نتایج جستجو برای: attack

تعداد نتایج: 80818  

Journal: :IOP Conference Series: Earth and Environmental Science 2021

Journal: :جستارهای ادبی 0
وحید رویانی منیره فرضی شوب

abstract bazel mashadi′s heydary attack is one of the earliest and most famous attack epics written in the twelfth century. bazel exploits the style and format of shahname in his masnavi, composed in twenty to thirty thousand verses. the poet, after chanting the praise of god, prophet and his successor (vali), verses the history of islam beginning from the prophet’s mission (be’sat) to the orde...

Sulfate attack is a series of physico-chemical reactions between hardened cement paste and sulfate ions. Sulfate ion penetration into the hydrated cement results in the formation of voluminous and deleterious phases such as gypsum and ettringite which are believed to cause deterioration and expansion of concrete. Concrete deterioration due to sulfate attack depends on many parameters, however, ...

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

In this study, the behavior of a subject consisting of a cylinder with 4 plates perpendicular to it with a rotational degree of freedom under airflow both through the numerical approach, known as improved discrete vortex and experimental approach were investigated. The experimental and numerical results have shown that oscillating regime occurs in low velocity and length. This movement is vibra...

Journal: :journal of advances in computer research 2014
iman zangeneh sedigheh navaezadeh abolfazl jafari

wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. the connection between nodes is provided by sending packages and by trusting to each other. therefore, using efficient and certain protocols is the essential requirement of these networks. due to special characteristics of wireless ad hoc networks such as lack of a fixed infrastructure, t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید