657,061 research outputs found

    Henberg Takes Holistic Approach

    Get PDF
    Long before the whisper of terms like global warming and carbon footprints, before SIGG bottles and reusable shopping bags, Marvin Henberg was already a committed environmental advocate

    Strengthening Data Security: an Holistic Approach

    Get PDF
    In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards the construction of firm and resilient data and information security policies within the social science data archiving communities. While international standards can provide theoretical guidelines for the construction of such a policy, procedures need to be informed by more practical considerations. Attention is drawn to the necessity of following a holistic approach to data security, which includes the education of data creators in the reduction of disclosure risk, the integration of robust and appropriate data processing, handling and management procedures, the value of emerging technological solutions, the training of data users in data security, and the importance of management control, as well as the need to be informed by emerging government security and digital preservation standards

    A holistic approach to child maltreatment

    Get PDF

    A Holistic Approach in Embedded System Development

    Full text link
    We present pState, a tool for developing "complex" embedded systems by integrating validation into the design process. The goal is to reduce validation time. To this end, qualitative and quantitative properties are specified in system models expressed as pCharts, an extended version of hierarchical state machines. These properties are specified in an intuitive way such that they can be written by engineers who are domain experts, without needing to be familiar with temporal logic. From the system model, executable code that preserves the verified properties is generated. The design is documented on the model and the documentation is passed as comments into the generated code. On the series of examples we illustrate how models and properties are specified using pState.Comment: In Proceedings F-IDE 2015, arXiv:1508.0338

    A holistic multi-scale approach to using 3D scanning technology in accident reconstruction

    Get PDF
    Three-dimensional scanning and documentation methods are becoming increasingly employed by law enforcement personnel for crime scene and accident scene recording. Three-dimensional documentation of the victim’s body in such cases is also increasingly used as the field of forensic radiology and imaging is expanding rapidly. These scanning technologies enable a more complete and detailed documentation than standard autopsy. This was used to examine a fatal pedestrian-vehicle collision where the pedestrian was killed by a van whilst crossing the road. Two competing scenarios were considered for the vehicle speed calculation: the pedestrian being projected forward by the impact or the pedestrian being carried on the vehicle’s bonnet. In order to assist with this, the impact area of the accident vehicle was scanned using laser surface scanning, the victim was scanned using postmortem CT and micro-CT and the data sets were combined to virtually match features of the vehicle to injuries on the victim. Micro-CT revealed additional injuries not previously detected, lending support to the pedestrian-carry theory

    A Holistic Approach

    Get PDF
    During my interview for the position of editor here at Civil War Book Review, the director, Leah Wood Jewett, described the United States Civil War Center and its publication as having the mission of promoting the multidisciplinary study of the United States Civil War. Throughout my inaugural...
    • …
    corecore