نتایج جستجو برای: detection as precautious measures

تعداد نتایج: 6127465  

2015
Mitra Nasri Gerhard Fohler

In many industrial systems, design complexity is partly reduced by the use of non-preemptive message passing or execution. Doing so, context switch overheads are diminished and resource sharing mechanisms are simplified. However, in a mixedcriticality system, long blocking time caused by non-preemptive execution of a task which has lower priority than some other high criticality (HC) tasks migh...

Software defects detection is one of the most important challenges of software development and it is the most prohibitive process in software development. The early detection of fault-prone modules helps software project managers to allocate the limited cost, time, and effort of developers for testing the defect-prone modules more intensively.  In this paper, according to the importance of soft...

2016
Pedlow

in England. The course thus adopted cut short the rather animated discussions of the Home papers on the subject, and for the present the question as to the best means, direct and indirect, of protecting the soldier from the effects of unavoidable exposure to heat is left in the stage of theory. Under these circumstances Indian experiences might reasonably be expected to afford a clue to the pre...

2016
G. H. Fink

110 physical signs or symptoms which could trace the ascites to any derangement of these organs. Owing to dyspnoea it was considered expedient to tap the abdomen and draw away the ascitic fluid, which was accordingly done with a trocar and canula in the liuea alba after first emptying the bladder by passing a female catheter. The usual precautious were taken, and the fluid drained away graduall...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1388

abstract sensitive and precise voltammetric methods for the determination of trace amounts of furaldehydes, mainly as furfural (f) and 5-hydroxymethyl-2-furaldehyde (hmf), in waste waters and other matrices is described. determination of total furaldehyde at < ?g g-1 levels in alkaline buffered aqueous media was individually investigated. by the use of ordinary swv and adsorptive square wave ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1391

regarding the ever evolving and improving world on different aspects of knowledge, the need to a worldwide communication would emerge stronger than ever before which calls for special attention on the judgments and best choices for intermediating between the nations. as the language skills for translation are tested separately from translation skills themselves, to assess translation skills pro...

Journal: :Journal of Banking & Finance 2002

Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ similarities considering the network communications of the users. In the first step, similarity ...

2002
Artemios G. Voyiatzis Dimitrios N. Serpanos

Active hardware attacks succeed in deriving cryptographic secrets from target devices. They were originally proposed for systems implementing RSA, Fiat-Shamir scheme, and Schnorr’s scheme.Common targets for these attacks are systems used for client authentication in order to access services, e.g., pay-per view TV, video distribution and cellular telephony. These client systems hold secrets, typ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید