scholarly journals A Randomized School-Based Jumping Intervention Confers Site and Maturity-Specific Benefits on Bone Structural Properties in Girls: A Hip Structural Analysis Study

2002 ◽  
Vol 17 (3) ◽  
pp. 363-372 ◽  
Author(s):  
M. A. Petit ◽  
H. A. Mckay ◽  
K. J. Mackelvie ◽  
A. Heinonen ◽  
K. M. Khan ◽  
...  
2007 ◽  
Vol 18 (6) ◽  
pp. 797-804 ◽  
Author(s):  
A. D. DiVasta ◽  
T. J. Beck ◽  
M. A. Petit ◽  
H. A. Feldman ◽  
M. S. LeBoff ◽  
...  

2011 ◽  
Vol 112 (2) ◽  
pp. 535-541 ◽  
Author(s):  
Karen Hind ◽  
Lisa Gannon ◽  
Emma Whatley ◽  
Carlton Cooke ◽  
John Truscott

Author(s):  
Ekaterina Turakulovna Shirinova

This article discusses information on the study of terminology in Uzbek and world linguistics. Thematic grouping of banking and financial terms, which play an important role in Uzbek language vocabulary, is considered. The author gives the criteria for the distribution of terms into thematic groups, their peculiar properties examples to substantiate the hypothesis. The paradigmatic relations between the terms of this sphere are indicated. A structural analysis of the banking and financial terms of the Uzbek language is carried out.  On the basis of the anthropocentric approach, the role of the human factor in the banking and financial terminology of the Uzbek language is studied. Cognitive metaphors that exist in the terminology are considered.


2008 ◽  
Vol 11 (2) ◽  
pp. 232-236 ◽  
Author(s):  
Sven Prevrhal ◽  
John A. Shepherd ◽  
Kenneth G. Faulkner ◽  
Ken W. Gaither ◽  
Dennis M. Black ◽  
...  

2020 ◽  
Vol 16 (12) ◽  
pp. 2022-2030 ◽  
Author(s):  
Madhusmita Misra ◽  
Abisayo Animashaun ◽  
Amita Bose ◽  
Vibha Singhal ◽  
Fatima Cody Stanford ◽  
...  

Cyber Crime ◽  
2013 ◽  
pp. 245-262
Author(s):  
Madhusudhanan Chandrasekaran ◽  
Shambhu Upadhyaya

Phishing scams pose a serious threat to end-users and commercial institutions alike. E-mail continues to be the favorite vehicle to perpetrate such scams, mainly due to its widespread use combined with the ability to easily spoof them. Several approaches, both generic and specialized, have been proposed to address this growing problem. However, phishing techniques, growing in ingenuity as well as sophistication, render these solutions weak. To overcome these limitations, we propose a multistage framework – the first stage aims at detecting phishing based on their semantic and structural properties, whereas in the second stage we propose a proactive technique based on a challenge-response technique to establish the authenticity of a Web site. Using live e-mail data, we demonstrate that our approach with these two stages is able to detect a wider range of phishing attacks than existing schemes. Also, our performance analysis study shows that the implementation overhead introduced by our tool is negligibly small.


Sign in / Sign up

Export Citation Format

Share Document