نتایج جستجو برای: قواعد یورک آنتورپ 2004

تعداد نتایج: 134580  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم و معارف قرآن کریم - دانشکده علوم قرآنی تهران 1388

چکیده گر چه روش تفسیر موضوعی قرآن دارای ریشه ای کهن است، اما روشی نو پدید در حوزه ی تفسیر قرآن محسوب می شود و اخیراً مفسران بسیاری به نگارش هایی در این زمینه دست زده اند. تفسیر موضوعی آیت الله جوادی آملی، یکی از تفاسیر برجسته ی عصر حاضر است که به سبب غنای علمی، مورد توجه اندیشمندان اسلامی واقع شده است. تفسیر موضوعی استاد جوادی آملی که بر اساس مبانی تفسیری وی به انجام رسیده است، شامل مبانی عامی...

Journal: :Brazilian journal of biology = Revista brasleira de biologia 2015
M Ferrareze M G Nogueira

This study aimed to understand how the introduction of Cichla kelberi in Rosana Reservoir (Paranapanema River) affected the native ichthyofauna. Data on the structure of the small fish fauna assemblage were obtained before and after the introduction of this carnivorous species. Samplings were carried out in February and September of 2004, previously to the register of Cichla kelberi in the rese...

Journal: :I. J. Network Security 2011
Mina Malekzadeh Abdul Azim Abdul Ghani Subramaniam Shamala Jalil M. Desa

Despite current 802.11i security protocol, wireless networks are vulnerable to Denial of Service (DoS) attacks. Sending a continuous stream of forgery control frames by an attacker can easily flood wireless channel so that the network cannot be available for its associated users. These attacks are possible because wireless control frames do not carry any cryptographic mechanism to detect and di...

2006
Jaesung Park Beomjoon Kim Iksoon Hwang

IEEE 802.11i standard specifies full authentication and preauthentication for secure handoff in 802.11 wireless LAN (WLAN). However, the full authentication is too slow to provide seamless services for handoff users, and preauthentication may fail in highly populated WLANs where it is highly probable that the cache entry of a preauthenticated user is evicted by other users before handoff. In th...

2004
Alan Marshall Wenzhe Zhou

The security mechanisms available in 802.11WLANs are considered to be extremely vulnerable to malicious attacks. This paper proposes a policy-based architecture to protect 802.11 WLANs against Distributed Denial of Service (DDoS) attacks. The architecture proposed is based on the 802.1X standard, which forms the basis of the Robust Security Network (RSN) framework. The main focus of our work is...

2003
Arie van Deursen Jean-Marie Favre Rainer Koschke Juergen Rilling

A large amount of research is devoted to software evolution and program understanding, but these topics are often neglected in software engineering curricula. The CCSE initiative from IEEE/ACM proposes guidelines for the future. At the ICSM’02 conference, a panel was held to establish what should be taught in the future. This working session focuses on what is being taught and what will be taug...

Journal: :J. Inf. Sci. Eng. 2017
Jinho Ahn

This paper presents a new sender based message logging (SBML) protocol to tolerate simultaneous failures by using the beneficial features of FIFO group communication links effectively. The protocol can lift the inherent weakness of the original SBML by replicating the log information of each message sent to a process group into the volatile storages of its members. Therefore, even if only one p...

2009
P. Karthikeyan

Six lines and five testers were crossed in line x tester fashion and the F1s were evaluated under coastal saline situation. The ratio between the estimates of additive and dominance variances indicated preponderance of nonadditive gene action for the characters namely, plant height, number of productive tillers, boot leaf length, panicle length, grain weight per primary panicle and grain yield ...

Journal: :Computational Linguistics 2005
Laura Kallmeyer

This article addresses the problem that the expressive power of tree-adjoining grammars (TAGs) is too limited to deal with certain syntactic phenomena, in particular, with scrambling in freeword-order languages. The TAG variants proposed so far in order to account for scrambling are not entirely satisfying. Therefore, the article introduces an alternative extension of TAG that is based on the n...

2011
D. N. Chaudhari

This paper is a brief survey of IEEE 802.11i based WPA2 or Wi-Fi protected Mode protocol popularly called as Wi-Fi Protected Access (WPA) Mode Protocol. In this paper we tried our best to include all possible information about WPA from trusted sources in a very precise manner. Apart from the above the paper also explores wireless networking standards in brief so that one can become familiar wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید