Articles de revues sur le sujet « Summary or Arbitrary Executions »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Summary or Arbitrary Executions.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Summary or Arbitrary Executions ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Weissbrodt, David. « The Three “Theme” Special Rapporteurs of the UN Commission on Human Rights ». American Journal of International Law 80, no 3 (juillet 1986) : 685–99. http://dx.doi.org/10.2307/2201794.

Texte intégral
Résumé :
In March 1982, the United Nations Commission on Human Rights initiated the appointment of a Special Rapporteur on Summary or Arbitrary Executions. The Special Rapporteur on Summary or Arbitrary Executions has done far more than merely study that grave human rights problem; he has received complaints about impending and past executions, issued appeals to governments about threatened executions and the need to investigate past killings, and reported publicly on much of his activity. The Commission on Human Rights not only has renewed the Special Rapporteur on Summary or Arbitrary Executions in its subsequent annual sessions, but has followed this precedent by appointing in 1985 a similar Special Rapporteur on Torture and in 1986 a Special Rapporteur on Intolerance and Discrimination Based on Religion or Belief.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Rodley, Nigel S. « United Nations Action Procedures against "Disappearances," Summary or Arbitrary Executions, and Torture ». Human Rights Quarterly 8, no 4 (novembre 1986) : 700. http://dx.doi.org/10.2307/762199.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

O'Donnell, Daniel. « Trends in the application of international humanitarian law by United Nations human rights mechanisms ». International Review of the Red Cross 38, no 324 (septembre 1998) : 481–503. http://dx.doi.org/10.1017/s0020860400091282.

Texte intégral
Résumé :
UN human rights mechanisms continue to proliferate, producing numerous decisions and voluminous reports. This article reviews the ways in which such mechanisms apply international humanitarian law, including the law of Geneva and the law of The Hague. In doing so, it focuses mainly on the practice of the rapporteurs appointed by the UN Commission on Human Rights to investigate the human rights situations in specific countries and on that of the thematic rapporteurs and working groups which the Commission has entrusted with monitoring specific types of serious human rights violations wherever they occur, in particular the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions and the Representative of the Secretary-General on Internally Displaced Persons, whose mandates most often lead them to examine abuses occurring in the context of armed conflicts. Reference is also made to two innovative mechanisms which functioned in El Salvador: the first UN-sponsored “truth commission” and the first human rights monitoring body established as part of a comprehensive mechanism for monitoring compliance with a UN-sponsored peace agreement. Certain observations made by treaty monitoring bodies are also mentioned.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Dergachev, A., et A. Sidorin. « Summary-based method of implementing arbitrary context-sensitive checks for source-based analysis via symbolic execution ». Proceedings of the Institute for System Programming of the RAS 28, no 1 (2016) : 41–62. http://dx.doi.org/10.15514/ispras-2016-28(1)-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Ivanov, Ievgen, Mykola Nikitchenko et Uri Abraham. « Event-Based Proof of the Mutual Exclusion Property of Peterson’s Algorithm ». Formalized Mathematics 23, no 4 (1 décembre 2015) : 325–31. http://dx.doi.org/10.1515/forma-2015-0026.

Texte intégral
Résumé :
Summary Proving properties of distributed algorithms is still a highly challenging problem and various approaches that have been proposed to tackle it [1] can be roughly divided into state-based and event-based proofs. Informally speaking, state-based approaches define the behavior of a distributed algorithm as a set of sequences of memory states during its executions, while event-based approaches treat the behaviors by means of events which are produced by the executions of an algorithm. Of course, combined approaches are also possible. Analysis of the literature [1], [7], [12], [9], [13], [14], [15] shows that state-based approaches are more widely used than event-based approaches for proving properties of algorithms, and the difficulties in the event-based approach are often emphasized. We believe, however, that there is a certain naturalness and intuitive content in event-based proofs of correctness of distributed algorithms that makes this approach worthwhile. Besides, state-based proofs of correctness of distributed algorithms are usually applicable only to discrete-time models of distributed systems and cannot be easily adapted to the continuous time case which is important in the domain of cyber-physical systems. On the other hand, event-based proofs can be readily applied to continuous-time / hybrid models of distributed systems. In the paper [2] we presented a compositional approach to reasoning about behavior of distributed systems in terms of events. Compositionality here means (informally) that semantics and properties of a program is determined by semantics of processes and process communication mechanisms. We demonstrated the proposed approach on a proof of the mutual exclusion property of the Peterson’s algorithm [11]. We have also demonstrated an application of this approach for proving the mutual exclusion property in the setting of continuous-time models of cyber-physical systems in [8]. Using Mizar [3], in this paper we give a formal proof of the mutual exclusion property of the Peterson’s algorithm in Mizar on the basis of the event-based approach proposed in [2]. Firstly, we define an event-based model of a shared-memory distributed system as a multi-sorted algebraic structure in which sorts are events, processes, locations (i.e. addresses in the shared memory), traces (of the system). The operations of this structure include a binary precedence relation ⩽ on the set of events which turns it into a linear preorder (events are considered simultaneous, if e1 ⩽ e2 and e2 ⩽ e1), special predicates which check if an event occurs in a given process or trace, predicates which check if an event causes the system to read from or write to a given memory location, and a special partial function “val of” on events which gives the value associated with a memory read or write event (i.e. a value which is written or is read in this event) [2]. Then we define several natural consistency requirements (axioms) for this structure which must hold in every distributed system, e.g. each event occurs in some process, etc. (details are given in [2]). After this we formulate and prove the main theorem about the mutual exclusion property of the Peterson’s algorithm in an arbitrary consistent algebraic structure of events. Informally, the main theorem states that if a system consists of two processes, and in some trace there occur two events e1 and e2 in different processes and each of these events is preceded by a series of three special events (in the same process) guaranteed by execution of the Peterson’s algorithm (setting the flag of the current process, writing the identifier of the opposite process to the “turn” shared variable, and reading zero from the flag of the opposite process or reading the identifier of the current process from the “turn” variable), and moreover, if neither process writes to the flag of the opposite process or writes its own identifier to the “turn” variable, then either the events e1 and e2 coincide, or they are not simultaneous (mutual exclusion property).
Styles APA, Harvard, Vancouver, ISO, etc.
6

HADDIX, F. FURMAN. « AN ORDER DEGREE ALTERNATOR FOR ARBITRARY TOPOLOGIES ». Parallel Processing Letters 18, no 02 (juin 2008) : 307–22. http://dx.doi.org/10.1142/s0129626408003405.

Texte intégral
Résumé :
An alternator is an arbitrary set of interacting processes that satisfies three conditions. First, if a process executes its critical section, then no neighbor of that process can execute its critical section at the same state. Second, along any infinite sequence of system states, each process will execute its critical section, an infinite number of times. Third, along any maximally concurrent computation, the alternator will stabilize to a sequence of states in which the processes will execute their critical sections in alternation. A principal reason for interest in alternators is their ability to transform systems correct under serial execution semantics to systems that are correct under concurrent execution semantics. An earlier alternator for arbitrary topology required 2q states where q is the dependency graph circumference and after stabilization would wait 2q steps between critical section executions. In a synchronous environment, this alternator requires only 2d+1 states where d is the degree of the graph of process dependencies for the system and after stabilization will require a wait of 2d+1 steps between critical section executions. In an asynchronous environment, the synchronization properties of this alternator must be supplemented with an asynchronous unison algorithm. The asynchronous unison algorithm requires expansion of the required number of states to dt, where t is the longest chordless cycle in the dependency graph; however, the required wait between critical section executions remains O(d).
Styles APA, Harvard, Vancouver, ISO, etc.
7

Dardinier, Thibault, et Peter Müller. « Hyper Hoare Logic : (Dis-)Proving Program Hyperproperties ». Proceedings of the ACM on Programming Languages 8, PLDI (20 juin 2024) : 1485–509. http://dx.doi.org/10.1145/3656437.

Texte intégral
Résumé :
Hoare logics are proof systems that allow one to formally establish properties of computer programs. Traditional Hoare logics prove properties of individual program executions (such as functional correctness). Hoare logic has been generalized to prove also properties of multiple executions of a program (so-called hyperproperties, such as determinism or non-interference). These program logics prove the absence of (bad combinations of) executions. On the other hand, program logics similar to Hoare logic have been proposed to disprove program properties (e.g., Incorrectness Logic), by proving the existence of (bad combinations of) executions. All of these logics have in common that they specify program properties using assertions over a fixed number of states, for instance, a single pre- and post-state for functional properties or pairs of pre- and post-states for non-interference. In this paper, we present Hyper Hoare Logic, a generalization of Hoare logic that lifts assertions to properties of arbitrary sets of states. The resulting logic is simple yet expressive: its judgments can express arbitrary program hyperproperties, a particular class of hyperproperties over the set of terminating executions of a program (including properties of individual program executions). By allowing assertions to reason about sets of states, Hyper Hoare Logic can reason about both the absence and the existence of (combinations of) executions, and, thereby, supports both proving and disproving program (hyper-)properties within the same logic, including (hyper-)properties that no existing Hoare logic can express. We prove that Hyper Hoare Logic is sound and complete, and demonstrate that it captures important proof principles naturally. All our technical results have been proved in Isabelle/HOL.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Morse, Gregory. « Self-Spectre, Write-Execute and the Hidden State ». Tatra Mountains Mathematical Publications 73, no 1 (1 août 2019) : 131–44. http://dx.doi.org/10.2478/tmmp-2019-0010.

Texte intégral
Résumé :
Abstract The recent Meltdown and Spectre vulnerabilities have highlighted a very present and real threat in the on-chip memory cache units which can ultimately provide a hidden state, albeit only readable via memory timing instructions [Kocher, P.—Genkin, D.— Gruss, D.— Haas, W.—Hamburg, M.—Lipp, M.–Mangard, S.—Prescher, T.—Schwarz, M.—Yarom, Y.: Spectre attacks: Exploiting speculative execution, CoRR, abs/1801.01203, 2018]. Yet the exploits, although having some complexity and slowness, are demonstrably reliable on nearly all processors produced for the last two decades. Moving out from looking at this strictly as a means of reading protected memory, as the large microprocessor companies move to close this security vulnerability, an interesting question arises. Could the inherent design of the processor give the ability to hide arbitrary calculations in this speculative and parallel side channel? Without even using protected memory and exploiting the vulnerability, as has been the focus, there could very well be a whole class of techniques which exploit the side-channel. It could be done in a way which would be largely un-preventable behavior as the technology would start to become self-defeating or require a more complicated and expensive on-chip cache memory system to properly post-speculatively clean itself. And the ability to train the branch predictor to incorrectly speculatively behave is almost certain given hardware limitations, andthusprovidesexactly this pathway. A novel approach looks at just how much computation can be done speculatively with a result store via indirect reads and available through the memory cache. A multi-threaded approach can allow a multi-stage computation pipeline where each computation is passed to a read-out thread and then to the next computation thread [Swanson, S.—McDowell, L. K.—Swift, M. M.—Eggers, S. J.–Levy H. M.: An evaluation of speculative instruction execution on simultaneous multithreaded processors, ACM Trans. Comput. Syst. 21 (2003), 314–340]. Through channels like this, an application can surreptitiously make arbitrary calculations, or even leak data without any standard tracing tools being capable of monitoring the subtle changes. Like a variation of the famous physics Heisenberg uncertainty principle, even a tool capable of reading the cache states would not only be incredibly inefficient, but thereby tamper with and modify the state. Tools like in-circuit emulators, or specially designed cache emulators would be needed to unmask the speculative reads, and it is further difficult to visualize with a linear time-line. Specifically, the AES and RSA algorithms will be studied with respect to these ideas, looking at success rates for various calculation batches with speculative execution, while having a summary view to see the rather severe performance penalties for using such methods. Either approaches could provide for strong white-box cryptography when considering a binary, non-source code form. In terms of white-box methods, both could be significantly challenging to locate or deduce the inner workings of the code. Further, both methods can easily surreptitiously leak or hide data within shared memory in a seemingly innocuous manner.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Herlihy, Maurice, Sergio Rajsbaum, Michel Raynal et Julien Stainer. « From wait-free to arbitrary concurrent solo executions in colorless distributed computing ». Theoretical Computer Science 683 (juin 2017) : 1–21. http://dx.doi.org/10.1016/j.tcs.2017.04.007.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Gomes Júnior, Paulo César de Carvalho. « The anti-juridicidity and the incoherence of Summary no. 345 of the STJ ». CONTRIBUCIONES A LAS CIENCIAS SOCIALES 17, no 2 (14 février 2024) : e5050. http://dx.doi.org/10.55905/revconv.17n.2-074.

Texte intégral
Résumé :
The article elucidates some of the issues surrounding the payment of succumbence fees as a result of enforcements of judgments and their challenges, especially when the enforcements are brought against the public treasury. Initially, he presents how these issues were dealt with in executions of individual judgments against private parties governed by the CPC/1973 and how they are now dealt with in executions of individual judgments against private parties governed by the CPC/2015. It then presents how these issues are dealt with in the enforcement of individual judgments against the public treasury. It then presents how these issues are dealt with in individual enforcement of collective judgments against the public treasury. It concludes that Precedent No. 345 of the STJ is unlawful and inconsistent with other precedents of the STJ itself, with precedents of the STF and with the legal order as a whole. It should therefore be revoked or revised.
Styles APA, Harvard, Vancouver, ISO, etc.
11

O'Brien, Paul. « Summary Executions in Italy During the First World War : Findings and Implications ». Modern Italy 11, no 3 (novembre 2006) : 353–59. http://dx.doi.org/10.1080/13532940600937368.

Texte intégral
Résumé :
This article has two related aims. First, it examines the most up-to-date studies relative to Italian military justice during the First World War, and seeks to set them in the context of the historical debate since the late 1960s. Secondly, and more specifically, it focuses on recently uncovered evidence regarding staggeringly high numbers of previously unknown summary executions in the Italian army. It explores the significance of these findings for understanding the character of the Italian military justice system as well as that of the war conducted by Italy's ruling élites between 1915 and 1918.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Ruffa, Chiara. « Societal beliefs about the use of force in Israël, Italy and France ». Tocqueville Review 35, no 2 (janvier 2014) : 101–17. http://dx.doi.org/10.3138/ttr.35.2.101.

Texte intégral
Résumé :
In the Spring 2014, while in Paris, I happened to enter an exhibition about summary executions of French soldiers during World War I. The soldiers had mainly been executed for mutiny, although in fact they had rarely contravened orders or rebelled. Rather, these soldiers were deeply traumatised young conscripts, operating in unbearable conditions, and often, had simply protested against the conditions, fought in a way that minimised risks to their personal safety, or surrendered to the Germany enemy (so-called Boches in France at the time).
Styles APA, Harvard, Vancouver, ISO, etc.
13

Inkinen, Virpi, Mikko Häyrinen et Vesa Linnamo. « Technical and tactical analysis of women’s volleyball ». Biomedical Human Kinetics 5, no 1 (9 novembre 2013) : 43–50. http://dx.doi.org/10.2478/bhk-2013-0007.

Texte intégral
Résumé :
Summary Introduction: The study aim was to construct a technical and tactical analysis of women’s volleyball based on notational analysis in top-level and junior women’s European volleyball matches, to compare these two levels, and to clarify the differences between the winners and losers of a set. Material and Methods: Four matches from the 2010 FIVB Women’s Volleyball World Championships and 2010 CEV Junior Women’s European Championship 2010 were analyzed using Data Volley software. The number and performance level of different skills were recorded in total and were grouped according to the role of the players. Methods of scoring and attacking zones were also analyzed. Results: There were only slight differences between the two levels in terms of success in different skills. When the skill executions were compared between the winning and losing teams of a set within the levels, less successful skill executions and more errors in different skills were found for the losing teams. Conclusions: The results seem to indicate that there are only minor differences between adult and junior women’s volleyball at the highest level. Attacking seems to be the most important skill concerning winning in both levels. The efficiency of attacking seems to depend upon the quality and versatility of the setting and also from the physical abilities of the players.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Hoyle, Carolyn, et Saul Lehrfreund. « Contradictions in Judicial Support for Capital Punishment in India and Bangladesh : Utilitarian Rationales ». Asian Journal of Criminology 15, no 2 (26 novembre 2019) : 141–61. http://dx.doi.org/10.1007/s11417-019-09304-0.

Texte intégral
Résumé :
AbstractIndia and Bangladesh share a common history, and each has developed somewhat similarly since partition. However, while both countries now have relatively low murder rates, India has seen a decline in the rate of executions, while Bangladesh continues to impose death sentences and carry out executions at a higher rate. There have been challenges to the death penalty in India, restricting its use to exceptional cases. The same has not occurred in Bangladesh. Yet in both countries, systemic flaws in the criminal process are evident. This article draws on two original empirical research projects that explored judges’ opinions on the retention and administration of capital punishment in India and Bangladesh. The data expose justice systems marred by corruption, incompetence, abuses of due process, and arbitrary and inconsistent treatment of defendants from arrest through to conviction and sentencing. It shows that those with the power to sentence to death have little faith in the integrity of the criminal process. Yet, a startling paradox emerges from these studies; despite personal knowledge of its flaws, judges have trust in the death penalty to deter crime and to realise other sentencing aims and feel retention benefits society. This is explained by reference to utilitarian values. Not only did our judges express strongly utilitarian justifications for sentencing people to death, in terms of their erroneous belief in its deterrent effect, but some also articulated utilitarian justifications for misconduct in pre-trial processes, suggesting that it was necessary to break the rules to secure convictions when the system was dysfunctional and ineffective.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Bodo, Bela. « The White Terror in Hungary, 1919–1921 : The Social Worlds of Paramilitary Groups ». Austrian History Yearbook 42 (avril 2011) : 133–63. http://dx.doi.org/10.1017/s0067237811000099.

Texte intégral
Résumé :
The Hungarian Republic, which emerged from of the ashes of Austria-Hungary, experienced two revolutions between October 1918 and April 1919. However, neither the democratic regime nor the more radical Soviet Republic born in these revolutions was able to solve the country's most pressing economic and social problems. The collapse of the Soviet Republic at the end of July 1919, in turn, was followed by a rapid rise in extra-legal violence. Freikorps units (szabadcsapatok) and civic guards (polgárőrségek), aided by the members of the local police, set up kangaroo courts, organized summary executions, and ignited pogroms in the central and western parts of the country.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Kim, Sungi, Namjun Kim, Jinyoung Seo, Jeong-Eun Park, Eun Ho Song, So Young Choi, Ji Eun Kim, Seungsang Cha, Ha H. Park et Jwa-Min Nam. « Nanoparticle-based computing architecture for nanoparticle neural networks ». Science Advances 6, no 35 (août 2020) : eabb3348. http://dx.doi.org/10.1126/sciadv.abb3348.

Texte intégral
Résumé :
The lack of a scalable nanoparticle-based computing architecture severely limits the potential and use of nanoparticles for manipulating and processing information with molecular computing schemes. Inspired by the von Neumann architecture (VNA), in which multiple programs can be operated without restructuring the computer, we realized the nanoparticle-based VNA (NVNA) on a lipid chip for multiple executions of arbitrary molecular logic operations in the single chip without refabrication. In this system, nanoparticles on a lipid chip function as the hardware that features memory, processors, and output units, and DNA strands are used as the software to provide molecular instructions for the facile programming of logic circuits. NVNA enables a group of nanoparticles to form a feed-forward neural network, a perceptron, which implements functionally complete Boolean logic operations, and provides a programmable, resettable, scalable computing architecture and circuit board to form nanoparticle neural networks and make logical decisions.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Fellner, Andreas, Mitra Tabaei Befrouei et Georg Weissenbacher. « Mutation testing with hyperproperties ». Software and Systems Modeling 20, no 2 (avril 2021) : 405–27. http://dx.doi.org/10.1007/s10270-020-00850-1.

Texte intégral
Résumé :
AbstractWe present a new method for model-based mutation-driven test case generation. Mutants are generated by making small syntactical modifications to the model or source code of the system under test. A test case kills a mutant if the behavior of the mutant deviates from the original system when running the test. In this work, we use hyperproperties—which allow to express relations between multiple executions—to formalize different notions of killing for both deterministic as well as non-deterministic models. The resulting hyperproperties are universal in the sense that they apply to arbitrary reactive models and mutants. Moreover, an off-the-shelf model checking tool for hyperproperties can be used to generate test cases. Furthermore, we propose solutions to overcome the limitations of current model checking tools via a model transformation and a bounded SMT encoding. We evaluate our approach on a number of models expressed in two different modeling languages by generating tests using a state-of-the-art mutation testing tool.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Mohajan, Haradhan Kumar. « History of Rakhine State and the Origin of the Rohingya Muslims ». IKAT : The Indonesian Journal of Southeast Asian Studies 2, no 1 (24 juillet 2018) : 19. http://dx.doi.org/10.22146/ikat.v2i1.37391.

Texte intégral
Résumé :
The Rohingya, a Muslim ethnic minority group in Rakhine, are considered among the most persecuted, vulnerable, and oppressed minorities in the world. Recently, the persecution on the Rohingya Muslims has increased due to Buddhist nationalism in Myanmar. The Rohingya continue to suffer from several forms of restrictions and human rights violations in Myanmar due to them being denied Myanmar citizenship. They are victims of various forms of oppression, such as arbitrary taxation, land confiscation, destruction of mosques, torture and ill-treatment, extrajudicial executions, restrictions on movements, forced eviction and house destruction, forced laborers on roads and at military camps, and financial restrictions on marriage. Since the 1970s, a number of crackdowns on the Rohingya in Rakhine have forced them to flee to neighboring countries. More than one million Rohingyas have migrated to refugee camps in the Bangladeshi district of Cox’s Bazar. This article deals with the origin of the Rohingya, the form of their citizenship, and recent oppression in the Rakhine State of Myanmar.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Haja, David, Zoltan Richard Turanyi et Laszlo Toka. « Location, Proximity, Affinity – The key factors in FaaS ». Infocommunications journal, no 4 (2020) : 14–21. http://dx.doi.org/10.36244/icj.2020.4.3.

Texte intégral
Résumé :
The Function-as-a-Service paradigm emerged not only as a pricing technique, but also as a programming model promising to simplify developing to the cloud. Interestingly, while placing functions across hosts under the service platform is believed to be flexible, currently the available platforms pay little attention to co-locate connected functions, or data with the respective processing function in order to improve performance. Even though the local function invocation and data access might be an order of magnitude faster than their remote intra-cloud counterparts. In this paper, we therefore propose a Function-asa- Service platform design that reaps the performance benefits of co-location. We build the platform on WebAssembly, a secure and flexible tool for efficient local function invocations, and on a distributed in-memory database, which allows arbitrary data placement. On top we advocate smart placement strategies for function executions and data, decoupled from the functions. Hence we envision good horizontal scaling of functions while keeping the experienced processing latency to that of a single machine case.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Muhammad Tun Samudra. « Taradhin Principle in Fiduciary Guarantee Parate Execution after the Decision of the Constitutional Court No. 18/PUU-XVII/2019 ». Jurnal Hukum Islam 20, no 1 (20 juin 2022) : 77–100. http://dx.doi.org/10.28918/jhi.v20i1.5992.

Texte intégral
Résumé :
This article was analyzes the principle of Willingness in the Execution of fiduciary guarantees after the decision of the Constitutional Court Number 18/PUU-XVII/2019, in practice Parate execution can be carried out either with or without the consent of the debtor, such conditions often lead to acts of coercion and violence from fiduciary guarantee holders, even giving opportunities to arbitrary acts committed by fiduciary recipients (creditors) and degrading the dignity of the debtor. From the research conducted, it was found that the application of the principle of willingness in the Parate Execution of fiduciary guarantees by the Constitutional Court provides benefits and prevents harm to debtor and creditors, this can be seen from the main idea of the Court which states that parate Executions should no longer be carried out without an agreement of the customer's and the customer's willingness to return the collateral. If the customer does not admit the defaulted, then the fiduciary holder can submit an application through fiat Execution to the Court.
Styles APA, Harvard, Vancouver, ISO, etc.
21

D'Amato, Maurizio, Giuseppe Cucuzza et Giampiero Bambagioni. « Appraising forced sale value by the method of short table market comparison approach ». Aestimum 82 (8 décembre 2023) : 39–50. http://dx.doi.org/10.36253/aestim-13808.

Texte intégral
Résumé :
For International Valuation Standards (IVS) the estimate of the “forced sale” value implies a value judgment with reference to a degeneration of the market value basis, since “a forced sale” is a description of the situation in which the exchange takes place, not a distinct basis of value (IVS 2022, Par. 170.1).The paper illustrates a model that can be used to measure the difference between market value and forced sale value, as an aid to real estate valuations related to real estate executions. The proposed method is aimed at determining the difference between the estimated values and the final sales values obtained through the executive process, on the basis of the Short Table Market Comparison Approach (MCA). This method contributes more appropriately to the estimate of the value obtainable from the outcome of the enforcement process than arbitrary reductions in the market value. An application on a small sample of residential properties undergoing enforcement procedure highlights the possibility of using the Short Table MCA even with a limited number of comparables.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Rudser, Kyle D., Michael L. LeBlanc et Scott S. Emerson. « Distribution-free inference on contrasts of arbitrary summary measures of survival ». Statistics in Medicine 31, no 16 (23 février 2012) : 1722–37. http://dx.doi.org/10.1002/sim.4505.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Lee, Soohyun, Jeremy Johnson, Carl Vitzthum, Koray Kırlı, Burak H. Alver et Peter J. Park. « Tibanna : software for scalable execution of portable pipelines on the cloud ». Bioinformatics 35, no 21 (11 mai 2019) : 4424–26. http://dx.doi.org/10.1093/bioinformatics/btz379.

Texte intégral
Résumé :
Abstract Summary We introduce Tibanna, an open-source software tool for automated execution of bioinformatics pipelines on Amazon Web Services (AWS). Tibanna accepts reproducible and portable pipeline standards including Common Workflow Language (CWL), Workflow Description Language (WDL) and Docker. It adopts a strategy of isolation and optimization of individual executions, combined with a serverless scheduling approach. Pipelines are executed and monitored using local commands or the Python Application Programming Interface (API) and cloud configuration is automatically handled. Tibanna is well suited for projects with a range of computational requirements, including those with large and widely fluctuating loads. Notably, it has been used to process terabytes of data for the 4D Nucleome (4DN) Network. Availability and implementation Source code is available on GitHub at https://github.com/4dn-dcic/tibanna. Supplementary information Supplementary data are available at Bioinformatics online.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Glassheim, Eagle. « National Mythologies and Ethnic Cleansing : The Expulsion of Czechoslovak Germans in 1945 ». Central European History 33, no 4 (décembre 2000) : 463–86. http://dx.doi.org/10.1163/156916100746428.

Texte intégral
Résumé :
Beginning in January of 1946, trains filled with Sudeten Germans—forty wagons, thirty passengers per wagon—left Czechoslovakia daily for the American Zone of occupied Germany. By the end of 1946, the Czechoslovak government completed the “organized transfer” of almost 2 million Germans, and it did so in a manner that in many respects fulfilled the mandate of the Potsdam agreement that the resettlement be “orderly and humane.” But a focus on these regularized trainloads of human cargo obscures the extent of the humanitarian disaster facing Germans during the summer months of 1945, immediately after the Nazi capitulation. By the end of 1945, Czech soldiers, security forces, and local militias had already expelled over 700,000 Sudeten Germans to occupied Germany and Austria. As many as 30,000 Germans died on forced marches, in disease-filled concentration camps, in summary executions, and massacres.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Bender, Ralf. « Calculating Summary Measures of Unimodal Response Curves by Means of Nonlinear Regression Models ». Journal of Theoretical Medicine 2, no 2 (2000) : 73–80. http://dx.doi.org/10.1080/10273660008833038.

Texte intégral
Résumé :
In biomedical research summary measures such as the curve maximum (Cmax)are frequently used to describe and analyze unimodal response curves. However, if the true curve is perturbed by autocorrelated noise the calculation of summary measures from raw data can be arbitrary and misleading due to high peaks produced by the correlated errors. A possible solution is to fit suitable nonlinear functions to the response curves and estimate the summary measures from these functions. In this paper formulas are derived providing a way to estimate important summary measures of unimodal curves by means of the parameters of the lognormal function. The method is illustrated by application to pharmacodynamic data.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Rawlins, A. D. « A note on the two-dimensional electrostatic field produced by a line charge near a dielectric wedge ». Quarterly Journal of Mechanics and Applied Mathematics 72, no 3 (20 mai 2019) : 341–57. http://dx.doi.org/10.1093/qjmam/hbz007.

Texte intégral
Résumé :
Summary We shall consider the problem of determining the correct electrostatic field produced when an infinite two-dimensional line source is influenced by an adjacent infinite dielectric wedge. This result corrects a number of previous attempts at this problem, which are shown to be in error. The method avoids using the Mellin transform which has lead to some of these earlier errors. The method is used to solve a more general problem of the electrostatic field produced by an arbitrary number of line sources located in an arbitrary number of contiguous dielectric wedges.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Peasgood, Mike, Eric Kubica et John McPhee. « Stabilization of a Dynamic Walking Gait Simulation ». Journal of Computational and Nonlinear Dynamics 2, no 1 (6 juillet 2006) : 65–72. http://dx.doi.org/10.1115/1.2389230.

Texte intégral
Résumé :
Forward dynamic simulations of human walking gait have typically simulated and analyzed a single step of the walking cycle, assuming symmetric and periodic gait. To enable simulations over many steps, a stabilizer is required to maintain the balance of the walking model, ideally mimicking the human balance control mechanism. This paper presents a feedback control system that stabilizes the torso orientation during a human walking gait dynamic simulation, enabling arbitrarily long simulations. The model is a two-dimensional mechanical simulation, in which the desired joint trajectories are defined as functions of time; the only external forces on the model are gravitational and ground reaction forces. Orientation or postural control is achieved by modulation of the rate at which lower limb joints move through angular trajectories. The controller design is based on a sequence of simple linear feedback controllers, each based on an intuitive control law. Controller parameters were determined iteratively using an optimization algorithm and repeated executions of the forward dynamics simulation to minimize control term errors. Results show the use of feedback control and joint speed modulation to be effective in maintaining balance for walking simulations of arbitrary length, allowing for analysis of steady-state walking.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Benedetto, José I., Guillermo Valenzuela, Pablo Sanabria, Andrés Neyem, Jaime Navón et Christian Poellabauer. « MobiCOP : A Scalable and Reliable Mobile Code Offloading Solution ». Wireless Communications and Mobile Computing 2018 (2018) : 1–18. http://dx.doi.org/10.1155/2018/8715294.

Texte intégral
Résumé :
Code offloading is a popular technique for extending the natural capabilities of mobile devices by migrating processor-intensive tasks to resource-rich surrogates. Despite multiple platforms for offloading being available in academia, these frameworks have yet to permeate the industry. One of the primary reasons for this is limited experimentation in practical settings and lack of reliability, scalability, and options for distribution. This paper introduces MobiCOP, a new code offloading framework designed from the ground up with these requirements in mind. It features a novel design fully self-contained in a library and offers compatibility with most stock Android devices available today. Compared to local task executions, MobiCOP offers performance improvements of up to 17x and increased battery efficiency of up to 25x, shows minimum performance degradation in environments with unstable networks, and features an autoscaling module that allows its server counterpart to scale to an arbitrary number of offloading requests. It is compatible with the most relevant Android technologies optimized for heavy computation (NDK and Renderscript) and has so far been well received by fellow mobile developers. We hope MobiCOP will help bring mobile code offloading closer to the industry realm.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Podosokorsky, N. N. « Review of Perlina, N. (2017). Picture-texts and ekphrases in F. Dostoevsky’s ‘The Idiot’. St. Petersburg : Aleteya. 288 pages. » Voprosy literatury, no 6 (7 février 2019) : 378–83. http://dx.doi.org/10.31425/0042-8795-2018-6-378-383.

Texte intégral
Résumé :
The review discusses N. Perlina’s monograph about the problem of ekphrasis in Dostoevsky’s ‘most mysterious’ novel The Idiot [Idiot] (1868) and highlights advantages and disadvantages of her study. The review contains a summary of key Russian bibliography about ekphrasis in literature (L. Geller, R. Poddubtsev, E. Novikova, O. Dzhumaylo, etc.). It is noted that, despite studying ekphrasis, many philologists may not actually use the term in their research. The review touches on Perlina’s polemic with another renowned scholar of the novel, T. Kasatkina. Perlina’s monograph is structured into six discernable parts: Excursus into the Theory of Ekphrasis, Meetings with People and Portraits, Pictures of Executions and Conversations about Faith, Cervantes – Dostoevsky, Myshkin – Don Quixote, The Triangle Nastasya Filippovna – Myshkin – Aglaya: Pictures of Struggling Hearts, and Implied Ekphrasis Stories in the Novel’s Fourth Part. A vague authorial position is deemed the biggest downside of Perlina’s book.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Pouget-Abadie, J., G. Saint-Jacques, M. Saveski, W. Duan, S. Ghosh, Y. Xu et E. M. Airoldi. « Testing for arbitrary interference on experimentation platforms ». Biometrika 106, no 4 (30 septembre 2019) : 929–40. http://dx.doi.org/10.1093/biomet/asz047.

Texte intégral
Résumé :
Summary Experimentation platforms are essential to large modern technology companies, as they are used to carry out many randomized experiments daily. The classic assumption of no interference among users, under which the outcome for one user does not depend on the treatment assigned to other users, is rarely tenable on such platforms. Here, we introduce an experimental design strategy for testing whether this assumption holds. Our approach is in the spirit of the Durbin–Wu–Hausman test for endogeneity in econometrics, where multiple estimators return the same estimate if and only if the null hypothesis holds. The design that we introduce makes no assumptions on the interference model between units, nor on the network among the units, and has a sharp bound on the variance and an implied analytical bound on the Type I error rate. We discuss how to apply the proposed design strategy to large experimentation platforms, and we illustrate it in the context of an experiment on the LinkedIn platform.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Cavallaro, James L., et Stephanie Erin Brewer. « Never Again ? The Legacy of the Argentine and Chilean Dictatorships for the Global Human Rights Regime ». Journal of Interdisciplinary History 39, no 2 (octobre 2008) : 233–44. http://dx.doi.org/10.1162/jinh.2008.39.2.233.

Texte intégral
Résumé :
Widespread forced disappearances, summary executions, and torture practiced by the military regimes in Argentina and Chile came to define human rights abuse during the 1970s and 1980s. Opposition to these practices and their parent regimes helped to shape the contemporary human rights movement and, by extension, human rights norms and institutions. Thomas C. Wright's State Terrorism in Latin America contends that the movement's struggle with the Argentine and Chilean dictatorships resulted in an era of greater deterrence and enforcement power for human rights institutions. Sonia Cardenas' Conflict and Compliance, however, maintains that despite the advance in norms and the creation of supranational structures to promote accountability for human rights abuse, the mechanisms for changing state practice have remained remarkably constant throughout the past three decades. Both in Latin America and elsewhere, domestic forces and cost-benefit analysis—at times aided by international pressure—continue to be the principal determinants of state behavior in the field of human rights.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Breau, Susan C. « THE YEAR IN REVIEW ». Yearbook of International Humanitarian Law 12 (décembre 2009) : 195–232. http://dx.doi.org/10.1017/s1389135909000075.

Texte intégral
Résumé :
AbstractThis year in review will first discuss the major developments that contributed towards the formation or enforcement of international humanitarian law. Despite the many positive developments in the elucidation of international humanitarian law, 2009 witnessed the continuation of violent armed conflict around the world, not least in Sri Lanka where the long standing armed conflict came to a bloody conclusion amidst allegations of summary executions and other serious violations of international humanitarian law. Two other conflicts involving Israel/Gaza and Russia/Georgia which took place in 2008 and early 2009, resulted in the release of two influential international investigative reports, each of which alleged serious violations of international humanitarian law and called for the enforcement of criminal accountability. The election of Barack Obama marked a significant shift in the attitude of the United States to terrorism and detention with the new President immediately announcing on taking office, the closure of Guantánamo Bay.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Weissbrodt, David S., et Brittany Mitchell. « The United Nations Working Group on Arbitrary Detention : Procedures and Summary of Jurisprudence ». Human Rights Quarterly 38, no 3 (2016) : 655–705. http://dx.doi.org/10.1353/hrq.2016.0047.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Igwe, Isaac O. C. « The Rule of Law and National Security in Nigerian Democracy : A Contemporary Issue under the Aegis of International Law ». ATHENS JOURNAL OF LAW 7, no 2 (31 mars 2021) : 148–68. http://dx.doi.org/10.30958/ajl.7-2-2.

Texte intégral
Résumé :
Although brutality can repress a society, it never assures the sustainability of that conquest. Tyranny steers the hopeless to despair, edges to rebellion, and could open the door for a new tyrant to rise. Law becomes a limiting factor that must act as a stopgap to the avaricious intentions of a dictator. A democratic leader must incorporate the supremacy of the law and honest officials into his government. He shall also create courts of law, treat the poorest citizens with fairness and build a hall of justice to bring the society to modernity with the operation of the rule of law enshrined in the constitution. Legislation is nothing without enforcement and Law is no law if not accepted and respected by the people. The rule of law cannot be said to be working in a country where the government continues to violate the orders of the court, unlawfully detain its citizens, abuse human rights including arbitrary and extra-judicial executions, unlawful arrests and detentions, embargo on freedom of speech and press, impunity and inhumane torture, degradation of people or exterminations. This treatise will argue on the supremacy of the “Rule of Law” as it impacts Nigerian democracy. Keywords: Rule of Law; Democracy; Judiciary; Supremacy; Government; Tyranny; Nigerian Constitution
Styles APA, Harvard, Vancouver, ISO, etc.
35

Backstrom, C. « Computational Aspects of Reordering Plans ». Journal of Artificial Intelligence Research 9 (1 septembre 1998) : 99–137. http://dx.doi.org/10.1613/jair.477.

Texte intégral
Résumé :
This article studies the problem of modifying the action ordering of a plan in order to optimise the plan according to various criteria. One of these criteria is to make a plan less constrained and the other is to minimize its parallel execution time. Three candidate definitions are proposed for the first of these criteria, constituting a sequence of increasing optimality guarantees. Two of these are based on deordering plans, which means that ordering relations may only be removed, not added, while the third one uses reordering, where arbitrary modifications to the ordering are allowed. It is shown that only the weakest one of the three criteria is tractable to achieve, the other two being NP-hard and even difficult to approximate. Similarly, optimising the parallel execution time of a plan is studied both for deordering and reordering of plans. In the general case, both of these computations are NP-hard. However, it is shown that optimal deorderings can be computed in polynomial time for a class of planning languages based on the notions of producers, consumers and threats, which includes most of the commonly used planning languages. Computing optimal reorderings can potentially lead to even faster parallel executions, but this problem remains NP-hard and difficult to approximate even under quite severe restrictions.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Alves, Rigel F. C., et Andreas Knüpfer. « Further enhancing the in situ visualization of performance data in parallel CFD applications ». PeerJ Computer Science 7 (25 octobre 2021) : e753. http://dx.doi.org/10.7717/peerj-cs.753.

Texte intégral
Résumé :
This paper continues the work initiated by the authors on the feasibility of using ParaView as visualization software for the analysis of parallel Computational Fluid Dynamics (CFD) codes’ performance. Current performance tools have limited capacity of displaying their data on top of three-dimensional, framed (i.e., time-stepped) representations of the cluster’s topology. In our first paper, a plugin for the open-source performance tool Score-P was introduced, which intercepts an arbitrary number of manually selected code regions (mostly functions) and send their respective measurements–amount of executions and cumulative time spent–to ParaView (through its in situ library, Catalyst), as if they were any other flow-related variable. Our second paper added to such plugin the capacity to (also) map communication data (messages exchanged between MPI ranks) to the simulation’s geometry. So far the tool was limited to codes which already have the in situ adapter; but in this paper, we will take the performance data and display it–also in codes without in situ–on a three-dimensional representation of the hardware resources being used by the simulation. Testing is done with the Multi-Grid and Block Tri-diagonal NPBs, as well as Rolls-Royce’s CFD code, Hydra. The benefits and overhead of the plugin's new functionalities are discussed.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Endou, Noboru. « Absolutely Integrable Functions ». Formalized Mathematics 30, no 1 (1 avril 2022) : 31–52. http://dx.doi.org/10.2478/forma-2022-0004.

Texte intégral
Résumé :
Summary The goal of this article is to clarify the relationship between Riemann’s improper integrals and Lebesgue integrals. In previous articles [6], [7], we treated Riemann’s improper integrals [1], [11] and [4] on arbitrary intervals. Therefore, in this article, we will continue to clarify the relationship between improper integrals and Lebesgue integrals [8], using the Mizar [3], [2] formalism.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Kieburg, Mario, et Tim R. Würfel. « Global Symmetries of Naive and Staggered Fermions in Arbitrary Dimensions ». EPJ Web of Conferences 175 (2018) : 04006. http://dx.doi.org/10.1051/epjconf/201817504006.

Texte intégral
Résumé :
It is well-known that staggered fermions do not necessarily satisfy the same global symmetries as the continuum theory. We analyze the mechanism behind this phenomenon for arbitrary dimension and gauge group representation. For this purpose we vary the number of lattice sites between even and odd parity in each single direction. Since the global symmetries are manifest in the lowest eigenvalues of the Dirac operator, the spectral statistics and also the symmetry breaking pattern will be affected. We analyze these effects and compare our predictions with Monte-Carlo simulations of naive Dirac operators in the strong coupling limit. This proceeding is a summary of our work [1].
Styles APA, Harvard, Vancouver, ISO, etc.
39

Pąk, Karol. « Tietze Extension Theorem for n-dimensional Spaces ». Formalized Mathematics 22, no 1 (30 mars 2014) : 11–19. http://dx.doi.org/10.2478/forma-2014-0002.

Texte intégral
Résumé :
Summary In this article we prove the Tietze extension theorem for an arbitrary convex compact subset of εn with a non-empty interior. This theorem states that, if T is a normal topological space, X is a closed subset of T, and A is a convex compact subset of εn with a non-empty interior, then a continuous function f : X → A can be extended to a continuous function g : T → εn. Additionally we show that a subset A is replaceable by an arbitrary subset of a topological space that is homeomorphic with a convex compact subset of En with a non-empty interior. This article is based on [20]; [23] and [22] can also serve as reference books.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Al-Qarra, H. H. « Geometrically nonlinear finite element analysis of sandwich panels ». Aeronautical Journal 92, no 919 (novembre 1988) : 356–64. http://dx.doi.org/10.1017/s0001924000016444.

Texte intégral
Résumé :
Summary A displacement-based versatile and effective finite element analysis of sandwich panels is presented. The analysis is applicable to both small and large deflections. Allowance for the local bending stiffness of the faces is made. The procedure described is readily adapted to arbitrary laminated beams and plates. Selected example problems are given to illustrate the applicability of the formulation.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Lopez-Ortiz, A., S. Angelopoulos et A. M. Hamel. « Optimal Scheduling of Contract Algorithms for Anytime Problem-Solving ». Journal of Artificial Intelligence Research 51 (31 octobre 2014) : 533–54. http://dx.doi.org/10.1613/jair.4360.

Texte intégral
Résumé :
A contract algorithm is an algorithm which is given, as part of the input, a specified amount of allowable computation time. The algorithm must then complete its execution within the allotted time. An interruptible algorithm, in contrast, can be interrupted at an arbitrary point in time, at which point it must report its currently best solution. It is known that contract algorithms can simulate interruptible algorithms using iterative deepening techniques. This simulation is done at a penalty in the performance of the solution, as measured by the so-called acceleration ratio. In this paper we give matching (i.e., optimal) upper and lower bounds for the acceleration ratio under such a simulation. We assume the most general setting in which n problem instances must be solved by means of scheduling executions of contract algorithms in $m$ identical parallel processors. This resolves an open conjecture of Bernstein, Filkenstein, and Zilberstein who gave an optimal schedule under the restricted setting of round robin and length-increasing schedules, but whose optimality in the general unrestricted case remained open. Lastly, we show how to evaluate the average acceleration ratio of the class of exponential strategies in the setting of n problem instances and m parallel processors. This is a broad class of schedules that tend to be either optimal or near-optimal, for several variants of the basic problem.
Styles APA, Harvard, Vancouver, ISO, etc.
42

TERAGUCHI, SHUNSUKE. « REFORMULATION OF BOUNDARY STRING FIELD THEORY IN TERMS OF BOUNDARY STATE ». International Journal of Modern Physics A 23, no 14n15 (20 juin 2008) : 2281–82. http://dx.doi.org/10.1142/s0217751x08041098.

Texte intégral
Résumé :
We reformulate bosonic boundary string field theory in terms of boundary state. In our formulation, we can formally perform the integration of target space equations of motion for arbitrary field configurations without assuming decoupling of matter and ghost. This is a short summary of our contribution to the international workshop "Progress of String Theory and Quantum Field Theory" at Osaka City University (December 7-10, 2007).
Styles APA, Harvard, Vancouver, ISO, etc.
43

Makarchuk, Volodymyr. « DEATH PENALTY IN SO-CALLED DONETSK AND LUHANSK PEOPLES REPUBLICS : ARBITRARY EXCESSES OF PRO-RUSSIAN REBELS OR “BACK TO THE SOURCES” ? » Access to Justice in Eastern Europe 5, no 4-2 (4 novembre 2022) : 1–15. http://dx.doi.org/10.33327/ajee-18-5.4-n000433.

Texte intégral
Résumé :
The article raises the issue of formal “justification” and direct practice of the death penalty in certain areas of Donetsk and Luhansk regions (hereinafter ORDLO) of Ukraine affected by the uprising and subjected to Russian aggression. The first cases of executions of Ukrainian patriots by rebels and their Russian curators (Igor Girkin, Arseniy Pavlov (Motorola), etc.) date back to April 2014. The massacres were carried out mainly out of court – on the orders of field commanders. However, collective courts were seldom held for propaganda purposes, where “saboteurs” and banal marauders and rapists were sentenced by show of hands. In August 2014, the so-called “Criminal Code” was “enacted”, Article 58 of which established the death penalty for “especially serious crimes” without specifying their list. Instead, life imprisonment officially became the highest punishment in the self-proclaimed neighbouring Luhansk People’s Republic. At the same time, the leadership of both “republics” announced that the current legislation of the Russian Federation is taken as the basis of their criminal legislation. Instead, death sentences are handed down and enforced de facto out of court in both the DPR and the LPR. This practice of dividing death sentences into relatively small de jure and mass ones, de facto uncontrolled sentences (by decision of field commanders or security officials), has been characteristic of Soviet practice since the dawn of the 20th century – late 1917 to be precise. The concern of global human rights structures with the issues of observance of the fundamental human right – the right to life – in the ORDLO was reflected in a special Report of the Office of the UN High Commissioner for Human Rights (2020). It is noted that the death penalty is maintained in temporarily occupied territories, and sentences are handed down and enforced.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Nazarov, A. I. « Building an Individual Portrait of the Dynamics of Music Perception Using Time-Frequency Analysis of Summary Skin Potential ». Experimental Psychology (Russia) 14, no 2 (2021) : 198–208. http://dx.doi.org/10.17759/exppsy.2021140214.

Texte intégral
Résumé :
The individual dynamics of the emotional component of the perception of musical melodies was studied. The indicators of emotional status were involuntary reactions of the summary skin potential (SSP) and arbitrary clicks by subjects on the “like” or “dislike” buttons while listening to melodies. The frequency of arbitrary button clicks serves as an indicator of the degree of differentiation (detail) of the conscious perception of various elements of the melody. By digital processing of the SSP, its derivatives were obtained — heart rate, median frequency and the RMS amplitude of the SSP as functions of time, etc. The temporal dynamics of these indicators turned out to be more intense compared to the frequency of pressing, which is explained by the specificity of the interaction between conscious and unconscious levels of perceptions. In connection with the use of several indicators of continuous emotional dynamics, there is a need for their integral representation. An example of such integration is given for two indicators in the form of individual approximating ellipses. In the future, it is planned to use modern computer graphics to solve the problem.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Svishcheva, Gulnara R., Evgeny S. Tiys, Elizaveta E. Elgaeva, Sofia G. Feoktistova, Paul R. H. J. Timmers, Sodbo Zh Sharapov, Tatiana I. Axenovich et Yakov A. Tsepilov. « A Novel Framework for Analysis of the Shared Genetic Background of Correlated Traits ». Genes 13, no 10 (21 septembre 2022) : 1694. http://dx.doi.org/10.3390/genes13101694.

Texte intégral
Résumé :
We propose a novel effective framework for the analysis of the shared genetic background for a set of genetically correlated traits using SNP-level GWAS summary statistics. This framework called SHAHER is based on the construction of a linear combination of traits by maximizing the proportion of its genetic variance explained by the shared genetic factors. SHAHER requires only full GWAS summary statistics and matrices of genetic and phenotypic correlations between traits as inputs. Our framework allows both shared and unshared genetic factors to be effectively analyzed. We tested our framework using simulation studies, compared it with previous developments, and assessed its performance using three real datasets: anthropometric traits, psychiatric conditions and lipid concentrations. SHAHER is versatile and applicable to summary statistics from GWASs with arbitrary sample sizes and sample overlaps, allows for the incorporation of different GWAS models (Cox, linear and logistic), and is computationally fast.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Savin, Anton. « The Friedrichs Extension of Elliptic Operators with Conditions on Submanifolds of Arbitrary Dimension ». Mathematics 12, no 3 (27 janvier 2024) : 418. http://dx.doi.org/10.3390/math12030418.

Texte intégral
Résumé :
We describe the Friedrichs extension of elliptic symmetric pseudodifferential operators on a closed smooth manifold with the domain consisting of functions vanishing on a given submanifold. In summary, the Friedrichs extension is an elliptic Sobolev problem defined in terms of boundary and coboundary operators, and the number of boundary and coboundary conditions in the problem depends on the order of the operator and the codimension of the submanifold. In this paper, the discreteness of the spectrum is proved, and singularities of eigenfunctions are described.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Dukalski, Marcin, Elisa Mariani et Koos de Vos. « Handling short-period scattering using augmented Marchenko autofocusing ». Geophysical Journal International 216, no 3 (2 janvier 2019) : 2129–33. http://dx.doi.org/10.1093/gji/ggy544.

Texte intégral
Résumé :
SUMMARY Marchenko autofocusing constructs arbitrary acoustic wavefields inside an unknown heterogeneous medium from a single-sided, bandlimited in practice, reflection response by solving the Marchenko equation. Presence of short-period scattering leads to erroneous solutions and therefore incorrect medium characterization. We show that augmenting this equation with energy conservation and minimum phase conditions enables to correct these erroneous solutions, and thus it removes the long-/short-period timescale separation and solves this long standing problem.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Augusto, Antônio, et Cançado Trindade. « Enforced Disappearances of Persons as a Violation of Jus Cogens : The Contribution of the Jurisprudence of the Inter-American Court of Human Rights ». Nordic Journal of International Law 81, no 4 (2012) : 507–36. http://dx.doi.org/10.1163/15718107-08104005.

Texte intégral
Résumé :
The consolidation of the international regime of absolute prohibitions (belonging to the domain of jus cogens) of torture, summary and extra-legal executions, and enforced disappearances of persons has counted on the contribution of the case-law of contemporary international tribunals, such as, notably, the Inter-American Court of Human Rights (IACtHR). The jurisprudential construction of the IACtHR to this effect has taken place mainly in the period 1999–2004. The IACtHR began by addressing issues pertaining to its competence ratione temporis, duly distinguishing their bearing on responsibility and jurisdiction. The IACtHR singled out the aggravating circumstances surrounding enforced disappearances of persons, bringing about the enlargement of the notion of victim (comprising the next of kin). The IACtHR duly acknowledged and asserted the absolute prohibitions of jus cogens in the conformation of an international legal regime against grave violations of human rights and international humanitarian law (such as enforced disappearances of persons). The IACtHR became the first contemporary international tribunal, in this connection, to sustain that the enlarged material content of jus cogens encompasses nowadays the victims’ right of access to justice lato sensu, properly understood as the imperative of the realisation of objective or material justice.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Koene, Erik F. M., Johan O. A. Robertsson et Fredrik Andersson. « A consistent implementation of point sources on finite-difference grids ». Geophysical Journal International 223, no 2 (14 août 2020) : 1144–61. http://dx.doi.org/10.1093/gji/ggaa383.

Texte intégral
Résumé :
SUMMARY We present a method to position point sources at arbitrary locations on finite-difference (FD) grids. We show that implementing point sources on single nodes can cause considerable errors when modelling with the FD method. In contrast, we propose to create a spatially distributed source (over multiple nodes) that nonetheless creates the desired point-source response. The spatial point source is formulated in the wavenumber domain and is based on the FD coefficients used for the wave propagation. Using this ‘FD-consistent source’ on 1-D and 2-D examples, we show that we can obtain superior fits to analytical solutions compared to single-node or sinc-function source implementations, and we show that sources can be offset to arbitrary locations from ‘on’ the grid to ‘off’ the grid, while resulting in solutions that are identical to within machine precision
Styles APA, Harvard, Vancouver, ISO, etc.
50

Martinussen, Torben, et Stijn Vansteelandt. « Instrumental variables estimation with competing risk data ». Biostatistics 21, no 1 (14 août 2018) : 158–71. http://dx.doi.org/10.1093/biostatistics/kxy039.

Texte intégral
Résumé :
Summary Time-to-event analyses are often plagued by both—possibly unmeasured—confounding and competing risks. To deal with the former, the use of instrumental variables (IVs) for effect estimation is rapidly gaining ground. We show how to make use of such variables in competing risk analyses. In particular, we show how to infer the effect of an arbitrary exposure on cause-specific hazard functions under a semi-parametric model that imposes relatively weak restrictions on the observed data distribution. The proposed approach is flexible accommodating exposures and IVs of arbitrary type, and enabling covariate adjustment. It makes use of closed-form estimators that can be recursively calculated, and is shown to perform well in simulation studies. We also demonstrate its use in an application on the effect of mammography screening on the risk of dying from breast cancer.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie