نتایج جستجو برای: 2004 although
تعداد نتایج: 786390 فیلتر نتایج به سال:
Background: This study attempted to investigate traffic accident fatalities during 2004-2009 and the effect of fuel rationing on traffic accident fatalities . Materials and Methods: This was a cross-sectional study on available data of all traffic accident fatalities in Fars Province, Iran, during 2004-2009. To identify and fit the best model, various instruments, including the...
Abstract Not Available
 Bangladesh Journal of Medical Science Vol.20(1) 2021 p.5-10
In determining the seismic performance of reinforced concrete (RC) structures in national and international earthquake regulations, it is desired to use effective section stiffness cracked RC structural elements during design phase. Although not constant, depends on parameters such as strength reinforcement ratio. this study, beam models with different strength, tensile compression ratios were ...
This study aimed to understand how the introduction of Cichla kelberi in Rosana Reservoir (Paranapanema River) affected the native ichthyofauna. Data on the structure of the small fish fauna assemblage were obtained before and after the introduction of this carnivorous species. Samplings were carried out in February and September of 2004, previously to the register of Cichla kelberi in the rese...
Despite current 802.11i security protocol, wireless networks are vulnerable to Denial of Service (DoS) attacks. Sending a continuous stream of forgery control frames by an attacker can easily flood wireless channel so that the network cannot be available for its associated users. These attacks are possible because wireless control frames do not carry any cryptographic mechanism to detect and di...
IEEE 802.11i standard specifies full authentication and preauthentication for secure handoff in 802.11 wireless LAN (WLAN). However, the full authentication is too slow to provide seamless services for handoff users, and preauthentication may fail in highly populated WLANs where it is highly probable that the cache entry of a preauthenticated user is evicted by other users before handoff. In th...
The security mechanisms available in 802.11WLANs are considered to be extremely vulnerable to malicious attacks. This paper proposes a policy-based architecture to protect 802.11 WLANs against Distributed Denial of Service (DDoS) attacks. The architecture proposed is based on the 802.1X standard, which forms the basis of the Robust Security Network (RSN) framework. The main focus of our work is...
A large amount of research is devoted to software evolution and program understanding, but these topics are often neglected in software engineering curricula. The CCSE initiative from IEEE/ACM proposes guidelines for the future. At the ICSM’02 conference, a panel was held to establish what should be taught in the future. This working session focuses on what is being taught and what will be taug...
This paper presents a new sender based message logging (SBML) protocol to tolerate simultaneous failures by using the beneficial features of FIFO group communication links effectively. The protocol can lift the inherent weakness of the original SBML by replicating the log information of each message sent to a process group into the volatile storages of its members. Therefore, even if only one p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید