نتایج جستجو برای: Iran’s UI scheme

تعداد نتایج: 227480  

ژورنال: :علوم اقتصادی 2015
رضا افقی رامیار ابن عباس

abstract employees always concern about losing their job, or in other word, losing their income resources. for this purpose, governments require strong protection system for covering these concerns. the unemployment insurance (ui) program’s can be used for achieving this goal. based on article five of iranian unemployment insurance law, premium is four percent of employee’s salary while emplo...

2015
Min Zhang Miquel Faig Shouyong Shi Michael Reiter Giovanni L. Violante

a r t i c l e i n f o a b s t r a c t If entitlement to UI benefits must be earned with employment, generous UI is an additional benefit to working, so, by itself, it promotes job creation. If individuals are risk neutral, then there is a UI contribution scheme that eliminates any effect of UI on employment decisions. As with Ricardian Equivalence, this result should be useful to pinpoint the e...

2015
Rafal Demkowicz-Dobrzański Lorenzo Maccone

FIG. 1. Quantum metrology strategies. The maps Λφ encode the parameter φ to be estimated. (i) sequential scheme: Λφ acts n times sequentially on N/n input probes ρ (this is an entanglement-free classical scheme) ; (ii) entangled parallel scheme: an entangled state of N probes ρN goes through N maps Λφ in parallel; (iii) passive ancilla scheme: the N probes are also entangled with M noiseless an...

Journal: :Computers & Security 2002
Chi-Kwong Chan Lee-Ming Cheng

Recently, J.-J. Shen, C.-W. Lin and M.-S. Hwang (Computers & Security, Vol 22, No 7, pp 591-595, 2003) proposed a modified Yang-Shieh scheme to enhance security. They claimed that their modified scheme can withstand the forged login attack and also provide a mutual authentication method to prevent the forged server attack. In this paper, we show that the Shen-Lin-Hwang scheme cannot resist the ...

Journal: :IACR Cryptology ePrint Archive 2014
Gaurav Tiwari Amit K. Awasthi Neha Shukla

In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme using smart cards. They claimed that their scheme is secure against various attacks. In this paper, we improve their scheme for outsider attack as well as insider attack. To remedy these security flaws, an improved scheme is proposed to withstand these attacks. [1] Introduction With the rapid increasing need ...

Journal: :Babylon Nordic Journal of Middle East Studies 1970

2003
Jarmo Hiipakka Gaëtan Lorho

This paper presents a user interface (UI) designed for non-visual interaction with a music collection. The UI system can be utilized to navigate a large list of musical items organized in a hierarchical structure, and to generate personal playlists. The interface only relies on stereo audio output and tactile input using a limited small of keys. This interaction scheme enables the use of the UI...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید