نتایج جستجو برای: enhancement of security structures

تعداد نتایج: 21213857  

Journal: :Research Journal of Applied Sciences, Engineering and Technology 2013

Journal: :International Journal of Computer Applications 2012

A.R. Shirazi, A.R. Zirak, H.A. Nedaie, N. Banaee, S. Sadjadi,

Background: New treatment modalities are developed with the aim of escalating tumor absorbed dose and simultaneously sparing the normal structures. The use of nanotechnology in cancer treatment offers some possibilities including destroying cancer tumors with minimal damage to healthy tissues. Zinc Oxide nanoparticles (ZnO NPs) are wide band gap semiconductors and seem to have a good effect on ...

Journal: :int. journal of mining & geo-engineering 2013
ali akbar hosseini faramarz doulati ardejani seyed hashem tabatabaie ardeshir hezarkhani

edge detection and edge enhancement techniques play an essential role in interpreting potential field data. this paper describes the application of various edge detection techniques to gravity data in order to delineate the edges of subsurface structures. the edge detection methods comprise analytic signal, total horizontal derivative (thdr), theta angle, tilt angle, hyperbolic of tilt angle (h...

2016
Komalpreet Kaur Gurmeet Kaur Joon S. Park Peisong Ye

Security is the most important aspect considered while using the wireless local area networks. Various techniques have been used in the past to increase the security of WLAN’s while simultaneously making the authentication process faster. The paper presents the review of various such techniques that have been used in the past for the enhancement of the security and achieving fast authentication...

Journal: :IEICE Transactions 2011
Takahiro Matsuda Taku Noguchi Tetsuya Takine

This survey summarizes the state-of-the-art research on network coding, mainly focusing on its applications to computer networking. Network coding generalizes traditional store-and-forward routing techniques by allowing intermediate nodes in networks to encode several received packets into a single coded packet before forwarding. Network coding was proposed in 2000, and since then, it has been ...

2012
Kuljeet Kaur G Geetha

Identity over the public links becomes quiet complex as Client and Server needs proper access rights with authentication. For determining clients identity with password Secured Shell Protocol or Public Key Infrastructure is deployed by various organizations. For end to end transport security SSL (Secured Socket Layer) is the de facto standard having Record and Handshake protocol dealing with da...

Journal: :I. J. Network Security 2017
Yanna Ma

The integration of Near Field Communication (NFC) into consumer electronics devices has opened up opportunities for the internet of things applications such as electronic payment, electronic ticketing and sharing contacts, etc.. Meanwhile, various security risks should not be ignored. Therefore, all kinds of different protocols have been released with the purposing of securing NFC communication...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید