نتایج جستجو برای: vulnerability matrix

تعداد نتایج: 406702  

2017
Sandip Roy Mengran Xue Banavar Sridhar

Simple topological vulnerability metrics are defined for the air transportation system, that are meant to reflect the impact levels of potential disruptions including severe weather and man-made threats (e.g., cyber attacks). Specifically, a flowvulnerability metric is defined using the Laplacian matrix of the air traffic network’s graph. In turn, event and total vulnerability metrics are posit...

Journal: :DEStech Transactions on Computer Science and Engineering 2017

حاتم‌پور, شورش, سهرابی, ظریفه, شالچی, دکتربهزاد,

Abstract Introduction: According to literature, eligible family and socio-economic status with spiritual acumen can decrease the vulnerability of individuals to substance use. Objective: The aim of this research was to investigate the mediating role of spirituality intelligence in relationships of family function and socioeconomic status with vulnerability to addiction. Materials and Methods...

2015
Ryoma Morigaki Satoshi Goto

The human neostriatum consists of two functional subdivisions referred to as the striosome (patch) and matrix compartments. The striosome-matrix dopamine systems play a central role in cortico-thalamo-basal ganglia circuits, and their involvement is thought to underlie the genesis of multiple movement and behavioral disorders, and of drug addiction. Human neuropathology also has shown that stri...

2016
Emma E. Hodgson Timothy E. Essington Isaac C. Kaplan

Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to ex...

2008
Sylvia Heeneman Esther Lutgens Kitty B. Schapira Erik A.L. Biessen

1. Abstract 2. Defining plaque vulnerability 3. Use of transgenic mice to study plaque vulnerability 3.1. Models 3.2. Methodological considerations 3.2.1. Bone marrow reconstitution 3.2.2. Assessment of lesion development 3.2.3. Genetic background 3.2.4. Mouse models and human end stage disease 4. Lessons learned from genetically-engineered mice 4.1. Manipulation of apoptosis 4.1.1. Apoptosis i...

Journal: :international journal of agricultural management and development 2013
mojtaba sookhtanlo hesamedin gholami seyyed reza es’haghi

identification and analysis of farmers’ vulnerability associated with their risk aversion degree is one of the necessary requirements for planning and reducing impacts of drought in iran. so, this study was investigated three risk vulnerability parameters (economic, social and technical) among wheat farmers categorized in accordance with their risk aversion degree in the mashhad county (iran) b...

2017
Yi Ge Wen Dou Jianping Dai

This paper explored a new approach regarding social vulnerability to climate change, and measured social vulnerability in three parts: (1) choosing relevant indicators of social vulnerability to climate change; (2) based on the Hazard Vulnerability Similarity Index (HVSI), our method provided a procedure to choose the referenced community objectively; and (3) ranked social vulnerability, exposu...

Journal: :Photochemistry and photobiology 2005
Roger R Hill Sharon A Moore David R Roberts

The scope of photobiological processes that involve absorbers within a protein matrix may be limited by the vulnerability of the peptide group to attack by highly reactive redox centers consequent upon electronic excitation. We have explored the nature of this vulnerability by undertaking comprehensive product analyses of aqueous photolysates of 12 N-p-toluenesulfonyl peptides with systematical...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید