تحقیق یاب

مرکز دانلود انواع فایل های دانشجویی و دانش آموزی(تحقیق,پاورپوینت,پروژه,مقاله,فایل فلش و ...)

تحقیق یاب

مرکز دانلود انواع فایل های دانشجویی و دانش آموزی(تحقیق,پاورپوینت,پروژه,مقاله,فایل فلش و ...)

ترجمه مقاله Importance of Cryptography in Network Security

Importance of Cryptography in Network Security Abstract the main aim of this paper is to provide a broad review of network security and cryptography, with particular regard to digital signatures. Network security and cryptography is a subject too wide ranging to coverage about how to protect information in digital form and to provide security services. However, a general overview of network security and cryptography is provided and various algorithms are discussed. A detailed review of the subj ...

ترجمه مقاله Intrusion Detection in Role Administrated Database:Transaction- Based Approach

Intrusion Detection in Role Administrated Database:Transaction- Based Approach   Abstract Most of valuable information resources for all organizations are stored in database. It's a serious subject to protect this information against intruders. However, conventional security mechanisms haven’t been designed to detect anomalous actions of database users. Intrusion detection systems (IDS) deliver an extra layer of security that cannot be guaranteed by built-in security tools. IDS provi ...

ترجمه مقاله Survey on pre-shared key in wireless sensor network

Survey on pre-shared key in wireless sensor network   Abstract This paper presents the overview of key management ,and Pre-shared key scheme in WSN,then this paper presents implementation of Pre-shared key Protocol using different parameters and shows communication of nodes Based on the results of its implementation, some limitations of PSK are explained.   بررسی کلید از پیش اشتراک گذاشته شده(PSK)، در شبکه ی سنسوری بی سیم در این مقاله، سعی شده است تا به ارائه ی رویکردی مرتبط با مدی ...

ترجمه مقاله An Improved ID-Based Key Management Scheme in Wireless Sensor Network

An Improved ID-Based Key Management Scheme in Wireless Sensor Network   Abstract Key management is one of the critical areas in WSN as limited resources of sensor nodes restrict the use of conventional security techniques. Most of the sensor networks use shared key among all the nodes to make communicational overhead minimal. But it is vulnerable to many attacks like stolen-verifier attack, replay attack, node-compromise attack etc. In this paper, we propose an efficient ID-based key manag ...

A Guidebook to Contemporary Architecture in Vancouver

 ISBN/ASIN: 1553654455,9781553654452 | 2010 | English | pdf | 192/195 pages | 17.1 MbPublisher: Douglas & McIntyre | Author: Christopher Macdonald, Veronica Gillies, Helen Malkin, Nancy Dunton A Guidebook to Contemporary Architecture in Vancouver explores buildings constructed as the city experienced unprecedented growth, beginning with Expo ‘86 and continuing through the 2010 Olympic Winter Games. The guidebook features buildings and public spaces grouped by areas, with maps so t ...

کتاب Genetics in Medicine زبان اصلی

Thompson & Thompson Genetics in Medicine سال انتشار:2016 چاپ هشتم  Updated to reflect the newest changes in genetics, Thompson & Thompson's Genetics in Medicinereturns as one of the most favored texts in this fascinating and rapidly evolving field. By integrating theclassic principles of human genetics with modern molecular genetics, this medical reference book utilizes a variety of learning tools to help you understand a wide range of genetic disorders حجم فایل: 33 مگابایت &nbs ...

A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks

Abstract In this paper, we investigate the impacts of applying game theory on the network throughput, network voltage loss and accuracy of malicious node detection to wireless sen- sor networks. We implement a protocol which the sensors use when deciding whether or not to forward packets they receive from other sensors in order to conserve power. Nodes in a wireless sensor network accomplish this by optimizing their decision making based on a framework using game theory. De¯ning a suitable ...