Search results for "CODE"

showing 10 items of 1180 documents

Vizuālā programmēšana datorikas stundās sākumskolā

2022

Lai varētu ne tikai patērēt digitālo vidi, bet pats arī radīt digitālās vides saturu, ir nepieciešamas kaut nelielas programmēšanas prasmes. Patreizējā izglītības sistēmā jau no 1.klases datorikas programmā ir paredzēts apgūt programmēšanas iemaņas. Maģistra darba mērķis ir izstrādāt datorikas mācību priekšmetā metodikas materiālu vizuālās programmēšanas mācīšanai sākumskolā. Darbā pētīts un analizēts: vizuālās programmēšanas jēdziens, sākumskolas loma izglītības sistēmā, integrētā mācību metodes sākumskolā, Skola2030 datorikas mācību priekšmeta programmas stundas, kurās paredzēts apgūt programmēšanas pamatus un Skola2030 piedāvātie mācību un metodikas materiāli. Darbs satur 108 lapas, 3 no…

algoritmsIzglītības zinātnesScratchvizuālās programmēšanas prasmju apguvevizuālā programmēšanacode.org
researchProduct

ScrumBut as an Indicator of Process Debt

2022

Technical debt analysis is used to detect problems in a codebase. Most technical debt indicators rely on measuring the quality of the code, as developers tend to induce recurring technical debt that emerges along with evolution cycles. This debt can emerge when project pressure leads to process deviations, for instance. In agile methods like Scrum, such deviations are commonly known as ScrumButs (like Scrum but …), which can be considered as a form of process debt. In this paper, we investigate two recurring signs of process debt (i.e. code smells and anti-patterns) caused by Scrumbuts. Our contribution investigates typical ScrumBut practices found in agile projects in one company and we re…

anti-patterns.ketterät menetelmätprosessittechnical debtohjelmistotuotantoScrumButcode smellsprocess debtohjelmistokehitysongelmat113 Computer and information sciences2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)
researchProduct

Valoración clínica del estado de salud bucodental en el paciente adulto con síndrome de apnea-hipopnea del sueño (SAHS)

2020

El síndrome de apnea-hipopnea del sueño (SAHS) es un gran problema de salud pública. No solo por su alta prevalencia en la población general, sino también por las importantes repercusiones médicas, sociales y económicas que acarrea. Como consecuencia de la hipoxia y de la fragmentación del sueño, se ha vinculado frecuentemente esta enfermedad con alteraciones cardiovasculares, metabólicas y neurocognitivas. En los últimos años, además, numerosas y diversas patologías han sido relacionadas con el síndrome, entre ellas las del aparato estomatognático. El alcance en estos pacientes de enfermedades orales tales como la periodontitis o el bruxismo del sueño, entre otras, ha sido objeto de estudi…

apnea del sueñoodontologíaUNESCO::CIENCIAS MÉDICAS:CIENCIAS MÉDICAS [UNESCO]salud bucodental
researchProduct

L’arbitrabilità delle azioni revocatorie e di inefficacia nella prospettiva del Codice della Crisi

2020

Tra i compiti del curatore vi è quello di ricostruire il patrimonio del debitore, al fine di garantire la par condicio creditorum. A questo scopo il curatore può proporre azioni dirette a far dichiarare la inefficacia degli atti compiuti dal debitore. Si tratta di azioni con presupposti ed effetti tra loro diversi; una azione è diretta a far dichiarare la inefficacia ex lege atti compiuti dal debitore; le altre sono lazione revocatoria ordinaria e l’azione revocatoria fallimentare. Per altro verso, il curatore potrebbe essere convenuto in azioni revocatorie dirette a fare dichiarare inefficaci atti di cui ha beneficiato il debitore prima del fallimento o la stessa curatela. In tutte queste …

arbitrato azione revocatoria Legge Fallimentare Codice della crisi e dell’insolvenzaSettore IUS/15 - Diritto Processuale Civilearbitration actio pauliana and bankrupty invalidation action Bankruptcy Law Code of crisis and insolvency.Settore IUS/04 - Diritto Commerciale
researchProduct

Proteggere e Valorizzare: una buona pratica per i siti archeologici

2014

Tra i beni culturali quelli archeologici hanno più animato il dibattito culturale sul rapporto tra conservazione e loro messa in valore. La fragilità con cui la materia ci viene consegnata dalla storia, la frammentarietà del reperto, la scarsa disponibilità di risorse finanziarie, anche in relazione alla vastità del patrimonio a noi pervenuto, impongono interventi mirati e talvolta urgenti per la salvaguardia e la conservazione dei beni archeologici. Ma la sola conservazione non può però costituire l’obiettivo ultimo dell’intervento: poiché i beni archeologici rappresentano il nostro lontano passato è anche necessario recuperarne il valore e comunicarne l’identità. La conoscenza storica, st…

archaeological sites covers protective systems code of practicesiti archeologici coperture sistemi di protezione codice di praticaSettore ICAR/12 - Tecnologia Dell'Architettura
researchProduct

La corruzione privata e la riforma dell'art. 2635 c.c.

2013

L'articolo esplora il trattamento penale dei fatti di corruzione privata, anche alla luce della recente legge n. 190/2012. Due le tesi principali sostenute: 1) contrariamente a quel che si crede, nel nostro ordinamento esiste già (ed esisteva anche prima del 2012) una incriminazione - sia pur non diretta - dei fatti di corruzione privata; 2) la riforma del 2012 cambia l'offensita' tipica dei reati di cui all'art. 2635 c.c., affiancando alla tutela del patrimonio, una tutela della concorrenza quale interesse dei consumatori. The paper explores the Italian discipline on private bribery, which has recently undergone significant reform through law no. 190/2012.

art. 2635 c.c.competition in the consumers' interestcorruzione privataconcorrenza nell'interesse dei consumatoriart. 2635 It. Civ. Codeprivate briberySettore IUS/17 - Diritto Penalelaw no. 190/2012l. 190/2012
researchProduct

Égalité et citoyenneté en Algérie et dans les établissements français de l'Inde au milieu du XIXe siècle

2008

Dans les colonies françaises d'Algérie et des établissements de l'Inde du XIXe siècle, la société était totalement différente de celle des « quatre vieilles colonies » : elle comportait des communautés identifiables, avec des droits locaux ; les habitants étaient régis par un statut juridique déterminé en fonction de leur religion. Ces statuts personnels des indigènes – terme pris dans son sens large et non dans celui du code de l'indigénat – étaient incompatibles avec le Code civil sans adaptation. Par ailleurs, l'organisation locale, en castes pour les hindous, en tribus pour l'Algérie, étaient également bien éloignées des institutions françaises. L'acculturation juridique était donc néce…

assimilation[SHS.DROIT] Humanities and Social Sciences/LawCode civilIIe Républiquenationquatre vieilles coloniesassimilationnismeégalité civile et politiqueracisme[ SHS.DROIT ] Humanities and Social Sciences/Lawstatuts personnelsindigènesAlgérie[SHS.DROIT]Humanities and Social Sciences/LawreligionXIXe siècleacculturation juridiqueétablissements de l'Inde
researchProduct

Upper secondary school students’ use of and attitudes to English tags within Finnish speech and writing

2010

 Kansainvälistymisen myötä englannin vahvistuva asema lingua francana näkyy myös Suomessa ja suomen kielessä: englanninkieliset nimet, iskulauseet, lainasanat ja muut anglismit ovat monelle jo niin jokapäiväinen asia, että moni ei edes huomaa käyttävänsä niitä. Osa suomalaisista on kuitenkin sitä mieltä, että tällainen kielten sekoittuminen ja vaihtelu köyhdyttävät suomea ja jopa uhkaavat sitä. Eräs kielikontaktin laji on koodinvaihto eli kahden tai useamman kielen käyttäminen keskustelussa. Se on edelleen jaoteltavissa sanojen tai lyhyiden huudahdusten lisäämiseen muutoin erikieliseen puheeseen tai tekstiin ( tag-switching ). Työssä tutkittiin tällaisten englanninkielisten tagien lisäämise…

attitudestag-switchingcode-switching
researchProduct

Anomaly Detection and Classification of Household Electricity Data : A Time Window and Multilayer Hierarchical Network Approach

2022

With the increasing popularity of the smart grid, huge volumes of data are gathered from numerous sensors. How to classify, store, and analyze massive datasets to facilitate the development of the smart grid has recently attracted much attention. In particular, with the popularity of household smart meters and electricity monitoring sensors, a large amount of data can be obtained to analyze household electricity usage so as to better diagnose the leakage and theft behaviors, identify man-made tampering and data fraud, and detect powerline loss. In this paper, the time window method is first proposed to obtain the features and potential periodicity of household electricity data. Combining th…

autoencoderMains electricityComputer Networks and CommunicationsComputer sciencemultilayer hierarchical networkkotitaloudetverkot (järjestelmät)computer.software_genreanomaly detectionComputer Science Applicationshousehold electricitysähkönkulutussähködataclassificationHardware and ArchitectureTime windowspoikkeavuusSignal ProcessingAnomaly detectionData miningcomputerNetwork approachfeedforward networkInformation Systems
researchProduct

Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods

2022

Cyber Physical Systems (CPSs) have become widely popular in recent years, and their applicability have been growing exponentially. A CPS is an advanced system that incorporates a computation unit along with a hardware unit, allowing for computing processes to interact with the physical world. However, this increased usage has also led to the security concerns in them, as they allow potential attack vendors to exploit the possibilities of committing misconduct for their own benefit. It is of paramount importance that these systems have comprehensive security mechanisms to mitigate these security threats. A typical attack vector for a CPS is malicious data supplied by compromised sensors that…

autoencodercyber physical systemsyväoppiminensupport vector machinefault tolerancetiedonlouhintakyberturvallisuusverkkohyökkäyksetsensor datacyber attacktietojärjestelmätInternational Conference on Cyber Warfare and Security
researchProduct