نتایج جستجو برای: battery and threat for security

تعداد نتایج: 19063936  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1376

saluk mount is selected for devonian biostratigraphy. this area located at southwest of bojnurd. in this study three sections are selected and two sections, chahar-borj and tabar sections with a thickness of 650 m, which consist mainly of calcareous sediments was studied in detailed but third section, qelli section, with a thickness of about 450m which consist mainly of sandstone and evaporates...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1390

this study intends to investigate samuel beckett’s waiting for godot and endgame under the lacanian psychoanalysis. it begins by explaining the most important concepts of lacanian psychoanalysis. the beckettian characters are studied regarding their state of unconscious, and not the state of consciousness as is common in most beckett studies. according to lacan, language plays the sole role in ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد شاهرود - دانشکده پزشکی 1390

nitric oxide (no) is a small molecule synthesized by most of mammalian cells with diverse biological activities including vasodilatation, host defense and wound healing. impaired wound healing is a common occurrence among diabetics and patients receiving glucocorticoid therapy. on the other hand the application of laser in biomedical area have been increased. thus, the current studies were desi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی مهندسی 1385

acknowledge the importance of e-commerce to their countries and to survival of their businesses and in creating and encouraging an atmosphere for the wide adoption and success of e-commerce in the long term. the investment for implementing e-commerce in the public sector is one of the areas which is focused in government‘s action plan for cross-disciplinary it development and e-readiness in go...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1390

in current study, 63 samples of bat populations collected from differ regions were used for evaluating the geographic variations. twenty cranial and dental characters for traditional morphometric and landmarks method on the ventral, dorsal skull and mandible for geometry morphometric studies were used. statistical analyses of traditional morphometric and geometry morphometric data indicated low...

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...

Journal: :journal of health management and informatics 0
roya khalili parisa nabeiei mohamad hosein yarmohammadian shohre etemad

fire is one of the most dangerous phenomena in the world which yields main damages, healthy and economical, and is thus a major threat to hospitals. since, most of the residents in hospitals are the individuals who cannot rescue themselves in such situations, fire in hospitals is more hazardous than any other public place; hence, it can endanger several sophisticated medical equipment. therefor...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده زبانهای خارجی 1391

the speech act of disagreement has been one of the speech acts that has received the least attention in the field of pragmatics. this study investigates the ways power relations, social distance, formality of the context, gender, and language proficiency (for efl learners) influence disagreement and politeness strategies. the participants of the study were 200 male and female native persian s...

Journal: :Computers & Security 2017
Blake D. Bryant Hossein Saiedian

Network security investigations pose many challenges to security analysts attempting to identify the root cause of security alarms or incidents. Analysts are often presented with cases where either incomplete information is present, or an overwhelming amount of information is presented in a disorganized manner. Either scenario greatly impacts the ability for incident responders to properly iden...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده مهندسی 1387

abstract this paper discusses several commonly used models for strategic marketing¹ including market environmental analysis methods (i.e. swot and pest analysis) and strategic marketing tools and techniques (i.e. boston matrix and shell directional policy matrix)and shows how these models may help a firm to achieve its strategic goals. at first, the main reason for doing this research is de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید