نتایج جستجو برای: keywords human security

تعداد نتایج: 3647114  

Journal: :Portugaliae Electrochimica Acta 2007

Journal: :Journal of English Linguistics 2004

2012
Li-Hsing Ho Shu-Yun Feng Ming-Tsai Hsu

The study applied Decision Making Trial and Evaluation Laboratory (DEMATEL) to analyze the casual relationship and mutual impact level between the control items of the information security management system. Three core control items of the information security management system are found, Security Policy (SC1), Access Control (SC7) and Human Resources Security (SC4) respectively. They can be pr...

2013
I-Fan Chen Chin-Hui Lee

A hierarchical framework is proposed to address the issues of modeling different type of words in keyword spotting (KWS). Keyword models are built at various levels according to the availability of training set resources for each individual word. The proposed approach improves the performance of KWS even when no training speech is available for the keywords. It also suggests an easier way to co...

Journal: :Journal of Object Technology 2007
Mourad Debbabi M. Fourati

boolean byte class double else extends final finally float if implements int interface long native new private public return short static super synchronized this throw throws transient try void volatile while ( ) [ ] { } ; , . = Figure 1: Java keywords.

Journal: :international journal of political science 0

this article presents the key insights about the environment and security links in the context of the persian gulf region. this research paper focuses on the challenge of finding a balance among development, armed conflicts and environmental degradation in the persian gulf region. environmental security challenges are human security, sustainable development and regional cooperation in the persi...

Journal: :CoRR 2013
Farhan Sahito Wolfgang Slany

The emergence of cloud computing presents a strategic direction for critical infrastructures and promises to have far-reaching effects on their systems and networks to deliver better outcomes to the nations at a lower cost. However, when considering cloud computing, government entities must address a host of security issues (such as malicious insiders) beyond those of service cost and flexibili...

Journal: :جغرافیا و توسعه ناحیه ای 0
زرقانی زرقانی اعظمی اعظمی

various and complex human activities in geographical contexts need proper ground if at most efficiency is to be achieved. land preparation regulates the relationship between human, space, and human activities. land preparation has various dimensions related to value system, political, scientific, artistic, and defense-security aspects. one of the most important dimensions of land preparation is...

2012
Nesren Waly Rana Tassabehji Mumtaz A. Kamala

Security breaches have attracted corporate attention and major organisations are now determined to stop security breaches as they are detrimental to their success. Users’ security awareness and cautious behaviour play an important role in information security both within and outside the organisation. Arguably the most common factor contributing to these breaches is that of human behaviour towar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید