نتایج جستجو برای: keywords human security

تعداد نتایج: 3647114  

Journal: :Politics and the Life Sciences 2021

Journal: :Security and Human Rights 2023

Journal: :LSE Public Policy Review 2020

Journal: :International journal of applied research 2022

Traditionally the idea of "security" has been framed in neo-pragmatist terms, connecting with ensuring regional trustworthiness and political power countries. The 1994 report given by UNDP moved focal point worldwide talk on security. productive conversation normative experimental issues connected new security made it soon a thought plan. During last decades rise wide scope threats at nearby, l...

, ,

Background: All people in the community must have fair access to health facilities. Failure to supply and distribute specialized human resources is one of the main causes of inequality in health services. This study aimed to identify the human factors affecting the equitable distribution of health and medical facilities in the Social Security Organization. Methods: This study was conducted as ...

2014

Visual Cryptography (VC), proposed by Naor and Shamir, has numerous uses, including visual authentication and identification, image encryption and steganography for security purpose, and. In this paper Contrast the visual information based on pseudo randomization and pixel reversal using sigmoid function is also proposed. Keywords— Information hiding, Information Security, Halftone image, Visua...

2015
Gaganpreet Kaur Dheerendra Singh Gagandeep Kaur

peaker recognition is a process where a person is recognized on the basis of his/ her voice signals. Human voice is aunique characteristic for any individual.Speaker recognition is being applied in biometric identification, security related areas, remote access to computers etc.This paper delivers an overview of different techniques that can be used in application of speaker recognition such as...

2012
James A. Nelson

The history of technology and banking is examined as it relates to risk and technological determinism. It is proposed that the services that banks offer are determined by technology and that banks must adopt new technologies to be competitive. The adoption of technologies paradoxically forces the adoption of other new technologies to protect the bank from the increased risk of technology. This ...

2014
Inderjit Singh Prabhjot Kaur Rakesh Chandra Gangwar

Automatic person authentication is an important task in our day to day life. Earlier method of establishing a person’s Authenticate includes knowledge based like password or token base like id cards. These identities may be lost stolen or shared by any person .For these reasons they are not suitable for authentication. Biometrics refers a technology to authenticate individuals by automated mean...

2009
Edward Guillen Daniel Padilla Adriana Hernandez Kenneth Barner

Biometrics methods include recognition techniques such as fingerprint, iris, hand geometry, voice, face, ears and gait. The gait recognition approach has some advantages, for example it does not need the prior concern of the observed subject and it can record many biometric features in order to make deeper analysis, but most of the research proposals use high computational cost. This paper show...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید