نتایج جستجو برای: access methods

تعداد نتایج: 2144363  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

abstract: one of the most visited & important spaces in different countries by tourist are urban areas. the old tehran which major part is located in district 12 is historical showcase of the capital, but, its hiidden cultural attraction is not used as it should be. this thesis occasionally engage in studying the efficacy of correct installation of travel guide boards in welfare & easily acc...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی و اجتماعی 1392

tourism , today as one of the ways to make money, create jobs , and social and political interactions is considered. this paper aims to examine the strengths and weaknesses of tourism development in mahmoud abad ( mazandaran ). the research method in this study is " descriptive - analytical " and to collection of data used field methods such as questionnaires and documentation - library. the sa...

Journal: :ACM Computing Surveys 1998

2014
Apostolos N. Papadopoulos Kostas Tsichlas Anastasios Gounaris Yannis Manolopoulos

We are witnessing a tremendous growth in the size of the data gathered, stored, and processed by various kinds of information systems. Therefore, no matter how big memories become, there is always the need to store data in secondary or even tertiary storage to facilitate access. Even if the data set can fit in main memory, there is still a need to organize data to enable efficient processing. I...

Journal: :Proceedings of the Nutrition Society 1994

Journal: :Nature Methods 2021

1993
J. Lester K. Murray A. Souther

research in the context of a multifunctional knowledge base: The Botany Knowledge Base project. [30] Suzanne McBride. A graphic access and presentation tool for related knowledge base concepts. Master's thesis, [26] James C. Lester and Bruce W. Porter. A revision-based model of instructional multi-paragraph discourse production. 37 The View Retriever will be evaluated more extensively when it s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید