نتایج جستجو برای: Heterogeneous security complex
تعداد نتایج: 1059368 فیلتر نتایج به سال:
This article enters into the debate on the link between security and identity by looking at the security context in the states surrounding the Persian Gulf, particularly Iran. Earlier scholarly works have approached security and identity separately, but lack a framework that connects them in a single account. The process tracing method offers a scientific approach to connect various notions in ...
wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...
in this thesis, we exploit a simple and suitable method for immobilization of copper(ii) complex of 4?-phenyl-terpyridine on activated multi-walled carbon nanotubes [amwcnts-o-cu(ii)-phtpy]. this nanostructure was characterized by various physico-chemical techniques. to ensure the efficiency and fidelity of copper species, the implementation of three-component strategies in click-chemistry all...
Currently, there are a large number of heterogeneous platforms. The standards of Web Services in different platforms are different and complex. Therefore, security interaction of Web services based on heterogeneous platform has become increasingly prominent. In order to realize security interaction of heterogeneous platforms, a security interactive model of Web Service based on WebSphere and .N...
peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to achieve selfprotection, the corresponding security should be provided in an optimized manner considering the constraints of heterogeneous devices and networks. In this paper, we present a Genetic Algorithms-based appr...
In this study, Mn (III) salen complex was synthesized and immobilized onto the graphene oxide, which is modified by 3-chloropropyltrimethoxy silane. Heterogeneous catalyst was characterized by X-ray diffraction, transmission electron microscopy, thermogravimetric analysis, fourier transform infrared spectra, nitrogen adsorption−desorption isotherm and atomic absorption spectroscopy. The catalyt...
The Internet of Things (IoT) introduced the possibility to connect electronic things from everyday life to the Internet, while making them ubiquitously available. With advanced IoT services, based on a trusted federation among heterogeneous IoT platforms, new security problems (including authentication and authorization) emerge. This contribution aims at describing the main facets of the prelim...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید