intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Sense of security

Xem 1-20 trên 70 kết quả Sense of security
  • One of the clinical responsibilities and goals of hospitals is to provide patients with comfort and security. The present study aims to assess patients’ sense of security among patients in Iranian hospitals.

    pdf7p vigautam 25-07-2024 0 0   Download

  • In this study, a new grouping proof authentication protocol is developed for lightweight devices. The proposed protocol implemented on wireless identification and sensing platform passive RFID tag, uses embedded advanced encryption standard encryption method to encrypt transmitted data. Security of the protocol was first evaluated and verified theoretically, then by a tool used for automatic verification of security protocols, called Scyther tool.

    pdf17p tovann 23-07-2024 0 0   Download

  • With mutual funds, beginning and experienced investors can afford to invest in a wide range of securities by pooling their money with others’ and splitting the profits. Mutual fund investing for Canadians for Dummies helps you makes sense of these funds, start investing, and create a plan to meet your financial goals. With this easy-to-understand guide, you can weigh the pros and cons of mutual funds to decide if they’re right for you.

    pdf386p zizaybay1104 29-05-2024 11 2   Download

  • In this paper will introduce an algorithm, which can improve the results of data partitioning with reliability and multiple fuzzifier. This algorithm is named TSSFC. The introduced method includes three steps namely as “labeled data with FCM”, “Data transformation”, and “Semi supervised fuzzy clustering with multiple point fuzzifiers”.

    pdf10p visharma 20-10-2023 8 4   Download

  • Part 1 of ebook "Managing risk and information security: Protect to enable" provides readers with contents including: introduction; the misperception of risk; governance and internal partnerships: how to sense, interpret, and act on risk; external partnerships - the power of sharing information; people are the perimeter;...

    pdf106p tieulangtran 28-09-2023 2 2   Download

  • A wireless sensor network (WSN) is a collection of wirelessly connected multifunction sensor devices (referred to as wireless sensor nodes) in an area that requires sensing. In this paper, we synthesize the classification and arrangement of energy-efficient and SRPs, as well as provide a method to calculate attack probability (AP) for secure routing in WSN.

    pdf8p viargus 20-02-2023 4 3   Download

  • This book "Building Web Services with Java: Making sense of XML, SOAP, WSDL, and UDDI (Second edition)" is meant for computing technical professionals with some experience building Web applications and distributed computing systems. Part 2 of book include: enterprise web services; web services and J2EE; web services and stateful resources; securing web services; web services reliable messaging; web services transactions; orchestrating web services; web services in the real world; web services interoperability;...

    pdf439p britaikridanik 05-07-2022 28 7   Download

  • Part 1 of Adaptation to climate change presents a framework for making sense of the range of choices facing humanity, structured around resilience (stability), transition (incremental social change and the exercising of existing rights), and transformation (new rights claims and changes in political regimes).

    pdf151p redrose24 20-04-2022 11 1   Download

  • This article explores the policy context in the UK around securing impact from academic research, particularly from the perspective of a social science education researcher.

    pdf16p princessmononoke 29-11-2021 19 1   Download

  • Pristine and WO3 decorated TiO2 nanorods (NRs) were synthesised to investigate n-n-type heterojunction gas sensing properties. TiO2 NRs were fabricated via hydrothermal method on fluorine-doped tin oxide coated glass (FTO) substrates. Then, tungsten was sputtered on the TiO2 NRs and thermally oxidised to obtain WO3 nanoparticles. The heterostructure was characterised by X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive X-ray (EDX) spectroscopy.

    pdf12p tudichquannguyet 29-11-2021 6 1   Download

  • The paper focuses on analyzing weaknesses which can be attacked reveals the origin of a message being signed by known blind digital scheme, which proposed a new scheme have higher degree of security in a sense of keeping secret the source of the signed message. It will meet the demand of the real.

    pdf10p luuhongdung 07-09-2021 63 43   Download

  • "Ebook The flying book – Everyhing you’ve wondered about flying on airplanes" whether you fear, thrill at, or, like many, have never bothered to stop and think about the wonder of commercial flight, "The Flying Book" will inform, surprise, reassure, and entertain. David Blatner takes readers from the cockpit to the runway, the control tower, the baggage and security systems, the airplane manufacturing plant, and beyond, explaining the many factors that make airline travel possible.

    pdf228p kequaidan12 28-05-2021 17 1   Download

  • Important to assess land use change and propose solutions for effective land use and management, providing detailed and accurate information for policy making. At the same time, the results also support the management of rational and efficient use of land resources, meeting the use demands of economic, cultural and security and defense sectors.

    pdf12p nguaconbaynhay11 16-04-2021 17 1   Download

  • In this lesson, you will leam about specific steps you can take to secure your computer system and your data from a variety of threats. You might be surprised to learn that computer security is not primarily a technical issue, and is not necessarily expensive. For the most part, keeping your system and data secure is a matter of common sense.

    ppt63p koxih_kothogmih6 22-09-2020 42 3   Download

  • In this lesson, you will leam about specific steps you can take to secure your computer system and your data from a variety of threats. You might be surprised to learn that computer security is not primarily a technical issue, and is not necessarily expensive. For the most part, keeping your system and data secure is a matter of common sense.

    ppt71p koxih_kothogmih3 24-08-2020 15 3   Download

  • In this lesson, you will leam about specific steps you can take to secure your computer system and your data from a variety of threats. You might be surprised to learn that computer security is not primarily a technical issue, and is not necessarily expensive. For the most part, keeping your system and data secure is a matter of common sense.

    ppt77p koxih_kothogmih3 24-08-2020 13 3   Download

  • This presents a false sense of security to the network operators and administrators. This research will present two scenarios that are commonly left unmonitored and look at a practical way to deploy solutions to these two scenarios in such a way that the network uptime can be improved.

    pdf8p kelseynguyen 28-05-2020 12 1   Download

  • High incidence and morbidity rates are found among adolescents with social anxiety disorder, a severe and harmful form of social phobia. Extensive research has been conducted to uncover the underlying psychological factors associated with the development and continuation of this disorder.

    pdf9p vigustavia2711 19-12-2019 6 1   Download

  • In this work, a highly sensitive low-field magnetometer has been implemented for navigation, electronic compass, and monitoring security. The sensor structure consists of the soft-magnetic core cobalt base, the excitation coil, and the sensing coil. A current passing through the excitation coil at high frequency modulates the permeability of the soft magnetic core.

    pdf13p visumika2711 17-07-2019 13 0   Download

  • In addition, coverage computation test maintains adequate/sufficient number of sensing nodes which would reduce energy consumption and maximize the coverage and network lifetime in the WSN. Simulation results show that, CABR achieves lesser energy consumption and longer network coverage lifetime as compared to RBSP and PEAS.

    pdf9p byphasse043256 23-03-2019 14 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1448 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2