نتایج جستجو برای: vulnerability matrix
تعداد نتایج: 406702 فیلتر نتایج به سال:
Context Using components with known vulnerabilities is still one of the most frequent causes for security incidents today [5]. It is of the essence, therefore, to possess a comprehensive overview of the software components utilized by the software, in order to mitigate the vulnerabilities they may withold prior to releasing the software. On the one hand, tools like Maven provide a reliable over...
Smooth muscle cells (SMCs) play an important role in the stabilization of atherosclerotic plaques. They contribute to form a firm fibrous cap by synthesizing and assembling fibrillar collagen I, a process that requires the synthesis of fibronectin and activation of integrins. However, extracellular matrix composition changes during the formation of atherosclerotic plaques. Type I and III collag...
with respect to population growth and agricultural development in ardabil plain, vulnerability assessment of the plain aquifer is necessary for management of groundwater resources and the prevention of groundwater contamination. in this study, vulnerability of ardabil plain aquifer to pollution was evaluated by drastic method. drastic model was prepared by seven effective parameters on vulnerab...
abstract background: leachate produced by waste disposal sites can be contaminating groundwater. the contamination vulnerability and groundwater protection assessment has proved to be an effective tool for the delineation of protection zones in area affected by groundwater contamination. the main objective of the study is to evaluate aquifer pollution vulnerability in the new waste disposal sit...
a matrix $pintextmd{c}^{ntimes n}$ is called a generalized reflection matrix if $p^{h}=p$ and $p^{2}=i$. an $ntimes n$ complex matrix $a$ is said to be a reflexive (anti-reflexive) matrix with respect to the generalized reflection matrix $p$ if $a=pap$ ($a=-pap$). in this paper, we introduce two iterative methods for solving the pair of matrix equations $axb=c$ and $dxe=f$ over reflexiv...
Objectives The triple vulnerability model includes three types of vulnerability in terms of emotional disorders: general biological vulnerability, general psychological vulnerability, and disorder-specific psychological vulnerability. Since previous studies have mostly addressed only one of these components, this study was conducted to examine all the three components of the triple vulnerabilit...
the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. when certain ver...
matrix metalloproteinases (mmps) are a family of neutral proteinases that are important in normal development, cellular differentiation or migration, angiogenesis, neurogenesis, wound repair, and a wide range of pathological processes such as oxidative stress and neuroinflammation. mmps have been demonstrated to increase the permeability of the blood–brain barrier (bbb) by degrading the compone...
A small but growing literature has been concerned about the economic (and environmental) vulnerability on the level of countries. Less attention is paid to the economic vulnerability of different regions within countries. By focusing on the vulnerability of subnational regions, our paper contributes to the small literature on the ‘vulnerability of place’. We see the vulnerability of place as be...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید