نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

Background: Determining social vulnerability of elderly people is a prerequisite for risk analysis in natural disasters. Understanding and comprehension of different dimensions of elderly social vulnerability by using international experiences is a must to determine and ultimately measure this phenomenon. In this study, we tried to understand the dimensions of elderly social vulnerability in na...

ژورنال: Journal of Research and Health 2019

Stress is a type of person-environment relationship which is appraised by the individual as stressful or beyond one’s own resources and, as a results, threatens the individual’s wellbeing and welfare. The aim of the present study was to investigate the variables of resilience, coping strategies, and social support as predictors of vulnerability to stress among students. The participants consist...

Journal: :CoRR 2015
Benjamin Lim

Wireless networking has become very popular in recent years due to the increase in adoption of mobile devices. As more and more employees demand for Wi-Fi access for their devices, more companies have been jumping onto the "Bring Your Own Device" (BYOD) bandwagon[1] to appease their employees. One such example of an enterprise wireless infrastructure is the George Washington University’s GWirel...

Journal: :journal of algorithms and computation 0
mahmood shabankhah university of tehran, college of engineering, faculty of engineering science

the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in di erent forms to study many of the measures of vulnerability. when certain ver...

Journal: :محیط شناسی 0
مهرناز آصفی کارشناس ارشد عمران، مهندسی محیط زیست، دانشکدۀ مهندسی علوم آب، دانشگاه شهید چمران اهواز فریدون رادمنش استادیار گروه هیدرولوژی و منابع آب، دانشکدۀ مهندسی علوم آب، دانشگاه شهید چمران اهواز حیدر زارعی استادیار گروه هیدرولوژی و منابع آب، دانشکدۀ مهندسی علوم آب، دانشگاه شهید چمران اهواز

introduction because of expansion of agricultural activities and excessive use of chemical fertilizers and location of municipal and industrial wastewater of andimeshk, it is possible for this aquifer to be polluted. therefore, the aim of present study is to assess the aquifer vulnerability of andimeshk plain and recognition of sensitive areas against pollution which this work can be conducted ...

Journal: :Bulletin of Earthquake Engineering 2021

Vulnerability functions describe the expected loss for a given ground shaking intensity level and are an essential component in probabilistic seismic risk assessment. This manuscript presents novel open-source platform derivation of analytical fragility vulnerability models, covering state-of-the-art methodologies, addressing critical issues modelling such as uncertainty propagation, validation...

2014
Di Wu Jiadong Ren

Software vulnerability analysis has become a hot topic recently. However, the traditional methods for analyzing software vulnerability have higher false positive rate. In this paper, adaptive K function is defined, and SVAAKSC (Software vulnerability analysis method based on adaptive-K sequence clustering) is presented. The collected objects in software vulnerability sequence database SVSD are ...

ژورنال: بیهوشی و درد 2016

Abstract Background & Aim: Achievement to a practical model for effective chronic pain management in the elderly is high importance. Hence, the current study aimed to testing some parts of comprehensive chronic pain management model (CCPMM) in older people. Material & Method: This study is a correlation testing model in which 205 elderly patients with chronic pain were selected ...

2005
Hamid Reza Shahriari Reza Sadoddin Rasool Jalili Reza Zakeri Ali Reza Omidian

Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial TakeGrant model...

hamid mohammadi mahnaz farahmand mehdi alinezhad

Pathology and determination of students' moral vulnerability is significant step in their security against cultural, social, value, and moral changes. The present study has been done to assess the students' moral vulnerability. The theoretical framework composed of theories of Durkheim, Englehart and Lerner. By the survey technique, this study has examined the relationship between the moral vul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید