منابع مشابه
No door to lock: victimization among homeless and marginally housed persons.
BACKGROUND Homeless persons experience high rates of sexual and physical assault; homeless women are thought to be at highest risk. To determine the prevalence, distribution, and factors associated with sexual and physical assault, we surveyed homeless and marginally housed adults in San Francisco, Calif. METHODS We interviewed 2577 respondents about their history of recent sexual and physica...
متن کاملIntrabody Communication Using Different Ground Configurations in Digital Door Lock
Intrabody communication (IBC) is a new way of transferring data using human body as a medium. Minute current can travel though human body without any harm. IBC can remove electrical wires for human area network. IBC can be also a secure communication network system unlike wireless networks which can be accessed by anyone with bad intentions. One of the IBC systems is based on frequency shift ke...
متن کاملAn Advanced Door Lock Security System using Palmtop Recognition System
Biometric technology is used to identify a person based on his/her physical behavioral characteristics. One of the extensive uses of biometric technology is a fingerprint recognition system. The technology has broad use mainly for its easiness, reliability and accuracy in human identification process. This paper presents work done on minutiae based palmtop recognition system for automatic door ...
متن کاملOn modeling door-to-door parcel delivery services in Iran
Parcel delivery is a complex logistic service, as it serves many small or medium-sized customers who may send or receive parcels. Modeling such delivery system needs to integrate two different research areas of hub location and vehicle routing. As it totally depends on the network and the linkage of the nodes, in this paper, some door-to-door service providers are taken into account to provide ...
متن کاملDon't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy
There is growing operational awareness of the challenges in securely operating IPv6 networks. Through a measurement study of 520,000 dual-stack servers and 25,000 dual-stack routers, we examine the extent to which security policy codified in IPv4 has also been deployed in IPv6. We find several high-value target applications with a comparatively open security policy in IPv6 including: (i) SSH, T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Archives of Internal Medicine
سال: 2003
ISSN: 0003-9926
DOI: 10.1001/archinte.163.20.2492