نتایج جستجو برای: outflow intrusions

تعداد نتایج: 23227  

حسینی, عطاالله , سهرابی, تیمور , طالبی, خلیل ,

During recent years, worldwide concern has been focused on the potential for contamination of surface waters and ground waters by agrochemicals in runoff and soil water from irrigated fields. Given this perspective, it is very important to correctly evaluate the levels of different agrochemicals in water, both from human toxicological and environmental viewpoints and to develop management strat...

Journal: :the journal of tehran university heart center 0
ali hosseinsabet tehran heart center, tehran university of medical sciences, tehran, iran.

-

Journal: :The Journal of nervous and mental disease 2007
Sarah L Marzillier Craig Steel

The current study extends previous investigation of schizotypy as a vulnerability factor for trauma-related intrusions through the use of a clinical sample. Fifty people seeking psychological interventions after experiencing a distressing or traumatic event completed measures of positive schizotypy, posttraumatic stress disorder symptomatology, peritraumatic dissociation, and mood. Individuals ...

Journal: :The Journal of nervous and mental disease 2004
Emily A Holmes Craig Steel

Intrusive mental experiences occur within posttraumatic stress disorder (PTSD) and some psychotic disorders. Similarities in the phenomenology and content in the intrusions of both disorders have been noted. Currently there is little understanding of any common etiology in terms of information-processing styles. This study investigated predictors of analogue posttraumatic intrusive cognitions w...

1996
Janice C. Sipior Burke T. Ward

Employers and employees are both highly vulnerable to negative consequences which may result from e-mail privacy intrusions. These intrusions may arise internally from co-workers or the employer, or externally from entities associated with the U.S. legal system, such as law enforcement agencies or attorneys, or from hackers. Given potentially differing perceptions regarding e-mail privacy and t...

2006
Michael Hilker Christoph Schommer

Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems normally use stochastic approaches or a rule-based system to detect intrusions and to describe the known intrusions. These systems have some disadvantages which we solve with a new approach called ANIMA. ANIMA stores ...

1998
D. B. Parsons

In the companion abstract in this proceedings (Parsons and Yoneyama 1998), we discussed dry intrusions and their origins. It was found that these dry intrusions over the equatorial waters actually originated in the middle latitude westerly winds. The reader is referred to that paper for discussion of the origins and for further background information on these dry intrusion events. In this paper...

Journal: :Journal of Cybersecurity 2020

1999
Stephen S. Yau Xinyu Zhang

In this paper an approach to detection, assessment and prevention of further intrusions of distributed intrusions in a computer network is presented. Our approach uses audit data from multiple network nodes and services. To achieve accurate result, inherent security relations among different network nodes should be considered. In our approach, security dependency relation (SDR) is defined to de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید