نتایج جستجو برای: protection policy
تعداد نتایج: 431861 فیلتر نتایج به سال:
Privacy protection is a key requirement for the future pervasive computing systems. This paper describes the design and implementation of a privacy protection framework that exploits the SOUPA policy ontology and its associated policy reasoning algorithm. The SOUPA policy ontology expressed in the Web Ontology Language OWL allows users to define policy rules to permit or forbid actions that att...
the main objective of this study is to investigate the comparative advantage for sugar beet production in iran. sugar beet is one of the main crops which is considered as an important resource for energy supply. the importance of sugar beet (as a sugar source) in iranian household food basket, price fluctuation and consumers' demand for sugar beet, social profitability and the impact of go...
This document sets forth a common Federal Policy for the Protection of Human Subjects (Model Policy) accepted by the Office of Science and Technology Policy and promulgated in regulation by each of the listed Departments and Agencies. A Proposed Federal Policy for the Protection of Human Subjects published November 10, 1988 (53 FR 45661) has been revised in response to public comments. The Poli...
Most current child protection systems in Australia are unsustainable and potentially harmful. It is time to reconsider the direction in which child protection policy is heading in this country. To this end we need to understand the historical processes that have led to the current situation, explore the potential of a public health approach to child protection, enhance the capacity to translate...
For this inquiry, papers from international journals that are indexed by SCOPUS accessed using the VosViewer 1.6.17 software. Nonetheless, 533 articles years 1975 to 2021 were picked with keywords ”CHILD PROTECTION, CHID ABUSE, AND CHILD POLICY.” Scholarly interest in subject increased significantly between 2017 and 2021; highest year was 2018 when 50 publications on of child protection publish...
While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable hardware typically offer no such protection. Several reconfigurable cores are often integrated onto a single chip where they share external resources such as memory. While this enables small form factor and low cost designs, it op...
Although almost 120 y of medical experience and data exist on human exposure to ionizing radiation, advisory bodies and regulators claim there are still significant uncertainties about radiation health risks that require extreme precautions be taken. Decades of evidence led to recommendations in the 1920s for protecting radiologists by limiting their daily exposure. These were shown in later st...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید