نتایج جستجو برای: secure
تعداد نتایج: 56843 فیلتر نتایج به سال:
Performing approximate data matching has always been an intriguing problem for both industry and academia. This task becomes even more challenging when the requirement of data privacy rises. In this paper, we propose a novel technique to address the problem of efficient privacy-preserving approximate record linkage. The secure framework we propose consists of two basic components. First, we uti...
Attachment styles are considered as an important predictor of marital issues. The purpose of this study was to investigate the role of attachment styles in marital disillusionment and attitude toward infidelity. The research method was correlation. 188 teachers were selected based on measurement scale and research hypothesis by multistage cluster sampling among married teachers. Measures of adu...
The purpose of this study was the relationship between attachment styles and self-esteem with type D personality. 245 students (66 males & 179 females) have been selected using a cluster random sampling to fill out the adult attachment style, Rosenberg self- esteem, and type D personality questionnaires. The results show that there is a significant positive correlation between secure attachment...
Background & Aims: School indiscipline is a multi-faceted phenomenon that has many adverse effects on satisfaction from teaching and learning of students. This study examines the important antecedents theory of mind, self-regulation and emotional attachment styles in creating indiscipline behavior is. Materials & Methods: This study descriptive correlational study was conducted on junior hig...
Current study performed to predict of identity styles through attachment styles. The method of this study was descriptive in kind of correlation. The study sample included 130 students from Bu Ali Sina University, were selected using multistage cluster sampling. Attachment styles were evaluated by Hazan & shaver Adult Attachment Scale (AAS) and identity styles evaluated by berzonsky identity st...
in this paper, we consider a cooperative cognitive radio network in which there is an ofdm primary link and multiple single carrier secondary links.the primary link is required to maintain its secrecy rate above a predefined threshold. if the secrecy rate requirement is not satisfied, the secondary system help primary link to maintain its secrecy rate requirement. in doing so, the secondary trans...
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
Abstract Background: Attachment relationship provides a secure base for the infants from which to explore the environment and a safe haven to return to in times of danger. Attachment style shapes the behavior of individuals in adulthood. There are many different measures of attachment and a lot of controversy about what they measure and how they relate to each other. Hence, we tried to evaluate...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید