Academic literature on the topic 'Internal checking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internal checking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Internal checking"
Rydén, Lars, and Hans Thornander. "FUNCTIONAL CHECKING OF IMPLANTED CARDIAC PACEMAKERS." Acta Medica Scandinavica 188, no. 1-6 (April 24, 2009): 527–40. http://dx.doi.org/10.1111/j.0954-6820.1970.tb08078.x.
Full textGaitanis, N. "Totally self-checking checkers with separate internal fault indication." IEEE Transactions on Computers 37, no. 10 (1988): 1206–13. http://dx.doi.org/10.1109/12.5982.
Full textPfeiffer, Yvonne, Stephan S. Gut, and David L. B. Schwappach. "Medication Safety in Oncology Care: Mapping Checking Procedures From Prescription to Administration of Chemotherapy." Journal of Oncology Practice 14, no. 4 (April 2018): e201-e210. http://dx.doi.org/10.1200/jop.2017.026427.
Full textMcClelland, Gary H. "Assessing bias in professional licensing examinations by checking internal consistency." Law and Human Behavior 9, no. 3 (September 1985): 305–18. http://dx.doi.org/10.1007/bf01044507.
Full textBarratt, Monica J., Michala Kowalski, Isabelle Volpe, and Larissa J. Maier. "On‐site drug checking can provide quantitative analysis." Internal Medicine Journal 50, no. 8 (August 2020): 1022–23. http://dx.doi.org/10.1111/imj.14954.
Full textАхмеджанов and K. Akhmedzhanov. "Quality Control of Internal Audit in the Republic of Uzbekistan." Auditor 1, no. 9 (September 17, 2015): 28–32. http://dx.doi.org/10.12737/13229.
Full textSmit‐Rigter, Laura Alexandra, and Daan Van der Gouwe. "The neglected benefits of drug checking for harm reduction." Internal Medicine Journal 50, no. 8 (August 2020): 1024. http://dx.doi.org/10.1111/imj.14953.
Full textChelmowski, M. K. "Checking for fecal occult blood with digital rectal examinations." Archives of Internal Medicine 152, no. 9 (September 1, 1992): 1929a—1929. http://dx.doi.org/10.1001/archinte.152.9.1929a.
Full textSelishchev, S. V. "Structural Aspect of Checking the Continuity of the Enterprise during Internal Audit." Statistics of Ukraine 89, no. 2-3 (November 24, 2020): 155–62. http://dx.doi.org/10.31767/su.2-3(89-90)2020.02-03.16.
Full textSelishchev, S. V. "Structural Aspect of Checking the Continuity of the Enterprise during Internal Audit." Statistics of Ukraine 89, no. 2-3 (November 24, 2020): 155–62. http://dx.doi.org/10.31767/su.2-3(89-90)2020.02-03.16.
Full textDissertations / Theses on the topic "Internal checking"
Dubois, Joël. "The influence of conditioning on internal checking of high-temperature dried Pacific Coast hemlock." Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/29750.
Full textForestry, Faculty of
Graduate
Blakemore, Philip. "Optimisation of steam reconditioning for regrowth-ash and plantation-grown eucalypt species." Thesis, The University of Sydney, 2008. http://hdl.handle.net/2123/2343.
Full textBlakemore, Philip. "Optimisation of steam reconditioning for regrowth-ash and plantation-grown eucalypt species." University of Sydney, 2008. http://hdl.handle.net/2123/2343.
Full textSteam reconditioning to recover collapse, in mid to low density eucalypt species, has been known for over ninety years. The current industrial practices for steam reconditioning have largely been based on a few older studies, which were often poorly documented and based on very small sample sizes. On top of this, many local practices and ‘rules of thumb’ have developed over time, many of which have a questionable scientific basis. This thesis was undertaken to more rigorously investigate and fundamentally understand collapse recovery, and try to optimise its application. The most obvious variable that kiln operators have control over is the moisture content of the timber prior to steam reconditioning. Experiments were undertaken to generate a range of moisture gradients (ranging from minimal to more industrially realistic) to evaluate the effect of moisture content on collapse recovery. An optimal moisture content for the core of the boards was found to be between about 18–20%, although there was no statistical difference in recoveries between about 17–25% moisture content. Below 15% moisture content recovery dropped off severely and intra-ring internal checking closure was incomplete, while at 25% moisture content an increased level of normal shrinkage, due to the early removal of drying stresses, was the main drawback. Above a core moisture content of about 35% incomplete closure of intra-ring internal checks was again observed. There was little evidence of re-collapse occurring in these high moisture content samples. Previously established relationships between density and collapse and drying rate were again generally observed in these experiments. However, for the first time an effect of collapse in reducing the fitted drying diffusion coefficients was also observed. It was also observed that, provided the moisture content of the board was in the critical range, most of the collapse recovery was achieved in the time it took to get the core of the board up to the steaming temperature of close to 100°C. This suggests that for most thicknesses a conservative reconditioning period of two hours at temperature is all that is required. This recommended shortening of the reconditioning cycle could dramatically increase the throughput of timber through the steam reconditioning chambers. Alternatively, it could mean that where modern final drying kilns are being used, the reconditioning treatment could be carried out within the final drying kiln. A finite element model was developed to demonstrate the mechanism by which collapse recovery occurs. The theory tested was that the elastic component that stores the energy to restore the shape of the deformed cell is primarily found in the S1 and S3 layers. In contrast, the inelastic component is primarily found in the S2 layer. The model generated here provided limited support for this theory.
Conceição, Desirèe Luíse Lopes. "Internet e cidadania: o estímulo ao debate político por meio do jornalismo fact-checking: um estudo de caso do projeto “Truco!”." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/20981.
Full textMade available in DSpace on 2018-04-06T12:55:35Z (GMT). No. of bitstreams: 1 Desirèe Luíse Lopes Conceição.pdf: 2748185 bytes, checksum: c467bc5ad86bb59233d0a5e34244958c (MD5) Previous issue date: 2018-02-21
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
This dissertation aims to analyze the political information produced and disseminated by the digital platform “Truco!”, which is Agência Pública’s fact-checking project developed for the 2014 election in order to identify and ascertain the political debate taking place. The methodology adopted is based on the network policy concept of the author Manuel Castells, and consists of an elaboration for primary data collection, defined from the interactions and linked to the initial proposal of this research. The results recognize qualitative investigative journalism work with political participation activities, and it’s possible to relate them to the idea that the internet has elements to contribute to citizen education
A dissertação tem por objetivo analisar a produção e divulgação de informação política na plataforma digital “Truco!”, um projeto de fact-checking da Agência Pública desenvolvido para as eleições de 2014, além de identificar e averiguar o debate político ocorrido por meio da iniciativa. A metodologia adotada é baseada no conceito de política em rede do autor Manuel Castells. A técnica metodológica consistiu na elaboração de indicadores para a coleta de dados primários, definidos a partir de uma análise piloto e da identificação de padrões de interação relacionados à proposta inicial da pesquisa. Os resultados permitem identificar um trabalho de jornalismo investigativo qualitativo, além da presença de atividades de colaboração e participação política, o que aponta à concepção de que a internet contém elementos para contribuir com a formação para a cidadania
Radhouani, Amira. "Méthodes formelles pour l'extraction d'attaques internes des Systèmes d'Information." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM025/document.
Full textThe early detection of potential threats during the modelling phase of a Secure Information System (IS) is required because it favours the design of a robust access control policy and the prevention of malicious behaviours during the system execution. This involves studying the validation of access control rules and performing vulnerabilities automated checks before the IS operationalization. We are particularly interested in detecting vulnerabilities that can be exploited by internal trusted users to commit attacks, called insider attacks, by taking advantage of their legitimate access to the system. To do so, we use formal B specifications which are generated by the B4MSecure platform from UML functional models and a SecureUML modelling of role-based access control rules. Since these vulnerabilities are due to the dynamic evolution of the functional state, we propose to study the reachability of someundesirable states starting from a normal state of the system. The proposed techniques are an alternative to model-checking techniques. Indeed, they implement symbolic backward search algorithm based on complementary approaches: proof and constraint solving. This rich technical background allowed the development of the GenISIS tool which automates our approach and which was successfully experimented on several case studies available in the literature. These experiments showed its capability to extract already published attacks but also new attacks
Garcia, Wayne Scott. "Politics, journalism and Web 2.0 in the 2008 U.S. presidential elections." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0002905.
Full textBeaulaton, Delphine. "Security Analysis of IoT Systems using Attack Trees." Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS548.
Full textLoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large variety of objects interacting between each other over the Internet. In IoT systems, the security risks are multiplied as they involve hetero- geneous devices that are connected to a shared network and that carry critical tasks, and hence, are targets for malicious users. In this thesis, we propose a security-based framework for modeling IoT systems where attack trees are defined alongside the model to detect and prevent security risks in the system. The language we implemented aims to model the IoT paradigm in a simple way. The IoT systems are composed of entities having some communication capabilities between each other. Two entities can communicate if (i) they are connected through a communication protocol and (ii) they satisfy some constraints imposed by the protocol. In order to identify and analyze attacks on the security of a system we use attack trees which are an intuitive and practical formal method to do so. A successful attack can be a rare event in the execution of a well-designed system. When rare, such attacks are hard to detect with usual model checking techniques. Hence, we use importance splitting as a statistical model checking technique for rare events
Goldberger-Bagalino, Laura. "Le Web politique : l'espace médiatique des candidats de la présidentielle 2012." Thesis, Paris 10, 2017. http://www.theses.fr/2017PA100177/document.
Full textAccording to the psycho-technological model of the cultural industries, the ability to manage emotion to get voters’ constant attention in the infotainment sphere, remains one of the first objective in an electoral campaign strategy. However, the political Web contributes to the emergence of new forms of communication in electoral persuasion methods. The impact of a candidate’s media capital plays an important part online and as an extension offline. On the internet, the political class, effectively assisted by technical design experts whose job is specifically to deal with the profile of their identity, their reputation and their influence, have discovered new territories to amplify their message and to promote 24 hours a day, or to mobilize supporters in real time to raise funds. Circumventing traditional media rather than taking the risk of being destabilized by an editorialist, a political manager will choose to be more present on social media to become editor-in-chief of his or her own campaign. Totally immersed from 2011 to 2017 in website Twitter, to practice microblogging (140 characters), I try in my thesis to identify the position and the function of this « social media » as well as its value in the construction of presidential candidates, including during the French 2012 presidential election.What are the issues of the candidates who are present on the web sites and what do they reveal to us about the representation of power? How do the professionals of communication cells (the « cellcoms ») manage to take possession of these new communications tools that accelerate the temporality of institutional logics and offer to supporters an equivalent space to correct the imprecisions of campaign pledges?I suggest some answers to these questions that can be found in these keywords: suspicion, fact-checking, storytelling, Big Data, predictive modeling, irreverence, infotainment, riposte-party and social-TV as well as the associated figures presented in this thesis
Vitale, Francesco. "Run-time Anomaly Detection with Process Mining: Methodology and Railway System Compliance Case-Study." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105324.
Full textAbo, Robert. "Approches formelles pour l'analyse de la performabilité des systèmes communicants mobiles : Applications aux réseaux de capteurs sans fil." Phd thesis, Conservatoire national des arts et metiers - CNAM, 2011. http://tel.archives-ouvertes.fr/tel-00816392.
Full textBooks on the topic "Internal checking"
Wolny, Philip. Foursquare and other location-based services: Checking in, staying safe, and being savvy. New York: Rosen Central, 2012.
Find full textNeeding to Know for Sure: A CBT-Based Guide to Overcoming Compulsive Checking and Reassurance Seeking. New Harbinger Publications, 2020.
Find full textBorel, Brooke. Chicago Guide to Fact-Checking. University of Chicago Press, 2016.
Find full textThe Chicago guide to fact-checking. The University of Chicago Press, 2016.
Find full textFox, Kevin F., and Henry J. Skinner. Quality assurance in echocardiography. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780198726012.003.0072.
Full textHirschman, Lynette, and Inderjeet Mani. Evaluation. Edited by Ruslan Mitkov. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780199276349.013.0022.
Full textIrresistible: Why We Can't Stop Checking, Scrolling, Clicking and Watching. Penguin Random House, 2017.
Find full textAlter, Adam. Irresistible: Why We Can't Stop Checking, Scrolling, Clicking and Watching. Penguin Random House, 2017.
Find full textCheng, Russell. Embedded Distributions: Two Numerical Examples. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198505044.003.0007.
Full textBook chapters on the topic "Internal checking"
Deutsch, Hans-Peter, and Mark W. Beinker. "Backtesting: Checking the Applied Methods." In Derivatives and Internal Models, 575–83. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22899-6_25.
Full textDeutsch, Hans-Peter. "Backtesting: Checking the Applied Methods." In Derivatives and Internal Models, 459–66. London: Palgrave Macmillan UK, 2004. http://dx.doi.org/10.1057/9781403946089_26.
Full textDeutsch, Hans-Peter. "Backtesting: Checking the Applied Methods." In Derivatives and Internal Models, 451–58. London: Palgrave Macmillan UK, 2002. http://dx.doi.org/10.1057/9780230502109_26.
Full textDeutsch, Hans-Peter. "Backtesting: Checking the Applied Methods." In Derivatives and Internal Models, 496–504. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230234758_24.
Full textBlakemore, Philip. "Internal Checking During Eucalypt Processing." In Delamination in Wood, Wood Products and Wood-Based Composites, 237–54. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9550-3_12.
Full textSlanina, Zdenek, Jakub Dostal, Filip Krupa, and Jakub Nemcik. "Assembly Line Automation for Internal Gearbox Brake Checking." In Lecture Notes in Networks and Systems, 696–705. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87178-9_70.
Full textChen, Yuting. "Checking Internal Consistency of SOFL Specification: A Hybrid Approach." In Structured Object-Oriented Formal Language and Method, 175–91. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04915-1_13.
Full textRajalingham, Kamalasen, David Chadwick, Brian Knight, and Dilwyn Edwards. "Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM)." In Integrity and Internal Control in Information Systems, 41–58. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35501-6_4.
Full textYen, Sung-Ming, Wei-Chih Lien, SangJae Moon, and JaeCheol Ha. "Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption." In Progress in Cryptology – Mycrypt 2005, 183–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11554868_13.
Full textFinkel, Alain, and Jérôme Leroux. "Polynomial Time Image Computation with Interval-Definable Counters Systems." In Model Checking Software, 182–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24732-6_14.
Full textConference papers on the topic "Internal checking"
Goldberg, Eugene, and Kanupriya Gulati. "On Complexity of Internal and External Equivalence Checking." In 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2007). IEEE, 2007. http://dx.doi.org/10.1109/dsd.2007.4341469.
Full textArimoto, Yasuhito, Michiharu Kudoh, Yuji Watanabe, and Kokichi Futatsugi. "Checking assignments of controls to risks for internal control." In the 2nd International Conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1509096.1509116.
Full textTang, Liqiong, Morio Fukuoka, and Peter Tait. "Mechanical Sensing for Reformer Internal Diameter Data Capturing." In ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-48970.
Full textCouceiro, José, Lars Hansson, Ahec Ambrož, and Dick Sandberg. "CT-scanning of the drying process of Eucalyptus nitens." In 21st International Drying Symposium. Valencia: Universitat Politècnica València, 2018. http://dx.doi.org/10.4995/ids2018.2018.7380.
Full textCaballero, Gloria, Paula Álvarez, and Mª Jesús López-Miguens. "Internal determinants of university student employability. Construction and validation of scales." In Third International Conference on Higher Education Advances. Valencia: Universitat Politècnica València, 2017. http://dx.doi.org/10.4995/head17.2017.5491.
Full textBrunin, Olivier, and Geoffrey Deotto. "Loads Applied to Clogged Steam Generators Internal Structures." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77140.
Full textYoshida, Hiroaki, and Masahiro Fujita. "Improving the accuracy of rule-based equivalence checking of system-level design descriptions by identifying potential internal equivalences." In 2009 10th International Symposium on Quality of Electronic Design (ISQED). IEEE, 2009. http://dx.doi.org/10.1109/isqed.2009.4810322.
Full textLi, Keming, Jinyang Zheng, Zekun Zhang, Chaohua Gu, and Ping Xu. "A New Method for Preventing Plastic Collapse of Ellipsoidal Head Under Internal Pressure." In ASME 2020 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/pvp2020-21212.
Full textGalgoul, Nelson Szilard, Andre´ Luiz Lupinacci Massa, and Cla´udia Albergaria Claro. "A Discussion on How Internal Pressure is Treated in Offshore Pipeline Design." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0337.
Full textHsieh, Hsiang-Yu, Nanming Chen, and Ching-Lung Liao. "Visual Recognition System of Elastic Rail Clips for Mass Rapid Transit Systems." In ASME/IEEE 2007 Joint Rail Conference and Internal Combustion Engine Division Spring Technical Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/jrc/ice2007-40080.
Full textReports on the topic "Internal checking"
Stepanyuk, Alla V., Liudmyla P. Mironets, Tetiana M. Olendr, Ivan M. Tsidylo, and Oksana B. Stoliar. Methodology of using mobile Internet devices in the process of biology school course studying. [б. в.], July 2020. http://dx.doi.org/10.31812/123456789/3887.
Full textGalili, Naftali, Roger P. Rohrbach, Itzhak Shmulevich, Yoram Fuchs, and Giora Zauberman. Non-Destructive Quality Sensing of High-Value Agricultural Commodities Through Response Analysis. United States Department of Agriculture, October 1994. http://dx.doi.org/10.32747/1994.7570549.bard.
Full textPayment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.
Full text