نتایج جستجو برای: مدل breach
تعداد نتایج: 124667 فیلتر نتایج به سال:
The current study examines the relationship between adult attachment style and both perceived psychological contract breach and affective organizational commitment in a sample of college students with employment experience. Attachment style is argued to be an individual difference factor that affects how an individual perceives organizational events based on theory and existing empirical resear...
در این تحقیق سعی شده است تا با استفاده از قابلیت مدلسازی شکست سد و مدل یک بعدی جریان غیردائمی در نرم افزار hec-ras به بررسی پارامترهای موثر در این فرایند پرداخته می شود. همچنین ضمن تبیین اهمیت مساله با توجه به جنس سد و مکانیزم شکست فرسایشی و تدریجی آن، پارامترهای موثر در شکست سد مانند زمان شکست سد، شیب مقطع شکست سد، ضریب چسبندگی و زاویه اصطکاک و ... مورد توجه و مطالعه قرار می گیرد. پارامترهای ه...
در این تحقیق به مقایسه تحلیلی و عددی آبشار جریان برگشتی مدل R با آبشارهای Q QI سیستمهای چندجزیی پایدار پرداخته میشود. راستا برای اولین بار کدهای جهت طراحی منظور کد نرمافزار متلب نوشته شدهاند. نتایج نشان میدهد که دو جزء 1k 2k از خوراک Nc جزء، تعداد معدودی قابل تعریف است همگی حالات خاصی میباشد. همچنین یافتهها مجموع مقدار برش جزیی همیشه برابر یک است. طریق داده میشود صورتی میانگین ...
This paper examines a sample of over 12,000 cyber events that include data breaches, security incidents, privacy violations, and phishing crimes. First, we analyze the characteristics of these breaches (such as causes, and types of information compromised). We then examine the breach and litigation rate, by industry, and we identify the industries that incur the greatest costs from cyber events...
This paper presents a monetary-theoretic model to study the implications of networks’ collection of personal identifying data and data security on each other’s incidence and costs of identity theft. To facilitate trade, agents join clubs (networks) that compile and secure data. Too much data collection and too little security arise in equilibrium with noncooperative networks compared with the e...
This paper describes an approach for intrusion detection that is based on conceptual representations. The Conceptual Space model is adapted to represent information about potential intrusive activity. In order to more easily provide for decisions regarding assessment of intrusive behavior, we incorporate superellipsoids into our adapted conceptual space model. Brief comments regarding conceptua...
Improved computer models of erosion have been developed, considering soil hydraulic conductivity. The models deal with erosion of levees, dams and embankments due to overtopping. The simulations trace the formation of rills and gullies, beginning with initial overtopping and continuing to final breaching. Physical models performed at 1-g and high g using a geotechnical centrifuge have been used...
We develop a case breach model for the on-board fault diagnostics and prognostics system for subscale solid-rocket boosters (SRBs). The model development was motivated by recent ground firing tests, in which a deviation of measured time-traces from the predicted time-series was observed. A modified model takes into account the nozzle ablation, including the effect of roughness of the nozzle sur...
Introduction. Management of haemodynamically stable patients with penetrating abdominal injuries varies from nonoperative to operative management. The aim was to investigate whether peritoneal breach when used as an indication for exploratory laparotomy appropriately identified patients with intra-abdominal visceral injury. Methods. We conducted retrospective cohort study of all patients presen...
Employees often draw meaning from personal experiences and contributions in their work, particularly when engaging in organizational activities that align with their personal identity or values. However, recent empirical findings have demonstrated how meaningful work can also have a negative effect on employee's well-being as employees feel so invested in their work, they push themselves beyond...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید