502 research outputs found

    Ein geschichtliches Panorama des Deutschen als Fremdsprache in der Türkei

    Full text link
    In dieser Arbeit wird versucht, den Stellenwert des Deutschen als Fremdsprache von der Zeit des Osmanischen Reichs bis zur heutigen Türkei darzustellen. Der erste Teil dieser Arbeit befasst sich vorwiegend mit den türkisch-deutschen Beziehungen und mit der Entwicklung des DaF-Unterrichts im Osmanischen Reich. Der zweite Teil behandelt den Werdegang des DaF-Unterrichts nach der Gründung der Türkischen Republik. Sowohl im ersten als auch im zweiten Teil wird auf geschichtliche Aspekte und parallel auch auf die Bedeutung von DaF zur jeweiligen Zeit eingegangen. Der letzte Abschnitt umfasst die gegenwärtige Bedeutung und Situation des Deutschunterrichts an türkischen Schulen

    Modelling an idle building case through SWOT analysis and Fuzzy DEMATEL: a study on anti-commons

    Get PDF
    The situation of buildings degradation is very severe in many cities in the world. The case of a degraded building is studied in this article. The building becomes ruined because owners do not agree about what to do with the building and no one can use it without the consent of the others. Besides, time makes the building become with a lower value. After a long period of degradation, the question “what doing now?” is posed. Considering the situation of many degraded buildings, the present study aims to analyze a possible cause and work a situation of anti-commons concerning a building owned by several holders having each one exclusion rights. We use SWOT Analysis to build strategies for this anti-commons’ real estate case. Then Fuzzy DEMATEL model is applied to understand the relations between strategies for a final decision. Conclusions allow understanding the relations between strategies and how they influence each other to get a final decision for this problem. For our case, we recommend a concrete strategy to the owners after evaluating the preferences of the decision makers.info:eu-repo/semantics/publishedVersio

    Epuraea imperialis (Reitter, 1877). New invasive species of Nitidulidae (Coleoptera) in Europe, with a checklist of sap beetles introduced to Europe and Mediterranean areas

    Get PDF
    Australian species Epuraea imperialis (Reitter, 1877), previously introduced to New Zealand, is recorded as a new invasive species from the Canary Islands, Continental Spain, Portugal, France, Belgium, and Italy. It is redescribed and figured, and its taxonomic position in the genus Epuraea Erichson, 1843 is discussed. A tentative checklist of sap beetles introduced to Europe and the Mediterranean areas is finally included

    Multidetector computed tomography findings of an asymptomatic levoatrial cardinal vein with an interatrial course

    Get PDF
    A 57-year-old female patient with a family history of coronary artery diseaseadmitted to our hospital for the coronary check-up. A coronary angiographywas performed with ECG-gated 128 slice dual source computed tomography.Multidetector computed tomography (MDCT) showed, in addition to the normalcoronary arteries, a persistent levoatrial cardinal vein (LCV) draining into vena cavasuperior. ECG-gated cardiac MDCT is a useful tool showing the origin, course, anddrainage site of LCV

    NoCry: No More Secure Encryption Keys for Cryptographic Ransomware

    Get PDF
    Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific strategy they implement, and all have pros and cons. However, three requirements concern them all: their implementation must be secure, be effective, and be efficient. Recently, Genç et al. proposed to stop a specific class of ransomware, the cryptographically strong one, by blocking unauthorized calls to cryptographically secure pseudo-random number generators, which are required to build strong encryption keys. Here, in adherence to the requirements, we discuss an implementation of that solution that is more secure (with components that are not vulnerable to known attacks), more effective (with less false negatives in the class of ransomware addressed) and more efficient (with minimal false positive rate and negligible overhead) than the original, bringing its security and technological readiness to a higher level

    Exploiting the Lability of Metal Halide Perovskites for Doping Semiconductor Nanocomposites

    Get PDF
    Cesium lead halides have intrinsically unstable crystal lattices and easily transform within perovskite and nonperovskite structures. In this work, we explore the conversion of the perovskite CsPbBr3 into Cs4PbBr6 in the presence of PbS at 450 °C to produce doped nanocrystal-based composites with embedded Cs4PbBr6 nanoprecipitates. We show that PbBr2 is extracted from CsPbBr3 and diffuses into the PbS lattice with a consequent increase in the concentration of free charge carriers. This new doping strategy enables the adjustment of the density of charge carriers between 1019 and 1020 cm-3, and it may serve as a general strategy for doping other nanocrystal-based semiconductors.M.C. has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant Agreement No. 665385. ICN2 acknowledges funding from Generalitat de Catalunya 2017 SGR 327. ICN2 is supported by the Severo Ochoa program from Spanish MINECO (Grant No. SEV-2017-0706) and is funded by the CERCA Programme/Generalitat de Catalunya. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 823717 – ESTEEM3. M.V.K. acknowledges the support by the European Research Council under the Horizon 2020 Framework Program (ERC Consolidator Grant SCALE-HALO Grant Agreement No. 819740) and by FET-OPEN project no. 862656 (DROP-IT)

    The effect of new Turkish foreign policy on international trade

    Get PDF
    Turkish foreign policy has changed substantially within the last decade. Even though its relationship with the West still has significance, relations with neighboring countries and other countries in Africa, the Middle East, and Asia have improved. This new foreign policy incorporates Turkey's political and economic aspirations. Its aim is to utilize the country's economic strength in order to reach political goals while simultaneously using political tools to obtain economic benefits. This study analyzes the effects of the recent change in foreign policy on Turkey's international trade. Specifically, we investigate the influence of Turkish Prime Minister Erdoǧan's foreign visits on international trade by using a standard trade gravity model. Statistical analyses imply that Erdoǧan's visits help increase Turkish international trade

    Epuraea imperialis (Reitter, 1877). New invasive species of Nitidulidae (Coleoptera) in Europe, with a checklist of sap beetles introduced to Europe and Mediterranean areas

    Get PDF
    Australian species Epuraea imperialis (Reitter, 1877), previously introduced to New Zealand, is recorded as a new invasive species from the Canary Islands, Continental Spain, Portugal, France, Belgium, and Italy. It is redescribed and figured, and its taxonomic position in the genus Epuraea Erichson, 1843 is discussed. A tentative checklist of sap beetles introduced to Europe and the Mediterranean areas is finally included

    Why Current Statistical Approaches to Ransomware Detection Fail

    Get PDF
    The frequent use of basic statistical techniques to detect ransomware is a popular and intuitive strategy; statistical tests can be used to identify randomness, which in turn can indicate the presence of encryption and, by extension, a ransomware attack. However, common file formats such as images and compressed data can look random from the perspective of some of these tests. In this work, we investigate the current frequent use of statistical tests in the context of ransomware detection, primarily focusing on false positive rates. The main aim of our work is to show that the current over-dependence on simple statistical tests within anti-ransomware tools can cause serious issues with the reliability and consistency of ransomware detection in the form of frequent false classifications. We determined thresholds for five key statistics frequently used in detecting randomness, namely Shannon entropy, chi-square, arithmetic mean, Monte Carlo estimation for Pi and serial correlation coefficient. We obtained a large data set of 84,327 files comprising of images, compressed data and encrypted data. We then tested these thresholds (taken from a variety of previous publications in the literature where possible) against our dataset, showing that the rate of false positives is far beyond what could be considered acceptable. False positive rates were often above 50% and even above 90% on several occasions. False negative rates were also generally between 5% and 20%, numbers which are also far too high. As a direct result of these experiments, we determine that relying on these simple statistical approaches is not good enough to detect ransomware attacks consistently. We instead recommend the exploration of higher-order statistics such as skewness and kurtosis for future ransomware detection techniques
    corecore