نتایج جستجو برای: risk control

تعداد نتایج: 2149199  

2013
M. Siva Shankar Reddy D. Raman

In this paper we have taken one of the most amazing network concepts which makes network simpler. By considering the aspect of both side as of good and its related issues like most important and unavoidable is i.e. “Security”. Hence, enhancing the security in wireless networks has become of vital importance. In this perspective of concept, we mainly study two security aspects of wireless networ...

2010
Zongxia Liang Jiaoling Wu JIAOLING WU

We consider an optimal control problem of a property insurance company with proportional reinsurance strategy. The insurance business brings in catastrophe risk, such as earthquake and flood. The catastrophe risk could be partly reduced by reinsurance. The management of the company controls the reinsurance rate and dividend payments process to maximize the expected present value of the dividend...

2013
Angela E. Summers

Layers of Protection Analysis (LOPA) evaluates the sequence of events that first initiate and then propagate to a hazardous event. This semi-quantitative risk assessment technique can expose the role that automation plays in causing initiating events and in responding to the resulting abnormal operation. Automation that is specifically designed to achieve or maintain a safe state of a process i...

2005
Henry X. Liu Jeff X. Ban Wenteng Ma Pitu B. Mirchandani

Recent natural or man-made disasters around the world have provided compelling evidence that transportation system plays a crucial role in the emergency evacuation and have stressed the need for effective evacuation traffic management to maximize the utilization of the transportation system and to minimize fatalities and losses. This paper presents a model reference adaptive control (MRAC) fram...

Journal: :Scalable Computing: Practice and Experience 2011
Aneta Poniszewska-Maranda

Development of technology, progress and increase of information flow have the impact also on the development of enterprises and require rapid changes in their information systems. The growth and complexity of functionality that they currently should face cause that their design and realization become the difficult tasks and strategic for the enterprises at the same time. The informations system...

2013
Dustin Albert Jason Chein Laurence Steinberg

Research efforts to account for elevated risk behavior among adolescents have arrived at an exciting new stage. Moving beyond laboratory studies of age differences in risk perception and reasoning, new approaches have shifted their focus to the influence of social and emotional factors on adolescent decision making. We review recent research suggesting that adolescent risk-taking propensity der...

Background: Although major depressive disorder (MDD) also increases the risk of Intimate Partner Violence (IPV) perpetration, poor mental health has been mostly conceptualized as a consequence of IPV victimization rather than a risk factor for IPV perpetration. Poor impulse control is another IPV risk factor. Building on a risk / risk framework, this study investigates additive and multiplicati...

Journal: :IJEIS 2012
Saeed Askary David Goodwin Roman Lanis

In this paper, the authors examine how different types of fraud in most Information Technology (IT) environments affect an audit risk model from 2001 through 2008. Variations in IT fraud are questionable for determining the audit risks that affect audit quality and report. The data sources in this study came from the Computer Crime and Security Survey report (CSI) 2008. By relating different IT...

2004
James D. McCalley Vijay Vittal Yougie Dai Nicholas Abi-Samra

This paper describes computational techniques for computing risk associated with voltage insecurity, where risk is assessed as the product of probability and consequence of under-voltage and voltage collapse. In contrast to deterministic assessment of voltage security, our approach directly accounts for uncertainties in the analysis. An approach for operational assessment is provided that uses ...

Journal: :Marketing Science 2011
Michael Braun David A. Schweidel

Customer retention and customer churn are key metrics of interest to marketers, but little attention has been placed on linking the different reasons for which customers churn to their value to a contractual service provider. In this article, we put forth a hierarchical competing risk model to jointly model when customers choose to terminate their service and why. Some of these reasons for chur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید