Artículos de revistas sobre el tema "Secure Compilation"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Secure Compilation.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Secure Compilation".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Vu, Son Tuan, Albert Cohen, Arnaud De Grandmaison, Christophe Guillon y Karine Heydemann. "Reconciling optimization with secure compilation". Proceedings of the ACM on Programming Languages 5, OOPSLA (20 de octubre de 2021): 1–30. http://dx.doi.org/10.1145/3485519.

Texto completo
Resumen
Software protections against side-channel and physical attacks are essential to the development of secure applications. Such protections are meaningful at machine code or micro-architectural level, but they typically do not carry observable semantics at source level. This renders them susceptible to miscompilation, and security engineers embed input/output side-effects to prevent optimizing compilers from altering them. Yet these side-effects are error-prone and compiler-dependent. The current practice involves analyzing the generated machine code to make sure security or privacy properties are still enforced. These side-effects may also be too expensive in fine-grained protections such as control-flow integrity. We introduce observations of the program state that are intrinsic to the correct execution of security protections, along with means to specify and preserve observations across the compilation flow. Such observations complement the input/output semantics-preservation contract of compilers. We introduce an opacification mechanism to preserve and enforce a partial ordering of observations. This approach is compatible with a production compiler and does not incur any modification to its optimization passes. We validate the effectiveness and performance of our approach on a range of benchmarks, expressing the secure compilation of these applications in terms of observations to be made at specific program points.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Patrignani, Marco, Amal Ahmed y Dave Clarke. "Formal Approaches to Secure Compilation". ACM Computing Surveys 51, n.º 6 (27 de febrero de 2019): 1–36. http://dx.doi.org/10.1145/3280984.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Patrignani, Marco y Deepak Garg. "Robustly Safe Compilation, an Efficient Form of Secure Compilation". ACM Transactions on Programming Languages and Systems 43, n.º 1 (abril de 2021): 1–41. http://dx.doi.org/10.1145/3436809.

Texto completo
Resumen
Security-preserving compilers generate compiled code that withstands target-level attacks such as alteration of control flow, data leaks, or memory corruption. Many existing security-preserving compilers are proven to be fully abstract, meaning that they reflect and preserve observational equivalence. Fully abstract compilation is strong and useful but, in certain cases, comes at the cost of requiring expensive runtime constructs in compiled code. These constructs may have no relevance for security, but are needed to accommodate differences between the source and target languages that fully abstract compilation necessarily needs. As an alternative to fully abstract compilation, this article explores a different criterion for secure compilation called robustly safe compilation or RSC . Briefly, this criterion means that the compiled code preserves relevant safety properties of the source program against all adversarial contexts interacting with the compiled program. We show that RSC can be proved more easily than fully abstract compilation and also often results in more efficient code. We also present two different proof techniques for establishing that a compiler attains RSC and, to illustrate them, develop three illustrative robustly safe compilers that rely on different target-level protection mechanisms. We then proceed to turn one of our compilers into a fully abstract one and through this example argue that proving RSC can be simpler than proving full abstraction. To better explain and clarify notions, this article uses syntax highlighting in a way that colourblind and black-8-white readers can benefit from Reference [58]. For a better experience, please print or view this article in colour . 1
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Patrignani, Marco, Pieter Agten, Raoul Strackx, Bart Jacobs, Dave Clarke y Frank Piessens. "Secure Compilation to Protected Module Architectures". ACM Transactions on Programming Languages and Systems 37, n.º 2 (16 de abril de 2015): 1–50. http://dx.doi.org/10.1145/2699503.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Abate, Carmine, Roberto Blanco, Ştefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hritţcu, Marco Patrignani, Éric Tanter y Jérémy Thibault. "An Extended Account of Trace-relating Compiler Correctness and Secure Compilation". ACM Transactions on Programming Languages and Systems 43, n.º 4 (31 de diciembre de 2021): 1–48. http://dx.doi.org/10.1145/3460860.

Texto completo
Resumen
Compiler correctness, in its simplest form, is defined as the inclusion of the set of traces of the compiled program in the set of traces of the original program. This is equivalent to the preservation of all trace properties. Here, traces collect, for instance, the externally observable events of each execution. However, this definition requires the set of traces of the source and target languages to be the same, which is not the case when the languages are far apart or when observations are fine-grained. To overcome this issue, we study a generalized compiler correctness definition, which uses source and target traces drawn from potentially different sets and connected by an arbitrary relation. We set out to understand what guarantees this generalized compiler correctness definition gives us when instantiated with a non-trivial relation on traces. When this trace relation is not equality, it is no longer possible to preserve the trace properties of the source program unchanged. Instead, we provide a generic characterization of the target trace property ensured by correctly compiling a program that satisfies a given source property, and dually, of the source trace property one is required to show to obtain a certain target property for the compiled code. We show that this view on compiler correctness can naturally account for undefined behavior, resource exhaustion, different source and target values, side channels, and various abstraction mismatches. Finally, we show that the same generalization also applies to many definitions of secure compilation, which characterize the protection of a compiled program linked against adversarial code.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Andrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, Guido Martínez, Exequiel Rivas, Éric Tanter y Théo Winterhalter. "Securing Verified IO Programs Against Unverified Code in F*". Proceedings of the ACM on Programming Languages 8, POPL (5 de enero de 2024): 2226–59. http://dx.doi.org/10.1145/3632916.

Texto completo
Resumen
We introduce SCIO*, a formally secure compilation framework for statically verified programs performing input-output (IO). The source language is an F* subset in which a verified program interacts with its IO-performing context via a higher-order interface that includes refinement types as well as pre- and post-conditions about past IO events. The target language is a smaller F* subset in which the compiled program is linked with an adversarial context that has an interface without refinement types, pre-conditions, or concrete post-conditions. To bridge this interface gap and make compilation and linking secure we propose a formally verified combination of higher-order contracts and reference monitoring for recording and controlling IO operations. Compilation uses contracts to convert the logical assumptions the program makes about the context into dynamic checks on each context-program boundary crossing. These boundary checks can depend on information about past IO events stored in the state of the monitor. But these checks cannot stop the adversarial target context before it performs dangerous IO operations. Therefore linking in SCIO* additionally forces the context to perform all IO actions via a secure IO library, which uses reference monitoring to dynamically enforce an access control policy before each IO operation. We prove in F* that SCIO* soundly enforces a global trace property for the compiled verified program linked with the untrusted context. Moreover, we prove in F* that SCIO* satisfies by construction Robust Relational Hyperproperty Preservation, a very strong secure compilation criterion. Finally, we illustrate SCIO* at work on a simple web server example.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Blanton, Marina, Dennis Murphy y Chen Yuan. "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits". Proceedings on Privacy Enhancing Technologies 2024, n.º 1 (enero de 2024): 74–97. http://dx.doi.org/10.56553/popets-2024-0006.

Texto completo
Resumen
This work studies compilation of honest-majority semi-honest secure multi-party protocols secure up to additive attacks to maliciously secure computation with abort. Prior work concentrated on arithmetic circuits composed of addition and multiplication gates, while many practical protocols rely on additional types of elementary operations or gates to achieve good performance. In this work we revisit the notion of security up to additive attacks in the presence of additional gates such as random element generation and opening. This requires re-evaluation of functions that can be securely evaluated, extending the notion of protocols secure up to additive attacks, and re-visiting the notion of delayed verification that points to weaknesses in its prior use and designing a mitigation strategy. We transform the computation using dual execution to achieve security in the malicious model with abort and experimentally evaluate the difference in performance of semi-honest and malicious protocols to demonstrate the low cost.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

G, Selvakumar. "A Novel Approach for Remote Compilation using Docker Containers". International Journal of Computer Communication and Informatics 1, n.º 1 (30 de mayo de 2019): 46–51. http://dx.doi.org/10.34256/ijcci1918.

Texto completo
Resumen
The number of programming languages is getting more and more and developers are facing a tough time in installing all the compilers, libraries and supporting files for the development activities. Most of the time they want to experiment with new technologies, where the efforts required creating a complete environment to run the programs may not be feasible. On the other hand, several companies have started recruiting developers through their online programming platforms. In such situations, it is essential to protect the resources of the server from malicious programs written by the users by purpose or inadvertently. The client environment has to be as lighter as possible and the server environment must be as secure and efficient as possible. There are several existing solutions to meet this objective with plenty of demerits. In this paper we propose a novel method which overcomes most of the problems in the existing solutions and we have experimented the effectiveness of the proposed solution. In our proposed method we develop a docker based sandbox to run the client programs and display the output. We have developed a complete web interface to test the solution and created a backend to manage the users, sessions, tested programs and the outcomes which can be used for analytics too.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Jawade, Prashant Balkrishna y S. Ramachandram. "Multi-objective secure task scheduling based on SLA in multi-cloud environment". Multiagent and Grid Systems 18, n.º 1 (23 de mayo de 2022): 65–85. http://dx.doi.org/10.3233/mgs-220362.

Texto completo
Resumen
The appliances that are received at a cloud data centre are a compilation of jobs (task) that might be independent or dependent on one another. These tasks are then allocated to diverse virtual machine (VM) in a scheduled way. For this task allocation, various scheduling policies are deployed with the intention of reducing energy utilization and makespan, and increasing cloud resource exploitation as well. A variety of research and studies were done to attain an optimal solution in a single cloud setting, however the similar schemes might not operate on multi-cloud environments. Here, this paper aims to introduce a secured task scheduling model in multi-cloud environment. The developed approach mainly concerns on optimal allocation of tasks via a hybrid optimization theory. Consequently, the developed optimal task allotment considers the objectives like makespan, execution time, security parameters (risk evaluation), utilization cost, maximal service level agreement (SLA) adherence and power usage effectiveness (PUE). For resolving this issue, a novel hybrid algorithm termed as rock hyraxes updated shark smell with logistic mapping (RHU-SLM) is introduced in this work. At last, the superiority of developed approach is proved on varied measures.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Zhang, Denghui, Lijing Ren y Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing". Applied Sciences 12, n.º 18 (14 de septiembre de 2022): 9191. http://dx.doi.org/10.3390/app12189191.

Texto completo
Resumen
The addressing and discovering service is a vital infrastructure of the Internet. New applications and scenarios in next-generation networks rely on the secure and stable operation of domain name services, which puts forward new security challenges for the original domain name mechanism. While previous security enhancements of network services struggled to strike a balance between security, performance, and compatibility, hindering further use of core network services, the TEE (Trusted Computing Environment) technology can provide trusted and confidential services in untrusted network environments by verifiable hardware signatures. In this paper, we present a novel trustworthy service architecture with the preservation of security and privacy for addressing messages. The scheme provides a secure enclave to generate authenticatable responses between clients and targets, thus ensuring the privacy of services. We further build a new TEE compilation model to ensure that the built resolver application can provide trusted and secure services within TEE while keeping the availability without the TEE hardware. Experimental results show that our approach can enhance the privacy and security of addressing services such as DNS (Domain Name System) without sacrificing the quality of service and breaking the infrastructures of existing services.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Ranjan, Nikhil. "Enhancing Voting Security and Efficiency". Journal of Computers, Mechanical and Management 2, n.º 3 (31 de agosto de 2023): 9–15. http://dx.doi.org/10.57159/gadl.jcmm.2.3.23065.

Texto completo
Resumen
This study explores developing and implementing a novel Electronic Voting Machine (EVM) system integrated with biometric identifiers to enhance voting security and efficiency significantly. Traditionally, voting processes relied on paper ballots, a system fraught with several challenges, including over-voting, the loss or misplacement of ballot papers, environmental harm due to paper consumption, and a lengthy result compilation process. An advanced EVM system is proposed to address these issues, leveraging unique biometric identifiers - facial recognition and fingerprints - for voter authentication and secure vote recording. Our EVM system effectively improves the security against bogus voting and vote repetition, which have been significant concerns in previous voting systems. This robust approach to voter authentication minimizes the likelihood of voting fraud, thus contributing to a more reliable and secure voting process. However, the transition to this advanced EVM system is challenging. The study identifies keyimplications, including the impact on employment due to automation, potential inaccuracies and biases associated with biometric technologies, and vital privacy concerns surrounding using sensitive biometric data. Despite these challenges, the proposed system provides a substantial foundation for future enhancements. Opportunities for further development include the integration of additional biometric identifiers like iris recognition, refining the accuracy of current biometric technologies, and strengthening data privacy measures.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Tolmach, Andrew y Andrew W. Appel. "A Debugger for Standard ML". Journal of Functional Programming 5, n.º 2 (abril de 1995): 155–200. http://dx.doi.org/10.1017/s0956796800001313.

Texto completo
Resumen
AbstractWe have built a portable, instrumentation-based, replay debugger for the Standard ML of New Jersey compiler. Traditional ‘source-level’ debuggers for compiled languages actually operate at machine level, which makes them complex, difficult to port, and intolerant of compiler optimization. For secure languages like ML, however, debugging support can be provided without reference to the underlying machine, by adding instrumentation to program source code before compilation. Because instrumented code is (almost) ordinary source, it can be processed by the ordinary compiler. Our debugger is thus independent from the underlying hardware and runtime system, and from the optimization strategies used by the compiler. The debugger also provides reverse execution, both as a user feature and an internal mechanism. Reverse execution is implemented using a checkpoint and replay system; checkpoints are represented primarily by first-class continuations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Andersen, Gisle. "Semi-lexical features in corpus transcription". Compilation, transcription, markup and annotation of spoken corpora 21, n.º 3 (19 de septiembre de 2016): 323–47. http://dx.doi.org/10.1075/ijcl.21.3.02and.

Texto completo
Resumen
An aspect of corpus compilation that poses a particular challenge is the question of how to transcribe orthographically units that are not part of any standardised vocabulary. Among the problematic categories we find voiced pauses, minimal response signals, interjections, certain discourse markers, phonologically reduced forms, colloquialisms and dialect forms. Such semi-lexical features are usually represented by regular phonemic-graphemic correspondences but are nevertheless often inconsistently handled. This paper reviews a number of existing transcription guidelines and assesses whether the recommendations they provide are sufficient and detailed enough to secure a consistent transcription of the categories mentioned. Further, the paper assesses to what extent transcription of semi-lexical features is consistent within and across two spoken corpora. On the basis of a cross-corpus comparison of the Bergen Corpus of London Teenage Language (COLT) and the London English Corpus (LEC), the paper provides specific recommendations for corpus transcription.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Martínez Pabón, Francisco Orlando, Jaime Caicedo Guerrero, Rodrigo Hernández Cuenca, Oscar Mauricio Caicedo Rendón y Javier Alexander Hurtado Guaca. "SIM parameter-based security for mobile e-commerce settings". Ingeniería e Investigación 27, n.º 2 (1 de mayo de 2007): 56–64. http://dx.doi.org/10.15446/ing.investig.v27n2.14830.

Texto completo
Resumen
Security requirements are more demanding in the e-commerce domain. However, mobile e-commerce settings not only insist on security requirements, they also require balance between security levels and hardware and usability device ability. These features require designing models having simple authentication and authorisation scheme which also ensures information integrity for each e-transaction. The Mobile and Wireless Applications’ Development Interest Group W@Pcolombia thus developed the P3SIM platform so that mobile applications might include SIM parameter-based security features. The P3SIM platform’s framework and compilation and simulation settings combines the advantages of identification provided by the SIM module with the security features provided by SATSA and Java Card APIs for Java ME environments, one of the most-used platforms for mobile application development. Developing an m-commerce-based prototype not only shows the platform's ability to operate in secure environments, it also shows its ability to comply with environmental security requirements.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Kandiy, S. О. "Analysis of pseudorandom number generation processes in EP CRYSTALS-Dilithium". Radiotekhnika, n.º 213 (16 de junio de 2023): 18–30. http://dx.doi.org/10.30837/rt.2023.2.213.02.

Texto completo
Resumen
The paper provides an analysis of pseudorandom number generation processes in the Crystals-Dilithium post-quantum electronic signature scheme, a finalist in the NIST PQC post-quantum cryptography competition. The main focus is on the pseudo-random number generator based on the AES block cipher in counter mode. A formal model was built for this pseudo-random number generator that meets the requirements of the latest version of the AIS 31 standard, containing requirements for secure pseudorandom number generators. A pseudo-random number generator based on the AES block cipher in counter mode is shown to satisfy the requirements of functional class DRG.3, provided that the initial value for the generator is obtained from a truly random number source (either a physically truly random or a non-physical truly random source) or another generator of pseudo-random numbers having a security class not lower than the DRG class.3. In addition, the use of shake128/256 for the generation of pseudorandom sequences in Crystals-Dilithium will be analyzed. Based on the results of the analysis, recommendations are given regarding the compilation parameters depending on the conditions of use. Namely, it is concluded that an AES-based generator is more vulnerable to side-channel attacks, from which it follows that it is not recommended to use the DILITHIUM_USE_AES flag unless there are additional guarantees to protect the machine from side-channel attacks. If the operating system's cryptographic API is trusted, it is recommended to use the DILITHIUM_RANDOMIZED_SIGNING compilation flag. In systems with low trust in the cryptographic API of the operating system, it is possible to use a variant with deterministic signature generation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Bogatyrev, Sergei. "The Patronage of Early Printing in Moscow". Canadian-American Slavic Studies 51, n.º 2-3 (2017): 249–88. http://dx.doi.org/10.1163/22102396-05102016.

Texto completo
Resumen
This paper re-examines the view that printing and the distribution of printed books in Muscovy was a state monopoly. Like in many other pre-modern societies, the crown and the church were major patrons of printing. And, like in other patronage systems, there was no single approach to the press in Moscow. Ivan IV was interested in printing as a tool for enhancing prestige and securing salvation. The approaches of Orthodox hierarchs ranged from Metropolitan Makarii’s pragmatic aims to supply churches with liturgical books to reflective editing and the compilation of discursive colophons under Metropolitan Afanasii. Due to the declining quality of their printed output, Ivan Fedorov and Petr Mstislavets lost Afanasii’s patronage. The centralized pattern of patronage precluded them from finding alternative sources of printing jobs in Muscovy. It was not political persecutions or cultural prejudices against printing, but the centralization of printing in Muscovy that caused the printers to leave for Poland-Lithuania. In attempting to secure orders and find new patrons at the new location, Ivan Fedorov sought to utilize the model of patronage that he learned in Moscow.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Chmiel, Marta, Mateusz Korona, Fryderyk Kozioł, Krzysztof Szczypiorski y Mariusz Rawski. "Discussion on IoT Security Recommendations against the State-of-the-Art Solutions". Electronics 10, n.º 15 (28 de julio de 2021): 1814. http://dx.doi.org/10.3390/electronics10151814.

Texto completo
Resumen
The Internet of Things (IoT) is an emerging concept comprising a wide ecosystem of interconnected devices and services. These technologies collect, exchange and process data in order to dynamically adapt to a specific context. IoT is tightly bound to cyber-physical systems and, in this respect, has relevant security implications. A need for IoT security guidelines was identified by the industry in the early 2010s. While numerous institutions across the globe have proposed recommendations with a goal to help developers, distributors and users to ensure a secure IoT infrastructure, a strict set of regulations for IoT security is yet to be established. In this paper, we aim to provide an overview of security guidelines for IoT proposed by various organizations, and evaluate some of the existing technologies applied to ensure IoT security against these guidelines. We gathered recommendations proposed by selected government organizations, international associations and advisory groups, and compiled them into a set of the most common and important considerations, divided into eight categories. Then we chose a number of representative examples from IoT security technologies and evaluated them against these criteria. While none of the examined solutions fulfill all recommendations on their own, the existing technologies introduced by those solutions could be combined to create a design framework which satisfies all the requirements of a secure IoT device. Further research on this matter could be beneficial. To the best of our knowledge, this is the first comprehensive survey to evaluate different security technologies for IoT device security against the compilation of criteria based on existing guidelines.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Jha, Sudan, Nishant Jha, Deepak Prashar, Sultan Ahmad, Bader Alouffi y Abdullah Alharbi. "Integrated IoT-Based Secure and Efficient Key Management Framework Using Hashgraphs for Autonomous Vehicles to Ensure Road Safety". Sensors 22, n.º 7 (25 de marzo de 2022): 2529. http://dx.doi.org/10.3390/s22072529.

Texto completo
Resumen
Autonomous vehicles offer various advantages to both vehicle owners and automobile companies. However, despite the advantages, there are various risks associated with these vehicles. These vehicles interact with each other by forming a vehicular network, also known as VANET, in a centralized manner. This centralized network is vulnerable to cyber-attacks which can cause data loss, resulting in road accidents. Thus, to prevent the vehicular network from being attacked and to prevent the privacy of the data, key management is used. However, key management alone over a centralized network is not effective in ensuring data integrity in a vehicular network. To resolve this issue, various studies have introduced a blockchain-based approach and enabled key management over a decentralized network. This technique is also found effective in ensuring the privacy of all the stakeholders involved in a vehicular network. Furthermore, a blockchain-based key management system can also help in storing a large amount of data over a distributed network, which can encourage a faster exchange of information between vehicles in a network. However, there are certain limitations of blockchain technology that may affect the efficient working of autonomous vehicles. Most of the existing blockchain-based systems are implemented over Ethereum or Bitcoin. The transaction-processing capability of these blockchains is in the range of 5 to 20 transactions per second, whereas hashgraphs are capable of processing thousands of transactions per second as the data are processed exponentially. Furthermore, a hashgraph prevents the user from altering the order of the transactions being processed, and they do not need high computational powers to operate, which may help in reducing the overall cost of the system. Due to the advantages offered by a hashgraph, an advanced key management framework based on a hashgraph for secure communication between the vehicles is suggested in this paper. The framework is developed using the concept of Leaving of Vehicles based on a Logical Key Hierarchy (LKH) and Batch Rekeying. The system is tested and compared with other closely related systems on the basis of the transaction compilation time and change in traffic rates.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Pásztor, L., J. Szabó y Zs Bakacsi. "Application of the Digital Kreybig Soil Information System for the delineation of naturally handicapped areas in Hungary". Agrokémia és Talajtan 59, n.º 1 (1 de junio de 2010): 47–56. http://dx.doi.org/10.1556/agrokem.59.2010.1.6.

Texto completo
Resumen
EU’s Common Agricultural Policy encourages maintaining agricultural production in less favored areas (LFA) to secure both stable production and income to farmers and to protect the environment. Recently the delimitation of LFAs is suggested to be carried out using common biophysical diagnostic criteria on low soil productivity and poor climate conditions all over Europe. The criterion system was elaborated by European Commission’s Joint Research Center (JRC) and its operational implementation comes under member state competence. This process requires the existence of an adequate national spatial soil information system with appropriate data structure and spatial resolution as well as a proper methodology for its analysis. Hungary possesses an appropriate, nationwide, 1:25,000 scale legacy dataset originating from the national soil mapping project, which was digitally processed and developed into the Digital Kreybig Soil Information System (DKSIS). In the paper we present how DKSIS was applied for the identification and delineation of areas in Hungary concerned by the common biophysical criteria related to soil. Soil data linked to soil profiles and SMUs were jointly spatially analyzed for the compilation of nationwide digital maps displaying spatial distribution of specific limiting factors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Nazal, Muhammad Asghar, Reza Pulungan y Mardhani Riasetiawan. "Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)". IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 13, n.º 3 (31 de julio de 2019): 273. http://dx.doi.org/10.22146/ijccs.47267.

Texto completo
Resumen
Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect. One of the developments made by the G-Connect project is about data security; most of the problems verification of the data sent. In previous studies, Keccak and RSA algorithms have implemented for data verification needs. But after a literature study of other algorithms that can make digital signatures, we found what is meant by an algorithm that is better than RSA in rectangular speeds, namely Digital Signature Algorithm (DSA).DSA is one of the key algorithms used for digital signatures, but because DSA still uses Secure Hash Algorithm (SHA-1) as an algorithm for hashes, DSA rarely used for data security purposes, so Keccak is used instead of the hash algorithm on DSA. Now, Keccak become the standard for the new SHA-3 hash function algorithm. Because of the above problems, the focus of this research is about data verification using Keccak and DSA. The results of the research are proven that Keccak can run on DSA work system, obtained a comparison of execution time process between DSA and RSA where both use Keccak.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Jacobs, Koen, Dominique Devriese y Amin Timany. "Purity of an ST monad: full abstraction by semantically typed back-translation". Proceedings of the ACM on Programming Languages 6, OOPSLA1 (8 de diciembre de 2022): 1–27. http://dx.doi.org/10.1145/3527326.

Texto completo
Resumen
In 1995, Launchbury and Peyton Jones extended Haskell with an ST monad that allows the programmer to use higher-order mutable state. They informally argued that these state computations were safely encapsulated, and as such, that the rich reasoning principles stemming from the purity of the language, were not threatened. In this paper, we give a formal account of the preservation of purity after adding an ST monad to a simply-typed call-by-value recursive lambda calculus. We state and prove full abstraction when embedding the pure language into its extension with ST; contextual equivalences from the pure language continue to hold in the presence of ST. Proving full abstraction of compilers is usually done by emulating or back-translating the target features (here: ST computations) into the source language, a well-known challenge in the secure compilation community. We employ a novel proof technique for proving our full abstraction result that allows us to use a semantically (but not syntactically) typed back-translation into an intermediate language. We believe that this technique provides additional insight into our proof and that it is of general interest to researchers studying programming languages and compilers using full abstraction. The results presented here are fully formalized in the Coq proof assistant using the Iris framework.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Brys, Carloa y David Luis La Red Martínez. "GobLin: The GNU/Linux Operating System for Governments". Revista de Investigación en Tecnologías de la Información 10, n.º 22 (diciembre de 2022): 1–14. http://dx.doi.org/10.36825/riti.10.22.001.

Texto completo
Resumen
Public administration must be at the forefront of innovation and technological paradigms. The Directorate of Management Modernization and Electronic Government of the province of Misiones, created a GNU/Linux operating system distribution, specially designed for public administration. The objective of this operating system is to provide an "all-in-one" package, containing all the applications that a government office may need, without unnecessary applications. This makes it easier for IT administrators and users to install and maintain the IT infrastructure. This distribution was built by redesigning the integration of the components of a robust and mature operating system, resistant to failures and widely used in Internet services, which guarantees the stability of execution of the systems. It is also a secure system that does not include telemetry compilation which sells user information to enterprise servers, ensuring security, data privacy and user activities. It is built with free software programs, including the latest versions of office productivity applications. The result is a specialized distribution of the GNU/Linux operating system that is stable, where the included programs will not become obsolete because they will be continuously updated with the latest available versions. Everyone can copy it, distribute it and adapt it to their own needs. It is not necessary to pay any cost for the installed software nor for its future updates.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Baunvig, Katrine F., Krista S. G. Rasmussen, Kristen Vad y Per Møldrup-Dalum. "Storage over Rendition. Call for a Sustainable Infrastructure in the Digital Textual Heritage Sector with a Particular Interest in Digital Scholarly Editions". Digital Humanities in the Nordic and Baltic Countries Publications 5, n.º 1 (10 de octubre de 2023): 240–47. http://dx.doi.org/10.5617/dhnbpub.10667.

Texto completo
Resumen
A significant amount of human and pecuniary resources has gone into the production of the long line of digital scholarly editions that within recent decades have sprung to life in Scandinavia, in the Baltic region, as well as in the rest of Europe. Notwithstanding the heritage perspective, the sector is paradoxically characterized by a presentist preoccupation with instant results – first and foremost with the rendition of the given data set. Concerns for long-term data management perspectives – that is: interest in the post-production afterlife of the data – is relatively meagre. This goes for project managers, for project host institutions, and for the research foundations financially supporting the projects. So, despite harmonizing initiatives at production level and pre-edition compilation initiatives, such incentives promote a situation of insulated digital scholarly editions focusing on unique URLs and distinctive qualities of the given material. This hinders project synergy in the production phase. Moreover, it hinders the construction of long-term and sustainable data management solutions. To remedy this situation, we propose a clear division of labour between the tasks of data production, of data rendering, and of data storing. This division should ideally be sought at an institutional level. This will secure the accumulation of know-how in teams refining the respective workflows. In addition, we encourage private and public foundations to bolster this infrastructure by making project compliance a criterion for funding.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Zayana, Muhammad Rafiq, Iskandar Fitri, Fauziah Fauziah y Aris Gunaryarti. "Penerapan Message Diggest Algorithm MD5 untuk Pengamanan Data Karyawan PT. Swifect Berbasis Desktop". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 6, n.º 3 (3 de enero de 2022): 386–94. http://dx.doi.org/10.35870/jtik.v6i3.446.

Texto completo
Resumen
In the era of Society 5.0, technological progress is unstoppable. Technological advances in the era of society 5.0 have become the main needs of humans in helping daily work. Technology is used as a medium for finding information to transportation tools that are integrated with the intervention of digital technology. Almost every company has technology to support their business development needs. And especially in agencies in this era, employee data is also processed using technology, but with the integration of employee data into technology, a lot of sensitive data must be protected in order to avoid misuse by irresponsible people. Therefore, the main objective of this research is to develop the application of the Message Diggest Algorithm (MD5) Cryptography Algorithm in employee data applications. This application is very appropriate to make it easier for companies to manage their employee data and ensure data security. To secure sensitive data from each employee, the process carried out is by encrypting each sensitive data so that it is not easy to read by others who have no interest or authority over the data. And the desktop-based application was made using Visual Basic. The research was carried out with two methods, namely the method to test the compilation speed of MD5 and to test the validation of the decrypted data from the MD5. And from the results of the study, the average speed of 500-515 milliseconds and data consistency obtained valid results from all tests.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Dickey, Timothy J. "RETHINKING THE SIENA CHOIRBOOK: A NEW DATE AND IMPLICATIONS FOR ITS MUSICAL CONTENTS". Early Music History 24 (14 de julio de 2005): 1–52. http://dx.doi.org/10.1017/s0261127905000124.

Texto completo
Resumen
A 1481 date for the manuscript Siena, Biblioteca Comunale degli Intronati, MS K. 1. 2 (hereafter Si), which contains almost ninety pieces of late fifteenth-century liturgical polyphony including works of Obrecht, Isaac and Mouton, has rested uneasily upon an argument from Sienese copying records. A fresh codicological analysis of this important source, including evidence of matching ‘twin’ watermark pairs in datable Tuscan archival documents, has yielded a new date and a new narrative for its compilation. The main corpus, in fact, is decades later than the fragmentary appendix containing works of Dufay and Josquin. The redating presented here has manifold implications for some of the most important composers of the late fifteenth century, and for peninsular patterns of musical transmission. A secure early date for the appendix copy of Josquin's Missa L'ami baudichon, for instance, enables a reassessment of that piece's transmission to sources as far away as Poland and Bohemia in the light of recent discoveries in Josquin's biography. My new date for Josquin's mass also confirms a case of Josquin emulation within another, anonymous mass in Si. The new dating further enables a reassessment of ModE M.1.13's authority as a source for one of Johannes Martini's masses, and the identification of a heretofore unknown local Sienese composer. Finally, the new narrative for the Siena choirbook may reveal Florence as a link in the transmission of repertory from Milan and Ferrara to Siena.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Purwanti, Pudji. "PERILAKU EKONOMI RUMAH TANGGA NELAYAN SKALA KECIL DALAM MENCAPAI KETAHANAN PANGAN DI PEDESAAN PANTAI JAWA TIMUR". Jurnal Sosial Ekonomi Kelautan dan Perikanan 4, n.º 1 (20 de julio de 2017): 31. http://dx.doi.org/10.15578/jsekp.v4i1.5817.

Texto completo
Resumen
Suatu rumah tangga dapat mencapai kondisi tahan pangan sangat berkaitan erat dengan perilaku ekonomi rumah tangga, dalam hal ini pengambilan keputusan rumah tangga dalam kegiatan produksi dan konsumsi, serta alokasi waktu kerja dan pendapatan rumah tangga. Penelitian ini menggambarkan perilaku rumah tangga nelayan skala kecil dalam mencapai ketahanan pangan di Kabupaten Pasuruan dan Kabupaten Trenggalek. Data primer dan sekunder digunakan dalam penelitian ini. Data primer diperoleh melalui survei lapang; sedangkan data sekunder diperoleh melalui studi dan kompilasi data statistik terkait topik studi. Data dianalisis secara ekonometrik melalui pendekatan ekonomi rumah tangga. Hasil penelitian menunjukkan bahwa dalam mencapai ketahanan pangan, rumahtangga nelayan melakukan kegiatan produksi melaut dan non perikanan sebagai sumber pendapatan dari sektor perikanan dan non perikanan. Kredit non formal lebih digunakan untuk konsumsi pangan. Pada pola konsumsi pangan seimbang, ikan menduduki peringkat kedua setelah konsumsi beras. Berdasarkan parameter Indeks Porsi Pengeluaran Pangan, Indeks AKE dan Indeks AKP, maka rumahtangga nelayan skala kecil di pedesaan pantai Jawa Timur dalam kondisi tahan pangan. Tittle: Economic Behavior and Food Security of Small-Scaled Fisher’s Household in Rural Region of East Coast of Java.A chieving food security for household will depend on the economic behavior of such the household in terms of decision making-process of the household in production and a consumption activities and work time allocation. This research illustrated behavior of small-scale fisher's household in achieving food security in Pasuruan and Trenggalek districs. Primary and secondary data were used in this study. Primary data were collected by using survey method; secondary data were collected through literature study and compilation of statistical data related to the study theme. Data were analyzed econometrically through household economic approach. Results show that in achieving food security, fisher's household do fishing and non fisheries activity. Non formal credit scheme was mostly used for food consumption. In the food consumption ballance, fish was the second level after rice. Based on Food Expending Portion Index parameter, AKE and AKP indexes, small-scale fisher's household in rural region of East Coast of Java were in the secure food condition.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Alabdulatif, Abdullah, Navod Neranjan Thilakarathne y Kassim Kalinaki. "A Novel Cloud Enabled Access Control Model for Preserving the Security and Privacy of Medical Big Data". Electronics 12, n.º 12 (13 de junio de 2023): 2646. http://dx.doi.org/10.3390/electronics12122646.

Texto completo
Resumen
In the context of healthcare, big data refers to a complex compilation of digital medical data collected from many sources that are difficult to manage with normal technology and software due to its size and complexity. These big data are useful in various aspects of healthcare, such as disease diagnosis, early prevention of diseases, and predicting epidemics. Even though medical big data has many advantages and a lot of potential for revolutionizing healthcare, it also has a lot of drawbacks and problems, of which security and privacy are of the utmost concern, owing to the severity of the complications once the medical data is compromised. On the other hand, it is evident that existing security and privacy safeguards in healthcare organizations are insufficient to protect their massive, big data repositories and ubiquitous environment. Thus, motivated by the synthesizing of the current knowledge pertaining to the security and privacy of medical big data, including the countermeasures, in the study, firstly, we provide a comprehensive review of the security and privacy of medical big data, including countermeasures. Secondly, we propose a novel cloud-enabled hybrid access control framework for securing the medical big data in healthcare organizations, and the result of this research indicates that the proposed access control model can withstand most cyber-attacks, and it is also proven that the proposed framework can be utilized as a primary base to build secure and safe medical big data solutions. Thus, we believe this research would be useful for future researchers to comprehend the knowledge on the security and privacy of medical big data and the development of countermeasures.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Bori, Caterina. "Sira Culture, Hadith and the Veneration of Muḥammad in the Later Middle Period: Ibn Nāṣir al-Dīn al-Dimašqī (d. 842/1438) as a Case Study". Arabica 70, n.º 4-5 (14 de noviembre de 2023): 376–435. http://dx.doi.org/10.1163/15700585-20231663.

Texto completo
Resumen
Abstract The article investigates the social and cultural practices of Sira production and consumption in the later Middle Period. It probes into the place held by Sira regarding the veneration of the Prophet, especially in relation to Hadith. Its first part shows that in the Middle Period Sira was intended as a vast literary repository characterized by fluidity of format, diverse social fruition, and plurality of practices in transmission and consumption. It was a literary field characterized by narrative malleability and creativity, for which there was popular demand and scholarly dedication. The life and work of the Šāfiʿī scholar and Hadith expert Ibn Nāṣir al-Dīn al-Dimašqī (d. 842/1438), in particular his Ǧāmiʿ al-āṯār fī l-siyar wa-mawlid al-muḫtār (The Compilation of Traditions on the Life and Birth of the Chosen One) occupies the second part of the article. Here, Ǧāmiʿ al-āṯār is taken as a written exemplification of the tight relationship between Sira, Hadith and devotion to the Prophet typical of the period, of 14th-15th century Damascus in particular. Overall, the article argues that the intended meaning and use of a text as rich as Ǧāmiʿ al-āṯār can be fully grasped only when we put it in close conversation with the Hadith culture and veneration for the Prophet of the time. It suggests the existence of a pervasive “Sira culture” binding people in a relationship of meaning to their shared memories of the life of the Prophet. Such culture was nurtured by remembrance of the Prophet’s excellency and life milestones. It aimed at cultivating salvific feelings of love for the Prophet that would assure believers a secure place in the Afterlife.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Molina-Venegas, Rafael, Miguel Ángel Rodríguez, Manuel Pardo-de-Santayana y David J. Mabberley. "A global database of plant services for humankind". PLOS ONE 16, n.º 6 (15 de junio de 2021): e0253069. http://dx.doi.org/10.1371/journal.pone.0253069.

Texto completo
Resumen
Humanity faces the challenge of conserving the attributes of biodiversity that may be essential to secure human wellbeing. Among all the organisms that are beneficial to humans, plants stand out as the most important providers of natural resources. Therefore, identifying plant uses is critical to preserve the beneficial potential of biodiversity and to promote basic and applied research on the relationship between plants and humans. However, much of this information is often uncritical, contradictory, of dubious value or simply not readily accessible to the great majority of scientists and policy makers. Here, we compiled a genus-level dataset of plant-use records for all accepted vascular plant taxa (13489 genera) using the information gathered in the 4th Edition of Mabberley’s plant-book, the most comprehensive global review of plant classification and their uses published to date. From 1974 to 2017 all the information was systematically gathered, evaluated, and synthesized by David Mabberley, who reviewed over 1000 botanical sources including modern Floras, monographs, periodicals, handbooks, and authoritative websites. Plant uses were arranged across 28 standard categories of use following the Economic Botany Data Collection Standard guidelines, which resulted in a binary classification of 9478 plant-use records pertaining human and animal nutrition, materials, fuels, medicine, poisons, social and environmental uses. Of all the taxa included in the dataset, 33% were assigned to at least one category of use, the most common being “ornamental” (26%), “medicine” (16%), “human food” (13%) and “timber” (8%). In addition to a readily available binary matrix for quantitative analyses, we provide a control text matrix that links the former to the description of the uses in Mabberley’s plant-book. We hope this dataset will serve to establish synergies between scientists and policy makers interested in plant-human interactions and to move towards the complete compilation and classification of the nature’s contributions to people upon which the wellbeing of future generations may depend.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Kelmere, Laila y Ingrīda Jakušonoka. "THE COMPANY'S INSOLVENCY IMPACT ON TAX COLLECTION PROCESS". Science and Studies of Accounting and Finance: Problems and Perspectives 9, n.º 1 (25 de noviembre de 2014): 52–64. http://dx.doi.org/10.15544/ssaf.2014.06.

Texto completo
Resumen
Tax revenues are the key source of finance for the government’s budget. The state administration redistributes and allocates tax revenues for performing the state’s basic functions in order to ensure the overall development of the country and its population’s wellbeing. The availability of credit resources declined owing to the global crisis 2007-2009, which negatively affected the growth of Latvia’s national economy, and the total tax revenue decreased by 26.80% in 2009 compared with 2008. Latvia’s government, to secure the financing of its budget, stabilise Latvia’s financial system, raise the country’s competitiveness, borrowed in foreign financial markets EUR 4.5 billion. The present research examined Latvia’s economic development and tax collection dynamics after Latvia’s restoration of independence and its accession to the European Union and assessed the effects of the global crisis on the solvency of enterprises and tax revenues and how Latvia contributed to the foundation of new enterprises and the improvement of the business environment. Research methods employed: the monographic method was used to examine, assess and analyse literatures and legal acts, describing findings and interpretations; statistical observation, compilation and grouping of information, calculation of statistical data, analysis of causal relationships and data generalisation; logical analysis and synthesis. The graphic method was employed to show the relationships identified and their nature and form. The logical and constructive methods were used in analysing results and making judgements. The present research found that the insolvency of companies significantly affects the tax collection process and reduces total tax revenues. In 2013, a tax debt of EUR 267.59 mln was written off in Latvia because tax payers were liquidated, while in 2014 taxes totalling EUR 1 263.63 will not be potentially collected. The authors presume that research on the effects of company insolvency on tax revenues has to be continued in order to improve tax collection and design tax policy instruments aimed at restoring the solvency of enterprises facing problems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Afrohatul Laili, Afrohatul y Endri Miftahus Sururi. "UPAYA KODIFIKASI HUKUM KEWARISAN SECARA BILATERAL DENGAN POLA DIFERENSIASI DALAM MASYARAKAT PLURALIS". SINDA: Comprehensive Journal of Islamic Social Studies 3, n.º 1 (2 de abril de 2023): 15–24. http://dx.doi.org/10.28926/sinda.v3i1.728.

Texto completo
Resumen
The currently applicable inheritance law in Indonesia is pluralistic in nature since it is formed collectively by adat, Islamic, and western legal systems; not to mention the diverse custom, ethnicity, and belief. Hence, codification of bilateral inheritance law that could address differences in our inheritance and kinship system is needed. Islamic Inheritance Law is a law that regulates heritage treasure of someone who has passed away and given to the beneficiary.Indonesia has set the Compilation of Islamic Law Islamic law of inheritance, such as heirs and inheritance. In the Compilation of Islamic Law, there are several updates to the law of inheritance that do nothave in the past, suchas the division of the estate for the adoptedchild, the adoptive parents, and non Muslim heirs. It makes the writer feel compelled to study deeper the Islamic law of inheritance in IslamicLaw Compilation by using glasses philosophy of law.Indonesian Inheritance Law uses a school of sociology law. The school ofsociology law is in accordance with the conditions of the community because it takes into account the existing customs in the community
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Purkon, Arip. "Problems of Islamic Law Compilation In Indonesia". SALAM: Jurnal Sosial dan Budaya Syar-i 5, n.º 2 (13 de agosto de 2018): 91–98. http://dx.doi.org/10.15408/sjsbs.v5i2.9406.

Texto completo
Resumen
Abstract.Islamic Law Compilation is one of the efforts to implement Islamic law in Indonesia constitutionally. Islamic Law Compilation covers three legal fields, namely marriage, inheritance and benefiction. The Islamic Law Compilation contributes positively in providing legal certainty, especially for judges in religious courts. In addition, there are still a number of problems related to the Islamic Law Compilation, namely the issue of socialization, equality of perception and the fear of reducing Islamic law.Keywords: Islamic Law Compilation, Marriage Law, Inheritance Law, Benefaction Abstrak.Kompilasi Hukum Islam merupakan salah satu upaya untuk mengimplementasikan hukum Islam di Indonesia secara konstitusional. Kompilasi Hukum Islam mencakup tiga bidang hukum, yaitu perkawinan, waris dan wakaf. Kompilasi Hukum Islam memberikan kontribusi yang positif dalam memberikan kepastian hukum, khususnya untuk para hakim di pengadilan agama. Selain itu, masih ada beberapa masalah terkait Kompilasi Hukum Islam, yaitu masalah sosialisasi, persamaan persepsi dan adanya kekhawatiran tereduksinya hukum Islam.Kata Kunci: Kompilasi Hukum Islam, Hukum Perkawinan, Hukum Waris, Wakaf
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Popov, A. A. "Digitalization of Ensuring Metrological Traceability of Measuring Instruments and Reference Materials through Cloud-Based Technologies: Current State and Development Prospects". Measurement Standards. Reference Materials 18, n.º 3 (30 de diciembre de 2022): 57–70. http://dx.doi.org/10.20915/2077-1177-2022-18-3-57-70.

Texto completo
Resumen
The accelerated implementation of digital technologies in the economy and social sphere is one of the national priorities in the Russian Federation. One of the components of this stage of industrial development is the creation of a comprehensive cloud platform for the complete automation of metrological centers and the implementation of the strategy for ensuring the uniformity of measurements ≪Metrology 4.0≫. Considering the numerous advantages of implementing digital systems and services, the integration of digital systems into life is associated with a number of difficulties, such as the lack of a single API protocol in the exchange of databases, the lack of unified standardized directories, etc.The purpose of this study is compilation of information about existing foreign and national cloud-based solutions in the field of ensuring the uniformity of measurements, identification of their shortcomings and finding solutions to emerging problems, taking into account the conditions of modern technologies.The main research methods were an analysis of the current situation in terms of metrological digital services in the Russian Federation, as well as in Germany, India in the USA and other countries. A comparison of approaches to the construction and prospects of the metrological cloud is carried out. The problems of introducing innovative technologies are described. The study using the example of FSIS ≪ARSHIN≫ showed that this digital service used in the Russian Federation does not have comprehensive functionality for organizing the metrological activities of enterprises and has limitations that do not allow moving to a new stage of digitalization. The main disadvantages of FSIS ≪ARSHIN≫ include the following: insufficient expansion of the coverage of measuring instruments, the impossibility of automatic processing of information about measuring instruments, as well as the lack of infrastructure for obtaining direct measuring information through cloudbased technologies.As part of solving the problem, the author proposed a scheme for improving the FSIS ≪ARSHIN≫ system which includes: an algorithm for creating a uniform standard for the formation of systems for processing, storing and analyzing data of measuring instruments and reference materials; the creation of universal digital directories that allow describing measuring instruments for the formation of the scope of accreditation in the configurator of the Federal Accreditation Service; the creation of a unique identification number for the measuring instrument and reference material; the implementation of a secure mechanism for unique identification, verification and transmission of data on a measuring instrument based on blockchain technologies.This scheme can be integrated into the FSIS ≪ARSHIN≫ and undergo trial operation without additional financial costs from the budget of the Russian Federation. This approach of gradually increasing the digital capabilities of the state, as well as ensuring safe work with large amounts of data, makes it possible for further digitalization and the prospect of developing a system for ensuring the uniformity of measurements in the Russian Federation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Dopp, Alex R., Marie-Rachelle Narcisse, Peter Mundey, Jane F. Silovsky, Allison B. Smith, David Mandell, Beverly W. Funderburk et al. "A scoping review of strategies for financing the implementation of evidence-based practices in behavioral health systems: State of the literature and future directions". Implementation Research and Practice 1 (enero de 2020): 263348952093998. http://dx.doi.org/10.1177/2633489520939980.

Texto completo
Resumen
Background: Increased availability of evidence-based practices (EBPs) is essential to alleviating the negative public health and societal effects of behavioral health problems. A major challenge to implementing and sustaining EBPs broadly is the limited and fragmented nature of available funding. Method: We conducted a scoping review that assessed the current state of evidence on EBP financing strategies for behavioral health based on recent literature (i.e., post-Affordable Care Act). We defined financing strategies as techniques that secure and direct financial resources to support EBP implementation. This article introduces a conceptualization of financing strategies and then presents a compilation of identified strategies, following established reporting guidelines for the implementation strategies. We also describe the reported level of use for each financing strategy in the research literature. Results: Of 23 financing strategies, 13 were reported as being used within behavioral health services, 4 had potential for use, 5 had conceptual use only, and 1 was potentially contraindicated. Examples of strategies reported being used include increased fee-for-service reimbursement, grants, cost sharing, and pay-for-success contracts. No strategies had been evaluated in ways that allowed for strong conclusions about their impact on EBP implementation outcomes. Conclusion: The existing literature on EBP financing strategies in behavioral health raises far more questions than answers. Therefore, we propose a research agenda that will help better understand these financing strategies. We also discuss the implications of our findings for behavioral health professionals, system leaders, and policymakers who want to develop robust, sustainable financing for EBP implementation in behavioral health systems. Plain language abstract: Organizations that treat behavioral health problems (mental health and substance use) often seek to adopt and use evidence-based practices (EBPs). A challenge to adopting EBPs broadly is the limited funding available, often from various sources that are poorly coordinated with one another. To help organizations plan effectively to adopt EBPs, we conducted a review of recent evidence (i.e., since the passage of the 2010 Affordable Care Act) on strategies for financing EBP adoption in behavioral health systems. We present definitions of 23 identified strategies and describe each strategy’s reported (in the research literature) level of use to fund EBP adoption in behavioral health services. Of the 23 financing strategies, 13 strategies had evidence of use, 4 had potential for use, 5 had conceptual use only, and 1 was potentially contraindicated. Examples of strategies with evidence of use include increased fee-for-service reimbursement, grants, cost sharing, and pay-for-success contracts. This comprehensive list of EBP financing strategies may help guide decision-making by behavioral health professionals, system leaders, and policymakers. The article also presents a research agenda for building on the current research literature by (1) advancing methods to evaluate financing strategies’ effects, (2) partnering with stakeholders and decision-makers to examine promising financing strategies, (3) focusing on strategies and service systems with the greatest needs, (4) improving methods to guide the selection of financing strategies, and (5) paying greater attention to sustainable long-term financing of EBPs.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Kauffman, Laurie, Erin Ehmke, Steven Schet, Arioene Vreedzaam y Sue Boinski. "Dispersal patterns among three species of squirrel monkeys (Saimiri oerstedii, S. boliviensis and S. sciureus): I. Divergent costs and benefits". Behaviour 142, n.º 5 (2005): 525–632. http://dx.doi.org/10.1163/1568539054352888.

Texto completo
Resumen
AbstractCurrent theory frames animal dispersal as an outcome of potentially complex, multi-factorial interactions and tradeoffs that may vary across individual, sex, rank, age, social group, species, habitat and time. Empirical data relevant to a broad range of the potential costs and benefits incurred by dispersal are, not surprisingly, limited for many mammals and other vertebrates. Here we present the first report on dispersal in a wild population of the Neotropical primate Saimiri sciureus (Primates: Cebidae). Long-term observations (1998-2001) of this squirrel monkey represent part of a broader study of the forest community at Raleighvallen in the Central Suriname Nature Reserve. These new dispersal records for S. sciureus are combined with comparable information from congeners, S. boliviensis in Peru and S. oerstedii in Costa Rica. The resulting three-way compilation includes the ecological, social and mating context for each congener. Further enhancing the inherent phylogenetic control of a within-genus comparison, these data were collected with the explicit intent of joint analyses, and the study sites for these small, arboreal social mammals are three of the least disturbed extant Neotropical forests in the historical record.Saimiri appears to merit description as the genus with the most diverse set of species dispersal patterns yet documented among mammals. (1) S. sciureus of both sexes undertake dispersal on several to many occasions during their lifetime. Females and immatures commonly transfer between troops. The large portion of male S. sciureus spend their adult years as solitary or peripheral males. Few males attain secure residence in a mixed-sex troop, a prerequisite for mating success. (2) On attainment of sexual maturity, male S. boliviensis emigrate with their same-age cohort, first joining all-male bands, and eventually entering mixed-sex troops with this same natal male birth cohort. Natal female S. boliviensis are philopatric and form cohesive matrilines. Within-troop competition determines each matriline's priority of access to fruit resources. (3) In contrast to both S. sciureus and S. boliviensis, S. oerstedii males are philopatric and maintain tight affiliation with same age-cohort males. Natal female S. oerstedii emigrate as juveniles prior to their first mating season, and may undertake secondary dispersals in subsequent years.Squirrel monkeys represent a genus with realistic prospects of discriminating the costs and benefits germane to species-typical dispersal strategies. To this end, we collate 30 different causal parameters commonly invoked as influencing mammalian dispersal patterns. Each of these factors is assessed separately for possible influence on the empirically determined sex and species differences. We predict the possible consequences of direct and inclusive fitness interactions on dispersal outcomes for future testing with genetic data. Components of Saimiri selective regimes particularly salient to female dispersal strategies include food competition, foraging benefits provided by kin and inbreeding avoidance. Dispersal patterns among male Saimiri are constrained by mate competition and the consequent reproductive skew, in addition to enhanced predation risk during dispersal forays. Little evidence, however, suggests that relative to familiar landscapes, exploitation of novel ranging areas substantially increases foraging costs or predation risk for dispersing squirrel monkeys of either sex. We then compare the species-specific dispersal regimes initially identified with the univariate array of proposed costs and benefits to the tradeoffs predicted by a selection of contemporary multivariate dispersal models. The multivariate models did not, however, improve substantially upon the collective insights on cost-benefit regimes achieved with the univariate hypotheses. Conclusions regarding the selective regimes structuring dispersal among squirrel monkeys are best considered provisional until genetic data become available allowing tests of our inferences concerning kin relationships and population structure of the study populations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Nurwakhidah, Ana. "MANAJEMEN INFAQ SECARA SEKTORAL DI BAITUL MAAL HIDAYATULLAH (BMH) CABANG MALANG". Ar-Risalah: Media Keislaman, Pendidikan dan Hukum Islam 17, n.º 1 (12 de abril de 2019): 1. http://dx.doi.org/10.29062/arrisalah.v17i1.214.

Texto completo
Resumen
This study aims to describe the management of sectoral basis at BMH infaq Malang, analyzing constraints in the management of sectoral basis at BMH Infaq Malang, and analyze the steps in Malang BMH anticipating the obstacles facing it. This research was qualitative research with the descriptive approach. In the study described the management of sectoral Basis Infaq Baitul Maal Hidayatullah (BMH) Malang. From the analysis results can be concluded that the implementation of the management of sectoral basis infaq Baitul Maal Hidayatullah (BMH) Malang is by applying the characteristics of Islamic managements, namely: management based on the morals of the sublime, management Open, democratic management, management, and management tolong-menolong based upon peace, and perform management functions, namely, the Act of planning, organizing, and monitoring. Management functions are performed so well that gathering together the funds, and the channelling of funds in sectoral infaq, runs well and right on target, but nevertheless the function of surveillance need to be improved both in terms of its compilation or distribution to the various sectors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Romdhon, Muhammad Rizqi. "Kajian Tafsir Nusantara Terhadap Hukum Perkawinan Beda Agama Menurut Kompilasi Hukum Islam Indonesia". Al-Dzikra: Jurnal Studi Ilmu al-Qur'an dan al-Hadits 16, n.º 2 (31 de diciembre de 2022): 189–218. http://dx.doi.org/10.24042/al-dzikra.v16i2.12777.

Texto completo
Resumen
AbstractInterfaith marriage remains a controversial topic forbidden under the MUI (Indonesian Ulema Council) fatwa. However, Hamka claimed in Tafsir al-Azhar that marriage between Muslim men and women from the people of the Bible is permitted. This claim raises the question of whether the law regarding interreligious marriage in the Compilation of Islamic Law is consistent with the Indonesian insight interpretation. This study aims to determine the relationship between interfaith marriage law in the Compilation of Islamic Law and the Indonesian insight interpretation of verses related to interfaith marriages. The research approach employed is qualitative content analysis employing a literature study to conclude that, first, the position of the Compilation of Islamic Law in the hierarchy of Indonesian laws and regulations is poor from a legal standpoint. Second, the rule prohibiting the marriage of women from the people of the Bible must be reconsidered because the existing reasons and local interpretations all state that it is permissible.Keywords: Indonesian insight interpretation; Interfaith marriage; The Compilation of Islamic Law.AbstrakPernikahan beda agama merupakan hal yang masih tabu, fatwa MUI pun melarangnya. Namun menariknya Hamka dalam Tafsir al-Azharnya menyatakan bahwa pernikahan laki-laki muslim dengan wanita ahlulkitab itu diperbolehkan. Hal ini memunculkan pertanyaan apakah hukum pernikahan beda agama dalam Kompilasi Hukum Islam berkesesuaian dengan penafsiran tafsir nusantara? Tujuan penelitian ini untuk mengetahui bagaimana korelasi hukum pernikahan beda agama dalam Kompilasi Hukum Islam dengan penafsiran tafsir-tafsir Nusantara terhadap ayat-ayat yang berkaitan dengan pernikahan beda agama. Metode penelitian yang digunakan adalah penelitian kualitatif yang bersifat analisis konten dengan menggunakan kajian pustaka menyimpulkan bahwa, Pertama: kedudukan Kompilasi Hukum Islam dalam hierarki peraturan perundang-undangan Indonesia lemah secara hukum. Kedua: hukum menikahi perempuan ahlulkitab perlu dikaji kembali pelarangannya dikarenakan dalil-dalil yang ada beserta tafsir-tafsir Nusantara semua menyatakan boleh.Kata Kunci: Kompilasi Hukum Islam; Pernikahan Beda Agama; Tafsir Nusantara.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Abid, H., Nandang Kusnadi, Yenny Febrianty y Chairijah . "PENERAPAN TEORI KEADILAN PADA KEWARISAN ANAK ZINA". PALAR | PAKUAN LAW REVIEW 8, n.º 1 (12 de enero de 2022): 144–53. http://dx.doi.org/10.33751/palar.v8i1.4685.

Texto completo
Resumen
Abstrak Dalam konteks anak luar kawin yang terlahir dari hasil perzinaan, menurut hukum islam antara anak dan ayah biologisnya tidak ada nasab yang sah, maka tidak ada hak mewaris antara mereka berdua. Kompilasi Hukum Islam pun tidak memberikan kedudukan yang jelas terhadap keberadaan anak zina mengenai kewarisan anak zina. Penelitian ini bertujuan untuk mengetahui Penerapan Teori Keadilan terhadap kedudukan Anak Zina dalam Hukum Islam dan Kompilasi Hukum Islam tentang kewarisannya. Metode yang digunakan dalam penelitian ini adalah yuridis normatif empiris. Pengolahan data dilakukan secara deskriptif analitis. pengumpulan data yang dilakukan dalam penelitian ini menggunakan studi kepustakaan. Hasil penelitian menunjukan penerapan Kompilasi Hukum Islam tidak memberi solusi terhadap kewarisan anak zina. Anak zina yang jelas-jelas mempunyai hubungan darah secara biologis dengan ayahnya, haruslah juga diberikan wasiat wajibah dari ayah biologisnya sebagai perwujudan rasa keadilan sekalipun hal ini tidak diatur dalam perundang-undangan tetapi hakim mempunyai kewenangan membuat hukum (judge made law). Kata kunci :Teori Keadilan, Kewarisan, Anak Zina Abstract In the context of an adulterous child born from adultery, according to Islamic law between the child and his biological father, there is no legitimate nasab, then there is no right to bequeath between the two of them. Compilation of Islamic Law also does not give a clear position to the existence of adultery children regarding the inheriting of adulterous children. This research aims to find out the Application of The Theory of Justice to the seat of the Children of Zina in Islamic Law and the Compilation of Islamic Law on its inherited. The method used in this study is empirical normative juridical. Data processing is done in an analytical descriptive manner. The data collected in this study uses literature studies. The results showed that the application of the Compilation of Islamic Law did not provide a solution to the inheritance of adultery children. Adulterous children who have a biological blood relationship with their father must also be given a will of obligation from their biological father as an embodiment of a sense of justice even though this is not regulated in the law but the judge has the authority to make law (judge-made law). Keywords: Theory of Justice, Inherition, Adultery Child.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Darlis, Syamsul. "MARRIAGE FOR COVERING DISGRACE: The Practice of Kawi' Pura Tradition in the East Kolaka Muslim Society". Al-Ahwal: Jurnal Hukum Keluarga Islam 15, n.º 1 (30 de junio de 2022): 21. http://dx.doi.org/10.14421/ahwal.2022.15102.

Texto completo
Resumen
According to the Indonesian Compilation of Islamic Law (KHI), unmarried pregnant women may only be married to the men who impregnated them. However, this rule is frequently disregarded by the Kolaka Muslim society. They typically opt for kawi' pura tradition to tackle the case, which is to marry the pregnant woman to another man. This marriage is followed by a contract stipulating an immediate divorce. Its purpose is to conceal shame or disgrace. This article seeks to investigate the rationale behind the practice of kawi' pura. Data were collected through observation and interviews and then analyzed qualitatively. This article finds that the implementation of the tradition is driven by four factors: the pressure to cover up family disgrace, adherence to ancestral traditions, lack of awareness of marriage law, and low levels of public education. Normatively, this practice is not justified by Islamic law. In state law, this practice is not clearly regulated or prohibited; however, it contradicts the principle of the Marriage Law either according to the Compilation or Islamic marriage law in general.[Menurut Kompilasi Hukum Islam Indonesia (KHI), wanita hamil yang belum menikah hanya boleh dinikahkan dengan pria yang menghamilinya. Namun, aturan ini sering diabaikan oleh sebagian orang Kolaka. Mereka biasanya memilih tradisi kawi' pura untuk menangani kasus ini, yaitu mengawinkan wanita hamil dengan pria lain. Perkawinan ini diikuti dengan perjanjian perkawinan yang menetapkan perceraian langsung, karena tujuan utamanya adalah untuk menutupi aib. Artikel ini berusaha menyelidiki alasan di balik praktik kawi' pura. Data dikumpulkan melalui observasi dan wawancara, kemudian diinterpretasikan secara kualitatif. Setelah melakukan penelitian lapangan, artikel ini menemukan bahwa pelaksanaan tradisi ini didorong oleh empat faktor: tekanan untuk menutupi aib, kepatuhan terhadap tradisi leluhur, kurangnya kesadaran tentang hukum perkawinan nasional, dan rendahnya tingkat pendidikan masyarakat. Secara normatif, praktik ini tidak dibenarkan oleh hukum Islam. Dalam hukum negara, praktik ini juga tidak diatur atau dilarang secara tegas, tetapi praktik ini kontras dengan asas perkawinan baik menurut Kompilasi Hukum Islam maupun Hukum Perkawinan Islam secara umum.]
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Ristian, Ika. "PASAL-PASAL NUSYUZ ISTRI DALAM KOMPILASI HUKUM ISLAM DAN KEKERASAN DALAM RUMAH TANGGA". Jurnal Al-Hakim: Jurnal Ilmiah Mahasiswa, Studi Syariah, Hukum dan Filantropi 2, n.º 2 (28 de septiembre de 2020): 55–62. http://dx.doi.org/10.22515/alhakim.v2i2.2787.

Texto completo
Resumen
ABSTRACTMarriage is one thing that has broad consequences in the legal relationship between husband and wife. With marriage there arises a right and obligation. A wife who does not carry out her obligations in fiqh munakahat is called nushuz. In the Compilation of Islamic Law it is explicitly stated that the act of cheating is only done by a wife, and in this case the husband has the right to treat his wife who are cheating in the Compilation of Islamic Law explained that this cheating act of the wife can abort the income he gets from her husband. The rights of the husband are considered to be able to cause domestic violence experienced by the wife. Things like this become a problem in married life. Based on the background and subject matter above, the researchers' objectives are To find out the problematics of the concept of wife nusyuz and husband's rights in the Compilation of Islamic Law (KHI) and the treatment of husbands who have the potential to become acts of Domestic Violence (Domestic Violence) and To describe the relevance of the concept of wife nushuz according to the Compilation of Islamic Law (KHI) with Law No. 23 of 2004 concerning the Elimination of Domestic Violence. This research is a literature research that sourced on the primary legal material, compilation of Islamic Law (Kompilasi Hukum Islam/ KHI) and Law No. 23 of 2004 about the removal of household violence, as well as secondary law material in the form of books, documents , etc. Then this research was then analyzed using content analytical techniques. This study uses a type of grounded theory design. Then this study was analyzed using content analysis techniques and carried out a moving analysis from descriptive to theoretical level that is connecting concepts based on data with concepts in the literature. Based on the results of the study, it can be concluded that in understanding the concept of nusyuz itri often wrong, it is not always the wife who refuses intimacy and the wife who leaves the household with permission from the husband is the wife of nushuz. Compilation of Islamic Law has no binding law, the position of Compilation of Islamic Law under Law No. 23 of 2004 concerning the Elimination of Domestic Violence. For the relevance of the Compilation of Islamic Law and Law No. 23 of 2004 concerning the Elimination of Domestic Violence, it is forbidden to commit violence.Keyword: Husband’s rights; Islamic law Compilation; Law of the domestic voilence; Wife’s nusyuz. ABSTRAKPerkawinan merupakan salah satu hal yang mempunyai akibat luas dalam hubungan hukum antara suami istri. Dengan adanya perkawinan maka timbullah suatu hak dan kewajiban. Seorang istri yang tidak melaksankan kewajibanya dalam fiqh munakahat disebut dengan perilaku nusyuz. Dalam Kompilasi Hukum Islam disebutkan secara tegas bahwa tindakan nusyuz hanya dilakukan oleh seorang istri, dan dalam hal ini suami mempunyai hak untuk memperlakukan istrinya yang nusyuz dalam Kompilasi Hukum Islam dijelaskan bahwa tindakan nusyuz istri ini dapat menggugurkan nafkah yang ia peroleh dari suaminya. Hak suami disinilah dianggap dapat menimbulkan terjadinya kekerasan dalam rumah tangga yang dialami oleh istri. Hal seperti ini menjadi permasalahan dalam kehidupan berumah tangga. Berdasarkan latar belakang dan pokok masalah di atas maka yang menjadi tujuan peneliti adalah Untuk mengetahui problematika konsep nusyuz istri dan hak suami dalam Kompilasi Hukum Islam (KHI) dan perlakuan suami yang berpotensi menjadi tindak Kekerasan dalam Rumah Tangga (KDRT) dan mendeskripsikan relevansi konsep nusyuz istri menurut Kompilasi Hukum Islam (KHI) dengan Undang-Undang No. 23 Tahun 2004 tentang Penghapusan Kekerasan Dalam Rumah Tangga. Penelitian ini merupakan penelitian kepustakaan yang bersumber pada sumber data hukum primer yakni Kompilasi Hukum Islam (KHI) dan Undang-Undang No. 23 Tahun 2004 tentang Penghapusan Kekerasan Dalam Rumah Tangga, serta sumber data sekunder yang berupa buku-buku, dokumen-dokumen. Penelitian ini menggunakan jenis desain grounded theory. Kemudian penelitian ini di analisis menggunakan teknik content analisis dan melakukan moving analysis from descriptive to theoretical level yaitu menghubungkan konsep berdasarkan data dengan konsep-konsep yang ada dalam literatur. Berdasarkan hasil penelitian, dapat disimpulkan bahwa dalam pemahaman konsep nusyuz istri sering kali salah, tidak selamanya istri yang melakukan penolakan berhubungan intim dan istri yang meninggalkan rumah tangga seiizin suami adalah istri nusyuz. Kompilasi Hukum Islam tidak mempunyai hukum yang mengikat, Kedudukan Kompilasi Hukum Islam di bawah Undang-undang No. 23 Tahun 2004 tentang Penghapusan Kekerasan dalam Rumah Tangga. Untuk relevansi antara Kompilasi Hukum Islam dan Undang-Undang No. 23 Tahun 2004 tentang Penghapusan Kekerasan Dalam Rumah Tangga sama-sama melarang adanya tindak Kekerasan.Kata kunci: Hak Suami; Kompilasi Hukum Islam; Nusyuz Istri; Undang-Undang Kekerasan Dalam Rumah Tangga.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Hafidzi, Anwar. "Prasyarat Poligami Dalam Kitab Fiqih Islam Dan Kompilasi Hukum Islam Perspektif Maslahah Mursalah". Al-Daulah: Jurnal Hukum dan Perundangan Islam 7, n.º 2 (10 de enero de 2018): 366–92. http://dx.doi.org/10.15642/ad.2017.7.2.366-392.

Texto completo
Resumen
Abstract: This paper discusses about the problematic of the polygamy rules between text and context of the suitability of polygamy requirements stipulated in the Compilation of Islamic Law and some positive Indonesian law with the requirements and permissibility of polygamy in the book of Islamic Jurisprudence of Wahbah Zuhaili. According to Wahbah Zuhaili, the polygamy requirements are only two namely justice for their wives or children and a husband must be able to provide for the maintenance. Meanwhile, according to the Compilation of Islamic Law, several clauses explain the requirements that must be fulfilled by the husband when he wants to do polygamy. They are to maintain the welfare of the soul, wealth (livelihood), and environment. Zuhaili’s mashlahah approach is more directed to the practice of polygamy that must really achieve the goodness of the Islamic law clearly and confidently, not just lust. While the mashlahah approach in the Compilation of Islamic Law leads more to the adjustment of the ability of the soul, the provision of decent living, there is no tendency among the bride’s family, and not creating mudharat in the household and social life. The issue of the requirements as mentioned in the Islamic jurisprudence and the Compilation of Islamic Law has similarity as to avoid as much harm as possible. Abstrak: Tulisan ini membahas problematika aturan poligami antara teks dan konteks yaitu kesesuaian persyaratan poligami yang diatur dalam Kompilasi Hukum Islam serta beberapa hukum positif Indonesia dengan persyaratan dan dibolehkannya poligami dalam kitab Fiqih Islam karangan Wahbah Zuhaili. Menurut Wahbah Zuhaili, persyaratan poligami hanya ada dua yaitu keadilan bagi para istri atau anak-anak mereka, dan seorang suami harus mampu memberi nafkah untuk memelihara kemaslahatannya. Sedangkan menurut Kompilasi Hukum Islam ada beberapa pasal yang menjelaskan persyaratan yang harus dilakukan oleh suami ketika ingin berpoligami, yaitu demi menjaga kemaslahatan jiwa, harta (nafkah), dan lingkungan. Pendekatan mashlahah Zuhaili lebih mengarah pada praktik poligami yang harus benar-benar mencapai kebaikan dari syariat Islam secara jelas dan yakin, bukan sekedar nafsu belaka. Sementara pendekatan mashlahah dalam KHI lebih mengarah pada penyesuaian kemampuan jiwa, pemberian nafkah yang layak, tidak ada tendensi antar keluarga mempelai, dan tidak menjadikan mudharat dalam rumah tangga dan lingkungan sosial masyarakat sekitarnya. Prasyarat poligami dari perspektif mashlahah antara kitab Fiqih Islam dan KHI memiliki kesamaan dalam masalah pemenuhan syarat berpoligami dan menghindari kemudharatan semaksimal mungkin.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Endry, Endry, Muhammad Torik y Bitoh Purnomo. "Pemanfaatan Sawah Warisan Secara Bergilir Menurut Hukum Islam dan Hukum Adat". Muqaranah 7, n.º 2 (26 de diciembre de 2023): 139–48. http://dx.doi.org/10.19109/muqaranah.v7i2.19581.

Texto completo
Resumen
The use of inherited rice fields in rotation is in accordance with customary inheritance law and article 189 KHI, namely using collective principles. This is not in accordance with the individual principle in Islamic inheritance law. One reason is that in the collective system there is a delay in the distribution of inherited assets. This has the potential to cause conflict. The formulation of the problem in this research is how to implement the use of heritage rice fields in rotation among the Mayapati Village community. The aim of the research is to examine through Islamic law and customary law the rotational use of inherited rice fields in the Mayapati Village community. The type of research is field research with data collection through interviews, observation and documentation. This research is also normative legal research with a qualitative approach, namely data obtained through library materials such as books, documents or statutory regulations related to the problems that occur. Descriptive in nature, that is, the problem is formulated according to the facts that occurred. According to customary law, inherited rice fields are used in rotation according to a collective system. According to the view of Islamic law, inheritance should be divided based on the parts regulated in the text. Referring to the Compilation of Islamic Law, the rotational use of inherited rice fields which is in accordance with Islamic Law is only inherited collectively, in accordance with property rights in Islamic law, namely ownership for the benefit only or haqqul intifa', while the rotational use of rice fields is not in accordance with work regulations. with muzara'ah.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Husien, Syarief y Akhmad Khisni. "Hukum Waris Islam Di Indonesia (Studi Perkembangan Hukum Kewarisan Dalam Kompilasi Hukum Islam Dan Praktek Di Pengadilan Agama )". Jurnal Akta 5, n.º 1 (5 de marzo de 2017): 75. http://dx.doi.org/10.30659/akta.v5i1.2533.

Texto completo
Resumen
ABSTRAKPenelitian dengan judul ”Hukum Waris Islam Di Indonesia (Studi Perkembangan Hukum Kewarisan Dalam Kompilasi Hukum Islam Dan Praktek Di Pengadilan Agama )”Penelitian ini menggunakan pendekatan yuridis normative, dalam pengumpulan data lebih ditekankan pada sumber bahan primer, berupa peraturan perundang-undangan, menelaah kaidah-kaidah hukum maupun teori ilmu hukum yang terkait dengan masalah yang di teliti.Berdasarkan metode tersebut penelitian menghasilkan pada pokoknya : (1) Formulasi hukum kewarisan islam dalam fiqih dan Kompilasi Hukum Islam (a) Formulasi hukum kewarisan Islam dalam fiqih pada al quran dan al hadist yaitu : Al quran, QS. An-nisa (4): 7, QS. An-nisa (4): 11, QS. An-nisa (4): 12, QS. An-nisa (4): 33, QS. An-nisa (4): 176, QS. Al-anfal (8): 75, dan Hadist Rasulullah SAW (b) Formulasi hukum kewarisan Islam dalam Kompilasi Hukum Islam di atur dalam Pasal 171 sampai dengan Pasal 193.(2) Perkembangan hukum kewarisan Islam dalam Kompilasi Hukum Islam di banding dengan kewarisan dalam fiqih yaitu banyak memasukkan unsur-unsur hukum adat dan kepentingan-kepentingan yang dibutuhkan masyarakat Indonesia masa sekarang, maka banyak bentuk-bentuk hukum kewarisan yang belum tertuang dalam fiqh konvensional (fiqh al-mawarits), namun hal itu telah termuat dan terkodifikasikan dalam hukum kewarisan Kompilasi Hukum Islam, antara lain: pasal 171 tentang harta bersama, pasal 177 tentang pembagian ayah secara `ashabah, pasal 209 yang menyatakan bahwa ayah angkat dan anak angkat menerima warisan, dan bila mereka tidak menerima wasiat, maka berhak menerima wasiat wajibah dan Kopilasi Hukum Islam pun mengakui harta gono-gini padahal fiqh tidak mengakui; (3) Perkembangan hukum kewarisan Islam dalam praktek putusan pengadilan agama di Indonesia hal ini tidak lepas dari Kompilasi Hukum Islam merupakan intruksi Presiden No. 1 Tahun 1991 tanggla 10 Juni 1991, sehingga perkawinan, kewarisan, dan wakaf bagi pemeluk-pemeluk Islam telah ditetapkan sehingga dapat dijadikan pengadilan agama sebagai “pedoman” dalam artian sebagai sesuatu petunjuk bagi para hakim Peradilan Agaman dalam memutus dan menyelesaikan perkara, maka kedudukannya adalah tergantung sepenuhnya dari para Hakim dimaksud untuk menuangkannya dalam keputusan-keputusan mereka masing-masing sehingga kompilasi ini akan terwujud dan mempunyai makna serta landasan yang kokoh dalam yurisprudensi Peradilan Agama. Dengan cara demikian, maka Peradilan Agama tidak hanya berkewajiban menerapkan ketentuan-ketentuan yang sudah digariskan dalam kompilasi, akan tetapi justru mempunya peranan yang lebih besar lagi untuk memperkembangkan dan sekaligus melengkapinya melalui yurisprudensi yang dibuatnya..Kata kunci : Hukum waris Islam, hukum Kewarisan, Kompilasi Hukum Islam ABSTRACTThe research entitled "The Law of Inheritance of Islam in Indonesia (Study of Legal Development of Inheritance in Compilation of Islamic Law and Practice in Religious Courts)" This research uses normative juridical approach, in collecting data more emphasized on primary source material, in the form of legislation, - the rule of law and the theory of jurisprudence associated with the problem in the perusal.Based on these methods, the research produces basically: (1) Formulation of Islamic inheritance law in fiqh and Compilation of Islamic Law (a) Formulation of Islamic inheritance law in fiqih on al quran and al-hadist namely: Al Quran, QS. An-nisa (4): 7, QS. An-nisa (4): 11, QS. An-nisa (4): 12, QS. An-nisa (4): 33, QS. An-nisa (4): 176, QS. Al-anfal (8): 75, and Hadith Rasulullah SAW (b) The formulation of Islamic inheritance law in the Compilation of Islamic Law is set in Articles 171 to 193. (2) The development of Islamic inheritance law in the Compilation of Islamic Law in appeal to inheritance in fiqih which includes many elements of customary law and the interests that are needed by Indonesian society today, so many forms of inheritance law that has not been contained in the conventional fiqh (fiqh al-mawarits), but it has been contained and codified in the law of inheritance The Compilation of Islamic Law, among others: article 171 on common property, article 177 on the division of fathers asabah, article 209 which states that foster and adopted sons receive inheritance, and if they do not receive a will, it is entitled to a mandatory and compulsory law Islam also recognizes the property gono-gini fiqh although do not recognize; (3) The development of Islamic inheritance law in the practice of religious court ruling in Indonesia is not separated from the Compilation of Islamic Law is the Presidential Instruction. 1 In 1991 on 10 June 1991, so that marriage, inheritance and endowments for the followers of Islam have been established so that it can be used as religious courts as a "guide" in the sense that a guide for the judges of the Religious Court in deciding and settling the case, depends entirely from the Judges intended to put it in their respective decisions so that this compilation will materialize and have a firm meaning and foundation in the jurisprudence of the Religious Courts. In this way, the Religious Judiciary is not only obliged to apply the provisions outlined in the compilation, but it has a greater role to develop and at the same time complete it through the jurisprudence it makes.Keywords: Islamic inheritance law, law of Inheritance, Compilation of Islamic Law
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Purnama, Arif Sadikin, Matfa Kresna Maarifarsyah, Putri Rahayu Nengsih, Dewi Desiana, Yusuf Guntur Hari Putra y Gita Anggraini. "Pendidikan Karakter Melalui Seni Teater Berbasis Kearifan Lokal Secara Daring untuk Anak-Anak Kampung Kumuh Pasar Keramat". ABDIMAS: Jurnal Pengabdian Masyarakat 3, n.º 2 (30 de octubre de 2020): 351–59. http://dx.doi.org/10.35568/abdimas.v3i2.971.

Texto completo
Resumen
Keramat is the name of one of the markets in Sampit City which is mostly inhabited by the middle to lower economic population. Located in a congested area and market dumping waste directly into the river that flows under people's houses along with garbage that seems scattered in the river flow makes the settlement look very shabby. The children's daily activities here have to mingle with market waste and unhealthy rivers for bathing and playing. Often littering, fighting, and not caring about the environment are the daily sights of the children here. This community service is an activity of the Program Kreativitas Mahasiswa (PKM) in 2020. The focus of this activity is to instil character education for children of sacred villages by using theatre arts. Theatre is also intended to accommodate the children of the Keramat Market in developing their potential. Due to the existence of Covid-19, activities that were originally planned to be offline have turned online. The media used in carrying out activities are the WhatsApp Group, Instagram, and Youtube. Through this activity, implementation manuals have been produced, a compilation of instructional videos, cinematic audios of folk tales, and scientific articles. The children of the sacred market were enthusiastic about participating in the activity and gave positive feedback.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Saniah, Saniah y Syahib Natarsyah. "MODEL APLIKASI PEMBAGIAN HARTA WARISAN BERDASARKAN KOMPILASI HUKUM ISLAM BERBASIS WEB". Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi 9, n.º 3 (27 de enero de 2021): 181. http://dx.doi.org/10.35889/jutisi.v9i3.557.

Texto completo
Resumen
<p>Abstrak. Hukum kewarisan dalam Islam mendapat perhatian yang besar karena pembagian warisan sering menimbulkan akibat-akibat yang tidak menguntungkan bagi keluarga yang ditinggal mati. Warisan adalah soal apa dan bagaimana berbagai hak-hak dan kewajiban-kewajiban tentang kekayaan seseorang pada waktu ia meniggal akan beralih kepada keluarga yang masih hidup. Berdasarkan penelusuran yang dilakukan hukum online, kewarisan menempati posisi nomor dua buku tahunan Yurisprudensi Mahkamah Agung (MA) hampir setiap edisi terbitan dari tahun pertahun mengutip putusan perkara waris. Sebagian umat Islam masih berpedoman kepada kitab fikih yang berasal dari madzhab yang berbeda-beda, maka dampaknya adalah tidak menutup kemungkinan timbul suatu putusan yang berbeda-beda, walaupun perkara-perkara yang diajukan kepadanya sama. Untuk mengatasi hal ini pemerintah telah mengeluarkan Instruksi Presiden No 1 Tahun 1991 dengan kesepakatan ulama di Indonesia yang ditujukan kepada Menteri Agama agar pembagian harta warisan untuk umat Islam menggunakan Kompilasi Hukum Islam. Tujuan dari penelitian ini adalah membangun aplikasi (sofware) berbasis web tentang pembagian harta warisan berdasarkan kompilasi hukum Islam agar masyarakat mengetahui secara luas tentang pembagian Harta Warisan berdasarkan Kompilasi Hukum Islam (HKI), sesuai dengan Instruksi Presiden Nomor 1 Tahun 1991. Hasil penelitian menjelaskan bahwa Model Aplikasi Pembagian Harta Warisan Berdasarkan Kompilasi Hukum Islam mendapat respon sangat setuju dengan nilai skor rerata 23,2 poin, dengan validitas dan reliabilitas yang tinggi dimana nilai Alpha Cronbach adalah 0,889 dengan katagori sangat reliabel. Dengan demikian maka aplikasi yang dibangun ini dapat membantu dan memudahkan masyarakat mengetahui dan menghitung sendiri pembagian warisan dan dapat memberikan perbandingan antara hasil pembagian warisan berdasarkan hukum fikih dan menurut Kompilasi Hukum Islam (KHI) Kata Kunci: Program Aplikasi, Harta Warisan, Kompilasi Hukum Islam, Berbasis Web <br /> <br />Abstract. Inheritance law in Islam has received great attention because the distribution of inheritance often results in unfavorable consequences for the families who are left behind. Inheritance is a matter of what and how various rights and obligations regarding a person's wealth at the time of death will be transferred to the living family. Based on searches conducted by online law, inheritance occupies the second position in the annual book of the Supreme Court Jurisprudence, almost every published edition of the year cites inheritance case decisions. Some Muslims still adhere to fiqh books that come from different schools of thought, so the impact is that it is possible for different decisions to arise, even though the cases submitted to them are the same. To overcome this, the government has issued Presidential Instruction No. 1 of 1991 with an agreement by ulama in Indonesia aimed at the Minister of Religion so that the distribution of inheritance for Muslims uses the Islamic Law Compilation. The purpose of this research is to build a web-based application (software) about the distribution of inheritance based on compilation of Islamic law so that the public will have a broad understanding of the distribution of inheritance based on the Islamic Law Compilation (HKI), in accordance with Presidential Instruction Number 1 of 1991. The results of the study explained that the Inheritance Distribution Application Model based on the Compilation of Islamic Law received a very agreeable response with a mean score of 23.2 points, with high validity and reliability where the Cronbach Alpha value was 0.889 with very reliable categories. Thus, the application built can help and make it easier for the community to know and calculate the distribution of inheritance by themselves and can provide a comparison between the results of the distribution of inheritance based on fiqh law and according to the Islamic Law Compilation (KHI). Keywords: Application Program, Inheritance, Islamic Law Compilation, Web Base</p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Musa, Musa. "Ahli Waris Pengganti Dalam Tinjauan Kompilasi Hukum Islam Dan Hukum Perdata". Isti`dal : Jurnal Studi Hukum Islam 7, n.º 1 (2 de noviembre de 2021): 53–78. http://dx.doi.org/10.34001/istidal.v7i1.2154.

Texto completo
Resumen
This study is intended to find out more about the provisions in the Compilation of Islamic Law and Civil Law, regarding the status of a replacement heir. Because there is a slight difference, if in BW this replacement has no limits, then in the KHI it is explained that this replacement is only up to the grandchildren, therefore there is a contradiction between the provisions of the replacement heirs in the Compilation of Islamic Law and Civil Law (BW). This study was conducted qualitatively using a juridical-normative approach. The normative approach is carried out by examining library materials which include research on legal principles, legal systematics, comparative law and legal history. The data obtained with the documentation technique is then analyzed inductively, where after the data is collected, the next step is to analyze the data which is a way to systematically find and organize notes on the results of interviews, observations and others. The results of this study can be explained that the inheritance law according to the Islamic Law Compilation states that grandchildren have the right to replace the position of their parents who died earlier than the heirs, although the share of the grandchildren is not always as big as their parents. The share of the grandchildren must not exceed the share of other heirs which are equal to those they replace. There are provisions in the inheritance law according to civil law that not only grandchildren have the right to replace the position of their parents who pass away but also nephews and siblings can be replaced by their children.Kajian ini dimaksudkan untuk mengetahui lebih dalam ketentuan dalam Kompilasi Hukum Islam dan Hukum Perdata, tentang status ahli waris pengganti. Karena ada sedikit perbedaan, jika dalam BW penggantian ini tidak ada batasannya, maka dalam KHI dijelaskan bahwa penggantian ini hanya sampai pada cucu saja, oleh karena itu terjadi kontradiksi antara ketentuan ahli waris pengganti yang ada dalam Kompilasi Hukum Islam dengan Hukum Perdata (BW). Kajian ini dilakukan secara kualitatif dengan menggunakan pendekatan yuridis-normatif. Pendekatan normatif dilakukan dengan cara meneliti bahan pustaka yang mencakup penelitian terhadap asas-asas hukum, sistematika hukum, perbandingan hukum serta sejarah hukum. Data yang diperoleh dengan teknik dokumentasi tersebut kemudian dilakukan analisis secara induktif, dimana setelah data terkumpul maka langkah berikutnya adalah menganalisis data yang merupakan cara untuk mencari dan menata secara sistematis catatan hasil wawancara, observasi dan lainnya. Hasil dari kajian ini dapat dijelaskan bahwahukum kewarisan menurut Kompilasi Hukum Islam dinyatakan bahwa cucu berhak menggantikan kedudukan orang tuanya tersebut yang meninggal lebih dahulu dari pewaris, meskipun bagian cucu tersebut tidak selalu sebesar orang tuanya. Bagian cucu tersebut tidak boleh melebihi bagian ahli waris lain yang sederajat dengan yang digantikannya. Adapun ketentuan dalam hukum kewarisan menurut hukum perdata bahwa tidak hanya cucu yang berhak menggantikan kedudukan orang tuanya tersebut yang meninggal dunia melainkan juga keponakan dan juga saudara kandung bisa digantikan oleh anak-anaknya
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Rusmono y Wisnu Djatmiko. "Penyusunan Bahan Pembelajaran Kompilasi Bagi Pengajar di SMK Negeri 1 Cibinong, Bogor Jawa Barat". Sarwahita 19, n.º 01 (5 de enero de 2022): 12–20. http://dx.doi.org/10.21009/sarwahita.191.2.

Texto completo
Resumen
Abstract In general, the form of learning at SMK Negeri I Cibinong Bogor is classroom learning using learning strategies and learning materials that refer to learning objectives. The competence of teachers in developing learning materials is considered to be still low, so it is necessary to make a training on Compilation of Compilation Learning Materials for teachers at SMK Negeri 1 Cibinong Bogor. The training was carried out using the method of applying science and technology directly to 55 teachers of public and private vocational schools in Cibinong Bogor using the Zoom application. The training was carried out in two sessions, namely: (1) discussing learning materials as a system, instructional analysis, setting specific instructional objectives, developing learning-outcome test instruments, developing learning strategies; and session (2) discusses theoretical concepts in developing compiled learning materials, preparing syllabus for one semester of subjects, the concept of making pieces of learning materials based on ICT for one semester, compiling pieces of learning materials based on ICT for subjects taught and making slides with MsPowerpoint, and then participants were asked to deliver Compiled Learning Materials complete with slides using MsPowerpoint. The results of the training showed that, in general, the teachers who participated in the training were still not maximal in mastering the following materials: (1) Instructional Analysis; (2) Develop Specific Instructional Objectives (ICT); (3) Developing Learning Outcomes Test Instruments; (4) and Developing Learning Strategies, so that the training objectives for the preparation of Compilation Learning Materials for 55 MPGP Electronics Engineering teachers conducted at SMK Negeri 1 Cibinong Bogor have not been maximally achieved. Abstrak Secara umum, bentuk-pembelajaran di SMK Negeri I Cibinong Bogor adalah pembelajaran di kelas menggunakan strategi-pembelajaran dan bahan-pembelajaran yang mengacu dengan tujuan pembelajaran. Kompetensi-guru dalam mengembangkan bahan pembelajaran dianggap masih rendah, sehingga perlu dibuat suatu pelatihan Penyusunan Bahan Pembelajaran Kompilasi untuk guru-guru di SMK Negeri 1 Cibinong Bogor. Pelatihan dilakukan menggunakan metode penerapan IPTEKS secara langsung ke 55 orang guru SMK Negeri dan Swasta di Cibinong Bogor menggunakan aplikasi Zoom. Pelatihan dilaksanakan dalam dua-sesi, yaitu: (1) membahas materi pembelajaran sebagai sistem, analisis instruksional, menyusun tujuan instruksional khusus, mengembangkan instrumen tes hasil-belajar, mengembangkan strategi pembelajaran; dan sesi (2) membahas konsep teori dalam pengembangkan bahan pembelajaran kompilasi, menyiapkan silabus mata-pelajaran satu semester, konsep membuat penggalan-penggalan bahan pembelajaran berdasarkan TIK untuk satu semester, menyusun penggalan bahan pembelajaran berdasarkan TIK mata pelajaran yang diampu dan membuat slide dengan MsPowerpoint, dan kemudian peserta diminta menyampaikan Bahan Pembelajaran Kompilasi lengkap dengan slide menggunakan MsPowerpoint. Hasil pelatihan menunjukkan bahwa, secara umum, Guru-guru yang mengikuti pelatihan masih belum maksimal menguasai materi: (1) Analisis Instruksional; (2) Mengembangkan Tujuan Instruksional Khusus (TIK); (3) Mengembangkan Instrumen Tes Hasil Belajar; (4) dan Mengembangkan Strategi Pembelajaran, sehingga tujuan pelatihan penyusunan Bahan pembelajaran Kompilasi terhadap 55 orang guru MPGP Teknik Elektronika yang dilakukan di SMK Negeri 1 cibinong Bogor belum dapat tercapai maksimal.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Mu’in, Fathul, Faisal Faisal, Arif Fikri, Habib Shulton Asnawi y M. Anwar Nawawi. "THE PRACTICE OF SUBSTITUTE HAIRS IN INDONESIAN RELIGIOUS COURT: Restricted Interpretation". Al-Ahwal: Jurnal Hukum Keluarga Islam 16, n.º 1 (30 de junio de 2023): 141. http://dx.doi.org/10.14421/ahwal.2023.16107.

Texto completo
Resumen
As part of reformation outcomes, the substitute heir in Islamic inheritance law has been long heeded by Indonesian jurists. However, amidst the facet of the traditional scheme, Indonesian Religious Court judges (judex factie) have not shared the same implementation of this succession. This article endeavors to examine the practice of substitute heir in the field. Relies on the Religious Court decisions as the primary source, this article argues that the norm of substitute heir (Article 185 of The Compilation of Islamic Law) has been implemented restrictedly according to The Compilation and the Supreme Court consensus. Restricted interpretation means the descendants of the pre-deceased side-relative was not accounted as substitute heir. It implies that the state reformation attempt in Islamic inheritance law has not come into play in the way the state desires.[Sebagai bagian dari hasil reformasi, substitute heir dalam hukum waris Islam telah lama diperhatikan oleh para ahli hukum Indonesia. Namun, di tengah sisi skema tradisional, hakim Pengadilan Agama Indonesia (judex factie) belum memiliki kesamaan pelaksanaan suksesi ini. Artikel ini mencoba mengkaji praktek penerapan substitute heir di lapangan. Berpijak pada putusan Pengadilan Agama sebagai sumber data utama, artikel ini berargumen bahwa norma substitute heir (Pasal 185 Kompilasi Hukum Islam) telah dilaksanakan secara terbatas menurut Kompilasi dan konsensus Mahkamah Agung. Penafsiran terbatas berarti keturunan dari kerabat menyamping yang telah meninggal dunia terlebih dahulu tidak diperhitungkan sebagai substitute heir. Ini menyiratkan bahwa upaya reformasi negara dalam hukum waris Islam belum diterapkan sesuai yang diinginkan negara.]
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Mustamiin, Muhamad, Adi Suheryadi y Alifia Puspaningrum. "PENERAPAN SISTEM EVALUASI PEMBELAJARAN PEMROGRAMAN TERINTEGRASI DENGAN ONLINE JUDGE DI SMK". JURNAL PEKAMAS 2, n.º 2 (23 de diciembre de 2022): 61–67. http://dx.doi.org/10.46961/jpk.v2i2.636.

Texto completo
Resumen
Abstrak: Proses evaluasi hasil pembelajaran pemrograman seperti pengkoreksian jawaban terkait dengan kode program atau sintaks tertentu dalam pemrograman belum optimal dan perlu adanya suatu proses penilaian otomatis untuk membantu proses tersebut dengan menggunakan online judge. Online judge merupakan sebuah sistem yang mampu melakukan evaluasi secara mendalam dan melakukan kompilasi terhadap sintaks yang meliputi waktu eksekusi, compilation error dan lain sebagainya. Kegiatan pengabdian penerapan sistem evaluasi pembelajaran pemrograman terintegrasi dengan online judge pada mata pelajaran pemrograman dasar di SMK N 2 Indramayu dilakukan dalam bentuk workshop dan pelaksanaan praktikum, diharapkan dapat membantu siswa untuk segera mendapatkan umpan balik dari hasil pengerjaan latihan dan tugas, serta guru dapat langsung melihat hasil dari pengerjaan latihan dan tugas siswa sehingga dengan diterapkannya sistem ini dapat meningkatkan produktifitas guru dengan lebih banyak membahas materi ataupun memberikan latihan yang lebih spesifik dan siswa dapat mengerjakan lebih banyak latihan dan tugas yang ada karena dalam setiap pengerjaannya dilakukan tanpa menunggu umpan balik dari guru melainkan langsung dari sistem.Kata Kunci: ujian; pemrograman dasar; smk; online judgeAbstract: The process of evaluating programming learning outcomes such as correcting answers related to certain program codes or syntax in programming is not yet optimal and there is a need for an automatic assessment process to assist the process by using an online judge. Online judge is a system capable of in-depth evaluation and compilation of syntax which includes execution time, compilation errors and so on. Service activities for implementing an integrated programming learning evaluation system with online judges on basic programming subjects at SMK N 2 Indramayu are carried out in the form of workshops and practicum implementations, which are expected to help students to immediately get feedback from the results of exercises and assignments, and teachers can immediately see the results of working on exercises and student assignments so that with the implementation of this system it can increase teacher productivity by discussing more material or providing more specific exercises and students can do more exercises and existing tasks because in each process it is done without waiting for feedback from the teacher but rather directly from the system.Keywords: exam, basic programming, smk, online judge
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Shivakumar, Dr Sumathi. "Eternalising Cultural Memory Through Cultural Parallels in Literary Narratives". IJOHMN (International Journal online of Humanities) 3, n.º 4 (15 de agosto de 2017): 65–74. http://dx.doi.org/10.24113/ijohmn.v3i4.34.

Texto completo
Resumen
Cultural memory represents the collective perceptions and creations of the distant past. Such collective memories are best documented and secured in Literature. What matters is not the real facts but rather the consensus of conventions shared by both the cultural history and the literary creator. However, literary narratives do not always give a compilation of such memories under a single wrap. It is on this distinctive point that Jakkana stands out in eternalising cultural memory. BasavarajNaikar’s novella, Jakkanna is the retelling of the life and history of the AmarsilpiJakkannacharya, the famed architect of the Hoysala dynasty. The plot is replete with events that have been happening from the ancient times. Parallels of such incidents that have endured to the modern times can be drawn from the two great epics and other ancient Indian philosophy and literatures. This article aims at highlighting such aspects of our lives that seems to have been greatly influenced by the past. It also looks at such events that have endured eras.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía