نتایج جستجو برای: vulnerability parameters

تعداد نتایج: 619708  

Reliability of networks is an important issue in the field of graph and network. Computation of network vulnerability parameters is NP-complete for popular network topologies such as tree, Mesh, Cube, etc.In this paper, we will show that the tenacity and rupture degree parameters for trapezoid graphs can be computed in polynomial time.

ژورنال: علوم آب و خاک 2018

To determine the potential for groundwater contamination, vulnerability should be evaluated in different areas susceptible to contamination should be investigated. Aquifer (carbonate) karst or part of it is karst aquifer in the western region of Iran; due to the natural conditions of the region and human activities, they are susceptible to contamination by carbonate aquifer through holes devour...

Journal: :The Science of the total environment 2005
Insaf S Babiker Mohamed A A Mohamed Tetsuya Hiyama Kikuo Kato

Vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and land use planning. This contribution aims at estimating aquifer vulnerability by applying the DRASTIC model as well as utilizing sensitivity analyses to evaluate the relative importance of the model parameters for ...

2015
Florian Kriebel Arun Subramaniyan Semeen Rehman Segnon Jean Bruno Ahandagbe Muhammad Shafique Jörg Henkel

On-chip last-level caches in multicore systems are one of the most vulnerable components to soft errors. However, vulnerability to soft errors highly depends upon the parameters and configuration of the last-level cache, especially when executing different applications. Therefore, in a reconfigurable cache architecture, the cache parameters can be adapted at run-time to improve its reliability ...

2015
R. Krishna J. Iqbal A. K. Gorai G. Pathak F. Tuluri P. B. Tchounwou

Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table (D), net recharge (R), aquifer media (A), soil media (S...

2009

Architectural vulnerability factor (AVF) is the probability that a transient fault in a bit, gate, or transistor becomes a user-visible error. AVFs vary widely across time, applications, and bits. Usually AVFs averaged over time and across applications are used to compute the overall soft error rate of a processor. Average AVFs, however, cannot express the short-term vulnerability variations of...

2012
Qingfang Ye

In communication networks, greater degrees of stability or less vulnerability is required. The vulnerability of communication network measures the resistance of the network to the disruption of operation after the failure of certain stations or communication links. If the network begins losing communication links or processors, then there is a loss in its effectiveness. Thus, communication netw...

Journal: :it - Information Technology 2017
Sai Prashanth Chandramouli Ziming Zhao Adam Doupé Gail-Joon Ahn

E-mail Header Injection vulnerability is a class of vulnerability that can occur inweb applications that use user input to construct e-mailmessages. E-mail Header Injection is possiblewhen themailing script fails to check for the presence of e-mail headers in user input (either form fields or URL parameters). The vulnerability exists in the reference implementation of the built-in mail function...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید