نتایج جستجو برای: breach flow

تعداد نتایج: 486434  

2013
R. G. Dean

Present criteria for acceptable grass covered levee overtopping are based on average overtopping values but do not include the effect of overtopping duration. This paper applies experimental steady state results for acceptable overtopping to the case of intermittent wave overtopping. Laboratory results consisting of velocities and durations for acceptable land side levee erosion due to steady f...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشکده اصول الدین 1393

the present paper deals with criminal issues. for example, legal injunction on the necessity of returning a deposit has a legal nature and legal injunction on the punishment of those who breach the trust has a criminal nature. existing social issues are the basis of classification of some instances into the issue, some of which are based on variation and others on quality. therefore, the motiva...

Journal: :IOP Conference Series: Earth and Environmental Science 2020

2009
Dmitry G. Luchinsky Viatcheslav V. Osipov Vadim N. Smelyanskiy Ben Hayashida Joshua McMillin David Shook

MODIFIED) A progress in development of the physics model based diagnostic and prognostic system for solid rocket motors (SRMs) of the new generation of the crew exploration vehicles is reported. The performance model (PM) of the internal ballistics of large segmented SRMs in the regime of steady burning in the presence of the case breach fault is presented. This model takes into account propell...

2018
Safâa Achnak Yannick Griep Tim Vantilborgh

Previous research showed that perceptions of psychological contract (PC) breach have undesirable individual and organizational consequences. Surprisingly, the PC literature has paid little to no attention to the relationship between PC breach perceptions and stress. A better understanding of how PC breach may elicit stress seems crucial, given that stress plays a key role in employees' physical...

Journal: :J. Cybersecurity 2015
Stefan Laube Rainer Böhme

Legislators in many countries enact security breach notification regulation to address a lack of information security. The laws designate authorities to collect breach reports and advise firms. We devise a principal–agent model to analyze the economic effect of mandatory security breach reporting to authorities. The model assumes that firms (agents) have few incentives to unilaterally report br...

Journal: :مطالعات حقوق خصوصی 0
مهراب داراب پور دانشیار گروه حقوق دانشگاه شهید بهشتی محمد علیخانی دانشجوی دکتری حقوق نفت و گاز دانشکدۀ حقوق دانشگاه شهید بهشتی

s in this article, the evaluation of damages in international disputes with special reference to the oil and gas cases has been studied. it should be noticed as a fact that the breach of contracts or the breach of some sorts of obligations does not necessarily amount to payment of damages. in many cases, the evaluation of damages depends on the methods of evaluation uses. therefore, the most im...

2015
Fabio Bisogni

While the discussion about a federal law on data breach notification is ongoing and a rash of large, costly data breaches has galvanized public interest in the issue, this paper investigates on the phenomenon of data breach notification letters. In case of any data breach a company faces a number of dilemmas on how to inform the customers. The choices that a company makes on the missive content...

2016
Rui Chen H. Raghav Rao Rohit Valecha

The existing literature has been silent on individuals’ decision making and reactions in response to data breaches. In 2015, the Office of Personnel Management (OPM) discovered that data of several million Federal employee was stolen in cyber-attacks. Within the context of the OPM breaches, we propose a conceptual model that helps reveal the core decision making process of incident victims in r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید