نتایج جستجو برای: vulnerability matrix
تعداد نتایج: 406702 فیلتر نتایج به سال:
abstract this paper discusses several commonly used models for strategic marketing¹ including market environmental analysis methods (i.e. swot and pest analysis) and strategic marketing tools and techniques (i.e. boston matrix and shell directional policy matrix)and shows how these models may help a firm to achieve its strategic goals. at first, the main reason for doing this research is de...
vulnerability and contamination risk assessment is of great importance in karst aquifer management. because of vastness of karst in zagros, natural conditions and human activity within the region of aquifer, pollution emission has become one of the most important challenges in front of zagros aquifers. the purpose of this study is to assess marab aquifer vulnerability, using riske model and, de...
according to non-existence of accurate inspection tools on various steps of design and construction of buildings in the past, also due to any change in function of some structures and finally of seismic activities of residential regions of the country, vulnerability assessment of existing structures is necessary. evaluation of vulnerability of the structures is classified in two categories, qua...
one of the most important number sequences in mathematics is fibonacci sequence. fibonacci sequence except for mathematics is applied to other branches of science such as physics and arts. in fact, between anesthetics and this sequence there exists a wonderful relation. fibonacci sequence has an importance characteristic which is the golden number. in this thesis, the golden number is observed ...
AIMS Anti-Apolipoprotein A-1 auto-antibodies (anti-ApoA-1 IgG) represent an emerging prognostic cardiovascular marker in patients with myocardial infarction or autoimmune diseases associated with high cardiovascular risk. The potential relationship between anti-ApoA-1 IgG and plaque vulnerability remains elusive. Thus, we aimed to investigate the role of anti-ApoA-1 IgG in plaque vulnerability....
Sensitivity analysis attacks aim at estimating a watermark from multiple observations of the detector’s output. Subsequently, the attacker removes the estimated watermark from the watermarked signal. In order to measure the vulnerability of a detector against such attacks, we evaluate the fundamental performance limits for the attacker’s estimation problem. The inverse of the Fisher information...
The "blood vulnerability", resulting from the complex balance between serum molecules and inflammatory cell atherosclerotic activities, is a major determinant in the evaluation of the "global patient cardiovascular vulnerability". In the present study, we focused on the role of the soluble receptor activator of nuclear factor kappa-B (NF-κB) ligand (RANKL, a potential marker of coronary calcifi...
In this paper, we propose a scenario framework that could provide a scenario ‘‘thread’’ through the different climate research communities (climate change – vulnerability, impact, and adaptation and mitigation) in order to support assessment of mitigation and adaptation strategies and climate impacts. The scenario framework is organized around a matrix with two main axes: radiative forcing leve...
if we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.in this paper we discuss...
Side-channel attacks try to break a system’s confidentiality using physical information emitted from the targeted system. Such information is leaked out through cache side channels, which can exist in many parts of the system. Cache memories are a potential source of information leakage through side-channel attacks, many of which have been proposed. Meanwhile, different cache architectures have...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید