نتایج جستجو برای: مدل network analyst
تعداد نتایج: 796221 فیلتر نتایج به سال:
این پژوهش با الهام گرفتن از نتایج یک طرح مطالعاتی کاربردی، رویکرد سلسلهمراتبی جهت پیگیری فرایند توسعه تأمینکنندگان و حمایت تصمیمات موجود در هر مراحل آن ارائه میکند. ابتدا، زمینههای تأمین نیازمند سپس واجد شرایط هریک زمینهها به کمک تصمیمگیری چندشاخصه بهترین-بدترین مشخص میگردند. معیارهای شناسایی نیز مرور مطالعات پیشین بهرهگیری نظرات خبرگان حوزهی خرید استخراجشدهاند. درنهایت، مدل ریاضی ...
In a corporate network, the situation awareness (SA) of a security analyst is of particular interest. The current work describes a cognitive Instance-Based Learning (IBL) model of an analyst’s recognition and comprehension processes in a cyber-attack scenario. The IBL model first recognizes network events based upon events’ situation attributes and their similarity to past experiences (instance...
Resilience is a challenging concept that is given many definitions and perspectives in the engineering infrastructure, systems engineering, and economic literatures. An emerging understanding of resilient systems is as a management principle or framework allowing for reconfiguration or adaptation in the face of threats or shocks. This is in contrast to the prevailing approach to engineered syst...
The authors present an integrated GIS tool, Accessibility Analyst, for accessibility analysis in urban transportation planning, built as an extension to the desktop GIS software package, ArcView. Accessibility Analyst incorporates a number of accessibility measures, ranging from catchment profile analysis to cumulative-opportunity measures, gravity-type measures, and utility-based measures, con...
Conventional wisdom suggests that the public release of financial analyst output is informative to traders about firm value. However, empirical tests of this mechanism have encountered difficulties in isolating the release of analyst output from concurrent intervening events such as analysts’ private-client communications. Earnings conference calls provide a unique opportunity to overcome this ...
Network-based monitoring and intrusion detection has grown into an essential component of enterprise security management. Monitoring potentially malicious activities across a set of networks classified at different security levels, however, presents subtle and complicated challenges. Analysis of intrusion alerts collected on an individual network only reveals malicious attempts to compromise th...
Figure 4. Example of a well pad & road network w/a high-pass filter over ETM imagery. The Southern Wind River Landscape (SWRL) is a three million acre area of Intermountain Semidesert in west central Wyoming. Within the three million acres lie both public and private land holdings. The Nature Conservancy (TNC) has significant conservation interests in this Landscape as well and has created a ne...
Intrusion Detection Systems (IDS) monitor a secured network for the evidence of malicious activities originating either inside or outside. Upon identifying a suspicious traffic, IDS generates and logs an alert. Unfortunately, most of the alerts generated are either false positive, i.e. benign traffic that has been classified as intrusions, or irrelevant, i.e. attacks that are not successful. Th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید