نتایج جستجو برای: security analysis

تعداد نتایج: 2963315  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

Journal: :iau international journal of social sciences 2013
abolghasem heidarabadi zahra najafi

the aim of this study is to investigate the role of security in social deviations among women of babol city. descriptive survey research method was used and the unit of analysis is 15-29 year old women that 284 women are selected on the basis of cochran formula and using multi-stage random cluster sampling. the results show that there is a weak significant relationship between the independent v...

بیگی, ملیحه, جهانبخش, مریم, حسن زاده, اکبر, کریمی, سعید,

Background and purpose: Today, with the advent of electronic medical record system (EMRS) the security and confidentiality of information ought to be reasonably considered. The purpose of this study was to assess the privacy and security requirements for implementation of EMRS in all hospitals in Isfahan in 2014. Materials and methods: An analysis framework was used in an applied study perform...

Zahra Ghanbari

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده ادبیات و علوم انسانی 1388

چکیده ندارد.

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

Journal: :مطالعات حقوق خصوصی 0
احد قلی زاده استادیار گروه حقوق دانشکدۀ علوم اداری و اقتصادی دانشگاه اصفهان

after considering the security for costs as a rarely considered establishment and analyzing legal points and problems concerning that security which is located among the articles on provisional remedy, and after having a look at the security for costs against foreign claimants, present research analysis brings the security for costs in probate matters as its main subject into focus to the exten...

Journal: : 2021

In this work, we discuss in detail a flaw the original security proof of W-OTS${^+}$ variant Winternitz one-time signature scheme, which is an important component for various stateless and stateful many-time hash-based digital schemes. We update scheme derive corresponding level. Our result importance analysis

In this study, the impact of youth identity crisis is investigated on the national security of the Islamic Republic of Iran. The research method is qualitative; the library method is used for data collection; and data analysis is carried out with descriptive-analytical method. The main research question is how does the identity crisis in youth affect the national security of the Islamic Republi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید