نتایج جستجو برای: vulnerability matrix

تعداد نتایج: 406702  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده مهندسی 1387

abstract this paper discusses several commonly used models for strategic marketing¹ including market environmental analysis methods (i.e. swot and pest analysis) and strategic marketing tools and techniques (i.e. boston matrix and shell directional policy matrix)and shows how these models may help a firm to achieve its strategic goals. at first, the main reason for doing this research is de...

Journal: :مدیریت مخاطرات محیطی 0
شکور سلطانی دکتری ژئومورفولوژی، وزارت نیرو ایثار نورایی صفت دانشجوی کارشناسی ارشد آموزش محیط زیست، دانشگاه تهران طاهر ولی پور دانشجوی کارشناسی ارشد هیدروژئومورفولوژی، دانشگاه شهید بهشتی عبدالکریم ویسی دانشجوی دکتری ژئومورفولوژی، دانشگاه تهران احمد عباسیان کارشناس ارشد ژئومورفولوژی، دانشگاه تهران

vulnerability and contamination risk assessment is of great importance in karst aquifer management. because of vastness of karst in zagros, natural conditions and human activity within the region of aquifer, pollution emission has become one of the most important challenges in front of zagros aquifers. the purpose of this study is to assess marab aquifer vulnerability, using riske model and, de...

Journal: :مهندسی سازه 0
سید ادریس جوادین محمدعلی لطف الهی یقین

according to non-existence of accurate inspection tools on various steps of design and construction of buildings in the past, also due to any change in function of some structures and finally of seismic activities of residential regions of the country, vulnerability assessment of existing structures is necessary. evaluation of vulnerability of the structures is classified in two categories, qua...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده ریاضی 1389

one of the most important number sequences in mathematics is fibonacci sequence. fibonacci sequence except for mathematics is applied to other branches of science such as physics and arts. in fact, between anesthetics and this sequence there exists a wonderful relation. fibonacci sequence has an importance characteristic which is the golden number. in this thesis, the golden number is observed ...

Journal: :European heart journal 2011
Fabrizio Montecucco Nicolas Vuilleumier Sabrina Pagano Sébastien Lenglet Maria Bertolotto Vincent Braunersreuther Graziano Pelli Enikö Kovari Bianca Pane Giovanni Spinella Aldo Pende Domenico Palombo Franco Dallegri François Mach Pascale Roux-Lombard

AIMS Anti-Apolipoprotein A-1 auto-antibodies (anti-ApoA-1 IgG) represent an emerging prognostic cardiovascular marker in patients with myocardial infarction or autoimmune diseases associated with high cardiovascular risk. The potential relationship between anti-ApoA-1 IgG and plaque vulnerability remains elusive. Thus, we aimed to investigate the role of anti-ApoA-1 IgG in plaque vulnerability....

2009
Maha El Choubassi Pierre Moulin

Sensitivity analysis attacks aim at estimating a watermark from multiple observations of the detector’s output. Subsequently, the attacker removes the estimated watermark from the watermarked signal. In order to measure the vulnerability of a detector against such attacks, we evaluate the fundamental performance limits for the attacker’s estimation problem. The inverse of the Fisher information...

Journal: :Thrombosis and haemostasis 2012
Alessandra Quercioli François Mach Maria Bertolotto Sébastien Lenglet Nicolas Vuilleumier Katia Galan Sabrina Pagano Vincent Braunersreuther Graziano Pelli Vito Pistoia Giovanna Bianchi Giuseppe Cittadini Giorgio Luciano Viviani Aldo Pende Pascale Roux-Lombard Aurélien Thomas Christian Staub Osman Ratib Franco Dallegri Thomas Helmut Schindler Fabrizio Montecucco

The "blood vulnerability", resulting from the complex balance between serum molecules and inflammatory cell atherosclerotic activities, is a major determinant in the evaluation of the "global patient cardiovascular vulnerability". In the present study, we focused on the role of the soluble receptor activator of nuclear factor kappa-B (NF-κB) ligand (RANKL, a potential marker of coronary calcifi...

2011
Detlef P. van Vuuren Keywan Riahi Richard Moss Jae Edmonds Allison Thomson Nebojsa Nakicenovic Tom Kram Frans Berkhout Rob Swart Anthony Janetos Steven K. Rose Nigel Arnell

In this paper, we propose a scenario framework that could provide a scenario ‘‘thread’’ through the different climate research communities (climate change – vulnerability, impact, and adaptation and mitigation) in order to support assessment of mitigation and adaptation strategies and climate impacts. The scenario framework is organized around a matrix with two main axes: radiative forcing leve...

Journal: :journal of algorithms and computation 0
dara moazzami university of tehran, college of engineering, department of engineering science

if we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.in this paper we discuss...

2014
TIANWEI ZHANG

Side-channel attacks try to break a system’s confidentiality using physical information emitted from the targeted system. Such information is leaked out through cache side channels, which can exist in many parts of the system. Cache memories are a potential source of information leakage through side-channel attacks, many of which have been proposed. Meanwhile, different cache architectures have...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید