نتایج جستجو برای: access 0272
تعداد نتایج: 327519 فیلتر نتایج به سال:
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
سخن سردبیر editorial مجله دانشگاه علوم پزشکی رفسنجان دوره پانزدهم، آبان 1395، 808-807 مجلات یغماگر با دسترسی آزاد predatory open access journals محسن رضائیان[1]،[2] m. rezaeian پیدایش و رشد «مجلات با دسترسی آزاد» (open access journals) در سالیان اخیر، نویدبخش دوره جدیدی از چاپ و انتشار یافته های نوین علمی بود. قرار بود که در این دوره جدید، نویسندگان یک مقاله علمی با پرداخت هزینه های چاپ، نتیجه ...
hepatitis c can be cured and even eradicated by new “revolutionary” treatments. however, at present exorbitant prices, eastern european countries cannot afford the new treatments, while in western rich and developed countries (e.g. germany and france) they are already available. concerted efforts of governments, public health officials, and the community at large, are needed to negotiate agreem...
one of the main requirements for providing software security is the enforcement of access control policies, which is sometimes referred to as the heart of security. the main purpose of access control policies is to protect resources of the system against unauthorized accesses. any error in the implementation of access control policies may lead to undesirable outcomes. hence, we should ensure th...
0272-1732/00/$10.00 2000 IEEE There is a clear trend in personal computing toward multimedia-rich applications. These applications will incorporate a wide variety of multimedia technologies, including audio and video compression, 2D image processing, 3D graphics, speech and handwriting recognition, media mining, and narrow-/broadband signal processing for communication. In response to this de...
0272-1732/00/$10.00 2000 IEEE On 15 April 1999, people around the world sent thousands of e-mails to our group at Stanford University inquiring about the “secret” performance report of the AMD K7 and Intel Coppermine chips. According to The Register Web site in the United Kingdom, there were rumors that some students at Stanford University had tested and compared the two chips using SPEC’s te...
We describe the development of empirical potential functions for the study of the excited state intramolecular proton transfer reaction in 1-(trifuloroacetylamino)naphtaquinone (TFNQ). The potential is a combination of the standard CHARMM27 force field for the backbone structure of TFNQ and an empirical valence bond formalism for the proton transfer reaction. The latter is parameterized to repr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید