نتایج جستجو برای: vulnerability assessment

تعداد نتایج: 598326  

2007
Sumana Bhattacharya

The growing interest in adaptation policies in the context of climate change, especially among developing countries, is making vulnerability assessment a very active area of research. Understanding present day vulnerabilities and adaptation potential among local communities is increasingly being considered as a pre-requisite to such assessments. This paper focuses on understanding and quantifyi...

Journal: :Journal of Internet Technology and Secured Transaction 2015

Journal: :مدیریت مخاطرات محیطی 0
شکور سلطانی دکتری ژئومورفولوژی، وزارت نیرو ایثار نورایی صفت دانشجوی کارشناسی ارشد آموزش محیط زیست، دانشگاه تهران طاهر ولی پور دانشجوی کارشناسی ارشد هیدروژئومورفولوژی، دانشگاه شهید بهشتی عبدالکریم ویسی دانشجوی دکتری ژئومورفولوژی، دانشگاه تهران احمد عباسیان کارشناس ارشد ژئومورفولوژی، دانشگاه تهران

vulnerability and contamination risk assessment is of great importance in karst aquifer management. because of vastness of karst in zagros, natural conditions and human activity within the region of aquifer, pollution emission has become one of the most important challenges in front of zagros aquifers. the purpose of this study is to assess marab aquifer vulnerability, using riske model and, de...

Although the vulnerability assessment of forest parks is used to determine the threats they face, a rapid and holistic framework has not been established well. The primary objective of this study is to adopt a framework for rapid assessment of forest parks vulnerability, examined in Lavizan forest park in Tehran (Iran) as the case study. The vulnerability assessment has been conducted, using th...

Journal: :SIAM J. Discrete Math. 2001
Lynn Margaret Batten Jeremy M. Dover

We consider the existence of blocking semiovals in nite projective planes which have intersection sizes 1; m + 1 or n + 1 with the lines of the plane, for 1 m < n. For those prime powers q 1024, in almost all cases, we are able to show that, apart from a trivial example, no such blocking semioval exists in a projective plane of order q. We are able to prove also, for general q, that if q 2 + q ...

2015
Todor Bačkalić Marinko Maslarić Milosav Georgijević Sanja Bojić

Abstract—Presented article outlines a rationale, why it is necessary to develop competence about infrastructure risk in water transport. Climate changes are evident and require special attention and global monitoring. Current risk assessment methods for Inland waterway transport just consider some dramatic events. We present a new method for the assessment of risk and vulnerability of inland wa...

2004
Yongzheng Zhang Xiao-chun Yun

Computer security vulnerabilities badly compromise the system security. To profoundly understand the causes of known vulnerabilities and prevent them, this paper develops a new taxonomic character, and then integrates a privilege-escalating based vulnerability taxonomy with multidimensional quantitative attribute. This taxonomy greatly contributes to further researches of security risk assessme...

1995
Iztok Savnik Zahir Tari Tomaz Mohoric

We propose the set of operations for querying the conceptual schema of an objectoriented database. The operations form the basis of an algebra for objects called OVAL. They are de ned using the constructs introduced for our formalization of the object-oriented database model. The operations allow a user to query: (i) associations among individual objects, (ii) relationships between individual o...

Journal: Pollution 2018

Although the vulnerability assessment of forest parks is used to determine the threats they face, a rapid and holistic framework has not been established well. The primary objective of this study is to adopt a framework for rapid assessment of forest parks vulnerability, examined in Lavizan forest park in Tehran (Iran) as the case study. The vulnerability assessment has been conducted, using th...

2013

Purpose In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors wrongly identified or unidentified vulnerabilities can occur as uncertain data are used. Furthermore, businesses’ security needs are not considered sufficiently. Hence, security functions may not protect business assets suf...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید