Results for 'TCPS'

22 found
Order:
  1.  15
    AQM scheme design for TCP network via Takagi-Sugeno fuzzy method.Sheng Xu, Minrui Fei, Xinhao Yang & Liqin Wu - 2016 - Complexity 21 (S2):606-612.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  12
    Evaluating the efficacy of the education and training program of the TCPS 2.Denise Stockley, Laura Kinderman, Rylan Egan, Chi Yan Lam & Amber Hastings - 2017 - Research Ethics 13 (3-4):102-114.
    In 2011, the Secretariat on Responsible Conduct of Research launched a set of educational opportunities to facilitate and enhance the dissemination of TCPS 2, the 2nd edition of the Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans, which guides Canadian research ethics. Three educational modalities were implemented to aid participants in developing or refining their ethical understanding and practice: Regional Workshops, which brought together diverse disciplinary perspectives; the CORE tutorial, which enabled individuals to discover the various aspects and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  5
    Sudden Transition from Equilibrium to Hybrid Chaos and Periodic Oscillations of the State-Dependent Round-Trip Delayed Nonsmooth Compound TCP with GRED Congestion Control System via HB-AFT.Lijun Pei, Hongyang Zhang & Yueli Chen - 2020 - Complexity 2020:1-15.
    In this paper, the nonsmooth compound transmission control protocol with the gentle random early detection system with the state-dependent round-trip delay is investigated in detail. Uniqueness of the positive equilibrium is proved firstly. Then, the closed approximate periodic solutions in this state-dependent delayed nonsmooth compound TCP with the GRED model are obtained by employing the harmonic balance and alternating frequency/time domain method. Then, we compare the results generated by numerical simulations with those of the closed approximate expressions obtained by HB-AFT. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  21
    A cellular automata model can quickly approximate UDP and TCP network traffic.Richard R. Brooks, Christopher Griffin & T. Alan Payne - 2004 - Complexity 9 (3):32-40.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  6
    Needs and preferences of REB members in the development of a new TCPS 2 training program in Canada.Jiale Xie, Denise Stockley, Amber Hastings Truelove, Susan Marlin, Rachel Zand, Jennifer Payne, Miranda Miller & Eleftherios Soleas - forthcoming - Research Ethics.
    Despite advancements in human research ethics and the growing significance of Research Ethics Board (REB) members, educational opportunities specifically tailored to their needs remain lacking in many countries. In response to this gap, our research aims to understand the demographics, needs, and preferences for educational opportunities of REB members in Canada. We conducted a survey that found REB demographics to be diverse and have different perceptions of their roles on topics such as the evaluation of the scientific merit of studies (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  15
    Size versus electronic factors in transition metal carbide and TCP phase stability.D. G. Pettifor, B. Seiser, E. R. Margine, A. N. Kolmogorov & R. Drautz - 2013 - Philosophical Magazine 93 (28-30):3907-3924.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  15
    Flower symmetry evolution: towards understanding the abominable mystery of angiosperm radiation.Andrea Busch & Sabine Zachgo - 2009 - Bioessays 31 (11):1181-1190.
    Flower symmetry is considered a morphological novelty that contributed significantly to the rapid radiation of the angiosperms, which already puzzled Charles Darwin and prompted him to name this phenomenon an ‘abominable mystery’. In 2009, the bicentenary of Darwin's birth and the 150th anniversary of the publication of his seminal work, ‘On the Origin of Species’, this question can now be more satisfactorily readdressed. Understanding the molecular control of monosymmetry formation in the model species Antirrhinum opened the path for comparative studies (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Unarticulated constituents.François Recanati - 2002 - Linguistics and Philosophy 25 (3):299-345.
    In a recent paper (Linguistics and Philosophy 23, 4, June 2000), Jason Stanley argues that there are no `unarticulated constituents', contrary to what advocates of Truth-conditional pragmatics (TCP) have claimed. All truth-conditional effects of context can be traced to logical form, he says. In this paper I maintain that there are unarticulated constituents, and I defend TCP. Stanley's argument exploits the fact that the alleged unarticulated constituents can be `bound', that is, they can be made to vary with the values (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   156 citations  
  9.  30
    The mereology of thermodynamic equilibrium.Michael te Vrugt - 2021 - Synthese 199 (5-6):12891-12921.
    The special composition question, which asks under which conditions objects compose a further object, establishes a central debate in modern metaphysics. Recent successes of inductive metaphysics, which studies the implications of the natural sciences for metaphysical problems, suggest that insights into the SCQ can be gained by investigating the physics of composite systems. In this work, I show that the minus first law of thermodynamics, which is concerned with the approach to equilibrium, leads to a new approach to the SCQ, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10. On Proof-Theoretic Approaches to the Paradoxes: Problems of Undergeneration and Overgeneration in the Prawitz-Tennant Analysis.Seungrak Choi - 2019 - Dissertation, Korea University
    In this dissertation, we shall investigate whether Tennant's criterion for paradoxicality(TCP) can be a correct criterion for genuine paradoxes and whether the requirement of a normal derivation(RND) can be a proof-theoretic solution to the paradoxes. Tennant’s criterion has two types of counterexamples. The one is a case which raises the problem of overgeneration that TCP makes a paradoxical derivation non-paradoxical. The other is one which generates the problem of undergeneration that TCP renders a non-paradoxical derivation paradoxical. Chapter 2 deals with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Emerging Metropolis: Politics of planning in Tehran during cold war.Asma Mehan - 2017 - In COLD WAR AT THE CROSSROADS: 194X-198X. Architecture and planning between politics and ideology. Milan, Metropolitan City of Milan, Italy:
    The Second World War and its associated political events of a national and global scale brought new circumstances, which was considerably influenced the development processes of Tehran. During World War II, Iran hoped that Washington would keep Britain and the Soviet Union from seizing control of the country’s oil fields. In 1951 and 1952 Truman worked with Iranian Prime Minister, though unsuccessfully, to regain some of those lost oil rights for Iran. By the late 1950s and President Kennedy’s presidency, he (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  24
    Research Ethics Board (REB) Members’ Preparation for, and Perceived Knowledge of Research Ethics.Rylan Egan, Denise Stockley, Chi Yan Lam, Laura Kinderman & Alexandra S. Youmans - 2016 - Journal of Academic Ethics 14 (3):191-197.
    The Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans was first developed to establish a standard of practice in research ethics by the three federal agencies responsible for funding institutional research in Canada: Canadian Institutes of Health Research, Natural Sciences and Engineering Research Council, and Social Sciences and Humanities Research Council. In 2010, a second edition of the policy, known as the TCPS 2, was released with updated information and expanded coverage of research ethics issues. According to the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  16
    efficient IoT forensic approach for the evidence acquisition and analysis based on network link.Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo & Nhien-An Le-Khac - 2022 - Logic Journal of the IGPL 30 (6):1041-1055.
    In an Internet of Things (IoT) environment, IoT devices are typically connected through different network media types such as mobile, wireless and wired networks. Due to the pervasive nature of such devices, they are a potential evidence source in both civil litigation and criminal investigations. It is, however, challenging to identify and acquire forensic artefacts from a broad range of devices, which have varying storage and communication capabilities. Hence, in this paper, we first propose an IoT network architecture for the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  21
    NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File.Hans-Wolfgang Loidl, Peter J. B. King & Idris Skloul Ibrahim - 2015 - Journal of Intelligent Systems 24 (4):467-477.
    Ns2 is an open-source communications network simulator primarily used in research and teaching. Ns2 provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless networks. Although Ns2 is a widely used powerful simulator, it lacks a way to measure networks that are used to assess reliability and performance metrics and it does not analyse the trace files it produces. The data obtained from the simulations are not straightforward to analyse. Ns2 is still unable to provide (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  15
    Modeling of attack detection system based on hybridization of binary classifiers.Beley O. I. & Kolesnyk K. K. - 2020 - Artificial Intelligence Scientific Journal 25 (3):14-25.
    The study considers the development of methods for detecting anomalous network connections based on hybridization of computational intelligence methods. An analysis of approaches to detecting anomalies and abuses in computer networks. In the framework of this analysis, a classification of methods for detecting network attacks is proposed. The main results are reduced to the construction of multi-class models that increase the efficiency of the attack detection system, and can be used to build systems for classifying network parameters during the attack. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  23
    Going Boldly Where No One Has Gone Before? How Confidentiality Risk Aversion is Killing Research on Sensitive Topics.Ted Palys & John Lowman - 2010 - Journal of Academic Ethics 8 (4):265-284.
    Bernhard and Young (Journal of Academic Ethics, 7, 175-191, 2009) allege that a myth of confidentiality plagues research in North America because of the absence of statute-based legal protections and the requirements of some REBs to limit confidentiality to the extent permitted by law. In this commentary we describe statute-based protections for research confidentiality available in the United States, clarify the legal situation regarding research confidentiality in Canada, and explain that REBs that require confidentiality to be limited by law are (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  17. Canadian Research Ethics Boards and Multisite Research: Experiences from Two Minimal-Risk Studies.Eric Racine, Emily Bell & Constance Deslauriers - 2010 - IRB: Ethics & Human Research 32 (3):12-18.
    Canada’s Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans mandates that all research involving human subjects be reviewed and approved by a research ethics board . We have little evidence on how researchers are dealing with this requirement in multisite studies, which involve more than one REB. We retrospectively examined 22 REB submissions for two minimal-risk, multisite studies in leading Canadian institutions. Most REBs granted expedited review to the studies, while one declared the application to be exempt from review. (...)
     
    Export citation  
     
    Bookmark   2 citations  
  18.  72
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  15
    A study of Internet service provider industry stakeholder collaboration in Australia.Karthik Vilapakkam Nagarajan - 2014 - Journal of Information, Communication and Ethics in Society 12 (3):245-267.
    Purpose – The purpose of this paper is to examine institutional influences on the customer service and complaints handling practices of the Australian Internet industry. Design/methodology/approach – The study adopted a qualitative research methodology using semi-structured interview as a research method. The study was informed by constructivist/interpretive research paradigm approaches to knowledge. Eleven senior executives from key Internet industry stakeholder organizations were interviewed. Findings – Using the neo-institutional theory lens, this study found that the institutional forces played a pivotal role (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  20. Pragmatics and Logical Form.François Recanati - 2007 - In Esther Romero & Belen Soria (eds.), Explicit Communication: Robyn Carston's Pragmatics. Palgrave. pp. 25-41.
    Robyn Carston and I share a general methodological position which I call ‘Truth-Conditional Pragmatics' (TCP). TCP is the view that the effects of context on truth-conditional content need not be traceable to the linguistic material in the uttered sentence. Some effects of context on truth-conditional content are due to the linguistic material (e.g. to context-sensitive words or morphemes which trigger the search for contextual values), but others result from ‘free' pragmatic processes. Free pragmatic processes take place not because the linguistic (...)
     
    Export citation  
     
    Bookmark   2 citations  
  21.  57
    The syntax-pragmatics merger: Belief reports in the theory of Default Semantics.Katarzyna M. Jaszczolt - 2007 - Pragmatics and Cognition 15 (1):41-64.
    This paper is a voice in the ongoing discussion on the source and properties of pragmatic inference that contributes to the representation of discourse meaning. I start off from the contextualist standpoint of truth-conditional pragmatics and develop a proposal of representations of utterance meaning, the so-called merger representations, that incorporate the output of pragmatic inference. The move from TCP to pragmatics-rich semantics of acts of communication is facilitated by rethinking the compositionality of meaning and predicating compositionality of such pragmatics-rich structures. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  64
    Issues Involving Informed Consent for Research Participants with Alzheimer’s Disease.Adnan Qureshi & Amer Johri - 2008 - Journal of Academic Ethics 6 (3):197-203.
    Alzheimer’s disease is the most common form of dementia which is estimated to impact 350,000 people over 65 years of age in Canada. The lack of effective treatment and the growing number of people who are expected to be diagnosed with Alzheimer’s disease in the near future are compelling reasons why continued research is in this area is necessary. With additional research, there needs to be greater recognition of the complexity of seeking ongoing informed consent from those with Alzheimer’s disease. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark