نتایج جستجو برای: network security

تعداد نتایج: 818903  

Journal: :مهندسی صنایع 0
طه حسین حجازی دکتری مهندسی صنایع دانشگاه آزاد اسلامی واحد قزوین، باشگاه پژوهشگران جوان و نخبگان مرتضی عباسی استادیار مجتمع مدیریت و فناوری های نرم دانشگاه صنعتی مالک اشتر

responsibility in demand networks is one of the most important measures of performance. the concept of agility and flexibility in service and production. variety and changes in demand need more flexible network design that can cope with potential shortage and delay. this paper presents new mathematical model to optimize the design of demand network when there are highly variable demands. it als...

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

In this paper, a new method for extracting dynamic properties for High Impedance Fault (HIF) detection using discrete Fourier transform (DFT) is proposed. Unlike conventional methods that use features extracted from data windows after fault to detect high impedance fault, in the proposed method, using the disturbance detection algorithm in the network, the normalized changes of the selected fea...

2013
Nathan Larson

I build a model in which helpful tips and harmful viruses spread through a large social network, modeled as a random graph. The network is generated by the equilibrium actions of individual agents who form links to other agents in the hope of receiving tips. These links also expose agents to viruses, a risk they can mitigate by investing in security. Equilibrium choices at the individual level ...

2011
Christos Douligeris Panayiotis Kotzanikolaou

The wide deployment of several networks such as the Internet, 3G networks, enterprise networks, WiFi networks and Bluetooth networks to name just a few, has made networking a common task. However, the social, economical, commercial and ethical aspects of the various network applications have raised several security considerations deriving from network usage. This article is concerned with netwo...

ژورنال: پیاورد سلامت 2020
Hosseini, Foroughosadat , Ronaghi, Mohammad Hossein ,

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید