نتایج جستجو برای: مدل network analyst

تعداد نتایج: 796221  

Journal: : 2022

این پژوهش با الهام گرفتن از نتایج یک طرح مطالعاتی کاربردی، رویکرد سلسله­‌مراتبی جهت پیگیری فرایند توسعه تأمین‌کنندگان و حمایت تصمیمات موجود در هر مراحل آن ارائه‌ می‌کند. ابتدا، زمینه‌های تأمین نیازمند سپس واجد شرایط هریک زمینه‌ها به کمک تصمیم‌گیری چندشاخصه بهترین-بدترین مشخص می‌گردند. معیارهای شناسایی نیز مرور مطالعات پیشین بهره‌گیری نظرات خبرگان حوزه‌ی خرید استخراج‌شده‌اند. درنهایت، مدل ریاضی ...

2016
Varun Dutt

In a corporate network, the situation awareness (SA) of a security analyst is of particular interest. The current work describes a cognitive Instance-Based Learning (IBL) model of an analyst’s recognition and comprehension processes in a cyber-attack scenario. The IBL model first recognizes network events based upon events’ situation attributes and their similarity to past experiences (instance...

Journal: :Journal of Applied Business Research (JABR) 2011

2014
Royce A. Francis

Resilience is a challenging concept that is given many definitions and perspectives in the engineering infrastructure, systems engineering, and economic literatures. An emerging understanding of resilient systems is as a management principle or framework allowing for reconfiguration or adaptation in the face of threats or shocks. This is in contrast to the prevailing approach to engineered syst...

2003
Suxia Liu Xuan Zhu

The authors present an integrated GIS tool, Accessibility Analyst, for accessibility analysis in urban transportation planning, built as an extension to the desktop GIS software package, ArcView. Accessibility Analyst incorporates a number of accessibility measures, ranging from catchment profile analysis to cumulative-opportunity measures, gravity-type measures, and utility-based measures, con...

2017
Jason V. Chen Venky Nagar Stephen M. Ross Jordan Schoenfeld Patricia Dechow

Conventional wisdom suggests that the public release of financial analyst output is informative to traders about firm value. However, empirical tests of this mechanism have encountered difficulties in isolating the release of analyst output from concurrent intervening events such as analysts’ private-client communications. Earnings conference calls provide a unique opportunity to overcome this ...

Journal: :Music Theory Online 2007

2012
Thuy Nguyen Mark Gondree Jean Khosalim David Shifflett Timothy Levin

Network-based monitoring and intrusion detection has grown into an essential component of enterprise security management. Monitoring potentially malicious activities across a set of networks classified at different security levels, however, presents subtle and complicated challenges. Analysis of intrusion alerts collected on an individual network only reveals malicious attempts to compromise th...

2003
Kelli Taylor Dennis Wright

Figure 4. Example of a well pad & road network w/a high-pass filter over ETM imagery. The Southern Wind River Landscape (SWRL) is a three million acre area of Intermountain Semidesert in west central Wyoming. Within the three million acres lie both public and private land holdings. The Nature Conservancy (TNC) has significant conservation interests in this Landscape as well and has created a ne...

2010
T. Subbulakshmi George Mathew Mercy Shalinie

Intrusion Detection Systems (IDS) monitor a secured network for the evidence of malicious activities originating either inside or outside. Upon identifying a suspicious traffic, IDS generates and logs an alert. Unfortunately, most of the alerts generated are either false positive, i.e. benign traffic that has been classified as intrusions, or irrelevant, i.e. attacks that are not successful. Th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید