Academic literature on the topic 'SENSITIVE RULES'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SENSITIVE RULES.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SENSITIVE RULES"

1

Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.

Full text
Abstract:
The goal of knowledge discovery is to extract hidden or useful unknown knowledge from databases, while the objective of knowledge hiding is to prevent certain confidential data or knowledge from being extracted through data mining techniques. Hiding sensitive association rules is focused. The side-effects of the existing data mining technology are investigated. The problem of sensitive association rule hiding is described formally. The representative sanitizing strategies for sensitive association rule hiding are discussed.
APA, Harvard, Vancouver, ISO, and other styles
2

Bansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic." Global Journal of Enterprise Information System 9, no. 2 (June 28, 2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.

Full text
Abstract:
Mining of sensitive rules is the most important task in data mining. Most of the existing techniques worked on finding sensitive rules based upon the crisp thresh hold value of support and confidence which cause serious side effects to the original database. To avoid these crisp boundaries this paper aims to use WFPPM (Weighted Fuzzy Privacy Preserving Mining) to extract sensitive association rules. WFPPM completely find the sensitive rules by calculating the weights of the rules. At first, we apply FP-Growth to mine association rules from the database. Next, we implement fuzzy to find the sensitive rules among the extracted rules. Experimental results show that the proposed scheme find actual sensitive rules without any modification along with maintaining the quality of the released data as compared to the previous techniques.
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.

Full text
Abstract:
Data mining technologies are successfully applied in lots of domains such as business, science research, health care, bioinformatics, financial forecasting and so on and so forth. Knowledge can be discovered by data mining and can help people to make better decisions and benefits. Association rule is one kind of the most popular knowledge discovered by data mining. While at the same time, some association rules extracted from data mining can be considered so sensitive for data holders that they will not like to share and really want to hide. Such kind of side effects of data mining is analyzed by privacy preserving technologies. In this work, we have proposed strategies by adjusting supports and quality measurements of sensitive association rules hiding.
APA, Harvard, Vancouver, ISO, and other styles
4

Rao, K. Srinivasa, CH Suresh Babu, A. Damodaram, and Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules." International Journal of Multimedia and Ubiquitous Engineering 9, no. 10 (October 31, 2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Whittle, P. "Entropy-minimising and risk-sensitive control rules." Systems & Control Letters 13, no. 1 (July 1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jain, Dhyanendra. "Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S)." International Journal of Artificial Intelligence & Applications 3, no. 2 (March 31, 2012): 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Hui. "Strategies for Sensitive Association Rule Hiding." Applied Mechanics and Materials 336-338 (July 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.

Full text
Abstract:
Data mining technologies are used widely while the side effects it incurred are concerned so seriously. Privacy preserving data mining is so important for data and knowledge security during data mining applications. Association rule extracted from data mining is one kind of the most popular knowledge. It is challenging to hide sensitive association rules extracted by data mining process and make less affection on non-sensitive rules and the original database. In this work, we focus on specific association rule automatic hiding. Novel strategies are proposed which are based on increasing the support of the left hand and decreasing the support of the right hand. Quality measurements for sensitive association rules hiding are presented.
APA, Harvard, Vancouver, ISO, and other styles
8

Gayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (September 1, 2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.

Full text
Abstract:
Abstract Association Rule Hiding methodology is a privacy preserving data mining technique that sanitizes the original database by hide sensitive association rules generated from the transactional database. The side effect of association rules hiding technique is to hide certain rules that are not sensitive, failing to hide certain sensitive rules and generating false rules in the resulted database. This affects the privacy of the data and the utility of data mining results. In this paper, a method called Gene Patterned Association Rule Hiding (GPARH) is proposed for preserving privacy of the data and maintaining the data utility, based on data perturbation technique. Using gene selection operation, privacy linked hidden and exposed data items are mapped to the vector data items, thereby obtaining gene based data item. The performance of proposed GPARH is evaluated in terms of metrics such as number of sensitive rules generated, true positive privacy rate and execution time for selecting the sensitive rules by using Abalone and Taxi Service Trajectory datasets.
APA, Harvard, Vancouver, ISO, and other styles
9

Menon, Syam, Abhijeet Ghoshal, and Sumit Sarkar. "Modifying Transactional Databases to Hide Sensitive Association Rules." Information Systems Research 33, no. 1 (March 2022): 152–78. http://dx.doi.org/10.1287/isre.2021.1033.

Full text
Abstract:
Although firms recognize the value in sharing data with supply chain partners, many remain reluctant to share for fear of sensitive information potentially making its way to competitors. Approaches that can help hide sensitive information could alleviate such concerns and increase the number of firms that are willing to share. Sensitive information in transactional databases often manifests itself in the form of association rules. The sensitive association rules can be concealed by altering transactions so that they remain hidden when the data are mined by the partner. The problem of hiding these rules in the data are computationally difficult (NP-hard), and extant approaches are all heuristic in nature. To our knowledge, this is the first paper that introduces the problem as a nonlinear integer formulation to hide the sensitive association rule while minimizing the alterations needed in the data set. We apply transformations that linearize the constraints and derive various results that help reduce the size of the problem to be solved. Our results show that although the nonlinear integer formulations are not practical, the linearizations and problem-reduction steps make a significant impact on solvability and solution time. This approach mitigates potential risks associated with sharing and should increase data sharing among supply chain partners.
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Yi-hung, Chia-ming Chiang, and Arbee Chen. "Hiding Sensitive Association Rules with Limited Side Effects." IEEE Transactions on Knowledge and Data Engineering 19, no. 1 (January 2007): 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "SENSITIVE RULES"

1

Bakshi, Arjun. "Methodology For Generating High-Confidence Cost-Sensitive Rules For Classification." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377868085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dimitrova, Katica. "Order-sensitive view maintenance of materialized XQuery views." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-151827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Murphy, Brian R. "Order-sensitive XML query processing over relational sources." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.

Full text
Abstract:
Thesis (M.S.)--Worcester Polytechnic Institute.
Keywords: computation pushdown; XML; order-based Xquery processing; relational database; ordered SQL queries; data model mapping; XQuery; XML data mapping; SQL; XML algebra rewrite rules; XML document order. Includes bibliographical references (p. 64-67).
APA, Harvard, Vancouver, ISO, and other styles
4

Baladová, Šárka. "THE IMPACT ANALYSIS OF THE EU-KOREA FTA ON THE CZECH SENSITIVE SECTORS WITH SPECIAL ATTENTION TO THE AUTOMOTIVE INDUSTRY." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74890.

Full text
Abstract:
Strong objections appeared in the Czech Republic, especially in the automotive industry, against the EU-Korea Free Tra de Agreement right after its adoption in October 2009. There were fears that the Agreement would endanger Czech competitiveness in the European market while new opportunity for Czech exporters in the Korean market would be limited. The thesis aims to analyze the impacts of the Agreement on the Czech sensitive sectors as the author does not agree with the results of the very first Czech country specific analysis made by the Association for International Affairs (AMO) that neglects any important endangering effects of the Agreement. The crucial difference between this paper and the study made by AMO is that the author considers Czech competitiveness in the European market as a decisive criterion while AMO analysts analyze the impacts on the Czech market only. They do not consider Czech exports to the EU member states and potentially strengthening competition in the European market for Czech producers. In the thesis the sensitive sectors are defined using the data from the International Trade Centre (ITC), the Czech statistical office, and the UN COMTRADE. Hariss index is used to measure restrictiveness of the rules of origin for the very first time in the EU-Korean FTA context, the methodology of the European Commission is utilized to estimate potential savings in effect of duty drawback, and a qualitative analysis of the non-tariff barriers is applied. The author points at a decisive function of non tariff barriers that plays even more important role in terms of liberalization then tariff reduction itself. Regarding the automotive industry, the thesis shows that Czech competitiveness within heading 8703 (cars) will not be endangered in effect of the Agreement while there might be some difficulties within heading 8708 (parts & accessories for motor vehicles). The Czech Republic does not perform any revealed competitive advantage in trade of services. The arguments of Czech car makers against the Agreement about the trade within heading 8703 are not admitted. However further research is needed to analyze if the Agreement will have harmful effects on Czech competitiveness in the European market within heading 8708. The Agreement will not bring up any notable opportunity for Czech exporters in the Korean market.
APA, Harvard, Vancouver, ISO, and other styles
5

Aljandal, Waleed A. "Itemset size-sensitive interestingness measures for association rule mining and link prediction." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Mingjun. "Essays on model uncertainty in macroeconomics." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153244452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Oliveira, Paulo Henrique Maestrello Assad. "Detecção de fraudes em cartões: um classificador baseado em regras de associação e regressão logística." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.

Full text
Abstract:
Os cartões, sejam de crédito ou débito, são meios de pagamento altamente utilizados. Esse fato desperta o interesse de fraudadores. O mercado de cartões enxerga as fraudes como custos operacionais, que são repassados para os consumidores e para a sociedade em geral. Ainda, o alto volume de transações e a necessidade de combater as fraudes abrem espaço para a aplicação de técnicas de Aprendizagem de Máquina; entre elas, os classificadores. Um tipo de classificador largamente utilizado nesse domínio é o classificador baseado em regras. Entretanto, um ponto de atenção dessa categoria de classificadores é que, na prática, eles são altamente dependentes dos especialistas no domínio, ou seja, profissionais que detectam os padrões das transações fraudulentas, os transformam em regras e implementam essas regras nos sistemas de classificação. Ao reconhecer esse cenário, o objetivo desse trabalho é propor a uma arquitetura baseada em regras de associação e regressão logística - técnicas estudadas em Aprendizagem de Máquina - para minerar regras nos dados e produzir, como resultado, conjuntos de regras de detecção de transações fraudulentas e disponibilizá-los para os especialistas no domínio. Com isso, esses profissionais terão o auxílio dos computadores para descobrir e gerar as regras que embasam o classificador, diminuindo, então, a chance de haver padrões fraudulentos ainda não reconhecidos e tornando as atividades de gerar e manter as regras mais eficientes. Com a finalidade de testar a proposta, a parte experimental do trabalho contou com cerca de 7,7 milhões de transações reais de cartões fornecidas por uma empresa participante do mercado de cartões. A partir daí, dado que o classificador pode cometer erros (falso-positivo e falso-negativo), a técnica de análise sensível ao custo foi aplicada para que a maior parte desses erros tenha um menor custo. Além disso, após um longo trabalho de análise do banco de dados, 141 características foram combinadas para, com o uso do algoritmo FP-Growth, gerar 38.003 regras que, após um processo de filtragem e seleção, foram agrupadas em cinco conjuntos de regras, sendo que o maior deles tem 1.285 regras. Cada um desses cinco conjuntos foi submetido a uma modelagem de regressão logística para que suas regras fossem validadas e ponderadas por critérios estatísticos. Ao final do processo, as métricas de ajuste estatístico dos modelos revelaram conjuntos bem ajustados e os indicadores de desempenho dos classificadores também indicaram, num geral, poderes de classificação muito bons (AROC entre 0,788 e 0,820). Como conclusão, a aplicação combinada das técnicas estatísticas - análise sensível ao custo, regras de associação e regressão logística - se mostrou conceitual e teoricamente coesa e coerente. Por fim, o experimento e seus resultados demonstraram a viabilidade técnica e prática da proposta.
Credit and debit cards are two methods of payments highly utilized. This awakens the interest of fraudsters. Businesses see fraudulent transactions as operating costs, which are passed on to consumers. Thus, the high number of transactions and the necessity to combat fraud stimulate the use of machine learning algorithms; among them, rule-based classifiers. However, a weakness of these classifiers is that, in practice, they are highly dependent on professionals who detect patterns of fraudulent transactions, transform them into rules and implement these rules in the classifier. Knowing this scenario, the aim of this thesis is to propose an architecture based on association rules and logistic regression - techniques studied in Machine Learning - for mining rules on data and produce rule sets to detect fraudulent transactions and make them available to experts. As a result, these professionals will have the aid of computers to discover the rules that support the classifier, decreasing the chance of having non-discovered fraudulent patterns and increasing the efficiency of generate and maintain these rules. In order to test the proposal, the experimental part of the thesis has used almost 7.7 million transactions provided by a real company. Moreover, after a long process of analysis of the database, 141 characteristics were combined using the algorithm FP-Growth, generating 38,003 rules. After a process of filtering and selection, they were grouped into five sets of rules which the biggest one has 1,285 rules. Each of the five sets was subjected to logistic regression, so their rules have been validated and weighted by statistical criteria. At the end of the process, the goodness of fit tests were satisfied and the performance indicators have shown very good classification powers (AUC between 0.788 and 0.820). In conclusion, the combined application of statistical techniques - cost sensitive learning, association rules and logistic regression - proved being conceptually and theoretically cohesive and coherent. Finally, the experiment and its results have demonstrated the technical and practical feasibilities of the proposal.
APA, Harvard, Vancouver, ISO, and other styles
8

Pinsolle, Julie. "L'éducation familiale transformée, approche anthropo-didactique de l'autorité à la préadolescence : Appréhension des pratiques dans la région bordelaise." Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0388.

Full text
Abstract:
Ce travail se propose d’aborder la question de l’éducation familiale, à l’heure où laconstitution d’un statut d’exception de l’enfant modifie les relations éducative et d’autoritéet rend plus incertains le jeu complexe entre individuel et collectif ainsi que la transmissiondes savoirs. Comment s'organisent les parents face cette question délicate de l'autorité,tiraillés entre les idéaux démocratiques et la composante contraignante irréductible de l'acteéducatif ? Quelle forme prend l’organisation familiale ? Vécu familial et façon de se mettreen règle à l'école sont-ils liés ?L’enjeu de ce travail est de mettre à jour les dynamiques qui ont participé de l’évolution del’éducation familiale par une étude des représentations de l’enfant et de l’enfance. Cetteétude vise ainsi à appréhender le déplacement des frontières d’éducation familiale tout enpermettant de reposer la question de l’autorité éducative par un croisement de la sociologiede la famille et la sociologie de l’école.L’étude porte sur les pratiques d’éducation familiale (organisation au quotidien avecl’enfant) et les valeurs éducatives promues par les parents. Elle révèle qu’elles nes’organisent plus de la même façon avec, sur le plan pratique, la mise en place d’une logiqued’hétérogénéité situationnelle, un délitement de l’ « éducation de classe » mais aussi lapermanence des idéologies sexistes. Sur le plan axiologique, apparaît l’homogénéisationprédite par Fize (1990) avec l’adhésion massive des parents aux valeurs promues par lesfamilles de milieu favorisé (épanouissement personnel de l’enfant).Enfin, avec l’étude de la sensibilité à l’ordre scolaire (façon de se comporter des élèves faceaux règles de vie scolaire) la thèse montre en quoi les multiples injonctions au recours audialogue et à l’explicitation des règles en éducation ne font que renforcer les difficultéséducatives. Elle révèle, au contraire, que l’essentiel de ce qui se joue dans l’éducation est del’ordre de l’indicible et que le sens des règles réside dans leur usage
This work is about family education, at the time when children’s status has changed. Thisnew status alters educational and authority relationships and questions the link betweenindividual and collectiv aspects of social life such as transmission. How do parents dealwith this sensitiv issue that is authority, torn between the democratic ideal and theconstraint that cannot be avoided in education ? How do they organize everyday life ? Isfamily organisation linked with children’s way to follow school rules ?Studying chilren and childhood representations, the issue of this work is to reveal thedynamics that contributed to family education evolution. Thus, the aim of this study is tounderstand the movement of family education while allowing to question educationnalauthority by combining family and school sociological approaches.The study focuses on parenting practices (parents’ daily organisation with their children)and educational values that parents promot. It reavels that they their organisation haschanged. Henceforth parenting practicises are structured by situational heterogeneity and« social class education » is less relevant to describe parenting practices unlike genderideologies. On the axiological level appears the educational homogenization that Fize(1990) predicted : parents massively join values promoted by privileged backgroundsfamilies (child’s personal development).Finally, with the notion of sensitivy to school form (students’ way to follow school rules),the thesis shows how, in education, dialogue and explication injonctions reinforceeducational difficulties. On the contrary, it reveals that most critical points in education areunspeakable and that the meaning of rules relies in their use
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Jei-Hung, and 楊介宏. "Hiding Sensitive Rules Based on Transaction Grouping." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58538882177123969090.

Full text
Abstract:
碩士
中原大學
資訊工程研究所
98
As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclosed. In addition to hiding sensitive rules, recent researches also start discussing the reduction or avoidance of unexpected side effects, including the hiding of non-sensitive rules (lost rules) and the creation of non-existent rules (false rules). This thesis aims at a small amount of transaction modifications and proposes a method of rule hiding. The method can recover lost rules and keep sensitive rules hidden. Besides, we propose an efficient index structure for a quick retrieval of transactions during the hiding process. The experiments verify that our method can hide all sensitive rules and recover at most 40% lost rules. The index structure reduces about 85% retrieval time on average.
APA, Harvard, Vancouver, ISO, and other styles
10

Kao, Tai-wei, and 高黛威. "Hiding dynamic sensitive association rules in incremental data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29229249691498416855.

Full text
Abstract:
碩士
國立臺灣科技大學
資訊工程系
101
As the advancement of technologies as well as the intense competition of business, the issues of privacy have acquiring more attention. Mining association rule is the significant technique in data mining. However, it may cause some privacy problem in mining processes. Many researches, thus, start to hide sensitive association rules due to avoid the sensitive information exposed. However, the development of computers and Internet technologies is so fast that data are increasing successively. In addition, sensitive association rules will change with time and policy. These both are the challenges for protecting sensitive association rules. Most exist technologies of hiding sensitive association rules cannot handle dynamic data and sensitive rules effectively. For solving these problems, this paper proposed a framework to protect dynamic sensitive association rules in incremental environment, HSAi and HDSA. HSAi is the algorithm to protect sensitive association rule in incremental data and we design the strategy to select appropriate victim transactions and items to delete them in order to hide sensitive association rules. HDSA is the algorithm for protecting dynamic sensitive rules, including adding and deleting. The mean of the deleting sensitive rule is the association rule that hidden can show again in the mining result. The goals of HSAi and HDSA are not only protecting sensitive rules but also producing least side effect from released dataset. Experiment results represent that the framework situation of incremental data and dynamic sensitive rules both can cause least side effects and maintain a desirable quality of sanitized database as well.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "SENSITIVE RULES"

1

Kutz, Gregory D. Sales of sensitive military property to the public. Washington, D.C. (441 G St., NW, Rm. LM, D.C. 20548): United States Government Accountability Office, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, ed. Contractor integrity: Stronger safeguards needed for contractor access to sensitive information : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C.]: U.S. Govt. Accountability Office, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Office, General Accounting. Environmental information: EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Office, General Accounting. Defense inventory: Inadequate compliance with controls for excess firearms and other sensitive items : report to the Chairman, Committee on Armed Services, House of Representatives. Washington, D.C: The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Office, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Timofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. The second youngest group (3-4 years). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072118.

Full text
Abstract:
Submitted effective forms of organization of various types of children's activities during the actual educational activities; educational activities carried out in sensitive moments; interaction with the families of the pupils for the implementation of the basic educational program of preschool education. Planning tailored specifically to the laws of development of children of the fourth year of life, the need to address the program objectives, maintain partner relationships with preschoolers and their families, on the basis of modern ideas about the fluctuations in the health of younger preschoolers, on the rules of alternation activities. Prepared in accordance with the Federal state educational standard of preschool education. Addressed to students of institutions of secondary professional education.
APA, Harvard, Vancouver, ISO, and other styles
7

Timofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. Preparation for school group (6-7 years). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072122.

Full text
Abstract:
Submitted effective forms of organization of various types of children's activities during the actual educational activities; educational activities carried out in sensitive moments; interaction with the families of the pupils for the implementation of the basic educational program of preschool education. Planning tailored specifically to the laws of development of children the seventh year of life, the need to address the program objectives, maintain partner relationships with preschoolers and their families, on the basis of modern ideas about the fluctuations in the health of senior preschool children, about the rules of sequence of activities. Prepared in accordance with the Federal state educational standard of preschool education. Addressed to students of institutions of secondary professional education.
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kosiara-Pedersen, Karina, Susan E. Scarrow, and Emilie van Haute. Rules of Engagement? Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198758631.003.0010.

Full text
Abstract:
This chapter investigates whether variations in party affiliation rules have political consequences, looking in particular at their effects on partisan participation. The research presented here combines data from the Political Party Database (PPDB) with surveys of party members and party supporters, looking for evidence of whether potential affiliates’ behaviour is sensitive to the relative costs of party membership. The data suggest that such sensitivity exists, with supporters being more likely to join parties which offer more benefits, and which offer membership at a lower price. They are also less likely to acquire traditional membership if cheaper affiliation options exist. Conversely, when membership is relatively costly, those who do join are more likely to use their membership by being active in the party. Our findings provide some support for demand-side views of party membership, according to which political parties are able to use membership rules to affect who joins a party.
APA, Harvard, Vancouver, ISO, and other styles
10

Eisen, Kim, and Cathryn Taylor. Staying in Your Power : 3 Steps to Creating Boundaries and Rules in Your Life: For Intuitive, Sensitive and Empathic Souls. Vibration Publishing, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SENSITIVE RULES"

1

Hezart, Armin, Abhaya Nayak, and Mehmet Orgun. "Towards Context Sensitive Defeasible Rules." In Lecture Notes in Computer Science, 193–213. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88833-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jain, Dhyanendra, Pallavi Khatri, Rishi Soni, and Brijesh Kumar Chaurasia. "Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 500–509. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27299-8_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lesaint, David, Deepak Mehta, Barry O’Sullivan, Luis Quesada, and Nic Wilson. "Context-Sensitive Call Control Using Constraints and Rules." In Principles and Practice of Constraint Programming – CP 2010, 583–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15396-9_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Díaz, Irene, Luis J. Rodríguez-Mũniz, and Luigi Troiano. "On Mining Sensitive Rules to Identify Privacy Threats." In Lecture Notes in Computer Science, 232–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40846-5_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Patin, Cédric, and Annie Rialland. "On the Nature of Rules Sensitive to Syntax." In Prosody and Syntax, 285. Amsterdam: John Benjamins Publishing Company, 2006. http://dx.doi.org/10.1075/ubli.3.16pat.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Modi, Chirag, U. P. Rao, and Dhiren R. Patel. "A Survey on Preserving Privacy for Sensitive Association Rules in Databases." In Communications in Computer and Information Science, 538–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Domadiya, Nikunj H., and Udai Pratap Rao. "A Hybrid Technique for Hiding Sensitive Association Rules and Maintaining Database Quality." In Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2, 359–67. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

de Souza Amorim, Luís Eduardo, and Eelco Visser. "Multi-purpose Syntax Definition with SDF3." In Software Engineering and Formal Methods, 1–23. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_1.

Full text
Abstract:
Abstract SDF3 is a syntax definition formalism that extends plain context-free grammars with features such as constructor declarations, declarative disambiguation rules, character-level grammars, permissive syntax, layout constraints, formatting templates, placeholder syntax, and modular composition. These features support the multi-purpose interpretation of syntax definitions, including derivation of type schemas for abstract syntax tree representations, scannerless generalized parsing of the full class of context-free grammars, error recovery, layout-sensitive parsing, parenthesization and formatting, and syntactic completion. This paper gives a high level overview of SDF3 by means of examples and provides a guide to the literature for further details.
APA, Harvard, Vancouver, ISO, and other styles
9

Navet, Nicolas, and Shu-Heng Chen. "On Predictability and Profitability: Would GP Induced Trading Rules be Sensitive to the Observed Entropy of Time Series?" In Natural Computing in Computational Finance, 197–210. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-77477-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nordberg, Ana. "Biobank and Biomedical Research: Responsibilities of Controllers and Processors Under the EU General Data Protection Regulation." In GDPR and Biobanking, 61–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_5.

Full text
Abstract:
AbstractBiobanks are essential infrastructures in current health and biomedical research. Advanced scientific research increasingly relies on processing and correlating large amounts of genetic, clinical and behavioural data. These data are particularly sensitive in nature and the risk of privacy invasion and misuse is high. The EU General Data Protection Regulation (GDPR) developed and increased harmonisation, resulting in a framework in which the specific duties and obligations of entities processing personal data—controllers and processors—were defined. Biobanks, in the exercise of their functions, assume the role of controllers and/or processors and as such need to comply with a number of complex rules. This chapter analyses these rules in the light of Article 89 GDPR, which creates safeguards and derogations relating to ‘processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes’. It identifies key compliance challenges faced by biobanks as data controllers and processors, such as determining whether the GDPR is applicable and its intersection with other regulations; when a biobank should be considered controller and processor; and what are the main duties of biobanks as data controllers and processors and options for compliance.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SENSITIVE RULES"

1

Wang, Shyue-Liang, Tzung-Pei Hong, Yu-Chuan Tsai, and Hung-Yu Kao. "Hiding Sensitive Association Rules on Stars." In 2010 IEEE International Conference on Granular Computing (GrC-2010). IEEE, 2010. http://dx.doi.org/10.1109/grc.2010.123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bakshi, Arjun, and Raj Bhatnagar. "Learning Cost-Sensitive Rules for Non-forced Classification." In 2012 IEEE 12th International Conference on Data Mining Workshops. IEEE, 2012. http://dx.doi.org/10.1109/icdmw.2012.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, S. L., and A. Jafari. "Using unknowns for hiding sensitive predictive association rules." In Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration. IEEE, 2005. http://dx.doi.org/10.1109/iri-05.2005.1506477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Navale, Geeta S., and Suresh N. Mali. "A Survey on Sensitive Association Rules Hiding Methods." In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weng, Chih-Chia, Shan-Tai Chen, and Hung-Che Lo. "A Novel Algorithm for Completely Hiding Sensitive Association Rules." In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Choi, K. S., and J. Pan. "An Anisotropic Hardening Rule With Non-Associated Flow Rule for Pressure-Sensitive Materials." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77951.

Full text
Abstract:
In this paper, cyclic plastic behaviors of pressure-sensitive materials based on an anisotropic hardening rule with two non-associated flow rules are examined. The Drucker-Prager pressure-sensitive yield function and the Mises plastic potential function are adopted to explore the cyclic plastic behaviors of pressure-sensitive materials or strength-differential materials. The constitutive relations are formulated for the initial loading and unloading/reloading processes based on the anisotropic hardening rule of Choi and Pan [1]. Non-associated flow rules are employed to derive closed-form stress-plastic strain relations under uniaxial cyclic loading conditions. The stress-plastic strain curves based on a conventional non-associated flow rule do not close, and show a significant ratcheting under uniaxial cyclic loading conditions. A new non-conventional non-associated flow rule is then formulated based on observed nearly closed hysteresis loops of pressure-sensitive materials. The stress-plastic strain curves based on the non-conventional non-associated flow rule show closed hysteresis loops under uniaxial cyclic loading conditions. The results indicate that the anisotropic hardening rule with the non-conventional non-associated flow rule describes well the strength-differential effect and the asymmetric closed hysteresis loops as observed in the uniaxial cyclic loading tests of pressure-sensitive materials.
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Xueming, Zhijun Liu, and Chuan Zuo. "Hiding association rules based on relative-non-sensitive frequent itemsets." In 2009 8th IEEE International Conference on Cognitive Informatics (ICCI). IEEE, 2009. http://dx.doi.org/10.1109/coginf.2009.5250708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cheng, Peng, and Jeng-Shyang Pan. "Completely hide sensitive association rules using EMO by deleting transactions." In GECCO '14: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2598394.2598466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zesch, Torsten, and Oren Melamud. "Automatic Generation of Challenging Distractors Using Context-Sensitive Inference Rules." In Proceedings of the Ninth Workshop on Innovative Use of NLP for Building Educational Applications. Stroudsburg, PA, USA: Association for Computational Linguistics, 2014. http://dx.doi.org/10.3115/v1/w14-1817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lei Xu, Lei Shi, Runxin Wang, and Brendan Jennings. "A multiple criteria service composition selection algorithm supporting time-sensitive rules." In 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). IEEE, 2011. http://dx.doi.org/10.1109/inm.2011.5990664.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SENSITIVE RULES"

1

Hudson-Vitale, Cynthia, and Katherine Klosek. Issue Brief: New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, May 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dvorianyn, Paraskoviya. Сенситивне інтерв’ю: переживання колективної травми війни. Ivan Franko National University of Lviv, March 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11727.

Full text
Abstract:
The article analyzes the process of preparation and features of conducting interviews with persons who have fased traumatic experiences in war conditions. A comparative analysis of the typical interview and sensitive interview is presented, which allows journalists to comply with all requirements that would not harm interviewees and preserve the balance in the journalist-guest-audience triad. The essence of the new terminology that began to be used in Ukraine during the full-scale war – «journalism of trauma» and «collective trauma» – is revealed. Emphasis is put on society’s ability to experience and make sense of collective trauma through the stories of individuals told in sensitive interviews. Sensitive content is significant during the war, because through human stories and personal testimonies, the world gets an idea of horrors, so one can feel the fullness of this tragic stage in the country’s history. Russia’s war against Ukraine significantly changed the working conditions of journalists, because the need to cover tragic events (murders, rapes, shelling, destruction) forced media representatives to study new rules of communication. Sensitive interviews require more thorough preparation, often even contradicting the established rules that editorial offices have used for years. Reliving the trauma and strong emotions during such interviews can help society form a new experience if the interview is conducted properly, or retraumatize if the journalist has neglected important rules. Ukrainian interviewers gain this unique practice for world journalism every day, which makes scientific research relevant and necessary. Key words: interview; empathy; collective trauma; sensitive content; standards of journalistic creativity; war journalism.
APA, Harvard, Vancouver, ISO, and other styles
3

Raju, Nivedita, and Laura Bruun. Integrating Gender Perspectives into International Humanitarian Law. Stockholm International Peace Research Institute, August 2023. http://dx.doi.org/10.55163/qilu7567.

Full text
Abstract:
International humanitarian law (IHL) aims to limit the impacts of armed conflict through rules and protections. However, while IHL seemingly accords protection to ‘all persons’, it may fail to do so, especially on the basis of gender. In turn, failure to include gender perspectives in IHL can result in inaccurate assessments of civilian harm. This paper explores the missing gender perspectives in IHL and proposes that they be integrated with intersectional considerations. The paper first examines inherent gender bias in the wording of certain IHL rules, highlighting several issues including gender essentialism, limited distinction between sex and gender, and the need to overcome a binary approach to gender to ensure adequate protections for the LGBTQIA+ community. The paper also examines key rules of IHL which are particularly sensitive to bias in interpretation and application, including certain rules on weapons, the rules guiding the conduct of hostilities, and obligations to provide legal advice and legal training to the armed forces. Finally, the paper concludes with action points to more effectively integrate intersectional gender perspectives into IHL.
APA, Harvard, Vancouver, ISO, and other styles
4

Khadan, Jeetendra. An Econometric Analysis of Energy Revenue and Government Expenditure Shocks on Economic Growth in Trinidad and Tobago. Inter-American Development Bank, December 2016. http://dx.doi.org/10.18235/0011776.

Full text
Abstract:
Energy revenues represent roughly 45 percent of Trinidad and Tobago's GDP and are highly volatile since they are correlated with the price of oil and gas. Hence, sharp changes in energy prices, whether temporary or sustained, can have important consequences for economic growth and overall macroeconomic performance. After the 2014 crash in oil prices, a key challenge that emerged for policymakers in hydrocarbon-exporting countries is how to manage fiscal retrenchment in an environment of subdued growth. Using structural vector autoregression, this article examines three questions related to this challenge by focusing on Trinidad and Tobago: (1) what is the asymmetric effect of energy revenue shocks on macroeconomic performance, (2) what is the asymmetric effect of energy revenue shocks on government expenditure (disaggregated by categories), and (3) what is the effect of government expenditure shocks (disaggregated by categories) on economic growth. The results suggest that although positive energy revenue shock increases growth almost immediately, it is not sustained. A negative energy revenue shock is found to have a greater adverse effect on primary expenditure than a positive shock and this largely occurs through a reduction in capital expenditure. Transfers and subsidies, and goods and services are the most sensitive components of current expenditure to positive energy shocks. With respect to the effect of expenditure on growth, transfers and subsidies significantly reduce growth in the short run, whereas other categories of expenditure are found to have a largely positive effect on growth. These findings suggest three important implications for policymakers: the first is to reduce and or reorient public expenditure away from transfers and subsidies and towards more growth-enhancing areas; the second is the need for clear fiscal rules, and to more effectively balance the role of fiscal policy as a growth stimulus while also performing other social functions; and thirdly, these results bring into sharp focus the effectiveness of the rules of the country's stabilization fund to manage windfall energy revenues.
APA, Harvard, Vancouver, ISO, and other styles
5

Parkins, R. N. NR198706 Environmental Aspects of the Stress-Corrosion Cracking of Pipeline Steels. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 1987. http://dx.doi.org/10.55274/r0011886.

Full text
Abstract:
A brief review of the circumstances whereby carbonate-bicarbonate solutions are considered the most likely potent environment for the stress corrosion cracking of pipelines is given. The possibility that other environments may also promote environment-sensitive cracking of pipelines cannot be completely ruled out.
APA, Harvard, Vancouver, ISO, and other styles
6

Hertel, Thomas, David Hummels, Maros Ivanic, and Roman Keeney. How Confident Can We Be in CGE-Based Assessments of Free Trade Agreements? GTAP Working Paper, June 2003. http://dx.doi.org/10.21642/gtap.wp26.

Full text
Abstract:
With the proliferation of Free Trade Agreements (FTAs) over the past decade, demand for quantitative analysis of their likely impacts has surged. The main quantitative tool for performing such analysis is Computable General Equilibrium (CGE) modeling. Yet these models have been widely criticized for performing poorly (Kehoe, 2002) and having weak econometric foundations (McKitrick, 1998; Jorgenson, 1984). FTA results have been shown to be particularly sensitive to the trade elasticities, with small trade elasticities generating large terms of trade effects and relatively modest efficiency gains, whereas large trade elasticities lead to the opposite result. Critics are understandably wary of results being determined largely by the authors’ choice of trade elasticities. Where do these trade elasticities come from? CGE modelers typically draw these elasticities from econometric work that uses time series price variation to identify an elasticity of substitution between domestic goods and composite imports (Alaouze, 1977; Alaouze, et al., 1977; Stern et al., 1976; Gallaway, McDaniel and Rivera, 2003). This approach has three problems: the use of point estimates as “truth”, the magnitude of the point estimates, and estimating the relevant elasticity. First, modelers take point estimates drawn from the econometric literature, while ignoring the precision of these estimates. As we will make clear below, the confidence one has in various CGE conclusions depends critically on the size of the confidence interval around parameter estimates. Standard “robustness checks” such as systematically raising or lowering the substitution parameters does not properly address this problem because it ignores information about which parameters we know with some precision and which we do not. A second problem with most existing studies derives from the use of import price series to identify home vs. foreign substitution, for example, tends to systematically understate the true elasticity. This is because these estimates take price variation as exogenous when estimating the import demand functions, and ignore quality variation. When quality is high, import demand and prices will be jointly high. This biases estimated elasticities toward zero. A related point is that the fixed-weight import price series used by most authors are theoretically inappropriate for estimating the elasticities of interest. CGE modelers generally examine a nested utility structure, with domestic production substitution for a CES composite import bundle. The appropriate price series is then the corresponding CES price index among foreign varieties. Constructing such an index requires knowledge of the elasticity of substitution among foreign varieties (see below). By using a fixed-weight import price series, previous estimates place too much weight on high foreign prices, and too small a weight on low foreign prices. In other words, they overstate the degree of price variation that exists, relative to a CES price index. Reconciling small trade volume movements with large import price series movements requires a small elasticity of substitution. This problem, and that of unmeasured quality variation, helps explain why typical estimated elasticities are very small. The third problem with the existing literature is that estimates taken from other researchers’ studies typically employ different levels of aggregation, and exploit different sources of price variation, from what policy modelers have in mind. Employment of elasticities in experiments ill-matched to their original estimation can be problematic. For example, estimates may be calculated at a higher or lower level of aggregation than the level of analysis than the modeler wants to examine. Estimating substitutability across sources for paddy rice gives one a quite different answer than estimates that look at agriculture as a whole. When analyzing Free Trade Agreements, the principle policy experiment is a change in relative prices among foreign suppliers caused by lowering tariffs within the FTA. Understanding the substitution this will induce across those suppliers is critical to gauging the FTA’s real effects. Using home v. foreign elasticities rather than elasticities of substitution among imports supplied from different countries may be quite misleading. Moreover, these “sourcing” elasticities are critical for constructing composite import price series to appropriate estimate home v. foreign substitutability. In summary, the history of estimating the substitution elasticities governing trade flows in CGE models has been checkered at best. Clearly there is a need for improved econometric estimation of these trade elasticities that is well-integrated into the CGE modeling framework. This paper provides such estimation and integration, and has several significant merits. First, we choose our experiment carefully. Our CGE analysis focuses on the prospective Free Trade Agreement of the Americas (FTAA) currently under negotiation. This is one of the most important FTAs currently “in play” in international negotiations. It also fits nicely with the source data used to estimate the trade elasticities, which is largely based on imports into North and South America. Our assessment is done in a perfectly competitive, comparative static setting in order to emphasize the role of the trade elasticities in determining the conventional gains/losses from such an FTA. This type of model is still widely used by government agencies for the evaluation of such agreements. Extensions to incorporate imperfect competition are straightforward, but involve the introduction of additional parameters (markups, extent of unexploited scale economies) as well as structural assumptions (entry/no-entry, nature of inter-firm rivalry) that introduce further uncertainty. Since our focus is on the effects of a PTA we estimate elasticities of substitution across multiple foreign supply sources. We do not use cross-exporter variation in prices or tariffs alone. Exporter price series exhibit a high degree of multicolinearity, and in any case, would be subject to unmeasured quality variation as described previously. Similarly, tariff variation by itself is typically unhelpful because by their very nature, Most Favored Nation (MFN) tariffs are non-discriminatory in nature, affecting all suppliers in the same way. Tariff preferences, where they exist, are often difficult to measure – sometimes being confounded by quantitative barriers, restrictive rules of origin, and other restrictions. Instead we employ a unique methodology and data set drawing on not only tariffs, but also bilateral transportation costs for goods traded internationally (Hummels, 1999). Transportation costs vary much more widely than do tariffs, allowing much more precise estimation of the trade elasticities that are central to CGE analysis of FTAs. We have highly disaggregated commodity trade flow data, and are therefore able to provide estimates that precisely match the commodity aggregation scheme employed in the subsequent CGE model. We follow the GTAP Version 5.0 aggregation scheme which includes 42 merchandise trade commodities covering food products, natural resources and manufactured goods. With the exception of two primary commodities that are not traded, we are able to estimate trade elasticities for all merchandise commodities that are significantly different form zero at the 95% confidence level. Rather than producing point estimates of the resulting welfare, export and employment effects, we report confidence intervals instead. These are based on repeated solution of the model, drawing from a distribution of trade elasticity estimates constructed based on the econometrically estimated standard errors. There is now a long history of CGE studies based on SSA: Systematic Sensitivity Analysis (Harrison and Vinod, 1992; Wigle, 1991; Pagon and Shannon, 1987) Ho
APA, Harvard, Vancouver, ISO, and other styles
7

Locy, Robert D., Hillel Fromm, Joe H. Cherry, and Narendra K. Singh. Regulation of Arabidopsis Glutamate Decarboxylase in Response to Heat Stress: Modulation of Enzyme Activity and Gene Expression. United States Department of Agriculture, January 2001. http://dx.doi.org/10.32747/2001.7575288.bard.

Full text
Abstract:
Most plants accumulate the nonprotein amino acid, g-aminobutyric acid (GABA), in response to heat stress. GABA is made from glutamate in a reaction catalyzed by glutamate decarboxylase (GAD), an enzyme that has been shown by the Israeli PI to be a calmodulin (CaM) binding protein whose activity is regulated in vitro by calcium and CaM. In Arabidopsis there are at least 5 GAD genes, two isoforms of GAD, GAD1 and GAD2, are known to be expressed, both of which appear to be calmodulin-binding proteins. The role of GABA accumulation in stress tolerance remains unclear, and thus the objectives of the proposed work are intended to clarify the possible roles of GABA in stress tolerance by studying the factors which regulate the activity of GAD in vivo. Our intent was to demonstrate the factors that mediate the expression of GAD activity by analyzing the promoters of the GAD1 and GAD2 genes, to determine the role of stress induced calcium signaling in the regulation of GAD activity, to investigate the role of phosphorylation of the CaM-binding domain in the regulation of GAD activity, and to investigate whether ABA signaling could be involved in GAD regulation via the following set of original Project Objectives: 1. Construction of chimeric GAD1 and GAD2 promoter/reporter gene fusions and their utilization for determining cell-specific expression of GAD genes in Arabidopsis. 2. Utilizing transgenic plants harboring chimeric GAD1 promoter-luciferase constructs for isolating mutants in genes controlling GAD1 gene activation in response to heat shock. 3. Assess the role of Ca2+/CaM in the regulation of GAD activity in vivo in Arabidopsis. 4. Study the possible phosphorylation of GAD as a means of regulation of GAD activity. 5. Utilize ABA mutants of Arabidopsis to assess the involvement of this phytohormone in GAD activation by stress stimuli. The major conclusions of Objective 1 was that GAD1 was strongly expressed in the elongating region of the root, while GAD2 was mainly expressed along the phloem in both roots and shoots. In addition, GAD activity was found not to be transcriptionally regulated in response to heat stress. Subsequently, The Israeli side obtained a GAD1 knockout mutation, and in light of the objective 1 results it was determined that characterization of this knockout mutation would contribute more to the project than the proposed Objective 2. The major conclusion of Objective 3 is that heat-stress-induced changes in GAD activity can be explained by heat-stress-induced changes in cytosolic calcium levels. No evidence that GAD activity was transcriptionally or translationally regulated or that protein phosphorylation was involved in GAD regulation (objective 4) was obtained. Previously published data by others showing that in wheat roots ABA regulated GABA accumulation proved not to be the case in Arabidopsis (Objective 5). Consequently, we put the remaining effort in the project into the selection of mutants related to temperature adaptation and GABA utilization and attempting to characterize events resulting from GABA accumulation. A set of 3 heat sensitive mutants that appear to have GABA related mutations have been isolated and partially characterized, and a study linking GABA accumulation to growth stimulation and altered nitrate assimilation were conducted. By providing a better understanding of how GAD activity was and was not regulated in vivo, we have ruled out the use of certain genes for genetically engineering thermotolerance, and suggested other areas of endeavor related to the thrust of the project that may be more likely approaches to genetically engineering thermotolerance.
APA, Harvard, Vancouver, ISO, and other styles
8

Report on Experiences and Opportunities for Coordinated Operating Rules and Cooperation Arrangements on Dam Operations. Vientiane, Lao PDR: Mekong River Commission Secretariat, February 2023. http://dx.doi.org/10.52107/mrc.b193up.

Full text
Abstract:
(i.e. This Annual Mekong Flood Report 2015 discusses lessons learned The report highlights beneficial opportunities for coordinated water infrastructure operation mechanisms across the cooperation continuum – from coordination (information sharing) through collaboration (adaptation of operations) to joint action (mutually advantageous planning, design and operations). It provides recommended actions and a forward plan to develop: “Coordinated water infrastructure operation mechanisms for multiple benefits, including gender and vulnerability-sensitive disaster mitigation and management”, as set out in the MRC Strategic Plan 2021–2025.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography