نتایج جستجو برای: architecture powergating data

تعداد نتایج: 2578227  

Power gating technique reduces leakage power in the circuit. However, power gating leads to large voltage fluctuation on the power rail during power gating mode to active mode due to the package inductance in the Printed Circuit Board. This voltage fluctuation may cause unwanted transitions in neighboring circuits. In this work, a power gating architecture is developed for minimizing power in a...

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

Journal: :Economic Alternatives 2021

Nowadays, because of the rapid changes in environment we can observe complex developments companies. Furthermore, recent technological growth renders business world a very competitive environment. It is essential for companies to make highly accurate decisions short period time order compete such an They have rely not only on amount data that they gathered but also efficiency gathering new from...

Journal: :International Journal of Information Engineering and Electronic Business 2012

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2019

Journal: :مدیریت فناوری اطلاعات 0
محمدرضا تقوا استادیار دانشکده مدیریت و حسابداری، دانشگاه علامه طباطبایی، تهران، ایران ماندانا ایزدی کارشناس ارشد رشته مدیریت فناوری اطلاعات، دانشگاه علامه طباطبایی، تهران، ایران

the advantages and special characteristics of service oriented architecture and expansion of employing such architecture have brought security topics which are different in some cases from the security principles of traditional information systems. in this article our aim is the examination of various indices of security and the presentation of strategies for security in information systems by ...

Journal: :journal of advances in computer research 0

security term in mobile ad hoc networks has several aspects because of the special specification of these networks. in this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy ratiocination of fuzzy system as...

Journal: :Geoinformatics FCE CTU 2011

Journal: :International Journal for Research in Applied Science and Engineering Technology 2021

Journal: :Information Systems Frontiers 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید