نتایج جستجو برای: growth of task security

تعداد نتایج: 21269144  

Journal: :جغرافیا و توسعه فضای شهری 0
محسن احدنژاد روشتی رحیم غلامحسینی شاهرخ زادولی خواجه

security is fundamental right and prerequisite of upgrade welfare and health of the people. sense of security is the key issues in any society and necessary introduction for the political and social military life. sense of security was related citizens' mental sense of security and hence it accompanies many queries and issues around self about secure or insecure of it. women's are vulnerable gr...

2013
Saloni Sharma Anuj Kumar Gupta

During the past few years the emergence of Mobile adhoc networks (MANETS) and its various uses in different fields of communication has been observed. It has led to an instant growth in wireless technology. Many routing protocols have been designed and implemented for proper functioning of mobile adhoc networks. The prime objective of these routing protocols is to provide a specific and much ef...

Journal: :journal of language and translation 0
abdollah baradaran islamic azad university, central tehran branch fatemeh hashemifar islamic azad university, central tehran branch

0

Introduction For decades, various policy initiatives have been planned to achieve food security. However, the number of malnourished people is growing, especially in rural areas of developing countries. Due to the increase of extreme weather events, such as droughts, and significant depletion of water resources, achieving food security is not an easy task. Therefore, an investigation of rural...

2014
Zeineb Zhioua Stuart Short Yves Roudier

Developing and delivering secure software is a challenging task, that gets even harder when the developer tries to adhere to both application and organization-specific security requirements. Different approaches have been proposed to facilitate this task, such as code analysis that aims at detecting flaws in the developed software before it is released and deployed to customer. This paper discu...

2000
Prashant Rajvaidya Kevin C. Almeroth

Development of new multicast monitoring techniques and tools has not met demand. Most of the existing tools have only marginal utility in today's multicast infrastructure. This is the case because these tools lack the ability to handle the latest routing protocols or because they rely on application layer data like the Realtime Transport Protocol (RTP). Our goal is to develop a system that moni...

Journal: :مدیریت شهری 0
hamideh forouzangohar mostafa behzadfar farah habib seyed ahmad firouzabadi

the problem which has been the focus of city constructors and architectures since the beginning of citizenship life is the issue of the nature of environmental quality. this study, with a review of explaining paradigms of environmental quality and by reliance on basic works, has assumed the question of nature of environmental quality an interdisciplinary concept (civic construction, sociology, ...

African yam bean (Sphenostylis stenocarpa) is an underexploited legume with the potential of becoming an alternative food staple to alleviate the problem of food security. An assessment was carried out on the growth and yield of AYB affected by Telfairia mosaic virus (TeMV) Infection. Telfairia mosaic virus caused severe mosaic, leaf distortion and malformation on AYB. Analyses of results revea...

2017
Yuchen Huang Zhiyong Wu Runnan Li Helen M. Meng Lianhong Cai

Prosodic structure generation from text plays an important role in Chinese text-to-speech (TTS) synthesis, which greatly influences the naturalness and intelligibility of the synthesized speech. This paper proposes a multi-task learning method for prosodic structure generation using bidirectional long shortterm memory (BLSTM) recurrent neural network (RNN) and structured output layer (SOL). Unl...

Journal: :Journal of Computer Security 2015
Luca Spalazzi Luca Viganò

Providing high performance computing and security is a challenging task. On the one hand, Internet, operating systems and distributed environments currently suffer from poor security support and cannot resist common attacks. On the other hand, adding security measures typically degrades performance. The relationships between security and high performance computing systems thus raise a number of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید