نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1381

زردآلو بعنوان یکی از مهمترین میوه های مناطق معتدله ، هزاران سال است که در دامنه کوه ها در آسیا و حداقل دو هزار سال دراروپا کشت و پرورش می یابد. ایران بعنوان یکی از خاستگاههای زردآلوهای وحشی و زراعی مطرح است. آینده زردآلو به عنوان یک عنصر اصلی در صنعت میوه کاری ایران بستگی کامل به اصلاح زردآلو و دستیابی به ارقام جدید دارد.از آنجائی که دسترسی محققان به ژرم پلاسم غنی زردآلوی بومی ایران که بطور کام...

Journal: :isecure, the isc international journal of information security 0
a. sedaghatbaf school of computer engineering, iran university of science and technology, tehran, iran m. abdollahi azgomi school of computer engineering, iran university of science and technology, tehran, iran

quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. however, an important question arises with respect to the accuracy of input parameters. in practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

Journal: :سیاست 0
نبی الله ابراهیمی

explanation and evaluation of the book “rational choice and security studies, stephen walt and its critics”, edited by brown owen and lynn josomiller, has taken place in fact in the direction of exploration of the knowledge of security studies in international relations. in terms, examination of walt’s rational choice approach, and the formal-mathematical model, can help us to present a clear a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1391

this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...

Journal: :journal of ai and data mining 2015
h. motameni

to evaluate and predict component-based software security, a two-dimensional model of software security is proposed by stochastic petri net in this paper. in this approach, the software security is modeled by graphical presentation ability of petri nets, and the quantitative prediction is provided by the evaluation capability of stochastic petri net and the computing power of markov chain. each...

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید