نتایج جستجو برای: security analysis

تعداد نتایج: 2963315  

Journal: :تحقیقات اقتصاد و توسعه کشاورزی ایران 0
حشمت اله سعدی دانشیار دانشکدة کشاورزی، دانشگاه بوعلی سینا مینو عزیزی کارشناس ارشد ترویج کشاورزی و توسعة روستایی موسی اعظمی استادیار دانشکدة کشاورزی، دانشگاه بوعلی سینا

food security means that all people at all times have access to sufficient food, healthy and nutritious. food security is a necessity for rural development. the main purpose of this study is survey of the role of extension education on food security of farmer households in qorveh county (kurdistan province). the research is an applied type in which descriptive method has been employed. populati...

Journal: :مدیریت فناوری اطلاعات 0
محمدرضا تقوا استادیار دانشکده مدیریت و حسابداری، دانشگاه علامه طباطبایی، تهران، ایران ماندانا ایزدی کارشناس ارشد رشته مدیریت فناوری اطلاعات، دانشگاه علامه طباطبایی، تهران، ایران

the advantages and special characteristics of service oriented architecture and expansion of employing such architecture have brought security topics which are different in some cases from the security principles of traditional information systems. in this article our aim is the examination of various indices of security and the presentation of strategies for security in information systems by ...

Amsalu Mitiku Bekabil Fufa Beyene Tadese

This study examined the status and determinants of rural households’ food security in Moyale district of pastoral area, Oromia regional state, in Ethiopia. Both secondary and primary data were used for the study. The study was based on the survey of a total of 100 farmers randomly selected using a three-stage sampling technique. Analytical tools used include descriptive statistics, Foster-Greer...

Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the  gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...

Journal: :the modares journal of electrical engineering 2016
mustafa gholami gvrvg gharehpetian mohammad mohammadi

due to the high penetration of wind farms in the networks, they can have a significant role in the control of power systems. in this paper, wind farms (wfs) are used to improve the static security margins of the power system. generation rescheduling is one of the remedies to improve the static security margins of the power system. in this paper, the generation rescheduling is presented based on...

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2022

The requirement for safe computer systems becomes more obvious as tasks are automated and computers used to hold sensitive data. As applications being deployed accessible across unsecured networks like the Internet, this is becoming obvious. Governments, businesses, financial institutions, millions of daily users now depend heavily on Internet. Computer provide assistance a wide range operation...

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the  gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید