Static and dynamic approaches to corporate social responsibility as a strategic tool
Static and dynamic approaches to corporate social responsibility as a strategic tool
94
- 10.1016/j.jedc.2014.06.001
- Jun 9, 2014
- Journal of Economic Dynamics and Control
70
- 10.1016/j.econmod.2011.11.010
- Dec 14, 2011
- Economic Modelling
6
- 10.1016/j.chaos.2022.112153
- May 4, 2022
- Chaos, Solitons & Fractals
13
- 10.3390/su12229506
- Nov 15, 2020
- Sustainability
1818
- 10.1111/j.1468-0335.2009.00843.x
- Dec 22, 2009
- Economica
148
- 10.1016/j.econmod.2015.05.016
- Jun 26, 2015
- Economic Modelling
114
- 10.1016/s0378-4754(97)00100-6
- Jan 1, 1998
- Mathematics and Computers in Simulation
40
- 10.1007/s40812-016-0064-3
- Dec 2, 2016
- Economia e Politica Industriale
1
- 10.24309/recta.2021.22.1.04
- Dec 31, 2021
- Revista Electrónica de Comunicaciones y Trabajos de ASEPUMA
196
- 10.1016/j.econmod.2012.02.008
- Mar 12, 2012
- Economic Modelling
- Research Article
7
- 10.1139/cjce-2019-0052
- Jul 1, 2020
- Canadian Journal of Civil Engineering
In this study, the field falling weight deflectometer (FWD) data for asphalt pavement with various base types were backcalculated through dynamic and static backcalculation approaches, and the effectiveness of backcalculation approaches was studied. Asphalt concrete (AC) was treated as a viscoelastic material and the complex modulus was obtained using the dynamic approach. The dynamic modulus at a fixed frequency was computed for comparison purposes. The coefficient of variance and the compensating layer effect were assumed as two characteristics for the effectiveness of backcalculation approaches. The results show that the layer property from the dynamic backcalculation approach for different stations were more consistent and showed smaller coefficient of variance, which were more appropriate for the characterization pavement behavior. The elastic moduli from the static approach were more variable and exhibited a compensating layer effect in which a portion of the modulus of one layer was backcalculated into other layers. The dynamic approach is more effective than static approaches in backcalculation of layer properties.
- Research Article
11
- 10.1111/nyas.12590
- Jan 1, 2015
- Annals of the New York Academy of Sciences
New York City Panel on Climate Change 2015 Report. Chapter 3: Static coastal flood mapping.
- Book Chapter
2
- 10.1007/978-981-10-5427-3_10
- Jan 1, 2017
Classification and detection of malware includes detecting instances and variants of the existing known malwares. Traditional signature based approaches fails when byte level content of the malware undergoes modification. Different static, dynamic and hybrid approaches exist and are classified based on the form in which the executable is analyzed. Static approaches include signature based methods that uses byte or opcode sequences, printable string information, control flow graphs based on code and so on. Dynamic approaches analyze the runtime behavior of the malwares and constructs features. Hybrid methods provide an effective combination of static and dynamic approaches. This work compares the classification accuracy of static approach that employs opcode sequence analysis and dynamic approach that uses the call graph generated from the function calls made by the program and an integrated approach that combines both these approaches. Integrated approach shows an improvement of 2.89% than static and 0.82% than dynamic approach.
- Research Article
4
- 10.1016/s0020-0255(96)00196-x
- May 1, 1997
- Information Sciences
Heuristic resolution for multiple inheritance in object-oriented expert system building tools
- Book Chapter
2
- 10.1007/978-981-16-5987-4_16
- Jan 1, 2022
In natural language processing, stopwords are considered as less meaningful words and contribute to reducing the speed of language processing. Stopwords are removed to ensure fast text processing and to decrease the size of the text. In this paper, experimental analysis of two different stopword list generation approaches—static and dynamic are discussed. In the static approach, we have implemented the classic approach, and in the dynamic approach, we have implemented statistical Zipf’s law for automatic identification and removal of stopword list. We have used a news dataset of 2225 documents for five different categories. We have compressed average document size by 44.53% using the static approach and 52.53% using the dynamic approach. This paper also shows the advantages and limitations of using both approaches.KeywordsNatural language processingStopwordsClassic approach for stopword removalZipf’s LawAutomatic stopword identification
- Research Article
239
- 10.1109/tifs.2018.2879302
- Jun 1, 2019
- IEEE Transactions on Information Forensics and Security
Most existing Android malware detection and categorization techniques are static approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program behaviors, dynamic approaches are potentially more resilient against these attacks. Yet existing dynamic approaches mostly rely on characterizing system calls which are subject to system-call obfuscation. This paper presents DroidCat, a novel dynamic app classification technique, to complement existing approaches. By using a diverse set of dynamic features based on method calls and inter-component communication (ICC) Intents without involving permission, app resources, or system calls while fully handling reflection, DroidCat achieves superior robustness than static approaches as well as dynamic approaches relying on system calls. The features were distilled from a behavioral characterization study of benign versus malicious apps. Through three complementary evaluation studies with 34 343 apps from various sources and spanning the past nine years, we demonstrated the stability of DroidCat in achieving high classification performance and superior accuracy compared with the two state-of-the-art peer techniques that represent both static and dynamic approaches. Overall, DroidCat achieved 97% F1-measure accuracy consistently for classifying apps evolving over the nine years, detecting or categorizing malware, 16%–27% higher than any of the two baselines compared. Furthermore, our experiments with obfuscated benchmarks confirmed higher robustness of DroidCat over these baseline techniques. We also investigated the effects of various design decisions on DroidCat’s effectiveness and the most important features for our dynamic classification. We found that features capturing app execution structure such as the distribution of method calls over user code and libraries are much more important than typical security features such as sensitive flows.
- Conference Article
3
- 10.1109/naps.2018.8600609
- Sep 1, 2018
This paper presents three power grid partitioning methods, which are classified into two categories: static and dynamic approaches. In the static approaches, spectral clustering method based on eigenvectors of the graph Laplacian and mixed-integer programming (MIP) strategy have been used to partition a grid. In dynamic approach, slow coherency based on the eigenvector of inter-area oscillation mode is used for generator grouping. We show the three methods lead to the same partitioning results and give the underlying reason.
- Conference Article
6
- 10.1145/1982185.1982249
- Mar 21, 2011
Legacy information systems age over time as a consequence of the uncontrolled maintenance and need to be modernized. Process mining allows the discovery of business processes embedded in legacy information systems, which is necessary to preserve the legacy business knowledge, and align them with the new, modernized information systems. There are two main approaches to address the mining of business processes from legacy information systems: (i) the static approach that only considers legacy source code's elements from a syntactical viewpoint; and (ii) the dynamic approach, which also considers information derived by system execution. Unfortunately, there is a lack of empirical evidence facilitating the selection of one of them. This paper provides a formal comparison of the static and dynamic approach through a case study. This study shows that the static approach provides better performance, while the dynamic approach discovers more accurate business processes.
- Book Chapter
- 10.1007/978-3-319-76451-1_25
- Jan 1, 2018
Nowadays, handheld devices have become popular but volume of malwares on mobile platform has also grown rapidly. To detect mobile malware, static approaches and dynamic approaches are two common ways used to analyze suspicious applications. Dynamic approaches detect malware base on the actual behaviors of applications, but how to trigger malicious behavior and the efficient of dynamic approaches are the difficulties of this kind of approaches. Due to the limited resource of mobile devices, static analysis approach is the practicable way to detect malwares on mobile device. Anti-virus software is the typical paradigm of static analysis approach. However, the effectiveness of Anti-virus software rely on its signatures. How to find an efficient and automatic way to build thread pattern of mobile malware is a critical issue to detect new or zero-day malware.
- Book Chapter
- 10.1007/978-1-4899-3499-4_5
- Jan 1, 1989
How to characterize geometrically a fluctuation near a critical point is a longstanding problem1−8 that recently has received renewed attention, due to a novel experiment in which direct visual observation of critical fluctuations was possible9. Here I want to describe a static and dynamic approach to this problem. The static approach is based on a particular site bond correlated percolation model which was previously introduced as a model for sol gel transition10, For a particular value of the bond probability4, this approach can be related to a formalism developped by Kasteleyn and Fortuin3,11 and gives the correct definition of the Ising and Potts clusters for a geometrical description of the phase transition. I will first review the main results and show how the formalism can be extended to the case of non zero magnetic field. In Sect. III–V I will present exact results12 on the fractal structure of the Ising and Potts clusters based on a mapping13 from the Potts model to the Coulomb gas. In Sec. VI it will be shown that a model originally introduced by Mandelbrot and Given14 for percolation clusters is found extremely good to describe the fractal structure of the Potts clusters. Finally Sec. VII is devoted to a dynamical approach which has been recently15 introduced and is based on the propagation of “damage” in a spin system.
- Research Article
28
- 10.1016/0142-0615(95)00082-8
- Aug 1, 1996
- International Journal of Electrical Power and Energy Systems
A dynamic interpretation of the load-flow Jacobian singularity for voltage stability analysis
- Research Article
40
- 10.2165/00019053-200826010-00005
- Jan 1, 2008
- PharmacoEconomics
To evaluate the economic efficiency of influenza vaccination using both dynamic and static modelling approaches. The Spanish National Health System. We modelled the progress of an influenza epidemic in Spain according to the epidemiological pattern of susceptible-->infective-->resistant, employing a non-linear system of ordinary differential equations that enables the measurement of epidemiological effects of an anti-influenza vaccination. We used a decision tree to represent the repercussion on healthcare resources use and on financial resources. The same analyses were conducted using a static approach, and the results were compared. Healthcare costs were valued in euro, year 2005 values. For the base case, the impact of the healthcare intervention (vaccination) was not efficient from the perspective of the healthcare payer when using a static approach (return rate 0.28 per euro invested in vaccination). Nevertheless, it was efficient when employing a dynamic approach (return rate 1.22 per euro). Furthermore, a considerable freeing of healthcare resources would have been produced over the entire influenza season. The indirect effect of vaccination on the non-vaccinated individuals (the 'herd immunity effect') can be greater than the direct effect on individuals vaccinated. This implies that the herd immunity effect needs to be taken into consideration in the economic evaluations of prophylactic measures employed against infectious diseases.
- Research Article
43
- 10.1016/j.rse.2009.04.008
- May 19, 2009
- Remote Sensing of Environment
Evaluation of annual forest disturbance monitoring using a static decision tree approach and 250 m MODIS data
- Research Article
5
- 10.32604/csse.2022.019427
- Jan 1, 2022
- Computer Systems Science and Engineering
Web applications have become a widely accepted method to support the internet for the past decade. Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities, the configuration is growing and becoming more complicated. The growing demand and complexity also make these web applications a preferred target for intruders on the internet. Even with the support of security specialists, they remain highly problematic for the complexity of penetration and code reviewing methods. It requires considering different testing patterns in both codes reviewing and penetration testing. As a result, the number of hacked websites is increasing day by day. Most of these vulnerabilities also occur due to incorrect input validation and lack of result validation for lousy programming practices or coding errors. Vulnerability scanners for web applications can detect a few vulnerabilities in a dynamic approach. These are quite easy to use; however, these often miss out on some of the unique critical vulnerabilities in a different and static approach. Although these are time-consuming, they can find complex vulnerabilities and improve developer knowledge in coding and best practices. Many scanners choose both dynamic and static approaches, and the developers can select them based on their requirements and conditions. This research explores and provides details of SQL injection, operating system command injection, path traversal, and cross-site scripting vulnerabilities through dynamic and static approaches. It also examines various security measures in web applications and selected five tools based on their features for scanning PHP, and JAVA code focuses on SQL injection, cross-site scripting, Path Traversal, operating system command. Moreover, this research discusses the approach of a cyber-security tester or a security developer finding out vulnerabilities through dynamic and static approaches using manual and automated web vulnerability scanners.
- Conference Article
- 10.2523/iptc-23402-ea
- Feb 12, 2024
Sand production is a common problem associated with semi-consolidated sandstone due to the reaction between the injected water and sand formation. In this paper, the mechanism of quartz hydrolysis during water breakthrough is investigated to establish a relation between silica dissolution and rock strength as a function of water saturation. The study is conducted with static and dynamic experimental approaches to investigate the relationship between sand (quartz) and water, which is called quartz hydrolysis. The static approach used pure quartz fine and coarse particles at different water compositions and temperatures to find the reaction between silica and water. From static results, some cases have been selected to examine further through a dynamic approach (core flooding test) as a function of the water saturation. Then using a UV-Vis spectrophotometer to measure the silica concentration and dissolution rate. Whereas unconfined compressive strength is conducted to measure the change in sandstone core strength. The results regarding static conditions show that Distilled water has a higher impact on silica dissolution than the brine base. This is related to the saturation level of the solution reached. In terms of the pH effect, it has been found that the highest amount of silica dissolution is 12 pH then 3 pH. Meaning that at the highest pH 12 and lowest pH 3 the silica dissolution increases sharply. This is related to OH and H ions present in both high and low pH stimulating the reaction. Regarding salinity effect, it is seen that Sodium chloride and potassium chloride have the highest effect in silica dissolution. While for the core flooding test, the results show that an increase in water saturation leads to reduce the core strength as a function of an increase in silica dissolution, which weakens the grain particles and connections at grain-to-grain contact, ultimately reducing core strength and causing sand production. It is concluded that water quality has a significant impact on the amount of sand dissolved, and a correlation between silica dissolution and rock strength as a function of water saturation is established. This study’s findings are useful in designing optimum water quality for water injection and mitigating sand production issues in sandstone formations. Also, understanding the main reasons behind sand production for the semi-consolidated sandstone formation.
- Research Article
- 10.3934/jdg.2025021
- Jan 1, 2025
- Journal of Dynamics and Games
- Research Article
- 10.3934/jdg.2025012
- Jan 1, 2025
- Journal of Dynamics and Games
- Research Article
- 10.3934/jdg.2025052
- Jan 1, 2025
- Journal of Dynamics and Games
- Research Article
- 10.3934/jdg.2025053
- Jan 1, 2025
- Journal of Dynamics and Games
- Research Article
- 10.3934/jdg.2025025
- Jan 1, 2025
- Journal of Dynamics and Games
- Research Article
- 10.3934/jdg.2025007
- Jan 1, 2025
- Journal of Dynamics and Games
- Research Article
- 10.3934/jdg.2025026
- Jan 1, 2025
- Journal of Dynamics and Games
- Research Article
- 10.3934/jdg.2025028
- Jan 1, 2025
- Journal of Dynamics and Games
- Research Article
- 10.3934/jdg.2025019
- Jan 1, 2025
- Journal of Dynamics and Games
- Research Article
- 10.3934/jdg.2025018
- Jan 1, 2025
- Journal of Dynamics and Games
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.