Compliance with the automated machine check

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tobacco compliance check in Hong Kong.

We examined tobacco retailers' rates of compliance to the law forbidding the sale of tobacco products to persons under 18 years of age in Hong Kong. The overall compliance rate was only 18.9%. The low compliance rate may be attributed to poor enforcement of the youth access law. Overseas experiences show that regular checking is an effective way to evaluate the compliance of tobacco retailers t...

متن کامل

Automated Completeness Check in KAOS

KAOS is a popular and useful goal oriented requirements engineering (GORE) language, which can be used in business requirements modelling, specification, and analysis. Currently, KAOS is being used in areas such as business process modelling, and enterprise architecture (EA). But, an incomplete or malformed KAOS model can result to incomplete and erroneous requirements analysis, which in turn c...

متن کامل

Automated Vulnerability Check in Continuous Integration

Context Using components with known vulnerabilities is still one of the most frequent causes for security incidents today [5]. It is of the essence, therefore, to possess a comprehensive overview of the software components utilized by the software, in order to mitigate the vulnerabilities they may withold prior to releasing the software. On the one hand, tools like Maven provide a reliable over...

متن کامل

Planar micro-check valves exploiting large polymer compliance

This paper presents three types of microfabricated planar check valves that exploit the large compliance of elastomeric polymers such as olydimethylsiloxane (PDMS). The micro-check valves consist of a thin compliant flap and a rigid stopper embedded in close proximity in a icrochannel. The flap is perpendicular to the flow and lies near the stopper, forming a restricted fluid path inside the ch...

متن کامل

Automated software vulnerability detection with machine learning

Thousands of security vulnerabilities are discovered in production software each year, either reported publicly to the Common Vulnerabilities and Exposures database or discovered internally in proprietary code. Vulnerabilities often manifest themselves in subtle ways that are not obvious to code reviewers or the developers themselves. With the wealth of open source code available for analysis, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Anaesthesia

سال: 2015

ISSN: 0003-2409

DOI: 10.1111/anae.13159