نتایج جستجو برای: vulnerability analysis
تعداد نتایج: 2857032 فیلتر نتایج به سال:
Background: Determining social vulnerability of elderly people is a prerequisite for risk analysis in natural disasters. Understanding and comprehension of different dimensions of elderly social vulnerability by using international experiences is a must to determine and ultimately measure this phenomenon. In this study, we tried to understand the dimensions of elderly social vulnerability in na...
Stress is a type of person-environment relationship which is appraised by the individual as stressful or beyond one’s own resources and, as a results, threatens the individual’s wellbeing and welfare. The aim of the present study was to investigate the variables of resilience, coping strategies, and social support as predictors of vulnerability to stress among students. The participants consist...
Wireless networking has become very popular in recent years due to the increase in adoption of mobile devices. As more and more employees demand for Wi-Fi access for their devices, more companies have been jumping onto the "Bring Your Own Device" (BYOD) bandwagon[1] to appease their employees. One such example of an enterprise wireless infrastructure is the George Washington University’s GWirel...
the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. when certain ver...
introduction because of expansion of agricultural activities and excessive use of chemical fertilizers and location of municipal and industrial wastewater of andimeshk, it is possible for this aquifer to be polluted. therefore, the aim of present study is to assess the aquifer vulnerability of andimeshk plain and recognition of sensitive areas against pollution which this work can be conducted ...
Vulnerability functions describe the expected loss for a given ground shaking intensity level and are an essential component in probabilistic seismic risk assessment. This manuscript presents novel open-source platform derivation of analytical fragility vulnerability models, covering state-of-the-art methodologies, addressing critical issues modelling such as uncertainty propagation, validation...
Software vulnerability analysis has become a hot topic recently. However, the traditional methods for analyzing software vulnerability have higher false positive rate. In this paper, adaptive K function is defined, and SVAAKSC (Software vulnerability analysis method based on adaptive-K sequence clustering) is presented. The collected objects in software vulnerability sequence database SVSD are ...
Abstract Background & Aim: Achievement to a practical model for effective chronic pain management in the elderly is high importance. Hence, the current study aimed to testing some parts of comprehensive chronic pain management model (CCPMM) in older people. Material & Method: This study is a correlation testing model in which 205 elderly patients with chronic pain were selected ...
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial TakeGrant model...
Pathology and determination of students' moral vulnerability is significant step in their security against cultural, social, value, and moral changes. The present study has been done to assess the students' moral vulnerability. The theoretical framework composed of theories of Durkheim, Englehart and Lerner. By the survey technique, this study has examined the relationship between the moral vul...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید