نتایج جستجو برای: vulnerability measures
تعداد نتایج: 394565 فیلتر نتایج به سال:
The present study examines how the use of social network sites (SNS) increases the potential of experiencing psychological, reputational and physical vulnerability online. From our theoretical perspective, concerns over the use of social network sites and online vulnerability stem from the ease with which users can amass large and diverse sets of online social connections and the associated mai...
Many critical infrastructures consist of networks with complex structure, since they have highly interdependent elements and nontrivial designs with a degree of complexity that depends on the settings and level of interaction between these elements. The theory of complex networks employs techniques borrowed from graph theory to classify different types of networks, analyse their structures, and...
• Stakeholders see great potential in PEDs for energy poverty reduction. Energy mitigation needs to be included from the onset. PED replication can synergistically address both decarbonization and mitigation. Increasing levels of makes more financially viable as tools. More consideration given social dimension decisions on new creation. 100 Positive Districts (PEDs) are created Europe by 2025, ...
Conceptually graph vulnerability relates to the study of graphintactness when some of its elements are removed. The motivation forstudying vulnerability measures is derived from design and analysisof networks under hostile environment. Graph tenacity has been anactive area of research since the the concept was introduced in1992. The tenacity T(G) of a graph G is defined asbegin{center} $T(G)=di...
The effects of natural hazards can be mitigated by the use of proper “pre-event” interventions on “key” elements of the territory, that is on elements that are mostly vulnerable to a given catastrophic scenario and whose loss of functionality can cause damages on people, property and environment. In this respect, methodologies and tools should be studied to support decision makers in the analys...
Power grids vulnerability is a key issue in society. A component failure may trigger cascades of failures across the grid and lead to a large blackout. Complex network approaches have shown a direction to study some of the problems faced by power grids. Within Complex Network Analysis structural vulnerabilities of power grids have been studied mostly using purely topological approaches, which a...
The aim of this paper is to propose modified centrality measures as a tool to identify critical nodes before a vulnerability analysis is performed in an electrical power grid. Pair dependency centrality is weighted using the grid active power flow, and this becomes the basis to define closeness and betweenness of its nodes, and hence to identify the most critical ones. To support the idea of us...
Network resilience to a disruption is generally considered to be a function of the initial impact of the disruption (the network’s vulnerability) and the trajectory of recovery after the disruption (the network’s recoverability). In the context of network resilience, this work develops and compares several flow-based importance measures to prioritize network edges for the implementation of prep...
OBJECTIVES We sought to test the Biosocial Theory of borderline personality disorder (BPD) that posits that borderline traits are due to emotional dysregulation, caused by the interaction between childhood emotional vulnerability and invaliding parenting. METHOD A total of 250 adults (76% female, median age = 32.06 years) from a nonclinical population completed self-report measures assessing ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید