نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

Hosseini Teshnizi, Saeed, Hosseini, Mohammad Ali, Khankeh, Hamid Reza, Kovari, Seyed Habibollah, Mirzayi, Golnush,

Background: The safety of rehabilitation centers is of great importance to ensure the well-being of patients. The present study aimed to determine non-structural and functional vulnerability of state rehabilitation centers of Tehran City welfare organization in disasters using national standard instruments in 2014. Materials and Methods: This study has a descriptive and cross-se...

1974
Paul A. Karger Roger R. Schell

* This article is a reprint of a technical report [19] published in June 1974. The program listings from the appendices have been omitted, due to space constraints. The text has been retyped and the figures redrawn, but with no substantive changes. The references have been updated, as some were not yet in final form in 1974. ABSTRACT A security evaluation of Multics for potential use as a two-l...

1997
Ivan Krsul

Computer security professionals and researchers do not have a history of sharing and analyzing computer vulnerability information. Scientists and engineers from older or more established fields have long understood that publicizing, analyzing, and learning from other people's mistakes is essential to the stepwise refinement of complex systems. Computer scientists, however, have not followed sui...

ژورنال: اعتیاد پژوهی 2010
چاوش‌زاده, زهرا السادات , افخمی اردکانی, مهدی , خلیلی صدرآباد, افسر , رادمنش, محمدحسن,

Objective: The purpose of this study was developing the healthy behavior to change the attitude of students in order to decrease their tendency towards substance abuse and Reduction of Addiction Vulnerability Level. Method: This research was carried out by two methods of descriptive-analytic and quasi experimental design. First, 60 students of Shahid Beheshti University were selected randomly (...

In order to understand the seismic performance and mechanism of bottom frame seismic wall masonry structure (BFSWMS) and its vulnerability in empirical seismic damage, based on the statistical and numerical analysis of the field seismic damage observation data of 2178 Dujiangyan structures in the Wenchuan great earthquake urban of China on May 12, 2008, a non-linear function model between the s...

Journal: :practice in clinical psychology 0
farhad ghadiri sourman abadi department of psychology, faculty of education and psychology, university of tabriz, tabriz, iran. karim abdolmohamadi department of exceptional children psychology, faculty of psychology & education, allameh tabataba'i university,tehran, iran. jalil babapur kheiradin department of psychology, faculty of education and psychology, university of tabriz, tabriz, iran. ezatolah ahmadi department of psychology, faculty of education and psychology, azarbaijan shahid madani university, tabriz, iran.

objective: we aimed to determine the relationship between self-efficacy and alexithymia with vulnerability to drug abuse among students. methods: the study method was descriptive and correlational. in this study, 483 male high-school students from salmas city, iran were selected by multi-stage cluster sampling method. all participants completed the toronto alexithymia scale, general self-effica...

The analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. One is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. In terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. When certain vert...

Journal: :Journal of environmental management 2008
Mohammad N Almasri

Gaza coastal aquifer (GCA) is the major source of fresh water for the 1.5 million residents of Gaza Strip, Palestine. The aquifer is under deteriorating quality conditions mainly due to the excessive application of fertilizers. The intrinsic vulnerability of GCA to contamination was assessed using the well-known DRASTIC method. Detailed analysis of the intrinsic vulnerability map of GCA was car...

Journal: :تحقیقات آب و خاک ایران 0
عمار حبیبی کندبن دانشجوی دانشگاه تهران رزگار عرب زاده دانشجو افشین اشرف زاده عضو هیئت علمی

drastic is known as the most prototype models of groundwater vulnerability assessment. the drastic constitutes from seven schematic parameters consisting: depth to groundwater, recharge to aquifer, aquifer geology, and surface soil texture, impact of vadoze zone and hydraulic conductivity. in this study the models parameters were extracted by the main schematic maps of model. instead using the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید