نتایج جستجو برای: مدل breach

تعداد نتایج: 124667  

2017
Gordon B. Schmidt

The current study examines the relationship between adult attachment style and both perceived psychological contract breach and affective organizational commitment in a sample of college students with employment experience. Attachment style is argued to be an individual difference factor that affects how an individual perceives organizational events based on theory and existing empirical resear...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده مهندسی عمران 1390

در این تحقیق سعی شده است تا با استفاده از قابلیت مدلسازی شکست سد و مدل یک بعدی جریان غیردائمی در نرم افزار hec-ras به بررسی پارامترهای موثر در این فرایند پرداخته می شود. همچنین ضمن تبیین اهمیت مساله با توجه به جنس سد و مکانیزم شکست فرسایشی و تدریجی آن، پارامترهای موثر در شکست سد مانند زمان شکست سد، شیب مقطع شکست سد، ضریب چسبندگی و زاویه اصطکاک و ... مورد توجه و مطالعه قرار می گیرد. پارامترهای ه...

Journal: : 2023

در این تحقیق به مقایسه تحلیلی و عددی آبشار جریان برگشتی مدل R با آبشارهای Q QI سیستم‌­های چندجزیی پایدار پرداخته می‌­شود. راستا برای اولین بار کدهای جهت طراحی منظور کد نرم‌افزار متلب نوشته شده‌­اند. نتایج نشان می‌­دهد که دو جزء 1k 2k از خوراک Nc جزء، تعداد معدودی قابل تعریف است همگی حالات خاصی می­‌باشد. هم‌­چنین یافته‌­ها مجموع مقدار برش جزیی همیشه برابر یک است. طریق داده می‌­شود صورتی میانگین ...

Journal: :J. Cybersecurity 2016
Sasha Romanosky

This paper examines a sample of over 12,000 cyber events that include data breaches, security incidents, privacy violations, and phishing crimes. First, we analyze the characteristics of these breaches (such as causes, and types of information compromised). We then examine the breach and litigation rate, by industry, and we identify the industries that incur the greatest costs from cyber events...

2009
William Roberds Stacey L. Schreft

This paper presents a monetary-theoretic model to study the implications of networks’ collection of personal identifying data and data security on each other’s incidence and costs of identity theft. To facilitate trade, agents join clubs (networks) that compile and secure data. Too much data collection and too little security arise in equilibrium with noncooperative networks compared with the e...

2005
Brian J. d'Auriol Afolami Akinsanmi

This paper describes an approach for intrusion detection that is based on conceptual representations. The Conceptual Space model is adapted to represent information about potential intrusive activity. In order to more easily provide for decisions regarding assessment of intrusive behavior, we incorporate superellipsoids into our adapted conceptual space model. Brief comments regarding conceptua...

2015
Mehrad Kamalzare Zhongxian Chen

Improved computer models of erosion have been developed, considering soil hydraulic conductivity. The models deal with erosion of levees, dams and embankments due to overtopping. The simulations trace the formation of rills and gullies, beginning with initial overtopping and continuing to final breaching. Physical models performed at 1-g and high g using a geotechnical centrifuge have been used...

2008
Vadim N. Smelyanskiy Dmitry G. Luchinsky Vyatcheslav V. Osipov Dogan A. Timucin Serdar Uckun

We develop a case breach model for the on-board fault diagnostics and prognostics system for subscale solid-rocket boosters (SRBs). The model development was motivated by recent ground firing tests, in which a deviation of measured time-traces from the predicted time-series was observed. A modified model takes into account the nozzle ablation, including the effect of roughness of the nozzle sur...

2015
Jasmina Kevric Victor Aguirre Kate Martin Dinesh Varma Mark Fitzgerald Charles Pilgrim

Introduction. Management of haemodynamically stable patients with penetrating abdominal injuries varies from nonoperative to operative management. The aim was to investigate whether peritoneal breach when used as an indication for exploratory laparotomy appropriately identified patients with intra-abdominal visceral injury. Methods. We conducted retrospective cohort study of all patients presen...

2018
Samantha K. Jones Yannick Griep

Employees often draw meaning from personal experiences and contributions in their work, particularly when engaging in organizational activities that align with their personal identity or values. However, recent empirical findings have demonstrated how meaningful work can also have a negative effect on employee's well-being as employees feel so invested in their work, they push themselves beyond...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید