intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Vulnerable category

Xem 1-7 trên 7 kết quả Vulnerable category
  • Inadequate knowledge about forests over limestone ecosystem and understanding on how the threatened plants‘ mother trees are distributed and remained intact despite rugged topography and anthropologic activities, intrigued the attention of numerous researchers. Rapid assessment and mapping the spatial distribution of mother trees would be of utmost importance, especially in the context of conservation and sustainable protection of threatened species in selected municipalities of Samar Island.

    pdf34p vimegwhitman 10-06-2022 10 3   Download

  • Water scarcity and drought are recurrent phenomena in Bihar. The present study was designed to identify and assess the adaptation strategy adopted by the livestock dependents to reduce the impact of drought on their livestock rearing and livelihood security. Adaptation strategies followed by the livestock dependents has recently become a subject of increasing importance in climate change research with an objective to reduce the vulnerability of climate sensitive people.

    pdf13p caygaocaolon4 04-04-2020 12 1   Download

  • The study was undertaken to assess the Body Mass Index (BMI) of adolescent students to ascertain nutritional status, nutritional awareness level among the student and provide nutritional education to the vulnerable group. The anthropometric measurements like height and weight were recorded to compute the Body Mass Index (BMI) among 125 students studying in 8th and 9th Standard at one of the Government high school of Shorapur taluk, Yadgir district. The BMI was compared with WHO standards based on which inferences were derived.

    pdf6p chauchaungayxua3 07-02-2020 37 2   Download

  • The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput.

    pdf7p kethamoi1 20-11-2019 10 1   Download

  • Third, the responsibility for supervising the consolidated operations of large financial firms was split among various federal agencies. Fragmentation of supervisory responsibility and loopholes in the legal definition of a “bank” allowed owners of banks and other insured depository institutions to shop for the regulator of their choice. Fourth, investment banks operated with insufficient government oversight. Money market mutual funds were vulnerable to runs. Hedge funds and other private pools of capital operated completely outside of the supervisory framework.

    pdf0p mebachano 01-02-2013 52 3   Download

  • There has been increasing interest in exploring fi nancial instruments that could limit the cyclical vulnerabilities of developing countries and reduce the likelihood of defaults and debt crises. GDPindexed bonds fall into this category and may also generate a wider range of benefi ts for issuer countries, investors and the global fi nancial system. The authors also examine the concerns and obstacles relating to the introduction of this instrument, suggesting that some may be exaggerated while others could be overcome.

    pdf17p taisaocothedung 12-01-2013 40 1   Download

  • Taking the network scenario of Figure 1, there will be web interfaces (routers and serv- ers), BACnet/IP controllers (connected to interesting devices that are network accessible), and operator workstations that may have vulnerable OS as well as configuration files and other interesting data and resources. The following table is adapted from a Drexel report on network security [Eisenstein et al., 2003a] and lists known IT threats to a BACnet network connected to the public Internet.

    pdf8p khongmuonnghe 04-01-2013 58 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2