نتایج جستجو برای: secured
تعداد نتایج: 6557 فیلتر نتایج به سال:
BACKGROUND Endotracheal tube security is a critical safety issue. We compared the mobility of an in situ endotracheal tube secured with adhesive tape to the one secured with a new commercially available purpose-designed endotracheal tube-holder device (Haider Tube-Guard). We also observed for the incidence of oropharyngeal or facial trauma associated with the 2 tube fixation methods. METHODS ...
Adding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should take advantage of the modularity offered by new software development approaches. With Aspect-Oriented Programming (AOP), separating concerns when designing an application fosters reuse, parameterization and maintenance. I...
INTRODUCTION A private network that carries sensitive data between local computers requires proper security measures to protect the privacy and integrity of the traffic. When such a network is connected to other networks, or when telephone access is allowed into that network, the remote terminals, phone lines, and other connections become extensions to that private network and must be secured a...
PURPOSE The aims of this study were 4-fold: (1) to examine the proportion of indwelling urinary catheters that were secured in an acute care setting; (2) to determine the proportion of secured catheters that were secured correctly; (3) to examine the association of catheter securement with type of unit, age, sex, and location of insertion; and (4) to determine the proportion of units with cathe...
The techniques such as secured socket layer (SSL) with clientside certificates are well known in the security research community, most commercial web sites rely on a relatively weak form of password authentication, the browser simply sends a user‟s plaintext password to a remote web server, often using SSL. Even when used over an encrypted connection, this form of password authentication is vul...
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically shaping a provisional network devoid of the use of any existing network infrastructure or centralized management. In MANETs, security is the major challenge due to the dynamic topology which is because of the mobility of the nodes. In this paper, we propose to design and develop a secure methodology incorporate...
The techniques such as secured socket layer (SSL) with client-side certificates are well known in the security research community, most commercial web sites rely on a relatively weak form of password authentication, the browser simply sends a user’s plaintext password to a remote web server, often using SSL. Even when used over an encrypted connection, this form of password authentication is vu...
In order to improve the security of the Military kinds of network this work is proposed. Here the position of missile navigates as per the user’s requirement. The user sends the co-ordinates through pc based server on the base station. For security purpose encryption is done with RC4algorithm implementation. The system that uses Human Computer Interaction and Visualization technology provides s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید