نتایج جستجو برای: eternal security number
تعداد نتایج: 1323106 فیلتر نتایج به سال:
The use of the word “eternal” in the title of Richard Horton's piece “Occupied Palestine, an eternal alliance for health” (March 30, p 1084)1 is apt. It fits with his evangelical intentions “to put science in the service of social justice and selfdetermination.”2 However, Horton omits important data, leading to the spurious conclusion that President Obama, by disappointing the Palestinians, is ...
We present here three new solutions of Brans-Dicke theory for a stationary geometry with cylindrical symmetry in the presence of matter in rigid rotation with T μ 6= 0. All the solutions have eternal closed timelike curves in some region of spacetime the size of which depends on ω. Moreover, two of them do not go over a solution of general relativity in the limit ω → ∞. PACS number(s): 04.50+h,...
It is widely held that propositions perform a plethora of theoretical roles. They are believed to be the semantic values of sentences in contexts, the objects of attitudes, the contents of illocutionary acts, the referents of ‘that’-clauses, and the primary bearers of truth. This assumption is often combined with the claim that propositions have their truth-values eternally. Following Kaplan’s ...
Third University Department of Cardiology Aristotle University of Thessaloniki Greece e-mail: [email protected]
We argue that many future-eternal inflating spacetimes are likely to violate the weak energy condition. It is possible that such spacetimes may not enforce any of the known averaged conditions either. If this is indeed the case, it may open the door to constructing non-singular, past-eternal inflating cosmologies. Simple non-singular models are, however, unsatisfactory , and it is not clear if ...
wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...
Smartphones now-a-days are used mainly for surfing the web, checking social networks or playing games than making a phone call, which is only the fifth most frequent activity [5]. This means that users trust their smartphones to store and access sensitive data, ranging from contacts to financial details [3] (indeed 35% use their devices for online banking [2]). Moreover, a typical user now has ...
-
We consider a discrete-time dynamic problem in graphs in which the goal is to maintain a dominating set over an infinite sequence of time steps. At each time step, a specified vertex in the current dominating set must be replaced by a neighbor. In one version of the problem, the only change to the current dominating set is replacement of the specified vertex. In another version of the problem, ...
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید