نتایج جستجو برای: threat assessment

تعداد نتایج: 609945  

H. Zhang J. Ge J. Xie Y. Song Z. Zhang

A novel ranking method based on multi-time information fusion is proposed for intuitionistic fuzzy sets (IFSs) and applied to the threat assessment problem, a multi-attribute decision making (MADM) one. This method integrates a designed intuitionistic fuzzy entropy (IFE), the closeness degree of technique for order preference by similarity to ideal solution (TOPSIS), the decision maker¡¯s (DM¡¯...

2017
Karin Mogg Allison M. Waters Brendan P. Bradley

Attention bias modification (ABM) aims to reduce anxiety by reducing attention bias (AB) to threat; however, effects on anxiety and AB are variable. This review examines 34 studies assessing effects of multisession-ABM on both anxiety and AB in high-anxious individuals. Methods include ABM-threat-avoidance (promoting attention-orienting away from threat), ABM-positive-search (promoting explicit...

Journal: :Phytopathology 2006
N W Schaad J Abrams L V Madden R D Frederick D G Luster V D Damsteegt A K Vidaver

ABSTRACT Natural, accidental, and deliberate introductions of nonindigenous crop pathogens have become increasingly recognized as threats to the U.S. economy. Given the large number of pathogens that could be introduced, development of rapid detection methods and control strategies for every potential agent would be extremely difficult and costly. Thus, to ensure the most effective direction of...

2003
S Vidalis Stilianos Vidalis Andy Jones

During the development of the TAME threat assessment methodology under framework 5 IST-2000–29601, the problem of analysing and examining vulnerabilities was identified. The methodology was developed for the assessment and analysis of threat and vulnerabilities within the context of a security risk management. TAME was developed with the needs of electronic payment systems in mind and it consis...

2007
John Cannon

The use of development threat as a tool in conservation prioritization is becoming increasingly common. When used as a component of a larger planning methodology that may include factors such as biological integrity, area, and connectivity, degree of threat may help an organization to protect a larger amount of land that it would otherwise have been able to. I develop two models of development:...

2016
Colin J. Carlson Eric R. Dougherty Wayne Getz

The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknow...

2012
Ameya M Sanzgiri

Wireless devices are becoming an integral part of the human environment and their seamless integration has created a range of new wireless sensor network architectures. Unfortunately the security of such networks often lags behind other advances and more often than not is developed only after the core systems and protocols have been standardized. This results in these security schemes having ca...

2005
Robert Suzić

Plan recognition has to be performed in a statistically robust manner concerning a possibly infinite number of tactical situations and different types of units. We need a generic model for tactical plan recognition where we combine observations and a priori knowledge in a flexible manner by using suitable methodologies and by having a large hypothesis space taken into account. Threat and theref...

Journal: :Behavioral sciences & the law 2012
J Reid Meloy Jens Hoffmann Angela Guldimann David James

The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been...

2016
Nicholas G. Paulter John A. Ely

The assessment of the detection performance of metal detectors (hand-worn, hand-held, and walk-through models) is based on the ability of the detectors to sound an alarm when presented with a test object. These test objects are typically actual threat items or simulated threat items. The orientation of these test objects with the magnetic field generated by the metal detectors may affect the de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید