نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

Journal: :مدیریت مخاطرات محیطی 0
شکور سلطانی دکتری ژئومورفولوژی، وزارت نیرو ایثار نورایی صفت دانشجوی کارشناسی ارشد آموزش محیط زیست، دانشگاه تهران طاهر ولی پور دانشجوی کارشناسی ارشد هیدروژئومورفولوژی، دانشگاه شهید بهشتی عبدالکریم ویسی دانشجوی دکتری ژئومورفولوژی، دانشگاه تهران احمد عباسیان کارشناس ارشد ژئومورفولوژی، دانشگاه تهران

vulnerability and contamination risk assessment is of great importance in karst aquifer management. because of vastness of karst in zagros, natural conditions and human activity within the region of aquifer, pollution emission has become one of the most important challenges in front of zagros aquifers. the purpose of this study is to assess marab aquifer vulnerability, using riske model and, de...

Ezatolah Ahmadi, Farhad Ghadiri Sourman Abadi, Jalil Babapur Kheiradin, Karim Abdolmohamadi,

Objective: We aimed to determine the relationship between self-efficacy and alexithymia with vulnerability to drug abuse among students. Methods: The study method was descriptive and correlational. In this study, 483 male high-school students from Salmas City, Iran were selected by multi-stage cluster sampling method. All participants completed the Toronto alexithymia scale, general self-effic...

Journal: :مهندسی سازه 0
سید ادریس جوادین محمدعلی لطف الهی یقین

according to non-existence of accurate inspection tools on various steps of design and construction of buildings in the past, also due to any change in function of some structures and finally of seismic activities of residential regions of the country, vulnerability assessment of existing structures is necessary. evaluation of vulnerability of the structures is classified in two categories, qua...

2014
Beverly Rivera Irbis Gallegos Vladik Kreinovich

The main objective of vulnerability analysis is to select the alternative which is the least vulnerable. To make this selection, we must describe the vulnerability of each alternative by a single number then we will select the alternative with the smallest value of this vulnerability index. Usually, there are many aspects of vulnerability: vulnerability of a certain asset to a storm, to a terro...

2000
Bruce Barnett

NOOSE (Networked Object-Oriented Security Examiner) is a distributed vulnerability analysis system based on object modeling. It merges the functionality of host-based and network-based scanners, storing the results into several object classes. The remote agents are implemented as dynamically extended PERL agents. NOOSE is able to collect vulnerabilities from a variety of sources, including outp...

2009
Xuejiao Liu Debao Xiao Nian Ma Jie Yu

Nowadays attacks are becoming increasingly frequent and sophisticated, and they are also becoming increasingly interconnected. Recent works in network security have demostrated the fact that combinations of vulnerability exploits are the typical means by which an attacker can break into a network. It is therefore in great need of performing vulnerability analysis to do security analysis first a...

2007
Cesar Calvo Stefan Dercon

Standard poverty analysis makes statements about deprivation after the veil of uncertainty has been lifted. Nonetheless, the term 'vulnerability' has been used as a tool to remark that uncertainty and risk do matter. In this paper, we define 'vulnerability to poverty' as the magnitude of the threat of poverty, measured exante, before uncertainty is resolved. We describe the desirable properties...

2013
Weifang Shi Weihua Zeng

Reducing human vulnerability to chemical hazards in the industrialized city is a matter of great urgency. Vulnerability mapping is an alternative approach for providing vulnerability-reducing interventions in a region. This study presents a method for mapping human vulnerability to chemical hazards by using clustering analysis for effective vulnerability reduction. Taking the city of Shanghai a...

2010
Jonas Johansson

Reliable electrical power supply is a prerequisite for the modernsociety, and if it fails, it can cause severe consequences in terms of economiclosses and even fatalities. It is thus important to analyse the vulnerabilityof the electric power system. Network analysis has previously been used toanalyse the vulnerability of electric transmission systems. Recent events inSweden...

Journal: :journal of algorithms and computation 0
dara moazzami university of tehran, college of engineering, department of engineering science

if we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.in this paper we discuss...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید