Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: PERMISSIONS COMPARISON.

Artykuły w czasopismach na temat „PERMISSIONS COMPARISON”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „PERMISSIONS COMPARISON”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

AlJarrah, Mohammed N., Qussai M. Yaseen i Ahmad M. Mustafa. "A Context-Aware Android Malware Detection Approach Using Machine Learning". Information 13, nr 12 (30.11.2022): 563. http://dx.doi.org/10.3390/info13120563.

Pełny tekst źródła
Streszczenie:
The Android platform has become the most popular smartphone operating system, which makes it a target for malicious mobile apps. This paper proposes a machine learning-based approach for Android malware detection based on application features. Unlike many prior research that focused exclusively on API Calls and permissions features to improve detection efficiency and accuracy, this paper incorporates applications’ contextual features with API Calls and permissions features. Moreover, the proposed approach extracted a new dataset of static API Calls and permission features using a large dataset of malicious and benign Android APK samples. Furthermore, the proposed approach used the Information Gain algorithm to reduce the API and permission feature space from 527 to the most relevant 50 features only. Several combinations of API Calls, permissions, and contextual features were used. These combinations were fed into different machine-learning algorithms to show the significance of using the selected contextual features in detecting Android malware. The experiments show that the proposed model achieved a very high accuracy of about 99.4% when using contextual features in comparison to 97.2% without using contextual features. Moreover, the paper shows that the proposed approach outperformed the state-of-the-art models considered in this work.
Style APA, Harvard, Vancouver, ISO itp.
2

Aftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, Oluwasanmi Ariyo, Zakria, Ngo Tung Son i Tran Van Dinh. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model". Symmetry 11, nr 5 (15.05.2019): 669. http://dx.doi.org/10.3390/sym11050669.

Pełny tekst źródła
Streszczenie:
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is added to the access control models, which is famous for its dynamic behavior. Separation of duty (SOD) is used for enforcing least privilege concept in RBAC and ABAC. Moreover, SOD is a powerful tool that is used to protect an organization from internal security attacks and threats. Different problems have been found in the implementation of SOD at the role level. This paper discusses that the implementation of SOD on the level of roles is not a good option. Therefore, this paper proposes a hybrid access control model to implement SOD on the basis of permissions. The first part of the proposed model is based on the addition of attributes with dynamic characteristics in the RBAC model, whereas the second part of the model implements the permission-based SOD in dynamic RBAC model. Moreover, in comparison with previous models, performance and feature analysis are performed to show the strength of dynamic RBAC model. This model improves the performance of the RBAC model in terms of time, dynamicity, and automatic permissions and roles assignment. At the same time, this model also reduces the administrator’s load and provides a flexible, dynamic, and secure access control model.
Style APA, Harvard, Vancouver, ISO itp.
3

Kumar, Naveen, i Dr Gopal Singh. "The Performance Analysis of Optimized Integrated Framework for Smart Grid". Indian Journal of Signal Processing 2, nr 3 (30.08.2022): 1–4. http://dx.doi.org/10.54105/ijsp.d1010.082322.

Pełny tekst źródła
Streszczenie:
Supervisory Control and Data Acquisition system are monitoring and controlling system. It focuses on the supervisory level, not the full control permissions. It is gathering real-time data with the help of several kinds of sensors. Internet of Things (IoT) is a three-dimension any time, any place anything connectivity for anything. This paper performing the comparison between the SCADA and optimization framework for smart grid. A power quality model is integrated with the optimization framework. Moreover, this paper focused on the comparison of optimized framework with SCADA.
Style APA, Harvard, Vancouver, ISO itp.
4

Zhao, Bin, Guiyue Zheng, Yilong Gao i Yanchen Zhao. "Access-Control Model of Super Business System Based on Business Entity". Electronics 11, nr 19 (27.09.2022): 3073. http://dx.doi.org/10.3390/electronics11193073.

Pełny tekst źródła
Streszczenie:
To address the problem that the traditional access-control model is no longer suitable for access control and authorization in the super business system—which has the characteristics of many businesses and complex permissions—a business entity-based access-control model (BE-BAC) is proposed in this paper. The BE-BAC model realizes the relationship between users, business entities, and business permissions. Firstly, according to the characteristics of the super business system, the concept of business entity is put forward, introducing the composition and relationship of the business entity. Secondly, the business entity is introduced into the access-control model, formally describing the basic relationship, constraint, mapping, and authorization strategy of the BE-BAC model. Finally, the access-control workflow, based on the business entity, is designed, and the security analysis and comprehensive comparison of the model are carried out. Compared with the existing access-control model, the BE-BAC model has higher security and flexibility, and better protects resources, through more secure access-request decisions.
Style APA, Harvard, Vancouver, ISO itp.
5

Zhang, Shijia, Yilin Liu i Mahanth Gowda. "I Spy You". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, nr 4 (21.12.2022): 1–31. http://dx.doi.org/10.1145/3569486.

Pełny tekst źródła
Streszczenie:
This paper presents iSpyU, a system that shows the feasibility of recognition of natural speech content played on a phone during conference calls (Skype, Zoom, etc) using a fusion of motion sensors such as accelerometer and gyroscope. While microphones require permissions from the user to be accessible by an app developer, the motion sensors are zero-permission sensors, thus accessible by a developer without alerting the user. This allows a malicious app to potentially eavesdrop on sensitive speech content played by the user's phone. In designing the attack, iSpyU tackles a number of technical challenges including: (i) Low sampling rate of motion sensors (500 Hz in comparison to 44 kHz for a microphone). (ii) Lack of availability of large-scale training datasets to train models for Automatic Speech Recognition (ASR) with motion sensors. iSpyU systematically addresses these challenges by a combination of techniques in synthetic training data generation, ASR modeling, and domain adaptation. Extensive measurement studies on modern smartphones show a word level accuracy of 53.3 - 59.9% over a dictionary of 2000-10000 words, and a character level accuracy of 70.0 - 74.8%. We believe such levels of accuracy poses a significant threat when viewed from a privacy perspective.
Style APA, Harvard, Vancouver, ISO itp.
6

Baker, Paul, i Rachelle Vessey. "A corpus-driven comparison of English and French Islamist extremist texts". International Journal of Corpus Linguistics 23, nr 3 (29.10.2018): 255–78. http://dx.doi.org/10.1075/ijcl.17108.bak.

Pełny tekst źródła
Streszczenie:
Abstract Using corpus linguistics and qualitative, manual discourse analysis, this paper compares English and French extremist texts to determine how messages in different languages draw upon similar and distinct discursive themes and linguistic strategies. Findings show that both corpora focus on religion and rewards (i.e. for faith) and strongly rely on othering strategies. However, the English texts are concerned with world events whereas the French texts focus on issues specific to France. Also, while the English texts use Arabic code-switching as a form of legitimation, the French texts use a formal register and quotation from scripture in discussions of permissions, rights, obligations and laws. Finally, the English texts refer to and justify violence to a greater extent than the French texts. This paper contributes to the field of terrorism studies and the field of corpus linguistics by presenting a new approach to corpus-driven studies of discourse across more than one language.
Style APA, Harvard, Vancouver, ISO itp.
7

Karali, Mehmet Akif, i Özkan Ginesar. "Investigation of Social Studies Teacher Candidates’ Attitudes Towards Renewable Energy Sources". Open Journal for Educational Research 7, nr 1 (30.05.2023): 13–22. http://dx.doi.org/10.32591/coas.ojer.0701.02013k.

Pełny tekst źródła
Streszczenie:
This research was prepared in order to examine the attitudes of social studies teacher candidates towards renewable energy sources in terms of various variables. Convenient sampling, one of the purposeful sampling methods, was preferred in the research and the sample group of the research consists of 250 teacher candidates, who are the last level students of universities who teach social studies. In the research, the data were collected by taking the necessary permissions and transferring the scale used to the online environment, taking into account the cost and economic conditions. The Attitude Scale Towards Renewable Energy Sources developed by T. Güneş, K. Alat, and A. İ. C. Gözüm, was used after obtaining the necessary permissions. In addition, the demographic information form prepared by taking the necessary expert opinion within the scope of this research was used as a data collection tool in the research. The Attitude Scale Towards Renewable Energy Sources used in the research was prepared in a 5-point Likert type consisting of 26 items. The causal comparison design, which is among the quantitative methods, was preferred in the research. The data obtained in the study were analyzed using independent groups t-test and one-way analysis of variance (ANOVA).
Style APA, Harvard, Vancouver, ISO itp.
8

Chen, Yanji, Mieczyslaw M. Kokar, Jakub Moskal i Kaushik R. Chowdhury. "Metrics-Based Comparison of OWL and XML for Representing and Querying Cognitive Radio Capabilities". Applied Sciences 12, nr 23 (23.11.2022): 11946. http://dx.doi.org/10.3390/app122311946.

Pełny tekst źródła
Streszczenie:
Collaborative spectrum access requires wireless devices to perform spectrum-related tasks (such as sensing) on request from other nodes. Thus, while joining the network, they need to inform neighboring devices and/or the central coordinator of their capabilities. During the operational phase, nodes may request other permissions from the the controller, like the opportunity to transmit according to the current policies and spectrum availability. To achieve such coordinated behavior, all associated devices within the network need a language for describing radio capabilities, requests, scenarios, policies, and spectrum availability. In this paper, we present a thorough comparison of the use of two candidate languages—Web Ontology Language (OWL) and eXtensible Markup Language (XML)—for such purposes. Towards this goal, we propose an evaluation method for automating quantitative comparisons with metrics such as precision, recall, device registration, and the query response time. The requests are expressed in both SPARQL Protocol and RDF Query Language (SPARQL) and XML Query Language (XQuery), whereas the device capabilities are expressed in both OWL and XML. The evaluation results demonstrate the advantages of using OWL semantics to improve the quality of matching results over XML. We also discuss how the evaluation method can be applicable to other scenarios where knowledge, datasets, and queries require richer expressiveness and semantics.
Style APA, Harvard, Vancouver, ISO itp.
9

Coşkun, Kerem, i Cihan Kara. "What Happens During Teacher–Student Interaction in the First Year of Primary School? A New Explanation". SAGE Open 10, nr 2 (kwiecień 2020): 215824402092656. http://dx.doi.org/10.1177/2158244020926566.

Pełny tekst źródła
Streszczenie:
The present research aims to develop a theory on teacher–student interaction in the first year of primary school period. The present research was designed in grounded theory research which is one of the qualitative research traditions. A total of 18 primary school children started the first year of primary school. Data were collected through participant observation. Participant observation was launched after all necessary ethical permissions were taken from local education authority, the participant children, their teacher, and parents. Data were analyzed through constant comparison within three stages as open coding, axial coding, and selective coding. It was reported that the teacher and the first graders mutually developed strategies and there were several circumstances in the interaction that nested behavioral problems.
Style APA, Harvard, Vancouver, ISO itp.
10

Ekaputri, Januarti Jaya, i M. Shahib Al Bari. "The comparison of regulations on fly ash as a hazardous waste in Indonesia and several countries". MEDIA KOMUNIKASI TEKNIK SIPIL 26, nr 2 (2.02.2021): 150–62. http://dx.doi.org/10.14710/mkts.v26i2.30762.

Pełny tekst źródła
Streszczenie:
This paper aims to encourage the Indonesian government to review the 2014 Government Regulation (PP) number 101 related to coal-ash. Fly ashes at power plants overload the landfills and requires complete handling solution. The utilization of fly ash in Indonesia are facing the issues, one of these is the categorization of fly ash as a hazardous waste. As a result, its utilization requires permissions from the ministry of environment and forestry. In this paper, a comparative study of fly ash classification as hazardous waste in India, United States of America, China and Vietnam was conducted. India and China are the coal importer from Indonesia. US regulation was once referred when drafting PP number 101. Vietnam is chosen as comparison in Southeast Asia. The Toxicity Characteristic Leaching Procedure (TCLP) results of fly ashes from 16 Indonesian power plants proved that their toxic content was lower than the TCLP parameters in the regulation. Acute Oral Toxicity Test (LD50) results showed that fly ash and bottom ash with dosage up to 7000 mg/kg did not cause fatalities. This study is a reference for the Indonesian government to verify the status of fly ash to be utilized as much as possible in various fields.
Style APA, Harvard, Vancouver, ISO itp.
11

Iskandar, Akbar, Elisabet Virma i Ansari Saleh Ahmar. "Implementing DMZ in Improving Network Security of Web Testing in STMIK AKBA". International Journal of Engineering & Technology 7, nr 2.3 (8.03.2018): 99. http://dx.doi.org/10.14419/ijet.v7i2.3.12627.

Pełny tekst źródła
Streszczenie:
The aims of this research are to design and to implement network security system in internal web testing using DeMilitarized Zone Method and Microtic Router on Siakad server of STMIK AKBA. Data analysis techniques that possible to use is descriptive method. The significances of the study are 1) to avoid the attack of cracker who intend to access the system without permissions and 2) to improve network securityon web testing services on Siakad server of STMIK AKBA. The data are obtained by having literature review and observation. Literature review assists the researchers to collect the theory on DeMilitarised Zone Method and the previous studies which were used as comparison to the recent study. Obervation was carried out directly to the field to observe the running system. Based on the results and discussion, it is shown that the aplication of DeMilitarized Zone Method on microtic can secure the web testing on Siakad server of STMIK AKBA and can maintain the whole series of online services that are available in the server.
Style APA, Harvard, Vancouver, ISO itp.
12

Bağış, Yunus Emre. "Comparison of Strength Values of Professional Footballers According to Their Positions before Football Season". Journal of Educational Issues 6, nr 1 (28.06.2020): 395. http://dx.doi.org/10.5296/jei.v6i1.17133.

Pełny tekst źródła
Streszczenie:
The purpose of the present study was to compare the strength values of professional footballers according to their positions before the football season. The study group consisted of 27 professional footballers of Şanlıurfaspor Football Club in the 2nd League of Turkey. The mean height of the Study Group was 180.92±6.18 (cm), mean body weight was 80.18±1.5 (kg), and the mean age was 26.40±4.4 (years). The inclusion criteria for the study was being volunteers, and the necessary permissions were obtained from the players, club managers and coaches. The Precor-brand device was used to measure the differences of strengths according to the positions of the footballers. “1 RM” measurements were made from shoulder press, latt pully, leg curl, leg extension, and leg press machines in the footballers. The SPSS 24.00 Program was used in the statistical analysis of the study data. The descriptive statistics were given as mean, standard deviation, and minimum and maximum values. The normality test of the data was analyzed with the Shapiro-Wilk Test. One-Way Anova Test was used to identify the differences between the players and the positions. The significance level was determined as 0.05. According to the results obtained in the study, no significant differences were detected in strength values between goalkeeper, defender, midfielder, and striker positions (p > 0.05). As a result, among the biomotoric properties, strength is important, and quite necessary for a footballer to perform at a high level. These values obtained from 2nd League football players are important for being taken as reference values, and it can be argued that these values obtained in the pre-season prepared the basis for the lack of qualitative differences. In future studies, data that will be obtained from different league levels and training stages will lead to research being considered differently.
Style APA, Harvard, Vancouver, ISO itp.
13

Aliyu, Kehinde Adekunle, Jamaludin Mustaffa i Norruzeyati CheMohd Nasir. "Issues Affecting the Effectiveness of Rehabilitation Programme in Oke Kura Prison, Kwara State, Nigeria". IRA-International Journal of Management & Social Sciences (ISSN 2455-2267) 8, nr 1 (5.08.2017): 74. http://dx.doi.org/10.21013/jmss.v8.n1.p8.

Pełny tekst źródła
Streszczenie:
<p>Issues affecting the effectiveness of rehabilitation programme of the inmate, have important implications on the public safety after inmates are released from the prison. Many studies have been conducted on prisons environment effects, some investigating disciplinary methods and some exploring rehabilitation managements. Methodical evaluations of those studies, while varying greatly in exposure and method, display remarkable consistency in their overall findings. Administration and permissions, at best, show modest mean decreases in recidivism of inmate and, in some occurrences, have the differing effect and increase re-offense degrees. The way and manner recidivism effects found in studies of rehabilitation treatment, by comparison, are consistently positive and relatively large. There is, however, considerable inconsistency in those effects associated with the rehabilitation treatment, how well it is employed, and the nature of the inmates to whom it is applied. The specific sources of that inconsistency have not been well explored, but some principles for effective rehabilitation have emerged. The rehabilitation treatments generally found effective in research do not characterize existing practice of rehabilitation, and bridging the gap between research and practice residues noteworthy issues.</p>
Style APA, Harvard, Vancouver, ISO itp.
14

Habib, Muhammad Asif, C. M. Nadeem Faisal, Shahzad Sarwar, Muhammad Ahsan Latif, Farhan Aadil, Mudassar Ahmad, Rehan Ashraf i Muazzam Maqsood. "Privacy-based medical data protection against internal security threats in heterogeneous Internet of Medical Things". International Journal of Distributed Sensor Networks 15, nr 9 (wrzesień 2019): 155014771987565. http://dx.doi.org/10.1177/1550147719875653.

Pełny tekst źródła
Streszczenie:
Data and information security is considered to be an important and challenging task for any field of life. But it becomes more critical especially when it deals with the medical field due to life and health hazards. The ratio of internal security threats to external threats always remains high. A huge number of efforts and technical expertise are required in the case of attacking the system from the external environment. But it requires fewer efforts if a system is attacked internally by the stakeholders of the system. This article presents an access control model that secures the medical data of patients against internal cybersecurity threats. It allows only the legitimate users, that is, authorized patients and doctors to communicate despite the fact of physical boundaries. The proposed model implements authorization in combination with permissions and roles instead of roles only for medical staff. It removes the discrepancies in the existing access control models. The proposed model ensures communication among doctors and patients in a secure, private, and efficient manner. The model is demonstrated by using mathematical modeling along with implementation examples. The proposed model outperformed in comparison with state-of-the-art access control models.
Style APA, Harvard, Vancouver, ISO itp.
15

Venčkauskas, Algimantas, Donatas Kukta, Šarūnas Grigaliūnas i Rasa Brūzgienė. "Enhancing Microservices Security with Token-Based Access Control Method". Sensors 23, nr 6 (22.03.2023): 3363. http://dx.doi.org/10.3390/s23063363.

Pełny tekst źródła
Streszczenie:
Microservices are compact, independent services that work together with other microservices to support a single application function. Organizations may quickly deliver high-quality applications using the effective design pattern of the application function. Microservices allow for the alteration of one service in an application without affecting the other services. Containers and serverless functions, two cloud-native technologies, are frequently used to create microservices applications. A distributed, multi-component program has a number of advantages, but it also introduces new security risks that are not present in more conventional monolithic applications. The objective is to propose a method for access control that ensures the enhanced security of microservices. The proposed method was experimentally tested and validated in comparison to the centralized and decentralized architectures of the microservices. The obtained results showed that the proposed method enhanced the security of decentralized microservices by distributing the access control responsibility across multiple microservices within the external authentication and internal authorization processes. This allows for easy management of permissions between microservices and can help prevent unauthorized access to sensitive data and resources, as well as reduce the risk of attacks on microservices.
Style APA, Harvard, Vancouver, ISO itp.
16

Özbey, Harun, i İlknur Kahriman. "Increasing awareness about the neonatal care of fathers whose babies are hospitalized in neonatal intensive care unit". Clinical Nursing Studies 6, nr 3 (11.04.2018): 72. http://dx.doi.org/10.5430/cns.v6n3p72.

Pełny tekst źródła
Streszczenie:
Objective: This research was conducted to determine the efficiency of the training given to the fathers whose babies were hospitalized in the neonatal intensive care unit regarding the improvement of awareness about “Newborn Care” and to develop their awareness about it.Methods: In this experimental study including pre/post tests and control group, the fathers in the experimental group were given theoretical training and brochures about neonatal care. No training was provided to the fathers in the control group. They were only given visually enriched brochures. The data were collected using a father identification form and an information form including questions to determine the knowledge levels of the fathers level about newborn care. In the analysis of the data, numbers, percentages, distributions, Wilcoxon test for the comparison of pre/post training scores, Mann-Whitney U test for the comparison of two independent groups, and chi-square test for the comparison of socio-demographic characteristics of fathers were used. The significance level was accepted as p < .05. Institutional and ethics committee permissions were obtained for the research.Results: While pre-training knowledge scores of the fathers in the experimental and control groups were 12.24 ± 12.24 and 12.48 ± 8.46 respectively, their post training scores increased up to 42.98 ± 3.70 and 18.60 ± 6.05 and the difference between them was statistically significant (Z = -6.157, p = .00; Z = -5.297, p = .00). When the experimental and control groups were compared in terms of knowledge scores, while the pre-training scores were found similar, the post training scores in the experimental group were significantly higher than those of the control group (p = .23, p = .00, respectively).Conclusions: According to these data, the training given to the fathers was found to be effective and their awareness of basic new born care increased.
Style APA, Harvard, Vancouver, ISO itp.
17

Spiekermann, Daniel, i Jörg Keller. "Requirements for Crafting Virtual Network Packet Captures". Journal of Cybersecurity and Privacy 2, nr 3 (6.07.2022): 516–26. http://dx.doi.org/10.3390/jcp2030026.

Pełny tekst źródła
Streszczenie:
Currently, network environments are complex infrastructures with different levels of security, isolation and permissions. The management of these networks is a complex task, faced with different issues such as adversarial attacks, user demands, virtualisation layers, secure access and performance optimisation. In addition to this, forensic readiness is a demanded target. To cover all these aspects, network packet captures are used to train new staff, evaluate new security features and improve existing implementations. Because of this, realistic network packet captures are needed that cover all appearing aspects of the network environment. Packet generators are used to create network traffic, simulating real network environments. There are different network packet generators available, but there is no valid rule set defining the requirements targeting packet generators. The manual creation of such network traces is a time-consuming and error-prone task, and the inherent behaviour of virtual networks eradicates a straight-forward automation of trace generation in comparison to common networks. Hence, we analyse relevant conditions of modern virtualised networks and define relevant requirements for a valid packet generation and transformation process. From this, we derive recommendations for the implementation of packet generators that provide valid and correct packet captures for use with virtual networks.
Style APA, Harvard, Vancouver, ISO itp.
18

Kadhim, Hakim Adil, Nabeel Salih Ali i Dheyaa Mohammed Abdulsahib. "Management and archiving system for metal detection robot using wireless-based technology and online database registry". International Journal of Power Electronics and Drive Systems (IJPEDS) 10, nr 1 (1.03.2019): 219. http://dx.doi.org/10.11591/ijpeds.v10.i1.pp219-229.

Pełny tekst źródła
Streszczenie:
<p class="JESTECStyleBodyTextIndentComplex10ptFirstline"><span>The tremendous recent involvement of technology in our life generates a lot of advantages and disadvantages. Nevertheless, and to profoundly augment its positive influence, at the expense of the negatives, most technology be deployed to serve humanity and society. Researchers attractive in developing robust and cooperative robotics that capable of solving difficult tasks without any human control. Metal detector robot is one of the robotics principles due to its effectiveness as compared with manually operated and very slow traditional methods. In this article, three main points that are concentrated 1) Design a robot which is vehicle-mounted sensors that capable of carries the sensors of the metal and obstacle; 2) Control and management system wirelessly by a computer-based to command the robot functions by several sets of user’s rules and manage the robot instructions; and 3) Conduct an integrated system that achieving navigated data via metal detector based on online structured query language database registry. Also, discussed a comparison of the previous detector systems and highlights on several merits. The proposed system capable of fully control the robot also, set the robot operator permissions and rules, stored and archived the navigated results and printed reports and stored in an independent database.</span></p>
Style APA, Harvard, Vancouver, ISO itp.
19

Fedorchenko, Volodymyr, Andrii Poliakov i Сєвєрінов Sievierinov. "Analyzing the efficiency of technologies for developing mobile applications for Android OS". Bulletin of Kharkov National Automobile and Highway University, nr 96 (24.05.2022): 81. http://dx.doi.org/10.30977/bul.2219-5548.2022.96.0.81.

Pełny tekst źródła
Streszczenie:
Problem. Mobile application development is quite a complex process that requires developers with high expertise in a particular development platform for Android. There are also several singleplatform, cross-platform, Xamarin development platforms but there is no comparison of their performance as with native ones. Methodology. As a method, it is proposed to use an experimental approach in which a mobile application is developed with the necessary components, and then the performance of the profiler on the metrics of CPU usage, memory, power consumption and network is investigated. Results. According to the study, the Xamarin platform has additional restrictions on permissions, requires more resources, both memory and power, which can be felt in large applications, but allows you to attract a large community of .Net developers. Originality. This approach to the analysis of productivity will reveal at a preliminary stage the problematic aspects of the mobile development platform, its integration with native Android services, as well as possible user preferences. Practical value. The proposed technique will introduce a preliminary analysis of the various components integrated into the Android OS. This approach will provide a more reasonable management decision for the full process of developing mobile applications for Android OS, considering such criteria as speed of development, professional level of developers to be involved in the development process, application integration with Android components, integration of new functionality to the application and others.
Style APA, Harvard, Vancouver, ISO itp.
20

Salgot, Miquel, i Alba Pascual. "Existing guidelines and regulations in Spain on wastewater reclamation and reuse". Water Science and Technology 34, nr 11 (1.12.1996): 261–67. http://dx.doi.org/10.2166/wst.1996.0288.

Pełny tekst źródła
Streszczenie:
One of the points to take into account when the implementation of a wastewater reclamation and reuse project is planned is the absence or the existence of clear regulations. In Spain, the Government issued ten years ago one Law and one Decree where wastewater reuse was indicated as a possibility, and a minimal statement appeared, indicating the need for an administrative concession and a compulsory report of the Health Authorities. An indication was made that further legal developments would be needed. There is a bright future for wastewater reuse in Spain, but at present it is compromised, owing to the fact that the projects are appearing and a lot of difficulties arise because of the need for a more complete legal definition. In Spain there is a strong tendency to decentralise the Administration and give more power to the “Autonomous Governments” (Regional Governments: 17 in the whole country). The decisions and permissions for wastewater reuse are given now case per case depending on the Regional Administrations. Since it is difficult to get such approvals without having definite legal health regulations, several Regional Health Authorities have decided to develop their own guidelines for wastewater reuse for irrigation. At the moment (June 1995) 3 guidelines are operative. The authors describe these three guidelines and discuss their development and the main ideas included. The three approaches are really different in conception and a comparison is made between them as well as with regulations in the Mediterranean Basin and other countries.
Style APA, Harvard, Vancouver, ISO itp.
21

Salata, Stefano, Elisabetta Peccol i Oscar Borsato. "A Framework to Evaluate Land Take Control Policy Efficiency in Friuli Venezia Giulia, Italy". Sustainability 11, nr 22 (14.11.2019): 6406. http://dx.doi.org/10.3390/su11226406.

Pełny tekst źródła
Streszczenie:
The development of effective policies against land take should be based on a deep knowledge of the specific land use dynamics and their determinants in a regional context. To this end, the traditional quantitative land use change analyses need to be integrated with a more accurate spatial and qualitative evaluation of the effects of the land use zoning of municipal land development plans and of the connected supplementary regulations (e.g., local building regulations). Land take limitation policies in Italy are largely based on the definition of quantitative thresholds for new development zones, while ignoring all those undeveloped zones that have been assigned building rights codes by plans of which the knowledge could largely impact policies. This paper attempted to define a conceptual framework of analysis which integrates a land use change assessment with an analysis in a Geographic Information System (GIS) environment of the spatial distribution of normative zones. The method was tested on the Friuli Venezia Giulia region (north-east Italy)—a territory that has experienced rapid growth in recent decades—by analyzing the spatial impact of the recently promulgated regional laws on land take control, the explicit and specific purpose of which was to limit commercial and industrial land use in the whole region. The soil sealing data were analyzed by performing a cross-comparison with the building rights permissions data, thus achieving a comprehensive evaluation of the past and predicted land take for commercial and industrial uses. Results demonstrated that the expected land take will exceed the past urbanization rate, highlighting a substantial inefficacy of the promulgated regional laws in promoting local land take control. The main innovations of this study relate to the definition of a newer qualitative methodology for framing an efficient decision-making supporting system, while helping to achieve the long-term sustainability of policies.
Style APA, Harvard, Vancouver, ISO itp.
22

Li, Huilong, i Xiping Sun. "Design and Implementation of Internet of Things Technology in College Students’ Innovation and Entrepreneurship Integration System". Computational Intelligence and Neuroscience 2022 (10.06.2022): 1–10. http://dx.doi.org/10.1155/2022/3624413.

Pełny tekst źródła
Streszczenie:
In order to improve the operation efficiency of the innovation and entrepreneurship integration system of college students, this document proposes to formulate and implement the innovation and entrepreneurship integration system of college students based on “Internet technology.” The web front end is implemented by Django technology, the back end is developed by Apache server pycharm, the database is written in Python, and the database is MySQL. The system meets the expected objectives of implementing, monitoring, and managing innovation and entrepreneurship projects. How the system realizes the functions of repeated comparison projects, easy tracking projects, and fast search, and how managers can make progress at any time. By creating different account function permissions, the system realizes the login, declaration, management, and other functions required by the users of the innovation and entrepreneurship project management system. It is very suitable for college students to improve the project application, information review, and application process. At the same time, it is helpful to supervise and select teachers and greatly improve management efficiency. The test results show that the minimum values of 30, 80, and 150 simulated users in the system performance test are 4, 5, and 7, respectively. The maximum users of the system performance test model are 30, 80, 150, 64, 284, and 398. The system performance tests are taken under the conditions of 30, 80, and 150 user bandwidth, with the results of 113/min, 104/min, and 90/min. The system basically meets the daily work management standards and fully achieves the expected system design goals. The development and use of this system are related to the development of college students’ innovation and entrepreneurship project management and have a clear reference for the development of innovation and entrepreneurship project management systems similar to manage workflow in the future.
Style APA, Harvard, Vancouver, ISO itp.
23

Sliusar, Svitlana. "BUSINESS IN MODERN CONDITIONS OF MANAGEMENT". Baltic Journal of Economic Studies 5, nr 2 (13.05.2019): 206. http://dx.doi.org/10.30525/2256-0742/2019-5-2-206-213.

Pełny tekst źródła
Streszczenie:
The paper’s purpose is to provide recommendations for carrying out theoretical bases of existence, the analysis of the current state and the prospects of development of business in Ukraine. Methodology. During the writing of the article, the following research methods were used: the search for available methodological and scientific literature, comparison, clarification of causal relationships, systematization, analysis of documentation and results of researchers’ work on the problem of the conducted research and expert evaluation. Results. Business development is very difficult and multidimensional, and the influence of many factors on small and medium business entities and is ambiguous and, therefore, demands further complex evidence-based analysis. It concerns such aspects of a research as: a research of positive processes in the conditions of making shifts in infrastructure, which cause the accelerated development of small and medium business entities and its social and economic consequences; deeper determination of regularities of formation and development of small business as one of structure-forming factors of market economy of Ukraine; improvement of the organizational and economic mechanism of the state support of small and medium business in Ukraine and also in its certain regions and spheres of action. Practical implications. It is noticed, there are positive shifts in the course of improvement of conditions of business because of the reduction of a number of permitting documents and licensing types, simplification of procedures for obtaining licenses and permissions, reduction of the controlling pressure upon business, improvement of the sphere of providing administrative services, strengthening of responsibility for violation of the legislation in the sphere of economic activity. Value/originality. In the article, the latest statistical data are used according to the analysis of the current state of functioning of business in Ukraine, problems and the directions of development of small and medium business in Ukraine are selected.
Style APA, Harvard, Vancouver, ISO itp.
24

Wagstaff, Duncan, S. Ramani Moonesinghe, Naomi J. Fulop i Cecilia Vindrola-Padros. "Qualitative process evaluation of the Perioperative Quality Improvement Programme (PQIP): study protocol". BMJ Open 9, nr 7 (lipiec 2019): e030214. http://dx.doi.org/10.1136/bmjopen-2019-030214.

Pełny tekst źródła
Streszczenie:
IntroductionThe Perioperative Quality Improvement Programme (PQIP) is designed to measure complications after major elective surgery and improve these through feedback of data to clinicians. Previous research suggests that despite the significant resources which go into collecting data for national clinical audits, the information they contain is not always used effectively to improve local services.Methods and analysisWe will conduct a formative process evaluation of PQIP comprising a multisited qualitative study to analyse PQIP’s programme theory, barriers, facilitators and wider contextual factors that influence implementation. The research will be carried out with the PQIP project team and six National Health Service (NHS) Trusts in England, selected according to geographical location, type of hospital, size and level of engagement with PQIP. We will include one Trust which has not expressed interest in the PQIP for comparison and to explore the role of secular trend in any changes in practice. We will use semi-structured interviews (up to 144 in Trusts and 12 with the project team), non-participant observations (up to 150 hours) and documentary analysis. We will track the lifecycle of perioperative data, exploring the transformations it undergoes from creation to use. We will use framework analysis with categories both from our research questions and from themes emerging from the data.Ethics and disseminationEthical approval has been granted from the University College London Research Ethics Committee (ref 10375/001). Permissions to conduct research at NHS Trusts have been granted by local Research and Development offices in coordination with the Health Research Authority. We will follow guidelines for data security, confidentiality and information governance. Findings will be shared at regular time points with the PQIP project team to inform the implementation of the programme, and with participating NHS Trusts to help them reflect on how they currently use data for improvement of perioperative services.
Style APA, Harvard, Vancouver, ISO itp.
25

Afyon, Yakup Akif. "The Effect Of Core Training On Some Motoric Features Of University Footballers". Journal of Education and Training Studies 7, nr 3 (13.02.2019): 79. http://dx.doi.org/10.11114/jets.v7i3.3885.

Pełny tekst źródła
Streszczenie:
In this study, the effect of core training on some motor features of universıty footballers has been examined. 36 footballers both studying at Muğla Sıtkı Koçman University in Muğla, Turkey and playing in amateur leagues participated in the study. 18 university footballers of Muğla Sıtkı Koçman University Sports Club who play in Muğla Super Amateur League formed the experimental group (EG) (Age X = 21.4 ± 2.12 years, Height X = 174.3 ± 6.84 cm and Weight X = 75.9 ± 8,43 kg ). 18 footballers with amateur licences who play in the Faculty of Economics and Adiministrative Sciences, train regularly and play in the university faculty matches formed the control group (CG) (Age X = 21,6 ± 2.56 years, Height X = 176.7 ± 7.13 cm and Weight X = 76.3 ± 8.43 kg). The required permissions were obtained and the students filled in the “Admission Consent Forms” before the applications. The trainings were done in the football field of Muğla Sıtkı Koçman University and the measurements were taken in the Faculty of Sports Sciences Physiology Laboratory. The 10-movements core training programme for eight weeks was applied to the EG footballers in addition to their weekly 2-day football training when the footballers in the CG continued their regular trainings.Before the study, the leg strength, back strength, right-left hand griping strength, flexibility, and vertical jump measurement were taken as pre-test values. After the 8-week training, the final measurements of the EG and the CG were taken. The comparison between the Pretest and Posttest was studied statistically with paired sample t test at 0.05 significance levelConsequently it was determined the that the 8-week Core Training provided the undergradute footballers with an improvement of their the leg strength, back strength, right hand griping strength and vertical jump (p<0.05). No improvement in flexibility features was observed.
Style APA, Harvard, Vancouver, ISO itp.
26

van Veenendaal, Nicole R., Sophie R. D. van der Schoor, Jacqueline Limpens, Anne A. M. W. van Kempen i Johannes B. van Goudoever. "Effect of single family rooms for preterm infants on neurodevelopment: study protocol for a systematic review". BMJ Open 7, nr 8 (sierpień 2017): e015818. http://dx.doi.org/10.1136/bmjopen-2017-015818.

Pełny tekst źródła
Streszczenie:
IntroductionPreterm infants are at an increased risk for neurodevelopmental delay. They have to endure many stressors in early life, including parent-infant separation, noise and painful procedures during hospitalisation in the highly technological environment of the modern neonatal ward. Currently, a shift is being noticed in the architectural design of neonatal wards towards single family rooms instead of the common open bay units. The influence of the hospital environment on health and specifically neurodevelopment in this vulnerable patient population remains under discussion.ObjectivesTo assess the effect of single family rooms during hospitalisation primarily on neurodevelopment in preterm infants. Secondary outcome measures will be neonatal (ie, breastfeeding rates, sepsis, growth during hospital stay, length of hospital stay) and parental (ie, parental stress, satisfaction, participation, presence and self-efficacy).Methods and analysisThe PRISMA-P 2015 (Preferred Reporting Items for Systematic reviews and Meta-Analyses for Protocols 2015) 17 items checklist was used for the generation of the protocol for this review. The following PICO was formulated: Population: preterm infants with need of hospitalisation in the neonatal ward; Intervention: single family rooms; Comparison: standard neonatal care in open bay units; Outcome: neurodevelopmental outcome of infants from 9 months onwards. If at least two studies, with low or moderate risk of bias, suitable for inclusion are found a meta-analysis will be performed. If quantitative synthesis is not appropriate the data will be presented descriptively.Dissemination plansThis will be the first review, systematically assessing the effect of single family rooms on neurodevelopmental outcome in preterm infants. Clinical practice could possibly be optimised to ameliorate neurodevelopment in this vulnerable patient population based on these insights. This systematic review will be published in an international peer-reviewed journal.RegistrationWe registered this systematic review protocol with the PROSPERO (International Prospective Register of Systematic Reviews) on 2 November 2016 (registration number: CRD42016050643).EthicsWe will use data from patients enrolled in studies and/or trials already approved by the relevant ethical committees and therefore this systematic review requires no further permissions.
Style APA, Harvard, Vancouver, ISO itp.
27

Manerikar, Ankit, Fangda Li i Avinash C. Kak. "DEBISim: A simulation pipeline for dual energy CT-based baggage inspection systems1". Journal of X-Ray Science and Technology 29, nr 2 (11.03.2021): 259–85. http://dx.doi.org/10.3233/xst-200808.

Pełny tekst źródła
Streszczenie:
BACKGROUND: Materials characterization made possible by dual energy CT (DECT) scanners is expected to considerably improve automatic detection of hazardous objects in checked and carry-on luggage at our airports. Training a computer to identify the hazardous items from DECT scans however implies training on a baggage dataset that can represent all the possible ways a threat item can packed inside a bag. Practically, however, generating such data is made challenging by the logistics (and the permissions) related to the handling of the hazardous materials. OBJECTIVE: The objective of this study is to present a software simulation pipeline that eliminates the need for a human to handle dangerous materials and that allows for virtually unlimited variability in the placement of such materials in a bag alongside benign materials. METHODS: In this paper, we present our DEBISim software pipeline that carries out an end-to-end simulation of a DECT scanner for virtual bags. The key highlights of DEBISim are: (i) A 3D user-interactive graphics editor for constructing a virtual 3D bag with manual placement of different types of objects in it; (ii) An automated virtual bag generation algorithm for creating randomized baggage datasets; (iii) An ability to spawn deformable sheets and liquid-filled containers in a virtual bag to represent plasticized and liquid explosives; and (iv) A GPU-based X-ray forward modelling block for spiral cone-beam scanners used in checked baggage screening. RESULTS: We have tested our simulator using two standard CT phantoms: the American College of Radiology (ACR) phantom and the NIST security screening phantom as well as on a set of reference materials representing commonly encountered items in checked baggage. For these phantoms, we have assessed the quality of the simulator by comparing the simulated data reconstructions with real CT scans of the same phantoms. The comparison shows that the material-specific properties as well as the CT artifacts in the scans generated by DEBISim are close to those produced by an actual scanner. CONCLUSION: DEBISim is an end-to-end simulation framework for rapidly generating X-ray baggage data for dual energy cone-beam scanners.
Style APA, Harvard, Vancouver, ISO itp.
28

Preethi Latha, T., K. Naga Sundari, S. Cherukuri i M. V. V. S. V. Prasad. "REMOTE SENSING UAV/DRONE TECHNOLOGY AS A TOOL FOR URBAN DEVELOPMENT MEASURES IN APCRDA". ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W13 (4.06.2019): 525–29. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w13-525-2019.

Pełny tekst źródła
Streszczenie:
<p><strong>Abstract.</strong> Now-a-days, collecting accurate and meaningful information about the urban localities/environment with the maximum efficiency in terms of cost and time has become more relevant for urban, rural and city level development planning and administration. This work presents a technical procedure for automatic extraction of building information and characterization of different urban building types within the Andhra Pradesh Capital Region Development Authority (APCRDA) jurisdiction areas using UAVs. The methodology consists of a number of sequential processes of acquisition and generation of high resolution Orthomosaic images, creation of 3D point cloud data, and image classification algorithm for feature extraction using exclusively the geometric coordinates. The main parameters of the urban structures/buildings assessed in this work are site area of the building, built-up area, and building dimensions, building setbacks and building height. Different geometric and appropriate metrics were automatically extracted for each of the elements, defining the urban typology. In this study, residential and commercial buildings were considered for the analysis and the measurements from Drone were validated with respective approved plans and manual inspections and showed positive results with threshold parameters like setbacks and height as per building bye-laws of Andhra Pradesh Government Order (G.O) 119. Based on the results, measurements from Drone are used for the buildings occupancy permissions following the State government building rules. This automated system would replace physical inspections and manual reports and significantly reduce costs and improve efficiency. As an important component in this pilot study, visualisation of the building information were represented / displayed on a web application in an interactive mode. This added value of UAV technology with an automated system in comparison with traditional ways provides geospatial information and can also be considered as an essential Earth Observation indicator which has the potential to lead to next generation Urban Information Services and in the Smart cities development. The considerable potential use of these indicators in urban planning and development offers an opportunity in appropriate decision making in day to day urban planning measures.</p>
Style APA, Harvard, Vancouver, ISO itp.
29

Samodelova, Mariia V., Olesya O. Kapitanova, Nadezda F. Meshcheryakova, Sergey M. Novikov, Nikita R. Yarenkov, Oleg A. Streletskii, Dmitry I. Yakubovsky i in. "Model of the SARS-CoV-2 Virus for Development of a DNA-Modified, Surface-Enhanced Raman Spectroscopy Sensor with a Novel Hybrid Plasmonic Platform in Sandwich Mode". Biosensors 12, nr 9 (19.09.2022): 768. http://dx.doi.org/10.3390/bios12090768.

Pełny tekst źródła
Streszczenie:
The recent severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) infection has posed a great challenge for the development of ultra-fast methods for virus identification based on sensor principles. We created a structure modeling surface and size of the SARS-CoV-2 virus and used it in comparison with the standard antigen SARS-CoV-2—the receptor-binding domain (RBD) of the S-protein of the envelope of the SARS-CoV-2 virus from the Wuhan strain—for the development of detection of coronaviruses using a DNA-modified, surface-enhanced Raman scattering (SERS)-based aptasensor in sandwich mode: a primary aptamer attached to the plasmonic surface—RBD-covered Ag nanoparticle—the Cy3-labeled secondary aptamer. Fabricated novel hybrid plasmonic structures based on “Ag mirror-SiO2-nanostructured Ag” demonstrate sensitivity for the detection of investigated analytes due to the combination of localized surface plasmons in nanostructured silver surface and the gap surface plasmons in a thin dielectric layer of SiO2 between silver layers. A specific SERS signal has been obtained from SERS-active compounds with RBD-specific DNA aptamers that selectively bind to the S protein of synthetic virion (dissociation constants of DNA-aptamer complexes with protein in the range of 10 nM). The purpose of the study is to systematically analyze the combination of components in an aptamer-based sandwich system. A developed virus size simulating silver particles adsorbed on an aptamer-coated sensor provided a signal different from free RBD. The data obtained are consistent with the theory of signal amplification depending on the distance of the active compound from the amplifying surface and the nature of such a compound. The ability to detect the target virus due to specific interaction with such DNA is quantitatively controlled by the degree of the quenching SERS signal from the labeled compound. Developed indicator sandwich-type systems demonstrate high stability. Such a platform does not require special permissions to work with viruses. Therefore, our approach creates the promising basis for fostering the practical application of ultra-fast, amplification-free methods for detecting coronaviruses based on SARS-CoV-2.
Style APA, Harvard, Vancouver, ISO itp.
30

Noll, Robert B., Margaret H. Zeller, Kathryn Vannatta, William M. Bukowski i W. Hobart Davies. "Potential bias in classroom research: Comparison of children with permission and those who do not receive permission to participate". Journal of Clinical Child Psychology 26, nr 1 (marzec 1997): 36–42. http://dx.doi.org/10.1207/s15374424jccp2601_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Nguyen, Tuan T., Amy Weissman, Jennifer Cashin, Tran T. Ha, Paul Zambrano i Roger Mathisen. "Assessing the Effectiveness of Policies Relating to Breastfeeding Promotion, Protection, and Support in Southeast Asia: Protocol for a Mixed Methods Study". JMIR Research Protocols 9, nr 9 (21.09.2020): e21286. http://dx.doi.org/10.2196/21286.

Pełny tekst źródła
Streszczenie:
Background Despite its well-known benefits, breastfeeding practices remain suboptimal worldwide, including in Southeast Asia. Many countries in the region have thus enacted policies, such as maternity protection and the World Health Assembly International Code of Marketing of Breast-milk Substitutes (the Code), that protect, promote, and support breastfeeding. Yet the impact of such national legislation on breastfeeding practices is not well understood. Objective This study aims to review the content, implementation, and potential impact of policies relating to maternity protection and the Code in Myanmar, the Philippines, Thailand, and Vietnam. Methods This mixed methods study includes a desk review, trend and secondary data analyses, and quantitative and qualitative data collection. Desk reviews will examine and compare the contents, implementation strategies, coverage, monitoring, and enforcement of national policies focusing on maternity protection and the Code in each country with global standards. Trend and secondary data analyses will examine the potential impact of these policies on relevant variables such as breast milk substitute (BMS) sales and women’s workforce participation. Quantitative data collection and analysis will be conducted to examine relevant stakeholders’ and beneficiaries’ perceptions about these policies. In each country, we will conduct up to 24 in-depth interviews (IDI) with stakeholders at national and provincial levels and 12 employers or 12 health workers. Per country, we will survey approximately 930 women who are pregnant or have a child aged 0-11 months, of whom approximately 36 will be invited for an IDI; 12 partners of the interviewed mothers or fathers of children from 0-11 months will also be interviewed. Results This study, funded in June 2018, was approved by the Institutional Review Boards of the relevant organizations (FHI 360: April 16, 2019 and May 18, 2020; and Hanoi University of Public Health: December 6, 2019). The dates of data collection are as follows: Vietnam: November and December 2019, May and June 2020; the Philippines: projected August 2020; Myanmar and Thailand: pending based on permissions and funding. Results are expected to be published in January 2021. As of July 2020, we had enrolled 1150 participants. We will present a comparison of key contents of the policies across countries and against international standards and recommendations and a comparison of implementation strategies, coverage, monitoring, and enforcement across countries. We will also present findings from secondary data and trend data analyses to propose the potential impact of a new or amended policy. For the surveys with women, we will present associations between exposure to maternity protection or BMS promotion on infant and young child feeding practices and their determinants. Findings from IDIs will highlight relevant stakeholders’ and beneficiaries’ perceptions. Conclusions This study will increase the understanding of the effectiveness of policy interventions to improve breastfeeding, which will be used to advocate for stronger policy adoption and enforcement in study countries and beyond. International Registered Report Identifier (IRRID) DERR1-10.2196/21286
Style APA, Harvard, Vancouver, ISO itp.
32

Rep'ev, Artem. "Honorary rights and obligations: doctrine, practice, technology". Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2021, nr 1 (9.04.2021): 26–36. http://dx.doi.org/10.35750/2071-8284-2021-1-26-36.

Pełny tekst źródła
Streszczenie:
The article is devoted to general theory analysis of legal categories «honorary rights» and « honorary obligations». The author puts forward and gives arguments to the hypothesis about the existence of a specific group of legal permissions and obligations which differ from other kinds of rights and legal obligations due to their peculiarities. Significant and informative consideration of «honorary rights» and «honorary obligations» both from the point of doctrine of law and historical and modern legislature as well as law enforcement practice was done. The purpose. To make up in the legal doctrine for the absence of complete idea of honorary rights and obligations as elements of the legal position of separate subjects having special legal status; reveal their characteristic features and define the risks conditioned to be abused. Methodology. Historical way of cognition, philological approach, empirical methods of comparison, descriptions, interpretations, theoretical methods of formal and dialectic logic; private-scientific methods, formal legal method, legal norms interpretation method. Results. Analysis of doctrinal sources of the Russian and International Law, jurisprudence historical landmarks, current normative legal acts, and law enforcement practice showed that honorary rights and obligations are of encouraging and stimulating nature, have an accessory character in relation to the basic opportunities and obligations of the subjects. On the basis of the establishing the elements of similarity and differentiation of honorary right with subjective right of the subject, honorary obligation with legal obligation on the whole, the aspects of their interactions and existing contradictions, an independent categorical and institutional character of honorary rights and obligations is proved, its specific qualities which differentiate it from adjacent legal phenomena are specified. Conclusion. It is necessary to strictly differentiate the understanding and realization of honorary rights and obligations in the system of legislature and law enforcement practice by means of unification and concretization of law provisions using encouraging and stimulating instrumentation, justified and minimum usage of assessment notions and components (prominent merits, prestige, authority, etc.) that serve as the basis for receiving honorary rights and obligations, improving the legal status of subjects with regard to other participants of relation. The steps taken should contribute not only to the increasing the efficiency of regulation of public relations through the system of legal encouragements, stimuli and advantages but decreasing discrimination and corruption risks, the opportunity of subjective discretion associated with granting similar additional opportunities.
Style APA, Harvard, Vancouver, ISO itp.
33

Benjumea, Jaime, Jorge Ropero, Octavio Rivera-Romero, Enrique Dorronzoro-Zubiete i Alejandro Carrasco. "Privacy Assessment in Mobile Health Apps: Scoping Review". JMIR mHealth and uHealth 8, nr 7 (2.07.2020): e18868. http://dx.doi.org/10.2196/18868.

Pełny tekst źródła
Streszczenie:
Background Privacy has always been a concern, especially in the health domain. The proliferation of mobile health (mHealth) apps has led to a large amount of sensitive data being generated. Some authors have performed privacy assessments of mHealth apps. They have evaluated diverse privacy components; however, different authors have used different criteria for their assessments. Objective This scoping review aims to understand how privacy is assessed for mHealth apps, focusing on the components, scales, criteria, and scoring methods used. A simple taxonomy to categorize the privacy assessments of mHealth apps based on component evaluation is also proposed. Methods We followed the methodology defined by Arksey and O’Malley to conduct a scoping review. Included studies were categorized based on the privacy component, which was assessed using the proposed taxonomy. Results The database searches retrieved a total of 710 citations—24 of them met the defined selection criteria, and data were extracted from them. Even though the inclusion criteria considered articles published since 2009, all the studies that were ultimately included were published from 2014 onward. Although 12 papers out of 24 (50%) analyzed only privacy, 8 (33%) analyzed both privacy and security. Moreover, 4 papers (17%) analyzed full apps, with privacy being just part of the assessment. The evaluation criteria used by authors were heterogeneous and were based on their experience, the literature, and/or existing legal frameworks. Regarding the set of items used for the assessments, each article defined a different one. Items included app permissions, analysis of the destination, analysis of the content of communications, study of the privacy policy, use of remote storage, and existence of a password to access the app, among many others. Most of the included studies provided a scoring method that enables the comparison of privacy among apps. Conclusions The privacy assessment of mHealth apps is a complex task, as the criteria used by different authors for their evaluations are very heterogeneous. Although some studies about privacy assessment have been conducted, a very large set of items to evaluate privacy has been used up until now. In-app information and privacy policies are primarily utilized by the scientific community to extract privacy information from mHealth apps. The creation of a scale based on more objective criteria is a desirable step forward for privacy assessment in the future.
Style APA, Harvard, Vancouver, ISO itp.
34

Petráková, Zora, Ján Dvorský i Martina Jurigová. "Comparison of Development of Housing Construction in Regions of SR". Global Journal of Business, Economics and Management: Current Issues 7, nr 1 (12.04.2017): 42–48. http://dx.doi.org/10.18844/gjbem.v7i1.1397.

Pełny tekst źródła
Streszczenie:
Currently, almost an half of households in the Slovak Republic live in an apartment house, which is just over 900,000 housing units. The structure and development of housing in urban units, such as a city. Cities and their surrounding functional area take a significant part in the economic development of the whole country; they are natural centers of public and commercial services. Region as the administrative district merge towns and municipalities under the territorial district. The aim of the article is to use the methods of mathematical statistics "Variance analysis" to determine if the geographic location of the region influences the number of new dwellings with planning permission and the number of competed apartments with completion approval. Importance of the geographical location of the region as a influencing factor on the construction of housing is the subject of conclusion of our paper. © 2015 The Authors. Published by Elsevier B.V.Peer-review under responsibility of Academic World Research and Education Center.Keywords: Analysis of variance; completion approval; planning permission; region.
Style APA, Harvard, Vancouver, ISO itp.
35

Milić, Marija, Jelena Dotlić, Jasmina Stevanović i Jelena Filimonović. "Ethical dilemmas regarding the right to re-use questionnaires". Glasnik javnog zdravlja 97, nr 2 (2023): 208–18. http://dx.doi.org/10.5937/serbjph2302208m.

Pełny tekst źródła
Streszczenie:
A questionnaire is a predetermined set of questions used to collect data of interest. The use of questionnaires in biomedical sciences has been continually rising in recent years, both in epidemiological research and in clinical work. Questionnaires are created by experts in the relevant field who use data from the literature. Using a previously created, validated and published questionnaire saves time and resources and enables comparison of results with those of other studies in which the questionnaire had already been used. Any measuring instrument or material found on a website, journal or other medium of expression is assumed to be copyrighted, and it is the legal and ethical responsibility of the researcher to obtain permission to use, modify and/or reproduce that measuring instrument. When requesting permission, it is necessary for the researcher to introduce themselves, state the institution where they work and carefully explain the reason and purpose of requesting permission to use the questionnaire and permission to translate and validate the questionnaire in a new population. After obtaining permission to use the questionnaire/ scale, the ethical issue of its adequate translation and cultural adaptation and its revalidation in the new population in which it is applied arises. It is necessary to save the obtained permission for the use and/or reproduction of the instrument, whether it is a copy of the correspondence or a contract, as proof that the researchers have the legal right to use the instrument. Not obtaining the appropriate permission to use the questionnaire/scale can result in non-publication of the research results, as journal editors will not publish work unless they are provided with proof of the permission to use the questionnaire, as well as withdrawal of the work from publication, or fine
Style APA, Harvard, Vancouver, ISO itp.
36

Kroger, James K., Patricia W. Cheng i Keith J. Holyoak. "Evoking the Permission Schema: The Impact of Explicit Negation and a Violation-Checking Context". Quarterly Journal of Experimental Psychology Section A 46, nr 4 (listopad 1993): 615–35. http://dx.doi.org/10.1080/14640749308401030.

Pełny tekst źródła
Streszczenie:
Cheng and Holyoak (1985) proposed that realistic reasoning in deontic contexts is based on pragmatic schemas such as those for assessing compliance with or violation of permission and obligation rules, and that the evocation of these schemas can facilitate performance in Wason's (1966) selection task. The inferential rules in such schemas are intermediate in generality between the content-independent rules proposed by logicians and specific cases stored in memory. In one test of their theory, Cheng and Holyoak demonstrated that facilitation could be obtained even for an abstract permission rule that is devoid of concrete thematic content. Jackson and Griggs (1990) argued on the basis of several experiments that such facilitation is not due to evocation of a permission schema, but, rather, results from a combination of presentation factors: the presence of explicit negatives in the statement of cases and the presence of a violation-checking context. Their conclusion calls into question both the generality of content effects in reasoning and the explanation of these effects. We note that Jackson and Griggs did not test whether the same combination of presentation factors would produce facilitation for an arbitrary rule that does not involve deontic concepts, as their proposal would predict. The present study tested this prediction. Moreover, we extended Jackson and Griggs’ comparisons between performance with an abstract permission rule versus an arbitrary rule, introducing clarifications in the statement of each. No facilitation was observed for an arbitrary rule even when explicit negatives and a violation-checking context were used, whereas strong facilitation was found for the abstract permission rule under the same conditions. Performance on the arbitrary rule was not improved even when the instructions indicated that the rule was conditional rather than biconditional. In contrast, a small but reliable degree of facilitation was obtained for the abstract permission rule, with violation-checking content even in the absence of explicit negatives. The theory of pragmatic reasoning schemas can account for both the present findings and those reported by Jackson and Griggs.
Style APA, Harvard, Vancouver, ISO itp.
37

RUJIKA, SITI UMI, i ALI RIF'AN. "PERUBAHAN PERILAKU NEGATIF SISWA MELALUI PENERAPAN TEAM GAME TOURNAMENT (TGT) PADA MATERI AKHLAK TERPUJI DI KELAS VIII MTS AL-MUNAWWAROH - KAB. MALANG". journal PIWULANG 1, nr 2 (6.04.2019): 192. http://dx.doi.org/10.32478/piwulang.v1i2.246.

Pełny tekst źródła
Streszczenie:
The use of methods that are not in accordance with the purpose of teaching will be an obstacle in achieving the objectives that have been formulated. This study is to find out the changes in students' negative behavior through the application of cooperative methods team games tournament (TGT) models on the material of commendable morals to class VIII students at MTs Al-Munawwaroh - Kab. Poor. This research is a classroom action research that begins pre-cycle and is carried out with 2 (two) cycles. The research subjects were 26 students. The results showed that the TGT method in Aqidah Akhlak subjects was able to change students' negative behavior. This can be seen from the comparison starting from the pre-cycle to the second cycle, namely leaving the class without permission decreasing from 11.5% to 0%, often permission to go to the toilet when learning decreased from 31% to 8%, late entry decreased from 19% to 4%, annoying friends when learning decreases from 11.5% to 0%.
Style APA, Harvard, Vancouver, ISO itp.
38

Su, Mang, Fenghua Li, Zhi Tang, Yinyan Yu i Bo Zhou. "An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application". Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/232708.

Pełny tekst źródła
Streszczenie:
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.
Style APA, Harvard, Vancouver, ISO itp.
39

Y Bhave, Dr Swati, Madhureema Neglur, Pooja Baheti, Dr Shailaja Mane, Dr Sangeeta Yadav i Dr Surekha Joshi. "A Multicentric study of sleep patterns and electronic media usage in adolescents". Journal of Pediatrics & Neonatal Care 13, nr 2 (3.07.2023): 129–35. http://dx.doi.org/10.15406/jpnc.2023.13.00504.

Pełny tekst źródła
Streszczenie:
Introduction: Adequate healthy sleep is essential for adolescents’ optimal cognitive, and emotional functions and physical health. With media overload and stimuli from electronic gadgets, multitasking and academic stress, students are sleeping for fewer hours, making them one of society's most sleep-deprived age groups. Association of Adolescent and Child Care in India (AACCI) conducts multicentric studies to survey the lifestyles of children and adolescents in India, which include the use of electronic media and sleep patterns. These results are shared with the management, teachers and parents and programs are held for them and the students to make them aware of the importance of improving sleep patterns and proper sleep hygiene and the risks of poor sleep habits. Methods: This paper shows the results of a multicentric college study. This data was collected from participants of AACCI Life Skills Education (LSE) workshops conducted in six different colleges in India during the period 2008 and 2010. A standardized and validated Questionnaire on Life style has been created by AACCI for use in these multicentric surveys The sample comprised 289 college students from six groups – A) and B) 62 First year Junior college from Mumbai (age range 16-18 years; 32 students of high socioeconomic status from an elite college and 30 students from middle socio-economic status), C) 113 First-year medical students from Pune (age range 18-19 years), D) 32 students from Vocational college from Mumbai (age range 19-21 years), E) 40 Final year nursing college From Delhi (age range 19-24) and F) 42 M.Tech Post Graduate (PG) Engineering Hyderabad (age range 20-25 years). Ethical clearance: Ethics approval was obtained from AACCI Institutional ethics committee. Permission and consents: Prior permissions were taken from the college Principals to conduct the workshop, including parental permission for the participants below 18 years of age. Written assent (16-17 years) consent (>18 years) was obtained from the students by including it in the questionnaire form. Statistical analysis: The data has not been analysed statistically, as the sample size at each centre was small and their backgrounds were different. Descriptive comparisons have been made across students’ sleep patterns and electronic usage. Results: Results indicated that students from the younger age group slept longer than those from the older group. Nursing and medical students had less sleep hours due to erratic schedules. PG engineering students had the most regular sleep hours. Regarding electronic devices, PG Engineering students used the computer and internet for >6 hours daily; nurses used the computer internet and mobile the least. Mumbai students watched Television the most while engineering students watched it the least. AACCI conducted workshops for these students to inculcate in them, a healthy lifestyle.
Style APA, Harvard, Vancouver, ISO itp.
40

Steg, A., S. F. Spoelstra, J. M. van der Meer i V. A. Hindle. "Digestibility of grass silage." Netherlands Journal of Agricultural Science 38, nr 3B (1.09.1990): 407–22. http://dx.doi.org/10.18174/njas.v38i3b.16567.

Pełny tekst źródła
Streszczenie:
A total of 50 grass silages were tested in digestibility trials using Texel wethers. The feed silages were wilted of varying DM contents and treated with cell-wall degrading enzymes. The accuracy of feed evaluation was studied using laboratory analyses, including cell-wall analyses, incubation in vitro with rumen fluid and the enzymic procedure. A comparison was made between these results and the current and recently suggested procedures for prediction of digestibility of grass silage. (Abstract retrieved from CAB Abstracts by CABI’s permission)
Style APA, Harvard, Vancouver, ISO itp.
41

Volkova, K. Yu. "Comparison of fair use and fair dealing concepts in copyright law and their meaning for libraries". Scientific and Technical Libraries, nr 10 (12.11.2021): 15–28. http://dx.doi.org/10.33186/1027-3689-2021-10-15-28.

Pełny tekst źródła
Streszczenie:
The paper analyzes similarities and differences between fair use and fair dealing doctrines in copyright law that allow for limited use of copyright-protected material without the need of permission from the rightholder. Both concepts have long been part of legislation but have recently gained special interest due to the wide spread of digital technologies and the ease of copying materials, both text ones and any other digitized materials. What kind of use may be deemed fair and what may not, has become the question of everyday interest. Copyright exceptions implemented in the form of fair use or fair dealing concepts are of special importance to libraries. However, their application is far from trivial and the situation is further complicated by insufficiently understood difference between the two concepts. The paper reviews general approach implemented in both described doctrines, terminology issues, similarities and dissimilarities of the doctrines, their territorial coverage, and historic origins of doctrine differences. The doctrine having originated in the United Kingdom and developed in the United States has become an example, a pattern that is followed in legislation of many countries worldwide. Fair use/fair dealing concepts have found their reflection in Russian copyright law in the form of “free use” of a work without author’s permission and without copyright fee payment. The paper further deals with the significance of fair use doctrine for library collections digitization and other applications of technology innovation. A prediction is made for growing importance of fair use and fair dealing copyright exceptions in the nearest future.
Style APA, Harvard, Vancouver, ISO itp.
42

Goga-Vigaru, Roxana Petruţa. "Modality Expressed By Will And Would In Legal Texts And Their Equivalents In Romanian". International conference KNOWLEDGE-BASED ORGANIZATION 21, nr 2 (1.06.2015): 587–91. http://dx.doi.org/10.1515/kbo-2015-0100.

Pełny tekst źródła
Streszczenie:
Abstract Modality is influenced by different genres and finding the types of modality commonly found in legal texts is the goal of the present paper. Modals are very important because they involve communication about advice, about obligation or permission and they also help us to express our decisions about what we think, about what we know and how strongly we believe that our knowledge is correct. The present study deals with the uses of 'will' and 'would' in legal texts and the comparison with their Romanian counterparts in point of epistemic and deontic modalities.
Style APA, Harvard, Vancouver, ISO itp.
43

Krabbenborg, R. M. M., A. A. Dijkhuizen i R. B. M. Huirne. "A comparison of farmers' sow culling decisions and model recommendations." Netherlands Journal of Agricultural Science 37, nr 4 (1.12.1989): 391–94. http://dx.doi.org/10.18174/njas.v37i4.16626.

Pełny tekst źródła
Streszczenie:
Culling data on sows recorded on the database of the State Veterinary Faculty, Netherlands were analysed, using an economic replacement model. The model determines a sow's optimum lifespan, and then calculates an economic index, called the retention-pay-off, which is the extra profit to be expected from keeping her until the optimum age and not replacing her immediately. For 1617 sows culled in 12 farms during 1985-86, the loss due to premature culling averaged Dfl. 124 per sow. The retention-pay-off for sows culled due to old age or low litter size was only Dfl.21, while for sows culled due to reproductive problems, it was Dfl.161. Further analysis of sows culled due to reproductive problems showed that those culled for failure to return to oestrus after weaning were being culled too early, while those culled for failure to conceive were being culled too late. (Abstract retrieved from CAB Abstracts by CABI’s permission)
Style APA, Harvard, Vancouver, ISO itp.
44

Nevel, C. van, i D. Demeyer. "Comparison of two solid-phase markers for measuring the flow of digesta components in the duodenum of sheep." Netherlands Journal of Agricultural Science 37, nr 3 (1.09.1989): 197–203. http://dx.doi.org/10.18174/njas.v37i3.16631.

Pełny tekst źródła
Streszczenie:
The effect of defaunation and refaunation of the rumen of sheep on duodenal passage and rumen digestion was studied. A combination of chromic oxide and polyethylene glycol (PEG) mixed with concentrates was used to estimate intestinal flow. In addition a combination of PEG and Ru-phenanthroline continuously infused in the rumen was used. Differences in flow of duodenal digesta and digesta components, calculated with both marker systems, were rare and small, indicating that Cr2O3 was an adequate marker of the solid phase of the digesta for application of the double-marker method. (Abstract retrieved from CAB Abstracts by CABI’s permission)
Style APA, Harvard, Vancouver, ISO itp.
45

Bland, J. Martin, Douglas G. Altman i David S. Warner. "Agreed Statistics". Anesthesiology 116, nr 1 (1.01.2012): 182–85. http://dx.doi.org/10.1097/aln.0b013e31823d7784.

Pełny tekst źródła
Streszczenie:
Statistical Methods for Assessing Agreement between Two Methods of Clinical Measurement. By J. Martin Bland, Douglas G. Altman. Lancet 1986; 1(8476):307-10. Abstract reprinted with permission of Elsevier, copyright 1986. In clinical measurement comparison of a new measurement technique with an established one is often needed to see whether they agree sufficiently for the new to replace the old. Such investigations are often analyzed inappropriately, notably by using correlation coefficients. The use of correlation is misleading. An alternative approach, based on graphical techniques and simple calculations, is described, together with the relation between this analysis and the assessment of repeatability.
Style APA, Harvard, Vancouver, ISO itp.
46

Malygin, V. L., E. A. Kutukova, A. S. Iskandirova, E. E. Pahtusova, Y. A. Merkurieva i Y. V. Malygin. "Self-consciousness features of persons with gender identity disorder". Medical Herald of the South of Russia 13, nr 3 (11.07.2022): 36–49. http://dx.doi.org/10.21886/2219-8075-2022-13-3-36-49.

Pełny tekst źródła
Streszczenie:
Purpose: to study the formed images of sexual self-consciousness in persons who applied for permission to change their sex. Materials and methods: 80 people were examined, 40 of whom applied for permission to change their sex (20 people male and 20 people of the female biological sex). The comparison group — 20 men and 20 women, whose gender identity coincides with the biological sex. Methods — Sandra Bem's BSRI (Bem Sex-Role Inventory) test, V.V. Stolin's self-attitude questionnaire, O.L. Kustovoi's questionnaire. Results: it has been established that in the group of transsexuals with a female biological sex, images of a man and a woman are clearly distinguished, the self-image is closer to the desired image of a man, while the image of a woman is less achievable. The group of male transsexuals is closer to the image of the “Ideal Man” than to the image of the “Ideal Woman”. The key features that correspond to their self-determination as women are revealed: passivity, dependence on others, compromise, gullibility. According to the self-perception of all 4 groups, the “Ideal Woman” is happier than the “Ideal Man”. In the transsexuals’ group of male biological sex, were found no differences with the indicators of conditionally healthy groups of both sexes in the parameter “Love for children”, in contrast to the group of female transsexuals of the biological sex. Male transsexuals are looking for a radically new way to meet their needs without judgment from society. Summary: the indicators of self-relationship in the comparison groups are higher than in the groups of persons striving for a sex change.
Style APA, Harvard, Vancouver, ISO itp.
47

Wegscheider, P. "PARE0002 IMPACT OF SERVICE DOGS ON THE BURDEN OF ARTHRITIS". Annals of the Rheumatic Diseases 79, Suppl 1 (czerwiec 2020): 1287.1–1287. http://dx.doi.org/10.1136/annrheumdis-2020-eular.380.

Pełny tekst źródła
Streszczenie:
Background:Assistance dogs support humans with different physical disabilities: 1. Service dogs for people with diverse mobility impairments 2. signaling dogs for humans diagnosed with diabetes, hearing impairments, seizure, or posttraumatic stress disorder 3. guide dogs for people with visual impairments. Definitions and terms are not consistent over Europe; Austrian terminology is used in the following. These specially trained dogs support people in their everyday lives and make it possible that less help is required from personal assistants or caregivers. Diverse studies show this positive impact of assistance dogs on the quality of life of disabled people. There are just a few case reports from United States about service dogs for people diagnosed with any inflammatory rheumatic disorder. Dogs are trained individually for about 1.5 years before team training and the concluding team assessment through Austrian authorities take place. Since 2015, there has been an adapted legislation for service dogs in Austria which brings significant improvements in many areas. In comparison to the model set by Austria, there is no corresponding legal basis at EU level or in other European countries.Objectives:Case-report about my own situation diagnosed with juvenile idiopathic arthritis (JIA) in 2001 and my service dog May. May supports my every day live in private and business affairs since 2019Methods:May was trained for less than two years before team assessment. May is able to pick up things I dropped. These include coins, my key, my mobile phone, clothes, towels and lots of other things I want her to pick it up for me. May opens and closes doors, empties the washing machine, pulls the laundry basket and even helps me put on and take off clothes. In general, she carries many things which I instruct her to carry. I am able to learn her more new things in a short time. Furthermore May acts safe on public transport and even airplanes. Due to special training May is allowed to move without dog leash or muzzle. A muzzle or leash would handicap the dog’s work. As a result of May’s help I need less personal assistance.Results:May’s physical and psychological support gives me greater independence and increases my self-confidence. She was trained to specifically meet the needs of my disability. Beside her skills, May helps to reduce pain and burden of arthritis.Conclusion:My aim is to spotlight the great support of service dogs to severely affected arthritis patients. Austria had realized legislation for assistance dogs to guarantee certain permissions the owner’s needs (e.g. access to working place, hospital). I would love to raise awareness about assistance dogs to improve the knowledge about those animals to implement European legislation.References:[1]Arbeitskreis für Hygiene in Gesundheitseinrichtungen des Magistrats der Stadt Wien, MA 15, Richtlinie für den Umgang mit Assistenzhunden und Therapiehunden in Gesundheitseinrichtungen, 29.3.2017; access 1.10.2019[2]AK Krankenhaushygiene OÖ, Umgang mit Assistenzhunden in Gesundheitseinrichtungen, Version 1; access 1.2019[3]Bremhorst, A et al, Spotlight on Assistance Dogs- Legislation, Welfare and Research, Animals 2018, 8, 129; doi:10.3390/ani8080129[4]Deutsche Gesellschaft für Krankenhaushygiene (DGKH), Empfehlungen zum hygienegerechten Umgang mit Therapiehunden in Krankenhäusern und vergleichbaren Einrichtungen, Hyg Med 2017; 42-10[5]Glenk, LM et al, Perceptions on Helath Benefits of Guide Dog Ownership in an Austrian Population of Blind People with and without a Guide Dog, Animals 2019, 9, 428; doi:10.3390/ani9070428[6]Lundqvist, M et al, Certified service dogs- A cost- effectiveness analysis appraisal, Plos ones 12.9.2019, doi:10.1371/journal.pone.0219911[7]Sozialministeriumservice, Richtlinie Therapiehunde des Bundesministers für Arbeit, Soziales und Konsumentenschutz, 01.01.2015; access 1.10.2019Acknowledgments:I am very grateful to Kati Kohoutek, May’s trainer and the efforts of Austrian’s long lasting dog trainers and Karl Weissenbacher, the leader of Messerli Institute/ department of Veterinary University Vienna.Disclosure of Interests:None declared
Style APA, Harvard, Vancouver, ISO itp.
48

Su, Ming-Yang, Hong-Siou Wei, Xin-Yu Chen, Po-Wei Lin i Ding-You Qiu. "Using Ad-Related Network Behavior to Distinguish Ad Libraries". Applied Sciences 8, nr 10 (9.10.2018): 1852. http://dx.doi.org/10.3390/app8101852.

Pełny tekst źródła
Streszczenie:
Mobile app ads pose a far greater security threat to users than adverts on computer browsers. This is because app developers must embed a Software Development Kit (SDK), called an ad library or ad lib for short, provided by ad networks (i.e., ad companies) into their app program, and then merge and compile it into an Android PacKage (APK) execution file. The ad lib thus becomes a part of the entire app, and shares the whole permissions granted to the app. Unfortunately, this also resulted in many security issues, such as ad libs abusing the permissions to collect and leak private data, ad servers redirecting ad requests to download malicious JavaScript from unknown servers to execute it in the background of the mobile operating system without the user’s consent. The more well-known an embedded ad lib, the safer the app may be, and vice versa. Importantly, while decompiling an APK to inspect its source code may not identify the ad lib(s), executing the app on a simulator can reveal the network behavior of the embedded ad lib(s). Ad libs exhibit different behavior patterns when communicating with ad servers. This study uses a dynamic analysis method to inspect an executing app, and plots the ad lib behavior patterns related to the advertisement into a graph. It is then determined whether or not the ad lib is from a trusted ad network using comparisons of graph similarities.
Style APA, Harvard, Vancouver, ISO itp.
49

Betti, Mohammed Jasim, i Zainab Kadim Igaab. "A Contrastive Study of Modulation in English and Arabic". International Journal of English and Cultural Studies 1, nr 1 (21.03.2018): 30. http://dx.doi.org/10.11114/ijecs.v1i1.3120.

Pełny tekst źródła
Streszczenie:
Modulation is a term that denotes using modals and other constructions to refer to such functions as ability, obligation, permission and willingness. The present study is descriptive and contrastive. The aim of this study is to describe English and Arabic in terms of modulation as manifested in the four mentioned functions. The study starts with giving a description of modulation in English and Arabic. The following step is making comparisons regarding the four functions successively. The study concludes that this phenomenon is found in both languages with the existence of a number of differences in addition to some similarities.
Style APA, Harvard, Vancouver, ISO itp.
50

Jayalalitha. "Tamil Agathinai poems and Kannada folk songs - A comparison study". International Research Journal of Tamil 2, nr 4 (30.08.2020): 16–23. http://dx.doi.org/10.34256/irjt2043.

Pełny tekst źródła
Streszczenie:
There is an emphasis in recent years on the study of literary and cultural parallel between Tamil and Kannada. This kind of research would enable one to arrive at Proto- Dravidian common cultural core. Anyhow my attempt is humble. I Try to make a comparison of the Akam (Love) poems. Which are found in Tolkappiyam and Sangam literature with some Kannada folk songs. Tolgappiyam says that the Akam poems of five division of land (Kurinji, Mullai, Marudam, Naidal and Paalai) should not mention the proper name of the characters. If we take a simple look at the different folk songs collection of Kannada, we note that there are no proper names of characters of such love songs. According to Tolkappiyam, the first grammar of Tamil, the concept of love is divided into ‘compatible love’ (anbin inthinai) and ‘incompatible love’ (porundha Kamam). We also come across such concept in the Kannada folk songs, which is explained in the theme of the song. There is a song of a man who is sitting on the bank of a river asking the girl permission to lean on her shoulder. The mention of a shoulder of a girl is a special feature mentioned in many Sangam poems.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii