نتایج جستجو برای: safavi
تعداد نتایج: 124 فیلتر نتایج به سال:
Scorzonera karkasensis Safavi به عنوان گونه جدیدی از ایران معرفی و نشانویژههای ریختی آن با نزدیکترین آرایه مقایسه شده است. گونه جدید از نظر ریختی نزدیک به S. tenax Rech. f.بوده و با توجه به تفاوتهایی که در یقه، ساقهها، برگها، براکتهها، گلچهها و فندقهها دارد از آن جدا میشود. نقشه پراکندگی، نقاشی و تصویرگونه جدید نیز ارایه شده است.
The application of coding theory to security scenarios is studied. Authentication systems are introduced that are based on algebraic codes and provide high protection against an intruder's impersonation and substitution attacks. It is shown that a subliminal channel can be embedded into these systems and that there is a trade-off between the authentication capability, subliminal capacity and er...
shah ismail established a dynasty in iran on the premises of nationality and religion. to establish national unity in iran, he announced shia as the official religion. his goal was to strengthen iranian national bonds. the presence of uzbeks in the east and ottomans in the west made it necessary that iranian people reinforce their feeling of patriotism and love for they homeland. shah ismail be...
This paper reports five cases of Neuroleptic Malignant Syndrome, admitted to Shahid Navab Safavi psychiatric Center during a period of six months. The onset and course of syndrome, types of drugs prescribed, and the variety of symptoms, were studied. Results showed that early diagnosis of the syndrome, cessation of neuroleptic drugs, and classical treatment were efective in saving the lives of ...
The Bluetooth standard has a provision for mutual authentication of connecting devices but not their actual users and allows access control during connection setup only. We propose a user authorization and pairing (UAP) application, that has the ability to perform authentication and authorization of users using role based model. The pairing procedure, which exchanges link key between devices, i...
Basic features of Iranian painting in the centuries after the establishment of Islam are in relations with Persian literature. Painting depicts various literary themes by showing persons and scenes of stories, it also depicts the poetchr('39')s or writerchr('39')s words in drawing and color. Persian literature paintings, and especially Ferdowsichr('39')s Shahnameh stories are one of the most im...
In this paper, information theoretic cryptography is discussed based on conditional Rényi entropies. Our discussion focuses not only on cryptography but also on the definitions of conditional Rényi entropies and the related information theoretic inequalities. First, we revisit conditional Rényi entropies, and clarify what kind of properties are required and actually satisfied. Then, we propose ...
Recent development in the Internet and Web based technologies require faster communication of multimedia data in a secure form. A number of encryption schemes for MPEG have been proposed. In this paper, we evaluate the compression performance of JPEG which has been encrypted with the zig-zag permutation algorithm, suggest a security enhancement to the scheme, and propose an alternative to entro...
The ways the threshold parameter can be modified after the setup of a secret sharing scheme is the main theme of this work. The considerations are limited to the case when there are no secure channels. First we motivate the problem and discuss methods of threshold change when the dealer is still active and can use broadcasting to implement This work was supported by the European Commission unde...
With the advent of Internet image authentication has become a central part of research in security. Since JPEG has recommended discrete cosine transform as one of the steps in image compression systems, a hash function which utilizes discrete cosine decomposition is desirable. In this paper, we propose a discrete cosine based hash function which distinguishes acceptable level of compression fro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید