نتایج جستجو برای: non associated flow rule

تعداد نتایج: 3154381  

Journal: :مطالعات حقوق خصوصی 0
ابراهیم تقی زاده دانشیار گروه حقوق خصوصی دانشکدۀ الهیات و علوم اسلامی دانشگاه پیام نور

the principle of “non-retractable agreement between contractual and non-contractual responsibility” is a traditional rule in the french law and countries adapting the french law of harmony and homogeneity; this rule means that if the claim for petition is based on the mistake, i.e., if it was meant to be based on contractual liability, rather than liability enforced in accordance with establish...

Journal: :European Journal of Operational Research 2005

2014
Gargi Joshi

Today network security, uptime and performance of network are important and serious issue in computer network. Anomaly is deviation from normal behavior which is factor that affects on network security. So Anomaly Extraction which detects and extracts anomalous flow from network is requirement of network operator. Anomaly extraction refers to automatically finding in a large set of flows observ...

Journal: :Management Science 2009
Alan D. Jagolinzer

The SEC enacted Rule 10b5-1 to deter insiders from trading with private information, yet also protect insiders’ preplanned, non-information-based trades from litigation. Despite its requirement that insiders plan trades when not privately informed, the Rule appears to enable strategic trade. Participating insiders’ sales systematically follow positive and precede negative firm performance, gene...

Journal: :Journal of Logic and Algebraic Programming 2004

Journal: :iranian journal of fuzzy systems 2014
mohammad reza moosavi mahsa fazaeli javan mohammad hadi sadreddini mansoor zolghadri jahromi

predicting different behaviors in computer networks is the subject of many data mining researches. providing a balanced intrusion detection system (ids) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

Strains are applied to the integration procedure in nonlinear increments todecrease the errors arising from the linearization of plastic equations. Two deformationvectors are used to achieve this. The first vector is based on the deformations obtained bythe first iteration of the equilibrium step, and the second is acquired from the sum of thesucceeding iterations. By applying these vectors and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید