نتایج جستجو برای: security order

تعداد نتایج: 1066303  

Journal: :Games and Economic Behavior 2010
Joseph Y. Halpern

The relationship between Popper spaces (conditional probability spaces that satisfy some regularity conditions), lexicographic probability systems (LPS’s) [Blume, Brandenburger, and Dekel 1991a; Blume, Brandenburger, and Dekel 1991b], and nonstandard probability spaces (NPS’s) is considered. If countable additivity is assumed, Popper spaces and a subclass of LPS’s are equivalent; without the as...

Journal: :CoRR 2013
Subra Mukherjee Karen Das

Driven by the significant advancements in technology and social issues such as security management, there is a strong need for Smart Surveillance System in our society today. One of the key features of a Smart Surveillance System is efficient human detection and counting such that the system can decide and label events on its own. In this paper we propose a new, novel and robust model: “The Ome...

2000

In lowering the age at which a pension is payable from 70 to 67 as of January 1, lQi3, Norway introduced a flexible retirement test that is unique in social security legislation. The new test permits persons aged 67-60 who wish to continue working on a less-than-full-time basis to claim a partial pension if the sum of pension and earnings does not exceed 80 percent of former earnings. A similar...

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

Journal: :مطالعات حقوق خصوصی 0
حسن بادینی

social security of iran has passed different stages and today has entered the stages of organizational development and universal coverage. but this system, like other man-made systems, has inadequacies which must be rectified. in this article, legal system of iran has been studied from legal point of view and necessary proposals have been presented in order to remove these defects: main axis of...

Journal: :international journal of information science and management 0
prof. dr. m. e. mohammadpourzarandi central branch of azad university, tehran, iran r. tamimi north tehran branch of azad university, iran

nowadays, world wide web has become a popular medium to search information, business, trading and so on. various organizations and companies are also employing the web in order to introduce their products or services around the world. therefore e-commerce or electronic commerce is formed. e-commerce is any type of business or commercial transaction that involves the transfer of information acro...

Journal: :مدیریت اطلاعات سلامت 0
حمید سپهردوست استادیار، اقتصاد، دانشکده ی اقتصاد و علوم اجتماعی، دانشگاه بوعلی سینا، همدان، ایران الهام رجبی کارشناس ارشد، اقتصاد، دانشکده ی اقتصاد و علوم اجتماعی، دانشگاه بوعلی سینا، همدان، ایران

introduction: iran's social security organization provides hospital services through direct treatment system (hospitals owned by the organization) and indirect treatment system (purchasing of hospital services and other health care services from other providers). the current research aims to assess technical performance and determine the relationship between activity size and efficiency level o...

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید