نتایج جستجو برای: keywords notional security
تعداد نتایج: 2121554 فیلتر نتایج به سال:
Complex control applications require capabilities for accommodating faults in the controlled plant. Fault accommodation involves the detection and isolation of faults, and then taking appropriate control actions to mitigate the fault effects and maintain control. This requires the integration of fault diagnostics with control in a feedback loop. This paper discusses a generic framework for buil...
This essay introduces a new featured section, to be published in Small Axe annually, that explores the critical vocabulary of field Caribbean studies.
Cash transfer (CTs) is an increasingly popular social protection mechanism used by many developing countries to improve the food security and nutritional status of lower socio-economic groups. This paper is a review of the literature regarding the impact of CT programs on the food security of recipient households in the developing countries, including Iran. We looked for all original studies...
Creating and remembering strong passwords is essential to ensure overall system security. This paper presents two studies that evaluate acronym based passwords and system generated passwords in terms of memorability and user perception. Keywords—Password Security, Authentication, Human Factors
Abstract “Queer” is a relatively recent and somewhat controversial term in African studies. Yet it proving to be productive, not only for understanding subjectivities of sexuality gender, but also situating Africa’s position the larger economy knowledge. Otu van Klinken explore productive tensions between “queer” “Africa,” aim read Africa as queer from Africa. Thus, rather than imagining polar ...
This paper is to investigate the impplementation of security mechanism in object oriented database system. Formal methods plays an essential role in computer security due to its powerful expressiveness and concise syntax and semantics. In this paper, both issues of specification and implementation in database security environment will be considered; and the database security is achieved through...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید