Abstract-Pakistan now a days is facing acute problem of terrorism from inside and outside of boarders and to encounter that specially America use drone attacks on Waziristan and other tribal areas of Pakistan for targeting terrorists and militants. Unfortunately due to inaccurate information about specific location of the banned outfits, majority of innocent people is always killed due to these drone attacks.
Abstract-The objective of this paper is to study theories behind behavior change and adaptation of behavior. Humans often live according to habitual behavior. Changing an existing behavior or adopting a new (healthier) behavior is not an easy task. There are a number of things which are important when considering adapting physical activity behavior. A behavior is affected by various cognitive processes, for example involving beliefs, intentions, goals, impediments. A conceptual and computational model is discussed based on state of the art theories about behavior change. The model combines different theories: the social cognitive theory, and the theory of selfregulation. In addition, health behavior interventions are discussed that may be used in a coaching system. The paper consists of two parts: the first part describes a computational model of behavior change and the second part discusses the formalization of evidence-based techniques for behavior change and questions to measure the various states of mind in order to provide tailored and personalized support.
No abstract
With the growth of software vulnerabilities, the demand for security integration is increasingly necessary to more effectively achieve the goal of secure software development globally. Different practices are used to keep the software intact. These practices should also be examined to obtain better results depending on the level of security. The security of a software program device is a characteristic that permeates the whole system. To resolve safety issues in a software program security solutions have to be implemented continually throughout each web page. The motive of this study is to offer a complete analysis of safety, wherein protection testing strategies and equipment can be categorized into: technical evaluation strategies and non-technical assessment strategies. This study presents high-level ideas in an easy form that would help professionals and researchers solve software security testing problems around the world. One way to achieve these goals is to separate security issues from other enforcement issues so that they can be resolved independently and applied globally.
The trend of communication is changing from mobile messages to the online social networks, for example, Facebook. The social networking applications and websites provide many of the characteristics, such as personal photo sharing. On the positive side by that many individuals form the social relationships. However, the online social networks may lead to the misuse of personal information and its disclosure. The social networks are static and assume equal values for the individuals who are directly connected. On the other hand, in real life the social relationships are dynamic and they are based on different attributes such as location, family background, neighborhood and many more. In order to be secure from the undesirable consequences due to personal information leakage, the effective mechanisms are required. In this paper, a model is proposed for the privacy in online social networks. The proposed model restricts the disclosure of personal information to the individuals. The information of one individual may be disclosed based on the relationship strength and the context. The implementation of this model on the social networks reduces the percentage of information disclosure to the less known individuals.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.