• Nenhum resultado encontrado

[PDF] Top 20 A Technique to improve Security of Data in Multilevel Trust

Has 10000 "A Technique to improve Security of Data in Multilevel Trust" found on our website. Below are the top 20 most common "A Technique to improve Security of Data in Multilevel Trust".

A Technique to improve Security of Data in Multilevel Trust

A Technique to improve Security of Data in Multilevel Trust

... developed to protect the privacy of person specific ...useful in the medical ...used in research studies by analyzing the patients’ habits of life, epoch and obesity condition to ... See full document

4

Autonomous Multilevel Policy Based Security Configuration in Distributed Database

Autonomous Multilevel Policy Based Security Configuration in Distributed Database

... distributed data management (SDDM) system which is a prototype of a distributed architecture for multilevel database security that meets the US Department of Defense's trusted computer ... See full document

7

Vehicle Assisted Data Delievery Technique To Control Data Dissemination In Vehicular AD - HOC Networks Vanets

Vehicle Assisted Data Delievery Technique To Control Data Dissemination In Vehicular AD - HOC Networks Vanets

... benefit of vehicular networks on traffic safety and many commercial applications should be able to justify the ...application in sparsely connected vehicular networks. To address this problem, ... See full document

6

Increasing Effectiveness of IDS to Improve Security in Intranet

Increasing Effectiveness of IDS to Improve Security in Intranet

... kind of IDSs covered in this study. But the interest of this study lies in the fact that it presents a benchmarking method that can be used or in worst case enlightens aspects of ... See full document

4

A multilevel approach to energy options across EU: the role of supra-national governance, values and trust

A multilevel approach to energy options across EU: the role of supra-national governance, values and trust

... interpretation of nuclear energy, nuclear power shows an increase in support over recent years (Gaskell et ...round of data collection occurred before the March 2011 Fukushima Daiichi ... See full document

24

Trust and its Relationship to Demographic Factors

Trust and its Relationship to Demographic Factors

... Social trust is the main theme in the social life. Trust is “the expectation that arises within a community of regular, honest and cooperative behavior, based on commonly shared ...social ... See full document

7

A Schematic Technique Using Data type Preserving Encryption to Boost Data Warehouse Security

A Schematic Technique Using Data type Preserving Encryption to Boost Data Warehouse Security

... has, in modern years, provides its corporate executives and business planners with extraordinarily powerful decision support ...tools. Data warehouses can tell us which products to manufacture, where ... See full document

6

DDRT-PCR approaches applied for preeminent results in the isolation of DETs from fish brain tissues

DDRT-PCR approaches applied for preeminent results in the isolation of DETs from fish brain tissues

... transcripts in a variety of species ...few data related to this approach. The majority of differential gene expression studies in ish species, through the use of DD, are ... See full document

5

Cognitive therapy : using a specific technique to improve quality of life and health

Cognitive therapy : using a specific technique to improve quality of life and health

... version of the Quality of Life ( WHOQOL) - short version’ questionnaire proposed by WHO (WHOQOL-bref ), the Beck Anxiety Inventory (BAI) and the Beck Depression Inventory ...used in studies ... See full document

9

Ukraine and the security dilemma in action: uncertainty and trust in foreign affairs at the post Soviet Era

Ukraine and the security dilemma in action: uncertainty and trust in foreign affairs at the post Soviet Era

... concept of the conflict from the open confrontation between nations to the strategic agenda of one state putting political and economic pressure on ...angle of the conflict, the misperception ... See full document

99

Effect Of Perception Use Of Information Technology Safety And Perception Of Interest Trust Online Trading System Using Internet Banking Study Empris In Bri Bank Branch Office Tangerang 2014

Effect Of Perception Use Of Information Technology Safety And Perception Of Interest Trust Online Trading System Using Internet Banking Study Empris In Bri Bank Branch Office Tangerang 2014

... helpful to have increased from year to ...facilities of Internet banking has not been fully utilized by the community in ...lack of understanding regarding the use of information ... See full document

12

Optimal Cryptographic Technique to increase the Data Security

Optimal Cryptographic Technique to increase the Data Security

... Advantages in implementing the proposed technique is the conveyed password does not gives a way to the hackers to find the actual key because the key may be a number or any person’s name or ... See full document

5

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

... media to hide ...due to their high embedding efficiency and the insensitivity of the human visual system (HVS) ...possible to embed a recording of an audio stream message inside a ... See full document

6

Shared Information Based Security Solution for Mobile Ad hoc Networks

Shared Information Based Security Solution for Mobile Ad hoc Networks

... number of wireless nodes with limited energy, transmission power and the computational power and their capability to operate without any fixed ...node in the network helps others by forwarding ... See full document

12

A Strategic Analysis of Search Engine Advertising in Web  based-commerce

A Strategic Analysis of Search Engine Advertising in Web based-commerce

... players in this role are Google and ...supposed to give permission to Search Engine to place advertisements in their website and for every click a user makes on the advertisement the ... See full document

13

SOCIAL ECONOMY – A FORM OF INCLUSION AND OF ''REACTIVATING'' OF LABOR IN THE CONTEXT OF THE CURRENT CRISIS

SOCIAL ECONOMY – A FORM OF INCLUSION AND OF ''REACTIVATING'' OF LABOR IN THE CONTEXT OF THE CURRENT CRISIS

... essence of social economy is the inclusive function of the labor market through which the different forms of social economy that exist in the member states can play a role in the ... See full document

13

Harmonics Reduction of Multilevel Inverter Drive Using Sine Carrier Pulse Width Modulation Techniques

Harmonics Reduction of Multilevel Inverter Drive Using Sine Carrier Pulse Width Modulation Techniques

... clamped multilevel inverter has been presented for drive ...SPWM technique can be implemented for producing low harmonic contents in the output; hence the high quality output voltage was ...reduction ... See full document

8

A Survey of ATM Security Implementation within the  Nigerian Banking Environment

A Survey of ATM Security Implementation within the Nigerian Banking Environment

... shift in banking delivery channels toward using self-service channels such as electronic banking, mainly the use of Automated Teller Machines (ATMs) and internet ...scene in the late sixties, Nigeria ... See full document

16

Novel Edge Mapping for License Plate Detection

Novel Edge Mapping for License Plate Detection

... role in traffic security and accessing owner’s ...essential to improve signal to noise ratio in detection of License ...approach of edge enhancement for enhancing ... See full document

5

J. bras. pneumol.  vol.35 número10 en v35n10a01

J. bras. pneumol. vol.35 número10 en v35n10a01

... cough to occur, inspiratory muscles must provide pulmonary inflation of up to 85-90% of total lung ...contraction of the expiratory muscles (intercostal and abdominal muscles) produces ... See full document

2

Show all 10000 documents...