نتایج جستجو برای: vulnerability assessment

تعداد نتایج: 598326  

2014
Julien Botella Bruno Legeard Fabien Peureux Alexandre Vernotte

This paper introduces an original security testing approach guided by risk assessment, by means of risk coverage, to perform and automate vulnerability testing for Web applications. This approach, called Risk-Based Vulnerability Testing, adapts Model-Based Testing techniques, which are mostly used currently to address functional features. It also extends Model-Based Vulnerability Testing techni...

Babak Omidvar, Ramin Azizi Yasser abdollahi

Power networks are among the most important infrastructures that without them, industrial, economic and social procedures will halt. Therefore, they should be planned for the most difficult conditions to provide services with minimum disruption. Power substations are of great importance to a power network, because any disruption in their components can produce extensive problems through the net...

Vulnerability assessment and mapping of hazard pollution is raised on as an important management strategy to protect the karst. Karstic aquifers in semi-arid regions of the West of Iran with regard to the natural conditions of the region, are susceptible to contamination. Estimation of amount and vulnerability mapping of aquifers in the karst religion of Bistoun- Paraw – Kermanshah plain agains...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1389

this study was conducted to investigate the impact of portfolio assessment as a process-oriented assessment mechanism on iranian efl students’ english writing and its subskills of focus, elaboration, organization, conventions, and vocabulary. out of ninety juniors majoring in english literature and translation at the university of isfahan, sixty one of them who were at the same level of writing...

پایان نامه :موسسه آموزش عالی غیر دولتی و غیرانتفاعی علامه محدث نوری (ره) - پژوهشکده اقتصاد 1393

dynamic assessment according to vygotskys sociocultural theory, states that instruction and assessment are interrelated. using static forms of assessment with second and foreign language students could do more harm than good. many teachers neglect to take account of the complexity involved in learning a second or foreign language and often wonder why learning of a language take so long. thi...

2015
Luis E. Yamin Alvaro I. Hurtado Alex H. Barbat Omar D. Cardona

Abstract A general methodology to evaluate vulnerability functions suitable for a probabilistic global risk assessment is proposed. The methodology is partially based in the methodological approach of the Multihazard Loss Estimation Methodology (Hazus) developed by the Federal Emergency Management Agency (FEMA). The vulnerability assessment process considers the resolution, information and limi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان - دانشکده ادبیات و زبانهای خارجی 1392

abstract this study aimed at investigating the possible relationship between self-assessment in writing and self-regulation of iranian efl learners. the main purpose of the study was not only to report and inform about this relationship, but also to investigate and find practical outcomes of the incorporation of self-assessment in writing, such as improving writing skill. the research was carr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده ادبیات 1391

nothing affects learners more than assessment, so it is important to involve them in assessment process. involvment of learners in assessment helps them to become autonoumos learners. despite this importance iranian learners specialy javanroodian ones are not activily involved in the process. hence the aim of this thesis is to invesrtigate thier ability in th eassessment process

2017
Aysun Aytaç Betül Atay

The assessment of the stability and the vulnerability of complex networks is the important concept while studying of them. In the literature, a sort of measures have been given in order to assessment the stability of systems. And also, some graph-theoretic parameters have been formed to provide formulas which calculate the reliability of a network. In this paper, we study the vulnerability of s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید