نتایج جستجو برای: keywords taxonomy
تعداد نتایج: 2003616 فیلتر نتایج به سال:
Many cities in the Global South are structurally different from Northern, particularly American, on which much of urban sociology’s conceptual apparatus has been based. Thus, depicting them terms a standard vocabulary risks imposing an inappropriate way seeing. We need that is able to accommodate their experience. This special issue contributes work building vocabulary. select five keywords soc...
The idea of software clones is linked with similarity, which can occur at various levels of abstraction. Simple clones i.e. clones at lower levels of abstraction are classified in literature, however; high level clones are not. We propose and exemplify a consolidated yet novel taxonomy of high level clones. Our discussion augments thus far knowledge of high level clone types and their specializ...
Parallel programming models exist as an abstraction of hardware and memory architectures. There are several parallel programming models in commonly use; they are shared memory model, thread model, message passing model, data parallel model, hybrid model, Flynn’s models, embarrassingly parallel computations model, pipelined computations model. These models are not specific to a particular type o...
Cloud computing has started to gain acceptance for adoption and implementation among organizations, however, this new technology area has already started to deal with security, performance and availability challenges. Within Cloud Security issues being paramount for the corporates, private enterprises, the denial of service attacks are rated as the highest priority threat to the cloud environme...
Signaling System 7 (SS7) defines the network architecture, configuration and message transport protocol for Public Telephone Networks (PTNs). SS7 was originally designed for a closed telecommunications community, and therefore possesses limited authentication facilities. Deregulation coupled with PTN convergence with the Internet and wireless networks significantly increase vulnerabilities, ena...
Vehicular Ad-hoc Networks (VANETs) are the most prominent enabling network technology for Intelligent Transportation Systems(ITS).VANETs provides many new exciting applications and opportunities albeit transportation safety and facilitation applications are their core drivers. Security of vehicular networks remains the most significant concern in VANETs deployment – because it is mandatory to a...
Introduction: Multiple choice questions (MCQs) are widely used to assess medical residents. The study aims to analyse MCQ exams of medical residents administered at Kermanshah University of Medical Sciences during 2008-2012. Method: Data of this retrospective study were extracted from 63 MCQ exams including 9600 tests. Quantity related variables included discrimination index, difficulty level, ...
This review summarizes about the actinobacteria and their capability to produce bioactive secondary metabolites. Actinobacteria are of special biotechnological interest since they are known to produce chemically diverse compounds with a wide range of biological activity. This distinct clade of Gram-positve bacteria include some of the key antibiotic producers and are also sources of several bio...
Emergency management is increasingly dependent on networks for information gathering, coordination and physical system control, and consequently is increasingly vulnerable to network failures. A cyber attack could cause such network failures intentionally, so as to impede the work of first responders and maximise the impact of a physical emergency. We propose a taxonomy of existing and potentia...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید