or organization
Recently Published Documents


TOTAL DOCUMENTS

640
(FIVE YEARS 332)

H-INDEX

23
(FIVE YEARS 2)

2022 ◽  
Vol 1 (4) ◽  
pp. 841-846
Author(s):  
Rafif Muhammad Irdian ◽  
Rafi Fredy Septianto ◽  
Aksen Winarto

Along with the increasing crime rate of data theft that occurs, it takes a good room security system to maintain data security for a particular agency or organization. Something A good security system is a security system that can be monitored and controlled remotely using the internet or better known as IoT (Internet of Things). In this thesis will designed an IoT-based room security system using the Android application, this system works using several modules including RFID (Radio Frequency Identification) module, camera module and door lock solenoid. The RFID card in this RFID Module functions as an identification process for people who want to enter into the room. In addition, this RFID module also functions as a trigger for the camera to work to take pictures a picture of the person who wants to enter the room. The data obtained from the two modules later will be sent into the Android application. The admin of the room can carry out the verification process to allow or deny people who want to enter the room. The results of testing this system can be runs well when the internet speed of the access point is fast and stable, but less optimal when the internet speed of the access point is running slowly.


2022 ◽  
Vol 3 (12) ◽  
pp. 54-61
Author(s):  
Jack Bbabbi Mukulu ◽  
Abubaker Qutieshat

Informal financial services (IFSs) provide various types of investment avenues for both rural and urban populations in Zambia. This paper is a critical review of the sustainability of various informal investment typologies Zambians has been using and adopting to increase their financial resources and solve their livelihoods and social issues in the process. An evaluation of why people and organizations opt for specific financial services that come in the form of savings and lending groups will be discussed in detail to understand if they have been meeting people's expectations. The paper derives its data from various studies in the past 10 years that emanates from Zambia and Sub-Saharan Africa. While the sustainability of various typologies of informal financial services is broad, they are measured through risks associated, savings policies adopted, group loan guarantees and flexibility, interest and transactional expenses enforcement, income-generating, wealth creation and any social capital investment. The research reveals that limited studies have looked at various typologies of savings and lending groups, including evaluating their sustainability. This study helps in decision making for anyone or organization who would want to join or start a savings group in Zambia and key parameters to follow.


Author(s):  
Jung-Keun Park ◽  
Jon Boyer ◽  
Laura Punnett

Exposure to ergonomic risk factors has been reported for laboratory workers over decades. However, these exposures are not well characterized with respect to the type of laboratory or work organization. This study compared biomechanical exposure to upper extremity (UE) postures and hand activity levels (HALs) in general hospital laboratories by job, work, and laboratory type. The study used observational data gathered using a revised version of the Posture, Activity, Tools, and Handling (PATH) method, generating frequencies of categorized exposures. Eighteen workers were observed in 11 job titles (seven laboratories) in a single hospital by two investigators over a 7 month period. A taxonomy was constructed to categorize the extent to which the laboratory operations were automated. Overall, there were markedly high exposures to postural strain for the distal UE, especially wrist/forearm deviation (73% of observations), gross grasp (71%), and pinch grip (49%). For the HAL categories, 61% of the observations were in the moderate range (3.3–<6.7). Shoulders and elbows tended to remain in the neutral postural range. Posture frequencies were similar among the job categories studied and laboratory types. HAL was higher when the hand was in a pinch grip. Manual operations represented a higher proportion of work time than semi-automated or automated operations. Biomechanical exposure can be documented more extensively and diversely when using the revised PATH approach along with the taxonomy, with respect to exposure variables, such as the type of job, work, or organization in the industry including the hospital laboratories.


2022 ◽  
pp. 216-242
Author(s):  
Onyekachi Wambu ◽  
Amanda Rodrigues Amorim Adegboye ◽  
Kumar Kotecha ◽  
Natasha Bonsu

A key remit of any consultant is to assist the client or organization they work with to achieve their objectives by mapping out a strategy for developing and sustaining the work of the organization. The aim of this chapter is to use an autoethnographic method and semi-structured questioning to reflect on our consultancy activity with social enterprises and not-for-profit organisations. As a part of their lived experience of engaging with clients, a group of diverse consultants reflect on their work of providing consultancy services to community groups, academics, and organisations.


2021 ◽  
Vol 9 (12) ◽  
pp. 669-710
Author(s):  
Dr.Yusuf Perwej ◽  
Syed Qamar Abbas ◽  
Jai Pratap Dixit ◽  
Dr. Nikhat Akhtar ◽  
Anurag Kumar Jaiswal

In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace.  Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data.  The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of a cyber-attack.


Author(s):  
S. Bediroglu ◽  
V. Yıldırım

Abstract. Most commonly used detail type in 3D city modelling is building layer. One of the most important distinguishing point of buildings is independent sections. When the independent sections are examined in the context of Urban Information System (UIS), they have a multi-layered structure with their own characteristics. In address management processes, definition of the area belonging to a person, family or organization is realized through independent sections of buildings. In this study, it is aimed to model one the most important components of city objects such as building independent sections and road networks with GIS-based 3D modelling techniques. According to the results obtained from literature studies, answers were researched to the questions of what should be workflow of producing 3D models in the system and what should be in ideal 3D GIS database. Buildings and building independent sections were geocoded to provide some additional innovations to address mapping methods. Procedural modelling method was preferred as a GIS-based 3D modelling technique. Created models enable both the visualization of address data and their transfer to the 3D environment, as well as navigation. It provides some practical information. The designed system has been tested practically in Trabzon city.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Franziska M. Renz ◽  
Richard Posthuma ◽  
Eric Smith

PurposePsychological ownership (PO) theory and extended self theory explain why someone feels like the owner of his/her job or organization. Yet, there is limited prior research examining whether PO differs as an individual versus collective phenomenon, and in different cultural contexts. The authors extend this literature by examining the dimensionality of PO, multiple outcomes and cultural values as boundary conditions.Design/methodology/approachData from surveys of 331 supervisors from Mexico and the US were collected to examine the relationships between the theorized constructs. The authors apply two-stage least squares (2SLS) regression analysis to alleviate endogeneity concerns and produce robust results.FindingsBoth individual and collective PO (IPO and CPO) are positively associated with organization-based self-esteem (OBSE) and a new outcome, paternalistic leadership behavior. Cultural values are significant moderators with an individualistic orientation enhancing and a power distance orientation attenuating these relationships.Originality/valueThis study extends PO theory and extended self theory by investigating whether IPO and CPO have different outcomes considering contextual differences in cultural values. Additionally, the authors capture the frequency of paternalism instead of its mere occurrence.


Author(s):  
Ružica Kijevčanin ◽  

The Constitutional Judiciary is one of the basic state functions embodied in an independent state body called the Constitutional Court. The Constitutional Court protects constitutionality and legality, as well as human and minority rights and freedoms, by exercising the various and numerous competencies established by the highest legal act. Its role in the legal system is extremely important and irreplaceable, which implies an analysis of the organization of the Constitutional Court. Every organ or organization is made up of people. The human staff is the supporting pillar on the composition of which the efficiency, success and professionalism of the institution depend. Carefully selected members, based on quality criteria, are a guarantee for timely and productive work. By interpreting the legal norms that regulate the issues of election and composition of the Constitutional Court through different stages of the constitutional development of our state, we will create a comprehensive picture of the solution and come to a conclusion about possible improvements to existing rules.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Mai-Ning Jiao ◽  
Tong-Mei Zhang ◽  
Kun Yang ◽  
Zhao-Yuan Xu ◽  
Guan-Meng Zhang ◽  
...  

Abstract Background Traumatic haemarthrosis was hypothesized to be the etiology of temporomandibular (TMJ) ankylosis. Here, taking haematoma absorbance as a control, we aimed to reveal the molecular mechanisms involved in haematoma organizing into ankylosis using transcriptome microarray profiles. Material/methods Disk removal was performed to building haematoma absorbance (HA) in one side of TMJ, while removal of disk and articular fibrous layers was performed to induced TMJ ankylosis through haematoma organization (HO) in the contralateral side in a sheep model. Haematoma tissues harvested at days 1, 4 and 7 postoperatively were examined by histology, and analyzed by Affymetrix OviGene-1_0-ST microarrays. The DAVID were recruited to perform the Gene Ontology and Kyoto Encyclopedia of Genes and Genomes pathway analysis for the different expression genes (DEGs). The DEGs were also typed into protein–protein interaction (PPI) networks to get the interaction data. Six significant genes screened from PPI analysis, were confirmed by real-time PCR. Results We found 268, 223 and 17 DEGs at least twofold at days 1, 4 and 7, respectively. At day 1, genes promoting collagen ossification (POSTN, BGN, LUM, SPARC), cell proliferation (TGF-β), and osteogenic differentiation of mesenchymal stem cells (BMP-2) were up-regulated in the HO side. At day 4, several genes involved in angiogenesis (KDR, FIT1, TEK) shower higher expression in the HO side. While HA was characterized by a continuous immune and inflammatory reaction. Conclusions Our results provide a comprehensive understanding of the role of haematoma in the onset and progress of TMJ ankylosis. The study will contribute to explaining why few injured TMJs ankylose and most do not from the molecular level.


Author(s):  
Noor Kadhim Ayoob ◽  
Asraa Abdullah Hussein ◽  
Rusul Mohammed Neamah

One of the important issues in the era of computer networks and multimedia technology development is to find ways to maintain the reliability, credibility, copyright and non-duplication of digital content transmitted over the internet. For the purpose of protecting images from illegal usage, a watermark is used. A hidden digital watermark is the process of concealing information on a host to prove that this image is owned by a specific person or organization. In this paper, a new method has been proposed to use an RGB logo to protect color images from unlicensed trading. The method depends on retrieving logo data from specific locations in the host to form a logo when the owner claims the rights to those images. These positions are chosen because their pixels match the logo data. The locations of matching pixels are stored in a table that goes through two stages of treatment to ensure confidentiality: First, table compression, second, encoding positions in the compressed table through El-Gamal algorithm. Because the method depends on the idea of keeping host pixels without change, PSNR will always be infinity. After subjecting the host to five types of attack, the results demonstrate that the method can effectively protect the image and hidden logo is retrieved clearly even after the attacks.


Sign in / Sign up

Export Citation Format

Share Document