نتایج جستجو برای: combination of data hiding and cryptography

تعداد نتایج: 24168851  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی و اجتماعی 1392

tourism , today as one of the ways to make money, create jobs , and social and political interactions is considered. this paper aims to examine the strengths and weaknesses of tourism development in mahmoud abad ( mazandaran ). the research method in this study is " descriptive - analytical " and to collection of data used field methods such as questionnaires and documentation - library. the sa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم پایه 1392

a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1389

this thesis is a study on insurance fraud in iran automobile insurance industry and explores the usage of expert linkage between un-supervised clustering and analytical hierarchy process(ahp), and renders the findings from applying these algorithms for automobile insurance claim fraud detection. the expert linkage determination objective function plan provides us with a way to determine whi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم انسانی 1391

the present study sought to investigate the impact of using mind-mapping technique instruction on female elementary efl learners reading comprehension; it also investigated their attitudes towards using mind-mapping technique as a tool to improve their reading comprehension. this study followed a quasi-experimental design with two intact groups as experimental, and control groups. the participa...

پایان نامه :دانشگاه تربیت معلم - سبزوار - دانشکده ادبیات و علوم انسانی 1389

abstract this study aimed at investigating the impact of etymology strategy instruction on the development of vocabulary of iranian intermediate efl learners. etymology, knowledge of origin of words, roots, and affixes, has proved to be a controversial issue and a question of long debate with regard to its impact on the process of vocabulary learning. this study employed etymology strategy in ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی 1393

this exploratory study aimed to investigate a possible relationship between learners’ beliefs about language learning and one of their personality traits; that is,locus of control (loc). both variables, beliefs and locus of control, are assumed to influence the language learning process. the internal control index (ici) and the beliefs about language learning inventory (balli) were administered...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی و اجتماعی 1389

today the image of a permanent skeletal space of cities affected by some forces or mechanisms is put in time with social-economic development and while imposes a new face and perspective to physical anatomy of cities, and prepares field to changes in content and social- economic structures of cities too. simultaneously with quitting villages in order to settle in cities by villagers, the phen...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی 1391

the study of air infiltration into the buildings is important from several perspectives that may be noted to energy and design of hvac systems, indoor air quality and thermal comfort and design of smoke control systems. given the importance of this issue, an experimental and numerical study of air infiltration through conventional doors and windows has been explored in iran. to this end, at fir...

2013
Ajit Singh Swati Malik

Securing data is a challenging issue in today’s era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to the eavesdropper. There arises a need of data hiding. So here we are using a combina...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید