نتایج جستجو برای: security and trust at five maturity levels performed
تعداد نتایج: 17233090 فیلتر نتایج به سال:
methodology non-native participants in this study were sixty ba students majoring in english literature and teaching english as a foreign language at khayyam university of mashhad. they were senior students, between 21 to 24 years old, who had studied english for at least three and a half years and had passed several courses including grammar, reading, conversation, and writing. this was assum...
In a loosely-coupled system various objects may be imported from different sources and the integrity levels of these objects can vary widely. Like downloaded information from the World Wide Web, these imported objects should be carefully organized and disseminated to different trust zones, which meet the security requirements of different groups of internal applications. Assigning an object to ...
the purpose of the present study was to see which one of the two instruction-processing instruction (pi) and meaningful output based instruction (mobi) accompanied with prompt and recast- is more effective on efl learners’ writing accuracy. in order to homogenize the participants in term of language proficiency a preliminary english test (pet) was administrated between 74 intermediate students ...
As companies try to maintain and strengthen their competitive advantage, they should be aware of the level digital maturity. The study aims present a methodology that helps determine position small medium-sized enterprise in maturity life-cycle. This is performed on basis models, company growth theories. A number studies models have been prepared various sectoral criteria, but these are all one...
In the paper, it analyses the relationship between social capital and social security among the youth in sari(Northern Iran). Out of 65326 young people more than 118 ones were randomly selected through Cochran sampling method.The Alph- coranbach coefficient for the social capital were %85 and for social security were %83. According to Pearson correlation coefficient, there is a significant rela...
In this paper we introduce an architecture maturity model for the domain of enterprise architecture. The model differs from other existing models in that it departs from the standard 5-level approach. It distinguishes 18 factors, called key areas, which are relevant to developing an architectural practice. Each key area has its own maturity development path that is balanced against the maturity...
A wireless sensor network is generally a vast network with large number of sensors nodes. It suffers from several constraints, like low computation capability, less storage capability, restricted energy resources, liability to physical capture, and therefore the use of insecure wireless communication channels. As the size and the density increases over the network, there are more chances of pen...
e-Government services are becoming one of the most important and efficient means by which governments (G) interact with businesses (B) and citizens (C). This has brought not only tremendous opportunities but also serious security challenges. Critical information assets are exposed to current and emerging security risks and threats. In the course of this study, it was learnt that e-government se...
food security means that all people at all times have access to sufficient food, healthy and nutritious. food security is a necessity for rural development. the main purpose of this study is survey of the role of extension education on food security of farmer households in qorveh county (kurdistan province). the research is an applied type in which descriptive method has been employed. populati...
Özet. CMMI ve çevik yazılım geliştirme yöntemlerinin birlikte uygulanabilirliği bir süredir devam etmekte olan bir tartışma konusudur. Đki yaklaşımın çeşitli açılardan birbirinin karşıtı olduğuna dair yorumların yanında literatürde birlikte uygulanabilirliklerini gösteren çalışmalar da bulunmaktadır. Bu makalede CMMI ve çevik yöntemler üzerine var olan beş efsanenin oluşma nedenleri ve gerçek o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید