نتایج جستجو برای: vulnerability matrix

تعداد نتایج: 406702  

Journal: :iranian journal of pharmaceutical sciences 0
saini nish school of pharmaceutical sciences, shoolini university solan (h.p), india george mathew school of pharmaceutical sciences, shoolini university solan (h.p), india joseph lincy school of pharmaceutical sciences, shoolini university solan (h.p), india

the purpose of this review article is to characterize all of the parameters regarding the types, polymers used, and release kinetics of matrix tablets. matrix system was the earliest oral extended release platform for medicinal use. matrix tablets are most commonly used methods to modulate the release profile of drugs. they are much desirable and preferred for such therapy because they offer be...

2014
Tina Sebastian Abey Abraham

Vulnerability is one of the key factors that cause security incidents and has become a major international threat to network security. Vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability disclosure or the disclosure of a vulnerability is the revelation of a vulnerability to the public at large. Previous work like Common Vulnerabilities ...

Journal: :PLoS ONE 2008
Melissa K. Andrew Arnold B. Mitnitski Kenneth Rockwood

BACKGROUND Social vulnerability is related to the health of elderly people, but its measurement and relationship to frailty are controversial. The aims of the present study were to operationalize social vulnerability according to a deficit accumulation approach, to compare social vulnerability and frailty, and to study social vulnerability in relation to mortality. METHODS AND FINDINGS This i...

M. Safarkhanlou Mehran Seyed Razzaghi,

 Many existing bridges were designed without adequate consideration of seismic risk. The full or partial collapse of even one major bridge in a city or community would have destroying results. There has been focuses on developing fragility-based seismic vulnerability of existing usual bridges in Iran or support decision making on seismic upgrade. This article focuses on developing performance b...

2009
Vilas Sridharan David R. Kaeli

The System Vulnerability Stack is a novel method to compute a system’s vulnerability to transient faults (see Figure 1). The vulnerability stack observes that a system consists of multiple independent layers that interact through well-defined interfaces (e.g., the ISA). Therefore, the vulnerability stack quantifies fault masking within an individual layer by focusing on its interfaces: a fault ...

Journal: :bulletin of the iranian mathematical society 0
f. khalooei department of pure mathematics, faculty of mathematics and computer, shahid bahonar university of kerman, kerman, iran.

for $a,bin m_{nm},$ we say that $a$ is left matrix majorized (resp. left matrix submajorized) by $b$ and write $aprec_{ell}b$ (resp. $aprec_{ell s}b$), if $a=rb$ for some $ntimes n$ row stochastic (resp. row substochastic) matrix $r.$ moreover, we define the relation $sim_{ell s} $ on $m_{nm}$ as follows: $asim_{ell s} b$ if $aprec_{ell s} bprec_{ell s} a.$ this paper characterizes all linear p...

Journal: :wavelet and linear algebra 2014
f. khalooei

for vectors x, y ∈ rn, it is said that x is left matrix majorizedby y if for some row stochastic matrix r; x = ry. the relationx ∼` y, is defined as follows: x ∼` y if and only if x is leftmatrix majorized by y and y is left matrix majorized by x. alinear operator t : rp → rn is said to be a linear preserver ofa given relation ≺ if x ≺ y on rp implies that t x ≺ ty onrn. the linear preservers o...

Journal: :bulletin of the iranian mathematical society 0
x. liu college of science‎, ‎guangxi‎ ‎university for nationalities‎, ‎nanning 530006‎, ‎p. r‎. ‎china. j. benitez departamento de matematica aplicada‎, ‎instituto de matematica multidisciplinar‎, ‎universidad politecnica de valencia‎, ‎valencia 46022‎, ‎spain. m. zhang college of science‎, ‎guangxi‎ ‎ university for nationalities‎, ‎nanning 530006‎, ‎p. r‎. ‎china.

in this article, we characterize the involutiveness of the linear combination of the forma1a1 +a2a2 when a1, a2 are nonzero complex numbers, a1 is a quadratic or tripotent matrix,and a2 is arbitrary, under certain properties imposed on a1 and a2.

Journal: :journal of linear and topological algebra (jlta) 0
a. m. nazari department of mathematics, faculty of science, arak university, arak 38156-8-8349, iran. s kamali maher department of mathematics, faculty of science, arak university, arak 38156-8-8349, iran.

in this paper, at rst for a given set of real or complex numbers  with nonnegative summation, we introduce some special conditions that with them there is no nonnegative tridiagonal matrix in which  is its spectrum. in continue we present some conditions for existence such nonnegative tridiagonal matrices.

2007
Brent Yarnal

This essay reviews the concept of vulnerability, paying special attention to the vulnerability of New Orleans exposed by Hurricane Katrina, and the need for interdisciplinary approaches to reducing vulnerability. Vulnerability is defined as a function of exposure, sensitivity, and adaptive capacity. Physical vulnerability results from exposure, and social vulnerability emanates from social fact...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید