نتایج جستجو برای: usage of varied concepts

تعداد نتایج: 21177184  

Journal: :مرتع و آبخیزداری 0
محمد جعفری استاد دانشکدة منابع طبیعی دانشگاه تهران علی طویلی دانشیار دانشکدة منابع طبیعی دانشگاه تهران یحیی اسماعیل پور استادیار دانشکدة کشاورزی و منابع طبیعی دانشگاه هرمزگان حسین آذرنیوند استاد دانشکدة منابع طبیعی دانشگاه تهران محمد زارع چاهوکی دانشیار دانشکدة منابع طبیعی دانشگاه تهران حمید رضا اصغری دانشیار دانشکدة کشاورزی دانشگاه شاهرود

abstract in this study the effects and costs of application of two kinds of super absorbent polymer on the establishment and surviving of seedlings was investigated. experiments were done in the field and on two kind of soil with different salinity (ec: 4.5 and 8 dsm-1). the results showed: the establishment rate of seedling in control was about 40 percent. the percentage of seedling establishm...

2014
Aneta Poniszewska-Marańda

This paper presents an approach of role-based access control (RBAC) for information systems with the use of MDA (Model Driven Architecture). The main purpose is to join the concepts of MDA approach with the concepts of access control models, in particular with the concepts of access control based on roles and on usage concept. To reach this objectives the appropriate solution was created to mod...

Journal: :Enterprise IS 2009
João Paulo A. Almeida Giancarlo Guizzardi Paulo Sérgio Santos

In this paper, we provide a semantic foundation for role-related concepts in Enterprise Modelling. We use a conceptual modelling framework to provide a well-founded underpinning for these concepts. We review a number of Enterprise Modelling approaches in light of the concepts described (namely, ARIS, Archimate, DoDAF, RMODP and BPMN). This allows us to understand the various approaches, to cont...

2013
Ayminsyadora Ayub Munirah Ghazali Abdul Razak Othman

Many research on primary school children in Malaysia indicate an over reliance on the written symbols representation (Munirah, 2001; Parmjit, 2005; Munirah& Noor Azlan, 2002; Chinappan & Ambigapathy, 2009; Mohini & Jacinta, 2010). This is a cause for concern as researchers draw strong connections between the representations children use and their understanding (Lamon, 2001). Janvier (1987) desc...

2016
Nina Singh Matthew T. Sit Deanna M. Chung Ana A. Lopez Ranil Weerackoon Pamela J. Yeh

Media plays an important role in informing the general public about scientific ideas. We examine whether the word "evolve," sometimes considered controversial by the general public, is frequently used in the popular press. Specifically, we ask how often articles discussing antibiotic resistance use the word "evolve" (or its lexemes) as opposed to alternative terms such as "emerge" or "develop."...

2015
Anita Greenhill

The individual sense of gendered identity and location are embedded within information technology (IT) usage (Meyrowitz, 1985). Exploring gender in relation to place and IT assists to reveal the impact that cultural knowledge has upon IT usage. This article illustrates the intertwined complex of issues that associate gender and place with IT by examining the currently dominant approaches to res...

2013
Li Hong Wu Wen Hai Xu Yi Ping Li

Swath bathymetry system surveys with wide swath, high location resolution, and is used to detect sea bottom terrain. But the object resolution detected decreases as the depth increasing, its data processing with high mistake, used rarely in sea floor object survey.So GeoSwath, a multibeam sonar does. Although it covers an angular range of -120°to 120 °from the vertical direction, providing high...

2017
Ulysses P. Pacheco Filho

The article discusses the importance of two-way online rating systems as one of the pillars of the sharing-economy, transforming strangers into trustable providers and customers. The article ́s objective is to apply the concepts and practice based lens developed by Orlikowski and Scott (2014) to a two-way rating system by adding the provider evaluation of their clients. The article also explores...

2011
Shan Chen Mary-Anne Williams

Data purpose is a central concept to modeling privacy requirements for information systems. Existing purpose-centric approaches for privacy protection have mainly focused on access control. The problem of ensuring the consistency between data purpose and data usage has been under-addressed. Given the lack of practical purpose-centric solutions, we argue that a grounded understanding of the unde...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید