نتایج جستجو برای: keywords notional security
تعداد نتایج: 2121554 فیلتر نتایج به سال:
Version v1.0 Status Final Dissemination Level PP Nature P Keywords predictive security analysis, analysis of process behavior, security monitoring, security assessment tools Reviewers Luigi Coppolino (Epsilon)
cash transfer (cts) is an increasingly popular social protection mechanism used by many developing countries to improve the food security and nutritional status of lower socio-economic groups. this paper is a review of the literature regarding the impact of ct programs on the food security of recipient households in the developing countries, including iran. we looked for all original studies, p...
A layered approach to the simulation of dynamically interdependent systems is presented. In particular, the approach is applied to the integrated engineering plant of a notional all-electric warship. The models and parameters of the notional ship are presented herein. This approach is used to study disruptions to the integrated engineering plant caused by anti-ship missiles. Example simulation ...
Interior brick-infill partitions are usually considered as non-structural components and only their weight is accounted for in practical structural design. In this study, their effect on the progressive collapse resistance of an RC building subjected to sudden column loss is investigated. Three notional column loss conditions with four different brick-infill locations are considered. Column-los...
The Declaration by the Labour and Employment Ministers of BRICS countries, “Quality Jobs Inclusive Policies,” guarantees that formalization labor markets is a global priority for as informal employment hampers productivity, potential economic growth efforts to improve welfare populations worldwide. Taking into account this strategic goal, authors analyze processes in countries speculate on tran...
abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...
this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...
Big data volume continues to grow at unprecedented rates. One of the key features that makes big data valuable is the promise to find unknown patterns or correlations that may be able to improve the quality of processes or systems. Unfortunately, with the exponential growth in data, users often have difficulty in visualizing the often-unstructured, nonhomogeneous data coming from a variety of s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید