نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

Journal: :CoRR 2017
Vena Pearl Boñgolan Oreste Terranova Edward Nataniel Apostol Joshua Kevin Cruz

We try to answer the question: "can we 'modify' our neighborhoods to make them less vulnerable to flooding?" We minimize flooding vulnerability for a city in the central plain of Luzon, by modeling the city as a biological organism with 'traits', and try to 'breed' a 'champion' city (with a low flooding vulnerability) via a genetic algorithm. The result is a description of the traits the barang...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2015

Journal: :Műszaki Tudományos Közlemények 2018

Journal: :World Bank policy research working paper 2022

Journal: :Journal of risk and financial management 2021

Fiscal vulnerability, like a contagion, poses threat to financial sector stability, which can lead towards sovereign default. This study aimed assess fiscal vulnerability crisis by investigating the Australian economy’s gross public debt, net and liabilities. We used threshold regression model compared results with baseline deficit–debt framework of analysis. The base suggested that economy is ...

Journal: :اقتصاد و توسعه کشاورزی 0
حسام ایرجی منصور زیبایی فاطمه نصرنیا

introduction: iran is constantly exposed to natural disasters such as floods, earthquakes and drought. in the meantime, drought is the major natural disaster which leads to numerous losses in agriculture and water resources, and this phenomenon is slow and creeping.available evidence suggests that drought management is based on crisis management. as the present management in our country is base...

2010
Hossain Shahriar

Today's programs are implemented in a variety of languages and contain serious vulnerabilities which can be exploited to cause security breaches. These vulnerabilities have been exploited in real life and resulted in damages to related stakeholders such as program users. As most vulnerabilities belong to program code, many techniques have been applied to mitigate vulnerabilities before and afte...

2017
Dearbhail Bracken-Roche Emily Bell Mary Ellen Macdonald Eric Racine

BACKGROUND The concept of vulnerability has held a central place in research ethics guidance since its introduction in the United States Belmont Report in 1979. It signals mindfulness for researchers and research ethics boards to the possibility that some participants may be at higher risk of harm or wrong. Despite its important intended purpose and widespread use, there is considerable disagre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید