نتایج جستجو برای: security communication

تعداد نتایج: 505280  

Journal: :علوم و فنون بسته بندی 0
مهشید رهبری مینا داوودی معصومه حق زاد

packaging is one of the most important parts of the food industry that is related to food security and it acts as a preserver that maintains the health of its content. product's packaging is the only mean of communication that absorb the attention of consumers in the store among other choices. the packaging is referred to as the silent salesman which means that it sells the product on retail sh...

Journal: :تحقیقات نظام سلامت 0
میترا مودی دانشجوی دکتری، کمیته تحقیقات دانشجویی، گروه آموزش بهداشت، دانشکده بهداشت، دانشگاه علوم پزشکی اصفهان، اصفهان، ایران. عضو هیأت علمی، گروه بهداشت عمومی، دانشکده بهداشت، دانشگاه علوم پزشکی بیرجند، بیرجند، ایران. غلامرضا شریفی راد استاد، گروه آموزش بهداشت و ارتقای سلامت، دانشکده بهداشت، دانشگاه علوم پزشکی اصفهان، اصفهان، ایران فیروزه مصطفوی استادیار، گروه آموزش بهداشت و ارتقای سلامت، دانشکده بهداشت، دانشگاه علوم پزشکی اصفهان، اصفهان، ایران محسن رضائیان استاد، گروه پزشکی اجتماعی، دانشکده پزشکی رفسنجان، دانشگاه علوم پزشکی رفسنجان، کرمان، ایران.

one of the most important challenges for researchers is deciding on how to collect their data. there are various views on using telephone interviews. conducting telephone interviews on women of 40 years old and older in isfahan about mammography screening behavior showed that it could be an appropriate method for data collection when there is a combination of effective communication process and...

2006
ISABELLA MASTROENI ROSALBA ROSSATO

ing Non-Interference

2010
Wolfgang Kastner Wolfgang Granzer

Home and Building Automation (HBA) systems are traditionally concerned with the control of heating, ventilation, air conditioning, as well as lighting and shading systems. Services from the safety and security domain are typically provided by separated, application specific subsystems. An integration with the core HBA systems is done (if at all) at the management level. Nowadays, the rising des...

2010
Kazuyuki NISHIDA Shingo ATA Hiroshi KITAMURA Masayuki MURATA

Current IP communication style is not optimized and has various problems. Sufficient security considerations (including privacy protection) are not provided. Despite the “well-known port” method being known to be inappropriate from security standpoint, it continues to be used it. The conventional belief that one node owns one IP address and communication sessions are basically multiplexed at th...

The Middle East due to communication pathway, energy sources, imperialist experiences, its cultural conflicts and geopolitic conditions, has found a realistic environment based on problems of public, national and regional security.In a way that these conditions have not led to any peace and stability in  the Middle East region. Therefore, study of process of formation of security issues in the ...

2016
S. Preethi R. Senthil Kumaran

The Internet of things (IoT) has become a significant element of next generation. IoT is a proposed development of the internet in which the objects have network connectivity able to transmit and receive data. The IoT applications such as smart homes, smart cities and health care. WSN is an important technology of IoT. Typically sensor nodes are considered resource constrained device with limit...

2010
Gabriele Costa Ilaria Matteucci

This work aims to investigate how the Security-by-Contract (SxC) paradigm, developed for providing security assurances to mobile applications, can be used for guaranteeing the security of communicating systems composed by several, heterogeneous components. These components need to communicate with each other by establishing direct, point to point connections. Direct connections can involve comp...

Journal: :Computers & Security 2013
Jordan B. Barlow Merrill Warkentin Dustin Ormond Alan R. Dennis

Past research on information technology (IT) security training and awareness has focused on informing employees about security policies and formal sanctions for violating those policies. However, research suggests that deterrent sanctions may not be the most powerful influencer of employee violations. Often, employees use rationalizations, termed neutralization techniques, to overcome the effec...

2012
David von Oheimb

The power grid is currently undergoing changes towards highly volatile and localized energy production and storage, supported by IT and communication components. Smart Metering is going to provide fine-grained measurement and automatic remote reading of consumption and production amounts. It enables flexible tariffing and dynamic load optimization, ultimately aiming at cost and consumption redu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید