نتایج جستجو برای: security level

تعداد نتایج: 1235388  

Journal: :مدیریت اطلاعات سلامت 0
حمید سپهردوست استادیار، اقتصاد، دانشکده ی اقتصاد و علوم اجتماعی، دانشگاه بوعلی سینا، همدان، ایران الهام رجبی کارشناس ارشد، اقتصاد، دانشکده ی اقتصاد و علوم اجتماعی، دانشگاه بوعلی سینا، همدان، ایران

introduction: iran's social security organization provides hospital services through direct treatment system (hospitals owned by the organization) and indirect treatment system (purchasing of hospital services and other health care services from other providers). the current research aims to assess technical performance and determine the relationship between activity size and efficiency level o...

Popular upheavals and regional developments in the Islamic world began in 2011, which began with the uprising of the Tunisian people, and then spread to other countries in the Arab world, including Egypt, Bahrain and Yemen. Major changes in the periphery of Iran were considered. Which affects the national security of the various countries of the region, including Iran. This paper, by descripti...

Background and Aim: Long time working with seriously ill patients and handling protective role for the patients with specific diseases makes nurses susceptible to various types of physical disorders, which can lead to mood disorders, social isolation, fatigue, anger, depression and anxiety. The aim of this study was to compare the general health level of nurses working in educational hospitals ...

associated with this condition among summer crop growers in Shoushtar Township, Khouzestan Province, Iran. This cross-sectional survey study was conducted from September 2015 to February 2017. The population consisted of summer crop farmers in the Shoushtar Township (N=850). The sample size was determined based on Morgan table (n=150). For analyzing food security level, the 18-item USDA househo...

2003
Matthew Burnside Angelos D. Keromytis

We present a minimal extension to the BSD socket layer that can improve the performance of application-level security protocols, such as SSH or SSL/TLS, by 10%, when hardware cryptographic accelerators are available in the system. Applications specify what cryptographic transforms must be applied to incoming and outgoing data frames, and such processing is applied by the operating system itself...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

2003
Giampaolo Bella Cristiano Longo Lawrence C. Paulson

A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of classical authentication protocols has become routine, but second-level protocols raise new challenges. These include the formalisation of appeals to the underlying protocols, the modification of the threat model, and the formalisat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

Journal: :پژوهش های معاصر انقلاب اسلامی 0
نبی الله ابراهیمی استادیار گروه روابط بین الملل دانشگاه تربیت مدرس سید مسعود موسوی شفائی استادیار گروه روابط بین الملل دانشگاه تربیت مدرس زینب زبیدی کارشناس ارشد روابط بین الملل دانشگاه تربیت مدرس

the purpose of this research is to examine the effect of the islamic awakening in the arabic countries of the middle east and north africa on israeli ontological security and, it's strategy ofclosure and deviationin the regional level. in other words, after occurrence of the developments, the ontological security and identity of israel faced with what challenges? this research argues that ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید