نتایج جستجو برای: is called trade secret however

تعداد نتایج: 7611914  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی 1390

with the growth of more humanistic approaches towards teaching foreign languages, more emphasis has been put on learners’ feelings, emotions and individual differences. one of the issues in teaching and learning english as a foreign language is demotivation. the purpose of this study was to investigate the relationship between the components of language learning strategies, optimism, duration o...

2006
Barbara Kraus Cyril Branciard Renato Renner

A fundamental problem in cryptography is to enable two distant parties, traditionally called Alice and Bob, to communicate in absolute privacy, even in presence of an eavesdropper, Eve. It is a well known fact that a secret key, i.e., a randomly chosen bit string held by both Alice and Bob, but unknown to Eve, is sufficient to perform this task (one-time pad encryption). Thus, the problem of se...

2012
Uttam Kr. Mondal

Embedding secret information with song signal may hamper its audible quality as well as originality also would be infringed. Therefore, passing secret code with song signal precisely needs to measure the embedded data volume with song signal within embedding tolerance level. In this paper, embedded secret data with linear coding principles has been applied, enhanced security criteria has been m...

2014
Mazhar Tayel Hamed Shawky

Data security has become an important problem in the communication systems. Steganography is used to hide existence of a secret-message. In this article a modified Steganography algorithm will be proposed depending on decomposition principle of both secret-message and cover-image. A fuzzification is performed in the secret message to optimize the decomposed coefficients before embedding in the ...

2013
C. Gayathri V. Kalpana

Steganography is a secret Communication to hide the secret Data. It is an invisible communication that hides data like text, image, and audio, video etc .The secret message is inserted into the image files. The image files can use stego-key to hide the data and the resultant image is called as stego-image. This is most important for the internet users to share their secret data in an efficient ...

Journal: :اقتصاد و توسعه منطقه ای 0
بنت الهدی عسکری مریم شفیعی کاخکی

regional agreements can facilitate the integration of world economies by opening the borders to the trade development while accelerating technological changes and maintaining the economic growth. trade potential is defined as the trade that could be achieved at an optimum trade frontier with the open and frictionless trade possible through regional agreements based on the current level of trade...

2013
Ming-Hong Tsai Chaur-Chin Chen

Information security becomes more and more important while the internet communication grows up. The secret image sharing technique, called (k, n) threshold scheme, is a useful method to protect our secret. This technique distributes a secret image to n shadow images preserved by n participants, respectively and we can only reveal the secret image by collecting at least k out of n shadow images....

Journal: :JDCTA 2010
Thekra Abbas Zou Beiji

In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system. In this paper, a novel approach to VSS based on the use of pseudo random number generator (PRNG) that has very long ...

Lin Chen Wenjilng Fu Yanyun Zhao Yao Wei

China and ASEAN have been maintaining a relationship both cooperative and competitive in the textile trade. Due to its labor intensive feature and high dependence on foreign trade , the textile trade has received much attention after the 2008 financial crisis. The customs data (classified by the HS code) from year 2006-2009 is employed to research the impact of the crisis on the trade pattern o...

Journal: :Dialogia Iuridica 2022

This study aims to determine the category of agreement on confidentiality Trade Secret Information in perspective contract law, Good Faith Criteria, and Legal Consequences for Disclosure Secrets Confidentiality Agreement. Study results: (1). The based its arrangement includes an anonymous (not regulated Civil Code); according method preparation including standard agreements (determined unilater...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید