نتایج جستجو برای: security model

تعداد نتایج: 2246841  

Journal: :journal of ai and data mining 2015
h. motameni

to evaluate and predict component-based software security, a two-dimensional model of software security is proposed by stochastic petri net in this paper. in this approach, the software security is modeled by graphical presentation ability of petri nets, and the quantitative prediction is provided by the evaluation capability of stochastic petri net and the computing power of markov chain. each...

Journal: :Journal of Innovation in Digital Ecosystems 2015

One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...

Journal: :journal of agricultural science and technology 2012
x. y. su j. y. wu h. j. zhang z. q. li x. h. sun

china is one of the largest grain producing and consuming nations in the world and the importance of grain security to the chinese can never be overemphasized. in this paper, we present a comprehensive early-warning model for evaluating the status of grain security in china. the model is based on the analytic hierarchy process (ahp) method and the dempster–shafer theory (dst). we divided the ri...

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

Journal: :معماری و شهرسازی آرمان شهر 0
mostafa behzadfar professor of urban design, school of architecture and environmental design, iran university of science & technology, tehran, iran. farzad abdi m.a. of urban design, school of architecture and environmental design, iran university of science & technology, tehran, iran. maryam mohammadi ph.d candidate of urban development, school of architecture and environmental design, iran university of science & technology, tehran, iran.

while different elements including social, economic and cultural elements play a vital role in the emergence of behavioral patterns in humans, one cannot ignore the influence of the physical and spatial characteristics of built environment as a back ground for occurrence of anomic behavior on committing crimes. therefore, a series of approaches and theories such as “crime prevention through env...

Amsalu Mitiku Bekabil Fufa Beyene Tadese

This study examined the status and determinants of rural households’ food security in Moyale district of pastoral area, Oromia regional state, in Ethiopia. Both secondary and primary data were used for the study. The study was based on the survey of a total of 100 farmers randomly selected using a three-stage sampling technique. Analytical tools used include descriptive statistics, Foster-Greer...

Journal: :international journal of agricultural science, research and technology in extension and education systems 2013
r. o. babatunde a. h. adenuga o. m. adenuga f. l. olagunju

this study was carried out to evaluate the ekiti state social security scheme (essss) in nigeria. specifically, the study estimated the food security status of the beneficiaries and non beneficiaries of the scheme, assessed the effect of the social security scheme on households’ food security status, and identified the constraints to the implementation of the scheme in the state. a three stage ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید