نتایج جستجو برای: threat assessment
تعداد نتایج: 609945 فیلتر نتایج به سال:
This article reviews Maslow's theory of motivation wherein he proposes a hierarchy of human needs. First, it describes the principal elements of Maslow's theory and discusses considerations relating to the flexibility of the hierarchy. Second, it explains the relationship among Maslow's theory of human needs, attachment theory, and evolutionary threat assessment system theory. Third, it provide...
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the impact of the security break on the smart card based electronic cash economy. This paper discusses the assessment of threats in two phases using two different methodologies. The first is the assessment of overall threat ...
This paper describes the design of an optimal-control-based active safety framework that performs trajectory planning, threat assessment, and semiautonomous control of passenger vehicles in hazard avoidance scenarios. The vehicle navigation problem is formulated as a constrained optimal control problem with constraints bounding a navigable region of the road surface. A model predictive controll...
A series of highly publicized school shootings in the USA generated the misperception of an epidemic of school violence. Fears of school violence stimulated an ill-advised expansion of zero tolerance school discipline policies and the widespread dissemination of pro®les or warning signs of potentially dangerous students for use by school administrators. This article presents the rationale for s...
combating desertification which is a serious threat for the environment and human welfare requires understanding complex issues of this phenomenon using evaluation, awareness of severity of it's processes and determination of it's factors. so here, after recognizing the characteristics of the region showing existence desertification, we assess its current status with emphasis on clima...
Defenders have developed various threat risk analysis schemes to recognize the intruder attack profile, identify the system weakness, and implement the security safeguards to protect the information asset from cyber-attacks. Attack trees (AT) technique play an important role to investigate the threat analysis problem to known cyber-attacks for risk assessment. For example, protection trees and ...
BACKGROUND AND OBJECTIVES Previous research suggests that attention bias toward threat contributes to the development and maintenance of anxiety. The current study extends this work by mapping the neural correlates of experimentally-induced changes in attention bias. The study examines both behavioral and psychophysiological changes associated with experimentally-induced changes in threat bias....
Besides fight and flight responses, animals and humans may respond to threat with freezing, a response characterized by bradycardia and physical immobility. Risk assessment is proposed to be enhanced during freezing to promote optimal decision making. Indeed, healthy participants showed freezing-like responses to threat cues. Posttraumatic stress disorder (PTSD) patients are characterized by hy...
since its introduction in 1959, translation quality assessment (tqa) has been among the most addressed research topics in translation studies. during recent years, there has been a crucial increase on the study of tqa. various methods have come on scene. although these methods are based on scientific theories, most of them have remained at the level of theory. juliane house’s model is among tho...
Objectives There is today ample evidence that negative aging stereotypes impair healthy older adults' performance on cognitive tasks. Here, we tested whether these stereotypes also decrease performance during the screening for predementia on short cognitive tests widely used in primary care. Method An experiment was conducted on 80 healthy older adults taking the Mini Mental State Examination...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید