نتایج جستجو برای: keywords human security

تعداد نتایج: 3647114  

Journal: :مجله حقوقی بین المللی 0
محمد بارانی نویسنده مسئول، دکتری حقوق بین الملل دانشگاه علامه طباطبایی

human domination over time and space and, consequently, globalization of crime has led to new opportunities of global nature to commit crime. globalized crimes occur in an organized fashion to bring profit to and serve violent purposes of criminals around the world, threatening human dignity, safety, and fundamental rights, compromising international security, and denying humans of their right ...

Journal: :Opuscula 2022

Human-environment dynamics in past societies has been a major field of research the Mediterranean for long time, but grown significantly following increase number and quality palaeoclimate palaeoenvironmental records last two decades. Here we sketch outline this based on 1,531 author keywords from 280 peer-reviewed articles published 78 different scientific journals during 2016–2021. Sourced We...

Journal: :the modares journal of electrical engineering 2008
ahmad reza sharafat mahdi rasti

high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...

2012
Mariem Chaabouni Mona Laroussi

We present in this paper the definition of a collaborative and cooperative platform, exploited through the Cloud, for analyzing learners tracks and managing indicators in educational scenarios. This paper describes the architecture and the design proposed for the platform, then it evocates the related security aspect. Finally, a test scenario is described to demonstrate the platform functionali...

2005
Joonsang Baek Reihaneh Safavi-Naini Willy Susilo

The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...

Journal: :international journal of management and business research 2011
s. jamaledin tabibi sudabe vatankhah amir ashkan nasiripour shaghayegh vahdat somayeh hessam

planned human resource development is critical to educating a skilled and efficient workforce. the present study aimed at identifying the main factors of planned human resource development in iranian social security organization hospitals. the study is done through analysis of a questionnaire designed after identification of the main variables. iran social security organisation hospitals (the m...

2015
Pooja Dubey

During the transmission of data from sender prevents from various attacks. Public key encryption is a technique which provides encryption of data using public key. The existing technique implemented for the searching of keywords with public key encryption provides security from password Guessing attacks [1]. But the technique implemented here enables security from various attacks as fine as als...

Journal: :انسان پژوهی دینی 0
حمید حبیبی دانشجوی دکتری امنیت ملی دانشگاه عالی دفاع ملی و مربی گروه علوم سیاسی مجتمع آموزش عالی شهید محلاتی

regarding extensive domain of islamic teachings including all aspects of human life following as individual, social, spiritual, physical and material issues and noting close relations of the humanities with this dimensions, a deep bond between islam and the humanities including management and education is revealed. to attain an islamic understanding of relationship between the dimensions of the...

2003
Niklas Borselius Chris J. Mitchell

The agent paradigm has been the subject of much research during the last decade. Recently, security of multiagent systems has gained increased attention. In this paper we consider the FIPA agent communication specifications from a security perspective, and outline how security functionality can be added. Keywords— security, multi-agent system, communication, FIPA.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید