standard part
Recently Published Documents


TOTAL DOCUMENTS

114
(FIVE YEARS 11)

H-INDEX

10
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Vahab Pournaghshband ◽  
Hassan Pournaghshband

Software systems have been under continued attacks by malicious entities, and in some cases, the consequences have been catastrophic. To tackle this pervasive problem, the academic world has significantly increased the offering of computer security-related courses during the past decade. In fact, offering these courses has become a standard part of the curriculum for many computing disciplines. While many proposals suggest adding this appealing topic into the nonsecurity CS courses, many faculties do not entirely support the idea for a convincing reason. They rightfully claim that each one of these courses is already packed with concepts and materials developed toward that course, leaving not much room for other topics. In this study, we show how exposing students to security concepts can be incorporated into upper-division CS courses without increasing the normally required efforts needed by students as well as the instructor. We show how to develop a project of this nature that can be appended to an already existing course project. We have successfully employed our proposed approach in two of our core CS courses and present them in this paper as case studies.


2021 ◽  
Vol 105 (1) ◽  
pp. 109-118
Author(s):  
Petr Vanysek

Measurements and interpretation of electrical impedance in electrochemistry and in related studies has become recently fairly commonplace as both the hardware and the interpretation software are more and more standard part of electrochemical potentiostats. With the interpretation software it is possible to model the studied system in any conceivable way, even if the physical reality may not follow the chosen model. An example is given where a circuit consisting of a capacitor with resistors in series and parallel are evaluated as if the circuit were just a pure capacitor. The method of plotting the results as complex permittivity and complex modulus is also shown.


Author(s):  
Neil Walker

The gathering trend of the trans-systemic migration of legal ideas shifts the stakes in the debate over the relative rootedness or mobility of law. While legal rootedness within the state and other locally bounded jurisdictions still requires as much justification as ever, there is now more pressure on the other side of the debate, among those who would defend or advocate the increasingly mobile understanding and practice of law. The justification of this can be system-particular, universal, or modular in nature. Whereas the first two options court the opposite dangers of understating the prospects and overstating the robustness of trans-systemic normative solutions, the chapter argues that a modular approach focusing on the transferability and (re)combinability of certain standard part of legal doctrine holds out more scope for an accurate and defensible account of legal migration.


2020 ◽  
Vol 20 (5) ◽  
pp. 396-403 ◽  
Author(s):  
Callum Duncan ◽  
Angus D Macleod

Tele-neurology is a neurological consultation at a distance, or not in person, using various technologies to achieve connectivity, including the telephone and the internet. The telephone is ubiquitous and is a standard part of how we manage patients. Video consulting has been used for a long time in some centres, particularly in those where the geography means that patients have to travel long distances. Various technologies can be used, and with the development of various internet-based video-calling platforms, real-time video consulting has become much more accessible. We have provided a tele-neurology service in the North East of Scotland since 2006 using video conferencing with far-end camera control. More recently, we have complemented this using an internet-based platform (NHS Near Me). Here we outline the practicalities of video consulting in ‘ordinary’ times and comment on its use in the ‘extraordinary’ times of the coronavirus pandemic.


2020 ◽  
Author(s):  
QIU Lemiao ◽  
LI Heng ◽  
YI Guodong ◽  
LIU Xiaojian ◽  
ZHANG Peng ◽  
...  

Abstract In this paper we develop an affordance-integrated approach to support design of the customized product non-standard part from conceptual period to detailed period. Firstly, the part affordances are identified by geometrical correlation analysis and shown by liaison graph. Secondly, a force transmission based method is developed to identify the main design parameters of a part, at the same time the design parameters and user requirements both can be mapped into the affordances. In turn, these affordances can be used as a bridge to construct the mapping relationship between the user requirements and the design parameters. In the end, both the force transmission method and the mapping relations are used to construct the detailed model of the non-standard part. A rear platen from the injection molding machine is employed to demonstrate the proposed approach and the result shows that this method can be feasible and useful in product design.


2019 ◽  
pp. 267-284
Author(s):  
George P. Fletcher

This chapter examines the concept of complicity. The basic question is whether complicity is a crime in and of itself or a way of assisting another person to commit a crime. On the whole, the idea of complicity in the actions of another has become a standard part of modern legal and moral thought. One no longer thinks of individuals acting solely on their own account but of groups of people interacting in order to produce a crime of shared responsibility. This is particularly true in the crimes of genocide, aggression, and crimes against humanity. As for holding individual actors accountable, as Article 25 of the Rome Statute attempts to do, it would make sense to hold each liable for their causal role in the crime. That is, complicity should be seen not as a crime in itself but as a contribution to the crime of another.


2019 ◽  
Vol 29 (1) ◽  
pp. 1535-1544
Author(s):  
Ayman S. Ghabayen ◽  
Basem H. Ahmed

Abstract Nowadays, sentiment analysis is a method used to analyze the sentiment of the feedback given by a user in an online document, such as a blog, comment, and review, and classifies it as negative, positive, or neutral. The classification process relies upon the analysis of the polarity features of the natural language text given by users. Polarity analysis has been an important subtask in sentiment analysis; however, detecting correct polarity has been a major issue. Different researchers have utilized different polarity features, such as standard part-of-speech (POS) tags such as adjectives, adverbs, verbs, and nouns. However, there seems to be a lack of research focusing on the subcategories of these tags. The aim of this research was to propose a method that better recognizes the polarity of natural language text by utilizing different polarity features using the standard POS category and the subcategory combinations in order to explore the specific polarity of text. Several experiments were conducted to examine and compare the efficacies of the proposed method in terms of F-measure, recall, and precision using an Amazon dataset. The results showed that JJ + NN + VB + RB + VBP + RP, which is a POS subcategory combination, obtained better accuracy compared to the baseline approaches by 4.4% in terms of F-measure.


2019 ◽  
Vol 5 (4) ◽  
pp. 302-304
Author(s):  
Sarah E. Pember

Reiterating the importance of the “education” in health education, this reflection poses the question, “Why don’t we make pedagogy a standard part of our doctoral programs alongside research methods and evaluation?” and considers the value and perception of teaching as scholarship in academia.


Sign in / Sign up

Export Citation Format

Share Document