نتایج جستجو برای: vulnerability measures
تعداد نتایج: 394565 فیلتر نتایج به سال:
Abstract Climate change causes hydrometeorological disasters in Indonesia more frequently happen. One of them is drought. Drought reduces water availability and decreases agricultural production. It necessary to select soil conservation techniques according the level vulnerability mitigate losses. We researched Capluk Watershed which often experiencing The watershed located on Northern Coast Ja...
Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection with the rapid development of importance information modern world, encroachments on resources began grow. A group security tools was developed prevent unauthorized access it or its elements. This defined as term "information security". It should be noted that precisely preven...
Previous studies, in which cognitive and motor neuropsychological tasks were administered to 816 children from Attention-Deficit/Hyperactivity Disorder (ADHD)- and control-families, showed that various of these measures appeared useful for genetic research in ADHD by forming candidate endophenotypes: underlying, heritable, vulnerability traits that mark an enhanced liability for developing ADHD...
I n the June 2004 Security column (" A Patch in Nine Saves Time? " pp. 82-83), Bill Arbaugh makes two interesting observations: first, whoever has the tightest observe-orient-decide-act (OODA) loop will prevail in a confrontation; second, the infection rates of recent worms suggest that the good guys are losing the battle. Arbaugh offers some sensible suggestions to vendors and security profess...
Background and Objective: Several studies revealed that disgust as an emotional response underlies the contamination fears in Contamination Obsessive Compulsive Disorder (OCD). Other studies supported the role of cognitions related to contagion and disease in contamination OCD. The present study aimed to integrate these two lines of evidence. To this end, regarding the concept of the behavioral...
BACKGROUND The vulnerability approach suggests that disasters such as epidemics have different effects according not only to physical vulnerability but also to economic class (status). This paper examines the effect of the Middle East Respiratory Syndrome epidemic on the labor market to investigate whether vulnerable groups become more vulnerable due to an interaction between the socio-economic...
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) products differ extensively in the way that they can detect vulnerabilities, as well as in the number of vulnerabilities that they can detect. Often, VS products also declare their own vendor-specific vulnerability categori...
The main functional purpose of a water distribution network is to transport water from a source to several domestic and industrial units while at the same time satisfying various requirements on hydraulic response. All the water distribution networks perform two basic operations: firstly the water network needs to deliver adequate amounts of water to meet specific requirements, and secondly the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید