نتایج جستجو برای: countermeasure
تعداد نتایج: 4411 فیلتر نتایج به سال:
A methodology for assessing the effectiveness of countermeasures against a nuclear accident has been designed by means of the concept of fuzzy set theory. In most of the existing countermeasure models in actions under radiological emergencies, the large variety of possible features is simplified by a number of rough assumptions. During this simplification procedure, a lot of information is lost...
Modelling and analysing risk is one of the most critical activity in system engineering. However, in literature approaches like Fault Tree Analysis, Event Tree Analysis, Failure Modes and Criticality Analysis focus on the system-to-be without considering the impact of the associated risks to the organization where the system will operate. The Tropos framework has been proved effective in modell...
The colossal damages inflicted to the humanity by the Hiroshima and Nagasaki atom bombings during Second World War (1945) prompted radiation countermeasure research world over. The recent global and regional geopolitical scenario embroiled with terrorism has escalated the nuclear threat perception among all concerned. Radiation exposure is a natural event occurring from the sun and radioactive ...
In order to provide security against side-channel attacks a masking scheme which makes use of wire-tap codes has recently been proposed. The scheme benefits from the features of binary linear codes, and its application to AES has been presented in the seminal article. In this work – with respect to the underlying scheme – we re-iterate the fundamental operations of the AES cipher in a hopefully...
Recent communications environment significantly expands the mobile environment. The popularization of smartphones with various mobile services has emerged, and smartphone users are rapidly increasing. Because of these symptoms, existing wired environment in a variety of mobile traffic entering to mobile network has threatened the stability of the mobile network. Unlike traditional wired infrast...
OBJECTIVE We determined whether reduced insulin sensitivity, mitochondrial dysfunction, and other age-related dysfunctions are inevitable consequences of aging or secondary to physical inactivity. RESEARCH DESIGN AND METHODS Insulin sensitivity was measured by hyperinsulinemic-euglycemic clamp and ATP production in mitochondria isolated from vastus lateralis biopsies of 42 healthy sedentary a...
THE OBSERVATION THAT DISUSE leads to muscle atrophy is an old one, but we still lack a good mechanistic description of what is going on to cause wasting in conditions as diverse as bed rest and spaceflight. In fact, much of the current descriptions of the superficial mechanisms of atrophy come from work funded by space agencies, primarily National Aeronautics and Space Administration but also t...
The possible applications of communication based on big data have steadily increased in several industries, such as the autonomous vehicle industry, with a corresponding increase security challenges, including cybersecurity vulnerabilities (CVs). cybersecurity-related symmetry systems used vehicles may raise more process between these and IoT devices. involved CVs be encrypted using an asymmetr...
The purpose of this GIS-based hotspot identification taxonomy is to bring together strategies for planning and evaluation of selective traffic enforcement programs (STEPs). The HIT model is specifically designed for enforcement programs that focus on events and countermeasures that can be spatially and temporally described. The HIT model encompasses four core activities that are tightly integra...
Power analysis attacks against embedded secret key cryptosystems are widely studied since the seminal paper of Paul Kocher, Joshua Ja, and Benjamin Jun in 1998 where has been introduced the powerful Differential Power Analysis. The strength of DPA is such that it became necessary to develop sound and efficient countermeasures. Nowadays embedded cryptographic primitives usually integrate one or ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید