نتایج جستجو برای: digital analyses
تعداد نتایج: 684597 فیلتر نتایج به سال:
This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images. Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of forensic analyses. Counter-forensics is first defined in a formal decis...
in current study, 63 samples of bat populations collected from differ regions were used for evaluating the geographic variations. twenty cranial and dental characters for traditional morphometric and landmarks method on the ventral, dorsal skull and mandible for geometry morphometric studies were used. statistical analyses of traditional morphometric and geometry morphometric data indicated low...
This study aims to investigate the effect of demographic variables on quadratic levels of the digital divide (Van Dijk’s model), including material and physical access, motivational access, digital literacy and skills, and usage. The study population included 600 citizens of Rafsanjan, Iran. Data were collected using a researcher-made questionnaire and were analyzed in SPSS. The results showed ...
Digital identities allow friends to like us, governments to analyze us and media platforms to monetize us. As the internet has evolved, so has the creation, storage and access to digital identities. This paper presents the notion that modern digital identities are no longer natural extensions of the user, but alienated entities that exist outside of their control. To justify this claim, this re...
As digital systems are introduced to nuclear power plants, issues related with reliability analyses of these digital systems are being raised. One of these issues is that static Fault Tree (FT) and Event Tree (ET) approach cannot properly account for dynamic interactions in the digital systems, such as multiple top events, logic loops and time delay. This study proposes an approach to analyzing...
It is a most important ask of information science to develop a theoretical framework, and a book such as this one, which provides critical analyses of current perspectives, is a most welcome contribution. It deserves erious discussion, which I shall initiate in this review. This book is organized in ten chapters (in addition to front matters and end matters): (i) The meaning of information. (2)...
The purpose of this study was to develop a Digital University model. The research method was qualitative which was used for this purpose meta synthesis. The research population consisted of 2600 scientific papers (including articles, books, dissertations and work reports), of which 84 were selected as sample. In order to validate the research findings, the critical tool of Glynn (2006) and the ...
Floral morphology of 24 species of the genus Alchemilla in Iran was studied by means of light and digital mi-croscopes. Flower samples were collected from different species and their morphological traits, including hypanthium, calyx, epicalyx, pedicels, ovaries and stamens, were measured. The most useful features for the separation of species were turned out to be the calyx shape and length, tr...
Introduction: Affinity for Technology Interaction (ATI) refers to the users’ tendency to actively interact with a digital system. ATI is a personal characteristic affecting many aspects of human-technology interaction. The present study aimed to assess the psychometric properties of the Persian version of the ATI scale. Material and Methods: The Persian version of the scale was developed in ac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید