نتایج جستجو برای: risk mapping

تعداد نتایج: 1133931  

Journal: :International journal of Leprosy 1955
R S GUINTO J A DOULL L WOOD E B MABALAY

It is a well established fact that persons exposed to lepromatous leprosy in the household have a much higher risk of contracting leprosy than persons who are not subject to such exposure but who are apparently comparable in other respects. In the studies of the Leonard Wood Memorial (American Leprosy Foundation) and the Department of Health of the Philippines carried out in Cordova and Talisay...

2015
H. Mnyusiwalla P. Vulliez J. P. Gazeau S. Zeghloul

This paper presents a methodology to perform a fine manipulation task with an anthropomorphic hand. We focus here on a three-finger precision grasp. The robotic hand used is the latest four finger fully actuated hand developed by the RoBioSS team of PPRIME institute. Different steps ranging from the generation of the contact points of the hand with the object to the experimental realization of ...

Journal: :CoRR 2017
Nicole M. Radziwill Morgan C. Benton

There is no standard yet for measuring and controlling the costs associated with implementing cybersecurity programs. To advance research and practice towards this end, we develop a mapping using the well-known concept of quality costs and the Framework Core within the Cybersecurity Framework produced by the National Institute of Standards and Technology (NIST) in response to the Cybersecurity ...

Landslide mapping is one of the approaches (which can be) used to define the slope stable critical areas and the maps prepared based on this demarcating are used in desining sustainable development. The purpose of this study is to compare the landslide susceptibility mapping models based on Fuzzy logic, Information value and area Density applied in the Chamsangar watershed. According to the tec...

Landslide is one of the most common natural disasters that endanger the lives and properties of people in mountainous areas. Therefore, identification of risk exposure areas of landslide is essential to prevent and reduce damages by landslides. The purpose of this study is compared to logistic regression (LR) and generalized additive models (GAM) and the evaluation of their performance for land...

This paper is directed to the question of how to model and design an efficient tool for the intelligent mapping which is based on both dynamic and efficient storage of data and soft computing. The former is performed by our method that learns how to store, search and delete the data. After pointing out the limitation of the crisp evaluation of the distance between two points, we argue in favor ...

2009
Alicia H. Munnell Steven A. Sass Natalia A. Zhivan Peter F. Drucker

The conventional wisdom says that older workers are less likely to be displaced than younger workers. While true in the past, the conventional wisdom is no longer true today; the advantage that older workers had has disappeared. This loss of relative job security is troubling. Once displaced, older workers are less likely to be reemployed, have less time to adjust their retirement plans, and ar...

2012
Kazue Ohishi Rintaro Suzuki Tadashi Maruyama

© 2012 Ohishi et al., licensee InTech. This is an open access chapter distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Host-Virus Specificity of the Morbillivirus Receptor, SLAM, in Marine Mammals: Risk A...

2016
Zheng Mu Qing Lai ZHENG MU QING LAI

Chinese Muslims have actively maintained religious endogamy. However, no research has assessed the role of local residential context in individual Muslims’ marital choices, nor have sociologists examined the heterogeneity in individual Muslims’ responses to such contextual influences. Using Chinese census data between 2000 and 2005, this paper offers a first investigation of such micro– macro i...

2010
Matt Bishop Sophie Engle Deborah A. Frincke Carrie Gates Frank L. Greitzer Sean Peisert Sean Whalen

Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an “insider;” indeed, many define it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, info...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید