نتایج جستجو برای: vulnerability matrix
تعداد نتایج: 406702 فیلتر نتایج به سال:
the purpose of this review article is to characterize all of the parameters regarding the types, polymers used, and release kinetics of matrix tablets. matrix system was the earliest oral extended release platform for medicinal use. matrix tablets are most commonly used methods to modulate the release profile of drugs. they are much desirable and preferred for such therapy because they offer be...
Vulnerability is one of the key factors that cause security incidents and has become a major international threat to network security. Vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability disclosure or the disclosure of a vulnerability is the revelation of a vulnerability to the public at large. Previous work like Common Vulnerabilities ...
BACKGROUND Social vulnerability is related to the health of elderly people, but its measurement and relationship to frailty are controversial. The aims of the present study were to operationalize social vulnerability according to a deficit accumulation approach, to compare social vulnerability and frailty, and to study social vulnerability in relation to mortality. METHODS AND FINDINGS This i...
Many existing bridges were designed without adequate consideration of seismic risk. The full or partial collapse of even one major bridge in a city or community would have destroying results. There has been focuses on developing fragility-based seismic vulnerability of existing usual bridges in Iran or support decision making on seismic upgrade. This article focuses on developing performance b...
The System Vulnerability Stack is a novel method to compute a system’s vulnerability to transient faults (see Figure 1). The vulnerability stack observes that a system consists of multiple independent layers that interact through well-defined interfaces (e.g., the ISA). Therefore, the vulnerability stack quantifies fault masking within an individual layer by focusing on its interfaces: a fault ...
for $a,bin m_{nm},$ we say that $a$ is left matrix majorized (resp. left matrix submajorized) by $b$ and write $aprec_{ell}b$ (resp. $aprec_{ell s}b$), if $a=rb$ for some $ntimes n$ row stochastic (resp. row substochastic) matrix $r.$ moreover, we define the relation $sim_{ell s} $ on $m_{nm}$ as follows: $asim_{ell s} b$ if $aprec_{ell s} bprec_{ell s} a.$ this paper characterizes all linear p...
for vectors x, y ∈ rn, it is said that x is left matrix majorizedby y if for some row stochastic matrix r; x = ry. the relationx ∼` y, is defined as follows: x ∼` y if and only if x is leftmatrix majorized by y and y is left matrix majorized by x. alinear operator t : rp → rn is said to be a linear preserver ofa given relation ≺ if x ≺ y on rp implies that t x ≺ ty onrn. the linear preservers o...
in this article, we characterize the involutiveness of the linear combination of the forma1a1 +a2a2 when a1, a2 are nonzero complex numbers, a1 is a quadratic or tripotent matrix,and a2 is arbitrary, under certain properties imposed on a1 and a2.
in this paper, at rst for a given set of real or complex numbers with nonnegative summation, we introduce some special conditions that with them there is no nonnegative tridiagonal matrix in which is its spectrum. in continue we present some conditions for existence such nonnegative tridiagonal matrices.
This essay reviews the concept of vulnerability, paying special attention to the vulnerability of New Orleans exposed by Hurricane Katrina, and the need for interdisciplinary approaches to reducing vulnerability. Vulnerability is defined as a function of exposure, sensitivity, and adaptive capacity. Physical vulnerability results from exposure, and social vulnerability emanates from social fact...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید