نتایج جستجو برای: thus offering solutions for identity management
تعداد نتایج: 10878504 فیلتر نتایج به سال:
From artificial voices in GPS to automatic systems of dictation, from voice-based identity verification to voice pathology detection, speech processing applications are nowadays omnipresent in our daily life. By offering solutions to companies seeking for efficiency enhancement with simultaneous cost saving, the market of speech technology is forecast to be particularly promising in the next ye...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
in recent years, there has been a growing interest among researchers to investigate the relationship betweenteacher self-efficacy and classroom behavior management, especially students misbehavior. therefore, this study aimed to comparatively investigate english and arabic teachers’ use of different behavior managementstrategies, their self-efficacy, and their success in an iranian context. th...
Agilent Technologies Boeblingen Verification Solutions is offering a variety of remote system management products. This paper will summarize the key technologies on which Agilents remote system management solutions are based. This includes the underlying standards, knowledge in remote management and diagnostics, as well as IP-based design of highly integrated systems on chip.
in new management approaches, in the organizations with inflexible structure, existing of red tapes and interruptions caused by limitations and also non-compliance with environmental changes, create demotivation among staff. with regard to the influence of job motivational potential and its relationship to the type of organizational structure( enabling and dissuasive), the goal of this research...
Identity management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of identity management, serves to verify claims about holding specific identities. Identity management is therefore fundamental to, and sometimes include, other security constructs such as authorisation and access control. Diffe...
Identity management (IdM) systems are information systems that help to manage an individual’s credentials. This occurs through the establishment, description, maintenance, and eventual destruction of an identity. There are numerous IdM systems in place today that follow a general framework, yet provide users of the system with different solutions. This chapter will present architecture and appl...
this ethnographic case study research was carried out in a private school setting in the context of iran. the research tried to explore the analysis and identity construction of a group of learners and teachers along with the content analysis of books on the basis of four types of commodified, political, national and narrative identities. how english language learners and teachers in an informa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید