نتایج جستجو برای: integrity approach

تعداد نتایج: 1352060  

2003
Henning Christiansen Davide Martinenghi

Complete checks of database integrity constraints may be prohibitively time consuming, and several methods have been suggested for producing simplified checks for each update. The present approach introduces a set of transformation operators that apply to database integrity constraints with each operator representing a concise, semanticspreserving operation. These operators are applied in a pro...

1997
Todd Walter

In recent years there has been widespread growth in the number of proposed differential augmentation systems for GPS. Such systems are being developed by both civil authorities and commercial interests. The most stringent application of these systems is precision approach for aviation, where the system provides vertical and horizontal guidance. Precision approach has very strict requirements fo...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده ادبیات 1394

abstract the purpose of this study was to find out the effect of applying the principles of group-dynamic assessment (g-da) on learning of conditional structures in english by iranian efl learners at the intermediate level, which according to the formal educational system in iran, includes students who are in their second year of studying in high schools of koohdasht city. this study was a qua...

2015
Sabrina De Capitani di Vimercati Sara Foresti Sushil Jajodia Stefano Paraboschi Pierangela Samarati

In the last few years, many efforts have been devoted to the development of solutions aiming at ensuring the confidentiality and integrity of data and computations in the cloud. In particular, a recent solution for verifying the integrity of equi-join queries is based on the insertion of checks (markers and twins) whose presence provides probabilistic guarantees on the integrity of the computat...

2016
Omar Tayan Lamri Laouamer Tarek Moulahi Yasser M. Alginahi

Thispaper focuses on audio-watermarking authentication and integrity-protection within the context of the speech-data transmitted over the Internet in a real-time learning environment.The Arabic Quran recitation through distance learning is used as a case-study example that is characteristic of sensitive data requiring robust authentication and integrity measures. Thisworkproposes an approach f...

Journal: :Computer Networks 1996
David B. Ingham Steve J. Caughey Mark C. Little

One of most serious problems plaguing the World Wide Web today is that of broken hypertext links, which are a major annoyance to browsing users and also a cause of tarnished reputation and possible loss of opportunity for information providers. The root of the problem lies in the current Web architecture’s lack of support for referential integrity. This paper presents a model for the provision ...

Journal: :مجله دیابت و متابولیسم ایران 0
kiarash aramesh mitra hefazi targhabeh

background: professionalism is currently a chief concern across the continuum of medical sciences and there is a great deal of efforts to clarify its theoretical components and to measure them. for participation of iranian medical scientific society in this universal challenge, there is a need to explain and interpret the state of art of this topic in the world. methods: we selected the most re...

1992
H. V. Jagadish Xiaolei Qian

We present an approach for integrating inter-object constraint maintenance seamlessly into an object-oriented database system. We develop a constraint compilation scheme that accepts declarative global specification of constraints, including relational integrity, referential integrity, and uniqueness requirements, and generates an efficient representation that permits localized processing. We d...

2018
Tran Trung Hieu Gustavo Belforte

This work propose a new Kalman filter-based method for integrity monitoring, following the solution separation approach of the Advanced Receiver Autonomous Integrity Monitoring (ARAIM) algorithm. This method evaluates the separation of state correction using different subsets of measurement to detect abnormalities as well as potential faulty satellites for exclusion. This approach differs from ...

2001
JOANNE E. OXLEY

A systematic cross-country analysis of e-commerce activity reveals that although physical infrastructure explains much of the variation in basic Internet use, e-commerce activity also depends significantly on the "rule of law" and, secondarily, on availability of credible payment channels such as credit cards. These results suggest that an institutional environment that facilitates the building...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید