Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Air Pollution Modeling Problems (1)
- Air Quality Impact Assessment (1)
- Air pollution (1)
- Air quality (1)
- Algorithms (1)
-
- Atmospheric dispersion modeling (1)
- Critical Infrastructure Assurance (1)
- Cross-cultural issues (1)
- Design (1)
- Gaussian model (1)
- Infrastructure Interdependencies (1)
- Infrastructure Modeling (1)
- Journal Publications (1)
- Polish reference method (1)
- Probabilistic Risk Assessment (1)
- System Effects and Hardening (1)
- Theory (1)
- User profiling (1)
- Vulnerability Assessment (1)
- WWW (1)
- Web personalization (1)
- Web usage mining (1)
- File Type
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Zmiany W Metodyce Modelowania Rozprzestrzeniania Się Zanieczyszczeń W Powietrzu Opartej Na Modelu Gaussa, Robert Oleniacz, Marek Bogacki
Zmiany W Metodyce Modelowania Rozprzestrzeniania Się Zanieczyszczeń W Powietrzu Opartej Na Modelu Gaussa, Robert Oleniacz, Marek Bogacki
Robert Oleniacz
The paper presents the changes that have occurred in December 2002 in the Polish reference modeling methodology (based on the stationary Gaussian atmospheric dispersion model) used for the air quality impact assessment in Poland since the 60s of the 20th century. Discusses the changes that have occurred in the preparation of data for the simulation, the procedure used in shortened and full range of calculation, the algorithms of initial computations and the results of calculations.
English Title: Changes in the methodology of modeling the pollutant dispersion in the air based on the Gaussian model.
Network Security Risk Assessment Modeling Tools For Critical Infrastructure Assessment, George H. Baker, Samuel Redwine, Joseph Blandino
Network Security Risk Assessment Modeling Tools For Critical Infrastructure Assessment, George H. Baker, Samuel Redwine, Joseph Blandino
George H Baker
The James Madison University (JMU) CIPP research team is developing Network Security Risk Assessment Modeling (NSRAM) tools that will enable the assessment of both cyber and physical infrastructure security risks. The effort is driven by the need to predict and compute the probability of adverse effects stemming from system attacks and malfunctions, to understand their consequences, and to improve existing systems to minimize these consequences.
The tools are targeted at systems supporting critical infrastructures varying from individual systems to organization-wide systems, to systems covering entire geographical regions. Early work emphasizes computing systems, but systems sharing the network nature of computing …
Web Mining For Web Personalization, Magdalini Eirinaki, Michalis Vazirgiannis
Web Mining For Web Personalization, Magdalini Eirinaki, Michalis Vazirgiannis
Magdalini Eirinaki
Web personalization is the process of customizing a Web site to the needs of specific users, taking advantage of the knowledge acquired from the analysis of the user's navigational behavior (usage data) in correlation with other information collected in the Web context, namely, structure, content, and user profile data. Due to the explosive growth of the Web, the domain of Web personalization has gained great momentum both in the research and commercial areas. In this article we present a survey of the use of Web mining for Web personalization. More specifically, we introduce the modules that comprise a Web personalization …
Working Across Cultures, John Hooker