منابع مشابه
Protection of Archival Documents from Photochemical Eects
Purpose: The purpose of this paper is to highlight the destructive effects of light on archival documents/paper materials. The research aims to explain the mechanism of photochemical degradation and the damaging effect of light on paper. It also tells us about the measures to be adopted to control the deteriorating effects of light on paper step by step. Design/Methodology/Approach: The res...
متن کاملMETU-Emar: An Agent-Based Electronic Marketplace on the Web
In this paper, we describe a scenario for a distributed marketplace on the Web where resource discovery agents find out about resources that may want to join the marketplace and electronic commerce is realized through buying agents representing the customers and the selling agents representing the resources like electronic catalogs. We propose a possible architecture which is based on the emerg...
متن کاملElectromagnetic Induction of Ultrasonic Waves: Emat, Emus, Emar
Electromagnetic induction of ultrasonic waves is restricted to conducting materials – like eddy current testing – because it involves inducing eddy currents in the surface of the part by a nearby coil of wire. A magnetic field supplied by a nearby magnet interacts with this eddy current to produce a mechanical force on the surface to excite ultrasonic vibrations. The same configuration of coil ...
متن کاملUsability Evaluation of An Electronic Medication Administration Record (eMAR) Application.
BACKGROUND Electronic medication administration records (eMARs) have been widely used in recent years. However, formal usability evaluations are not yet available for these vendor applications, especially from the perspective of nurses, the largest group of eMAR users. OBJECTIVE To conduct a formal usability evaluation of an implemented eMAR. METHODS Four evaluators examined a commercial ve...
متن کاملDocuments from malicious terminals
The user wishes to communicate with a remote partner over an insecure network using a terminal. Cryptographic algorithms running on the terminal may provide authenticity for the user’s messages. In this paper the problem of sending authentic messages from untrusted terminals is analyzed. If attackers are able to gain total control over the terminal, the user must consider the terminal a potenti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Orient
سال: 1993
ISSN: 1884-1392,0473-3851
DOI: 10.5356/orient1960.29.139