نتایج جستجو برای: family security
تعداد نتایج: 593459 فیلتر نتایج به سال:
Labour productivity affects food security, but quantifying this relationship has been scarce with respect to empirical literature. The Central Madagascar dataset explores the influence of labour productivity and related variables on the food security status of cassava farmers. Drawing on both theory and empirical evidence, this paper argues that fundamental effects of links between labour produ...
The study aimed to check the mediation role of cognitive emotional regulation for emotional safety and emotional problems such as stress, anxiety and depression. The sample of this study consisted of 240 high school students in Fasa, Fars (120 girls and 120 boys). The method of sampling was multistage cluster sampling. The mean age for the sample was 16.3 years old with SD=1.5. The scales that ...
family is a social-biological institution and it is one of the most fundamental institutions of society. this article explores the structure of the family institution in iran at the historical period from the taherid dynasty to mongols, to analyze the impact of the bondswomen on twofold function of the family. the family is taken into consideration as the institution which has been provided the...
Strong, machine-checked security proofs of operating systems have been in the too hard basket long enough. They will still be too hard for large mainstream operating systems, but even for systems designed from the ground up for security they have been counted as infeasible. There are high-level formal models, nice security properties, ways of architecting and engineering secure systems, but no ...
A family of lightweight authentication protocols, HB-family, has been proposed for low-computationload-required applications such as radio frequency identification (RFID). Security of this family is based on the learning parity with noise (LPN) problem which has been proven to be an NP-complete problem. But, we find that security of these LPN-problem-based protocols is doubted. We will demonstr...
the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...
After all those enhancements in Internet technology, the Internet has become part of people’s lives, so they want to have it ready to use not only on their PCs but also in their mobile devices. WLANs have become very popular thanks to the development of IEEE 802.11 standard family. As wireless applications and systems are widely adopted wireless security is becoming increasingly important. Wire...
conclusions results from present study introduced several factors in regard of burglary; among these, personal and family factors were the most important. the present study could be a guidance to design proper interventions and introduce efficient measures to prevent burglary commitment among at risk groups. results five main themes resulted from interviews. codes included “personal factors, fa...
Despite growing interest in the economic and policy aspects of information security, little academic research has used field data to examine the development process of a security countermeasure provider. In this paper, we empirically examine the learning process a security software developer undergoes in resolving a malware problem. Using the data collected from a leading antivirus software com...
• .................................................................... Top 4 Network Security Challenges › Addressing Security Challenges with Network Access Control › An Evolving Network Environment. • .................................... Securing and Provisioning Medical Devices › Securing Network Access for Guests and Visitors › Securing Access to Patient Information › Achieving Complia...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید