نتایج جستجو برای: a model is presented to identify information security risks

تعداد نتایج: 16196611  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

a major concern in the last few years has been the fact that the cultural centers are keeping distance with what they have been established for and instead of reproducing the hegemony, they have turned into a place for resistance and reproduction of resistance against hegemony. because the cultural centers, as urban public spaces in the last two decades, have been the subject of ideological dis...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

assigning premium to the insurance contract in iran mostly has based on some old rules have been authorized by government, in such a situation predicting premium by analyzing database and it’s characteristics will be definitely such a big mistake. therefore the most beneficial information one can gathered from these data is the amount of loss happens during one contract to predicting insurance ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1388

based on the latest records of typhlops vermicularis merrem, 1820 from iran, this species is distributed in the northern and southern regions of the country. in this study, new records of typhlops vermicularis are presented and it is shown that distribution range of this species is extended towards the eastern and western iran, and according to the new distribution map, it can be assumed that t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی 1392

flow in natural river bends is a complex and turbulent phenomenon which affects the scour and sedimentations and causes an irregular bed topography on the bed. for the reason, the flow hydralics and the parameters which affect the flow to be studied and understand. in this study the effect of bed and wall roughness using the software fluent discussed in a sharp 90-degree flume bend with 40.3cm ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و 1387

we show that when both sources ( lepton flavor violation sources and cp-violating phases) are present, the electric dipole moment of the electron, $d_e$, receives a contribution from the phase of the trilinear $a$-term of staus, $phi_{a_ au}$. for $phi_{a_ au}=pi/2$, the value of $d_e$, depending on the ratios of the lfv mass elements, can range between zero and three orders of magnitude a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

in this study, scour of mashkid bridge pier located in mashkid river of saravan county has been studied and to measure the scour rate, the numerical model hec-ras 4.0 has been used. upon selection of mashkid river as the case study and whereas the studied zone is important with respect to the climatic conditions and showery monsoon raining and flowing the great and destructive floodwaters, ther...

ژورنال: سلامت کار ایران 2013

  Background and aims : The construction industry is known as one of the most dangerous industries in terms of work-related mortality, injury rates and workers compensation payment. Therefore, safety risk assessment is a key step to be performed for management of major construction projects. Method : Failure Mode and Effects Analysis (FMEA) is a risk assessment tool that mitigates potential fai...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده منابع طبیعی 1392

nowadays, air pollution is a global problem that has had significant growth by technology development, population growth andindustrial development. industrial development brought natural resources deterioration, more manufacturing products, and more environmental pollutants. if pollutant won’t be controlled, human-being and wildlife will face the critical risks. significant release and critical...

One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده ادبیات و زبانهای خارجی 1389

according to coates’s (2004, as cited in zhang, 2010) definition of "conversational dominance" (p.111), it refers to the phenomenon of a speaker dominating others in interaction. specifically, it means how a speaker makes use of certain strategies to get the floor and maintain the floor. thus, the amount of talk is the main measurement for the dominance of the conversation. whether a speaker do...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید