نتایج جستجو برای: full electronic original check and substituted electronic check principally
تعداد نتایج: 16894470 فیلتر نتایج به سال:
As a result of the 1984 Data Protection Act, British health authorities have been reviewing and revising their policies and codes of practice on confidentiality and associated issues to conform to the standards enunciated in the Act. Detailed guidelines are given here that are suitable for securing electronically held data--the only type of data protected by the law. Clinicians are advised to...
today, the route for economic development in most countries is the same as international open competitive economy. economic institutes well known that supportive public economy belonged on the past and they may compete in the global economy. it is obvious that if they have no competitive potency or not familiar with competition technique, they may be devastated. banking system aims to collect t...
Introduction: Electronic Continuous Medical Education (CME) is not common in Iran. Considering the convenience of virtual education and availability of essential infrastructure for virtual CME, it is important to understand opinions of medical practitioners about this method. This study aims to evaluate the opinions of physicians participating in CME programs of Shahid Sadoughi University of M...
This paper deals with optimized channel coding for OFDM transmissions (COFDM) over frequency-selective channels using irregular low-density parity-check (LDPC) codes. Firstly, we introduce a new characterization of the LDPC code irregularity called “irregularity profile.” Then, using this parameterization, we derive a new criterion based on the minimization of the transmission bit error probabi...
Design of ultra-lightweight authentication protocols for RFID systems conformed with the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security. Recently, Maurya et al. have proposed a CRC based authentication protocol and claimed that their protocol can resist against all known attacks in RFID systems. However, in this paper we show that their protocol is vulnerable to...
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very basic security tools such as a 16-bit Pseudo-Random Number Generator and a 16-bit Cyclic Redundancy Code. Recently two EPCGen2 compliant protocols that address security issues were proposed in the literature. In this pa...
the electronic structure and properties of the osmaabenzenes and para substituted osmabenzenes have been explored using the hybrid density functional mpw1pw91 theory. systematic studies on the substituent effect in para substituted osmabenzenes complexes have been studied. the following substituents were taken into consideration: h, f, ch3,oh, nh2,cn, no2, cho, and cooh. basic measures of aroma...
Product channel codes are proposed to protect progressively compressed and packetized images for noisy channels. Within packets, the product code uses the concatenation of a rate compatible punctured convolutional code and an error detecting parity check code. Across packets, Reed-Solomon codes are used. Beneets include exible choice of delay, adaptability of error protection level (i.e., unequ...
Product channel codes are proposed to protect progressively compressed and packetized images for noisy channels. Within packets, the product code uses the concatenation of a ratecompatible punctured convolutional code and an error detecting parity check code. Across packets, Reed–Solomon codes are used. Benefits include flexible choice of delay, adaptability of error protection level (i.e., une...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید