نتایج جستجو برای: security issues in summary process
تعداد نتایج: 17146815 فیلتر نتایج به سال:
the geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security
abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...
this study considers the level of increase in customer satisfaction by supplying the variant customer requirements with respect to organizational restrictions. in this regard, anp, qfd and bgp techniques are used in a fuzzy set and a model is proposed in order to help the organization optimize the multi-objective decision-making process. the prioritization of technical attributes is the result ...
abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...
In recent years, Wireless Voice over IP (WVoIP) has been one of the most popular telecommunication technologies. Quality of Service (QoS) and security are two important issues which determine the success of WVoIP. WVoIP QoS issues have been extensively studied. However, security issues of WVoIP are rarely addressed. In this paper, we study one important WVoIP security issue of Denial of Service...
This paper explores security issues of storage in the cloud and the methodologies that can be used to improve the security level. This study is concluded with a discussion of current problems and the future direction of cloud computing. Big data analysis can also be classified into memory level analysis, business intelligence (BI) level analysis, and massive level analysis. This research paper ...
this thesis aims at putting together two of the vestest areas of study there is in humanities: bioethics and literature. the two novels in question, oryx and crake and the year of the flood, are considered as some of the most succssful examples of spculative fiction. in these novels the biological and environmental issues raised as looked at from a bioethics point of view.
nowadays, world wide web has become a popular medium to search information, business, trading and so on. various organizations and companies are also employing the web in order to introduce their products or services around the world. therefore e-commerce or electronic commerce is formed. e-commerce is any type of business or commercial transaction that involves the transfer of information acro...
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
in the mid-1950s, regionalism rose in international literature. in the middle east and persian gulf regional issues draw attention of theorists in the late 1960s. at first, regionalism aimed to organize political will of regional leaders towards to organize political will, while regionalism in the middle east and persian gulf concentrated on the security affairs. this proves that the essence of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید