نتایج جستجو برای: security model

تعداد نتایج: 2246841  

Journal: :International Journal of Engineering & Technology 2017

Journal: :اقتصاد و توسعه کشاورزی 0
مهدی اعظم زاده شورکی صادق خلیلیان

providing of food products for increasing population, enhancing food security, increasing of production and foreign incomes are among the major program purposes of each country and monetary policies are one of the methods that immediately affected on food price and on major agriculture variables. time series analysis was used for studying the impacts of monetary policies effect on food price in...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1394

اگرکیفیت معلم کلاس برای بهبودیادگیری دانش آموزحیاتی است،پس کیفیت اساتیددانشجو-معلمان، یابه عبارتی معلمین معلمان نیزبرای پیشرفت آموزش بسیارمهم واساسی است.ناگفته پیداست که یک سیستم مناسب آموزش معلمان ،معلمین با کیفیتی را تربیت خواهدکرد.که این کار منجربه داشتن مدارس خوب، ودرنتیجه نیروی کارماهرتروشهروندبهتربرای جامعه خواهدشد. اساتیددانشجو-معلمان نقشی بسیارمهم را در سیستم اموزش معلمان درسراسرجهان ای...

2001
Carl E. Landwehr Constance L. Heitmeyer John D. McLean

2 Military systems that process classified information must operate in a secure manner; that is, they must adequately protect information against unauthorized disclosure, modification, and withholding. A goal of current research in computer security is to facilitate the construction of multilevel secure systems, systems that protect information of different classifications from users with diffe...

, ,

Background: Social Security Organization with more than 40 million insured people, supplies therapeutic services to nearly fifty percent of the country’s population. This volume of service needs a good update and on line planning, organizing, coordination, staffing, and budgeting. Electronic health is improving day to day and is a good tool in helping the Social Security Organization in conduct...

Journal: :international journal of smart electrical engineering 2013
saber talari mahmoud reza haghifam ali akhavein

in this paper, a stochastic two-stage model is offered for optimization of the day-ahead scheduling of the microgrid. system uncertainties including dispatchable distributed generation and energy storage contingencies are considered in the stochastic model. for handling uncertainties, monte carlo simulation is employed for generation several scenarios and then a reduction method is used to d...

2006
Gavin Keighren Alan Bundy Alessandro Cimatti Marco Roveri Roberto Cavada

Devices which operate on sensitive data are becoming an ever-increasing part of our lives, and we are placing a continually growing amount of trust in them. However, their ability to provide the proper level of data protection is typically only checked through analysis by hand. This method cannot be known to be complete, and as a result it can be possible to obtain data which should remain secr...

Journal: :CoRR 2016
Yonatan Sompolinsky Aviv Zohar

We revisit the fundamental question of Bitcoin's security against double spending attacks. While previous work has bounded the probability that a transaction is reversed, we show that no such guarantee can be effectively given if the attacker can choose when to launch the attack. Other approaches that bound the cost of an attack have erred in considering only limited attack scenarios, and in fa...

Journal: :Collection "Information technology and security" 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید