نتایج جستجو برای: family security

تعداد نتایج: 593459  

A. Abass B. Alenkhe B. Bachwenkizi B. C. Okoye, G. Asumugha I Ralimanana N. Rabemanantsoa R. Ranaivoson

Labour productivity affects food security, but quantifying this relationship has been scarce with respect to empirical literature. The Central Madagascar dataset explores the influence of labour productivity and related variables on the food security status of cassava farmers. Drawing on both theory and empirical evidence, this paper argues that fundamental effects of links between labour produ...

Najme Aganj, Nazfar Moghtaderi, Sepide Sadat Mansoori,

The study aimed to check the mediation role of cognitive emotional regulation for emotional safety and emotional problems such as stress, anxiety and depression. The sample of this study consisted of 240 high school students in Fasa, Fars (120 girls and 120 boys). The method of sampling was multistage cluster sampling. The mean age for the sample was 16.3 years old with SD=1.5. The scales that ...

Journal: :زن در فرهنگ و هنر 0
هادی عالم زاده فریبا کاظم نیا

family is a social-biological institution and it is one of the most fundamental institutions of society. this article explores the structure of the family institution in iran at the historical period from the taherid dynasty to mongols, to analyze the impact of the bondswomen on twofold function of the family. the family is taken into consideration as the institution which has been provided the...

2011
Gerwin Klein Toby C. Murray Peter Gammie Thomas Sewell Simon Winwood

Strong, machine-checked security proofs of operating systems have been in the too hard basket long enough. They will still be too hard for large mainstream operating systems, but even for systems designed from the ground up for security they have been counted as infeasible. There are high-level formal models, nice security properties, ways of architecting and engineering secure systems, but no ...

2010
Ya-Fen Chang

A family of lightweight authentication protocols, HB-family, has been proposed for low-computationload-required applications such as radio frequency identification (RFID). Security of this family is based on the learning parity with noise (LPN) problem which has been proven to be an NP-complete problem. But, we find that security of these LPN-problem-based protocols is doubted. We will demonstr...

Journal: :journal of computer and robotics 0
mohammad mehdi gilanian sadeghi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...

2009
Levent Ertaul Omicel Catambay

After all those enhancements in Internet technology, the Internet has become part of people’s lives, so they want to have it ready to use not only on their PCs but also in their mobile devices. WLANs have become very popular thanks to the development of IEEE 802.11 standard family. As wireless applications and systems are widely adopted wireless security is becoming increasingly important. Wire...

Journal: :avicenna journal of neuro psycho physiology 0
farzad jalilian substance abuse prevention research center, kermanshah university of medical sciences, kermanshah, ir iran mehdi mirzaei alavijeh social determinants of health research center, yasuj university of medical sciences, yasuj, ir iran maryam changizi abadan college of medical sciences and health services, abadan, ir iran mohammad ahmadpanah research center for behavioral disorders and substance abuse, hamadan university of medical sciences, hamadan, ir iran mohamad reza amoei applied research bureau of the police, kermanshah, ir iran firoozeh mostafavi department of health education and promotion, school of health, isfahan university of medical sciences, isfahan, ir iran; department of health education and promotion, school of health, isfahan university of medical sciences, isfahan, ir iran. tel: +98-3137922710

conclusions results from present study introduced several factors in regard of burglary; among these, personal and family factors were the most important. the present study could be a guidance to design proper interventions and introduce efficient measures to prevent burglary commitment among at risk groups. results five main themes resulted from interviews. codes included “personal factors, fa...

Journal: :MIS Quarterly 2014
Seung Hyun Kim Byung Cho Kim

Despite growing interest in the economic and policy aspects of information security, little academic research has used field data to examine the development process of a security countermeasure provider. In this paper, we empirically examine the learning process a security software developer undergoes in resolving a malware problem. Using the data collected from a leading antivirus software com...

2012

• .................................................................... Top 4 Network Security Challenges › Addressing Security Challenges with Network Access Control › An Evolving Network Environment. • .................................... Securing and Provisioning Medical Devices › Securing Network Access for Guests and Visitors › Securing Access to Patient Information › Achieving Complia...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید