نتایج جستجو برای: protecting it against threats such as materialism

تعداد نتایج: 7161161  

2007
André Adelsbach Ulrich Greveler

Most wireless communication techniques rely on broadcast media on the physical layer, i.e., the actual signal can be received by any party in a certain coverage area. Furthermore, there are cable-based networks, such as HFC (hybrid fiber/coaxial) networks that use a shared transmission medium (coaxial cable) to bridge the last mile. A common means to perform secure unicast (point-to-point) comm...

2012
Edwin S. Lyman

More than ten years after the 11 September attacks in the United States, the terrorist threat continues to evolve. Strategies for protecting nuclear facilities and nuclear materials from sabotage and theft must be flexible enough to rapidly accommodate changes in the threat environment, yet also must be sufficiently detailed to provide assurance that they will be effective against a range of sp...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند 1389

there has been a gradual shift of focus from the study of rule systems, which have increasingly been regarded as impoverished, … to the study of systems of principles, which appear to occupy a much more central position in determining the character and variety of possible human languages. there is a set of absolute universals, notions and principles existing in ug which do not vary from one ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1392

a novel acrylic acid-functionalized fe3o4 magnetic nanoparticle with a core-shell structure was developed for utilization as a heterogeneous organosuperacid in chemical transformations. the structural, surface, and magnetic characteristics of the nanosized catalyst were investigated by various techniques such as transmission electron microscopy (tem), thermogravimetric analysis (tga), and ft-ir...

2013
M. Mani Roja Sudhir Sawarkar

The critical issues in biometric systems are protecting the template of a user which is stored in a data base. An attack against the stored templates constitutes a major security and privacy threat in a biometric system. Proper use of cryptography greatly reduces the threats in biometric system as the attackers have to find the decryption key and template. This paper proposes an approach for bi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده علوم پایه 1389

abstract part one: the electrode oxidation potentials of a series of eighteen n-hydroxy compounds in aqueous solution were calculated based on a proper thermodynamic cycle. the dft method at the level of b3lyp-6-31g(d,p) was used to calculate the gas-phase free energy differences ,and the polarizable continuum model (pcm) was applied to describe the solvent and its interaction with n-hydroxy ...

Journal: :Ergo, an Open Access Journal of Philosophy 2014

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه دریانوردی و علوم دریایی چابهار - دانشکده ادبیات و زبانهای خارجی 1390

abstract cooperative learning refers to small groups of learners working together as a team to solve a problem, complete a task, or accomplish a common goal. in a cooperative environment one’s success is directly related to the success of other members because the focus on the individual shifts towards the group. to test the effectiveness of the method, using jigsaw technique, a study was cond...

Journal: :Jurnal iqra' : kajian ilmu pendidikan 2022

The article aims to uncover security risks that may occur during online learning, as well preventive measures can be taken avoid these threats. This study uses a combination of two methods, namely, web mining and literature review. From the results mining, it is found website articles have not provided much explanation about efforts protect against threats on internet, from review researchers r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید