نتایج جستجو برای: media access control

تعداد نتایج: 1852182  

Journal: :journal of advances in computer research 2013
somayeh rahmani ahmad khademzadeh amir masoud eftekhari moghadam

in recent years, many researchers have been done in the area of wireless sensornetworks that has led to the variety of algorithms and methods for the collection andtransmission of environment information; but still many challenges faced bywireless sensor networks using methodologies are applied in various fields. such asmedia access control that due to the media being shared on these networks, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1392

critical thinking ability has an important role in education. accordingly, scholars around the world are searching for new ways for teaching and improving students critical thinking ability. in line with the studies in efl contexts supporting the positive relationship between critical thinking and writing performances, this study investigated the differential effects of halverson’s critical thi...

2012
Po-Yao Huang

With the increasing demand of wireless communication and the fact of under utilization of wireless spectrum, a lot of researches have developed technologies to enhance the efficiency of spectrum utilization. The spectrum allocation chart by the Federal Communications Commission (FCC) (NTIA, 2003) indicates high degree legislation of frequency band, in other words, our sky is quite crowded. Howe...

2001
STEFANO BASAGNI

This chapter deals with the problem of designing and effectively utilizing wireless communication channels. Since the wireless medium is inherently a shared resource, controlling channel access becomes a central theme that determines the fundamental capacity of the wireless network and has a dramatic impact on system complexity and cost. Therefore, our primary focus will be the design and imple...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

Journal: :International Journal of Advances in Scientific Research and Engineering 2019

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

2008
Michael Toomim Xianhang Zhang James Fogarty Nathan Morris

Managing privacy of online content is difficult. We present a simple social access control where sharers specify test questions of shared knowledge, such as “what is our school mascot,” instead of creating authenticated accounts and specifying explicit access control rules for all potential accessors. This demo will let attendees interact with our Facebook prototype. We will also explain prior ...

Journal: :New Media & Society 2017
Paul Hodkinson

This article considers young people’s identities and privacy on social network sites through reflection on the analogy of the teenage bedroom as a means to understand such spaces. The notion therein of intimate personal space may jar with the scope and complexity of social media and, particularly, with recent emphasis on the challenges to privacy posed by such environments. I suggest, however, ...

2012
Sameer Patil Yann Le Gall Adam J. Lee Apu Kapadia

The increasing inclusion of location and other contextual information in social media applications requires users to be more aware of what their location disclosures reveal. As such, it is important to consider whether existing access-control mechanisms for managing location sharing meet the needs of today’s users. We report on a questionnaire (N = 103) in which respondents were asked to specif...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید