نتایج جستجو برای: data threats

تعداد نتایج: 2432735  

Journal: :مدیریت ورزشی 0
نازنین راسخ دانشجوی دکتری مدیریت ورزشی، دانشکدۀ تربیت بدنی و علوم ورزشی، دانشگاه تهران، تهران، ایران سید نصر ا... سجادی دانشیار گروه مدیریت ورزشی، دانشکدۀ تربیت بدنی و علوم ورزشی، دانشگاه تهران، تهران، ایران مهرزاد حمیدی دانشیار گروه مدیریت ورزشی، دانشکدۀ تربیت بدنی و علوم ورزشی، دانشگاه تهران، تهران، ایران محمد خبیری دانشیار گروه مدیریت ورزشی، دانشکدۀ تربیت بدنی و علوم ورزشی، دانشگاه تهران، تهران، ایران

it is believed that strategic planning is a kind of planning for future. the aim of the present study was to design and determine a strategic plan for iran female championships. it was an applied study in which the mixed method (qualitative-quantitative) depending on data collection was used. the review of related literature and the viewpoints of the members of the strategic association (includ...

Journal: :Biodiversity Information Science and Standards 2018

Journal: :NeoBiota 2022

Early detection and eradication of invasive plants are more cost-effective than managing well-established plant populations their impacts. However, there is high uncertainty around which taxa likely to become in a given area. Horizon scanning that combines data-driven approach with rapid risk assessment consensus building among experts can help identify invasion threats. We performed horizon sc...

2014
Amadeu Anderlin Neto Tayana Conte

During the planning phase of an experiment, we must identify threats to validity in order to assess their impact over the analyzed data. Furthermore, actions to address these threats must be defined, if possible, so that we can minimize their impact over the experiment’s results. In this paper, we propose the Threats to Validity Assistant (TVA), which is a tool to assist novice researchers in i...

2007
Anoop Sarkar

The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves person-specific and sensitive information like medical records, the public has expressed a deep concern about their privacy. Privacy-preserving data publishi...

Journal: :Archives of gerontology and geriatrics 2010
Karin Josefsson Lars Ryhammar

Violence in elderly care has been reported on a global scale. The aim of this study was to describe nurses' perceptions of threats and violence, directed at themselves and other staff in community elderly care. Another aim was to describe nurses' access to prevention measures for handling threats and violence. A questionnaire was answered by registered nurses (RNs) (n=213) in community elderly ...

Background: Universal health coverage (UHC) aims to provide access to basic health services with no financial constraints. In Iran, the major challenges to the implementation of the UHC plan include aggregation and augmentation of resources, something which could threaten the dimension of population coverage and health service delivery. Therefore, this study reviews the strengths and weaknesses...

2013
Disha H. Parekh

Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-you-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In spite of its vitality, it exhibits various security flaws including loss o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید