نتایج جستجو برای: secured
تعداد نتایج: 6557 فیلتر نتایج به سال:
With the increase in structural complexities in modern cities, many operations, be they military, police, fire service, intelligence, rescue, or other field operations, require localization services and online situation awareness to make them effective. The digital data collected from such systems are sensitive hence security concerns regarding the transmission of such digital data across secur...
In U.S. data 1981–2012, unsecured firm credit moves procyclically and tends to lead GDP, while secured firm credit is acyclical; similarly, shocks to unsecured firm credit explain a far larger fraction of output fluctuations than shocks to secured credit. In this paper we develop a tractable dynamic general equilibrium model in which unsecured firm credit arises from self-enforcing borrowing co...
A Database Synchronization Algorithm for Mobile Devices proposes an ISAMD (Improved Synchronization Algorithms based on Secured Message Digest) algorithm based on Secured Message Digest and efficient synchronization in order to facilitate data synchronization between a server-side database and a mobile database. The ISAMD algorithm makes the images at the server-side database and the mobile dat...
The chief aim of information security is to protect an organization's precious resources, for instance information related to emails, passwords, ATM cards and Credit cards etc. , Quantum key distribution (QKD) offers an unconditionally secured means of communication based on the laws of Quantum Mechanics. Let us look into the available information from our some of our scientists from their...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید