نتایج جستجو برای: security needs
تعداد نتایج: 415429 فیلتر نتایج به سال:
This paper presents an evolutionary approach to the sensor management of a biometric security system that improves robustness. Multiple biometrics are fused at the decision level to support a system that can meet more challenging and varying accuracy requirements as well as address user needs such as ease of use and universality better than a single biometric system or static multimodal biometr...
increasing academic and professional language demands around the world are not a deniable fact. the purpose of this study was to investigate english language needs and communication needs of the chemistry students at master and ph.d. levels at the iranian universities. in this research, different methods were used including un-structured interview, structured interview, and two sets of question...
In any given collaboration, information needs to flow from one participant to another. While participants may be interested in sharing information with one another, it is often necessary for them to establish the impact of sharing certain kinds of information. This is because certain information could have detrimental effects when it ends up in wrong hands. For this reason, any would-be partici...
This book describes how to use biometric features such as finger prints or iris patterns to construct private keys for cryptography. It is a very interesting topic, as, nowadays, cryptographic protocols can store/produce thousands of bits of secure information, while the user needs a password to make the exchange secure. The major weakness in a cryptographic protocols is the user himself. Biome...
Objective: The purpose of this study is to present and analyze a model according to which the prediction of job satisfaction based on self-efficacy beliefs, teacher's sense of efficacy, job stress and hierarchy of needs in exceptional children's teachers is investigated. Method: To do this, 165 subjects (99 females and 66 males) among the exceptional children's teachers of elementary gr...
This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the...
In order to secure collaborative business processes, we present a methodological approach that early integrates security and risk management throughout the design process of service-oriented architectures. We develop our methodology based on two complementary axes: the first being the business needs while the second, is ensuring a consistent security between partners at the runtime. The informa...
With the increasing use of clusters in different domains, efficient and flexible security has now become an essential requirement for clusters, though many security mechanisms exist, there is a need to develop more flexible and coherent security mechanisms for large distributed applications. In this paper, we present the need for a unified cluster wide security space for large distributed appli...
The rapid development and extensive use of digital technologies, electronic mail, Internet and mobile communication systems, and electronic commerce applications lead to the collection and processing of huge amounts of personal data. The increasing reliance on the information systems conducts to the selection of security controls, that are driven by the business needs and the associated securit...
Security has always been one of the most basic needs of human and improves social interactions, personal and social peace, prosperity of the people and thus caused the improvement of society. Modern urban spaces admitting to crimes and aberrations resulting in lack of security in the city, Security Survey in urban areas is an important issue. This paper examined the impact of residents' sense o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید