نتایج جستجو برای: breach flow
تعداد نتایج: 486434 فیلتر نتایج به سال:
This paper discusses the computation of optimal coverage paths in an ad-hoc network consisting of n sensors. Improved algorithms, with a preprocessing time of O(n log n), to compute a maximum breach/support path P in optimal O(|P |) time or the maximum breach/support value in O(1) time are presented. Algorithms for computing a shortest path that has maximum breach/support are also provided. Exp...
Managing information resources including protecting the privacy of customer data plays a critical role in most firms. Data breach incidents may be extremely costly for firms. In the face of a data breach event, some firms are reluctant to disclose information to the public. Firm may be concerned with the potential drop in the market value following the revelation of a data breach. This paper ex...
A depth-averaged 2-D model has been developed for simulating coastal barrier breaching processes. The model solves the generalized shallow water equations and the non-equilibrium sediment transport and bed change equations in a coupled fashion using an explicit finite volume method on a rectangular grid. It considers interactions among transient flow, strong sediment transport, and rapid bed ch...
Active and semi-active anastomosing Holocene channels upstream of the delta in the lower valley of the meandering Neches River in southeast Texas represent several morphologically distinct and hydrologically independent channel systems. These appear to have a common origin as multi-thread crevasse channels strongly influenced by antecedent morphology. Levee breaching leads to steeper cross-vall...
Security is a key concern in the development of electronic health record (EHR) systems. This paper considers Neutralization Theory and the Fear Appeals Model in proposing a conceptual model for use in predicting breach behaviors within EHR systems. The goal of the model is to determine which factors influence security breach intent on the part of the offender. Specifically, perceived penalty, p...
in state-investor dispute, investor tends that umbrella clause transfers all contractual claims to treaty claims. by contracts, state follows narrow interpretation of this clause. up to ilc articles, establishing of responsibility of state for breach of contract requires tow preconditions. first state is merely responsible when state condoct has been of governmental nature and second is that br...
The aim of this conceptual paper is to propose pathways through which psychological contract breach, ethical leader behaviour, and supervisors’ fairness are related to employees’ attitudes, behaviours and wellbeing. The paper reviews extant literature and builds a logical framework depicting the interrelationships among psychological contract breach, ethical leader behaviours, and supervisors’ ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید