نتایج جستجو برای: wise foundations authentication
تعداد نتایج: 90938 فیلتر نتایج به سال:
Major advances in languages, tools and methodologies have improved our ability to develop reactive systems, but the task remains difficult, expensive and error prone. One of the key reasons is the growing complexity of many kinds of reactive systems, which increasingly prevents the human mind from managing a comprehensive picture of all their relevant elements and behaviors. We present a vision...
the present paper is concerned with the structural characteristics and contents of the russian resistance poets from the outset up to the end of the world war ii, 1941-1945. regarding the linguistic and literary structures of the resistance poetry of this period, such features as changes in the lexical structure of poems, outspokenness, proximity of poetry to slogans can be easily observed. sem...
This paper presents an evolution of authentication mechanisms from textual passwords to graphical authentication mechanisms. For security concerns password must be protected from the unauthorized users. Authentication and authorization is necessary for essential data, this requires authentication mechanisms. An important goal for authentication is user has easy to memorize their passwords and r...
Behavioral Interference of Vibrating Machines Foundations Constructed on Sandy Soils (RESEARCH NOTE)
In this study, dynamic bearing capacity of adjacent shallow strip foundations located on sandy soil was examined using a numerical finite difference modeling, FLAC. The behavioral interference of shallow strip foundations under different conditions was investigated. The effect of soil strength parameters, geometric characteristics of shallow foundations and cyclic loads at different distance ra...
It is reported that every year hundreds of bridges were collapsed due to the dynamic forces acting on piers particularly during floods and scour around foundations. Since determination velocity distribution upstream pier directly related with this force, it important predict effect a presence diameter bridge turbulence parameters. In study, time variation point velocities in stream-wise vertica...
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
To improve the information authentication and network security one of the effective authentication mechanism is Biometric authentication System. But when this authentication system is a offline authentication system, in such case, it is required to secure this authentication information. In this work, a biometric watermarking based authentication system is defined to secure the authentication s...
methods and principles used in education come from diverse foundations. this paper aims at examining philosophical and psychological foundations of education based on two similar views from the west and the east: the illuminationist philosophy of suhrawardi and phenomenology of husserl. questions of the research deal with philosophical and psychological foundations of education from the standpo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید