نتایج جستجو برای: protocol analysis

تعداد نتایج: 3017806  

Journal: :journal of teaching language skills 2012
mohammad rahimi

the present study-both qualitative and quantitative--explored fifty efl learners’ preferences for receiving error feedback on different grammatical units as well as their beliefs about teacher feedback strategies. the study also examined the effect of the students’ level of writing ability on their views about the importance of teacher feedback on different error types. data was gathered throug...

ژورنال: مرتع 2022

Extended Abstract Background and objectives: Google Earth images are a valuable resource for understanding and studying the natural area's ecology due to their high spatial resolution. Considering that these images have been available for many years, in our country, these valuable data have not been used enough, especially in order to study vegetation and optimal natural areas management. So, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده جغرافیا 1392

در این پژوهش به منظور برآورد تابش خالص برای مکان یابی نیروگاه های خورشیدی با پردازش تصاویر ماهواره ای در استان کردستان از دو روش sebal و روش solar analysis استفاده شده است در روش sebal از داده های تصاویر ماهواره ای مودیس 2000، 2003، 2006، 2009، 2012 داده های ساعات آفتابی در7 ایستگاه سینوپتیک در سطح استان کردستان ( داده های روزانه) و برای روش solar analysis از تصاویر دم منطقه با قدرت 30 و 90 متر...

ژورنال: ارمغان دانش 2022

  Abstract   Introduction: Domestic violence has been one of the most common social harms throughout human history and due to its widespread effect, pathology and treatment of this phenomenon has always been considered by therapists. Aim: This study aimed to investigate the efficiency of the modified protocol for trauma-focused cognitive behavioral therapy on mental distress and Immunoglobulin...

Journal: :international journal of electrical and electronics engineering 0
zoha asgharian hassan asgharian ahmad akbari bijan raahemi

increasing the popularity of sip based services (voip, iptv, ims infrastructure) lead to concerns about its ‎security. the main signaling protocol of next generation networks and voip systems is session initiation protocol ‎‎(sip). inherent vulnerabilities of sip, misconfiguration of its related components and also its implementation ‎deficiencies cause some security concerns in sip based infra...

1994
Anish Mathuria Reihaneh Safavi-Naini Peter Nickolas

We reveal instances of unsoundness, incompleteness, and redundancy in the cryptographic protocol analysis logic of Gong, Needham and Yahalom. Solutions are proposed for each of these problems. The logic is extended to formalize the use of an uncertiied key in the Yahalom protocol, and our analysis of the protocol suggests the possibility of a redundancy in the protocol.

2007
Han Gao Chiara Bodei Pierpaolo Degano Hanne Riis Nielson

We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protocol passes the analysis then it is free of replay attacks and thus preserves freshness. The analysis has been implemented and applied to a number of protocols, including both original and corrected version of Needham-Schroeder p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید