4,004 research outputs found

    Terms of Citizens 'Rights Restriction when Applying Measures of Criminal Procedure Forcing

    Get PDF
    The article considers the nature and purpose of measures of criminal procedure coercion. The authors highlighted the grounds for restricting constitutional rights and freedoms when using coercive means. The author’s definition of measures of criminal procedural coercion is formulated, which means: the preventive action applied by the authorities conducting the criminal process in the criminal case aimed at achieving the objectives of the pre-trial investigation and trial or ensuring proper conduct of the participants in the criminal process specified in the law, if any conditions and circumstances that necessitate the use of such an impact. The issues of legality and localization criteria of personal property and non-property subjective interests of citizens are raised. The analysis of the main classifications of measures of procedural coercion is carried out, and the author's approach to the classification of measures of procedural coercion is proposed, based on the conditions and the real need to limit the rights and legitimate interests of the person. Article materials can be of practical value for employees of investigative units conducting pre-trial investigations and encountering problems with the application of procedural coercive measures

    Specific heat and magnetocaloric effect in Pr1-xAgxMnO3 manganites

    Full text link
    The magnetocaloric effect in alternating magnetic fields has been investigated in Pr1-xAgxMnO3 manganites with x=0.05-0.25. The stepwise reversal of the sign of the magnetocaloric effect has been revealed in a weakly doped sample (x=0.05) at low temperatures (~80 K). This reversal is attributed to the coexistence of the ferromagnetic and canted antiferromagnetic phases with different critical temperatures.Comment: 4 pages, 4 figure

    Muon Track Matching

    Get PDF
    For most physical processes the tracks observed in the muon stations must be matched with the corresponding tracks in the inner tracker, the external muon system providing muon identification and triggering but the tracker points giving the precise momentum measurement at lower momenta. For high momenta the momentum resolution is much improved by the interconnection of inner and outer measurements. The matching of outer and inner measurements is more delicate in case of muons embedded in jets. A study of the matching procedure was carried out using samples of (b, anti b) jets at high Pt, requiring (b, anti b) -> mu decays.For most physical processes the tracks observed in the muon stations must be matched with the corresponding tracks in the inner tracker, the external muon system providing muon identification and triggering but the tracker points giving the precise momentum measurement at lower momenta. For high momenta the momentum resolution is much improved by the interconnection of inner and outer measurements. The matching of outer and inner measurements is more delicate in case of muons embedded in jets. A study of the matching procedure was carried out using samples of (b, anti b) jets at high Pt, requiring (b, anti b) -> mu decays

    Formation of professional competence of bachelors engineer-ing profile under realization networking

    Full text link
    The article describes the process of formation of the professional competencies of bachelors technical universities through the introduction and realization networking in the educational processВ статье рассмотрен процесс формирования профессиональных компетенций бакалавров технических вузов за счет внедрения и реализации сетевого взаимодействия в учебный процес

    Identity and integration of Russian speakers in the Baltic states: a framework for analysis

    Get PDF
    Following a review of current scholarship on identity and integration patterns of Russian speakers in the Baltic states, this article proposes an analytical framework to help understand current trends. Rogers Brubaker's widely employed triadic nexus is expanded to demonstrate why a form of Russian-speaking identity has been emerging, but has failed to become fully consolidated, and why significant integration has occurred structurally but not identificationally. By enumerating the subfields of political, economic, and cultural ‘stances’ and ‘representations’ the model helps to understand the complicated integration processes of minority groups that possess complex relationships with ‘external homelands’, ‘nationalizing states’ and ‘international organizations’. Ultimately, it is argued that socio-economic factors largely reduce the capacity for a consolidated identity; political factors have a moderate tendency to reduce this capacity, whereas cultural factors generally increase the potential for a consolidated group identity

    Поведенческая идентификация программ

    Get PDF
    The algorithm of pattern mining from sequences of system calls is described. Patterns are used for process identification or establishing the fact that some sequence of system calls was produced by the process which was used in pattern extraction. Existing algorithms are computationaly more complex or reveals high false positive runs in experiments in comparision with an automaton building algorithm. Our algorithm is less complex and more precise in comparision with the classical N-gram algorithm. Performance tests reveal that our kernel monitor does not significatly slow down the processing of the operating system. After 20 minutes of learning the algorithm is able to identify any thread of any process with 85% precision. Program identification based on behavior is used for anomaly detection of malicious activities in system.В работе описан алгоритм выделения шаблонов переменной длины из последовательностей системных вызовов. Эти шаблоны используются для идентификации процессов – установления того, что некоторая последовательность вызовов была сгенерирована тем же самым процессом, из которого были выделены шаблоны. Существующие алгоритмы либо вычислительно сложны, либо имеют высокий уровень ложных срабатываний по сравнению со сложным и ненадежным автоматным подходом. Предложенный в работе алгоритм имеет низкую вычислительную сложность и большую точность, чем классический N-граммный алгоритм. Тесты производительности показали, что реализованный монитор системных вызовов несущественно замедляет работу операционной системы. Предложенный алгоритм после двадцатиминутного обучения способен идентифицировать за одну минуту потоки процессов с точностью 85%. Поведенческая идентификация потоков программ используется для аномального обнаружения вредоносных воздействий на систему
    corecore