Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 4

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  VERIFICATION
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
After the amendments have been introduced to the Act on NIK, NIK auditors, on the basis of Article 29, paragraph 1 (2i) of this act, have been given the right to process sensitive personal data found in documents, databases and other materials of the auditees. Some deputies are concerned with this additional right of NIK auditors, and therefore they have developed draft changes to the act in this area. If those changes are adopted, it will in fact mean a return to the previous legal status, namely the impossibility of appropriate verification of audit findings. According to the authors of the article, it is not necessary to introduce such changes since now there are sufficient measures to prevent potential abuse of the right to access to information. These are, among others, the provisions of regulation No 15/2012 by the President of the Supreme Audit Office of 14 May 2012 that make auditors’ access to sensitive data limited to the scope specified in the audit programme or subject.
EN
One of the most persistent issues facing educational institutions that offer online programs is whether a given online student is actually the one who registered for the online course . The article disccusses a technology-based system using personal questions to verify the identity of online students, which was implemented and field tested by a U.S. University.
EN
This paper describes a combination of several Mizar-based tools (the MPTP translator, XSL style sheets for Mizar), and TPTP-based tools (IDV, AGInT, SystemOnTPTP, GDV) used for visualizing, analyzing, and independent verication of Mizar proofs. The combination delivers to the readers of the Mizar Mathematical Library (MML) an easy, powerful, and almost playful way of exploring the semantics and the structure of the library. The key factors for the relative easiness of having these functionalities are the choice of XML as both internal and external interface of Mizar, and the existence of a TPTP representation of MML articles. This shows the great added value that can be obtained by cooperation of several quite diverse (and quite often separately developed) projects, provided that they are based on the same communication standards.
EN
Conflict among evolutionists and creationists results from the ignorance of theory of evolution and from the incomprehension of rules shaping the scientific knowledge. This incomprehension is being also related to mechanisms described by evolutionists and laws, according to which the evolution of organisms is proceeding. Both positions are not harmonious with themselves not only on the level of empirical data, but above all from methodological and epistemological point of view. They are appealing to extremely different assumptions imposing research methods and interpretation of artefacts. In addition other natural sciences in the explicit way confirm theories of evolutionists. This situation causes that theory of evolution constitutes the part of the contemporary science and the creationism lays on its periphery. It can’t be change by accusation that theory of evolution is not falsified and hasn’t prognostic power. This exclude a possibility of finding common factors of both currents and at least partial approval of competitive views.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.