منابع مشابه
Can a Network be Protected from Single-Packet Warhol Worms?
Can a network be protected from single-packet Warhol worms [14]? This paper generates and simulates random network environments to answer that question. The research assumes a perfect detection algorithm and varies the time required to perform the identification. Perfect detection alone is not sufficient; it must also be swift in recognizing threats as some cases presented here show that perfec...
متن کاملAnti-aging medicine: can consumers be better protected?
The use of interventions claiming to prevent, retard, or reverse aging is proliferating. Some of these interventions can seriously harm older persons and aging baby boomers who consume them. Others that are merely ineffective may divert patients from participating in beneficial regimens and also cause them economic harm. "Free market regulation" does not seem to weed out risky, ineffective, and...
متن کاملThe three screen doors: can marine "protected" areas be effective?
The great majority of marine protected areas (MPAs) fail to meet their management objectives. So MPAs can be effective conservation tools, we recommend two paradigm shifts, the first related to how they are located and the second related to how they are managed. MPAs are unlikely to be effective if they are located in areas that are subject to numerous, and often uncontrollable, external stress...
متن کاملHow can Alzheimer's Patients be Helped?
پرستاری از بیمار مبتلا به بیماری آلزایمر چندان ساده نیست. حتی اگر از این امر که اختلال رفتاری فرد نشانه ای از بیماری اوست، آگاه باشید، اکثر مواقع نمی دانید که چگونه باید با او رفتار کنید. در این مقاله روشهای مناسبی ارائه گردیده تا خانواده بیمار بتواند با ۱۰ اختلال رفتاری شایع در بیماران مبتلا بدون احساس ناامیدی و خشم سازگاری یابند.
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Vilnius University Open Series
سال: 2020
ISSN: 2669-0535
DOI: 10.15388/os.tmp.2020.11