نتایج جستجو برای: security order

تعداد نتایج: 1066303  

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

Journal: :space ontology international journal 0
mozhgan nozari m.s graduate of urban planning, qazvin islamic azad university, faculty of urban design and planning, qazvin, iran mehrdad mazloumi assistant professor of urban design and planning, faculty of architecture and urbanism, qazvin islamic azad university, qazvin, iran esmaeil salehi associate professor of environmental planning, management and education, faculty of environment, university of tehran, tehran, iran.

since, in the same vein as public spaces, urban green spaces play a significant role in establishing social interactions in the iranian cities, security concerns need to be taken more seriously in such places than other social environments, the insufficiency of which could diminish their functional capacity. this could in turn lead to a source of subsequent difficulties in urban spaces. therefo...

,

Background: In specific criminal law, security crimes are of special importance for the whole society and the country due to their harmful effects on the public. One of these cases is the study of evidence in crimes against security that the manner and method of detection and investigation of perpetrators of crimes against security is different from other crimes. The purpose of explaining the c...

,

Background: In specific criminal law, security crimes are of special importance due to their harmful effects on the whole society and the country. One of the reasons for studying crimes against security is that the way and method of discovering and investigating the perpetrators of crimes against security is different from other crimes. The purpose of explaining the limitations and deviations f...

Journal: :Journal of Middle Eastern and Islamic Studies (in Asia) 2014

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید