…uthors model the vulnerability of an optical WDM network when it is affected by events for which a certain probability is known. The possibility of multiple simultaneous attacks D 75 is considered. The authors propose a 1+1 or a 1:1 protection scheme to guarantee an appropriate s…
…. Because of the lack of the dating of the sediments, a precise chronol- ogy of events cannot be determined at this point. Fig. 24. Fajsz-Garadomb and Fajsz-Kovácshalom. Digital ele- Synthesis vation model (DEM). Highlighted in blue are the potentially The analysis of different p…