نتایج جستجو برای: mitigation strategy
تعداد نتایج: 372413 فیلتر نتایج به سال:
Dependency Risk Graphs have been proposed as a tool to analyze the cascading failures of Critical Infrastructure (CI) dependency chains. However, dependency chain analysis is not by itself sufficient for developing an efficient risk mitigation strategy, i.e. a strategy that defines which CI nodes should have high priority for the application of mitigation controls, in order to achieve the optim...
This paper discusses a comprehensive strategy for implementing Mexico’s climate mitigation commitments. Progressively increasing carbon prices from current levels of US$3 per ton to US$75 by 2030 would achieve pledges, while raising annual revenues 1.8 percent GDP and cumulatively averting 11,600 deaths local air pollution. The price raise fossil fuel electricity prices, imposing burdens 2.7 co...
This paper presents a study on determining the degree of effectiveness of earthquake risk mitigation measures and how to prioritize such efforts in developing countries. In this paper a model is proposed for optimizing funds allocation towards risk reduction measures (building retrofitting) and reconstruction process after potential earthquakes in a regional level. The proposed model seeks opti...
Contingency is necessary to mitigate and control risk associated with construction projects. Successful contingency estimation and risk mitigation strategies can help project managers to effectively control cost and schedule. Some practitioners mitigate risk by transferring it to another party with less effort and minimum cost. However, this may lead to undesirable results such as; useless depl...
This paper presents a combined fault detection and discrimination strategy for CMOS logic incorporating active resource mitigation and monitoring. The approach is demonstrated for a NOR gate using a dual redundant gate design with selective mitigation and analogue or digital detection. The potential benefits of the approach are discussed with respect to resource awareness and management within ...
While traditional design-time and off-line approaches to testing and verification contribute significantly to improving and ensuring high dependability of software, they may not cover all possible fault scenarios that a system could encounter at runtime. Thus, runtime ‘health management’ of complex embedded software systems is needed to improve their dependability. Our approach to Software Heal...
The personal choices affecting the transmission of infectious diseases include the number of contacts an individual makes, and the risk-characteristics of those contacts. We consider whether these different choices have distinct implications for the course of an epidemic. We also consider whether choosing contact mitigation (how much to mix) and affinity mitigation (with whom to mix) strategies...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید