نتایج جستجو برای: nvd
تعداد نتایج: 200 فیلتر نتایج به سال:
Statement of Problem: Previous experiences and clinical observations indicate that enamel hypoplasia and hypocalcification of first permanent molars, among infants born in Cessarian Section Delivery (C/S) is more common than those born in Normal Vaginal Delivery (NVD). Moreover, the first permanent molar is the only tooth that its "cusp tip calcification" starts exactly at the time of delivery....
The evaluation of network risk is a vital task. It is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design security countermeasures in order to improve security. This paper proposes a risk estimation model that uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerabi...
Context Using components with known vulnerabilities is still one of the most frequent causes for security incidents today [5]. It is of the essence, therefore, to possess a comprehensive overview of the software components utilized by the software, in order to mitigate the vulnerabilities they may withold prior to releasing the software. On the one hand, tools like Maven provide a reliable over...
Blurred vision with head movement is a common symptom reported by patients with vestibular dysfunction affecting the vestibulo-ocular reflex (VOR). Impaired VOR can be measured by comparing visual acuity in which there is no head movement to visual acuity obtained with head movement. A previous study demonstrated that dynamic visual acuity (DVA) testing using vertical head movement revealed def...
Background: Normal vaginal delivery is the best method of delivery. Vaginal delivery is followed by the best pregnancy outcomes. Reducing the rate of cesarean delivery has been a health goal for the United States with economic and social advantages. This study has been conducted with aim of maternal and neonatal outcomes of Normal Vaginal Delivery (NVD) and comparing with cesarean delivery. Me...
Cyclic division algebra (CDA) has recently become a major technique to construct nonvanishing determinant (NVD) space-time block codes. The CDA based construction method usually consists of two steps. The first step is to construct a degree-n cyclic extension over a base field and the second step is to find a non-norm algebraic integer in the base field. In this paper, we first propose a simple...
Teenage pregnancy is recognized in many countries as a health risk associated with a higher rate of maternal and fetal complications, particularly in developing countries with limited obstetric facilities. This study compares the obstetric outcomes of teenagers (age -20 years) with those of 20–29year-old mothers. The data were collected from the records of pregnant women admitted for delivery a...
Machine understandable security vulnerabilities are in need for security content automation [2]. Common Vulnerabilities and Exposures (CVE) is an industry standard of common names for publicly known information security vulnerabilities, and has been widely adopted by organizations to provide better coverage, easier interoperability, and enhanced security [1]. In this paper, we focus our researc...
Multiple software products often exist on the same server and therefore vulnerability in one product might compromise the entire system. It is imperative to perform a security risk assessment during the selection of the candidate software products that become part of a larger system. Having a quantitative security risk assessment model provides an objective criterion for such assessment and com...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید