Results 61 to 70 of about 12,001,140 (314)
Use of Approaches to the Methodology of Factor Analysis of Information Risks for the Quantitative Assessment of Information Risks Based on the Formation of Cause-And-Effect Links [PDF]
The paper suggests methods to the assessment of information risks, which makes the transition from a qualitative assessment of information risks (according to the factor analysis of information risks methodology) to a quantitative assessment. The development factor analysis of information risks methodology of the methodology was carried out using the ...
arxiv +1 more source
Background Athlete's heart characterized many adaptive changes in the heart in response to physical exertion. The discovery of the "heart of the athlete" phenomenon was made by Henschen already at the end of the 19th century during physical examination ...
Urszula Fałkowska+5 more
doaj +3 more sources
A Database and Evaluation Methodology for Optical Flow
The quantitative evaluation of optical flow algorithms by Barron et al. (1994) led to significant advances in performance. The challenges for optical flow algorithms today go beyond the datasets and evaluation methods proposed in that paper.
Simon Baker+5 more
semanticscholar +1 more source
A Methodology for Afterburner Evaluation [PDF]
A preliminary investigation of the performance of an afterburner module proposed by the Gas Turbine Research Establishment, Bangalore for the Kaveri engine has been carried out.
Haran, AP+6 more
core
BitTorrent Sync: Network Investigation Methodology
The volume of personal information and data most Internet users find themselves amassing is ever increasing and the fast pace of the modern world results in most requiring instant access to their files.
Farina, Jason+2 more
core +1 more source
Neurological manifestations and complications of COVID-19. A literature review
Introduction. The first case of SARS-CoV-2 infection was identified in December 2019 in Wuhan, China. The disease spread rapidly worldwide and the WHO declared a pandemic on March 11, 2020. Although coronavirus disease 2019 (COVID-19) has been associated
Aleksandra Maria Krasa+6 more
doaj +1 more source
Advanced Cloud Privacy Threat Modeling [PDF]
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system .
arxiv +1 more source
Handbook on Constructing Composite Indicators: Methodology and User Guide
This Handbook aims to provide a guide for constructing and using composite indicators for policy makers, academics, the media and other interested parties. While there are several types of composite indicators, this Handbook is concerned with those which
M. Nardo+5 more
semanticscholar +1 more source
The degree of evolutionary conservation of an amino acid in a protein or a nucleic acid in DNA/RNA reflects a balance between its natural tendency to mutate and the overall need to retain the structural integrity and function of the macromolecule.
Haim Ashkenazy+6 more
semanticscholar +1 more source
Design methodology in management consulting [PDF]
In dit proefschrift staat de studie van bedrijfskundige ontwerppraktijken centraal, in het bijzonder in het domein van het organisatie-advieswerk. De probleemstelling is: Welke beargumenteerd productieve strategieën hanteren competente organisatie ...
Visscher, Klaasjan
core +2 more sources