To see the other types of publications on this topic, follow the link: UEBA.

Journal articles on the topic 'UEBA'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'UEBA.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Савенков, П. А., and П. С. Трегубов. "Using the methods and algorithms for data analysis and machine learning in UEBA / DSS to support management decision-making." МОДЕЛИРОВАНИЕ, ОПТИМИЗАЦИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ 8, no. 1(28) (2020): 39–40. http://dx.doi.org/10.26102/2310-6018/2020.28.1.039.

Full text
Abstract:
Целью данного исследования является разработка математического и программного обеспечения обнаружения аномального поведения пользователей на основе анализа их поведенческих биометрических характеристик для создания новых способов предоставления аналитических данных анализирующей службе с описанием, почему выявленные действия считаются аномальными. Предметом исследования являются методы машинного обучения, применяемые в UBA/UEBA (User Behavioral Analytics/ User and Entity Behavioral Analytics), DLP (Data Leak Prevention), SIEM (Security information and event management) системах. Объект исследо
APA, Harvard, Vancouver, ISO, and other styles
2

Desetty, Avinash Gupta. "Unveiling Hidden Threats with ML-Powered User and Entity Behavior Analytics (UEBA)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 15, no. 1 (2024): 44–50. http://dx.doi.org/10.61841/turcomat.v15i1.14394.

Full text
Abstract:
The ever-growing cost of cybercrime has created the need for proactive solutions for organizations seeking to protect their digital assets. While traditional security systems struggle to detect anomalies buried within vast datasets, new solutions like User and Entity Behavior Analytics (UEBA) emerge as a game-changer. By leveraging the power of machine learning, UEBA analyzes diverse data sources like user logins, file accesses, event logs, business context, externalthreat intelligence, and network activity, to unveil hidden threats most traditional methods could miss. The ability to analyze m
APA, Harvard, Vancouver, ISO, and other styles
3

Paul, Akampurira, Bashir Olaniyi Olaniyi Sadiq, Dahiru Buhari, Maninti Venkateswarlu, Atuhe Aarone, and Mugisha Brian. "A Review of Neural Networks for Enhanced User Entity Behavior Analytics in Cybersecurity: Addressing the Challenge of Vanishing Gradient." International Journal of Research and Innovation in Applied Science IX, no. XII (2024): 154–72. https://doi.org/10.51584/ijrias.2024.912016.

Full text
Abstract:
In the dynamic realm of cybersecurity, User Entity Behavior Analytics (UEBA) emerges as a pivotal tool, employing advanced data analytics and machine learning to scrutinize user and entity activities, thereby detecting potential insider threats. Recurrent neural networks (RNNs) are particularly notable in this context for their ability to identify complex temporal patterns and strengthen threat detection systems. The vanishing gradient issue, in particular, presents difficulties for efficient model training and convergence, hence the use of RNNs in UEBA is not without its difficulties. This ex
APA, Harvard, Vancouver, ISO, and other styles
4

Indranil Iyer, Kumrashan. "Unmasking the Shadows: Recognizing and Overcoming Hidden Pitfalls in UEBA." International Journal of Science and Research (IJSR) 12, no. 4 (2023): 1988–93. https://doi.org/10.21275/sr230413090718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Indranil Iyer, Kumrashan. "Behavioral Intelligence at Scale: Implementing UEBA for Enhanced Security Posture." International Journal of Science and Research (IJSR) 11, no. 7 (2022): 1971–77. https://doi.org/10.21275/sr22074090532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Makarenko, O., та A. Yanko. "КОНЦЕПЦІЯ СИСТЕМИ ВИЯВЛЕННЯ ТА ЗАПОБІГАННЯ ВТОРГНЕНЬ ДО МЕРЕЖІ". Системи управління, навігації та зв’язку. Збірник наукових праць 2, № 68 (2022): 59–67. http://dx.doi.org/10.26906/sunz.2022.2.059.

Full text
Abstract:
Виявлення та запобігання мережевих атак є одним з найважливіших завдань системи безпеки мережі. Дана стаття присвячена захисту комп'ютерних мереж від атак, вторгнень та несанкціонованого доступу. Особлива увага приділяється принципу роботи мережевих систем виявлення та запобігання вторгнень. Розглянуто поведінкову аналітику користувачів і об'єктів UEBA для виявлення порушень в області безпеки. На прикладі центру безпеки Azure досліджується інтелектуальні засоби безпеки і розширення аналітики для швидшого виявлення загроз і зменшення кількості неправдивих оповіщень. На основі розглянутої концеп
APA, Harvard, Vancouver, ISO, and other styles
7

Dhaygude, Pratik, Nilesh Dhulshette, Omkar Ganjale, Umesh ,. Sawant, and Prof Pranali Navghare. "A Review Paper on Different Deep Learning Methodologies for User and Entity Behavior Analytics(UEBA)." International Journal of Research Publication and Reviews 4, no. 5 (2023): 3757–62. http://dx.doi.org/10.55248/gengpi.4.523.42121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Beijia. "Deep Learning-Based Information Security." Applied and Computational Engineering 97, no. 1 (2024): 145–51. http://dx.doi.org/10.54254/2755-2721/97/20241358.

Full text
Abstract:
Abstract. With the rapid development of network technology, information security is facing increasingly complex challenges. Deep learning technology, due to its strong capabilities in data processing and pattern recognition, has become a key technology to improve the detection efficiency and accuracy in the field of information security. This paper delves into the application of deep learning in various aspects such as malware detection, network intrusion identification, User and Entity Behavior Analytics (UEBA), privacy protection technology, model explainability, and network security vulnera
APA, Harvard, Vancouver, ISO, and other styles
9

Muzhanova, Tetyana, Svitlana Lehominova, Yuriy Yakymenko, and Iryna Mordas. "TECHNOLOGIES OF USER ACTIVITIES MONITORING AND ANALYSIS IN PREVENTING INSIDER THREATS OF INFORMATION SECURITY OF AN ORGANIZATION." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 50–62. http://dx.doi.org/10.28925/2663-4023.2021.13.5062.

Full text
Abstract:
The increase in the number of information security incidents related to personnel activities, the frequency of which has almost doubled in the last two years, has led organizations to use effective technologies that prevent and counteract internal threats to information security. An important role in this context belongs to the tools of monitoring and analysis of user activity. According to experts, in the coming years, such technologies will be implemented in 80% of solutions to identify threats and prioritize information security incidents. The article reveals the essence and analyzes the fu
APA, Harvard, Vancouver, ISO, and other styles
10

Chandrashekar Reddy Aare. "Data Risk intelligence architecture: Real-time threat detection across billions of financial transactions." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 919–26. https://doi.org/10.30574/wjaets.2025.15.3.0983.

Full text
Abstract:
This article presents a comprehensive analysis of data risk intelligence platforms designed for real-time threat detection in financial environments. The article examines how microservices-based architectures can process billions of daily events to identify sophisticated threats targeting financial institutions. The article explores the implementation of User and Entity Behavior Analytics (UEBA) for detecting anomalous patterns, contextual risk scoring mechanisms that transform isolated alerts into actionable intelligence, and high-performance data processing infrastructures that enable sub-se
APA, Harvard, Vancouver, ISO, and other styles
11

Rahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Advancing cloud platform engineering: Innovations in secure deployment automation, CI/CD, and Risk Mitigation for 2025." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 0149–56. https://doi.org/10.30574/wjaets.2025.15.3.0911.

Full text
Abstract:
The rapid evolution of cloud platform engineering has revolutionized secure deployment automation, continuous integration, and continuous deployment (CI/CD) practices, while introducing innovative risk mitigation strategies. The integration of Artificial Intelligence into cloud operations has transformed threat detection capabilities and automated security response mechanisms across distributed environments. Advanced automation frameworks have enhanced infrastructure management through self-healing mechanisms and intelligent configuration controls. Cloud-native security architectures implement
APA, Harvard, Vancouver, ISO, and other styles
12

Akintayo, Micheal Ajayi, Okandeji Omokanye Abraham, Olowu Olawale, Olowofela Adeleye Ademilola, Mary Omole Olayinka, and Uchechukwu Wada Ifeoluwa. "Detecting insider threats in banking using AI-driven anomaly detection with a data science approach to cybersecurity." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 123–32. https://doi.org/10.5281/zenodo.15081524.

Full text
Abstract:
The banking sector faces an increasingly critical challenge in detecting and preventing insider threats, which account for significant financial losses and data breaches annually. This comprehensive review explores how artificial intelligence-driven anomaly detection, integrated with advanced data science approaches and cybersecurity frameworks, is transforming insider threat detection in banking institutions. By synthesizing current research in behavioral analytics, machine learning methodologies, and employee activity monitoring, the study examines how AI-driven technologies are revolutioniz
APA, Harvard, Vancouver, ISO, and other styles
13

Martí, M. R., D. Medina, G. J. Español, M. Pérez, and J. R. Betancourt. "Estudio anatómico de la vascularización peroneal y su importancia clínica para el injerto vascularizado de peroné." Revista Iberoamericana de Cirugía de la Mano 44, no. 02 (2016): 078–85. http://dx.doi.org/10.1016/j.ricma.2016.07.001.

Full text
Abstract:
Introducción: Desde que Ueba utilizara por primera vez el injerto óseo vascularizado de peroné en 1973, esta técnica se ha usado con éxito como método de reconstrucción de múltiples tipos de defectos óseos. La correcta vascularización del injerto es clave para su supervivencia. El objetivo de este trabajo es describir la vascularización diafisaria y epifisaria proximal del peroné.Material y método: Se utilizaron 12 especímenes de cadáver criopreservado inyectados con látex negro. Se procedió a su disección, seguida de una técnica de corrosión en solución alcalina para demostrar la distribución
APA, Harvard, Vancouver, ISO, and other styles
14

Marques Ribas, Marcelo, Ulisses Penteado, André Grégio, and Paulo Lisboa de Almeida. "Agrupamento de usuários e organizações para verificação de viabilidade de distinção comportamental de uso de sistemas com base em aplicações e tempo." Anais do Computer on the Beach 16 (May 27, 2025): 105–12. https://doi.org/10.14210/cotb.v16.p105-112.

Full text
Abstract:
AbstractAuthentication mechanisms are still the standard way to allowaccess to systems and devices within an organization. Throughcredentials (login and password) and other associated methods(multi-factor authentication, such as tokens, biometrics, or onetimepasswords sent to additional devices), access control is implemented,and user activity across different necessary systems isrecorded. However, organizations are concerned that access controlmay be bypassed due to the loss or theft of authentication information/devices, potentially leading to intellectual property breachesthrough industrial
APA, Harvard, Vancouver, ISO, and other styles
15

Gantela Prabhakar Simhadri Mallikarjuna Rao. "Integrated Framework for Data Security in Cloud Computing Using Deep Learning Techniques." Communications on Applied Nonlinear Analysis 32, no. 8s (2025): 798–810. https://doi.org/10.52783/cana.v32.3817.

Full text
Abstract:
Alongside the expansion of the digital economy, data centers have grown substantially in size and quantity. Data centers are becoming increasingly essential to the development of the economy and society. However, even a brief outage in a data center might have severely negative effects. Resolving this issue requires secure management of data centers' physical infrastructure. Defenses against different cyber threats are being developed for the Internet of Things (IoT) and Cyber Physical Systems (CPS). As malicious code becomes more prevalent, using cloud environments to find dangerous code migh
APA, Harvard, Vancouver, ISO, and other styles
16

Blancaflor, Eric, Keith Christian Esteron, Andrade Cy, Wayne Hans Camacho, and Bradney Guzon. "Mitigating Cyber Attacks for Organization Assets using UEBA (User and Entity Behavior Analytics) and other Machine Learning Solutions from Cloud Security Threats: A Literature Review." Network Security 2024, no. 9 (2025): 25–31. https://doi.org/10.70985/tkz8bz14.

Full text
Abstract:
User and Entity Behavior Analytics has been one of the key steppingstones towards protecting valuable data and information for organizations that decided to store their assets in a cloud-based storage. The implications suggest that third-party software may not be as reliable as these are prone to attacks due to its accessibility and vulnerable nature. This study aims to provide a comprehensive review that covers User and Entity Behavior Analytics (UEBA) and other machine learning techniques to effectively mitigate cyberattacks and protect organizational assets from cloud-based security threats
APA, Harvard, Vancouver, ISO, and other styles
17

Musto, Benjamin, and Jamie Vicary. "Quantum Latin squares and unitary error bases." Quantum Information and Computation 16, no. 15&16 (2016): 1318–32. http://dx.doi.org/10.26421/qic16.15-16-4.

Full text
Abstract:
In this paper we introduce quantum Latin squares, combinatorial quantum objects which generalize classical Latin squares, and investigate their applications in quantum computer science. Our main results are on applications to unitary error bases (UEBs), basic structures in quantum information which lie at the heart of procedures such as teleportation, dense coding and error correction. We present a new method for constructing a UEB from a quantum Latin square equipped with extra data. Developing construction techniques for UEBs has been a major activity in quantum computation, with three prima
APA, Harvard, Vancouver, ISO, and other styles
18

Nagar, Gourav. "Leveraging Artificial Intelligence to Automate and Enhance Security Operations: Balancing Efficiency and Human Oversight." International Journal of Scientific Research and Management (IJSRM) 6, no. 07 (2018): 78–94. http://dx.doi.org/10.18535/ijsrm/v6i7.ec05.

Full text
Abstract:
It is now clear that as new cyberthreats emerge, old security measures are less successful in thwarting increasingly sophisticated cyberattacks. One of the most significant and influential technologies of the last few years, artificial intelligence (AI) is a game-changer for security operations because it can automate critical processes, maintain real-time threat recognition, and respond with equal speed and efficiency. Based on the automation of threats, vulnerabilities, and events, this abstract analyzes the use of AI in security. It looks at specific AI use cases, such as automated patch ma
APA, Harvard, Vancouver, ISO, and other styles
19

Abbas A. Mahdi. "Machine learning applications of network security enhancement: review." Computer Science & IT Research Journal 5, no. 10 (2024): 2283–300. http://dx.doi.org/10.51594/csitrj.v5i10.1635.

Full text
Abstract:
Machine learning (ML) is being used to improve intrusion detection mechanisms and identification in cyber security. Network data volume scaling (with the help of Machine learning) — Automated analysis and pattern recognition for large amounts of network-data, thereby detection of anomalies / potentially malicious activities that escape current rule-based techniques. By training ML models on historical data, these models can learn benign network behavior as well the anomalies in them that may result from malicious activities. The purpose of this essay/report is to begin taking a look under the
APA, Harvard, Vancouver, ISO, and other styles
20

Nikum, Avishkar. "Examining the Human Factors in Cybersecurity Practices: Psychological, Technical, and Organisational Perspectives." Asian Journal of Research in Computer Science 18, no. 6 (2025): 292–300. https://doi.org/10.9734/ajrcos/2025/v18i6699.

Full text
Abstract:
The study of human factors in cybersecurity is increasingly relevant due to the growing complexity and scale of cyber threats, coupled with the paradoxical position of humans as both a key element of protection and the most vulnerable link in information security systems. This study provides a comprehensive analysis of psychological, organisational, and technical aspects of human influence on cybersecurity and characterises strategies to minimise associated risks. The research employed systematic literature review, statistical assessment, comparison, systematic-logical methods, and generalizat
APA, Harvard, Vancouver, ISO, and other styles
21

Dr., Suman Thapaliya, and Ravi Chandra Gurung Mr. "Mitigating Insider Threats and Data Breaches: Enhancing Data Loss Prevention Systems with Behavioral Analytics And NLP." International Journal of Multidisciplinary and Innovative Research 02, no. 01 (2025): 22–27. https://doi.org/10.5281/zenodo.14634504.

Full text
Abstract:
Insider threats and data breaches pose significant challenges to modern organizations, leading to substantial financial, reputational, and operational damage. Traditional Data Loss Prevention (DLP) systems, which rely on static rule-based mechanisms and keyword-based detection, often fail to address the complexities of evolving insider threats. Such systems struggle to detect subtle behavioral anomalies or obfuscated data exfiltration, leading to high false positives and overlooked malicious activities. This paper explores the integration of Behavioral Analytics and Natural Language Processing
APA, Harvard, Vancouver, ISO, and other styles
22

Steingartner, William, Darko Galinec, and Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model." Symmetry 13, no. 4 (2021): 597. http://dx.doi.org/10.3390/sym13040597.

Full text
Abstract:
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. Security programs primarily focus on prevention-based strategies aimed at stopping attackers from getting into the network. These programs attempt to use hardened perimeters and endpoint defenses by recognizing and blocking malicious activities to detect and stop attackers before they can get in. Most organizations implement such a strategy by fortifying their networks with defense-in-depth through layered prevention controls. Detection control
APA, Harvard, Vancouver, ISO, and other styles
23

Camara, Amadou Sara. "The Role of Cognitive-Information Technologies in Cybersecurity: Threat Detection and Adaptive Defense Systems." Вопросы безопасности, no. 1 (January 2024): 61–70. http://dx.doi.org/10.25136/2409-7543.2024.1.69882.

Full text
Abstract:
The research delves into the influence of machine learning and artificial intelligence advancements on cybersecurity within software-oriented systems. The author thoroughly examines the modeling of cognitive-information technologies and their ramifications on data analysis, training processes, and decision-making within these systems. Special emphasis is placed on identifying cybersecurity threats faced by artificial intelligence systems, such as susceptibility to cyberattacks. The study proposes adaptive defense components, including behavioral biometrics analysis, automated incident response
APA, Harvard, Vancouver, ISO, and other styles
24

Zuanon, Angela Cristina Cilense, José Arnaldo Frutuoso Roveda, Maria Candida Soares Del-Masso, and Eduardo Galhardo. "A Extensão Universitária abraça o Brasil." Revista Ciência em Extensão 13, no. 1 (2025): 2–8. https://doi.org/10.23901/1679-4605.2017v13n1p2-8.

Full text
Abstract:
A Revista Ciência em Extensão (RCE) apresenta, nesta primeira edição de 2017, dezesseis trabalhos de Universidades de Roraima ao Rio Grande do Sul, demonstrando sua abrangência nacional e sua importância como veículo de divulgação de ações e pesquisas científicas em Extensão Universitária.A análise de tráfego no Portal da Revista realizada mediante o sistema Google Analytics, desde sua publicação na edição 12, número 4, no final de dezembro de 2016 até 20 de março de 2017, apresenta 41.019 visualizações de páginas de 8.666 visitantes de 44 países. A análise de cobertura regional - Brasil, demo
APA, Harvard, Vancouver, ISO, and other styles
25

Cargnelutti Filho, Alberto, Lindolfo Storck, Alessandro Dal'Col Lúcio, Marcos Toebe, and Bruna Mendonça Alves. "Tamanho de unidades experimentais básicas e tamanho ótimo de parcelas para nabo-forrageiro." Pesquisa Agropecuária Brasileira 51, no. 4 (2016): 309–19. http://dx.doi.org/10.1590/s0100-204x2016000400003.

Full text
Abstract:
Resumo: O objetivo deste trabalho foi verificar a influência do tamanho da unidade experimental básica (UEB) sobre a estimativa do tamanho ótimo de parcela para a avaliação da massa de matéria fresca de nabo-forrageiro (Raphanus sativus). Dados de massa de matéria fresca de 3.456 unidades experimentais básicas de 0,5×0,5 m (0,25 m2) foram utilizados, tendo-se formado 36 planos de UEBs com tamanhos entre 0,25 e 16 m2. Para cada plano de UEB, determinou-se o tamanho ótimo de parcela, pelo método da curvatura máxima do modelo do coeficiente de variação. A diferença mínima significativa pelo teste
APA, Harvard, Vancouver, ISO, and other styles
26

Mota Loor, Andrés Alejandro, Mercedes Ermelinda Palacios Aguirre, Mario Adrián Ávalos Layana, and Vicky Edita Narea Morales. "Infecciones urinarias asociadas a pacientes con VIH-sida." Pro Sciences: Revista de Producción, Ciencias e Investigación 6, no. 43 (2022): 176–82. http://dx.doi.org/10.29018/issn.2588-1000vol6iss43.2022pp176-182.

Full text
Abstract:
Los pacientes con sida a menudo presentan infecciones del tracto urinario, ya que son pacientes inmunodeprimidos, el éxito de estas infecciones urinarias, es tomar las medidas preventivas para así poder evitar las complicaciones posteriores que pongan en riesgo el bienestar del usuario. Patologías que ponen en riesgo la vida del paciente, por eso la importancia de poder diagnosticar el inicio de las infecciones del tracto urinario en los pacientes inmunocomprometidos, mediante métodos simples de diagnóstico como el uroanálisis, urocultivo e imágenes como Rx de abdomen, de pie y ultrasonido ena
APA, Harvard, Vancouver, ISO, and other styles
27

Shelke, Palvi, and Timo Hamalainen. "Analysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 780–87. http://dx.doi.org/10.34190/eccws.23.1.2123.

Full text
Abstract:
The escalating risk of cyber threats requires continuous advances in security monitoring techniques. This survey paper provides a comprehensive overview of recent research into novel methods for cyber threat detection, encompassing diverse approaches such as machine learning, artificial intelligence, behavioral analysis and anomaly detection. Machine learning plays a central role in cyber threat detection, highlighting the effectiveness of deep neural networks in identifying evolving threats. Their adaptability to changing attack patterns is emphasized, underlining their importance for real-ti
APA, Harvard, Vancouver, ISO, and other styles
28

Lytvynov, V. A., I. M. Oksanych, and S. V. Hrybkov. "Regarding the possibilities of implementing the joint functioning of LMS and SIEM manage-ment based on free open-source tools." Mathematical machines and systems 1 (2025): 55–63. https://doi.org/10.34121/1028-9763-2025-1-55-63.

Full text
Abstract:
The article is devoted to solving the problem of cybersecurity of corporate IT infrastructure by using the concept of security operations centers. For modern SOCs (Security Operations Centers), the main monitoring, threat detection and response technology is based on SIEM (Security Information and Event Management) systems, which combine event information from all security tools and have a lot in common with LMS (Log Management Systems). In general, LMS and SIEM are focused on different tasks but have a common information base in the form of log data and partially overlap in the capabilities o
APA, Harvard, Vancouver, ISO, and other styles
29

Milhomem, Karina de Oliveira, Maria Olívia de Albuquerque Ribeiro Simão, and Ivan Nunes de Souza. "UI GreenMetric: avanços na institucionalização de Universidades Sustentáveis na Amazônia." DELOS: Desarrollo Local Sostenible 17, no. 54 (2024): e1408. http://dx.doi.org/10.55905/rdelosv17.n54-023.

Full text
Abstract:
A sustentabilidade ambiental tem se tornado uma pauta central nas Instituições de Ensino Superior (IES) ao redor do mundo. Mais recentemente, a institucionalização desta pauta tem se tornado mais frequente entre as IES localizadas na região amazônica. O objetivo desse trabalho foi, a partir de uma visão panorama do Ranking UI GreenMetric, no período de 2010 a 2023, analisar a participação de quatro IES situadas na Amazônia Legal, que estão inseridas neste ranking de sustentabilidade universitária. Para tanto, realizou-se pesquisa documental a partir de dados e informações disponibilizadas na p
APA, Harvard, Vancouver, ISO, and other styles
30

Dos Santos Gonçalves, Jennifer Victória, Érica Cardoso Martins, Sabrina Maciel da Costa, et al. "IMUNIZA UEMA." REVISTA PRÁTICAS EM EXTENSÃO 9, no. 1 (2025): 10–16. https://doi.org/10.18817/rpe.v9i1.3843.

Full text
Abstract:
A ação “Imuniza UEMA”, realizada na Universidade Estadual do Maranhão, Campus Caxias integra-se ao projeto de extensão "Saúde Itinerante", em parceria com a Liga Acadêmica de Educação em Saúde- LAES/UEMA, com o Centro de Testagem e Aconselhamento (CTA) e a Vigilância Epidemiológica em Saúde de Caxias-MA. Objetivou-se ampliar o acesso às ações de imunização no ambiente universitário. Trata-se de relato de experiência constituído a partir de um conjunto de atividades que envolveram: vacinação; realização de testes rápidos para sífilis, HIV e hepatite B, além da distribuição de autotestes de HIV;
APA, Harvard, Vancouver, ISO, and other styles
31

Kelly, Seamus, and Niall O’Regan. "The Union of European Football Associations 2020 Coaching Convention Update and Coach Education in the Football Association of Ireland." International Sport Coaching Journal 8, no. 3 (2021): 382–93. http://dx.doi.org/10.1123/iscj.2020-0090.

Full text
Abstract:
This article explores how the 2020 edition of the Union of European Football Association’s (UEFA) Coaching Convention impacts coach education in the Football Association of Ireland (FAI), a member of the UEFA. First, this article provides a brief history of the UEFA Coaching Convention and it’s historical benefits. Second, the UEFA Coaching Convention’s principles and practices of adult learning and reality-based learning are identified, along with the national association’s responsibilities for their implementation. Third, we outline the four main changes to the 2020 UEFA Coaching Convention,
APA, Harvard, Vancouver, ISO, and other styles
32

IŞIKDEMİR, Erhan, Mücahit IŞIK, Osman DAĞ, and Özlem KÖKLÜ. "Analysis of the Relative Age Effect According to Player Positions in the UEFA Champions League and UEFA Europa League: A Descriptive Study." Turkiye Klinikleri Journal of Sports Sciences 17, no. 1 (2025): 28–34. https://doi.org/10.5336/sportsci.2024-105277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Dos Santos, Francisco Éder Santos, Sérgio Rogério Azevedo Junqueira, Raqueline Brito Da Cruz, et al. "EDUCAÇÃO NÃO FORMAL: EXPOSIÇÃO “SIMBOLOS SAGRADOS DAS RELIGIÕES: CONHECER PARA RESPEITAR E CONVIVER EM PAZ”." ARACÊ 6, no. 4 (2024): 14790–812. https://doi.org/10.56238/arev6n4-221.

Full text
Abstract:
O presente artigo científico irá abordar sobre a educação não formal em espaços fora da Universidade, analisando à exposição “Simbolos Sagrados das Religiões: Conhecer para respeitar e conviver em paz” ocorrida em 20/10/2024, na Praça da República (ao lado do teatro Waldemar Henrique), em Belém do Pará. A exposição foi promovida pela Universidade do Estado do Pará - UEPA, através do Grupo de Estudos em Ensino Religioso na Amazônia - GEPERA. Com a participação de graduandos em licenciatura em Ciências da Religião, bem como mestrandos e doutorandos do Programa de Pós-graduação em Ciências da Rel
APA, Harvard, Vancouver, ISO, and other styles
34

García, Borja. "UEFA and the European Union: From Confrontation to Co-operation?" Journal of Contemporary European Research 3, no. 3 (2007): 202–23. http://dx.doi.org/10.30950/jcer.v3i3.52.

Full text
Abstract:
This article investigates the relationship between UEFA, as European football’s governing body, and the EU. It assesses the evolution of UEFA as a football governing body since the Bosman ruling (1995) until current initiatives such as the rules on locally-trained players (2005-2006). The paper traces the evolution of UEFA’s reactions to the increasing involvement of EU institutions in football matters, with special focus on the regulation of the players’ market. It is argued that UEFA’s attitude towards the EU has changed in the last ten years. Whilst the EU was seen as a threat for UEFA in 1
APA, Harvard, Vancouver, ISO, and other styles
35

Sakalis, Vasileios I., Vasileios Sfiggas, Ioannis Vouros, Georgios Salpiggidis, Athanasios Papathanasiou, and Apostolos Apostolidis. "Subtle errors of bladder wall thickness measurement have a significant impact on the calculation of ultrasound-estimated bladder weight. A pilot study." Medical Ultrasonography 20, no. 3 (2018): 292. http://dx.doi.org/10.11152/mu-1369.

Full text
Abstract:
Aims: Ultrasound-estimated bladder weight (UEBW), is an emerging diagnostic tool, which has been used in both males and females with lower urinary tract dysfunction. The currently acknowledged UEBW calculation methods rely on the accurate measurement of bladder wall thickness (BWT). We aim to identify if subtle errors in BWT measurement have a significant impact on UEBW calculations.Materials and methods: Twenty patients were randomly selected from an overactive bladder patient cohort. The primary endpoint was to identify the range of false BWT measurements outside which significant changes in
APA, Harvard, Vancouver, ISO, and other styles
36

Jérôme, David. "L'esthétique de Fumito Ueda." Nouvelle revue d’esthétique 11, no. 1 (2013): 63. http://dx.doi.org/10.3917/nre.011.0063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ueda, Masahito, and Anthony J. Leggett. "Ueda and Leggett Reply:." Physical Review Letters 81, no. 6 (1998): 1343. http://dx.doi.org/10.1103/physrevlett.81.1343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ueda, Masahito, and Tsuneya Ando. "Ueda and Ando Reply." Physical Review Letters 73, no. 20 (1994): 2785. http://dx.doi.org/10.1103/physrevlett.73.2785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Pratama Putra, Adhitya, and Debbie Affianty Lubis. "Upaya Union European Football Dalam Menangani Isu Rasisme Dalam Sepak Bola Di Kawasan Eropa (2020-2022)." HUMANUS : Jurnal Sosiohumaniora Nusantara 1, no. 2 (2024): 299–312. http://dx.doi.org/10.62180/sf9h8a16.

Full text
Abstract:
Rasisme dan perilaku kekerasan dalam acara olahraga, khususnya dalam pertandingan sepak bola, dapat membahayakan nilai-nilai fundamental seperti hak asasi manusia dan peran olahraga sebagai alat untuk menyampaikan cita-cita positif. Rasisme dalam sepak bola dapat terjadi di dalam lapangan maupun di luar lapangan. Bahkan saat ini rasisme berkembang melalui media sosial. Sepak bola di Benua Eropa tidak terlepas dengan peran Union of European Football Association (UEFA) sebagai badan administratif dan mengendalikan asosiasi sepak bola di Eropa. UEFA memiliki peran salah satunya menangani perihal
APA, Harvard, Vancouver, ISO, and other styles
40

Coisy, Annie, and Laetitia Jenn. "Signé : UEB." Documents numériques, no. 53 (January 1, 2009): 15. http://dx.doi.org/10.35562/arabesques.2162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Dr., A.SHAJI GEORGE, GEORGE A.S.HOVAN, T.BASKAR, and Pandey Digvijay. "XDR: The Evolution of Endpoint Security Solutions -Superior Extensibility and Analytics to Satisfy the Organizational Needs of the Future." International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 8, no. 1 (2021): 493–501. https://doi.org/10.5281/zenodo.7028219.

Full text
Abstract:
The challenge of securing critical data increases year after year. Evolving technology developments, involving the growth in cloud and the Internet of Things adoption make businesses' confidential data more vulnerable to sophisticated attackers. Protect the Whole Organization by using the Industry's First Extended Detection and Response (XDR) Platform Security teams have been inundated with inaccurate, inadequate alerts. As a result of today's siloed security tools, specialists should pivot from the console to the console to piece together investigative clues, which will result in
APA, Harvard, Vancouver, ISO, and other styles
42

Sendy, Sendy, Gatot Soepriyanto, and Nuraini Sari. "Analysis of The Implementation of UEFA Financial Fair Play: A Case Study on Arsenal and Machester United Football Club." Binus Business Review 5, no. 1 (2014): 123. http://dx.doi.org/10.21512/bbr.v5i1.1202.

Full text
Abstract:
This study aims to analyze the implementation of UEFA Financial Fair Play (FFP) to European football clubs. Research is conducted based on Arsenal and Manchester United football clubs financial statements for 2010-2012. The study uses financial simulation to test whether the two England-based club are able to meet the UEFA FFP rules. Analyses were also conducted on the financial performance ratios of both clubs and their effects on the implementation of the UEFA FFP. The result is the two clubs can meet the standard provisions for the implementation of UEFA FFP. In the assessment of financial
APA, Harvard, Vancouver, ISO, and other styles
43

Şaşmaz Ataçocuğu, Muazzez, and Mert Kerem Zelyurt. "An evaluation on the regulations relating the working lives of the football trainers in Turkey considering the economic consequencesEkonomik sonuçları açısından Türkiye’de futbol antrenörlerinin çalışma hayatına ilişkin düzenlemelerin değerlendirilmesi." Journal of Human Sciences 13, no. 3 (2016): 5915. http://dx.doi.org/10.14687/jhs.v13i3.4335.

Full text
Abstract:
In Turkish football working life of trainers is regulated by “The instruction of the status of training men and working principles” and “ The instruction of training men education and classification” which are prepared by Turkish football federation. The impulse of this research is formed by signs regarding existance of complaints and problems that arise around profession of training in the context of the instruction practices. In the study, it is intended to reveal how the current trainer working principles and promotion practices effect trainers’ working processes in terms of economic conseq
APA, Harvard, Vancouver, ISO, and other styles
44

Chhaya, V. M., J. J. Tarwadi, and Smita Chhag. "Elastic Scattering of Electrons by Helium Atoms at Intermediate Energies." Zeitschrift für Naturforschung A 48, no. 3 (1993): 465–68. http://dx.doi.org/10.1515/zna-1993-0304.

Full text
Abstract:
Abstract The unitarised Eikonal Born series (UEBS) method has been used successfully by Byron et al. for elastic scattering of electrons and positrons by hydrogen atoms. Here an attempt is made to apply the UEBS method in the case of elastic scattering of electrons by helium atoms. The total and differential cross sections are calculated for the energy range 100-700 eV. The results are compared with experimental and other theoretical results. It is found that the results obtained with the UEBS method agree best with the experimental results.
APA, Harvard, Vancouver, ISO, and other styles
45

Schubert, Mathias. "Potential agency problems in European club football? The case of UEFA Financial Fair Play." Sport, Business and Management: An International Journal 4, no. 4 (2014): 336–50. http://dx.doi.org/10.1108/sbm-02-2014-0006.

Full text
Abstract:
Purpose – With the licence season 2013/2014 onwards Union of European Football Associations (UEFA) Financial Fair Play (FFP) fully came into force. Among other things, FFP demands from the clubs to operate within their own revenues in order to counteract the increasing over indebtedness in European club football. The purpose of this paper is to cast further light on the relationship between UEFA and the clubs as the main actors of FFP and to derive implications to UEFA to improve the efficacy of this regulatory intervention. Design/methodology/approach – This paper explicitly examines the case
APA, Harvard, Vancouver, ISO, and other styles
46

Hong, Sunggye, L. Penny Rosenblum, and Amy Frank Campbell. "Implementation of Unified English Braille by Teachers of Students with Visual Impairments in the United States." Journal of Visual Impairment & Blindness 111, no. 6 (2017): 543–56. http://dx.doi.org/10.1177/0145482x1711100605.

Full text
Abstract:
Introduction This study analyzed survey responses from 141 teachers of students with visual impairments who shared their experiences about the implementation of Unified English Braille (UEB). Methods Teachers of students with visual impairments in the United States completed an online survey during spring 2016. Results Although most respondents knew if their state had a UEB transition plan, few participated in its development. Half attended workshops to learn about word-based UEB, but few attended workshops about math-based UEB. They believed their students would be successful in transitioning
APA, Harvard, Vancouver, ISO, and other styles
47

Martínez Martínez, Francisco Daniel, and Higinio González García. "Efecto de marcar primero en la final de la UEFA Champions League y la UEFA Europa League (Effect of scoring first in finals of UEFA Champions League and UEFA Europe League)." Retos, no. 37 (July 26, 2019): 134–38. http://dx.doi.org/10.47197/retos.v37i37.67933.

Full text
Abstract:
Este estudio tiene como objetivos: i) conocer cómo influye el efecto de marcar primero en el resultado final del partido; ii) comparar el efecto de marcar primero, los goles totales, el periodo de marcar en el partido y el minuto de marcar el primer gol (ganador y perdedor), en las finales de ambas competiciones; y iii) analizar la evolución que tienen estas variables a lo largo de la historia. La muestra estuvo formada por todas las finales (N = 78) disputadas a lo largo de la historia a partido único y en campo neutral de las competiciones europeas UEFA Champions League (UCL) y UEFA Europa L
APA, Harvard, Vancouver, ISO, and other styles
48

Stephens, Richard, Grant Bosworth, and Thomas Shepherd. "Playing in the UEFA Europa League Does Not Adversely Affect English Premier League or La Liga Performance." Journal of Functional Morphology and Kinesiology 4, no. 1 (2018): 2. http://dx.doi.org/10.3390/jfmk4010002.

Full text
Abstract:
Purpose: This article presents data challenging the widely held but untested view that concurrently playing mid-week Union of European Football Associations (UEFA) Europa League matches adversely affects domestic league performance. Method: Over 16 seasons we compared next-season domestic league performance of the two highest finishing UEFA Europa League qualifying clubs with the two highest finishing non-qualifiers in England and Spain. Results: Clubs concurrently playing UEFA Europa League football showed significantly superior domestic league performance including wins, losses, goals, goal
APA, Harvard, Vancouver, ISO, and other styles
49

Dagaev, Dmitry, and Vladimir Yu Rudyak. "Seeding the UEFA Champions League participants: evaluation of the reforms." Journal of Quantitative Analysis in Sports 15, no. 2 (2019): 129–40. http://dx.doi.org/10.1515/jqas-2017-0130.

Full text
Abstract:
Abstract We evaluate the sporting effects of the seeding system reforms in the Champions League, the major football club tournament organized by the Union of European Football Associations (UEFA). Before the 2015–2016 season, the teams were seeded in the group stage by their ratings. Starting from the 2015–2016 season, national champions of the Top-7 associations are seeded in the first pot, whereas other teams are seeded by their rating as before. Taking effect from the season 2018–2019, the team’s rating no longer includes 20% of the rating of the association that the team represents. Using
APA, Harvard, Vancouver, ISO, and other styles
50

Oliveira, Carlos Henrique Rodrigues de, Luiz Ricardo Souza Ripardo, and Richardson da Silva Sousa Lima. "Quadruple Play Communication with System Integration in VoIP University." Revista de Gestão e Secretariado 16, no. 5 (2025): e4918. https://doi.org/10.7769/gesec.v16i5.4918.

Full text
Abstract:
VoIP University is a solution to enable the development of communication projects based on IP protocol. This paper presents a low-cost deployment called VoIP UEMA, the first project of VoIP University solution. The technical feasibility of this project was checked as proof of concept. The concept was proven showing it is possible to create user extensions with some information such as name, ID, job role, course, center, and campus getting information of all registered users in the academic and administration system server to make voice and video calls through Android application and browser we
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!