نتایج جستجو برای: battery and threat for security
تعداد نتایج: 19063936 فیلتر نتایج به سال:
the history of plant’s used for mankind is as old as the start of humankind. initially, people used plants for their nutritional proposes but after the discovery of medicinal properties, this natural ?ora became a useful source of disease cure and health improvement across various human communities. berberis vulgaris is one of the medicinal plants used in iranian traditional medicine. berberis ...
the disappearance of bipolar system following the disintegration of the soviet union, has also changed many strategic concepts. central asia, as a part of the soviet empire, has become an arena for regional and global challenges after these transformations. the region, already faced with various political, economic, social and cultural problems, soon became a location for the activities of isla...
cement is an essential ingredient in the concrete buildings. for production of cement considerable amount of fossil fuel and electrical energy is consumed. on the other hand for generating one tone of portland cement, nearly one ton of carbon dioxide is released. it shows that 7 percent of the total released carbon dioxide in the world relates to the cement industry. considering ecological issu...
this is an original study on the effect of a polyisobutylene – polydimethylsiloxane (pibpdms) block copolymer modifier used as an interfacial active agent on the dynamics behaviour of single newtonian drops suspended in a polyisobutylene (pib) newtonian matrix. the results were divided in two sections. the first part included the experiments carried out on the non-modified and 2% block cop...
Several papers have published very specific threats to wireless networks—specifically in the area of attacks against the IEEE 802.11 Wired Equivalency Protocol (WEP). Other papers have addressed wireless attacks based on the attack models used in wired networks. However, the different characteristics of wireless networks require looking at the threat differently. We present a Wireless Threat Ta...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید