نتایج جستجو برای: secure

تعداد نتایج: 56843  

Journal: :JCSE 2011
Alexandros Karakasidis Vassilios S. Verykios

Performing approximate data matching has always been an intriguing problem for both industry and academia. This task becomes even more challenging when the requirement of data privacy rises. In this paper, we propose a novel technique to address the problem of efficient privacy-preserving approximate record linkage. The secure framework we propose consists of two basic components. First, we uti...

ژورنال: Journal of Research and Health 2016

Attachment styles are considered as an important predictor of marital issues. The purpose of this study was to investigate the role of attachment styles in marital disillusionment and attitude toward infidelity. The research method was correlation. 188 teachers were selected based on measurement scale and research hypothesis by multistage cluster sampling among married teachers. Measures of adu...

ژورنال: پژوهش های مشاوره 2014
امیدیان, الهه, فلاح زاده, هاجر, نجفی, محمود,

The purpose of this study was the relationship between attachment styles and self-esteem with type D personality. 245 students (66 males & 179 females) have been selected using a cluster random sampling to fill out the adult attachment style, Rosenberg self- esteem, and type D personality questionnaires. The results show that there is a significant positive correlation between secure attachment...

Background & Aims: School indiscipline is a multi-faceted phenomenon that has many adverse effects on satisfaction from teaching and learning of students. This study examines the important antecedents theory of mind, self-regulation and emotional attachment styles in creating indiscipline behavior is. Materials & Methods: This study descriptive correlational study was conducted on junior hig...

Current study performed to predict of identity styles through attachment styles. The method of this study was descriptive in kind of correlation. The study sample included 130 students from Bu Ali Sina University, were selected using multistage cluster sampling. Attachment styles were evaluated by Hazan & shaver Adult Attachment Scale (AAS) and identity styles evaluated by berzonsky identity st...

Journal: :مهندسی برق مدرس 0
shokofe vatanpour m.sc. student, department of electrical engineering, shahrood university of technology, iran. mohammad reza jvan assistant professor, department of electrical engineering, shahrood university of technology, iran

in this paper, we consider a cooperative cognitive radio network in which there is an ofdm primary link and multiple single carrier secondary links.the primary link is required to maintain its secrecy rate above a predefined threshold. if the secrecy rate requirement is not satisfied, the secondary system help primary link to maintain its secrecy rate requirement. in doing so, the secondary trans...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

Journal: :International Journal of Security and Its Applications 2016

Abstract Background: Attachment relationship provides a secure base for the infants from which to explore the environment and a safe haven to return to in times of danger. Attachment style shapes the behavior of individuals in adulthood. There are many different measures of attachment and a lot of controversy about what they measure and how they relate to each other. Hence, we tried to evaluate...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید