Celotno besedilo
Dostopno za:
BFBNIB, DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
62.
SpaceX meets ScopeX : ASSA news Stewart, Chris
Monthly notes of the Astronomical Society of Southern Africa,
08/2012, Letnik:
71, Številka:
7_8
Journal Article
Recenzirano
Perhaps you are wondering how come the ScopeX 2012 garments sported a Dragon mission patch? Let me tell you a story..
This empirical study sought to explore the relationship of personality, spirituality and empathy. Specifically, the possible additional predictive ability of spirituality for empathy when also ...including personality was examined. Multidimensional measures of spirituality (Spiritual Involvement and Beliefs Scale) and personality (Big Five Inventory) were utilized with a sample of both undergraduate, graduate students and practitioners from two disciplines. Data was collected from several sites, including three universities. Results demonstrated that most spiritual dimensions were not significantly correlated with empathy. One spirituality dimension (Spiritual Perspective) however added significantly to a regression model that also included personality dimensions.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
There exists considerable conflict between the current social work worldview and that espoused by traditional Christianity. While the conflict is most evident in specific definitions of general ...social work values, innate differences in foundational assumptions of competing philosophical perspectives make such conflict inevitable. An attempt to utilize pluralism in two forms to reconcile differences while somewhat successful is inherently incomplete. The failure of pluralistic solutions is primarily due to the issue of exclusivity. New philosophical principles need to be explored and applied to the problem of competing and exclusive worldviews if social work is to advance developing a comprehensive value base
ASSA instrumentation section Stewart, Chris
Monthly notes of the Astronomical Society of Southern Africa,
06/2022, Letnik:
81, Številka:
5-6
Journal Article
Instrumentation has for centuries been a necessary component for the advancement of astronomy. In the main, this relates to optical equipment - predominantly telescopes, but also binoculars, ...eyepieces, mounts, photometers, spectroscopes, imaging equipment, and more.
Managing Risk Through Innovation Stewart, Chris; Armentrout, Tiffany; Shorstein, Daniel ...
The journal of government financial management,
07/2020, Letnik:
69, Številka:
2
Journal Article
Recenzirano
...the value of new technology has soared. ...many federal, state and local government organizations are taking on the challenge, applying innovations such as enterprise risk management (ERM), shared ...services, robotic process automation (RPA), artificial intelligence (AI) and machine learning (ML). Open source data and software also provide solutions for entire organizations. Since leading an implementation team for one of these innovations can catapult the CFO to the forefront of organizational risk monitoring, it is worth knowing how each technology can help. erm A framework to identify, assess, mitigate, monitor, and communicate organizational risks, ERM heightens awareness of the full risk portfolio by aligning strategic and operational perspectives. Tiffany Armentrout is a senior manager in Deloitte & Touche LLP's accounting and internal controls practice with nearly 15 years' experience leading large, complex teams and providing program management office support in the areas of financial statement preparation, internal controls, audit readiness, and audit remediation.
Industrial Information Technology infrastructures are often vulnerable to cyberattacks. To ensure security to the computer systems in an industrial environment, it is required to build effective ...intrusion detection systems to monitor the cyber-physical systems (e.g., computer networks) in the industry for malicious activities. This article aims to build such intrusion detection systems to protect the computer networks from cyberattacks. More specifically, we propose a novel unsupervised machine learning approach that combines the K-Means algorithm with the Isolation Forest for anomaly detection in industrial big data scenarios. Since our objective is to build the intrusion detection system for the big data scenario in the industrial domain, we utilize the Apache Spark framework to implement our proposed model that was trained in large network traffic data (about 123 million instances of network traffic) stored in Elasticsearch. Moreover, we evaluate our proposed model on the live streaming data and find that our proposed system can be used for real-time anomaly detection in the industrial setup. In addition, we address different challenges that we face while training our model on large datasets and explicitly describe how these issues were resolved. Based on our empirical evaluation in different use cases for anomaly detection in real-world network traffic data, we observe that our proposed system is effective to detect anomalies in big data scenarios. Finally, we evaluate our proposed model on several academic datasets to compare with other models and find that it provides comparable performance with other state-of-the-art approaches.