نتایج جستجو برای: vulnerability parameters
تعداد نتایج: 619708 فیلتر نتایج به سال:
A fuzzy-based tool, called FUZZY-SRA (Fuzzy Spatial Reliability Analysis), is used for realizing a more ‘‘reliable’’ study of the values of the final parameters concerning the vulnerability of aquifers located in the territory of Cava de’ Tirreni, city in the district of Salerno (Italy). The SINTACS method is adopted for evaluating the involved parameters and these evaluations are modelled from...
Objectives The triple vulnerability model includes three types of vulnerability in terms of emotional disorders: general biological vulnerability, general psychological vulnerability, and disorder-specific psychological vulnerability. Since previous studies have mostly addressed only one of these components, this study was conducted to examine all the three components of the triple vulnerabilit...
A small but growing literature has been concerned about the economic (and environmental) vulnerability on the level of countries. Less attention is paid to the economic vulnerability of different regions within countries. By focusing on the vulnerability of subnational regions, our paper contributes to the small literature on the ‘vulnerability of place’. We see the vulnerability of place as be...
Urban planning has to perform seismic pathology of urban streets in seismic cities. Streets and roads are the most important spaces and urban elements in the cities which should be considered not only in space occupation and connecting spaces and urban activities but also in seismic vulnerability and on this basis it is planned to reduce environmental hazards and on top of earthquake-related. M...
A growing body of findings underlines the critical role of the early environment in normal growth and development. Human studies suggest that severe stress during childhood increases vulnerability to development of affective psychopathology in adulthood. Neonatal maternal separation in rodents (rats or mice) is an established model of early stress for studying the neuroendocrine and behavioral ...
Abstract: A defender allocates its resource between defending an object passively by deploying false targets, and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender allocates its entire resource to deploying false targets, which the attacker cannot distinguish from the genuine object. If the defender strikes preventively, the attacker...
Peacock and Cuckoo hashing schemes are currently the most studied implementations for hardware network systems such as NIDS, Firewalls, etc.. In this work we evaluate their vulnerability to sophisticated complexity Denial of Service (DoS) attacks. We show that an attacker can use insertion of carefully selected keys to hit the Peacock and Cuckoo hashing schemes at their weakest points. For the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید