No Door to Lock

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

No door to lock: victimization among homeless and marginally housed persons.

BACKGROUND Homeless persons experience high rates of sexual and physical assault; homeless women are thought to be at highest risk. To determine the prevalence, distribution, and factors associated with sexual and physical assault, we surveyed homeless and marginally housed adults in San Francisco, Calif. METHODS We interviewed 2577 respondents about their history of recent sexual and physica...

متن کامل

Intrabody Communication Using Different Ground Configurations in Digital Door Lock

Intrabody communication (IBC) is a new way of transferring data using human body as a medium. Minute current can travel though human body without any harm. IBC can remove electrical wires for human area network. IBC can be also a secure communication network system unlike wireless networks which can be accessed by anyone with bad intentions. One of the IBC systems is based on frequency shift ke...

متن کامل

An Advanced Door Lock Security System using Palmtop Recognition System

Biometric technology is used to identify a person based on his/her physical behavioral characteristics. One of the extensive uses of biometric technology is a fingerprint recognition system. The technology has broad use mainly for its easiness, reliability and accuracy in human identification process. This paper presents work done on minutiae based palmtop recognition system for automatic door ...

متن کامل

On modeling door-to-door parcel delivery services in Iran

Parcel delivery is a complex logistic service, as it serves many small or medium-sized customers who may send or receive parcels. Modeling such delivery system needs to integrate two different research areas of hub location and vehicle routing. As it totally depends on the network and the linkage of the nodes, in this paper, some door-to-door service providers are taken into account to provide ...

متن کامل

Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy

There is growing operational awareness of the challenges in securely operating IPv6 networks. Through a measurement study of 520,000 dual-stack servers and 25,000 dual-stack routers, we examine the extent to which security policy codified in IPv4 has also been deployed in IPv6. We find several high-value target applications with a comparatively open security policy in IPv6 including: (i) SSH, T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Archives of Internal Medicine

سال: 2003

ISSN: 0003-9926

DOI: 10.1001/archinte.163.20.2492