نتایج جستجو برای: vulnerability matrix

تعداد نتایج: 406702  

2016
Abiodun Odusote

In recent times, there has been an increased outbreak of conflicts across the globe, particularly in areas experiencing livelihood fragility. Available literature suggests that in a society where livelihoods are threatened, minimal, or non-existent, the people are generally more overwhelmed and prone to violence and conflict. This paper consolidates the available literature on livelihoods and c...

2016
Anju Thomas Remya Ramachandran

In these days, it is very important to trace a mobile in the vast mobile sensor network. It is mainly for identifying the location of the person who is using that mobile. For this application, the location of the mobile node (mobile) is to be found. This process is known as localization. Out of different types of localization techniques, range-free localization approaches are cost-effective for...

2013
Loye L. Ray

Firewalls are core elements in network security, the effectiveness of firewall security is dependent on configuring the firewall policy correctly. A firewall policy describes the access that will be permitted or denied from the trusted network. In a corporate network several firewalls are setup and administrated by different individuals. The consistency between those firewall policies is crucia...

2006
Adam Honig

Sudden stops, or large reversals in capital inflows, have been linked to a number of financial crises in emerging market countries. Given their potentially devastating consequences, academics and policymakers have placed great emphasis on analyzing the causes of financial vulnerability. This task has become even more important with increasing financial globalization. A large literature has deve...

Journal: :JIPS 2013
Woon-hae Jeong Se-jun Kim Doo-Soon Park Jin Kwak

There are many recommendation systems available to provide users with personalized services. Among them, the most frequently used in electronic commerce is ‘collaborative filtering’, which is a technique that provides a process of filtering customer information for the preparation of profiles and making recommendations of products that are expected to be preferred by other users, based on such ...

Journal: :E3S web of conferences 2021

This paper mainly studies the vulnerability of node combination two kinds networks, and verifies whether all networks can use pinning control optimization point selection algorithm. One is primitive network, in which nodes correspond to components power grid, other dual are mapped model, It as an edge, then studied by containment theory. In experiment, IEEE57 used study original different attac...

Journal: :رفاه اجتماعی 0
حسین راغفر h. raghfar لیلا صانعی l . sane

objective: poverty alleviation is an essential step to achieve economic development. this is why identification exercise is so crucial. traditionally, different aspects of insecurities have not be taken into poverty measurement. many types of insecurities have adverse impacts on household welfare. identifying vulnerability of household can serve identification of the poor households. methodolog...

Hesamedin Gholami Mojtaba Sookhtanlo Seyyed Reza Es’haghi

Identification and analysis of farmers’ vulnerability associated with their risk aversion degree is one of the necessary requirements for planning and reducing impacts of drought in Iran. So, this study was investigated three risk vulnerability parameters (economic, social and technical) among wheat farmers categorized in accordance with their risk aversion degree in the Mashhad County (Iran) b...

Journal: :CoRR 2018
Jukka Ruohonen

This empirical paper examines the time delays that occur between the publication of Common Vulnerabilities and Exposures (CVEs) in the National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS) information attached to published CVEs. According to the empirical results based on regularized regression analysis of over eighty thousand archived vulnerabilities, (i) the...

2001
Hung T. TRAN Tien V. DO

In this paper, we give a survey on computational methods developed for steady state solution of QBD (Quasi Birth-Death) processes. Moreover, we adopt and implement a comparative framework to evaluate the capability of some chosen methods (spectral expansion, matrix geometric and its enhanced versions) in both finite and infinite cases. Numerical aspects concerning complexity, memory requirement...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید