نتایج جستجو برای: Security Needs

تعداد نتایج: 415429  

Abolghasem Haydarabadi Bahareh Arjomand Siapoush Eshaq Arjmand Siapoush

This paper tries to study the role of social  factors in the explanation of vandalism among high school students in Andimeshk. Focusing on the social security. Through survey study more than 300 ones were selected by Cochoran Formula. After gathering he data through questionnaire, they were analyzed by Pearson Coefficient Correlation, Variance Analysis test, Multi-variable regression and path a...

Journal: :Procedia - Social and Behavioral Sciences 2011

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

With the advent and development of the Internet of Things, new needs arose and more attention was paid to these needs. These needs include: low power consumption, low area consumption, low supply voltage, higher security and so on. Many solutions have been proposed to improve each one of these needs. In this paper, we try to reduce the power consumption and enhance the security by using SPGAL, ...

Journal: :IACR Cryptology ePrint Archive 2008
Anoop M. S.

The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and digital certificates that are used to achieve data protection during data transfer. The paper also discusses the security require...

ستاری فر, محمد,

The history of human societies has been and will be concomitant with concerns such as hunger, unemployment, poverty, disability, losing parents, accidents and catastrophes, being stranded, health and medical care needs. These concerns and the like have become the focus of serious attention of individuals, societies, governments, parties as well as diverse intellectual tendencies and value syste...

2002
Sunil Hattangady Chris Davis

Introduction..................................................................... Security Strata................................................................. Low-Level Security Needs.......................................... Mid-Level Security Needs .......................................... High-Level Security Needs......................................... A Security Platform................

Journal: :معماری و شهرسازی 0
قاسم مطلبی استادیار دانشکده معماری پردیس هنرهای زیبا، دانشگاه تهران فاطمه خدادادی آق قلعه کارشناسی ارشد معماری، دانشگاه سوره، تهران علی اکبری دانشجوی دکتری معماری، دانشگاه آزاد اسلامی واحد تهران مرکزی، تهران

security is one of the most important human needs. researchers believe that the need for security has a strong and close relationship with the physical characteristics of the environment and people’s satisfaction. to study the relationship between security and environmental (physical and social) satisfaction, ‘’cpted’’ approach and its principals in design and environmental planning and urban l...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید