. An IP traceback scheme proposed by the authors suggests that routers notify the victim of their presence in the attack path by inserting traceback information on routed packets. With the received information, the victim ini...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید