دانلود و نمایش مقالات مرتبط با legal::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - legal

تعداد مقالات یافته شده: 511
ردیف عنوان نوع
1 Private Computation of Phylogenetic Trees Based on Quantum Technologies
محاسبات خصوصی درختان فیلوژنتیک بر اساس فناوری های کوانتومی-2022
Individuals’ privacy and legal regulations demand genomic data be handled and studied with highly secure privacy-preserving techniques. In this work, we propose a feasible Secure Multiparty Computation (SMC) system assisted with quantum cryptographic protocols that is designed to compute a phylogenetic tree from a set of private genome sequences. This system significantly improves the privacy and security of the computation thanks to three quantum cryptographic protocols that provide enhanced security against quantum computer attacks. This system adapts several distance-based methods (Unweighted Pair Group Method with Arithmetic mean, Neighbour-Joining, Fitch-Margoliash) into a private setting where the sequences owned by each party are not disclosed to the other members present in the protocol. We theoretically evaluate the performance and privacy guarantees of the system through a complexity analysis and security proof and give an extensive explanation about the implementation details and cryptographic protocols. We also implement a quantum-assisted secure phylogenetic tree computation based on the Libscapi implementation of the Yao, the PHYLIP library and simulated keys of two quantum systems: Quantum Oblivious Key Distribution and Quantum Key Distribution. This demonstrates its effectiveness and practicality. We benchmark this implementation against a classical-only solution and we conclude that both approaches render similar execution times, the only difference being the time overhead taken by the oblivious key management system of the quantum-assisted approach.
INDEX TERMS: Genomics | phylogenetic trees | privacy | quantum oblivious transfer | quantum secure multiparty computation | security.
مقاله انگلیسی
2 Capability token selection algorithms to implement lightweight protocols
قابلیت الگوریتم های انتخاب نشانه برای پیاده سازی پروتکل های سبک وزن-2022
The IoT (Internet of Things) is now one of the most significant infrastructure and has to be secure against malicious accesses. Especially, it is critical to make devices secure in the IoT. In the CBAC (Capability-Based Access Control) model adopted to the IoT, device owners issue subjects capability tokens, i.e. a set of access rights on objects in devices. Objects in devices are data resource manipulated by subjects. Data are exchanged among subjects and objects through manipulating objects. Here, if subjects attempt to manipulate objects in accordance with the capability tokens issued, the subjects can get data which the subjects are not authorized to get, i.e. illegal information flow and late information flow occur. In our previous studies, protocols are implemented to prevent both illegal and late types of information flows from occurring. Here, operations implying such information flows are interrupted. However, the request processing time gets longer as the number of capability tokens used increases. In this paper, an MRCTSD (Minimum Required Capability Token Selection for Devices) algorithm is newly proposed to reduce the number of capability tokens used. In the evaluation, it is shown that the request processing times and the numbers of capability tokens used in the lightweight protocols realized with the MRCTSD algorithm are shorter and smaller than the conventional protocols, respectively.
keywords: CBAC (Capability-Based Access Control) model | Capability token selection algorithm | CoAP (Constrained Application Protocol) | Information flow control | IoT (Internet of Things) | Lightweight protocol
مقاله انگلیسی
3 Making the invisibles visible: Including animals in sustainability (and) accounting
قابل مشاهده کردن نامرئی ها: شامل حیوانات در حسابداری و پایداری-2021
In this essay we draw attention to a crisis that touches upon a great number of individuals: the plight of non-human animals. Billions of farmed animals are slaughtered each year to produce for instance food and clothes, while wild animals experience various degrees of human-induced harms. Yet, non-human animals are largely invisible in discussions of sustainability and associated accounting efforts. This is due to a problematic ontology that leaves domesticated animals hovering between society and nature while grouping wild animals with their habitats and inanimate things. Our purpose is to consider how to make animals visible in sustainability (and) accounting. To that end, we first illustrate how sociology and philosophy, among other disciplines, have begun to shift towards the view that non-human animals are worthy of our moral, political and legal consideration. We then develop a view of sustainability that explicitly includes animals and introduce an accounting framework with examples of indicators to track progress from no rights to fundamental rights for non-human animals.
keywords: حقوق حیوانات | رفاه حیوانات | شاخص ها | پایداری | Animal rights | Animal welfare | Indicators | Sustainability
مقاله انگلیسی
4 Modern slavery statements: From regulation to substantive supply chain reporting
اظهارات برده داری مدرن: از مقررات گرفته تا گزارش زنجیره تأمین اساسی-2021
Recent years have seen a renewed focus on labor standards in the supply chain, prompted by legislation that requires firms to provide an account of their efforts to combat modern slavery. However, as a common problem of non-financial disclosure regulation, companies can decide the extent and content of their reporting, which could potentially result in merely symbolic disclosures with little substance. We examine the disclosure of substantive actions in modern slavery statements, defined as those disclosures of corporate actions that can positively affect working conditions in supply chains. We examine the corporate disclosure of these actions over time in order to evaluate whether legally mandated disclosure requirements could lead to progress in combatting modern slavery. For this purpose, we collected modern slavery statements from companies that had issued such statements for at least two different years after the
Keywords: Modern slavery statements | Social sustainability | Substantive disclosures | CSR Disclosures | Legitimacy theory | Content analysis
مقاله انگلیسی
5 EBAPy: A Python framework for analyzing the factors that have an influence in the performance of EEG-based applications
EBAPy: یک چارچوب پایتون برای تجزیه و تحلیل عوامل موثر بر عملکرد برنامه های مبتنی بر EEG-2021
EBAPy is an easy-to-use Python framework intended to help in the development of EEG-based applications. It allows performing an in-depth analysis of factors that influence the performance of the system and its computational cost. These factors include recording time, decomposition level of Discrete Wavelet Transform, and classification algorithm. The ease-of-use and flexibility of the presented framework have allowed reducing the development time and evaluating new ideas in developing biometric systems using EEGs. Furthermore, different applications that classify EEG signals can use EBAPy because of the generality of its functions. These new applications will impact human–computer interaction in the near future.Code metadataCurrent code version v1.1Permanent link to code/repository used for this code version https://github.com/SoftwareImpacts/SIMPAC-2021-2Permanent link to Reproducible Capsule https://codeocean.com/capsule/4497139/tree/v1Legal Code License MITCode versioning system used gitSoftware code languages, tools, and services used Python Compilation requirements, operating environments & dependencies If available Link to developer documentation/manualSupport email for questions dustin.carrion@gmail.com
Keywords: EEG-based applications | Recording time | Discrete wavelet transform
مقاله انگلیسی
6 اقتصاد ، جامعه و حاکمیت در قطب شمال: مروری بر پروژه تحقیقاتی ArCS در زمینه علوم انسانی و علوم اجتماعی (2015-2020)
سال انتشار: 2021 - تعداد صفحات فایل pdf انگلیسی: 13 - تعداد صفحات فایل doc فارسی: 55
این مقاله به طور خلاصه دستاوردهای یکی از موضوعات موجود در پروژه Arctic Challenge برای پایداری (ArCS) است. این مضمون که عمدتاً از محققان علوم انسانی و اجتماعی تشکیل شده است ، برای اتصال دستاوردهای سایر مضامین به ذینفعان و سیاست گذاران طراحی شده است. با توجه به روش تحقیق ما ، این مقاله بحث را در سه زمینه تحقیقاتی پیش می برد. ابتدا ، توسعه اقتصادی در قطب شمال مورد تجزیه و تحلیل قرار می گیرد. در حالی که گرم شدن آب و هوا در قطب شمال افزایش یافته است ، امکان استفاده از مسیر دریای شمال و توسعه منابع زیرزمینی در حال گسترش است. پایداری این توسعه برای شناسایی چشم انداز آینده فعالیت اقتصادی بررسی خواهد شد. دوم ، تعامل بین انسان و محیط در نظر گرفته خواهد شد. بر اساس اطلاعات جمع آوری شده از طریق کار میدانی در سیبری شرقی ، داخلی آلاسکا ، و گرینلند ، نشان داده خواهد شد که چگونه عوامل انسانی و طبیعی در تغییر محیط به طور پیچیده ای بافته شده اند. سوم ، موضوعات مختلفی درباره حکومت قطب شمال مورد بحث و بررسی قرار خواهد گرفت. چندین نکته از جمله سیاست حقوقی قطب شمال ، روابط بین الملل و دخالت افراد بومی در اداره منابع از موضوعات اصلی بحث خواهد بود. پس از نشان دادن این دستاوردهای پروژه ، چالش های آینده مطالعه قطب شمال نشان داده خواهد شد.
کلید واژه ها: مسیر دریایی شمال | توسعه منابع | دانش بومی | دولت قطب شمال
مقاله ترجمه شده
7 Application of green supply chain management in the oil Industries: Modeling and performance analysis
کاربرد مدیریت زنجیره تامین سبز در صنایع نفت: مدل سازی و تحلیل عملکرد-2021
Environmental concerns relating to production affairs have made various organizations use green practices in different processes of supply chain, because the green supply chain management (GSCM) is considered as an important organizational philosophy to decrease environmental risks and as a preventive approach in order to increase environmental performance and achievement of competitive advantages for organizations. The purpose of the present article is to design an interactive model for the practices of GSCM and its application to clustering oil industries for analyzing their green performance. Therefore, the literature was studied and a total of fifteen practices were obtained using experts’ opinions in academic and oil industry professionals. In next, the fuzzy interpretative structural modeling (FISM) approach was utilized so as to determine the relationship between the practices through considering the linguistic ambiguities of judgments and designing the structural model. The existing relationships within the structural model were studied and tested by means of structural equation modeling (SEM). After that, the relative importance of each practice was calculated by applying fuzzy analysis network process (FANP). In the next, the oil industries were categorized in two clusters using the K-means algorithm aggregated to the particle swarm optimization algorithm. Results of the present study showed that ‘‘legal requirements and regulations”, ‘‘intra-organizational environmental management”, ‘‘green design” and ‘‘green technology” are of root and influential practices with relatively more importance than others; in addition, it was cleared that the first cluster industries have high performance whereas the second ones have medium performance from the viewpoint of considering the practices of GSCM. Finally, the discriminant function designed to forecasting environment performance of the oil industries and member- ship to clusters for each of them.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the Web International Conference on Accelerating Innovations in Material Science – 2020.
Keywords: Green Supply Chain Management | Oil industries | Fuzzy interpretative structural modeling | Kmeans | Particle swarm optimization | Clustering | Discriminant analysis
مقاله انگلیسی
8 A fuzzy based hybrid decision framework to circularity in dairy supply chains through big data solutions
چارچوب تصمیم ترکیبی مبتنی بر فازی برای مدور بودن در زنجیره های تامین لبنیات از طریق راه حل های داده های بزرگ-2021
This study determines the potential barriers to achieving circularity in dairy supply chains; it proposes a framework which covers big data driven solutions to deal with the suggested barriers. The main contribution of the study is to propose a framework by making ideal matching and ranking of big data solutions to barriers to circularity in dairy supply chains. This framework further offers a specific roadmap as a practical contribution while investigating companies with restricted resources. In this study the main barriers are classified as ‘eco- nomic’, ‘environmental’, ‘social and legal’, ‘technological’, ‘supply chain management’ and ‘strategic’ with twenty-seven sub-barriers. Various big data solutions such as machine learning, optimization, data mining, cloud computing, artificial neural network, statistical techniques and social network analysis have been suggested. Big data solutions are matched with circularity focused barriers to show which solutions succeed in overcoming barriers. A hybrid decision framework based on the fuzzy ANP and the fuzzy VIKOR is developed to find the weights of the barriers and to rank the big data driven solutions. The results indicate that among the main barriers, ‘economic’ was of the highest importance, followed by ‘technological’, ‘environmental’, ‘strategic’, ‘supply chain management’ then ‘social and legal barrier’ in dairy supply chains. In order to overcome circularity focused barriers, ‘optimization’ is determined to be the most important big data solution. The other solutions to overcoming proposed challenges are ‘data mining’, ‘machine learning’, ‘statistical techniques’ and ‘artificial neural network’ respectively. The suggested big data solutions will be useful for policy makers and managers to deal with potential barriers in implementing circularity in the context of dairy supply chains.
Keywords: Dairy supply chain | Barriers | Circular economy | Big data solution | Fuzzy ANP - VIKOR | Group decision making system
مقاله انگلیسی
9 Accounting and auditing of credit loss estimates: The hard and the soft
حسابداری و حسابرسی تخمین زیان اعتباری: سخت و نرم-2021
A key goal of financial reporting is to address information asymmetries, which are amplified in the case of banks given their credit, maturity and liquidity transformation and complex, judgmental accounting standards dealing with expected credit losses (ECL). The paper explores the role of bank management in estimating and recognizing ECL, and how external auditors challenge the resulting figures. Based on analysis of G-SIB disclosures, it concludes that management and auditors tend to prioritize observable and verifiable, hard information to reduce challenge to their reported estimates and protect against the threat of legal liability. Emphasis on such information facilitates loss deferral, damaging the reliability of banks’ financial reporting, obscuring their safety and soundness picture and jeopardizing financial stability. Based on these conclusions, the paper seeks to open a new path to the research and policy analysis of credit loss recognition, introducing proposals to address the procyclicality of credit loss accounting by tackling inappropriate incentives that decouple risk taking from its translation onto banks’ financial statements.
keywords: انتظارات اعتباری انتظار می رود | عدم تقارن اطلاعات | افشای | عوارض جانبی | ثبات اقتصادی | پروسیکیت | Expected Credit Losses | Information asymmetries | Disclosures | Externalities | Financial stability | Procyclicality
مقاله انگلیسی
10 A Methodology For Large-Scale Identification of Related Accounts in Underground Forums
یک روش برای شناسایی در مقیاس بزرگ حساب های مرتبط در انجمن های زیرزمینی-2021
Underground forums allow users to interact with communities focused on illicit activities. They serve as an entry point for actors interested in deviant and criminal topics. Due to the pseudo-anonymity provided, they have become improvised marketplaces for trading illegal products and services, including those used to conduct cyberattacks. Thus, these forums are an important data source for threat intelligence analysts and law enforcement. The use of multiple accounts is forbidden in most forums since these are mostly used for malicious purposes. Still, this is a common practice. Being able to identify an actor or gang behind multiple accounts allows for proper attribution in online investigations, and also to design intervention mechanisms for illegal activities. Existing solutions for multi-account detec- tion either require ground truth data to conduct supervised classification or use manual approaches. In this work, we propose a methodology for the large-scale identification of re- lated accounts in underground forums. These accounts are similar according to the distinc- tive content posted, and thus are likely to belong to the same actor or group. The methodol- ogy applies to various domains and leverages distinctive artefacts and personal information left online by the users. We provide experimental results on a large dataset comprising more than 1.1M user accounts from 15 different forums. We show how this methodology, com- bined with existing approaches commonly used in social media forensics, can assist with and improve online investigations. © 2021 Elsevier Ltd. All rights reserved.
keywords: رسانه های اجتماعی قانونی | انجمن های زیرزمینی | اندازه گیری در مقیاس بزرگ | حساب های مرتبط | سایبری | Social media forensics | Underground forums | Large-Scale measurement | Related accounts | Cybercrime
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 4593 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 4593 :::::::: افراد آنلاین: 79