To see the other types of publications on this topic, follow the link: BURSAR (Computer system).

Journal articles on the topic 'BURSAR (Computer system)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'BURSAR (Computer system).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rohani, Elisa Dwi, and Reza Destiani. "Prosedur Pelayanan Tiket Pesawat Domestik Garuda Indonesia Di Pt. Dymens Travel Bureau." Jurnal Pariwisata Terapan 1, no. 2 (2017): 129. http://dx.doi.org/10.22146/jpt.30155.

Full text
Abstract:
Garuda Indonesia as national airlines in Indonesia have integrated reservation system. PT. Dymens Travel Bureau, as travel agent which provides Garuda Indonesia’s ticket sales as their main product, implemented this system. This reservation system have some steps that must be done correctly. Besides the system itself, agent must provide equipment such as computers with stable internet connection, staff with high computer and airlines sytem literacy. The aim of this paper is to analyse Garuda Indonesia’s online system ticket reservation at PT. Dymens Travel Bureau. Reservation system is complex thus need higher competency in system literacy to operates it. This research used descriptive qualitative method to exlpain steps of reservation in Garuda Indonesia’s System. This system generates Passenger Name Record (PNR) with passenger information inculidng name, flight schedule, route, class of flight, ticket number, time limit, and booking code. This reseach aslo found some non technical problem in reservation system due lack of competency of staff and unstable internet connection.
APA, Harvard, Vancouver, ISO, and other styles
2

Shukla, H. S., Mohammad Tamsir, Vineet K. Srivastava, and Mohammad Mehdi Rashidi. "Modified cubic B-spline differential quadrature method for numerical solution of three-dimensional coupled viscous Burger equation." Modern Physics Letters B 30, no. 11 (2016): 1650110. http://dx.doi.org/10.1142/s0217984916501104.

Full text
Abstract:
In this paper, we propose a modified cubic B-spline differential quadrature method (MCB-DQM) to solve three-dimensional (3D) coupled viscous Burger equation with appropriate initial and boundary conditions. In this method, modified cubic B-spline is treated as a basis function in the differential quadrature method (DQM) to compute the weighting coefficients. In this way, the Burger equation is reduced into a system of ordinary differential equations. An optimal strong stability-preserving Runge–Kutta (SSP-RK) method is employed to solve the resulting system of ordinary differential equations. In order to illustrate the accuracy and efficiency of the proposed method, a numerical problem is considered. From the numerical experiment, it is found that the computed result is in good agreement with the exact solution. Stability analysis of the method is also carried out using the matrix stability analysis method and found to be unconditionally stable.
APA, Harvard, Vancouver, ISO, and other styles
3

Primawati, Alusyanti, and Dewi Mustari. "ANALISIS MANAJEMEN PROYEK PERANGKAT LUNAK SISTEM INFORMASI AKUNTANSI PADA BIRO SISTEM INFORMASI PT. X." Jurnal Sistem Informasi 9, no. 2 (2014): 101. http://dx.doi.org/10.21609/jsi.v9i2.358.

Full text
Abstract:
The software is an intermediary between system hardware computer with user as human. Based on the emerging software projects because of the importance of the functions already affects many functions in various aspects. Software projects that have become this need ultimately require management actions to manage the process in the project. Project management is necessary for the success of the project. Bereau Information System PT. X is one part of a company that provides software for functional PT. X. Analysis results from the concept of software project management information systems Bureau at PT. X when the process of designing application systems information accounting PT. X aims to answer how concept of project management Information Systems Bureau in designing the Accounting Information System applications. The methods used in this research is the study of the library with a general empirical approach based on experience and theories related to project management especially in software projects. The conclusions obtained that the activity of the management software on System Information Bureau is in compliance with the application of existing theory, but science is constantly evolving so as to do the development management activities after conducting evaluation regularly for the maintenance of long-term software project.
APA, Harvard, Vancouver, ISO, and other styles
4

Uysal Biyik, Muzelfe, and Yasemin Akbal Ergun. "Evaluation of nurses’ opinions about computer physician order entry." New Trends and Issues Proceedings on Advances in Pure and Applied Sciences, no. 10 (September 28, 2018): 82–88. http://dx.doi.org/10.18844/gjpaas.v0i10.3747.

Full text
Abstract:
This research was performed as a descriptive and analytic study to determine the perceptions of the nurses regarding the computerised physician order entry system. The study was conducted with 207 nurses working in four hospitals using this system in Bursa. Sociodemographic data form and the computerised physician order entry system perception scale were used as data collection tool. Obtained data were analysed by statistical methods and nonparametric tests. The scale met an acceptable level of reliability and validity (α = 0.94). There was a statistically significant difference between the groups according to age, position, service and institution, years of institution experience and the period of using the system in terms of scale and sub-dimensions. Finally, it was determined that the nurses perceived the system as positive in spite of some difficulties related to this system. It is suggested that the problems with the system should be solved and training programmes should be organised.Keywords: Nurse, computer physician order entry, medication errors.
APA, Harvard, Vancouver, ISO, and other styles
5

Balce, A. E. "Development and Implementation of a Photogrammetric Control System in Alberta." Canadian Surveyor 39, no. 2 (1985): 87–93. http://dx.doi.org/10.1139/tcs-1985-0011.

Full text
Abstract:
A new service and system within the Alberta Bureau of Surveying and Mapping (ABSM) is briefly described. The system has been developed using a computer system development methodology, adopted as the standard within the Alberta government. Details of services and materials available are included for the benefit of the industry. Future plans and capabilities of the new system are summarized.
APA, Harvard, Vancouver, ISO, and other styles
6

Vandegraft, Douglas L. "A Boundary Delineation System for the Bureau of Ocean Energy Management." Proceedings of the ICA 1 (May 16, 2018): 1–5. http://dx.doi.org/10.5194/ica-proc-1-118-2018.

Full text
Abstract:
Federal government mapping of the offshore areas of the United States in support of the development of oil and gas resources began in 1954. The first mapping system utilized a network of rectangular blocks defined by State Plane coordinates which was later revised to utilize the Universal Transverse Mercator grid. Creation of offshore boundaries directed by the Submerged Lands Act and Outer Continental Shelf Lands Act were mathematically determined using early computer programs that performed the required computations, but required many steps. The Bureau of Ocean Energy Management has revised these antiquated methods using GIS technology which provide the required accuracy and produce the mapping products needed for leasing of energy resources, including renewable energy projects, on the outer continental shelf. (Note: this is an updated version of a paper of the same title written and published in 2015).
APA, Harvard, Vancouver, ISO, and other styles
7

Song, Zhen, Jian Chen, and Yan Hua Feng. "Service-Oriented Smart Mine Construction." Applied Mechanics and Materials 263-266 (December 2012): 3255–59. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3255.

Full text
Abstract:
With the development of computer, networking and automation technology, mining information technology becomes more intelligent and more integrated. This paper establishes a smart mine system in one mining enterprise of East China Mineral Exploration and Development Bureau. By adopting service-oriented architecture, smart mine system reuses the existing function modules and integrates the data through Web service to form a comprehensive service system to solve information island problems, which helps to facilitate production, operation and management of mining enterprises.
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Obaidi, Mohanad Ali Meteab. "Alarm Emergency in Virtual Small City." Al-Mustansiriyah Journal of Science 27, no. 5 (2017): 64. http://dx.doi.org/10.23851/mjs.v27i5.169.

Full text
Abstract:
In this paper a control AT89C51 microcontroller system was proposed to used in the design of alarm emergency in virtual small city. The proposed system includes personal computer (PC), monitoring, control circuit which has a microcontroller. When the accident accrued, the system sends alarm from any anywhere compromised with a number of the street to the emergency office and emergency alarms bureau official received by the monitoring that appear on the map and this point sends warning.
APA, Harvard, Vancouver, ISO, and other styles
9

Harianto, Kusno, Heny Pratiwi, and Yonatan Suhariyadi. "Sistem Monitoring Lulusan Perguruan Tinggi Dalam Memasuki Dunia Kerja Menggunakan Tracer Study." J-SAKTI (Jurnal Sains Komputer dan Informatika) 3, no. 2 (2019): 295. http://dx.doi.org/10.30645/j-sakti.v3i2.148.

Full text
Abstract:
This research is titled Monitoring System of Higher Education Graduates in Entering the World of Work Using Tracer Study. The problem raised in this study is that the BKK (Bursa Kerja Khusus) STMIK Widya Cipta Dharma Samarinda get information about the performance of STMIK graduate students Widya Cipta Dharma, analyze graduate data to obtain the relevance of the competency of STMIK graduates Widya Cipta Dharma Samarinda, change the old system into a system that new. The purpose of this research is to provide information and reports on the results of tracer study data collection from alumni of STMIK Widya Cipta Dharma Samarinda. Data collection methods used are literature study, field studies. The system development method used is the waterfall method. Informatic System of Alumnus Record Tracer Study Based Website of STMIK Widya Cipta Dharma Samarinda is a computer-based system that was built with the aim of processing the alumnus search to find out the description of the profile, performance, and distribution of work location of the alumnus. Informatic System of Alumnus Record Tracer Study Based Website of STMIK Widya Cipta Dharma Samarinda is expected to help assist the BKK (Bursa Kerja Khusus) in recording alumnus and record the track record of alumnus scattered in serveral areas.
APA, Harvard, Vancouver, ISO, and other styles
10

Hoecker, Jay. "These Models Need Enterprise Data Management!" Muma Case Review 2 (2017): 001–30. http://dx.doi.org/10.28945/3907.

Full text
Abstract:
After 28 years of public service, the Information Technology Bureau Chief for the Southwest Florida Water Management District (SWFWMD), Dr. Steven Dicks, was still passionate about serving the public. By first focusing on the needs of people in the District, Dr. Dicks was able to objectively observe the many aspects of operations for which he was responsible. His observations led him to believe that the use of technology within his organization wasn’t as effective and efficient as he knew it could be. The SWFWMD managed the water resources of 16 Florida counties in an area that was close to 10,000 square miles, with 4.7 million inhabitants. To effectively manage water resources, the organization needed to understand current water needs, prepare for future needs, and protect and preserve water resources within its boundaries. A significant part of managing water resources involved the production and utilization of scientific computer models that help track, predict, and control a plethora of water related challenges. At the SWFWMD, individuals used desktop computers to run most of the scientific models. Given the limited computing capacity of the average desktop computer, running a model was beginning to require too much time; and simple interruptions, such as a system reboot, could jeopardize the ability to complete long model runs. Therefore, the resulting data used and produced was often very ineffectively managed. Dr. Dicks began to wonder about the current system of producing and managing scientific models, and how the systems might be improved. He evaluated options. He thought upgrading individual desktops could help, but only in the short term because as the data sets and demand for processing power continued to grow, the desktop might always be a step behind. Installing powerful servers to house the data sets and run the models would be a significant improvement, but the cost to acquire and maintain the new system might challenge the budget. A cloud-based solution utilizing an “infrastructure as a service” approach, was a third option, but current system infrastructure compatibility, security, and access needed to be carefully evaluated. Dr. Dicks believed that data management was just as important as the processing power of an upgrade, and that ultimately the technology that allowed for the most effective EDM system needed to be identified and implemented to best serve the needs of the District into the future.
APA, Harvard, Vancouver, ISO, and other styles
11

Botha, Martin, and Rossouw von Solms. "The utilization of trend analysis in the effective monitoring of information security. Part 2: the model." Information Management & Computer Security 10, no. 1 (2002): 5–11. http://dx.doi.org/10.1108/09685220210417454.

Full text
Abstract:
A survey recently completed by the Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI) revealed that corporations, banks, and governments all face a growing threat from computer crime, and in particular computer hacking. Computer hacking activities caused well over US$100 million in losses last year in the USA and the trend toward professional computer crime, such as computer hacking, is on the rise. Different methods are currently used to control the computer crime problem, for example, by controling access to and from a network by implementing a firewall. As the survey highlighted, most of these methods are insufficient. New means and ways which will minimise and control the hacking problem must therefore continuously be researched and defined. Proposes a method, using trend analysis, that could be utilized to minimise and control the hacking problem in an organisation.
APA, Harvard, Vancouver, ISO, and other styles
12

Moisson, X. "Construction of Relativistic Ephemerides and Applications." International Astronomical Union Colloquium 165 (1997): 233–38. http://dx.doi.org/10.1017/s0252921100046601.

Full text
Abstract:
AbstractThe present precision of VLBI observations for the Earth rotation, the accuracy of time measurement realised with modern atomic clocks, and the necessity to obtain precise definition of reference systems and links between them, imply that we compute in the near future more accurate ephemerides, based on general relativity theory (GRT), in accordance with the recent IAU resolutions (IAU, 1992). This paper is dedicated to the presentation of semi-analytical integration of the motion of bodies in the Solar system which completes the theories built at the Bureau des Longitudes by (Bretagnon and Francou, 1988), with some applications in the determination of coordinate time scales links.
APA, Harvard, Vancouver, ISO, and other styles
13

Gordienko, R. G., O. G. Fedorenko, A. A. Demidov, and A. V. Fedorov. "Debugging and monitoring of applicationprograms in the BagrOS-4000 real-time operation system based on the Elbrus architecture." Radio industry 29, no. 1 (2019): 8–15. http://dx.doi.org/10.21778/2413-9599-2019-29-1-8-15.

Full text
Abstract:
The article is concerned with the problems of monitoring and debugging of operating system processes, the effectiveness of which in the hard real-time operating system version does not allow any stopping to analyze the state of software and/ or hardware. The paper describes the concept of a debugging and monitoring system developed taking into account this feature in the Sukhoi design bureau for the BagrOS-4000 hard real-time operating system on the Elbrus architectural platform together with the specialists of MCST JSC. The method of non-stop monitoring and data collection in hard realtime processes in the multiprocess multimodular systems is discussed. An approach to the management of debugging targets in terms of source code using the DWARF debugging information specification is presented. The transition from the instrumental machine to the system server built into the target computer is described. Given the rationale for the use of client-server architecture in the debugging and monitoring system for BagrOS-4000. A comparative analysis of the key functionality of the debugging and monitoring system with the existing debugging systems has been carried out; the key aspects of the DMS architecture have been considered. The design of a machine-dependent interface required for the integration of the independent hardware platforms into the BagrOS-4000 system when implementing the system on an integrated avionics module of the onboard complex is discussed. The results of testing of the debugging and monitoring systems are analyzed in terms of efficiency versus the classical method of using the debug console prints when debugging a real-time operating system. Most of the above solutions are universal and have been successfully tested using other microprocessor platforms on multi-threaded application programs of real-time operating systems running on multi-core processors, including the MIPS, Power PC, Intel platforms.
APA, Harvard, Vancouver, ISO, and other styles
14

Branscomb, David, David Beale, and Royall Broughton. "New Directions in Braiding." Journal of Engineered Fibers and Fabrics 8, no. 2 (2013): 155892501300800. http://dx.doi.org/10.1177/155892501300800202.

Full text
Abstract:
It is the intent of this manuscript to provide a general treatment of braiding: past, present, and future. A history and evolution of braiding, braiding machinery, and related engineering developments is provided with emphasis on the design, manufacture, and analysis of braided fabrics and composites. Some recent developments are briefly described, including: 1. a composite braider with axial yarns which interlace with the helicals, and in which the helical yarns do not interlace with each other – a machine now under commercial development, 2. a new braided structure, called the true triaxial braid, produced by the new machine or by proper carrier loading on a conventional Maypole braider; and 3. a computer controlled take-up system using image analysis to monitor and control braid formation. Original work ongoing at Auburn University is described and involves Jacquard lace braids with open structures for use in composites, computer aided design (CAD), computer aided manufacturing (CAM), and analysis of ordinary and lace braids for composite applications. This paper is an expanded version of an invited presentation under the title “New Directions in Braiding” at a Fiber Society presentation in Bursa, Turkey, in the spring of 2010 [1].
APA, Harvard, Vancouver, ISO, and other styles
15

Ilyenko, Anna, Sergii Ilyenko, and Diana Kvasha. "THE CURRENT STATE OF THE CYBERSECURITY OF CIVIL AVIATION OF UKRAINE AND THE WORLD." Cybersecurity: Education, Science, Technique 1, no. 9 (2020): 24–36. http://dx.doi.org/10.28925/2663-4023.2020.9.2436.

Full text
Abstract:
Considering computer-integrated aviation systems that provide a link between civil aviation activities within the ground-to-air and air-to-air channels, the question of the safe operation of such aviation systems from an ever-increasing cyber threats, and the decline in cybersecurity for the aviation industry as a whole. The protection status of ground-to-air and air-to-air channels in such aviation systems is at different levels and depends directly on the activity of all components of aviation activity (airport-aircraft-information network-air traffic management, etc.). To date, some communication channels are not secure at all and are in an open state, which provokes a rapid growth of cyber-attacks and requires the introduction and application of modern information and communication technologies in such communication channels. In view of the ever-increasing cyber statistics on the work of civil aviation worldwide, the authors of the article highlighted the current state of cyber security and protection of ground-to-air and air-to-air channels of the aircraft fleet of Ukrainian airlines, and take a closer look at the world experience. The authors comprehensively covered all components of the aviation system, with particular attention given to aircraft designed by Antonov Design Bureau with the time evolution of tire development and data networks of the world's leading aviation industry leaders (such as Airbus and Boeing). Also, attention is given to the present state and mechanisms of data transmission of the ground-to-air and air-to-air channels and the architecture of the modern air-network of computer-integrated aviation systems. The authors plan a number of scientific and technical solutions for the development and implementation of effective methods and means to ensure the requirements, principles and sub-approaches to ensure cyber security and the organization of protection of ground-to-air and air-to-air channels in experimental computer-integrated aviation systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Pastakkaya, Bilsay, Nurettin Yamankaradeniz, Omer Kaynakli, Salih Coskun, and Recep Yamanakaradeniz. "Experimental analysis of a solar absorption system with interior energy storage." Journal of Energy in Southern Africa 23, no. 2 (2012): 39–49. http://dx.doi.org/10.17159/2413-3051/2012/v23i2a3161.

Full text
Abstract:
This study examines experimentally the cooling application of a solar absorption system with interior energy storage that uses two different auxiliary systems. The experiments were performed at Uludag University, Bursa, Turkey on the 3rd and 4th of August 2010 that had the approximately same average outdoor temperature, 31°C. A solar hot water was delivered via a 40 m2 array of flat plate solar collectors that drove a lithium chloride (LiCl) absorption heat pump with a cooling power peak of 20 kW. A solar-powered air conditioning system was designed for heating and cooling in a test room that had a total floor space of 30 m2. Chilled water produced in the evaporator was supplied to the fan coil units, and the heat of condensation and absorption was rejected by means of a wet cooling tower. An electric heater and an air source heat pump were used as auxiliary systems for the absorption cooling application for two different cases when the solar energy was insufficient. Temperature variations were recorded for the absorption machine components, the test room, and the outdoors. The cooling energy, thermal energy, and daily average coefficient of performance (COP) of the absorption system were calculated for two days. Solar absorption cooling was considered for two different auxiliary systems and is presented in this manuscript. The results showed that the daily average COP of the absorption system was 0.283 for Case 1 and 0.282 for Case 2. For both cases, the interior energy storage of the absorption system enabled it to satisfy the cooling demand during the night while solar energy was not available.
APA, Harvard, Vancouver, ISO, and other styles
17

Lamarche, Alain, John Ion, Peter Rubec, A. A. LaVoi, and J. K. Winner. "Field Evaluation of a Wireless Electronic Shoreline Cleanup Support System." International Oil Spill Conference Proceedings 1999, no. 1 (1999): 859–61. http://dx.doi.org/10.7901/2169-3358-1999-1-859.

Full text
Abstract:
ABSTRACT A prototype system was designed and assembled to electronically support all the steps involved in the cleanup phase of an oil spill response, from field data acquisition to decision making at a command post. The system included satellite communication, wireless Local Area Networks (LANs), Geographical Information Systems (GIS), and computerized Shoreline Cleanup Assessment Team (SCAT) support software. Field data entry was done using a penpad linked to a wearable computer, including (1) creation of electronic shoreline oiling summary diagrams with the help of a GIS; (2) completion of electronic SCAT forms; (3) exact positioning of oil patches and other spatial information with a differential Global Positioning System (DGPS); and (4) recording of images with a video camera. Information from the field was transmitted through a wireless LAN to a portable computer, which relayed the data via satellite communication to a central facility where information was integrated and analyzed for decision making. The system was evaluated during a number of field trials with personnel from the Bureau of Emergencies Response (state of Florida), normally involved in oil spill response. The evaluation demonstrated that (1) a stand-alone system, including differential GPS capability, was optimal to support SCAT activities in the field; (2) the setup and operation of a wireless LAN was both cumbersome and not worth the improvement in peiformance (reduced transfer time), particularly due to the necessity of deploying unwieldy directional antennas; (3) a major limitation was that the wearable computer's display was not visible under bright sunlight; (4) communication by wireless LAN and satellite network proved feasible, but too difficult to do routinely; (5) the use of computerized software tools in combination with detailed base maps (digital orthoquads) proved to be a huge improvement over the use of pen and paper; (6) the use of an all-electronic environment substantially shortened the length of time necessary to produce decision maps.
APA, Harvard, Vancouver, ISO, and other styles
18

Meilina, Susiyanti, and Ari Argonanto. "SISTEM PENGELOLAAN ARSIP PADA SEKRETARIAT JENDERAL KEMENTERIAN PEKERJAAN UMUM DAN PERUMAHAN RAKYAT SUMATERA BARAT." Ensiklopedia Sosial Review 3, no. 2 (2021): 187–97. http://dx.doi.org/10.33559/esr.v3i2.811.

Full text
Abstract:
One of the efforts to support the management of archives in the field of the General Bureau at the Secretariat General of the Ministry of Public Works and Public Housing of West Sumatra is to create an archival application system that can be operated via a computer network, with the aim of increasing the acceleration of the search service process for an archive. This research is: 1) To find out what are the obstacles faced in the archive management system in the General Bureau at the Secretariat General of the Ministry of Public Works and Public Housing of West Sumatra; 2) To find out what are the efforts made to overcome the obstacles in the archive management system in the field of the General Bureau at the Secretariat General of the Ministry of Public Works and Public Housing of West Sumatra; 3) To find out what are the efforts made to overcome the obstacles in the archive management system in the field of the General Bureau at the Secretariat General of the Ministry of Public Works and Public Housing of West Sumatra. This type of research is qualitative research. Qualitative research is research that intends to understand the phenomena experienced by research subjects (such as behavior, perception, action, etc.), holistically, and by means of descriptions in the form of words and language, in a specific natural and natural context. by utilizing various natural methods (Moleong, 2012;: 87). Informants are people who are used to provide information about the situation and conditions of the research background. So he continues to have a lot of experience in the research setting. As a team member with kindness, volunteering can provide views of values, attitudes and culture, which are the background for local research (Moleong; 2012: 90). The types of data are primary data and secondary data collected through interviews, observation and library research. The analysis technique used is qualitative analysis. The results of this study indicate that: recording or distribution of archives in the General Bureau of the Secretariat General of the Ministry of Public Works and Public Housing of West Sumatra Province uses several types, namely the Electronic Service Manuscript System (TNDE) and the outgoing mail agenda book. The conclusion that can be drawn is the dynamic archive management system in the field of the General Bureau at the Secretariat General of the Ministry of Public Works and Public Housing of West Sumatra Province in the aspects of creating and receiving archives, storing, maintaining, and shrinking, namely: in terms of creating and receiving archives, they have followed the existing archival provisions The most frequently created and received dynamic archives are correspondence records (letters). The archive storage system used at the General Bureau is the Electronic Service Manuscript Administration (TNDE) system. This TNDE system is so that letter data will be stored in a centralized database management system, making it easy to maintain data. The search for the TNDE system cannot be done automatically in the access feature in the system. For archival maintenance, the implementation of fumigation is carried out twice every year. In the context of shrinking the archives, there is an alternating dynamic archive assessment team. Archive shrinkage is in accordance with the Archive Retention Schedule (JRA), archives that have passed JRA will be immediately destroyed by burning. Suggestions include the implementation of a good archive management system at the Secretariat General of the Ministry of Public Works and Public Housing of West Sumatra, it should be equipped with supporting facilities and infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
19

Dean, Kevin L., Xylar S. Asay-Davis, Evan M. Finn, et al. "Virtual Explorer: Interactive Virtual Environment for Education." Presence: Teleoperators and Virtual Environments 9, no. 6 (2000): 505–23. http://dx.doi.org/10.1162/105474600300040367.

Full text
Abstract:
The Virtual Explorer project of the Senses Bureau at the University of California, San Diego, focuses on creating immersive, highly interactive environments for education and scientific visualization which are designed to be educational—and exciting, playful, and enjoyable, as well. We have created an integrated model system on human immunology to demonstrate the application of virtual reality to education, and we've also developed a modular software framework to facilitate the further extension of the Virtual Explorer model to other fields. The system has been installed internationally in numerous science museums, and more than 7,000 individuals have participated in demonstrations. The complete source code—which runs on a variety of Silicon Graphics computers—is available on CD-ROM from the authors.
APA, Harvard, Vancouver, ISO, and other styles
20

Ansari, Kutubuddin, Prabin Gyawali, Prachand Man Pradhan, and Kwan-Dong Park. "Coordinate transformation parameters in Nepal by using neural network and SVD methods." Journal of Geodetic Science 9, no. 1 (2019): 22–28. http://dx.doi.org/10.1515/jogs-2019-0003.

Full text
Abstract:
Abstract The present study computes B-W extension model (extended Bursa-Wolf model) coordinate transformation parameters from World Geodetic System 1984 (WGS-84) to the Everest datum namely Everest (1830) and Everest (1956) using records of coordinate measurements from Global Positioning System (GPS) observable across Nepal region. Synthetic or modeled coordinates were determined by using the Artificial Neural Network (ANN) and Singular Value Decomposition (SVD) methods. We studied 9-transformation parameters with the help of the ANN technique and validated the outcomes with the SVD method. The comparative analysis of the ANN, as well as SVD methods, was done with the observed output following one way ANOVA test. The analysis showed that the null hypothesis for both datums were acceptable and suggesting all models statistically significantly equivalent to each other. The outcomes from this study would complement a relatively better understanding of the techniques for coordinate transformation and precise coordinate assignment while assimilating data sets from different resources.
APA, Harvard, Vancouver, ISO, and other styles
21

Fibrian, Ivan Dwi. "ANALISIS READINESS SISTEM INFORMASI KEPEGAWAIAN." SAINTEKBU 11, no. 2 (2019): 45–54. http://dx.doi.org/10.32764/saintekbu.v11i2.356.

Full text
Abstract:
Computer and Internet Study Center Unipdu is developing a Personnel Management Information System in accordance with the current situation, therefore it is necessary to do a Readiness Analysis on the Personnel Management Information System before it is implemented, this is intended to measure the readiness of staff in implementing the system. This research was conducted using the STOPE Framework approach which only focused on the level of user readiness, namely the Unipdu Jombang Staffing Administration Bureau.
 The results of data processing obtained from the distribution of questionnaires to staff and lecturers at Uiversitas Pesantren Tinggi Darul Ulum, were obtained that from five domains there were 2 (two) domains that received readiness scores at level 3 (ready) on scale 4, namely People, Environment, while Strategy domains. Technology, and Organization get value of readiness at level 4 (very ready) on a scale of 4.
 Overall or at the level of the STOPE framework, Uiversitas Pesantren Tinggi Darul Ulum is ranked 3 (ready) to implement the Personnel Management Information System. But there are still some weaknesses at the level of subdomains and sub-subdomains that must get attention and improvement in implementing the Personnel Management Information System.
APA, Harvard, Vancouver, ISO, and other styles
22

Parand, Kourosh, and Mehran Nikarya. "Application of Bessel functions and Jacobian free Newton method to solve time-fractional Burger equation." Nonlinear Engineering 8, no. 1 (2019): 688–94. http://dx.doi.org/10.1515/nleng-2018-0128.

Full text
Abstract:
Abstract In this paper, a novel method based on Bessel functions (BF), generalized Bessel functions (GBF), the collocation method and the Jacobian free Newton-Krylov sub-space (JFNK) will be introduced to solve the nonlinear time-fractional Burger equation. In this paper, an implicit formula is introduced to calculate Riemann–Liouville fractional derivative of GBFs, that can be very useful in spectral methods. In this work, the nonlinear time-fractional Burger equation is converted to a nonlinear system of algebraic equations via collocation algorithm based on BFs and GBFs without any linearization and descretization methods. Finally, by using JFNK, the solution of this nonlinear system will be achieved. To show the reliability and applicability of the proposed method, we solve some examples of time-fractional Burger equation and compare our results with others.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhong, Fei, Fumu Zhang, Liping Zhang, and Ming Hao. "Three-dimensional X-ray imaging system and its application in power equipment." Insight - Non-Destructive Testing and Condition Monitoring 61, no. 10 (2019): 572–76. http://dx.doi.org/10.1784/insi.2019.61.10.572.

Full text
Abstract:
The medical computed tomography (CT) technique cannot be directly applied to power equipment, such as gas-insulated switchgear (GIS), because of its huge size and immovability. In this research, a three-dimensional X-ray imaging system is developed for GIS equipment. The three-dimensional X-ray imaging system includes machinery, motion control, data acquisition, image reconstruction and three-dimensional image display subsystems. The principle of three-dimensional X-ray imaging is based on the Radon transform and the inverse transform. The rotary scanning device successfully collects 360 sets of projection data. The tomographic image is reconstructed using the acquired projection data. Shown in this paper is what is believed to be the world's first three-dimensional structure photograph of GIS that can be sliced and displayed using X-ray imaging. The application of the three-dimensional X-ray imaging system to the 110 kV GIS equipment at the Shayao Station of the Dongguan Power Supply Bureau shows that the overall accuracy of the system can reach up to 200 microns and the highest resolution of the output tomogram can reach up to 3160 × 3160 pixels.
APA, Harvard, Vancouver, ISO, and other styles
24

Mahamood, Fatin Nur Amirah, Hafizah Bahaludin, and Mimi Hafizah Abdullah. "A Network Analysis of Shariah-Compliant Stocks across Global Financial Crisis: A Case of Malaysia." Modern Applied Science 13, no. 7 (2019): 80. http://dx.doi.org/10.5539/mas.v13n7p80.

Full text
Abstract:
Financial network is a complex system in which transaction of securities take place. Due to its complexity, a minimum spanning tree (MST) technique is used to visualize the structure. This paper investigates the topological structure of 125 shariah-compliant stocks traded in Bursa Malaysia from the year 2000 until 2017. Financial networks of the shariah-compliant stocks are constructed using MST for three duration periods namely the pre-crisis, during crisis and post-crisis. To determine the important stocks in the networks, centrality measures are applied such as degree centrality, betweenness centrality, closeness centrality and eigenvector centrality. Lastly, overall centrality measures are computed to identify the overall characteristic of each node. The findings showed that, KUB Malaysia Berhad was the most influential stock in the pre-crisis and crisis periods. While, MK Land Holdings was the main stock in the post-crisis network.
APA, Harvard, Vancouver, ISO, and other styles
25

Du, Yanke, Shuo Sun, Shi Qiu, Shaoxi Li, Mingyang Pan, and Chi-Hua Chen. "Intelligent Recognition System Based on Contour Accentuation for Navigation Marks." Wireless Communications and Mobile Computing 2021 (March 3, 2021): 1–11. http://dx.doi.org/10.1155/2021/6631074.

Full text
Abstract:
Sensing navigational environment represented by navigation marks is an important task for unmanned ships and intelligent navigation systems, and the sensing can be performed by recognizing the images from a camera. In order to improve the image recognition accuracy, this paper combined a contour accentuation algorithm into a multiple scale attention mechanism-based classification model for navigation marks. Experimental results show that the method increases the accuracy of navigation mark classification from 95.98% to 96.53%. Based on the classification model, an intelligent navigation mark recognition system was developed for the Changjiang Nanjing Waterway Bureau, in which the model is deployed and updated by the TensorFlow Serving.
APA, Harvard, Vancouver, ISO, and other styles
26

DU, Chong-dong, and Su-man LI. "On interest-rate risk management of postal savings bureau." Journal of China Universities of Posts and Telecommunications 14, no. 1 (2007): 115–21. http://dx.doi.org/10.1016/s1005-8885(07)60068-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Khoo, Benjamin K. S. "Towards A Career Skills Oriented Undergraduate Information Systems Curriculum." International Journal of Information and Communication Technology Education 8, no. 2 (2012): 1–19. http://dx.doi.org/10.4018/jicte.2012040101.

Full text
Abstract:
The Information Systems (IS) curriculum needs to be updated to be current with the advances in information systems (IS), the technologies that drive IS, and also industry’s skill requirement of IS graduates. This paper is for IS academicians and it describes a career skills oriented approach to enhance the IS curriculum based on current information from recent career skills studies, IS2002 model curriculum recommendations, United States Bureau of Labor Statistics (BLS), the current demand for information security professionals, professional certifications in demand, and the availability of the resources of a School of Management. Employers in industry are in serious need of IS professionals with the specialized skills required to strive in the Internet economy. The career skills oriented approach is an effective method to enhance the IS curriculum to educate and train IS undergraduates to meet the IS skills needs of industry.
APA, Harvard, Vancouver, ISO, and other styles
28

Iriberri, Alicia. "Natural Language Processing and Psychology in e-Government Services." International Journal of Electronic Government Research 11, no. 2 (2015): 1–17. http://dx.doi.org/10.4018/ijegr.2015040101.

Full text
Abstract:
Crime statistics from the US Bureau of Justice and the FBI Uniform Crime Report show a gap between reported and unreported crime. For police to effectively prevent and solve crime, they require accurate and complete information about incidents. This article describes the evaluation of a crime reporting and interviewing system that witnesses can use to report crime incidents or suspicious activities anonymously while ensuring the information received is of such quality that police can use it to begin an investigation process. The system emulates the tasks that a police investigator would perform by leveraging natural language processing technology and the interviewing techniques used in the Cognitive Interview. The system incorporates open-source code from the General Architecture for Text Engineering (GATE) program developed by researchers at the University of Sheffield, Web and database technology, and Java-based proprietary code developed by the author. Findings of this evaluation show that the system is capable of producing accurate and complete reports by enhancing witnesses' memory recall and that its efficacy approximates the efficacy of a human conducting a cognitive interview closer than existing alternatives. The system is introduced as the first computer application of the cognitive interview and proposed as a viable alternative to face-to-face investigative interviews.
APA, Harvard, Vancouver, ISO, and other styles
29

Su, Ying Ming, and Hsin Yao Huang. "Thermo-Environment Analyzer for Indoor Thermal Comfort Simulations in Green Building." Applied Mechanics and Materials 368-370 (August 2013): 576–81. http://dx.doi.org/10.4028/www.scientific.net/amm.368-370.576.

Full text
Abstract:
In the face of climate change, city development should take into account the concept of energy saving and carbon reduction. This study aims to use 3D building modeling and computer simulation to assess the impact of the residential building balcony on indoor thermal environment. Pufangtian residential building in the northern Taiwan was selected as research object since it was the first to pass the Golden Certification set by Taiwan Green Building Rating System (EEWH). According to the average temperature from 1981-2010 meteorological statistics data issued by Taiwan's Central Weather Bureau, this study had calculated the warmest day & the coldest day as the time for simulation. The simulation results could provide residential building design, in addition to comfort and innovation, with the concept of energy saving and carbon reduction, which will further advance the development of Green Building.
APA, Harvard, Vancouver, ISO, and other styles
30

Curtis, Jacqueline W., Andrew Curtis, and Jeffrey S. Upperman. "Using a Geographic Information System (GIS) to Assess Pediatric Surge Potential After an Earthquake." Disaster Medicine and Public Health Preparedness 6, no. 2 (2012): 163–69. http://dx.doi.org/10.1001/dmp.2012.25.

Full text
Abstract:
ABSTRACTGeographic information systems (GIS) and geospatial technology (GT) can help hospitals improve plans for postdisaster surge by assessing numbers of potential patients in a catchment area and providing estimates of special needs populations, such as pediatrics. In this study, census-derived variables are computed for blockgroups within a 3-mile radius from Children's Hospital Los Angeles (CHLA) and from Los Angeles County–University of Southern California (LAC–USC) Medical Center. Landslide and liquefaction zones are overlaid on US Census Bureau blockgroups. Units that intersect with the hazard zones are selected for computation of pediatric surge potential in case of an earthquake. In addition, cartographic visualization and cluster analysis are performed on the entire 3-mile study area to identify hot spots of socially vulnerable populations. The results suggest the need for locally specified vulnerability models for pediatric populations. GIS and GT have untapped potential to contribute local specificity to planning for surge potential after a disaster. Although this case focuses on an earthquake hazard, the methodology is appropriate for an all-hazards approach. With the advent of Google Earth, GIS output can now be easily shared with medical personnel for broader application and improvement in planning.(Disaster Med Public Health Preparedness. 2012;6:163–169)
APA, Harvard, Vancouver, ISO, and other styles
31

Morishita, Seita, Takaki Sato, Shou Oosuka, et al. "Expression of Lymphatic Markers in the Berger’s Space and Bursa Premacularis." International Journal of Molecular Sciences 22, no. 4 (2021): 2086. http://dx.doi.org/10.3390/ijms22042086.

Full text
Abstract:
We previously reported that the bursa premacularis (BPM), a peculiar vitreous structure located above the macula, contains numerous cells expressing markers of lymphatic endothelial cells, such as podoplanin and LYVE-1. Herein, we examined the expression of lymphatic markers in the Berger’s space (BS), BPM, and vitreous core (VC). BS, BPM, and VC specimens were selectively collected in macular hole and epiretinal membrane patients during vitrectomy and were then immunostained with antibodies for podoplanin, LYVE-1, and fibrillin-1 and -2. By visualization using triamcinolone acetonide, the BS was recognized as a sac-like structure with a septum located behind the lens as well as BPM. Those tissues adhered to the lens or retina in a circular manner by means of a ligament-like structure. Immunostaining showed intense expression of podoplanin and LYVE-1 in the BS. Both BS and BPM stained strongly positive for fibrillin-1 and -2. The VC was faintly stained with antibodies for those lymph-node markers. Our findings indicate that both BS and BPM possibly belong to the lymphatic system, such as lymph nodes, draining excess fluid and waste products into lymphatic vessels in the dura mater of the optic nerve and the ciliary body, respectively, via intravitreal canals.
APA, Harvard, Vancouver, ISO, and other styles
32

Khoa, Tran Anh, Le Mai Bao Nhu, Hoang Hai Son, et al. "Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–18. http://dx.doi.org/10.1155/2020/8896637.

Full text
Abstract:
Smart homes are an element of developing smart cities. In recent years, countries around the world have spared no effort in promoting smart cities. Smart homes are an interesting technological advancement that can make people’s lives much more convenient. The development of smart homes involves multiple technological aspects, which include big data, mobile networks, cloud computing, Internet of Things, and even artificial intelligence. Digital information is the main component of signal control and flow in a smart home, while information security is another important aspect. In the event of equipment failure, the task of safeguarding the system’s information is of the utmost importance. Since smart homes are automatically controlled, the problem of mobile network security must be taken seriously. To address these issues, this paper focuses on information security, big data, mobile networks, cloud computing, and the Internet of Things. Security efficiency can be enhanced by using a Secure Hash Algorithm 256 (SHA-256), which is an authentication mechanism that, with the help of the user, can authenticate each interaction of a given device with a WebServer by using an encrypted username, password, and token. This framework could be used for an automated burglar alarm system, guest attendance monitoring, and light switches, all of which are easily integrated with any smart city base. In this way, IoT solutions can allow real-time monitoring and connection with central systems for automated burglar alarms. The monitoring framework is developed on the strength of the web application to obtain real-time display, storage, and warning functions for local or remote monitoring control. The monitoring system is stable and reliable when applying SHA-256.
APA, Harvard, Vancouver, ISO, and other styles
33

Popchev, Ivan P., and Daniela A. Orozova. "Towards Big Data Analytics in the e-Learning Space." Cybernetics and Information Technologies 19, no. 3 (2019): 16–24. http://dx.doi.org/10.2478/cait-2019-0023.

Full text
Abstract:
Abstract The issues related to the analysis and management of Big Data, aspects of the security, stability and quality of the data, represent a new research, and engineering challenge. In the present paper, techniques for Big Data storage, search, analysis and management in the area of the virtual e-Learning space and the problems in front of them are considered. A numerical example for explorative analysis of data about the students from Burgas Free University is applied, using instrument for Data Mining of Orange. The analysis is a base for a system for localization of students at risk.
APA, Harvard, Vancouver, ISO, and other styles
34

Liang, Wen-Tzong, Jian-Cheng Lee, Kate Huihsuan Chen, and Nai-Chi Hsiao. "Citizen Earthquake Science in Taiwan: From Science to Hazard Mitigation." Journal of Disaster Research 12, no. 6 (2017): 1174–81. http://dx.doi.org/10.20965/jdr.2017.p1174.

Full text
Abstract:
Taiwan is located at the convergent plate boundary between the Eurasian and the Philippine Sea plates. As a result, intense earthquake activity and associated surface deformation are manifesting in this region. To implement and promote citizen earthquake science in Taiwan, we have developed several web-based platforms with multi-purpose themes, such as earthquake science information, popular science education, and crowdsourcing systems. First, with the rapid earthquake report issued from the Taiwan Central Weather Bureau (CWB), the available near real-time scientific results obtained from the Taiwanese seismology community are collected and published to a platform, the Taiwan Earthquake Science Information System (TESIS). The scientific information archived at TESIS includes CWB earthquake reports, focal mechanisms, shake maps, and finite source models (for strong earthquakes). All real-time results are integrated into a GIS system with background geospatial information, such as geological maps, traces of active faults, background seismicity, and inter-seismic GPS velocity fields. Second, by collaborating with Stanford University to maintain a regional Quake-Catcher Network (QCN) server in Taiwan, we have promoted citizen seismology in Asia by bringing earthquake information and scientific knowledge to the public. More than 200 school teachers have already installed the QCN sensors in Internet-enabled computers. Through two web-based educational platforms, users are able to access the guidelines and further interact with the recorded waveforms. Third, we also developed an earthquake damage reporting system – the Taiwan Scientific Earthquake Reporting (TSER) system – to encourage the citizen to collect field observation for significant earthquake-induced ground damages such as surface fault rupture, landslide, rock fall, liquefaction, and landslide-triggered dam or lake. The TSER system is constructed under the Ushahidi mapping platform, which has been widely used in crowdsourcing for the geospatial archiving of events. Trained high school teachers and public volunteers can send their ground damage observations, including photographs, through the TSER system. Most of these products and online systems are now being operated by the Taiwan Earthquake Research Center (TEC). With these newly developed platforms and materials, we aim to not only raise earthquake awareness and preparedness, but also encourage public participation in earthquake science in Taiwan.
APA, Harvard, Vancouver, ISO, and other styles
35

Petti, Samantha, and Abraham Flaxman. "Differential privacy in the 2020 US census: what will it do? Quantifying the accuracy/privacy tradeoff." Gates Open Research 3 (December 4, 2019): 1722. http://dx.doi.org/10.12688/gatesopenres.13089.1.

Full text
Abstract:
Background: The 2020 US Census will use a novel approach to disclosure avoidance to protect respondents’ data, called TopDown. This TopDown algorithm was applied to the 2018 end-to-end (E2E) test of the decennial census. The computer code used for this test as well as accompanying exposition has recently been released publicly by the Census Bureau. Methods: We used the available code and data to better understand the error introduced by the E2E disclosure avoidance system when Census Bureau applied it to 1940 census data and we developed an empirical measure of privacy loss to compare the error and privacy of the new approach to that of a simple-random-sampling approach to protecting privacy. Results: We found that the empirical privacy loss of TopDown is substantially smaller than the theoretical guarantee for all privacy loss budgets we examined. When run on the 1940 census data, TopDown with a privacy budget of 1.0 was similar in error and privacy loss to that of a simple random sample of 50% of the US population. When run with a privacy budget of 4.0, it was similar in error and privacy loss of a 90% sample. Conclusions: This work fits into the beginning of a discussion on how to best balance privacy and accuracy in decennial census data collection, and there is a need for continued discussion.
APA, Harvard, Vancouver, ISO, and other styles
36

Petti, Samantha, and Abraham Flaxman. "Differential privacy in the 2020 US census: what will it do? Quantifying the accuracy/privacy tradeoff." Gates Open Research 3 (April 6, 2020): 1722. http://dx.doi.org/10.12688/gatesopenres.13089.2.

Full text
Abstract:
Background: The 2020 US Census will use a novel approach to disclosure avoidance to protect respondents’ data, called TopDown. This TopDown algorithm was applied to the 2018 end-to-end (E2E) test of the decennial census. The computer code used for this test as well as accompanying exposition has recently been released publicly by the Census Bureau. Methods: We used the available code and data to better understand the error introduced by the E2E disclosure avoidance system when Census Bureau applied it to 1940 census data and we developed an empirical measure of privacy loss to compare the error and privacy of the new approach to that of a (non-differentially private) simple-random-sampling approach to protecting privacy. Results: We found that the empirical privacy loss of TopDown is substantially smaller than the theoretical guarantee for all privacy loss budgets we examined. When run on the 1940 census data, TopDown with a privacy budget of 1.0 was similar in error and privacy loss to that of a simple random sample of 50% of the US population. When run with a privacy budget of 4.0, it was similar in error and privacy loss of a 90% sample. Conclusions: This work fits into the beginning of a discussion on how to best balance privacy and accuracy in decennial census data collection, and there is a need for continued discussion.
APA, Harvard, Vancouver, ISO, and other styles
37

Deniz, I., and H. Ozener. "Estimation of strain accumulation of densification network in Northern Marmara Region, Turkey." Natural Hazards and Earth System Sciences 10, no. 10 (2010): 2135–43. http://dx.doi.org/10.5194/nhess-10-2135-2010.

Full text
Abstract:
Abstract. Strain analysis is one of the methods for the kinematic analysis of the repeated geodetic measurements. In order to derive strain accumulation in Marmara Region, different institutions carried out several Global Positioning System (GPS) campaigns in 1999 and 2006. The GPS campaigns were performed on the geodetic network which cover the provinces: Kirklareli, Tekirdag, Bursa, Bilecik and Adapazari. Then, the displacements of the network stations were estimated by means of analysing the GPS space geodetic measurements. For the assessment of the datum differences between 1999 and 2006 on the station coordinates, 3-D Helmert transformation was applied to the coordinates of each 1999 and 2006 datum. Then, a global test was introduced to determine the significant deformation which occurred in the geodetic GPS network. Strain accumulation with a finite element model was then computed. First, triangles were constructed for the whole network with the Delaunay method. Hereafter, strain parameters were calculated for each triangle. Maximum values of strain accumulation were found around the surroundings of Marmara Ereglisi and Izmit, whereas minimum values are around Istanbul.
APA, Harvard, Vancouver, ISO, and other styles
38

Chow, W. K. "Use of Computational Fluid Dynamics for Simulating Enclosure Fires." Journal of Fire Sciences 13, no. 4 (1995): 300–334. http://dx.doi.org/10.1177/073490419501300405.

Full text
Abstract:
This paper reports on comparing results on the fire environment predicted by using the technique of computational fluid dynamics (CFD) (or field modelling) on simulating an enclosure fire at the preflashover stage with those results reported experimentally in the literature. The theory behind this is to solve a system of partial differential equations describing conservation of mass, momentum and heat with the k-ε turbulence model. The computer pro gram PHOENICS is used as the simulation tool. By specifying the geometrical configurations of the enclosure and the location, size and thermal power of the fire source, it is possible to predict the fire-induced flow and temperature fields. The package can be executed in an IBM personal computer at or above 486 level. Experiments reported by Steckler et al. at the National Bureau of Stan dards, U.S.A. on a single fire chamber; Nakaya et al. at the Building Research Institute, Japan on a double room fire chamber; the corner fire plume by Tran and Janssens; the two-room fire experiment reported by Hagglund at the Na tional Defence Research Establishment (abbreviation: FOA), Sweden; and in the full-scale burning hall by Ingason and Olsson at the Swedish National Test ing and Research Institute (abbreviation: SP), Sweden are considered. Some of the results on the temperature and interface height of the smoke layer are com pared with the popular fire zone model CFAST.
APA, Harvard, Vancouver, ISO, and other styles
39

Siregar, Narumondang Bulan, and Silvana Fransisca Hutajulu. "The Influencing Factors on Decision Investment: Case Study on 5 Mining Firms in 5 Countries in South East Asia." Webology 18, Special Issue 03 (2021): 202–22. http://dx.doi.org/10.14704/web/v18si03/web18035.

Full text
Abstract:
This research aimed is to find out the factors influencing decision-making in mining firms listed in Indonesian Stock Exchange, Bursa Malaysia, the stock Exchange of Thailand, the Philippines Stock Exchange and Singapore Exchange from 2014 to 2018. This study employed multiple linear regression to examine independent variable influences such as cash flow, firm size, leverage and investment opportunities. Total asset growth is the metric used to calculate investment decision. Secondary data were retrieved by the audited Mining Corporation Report and Annual Reports from the Indonesian Stock Exchange, Bursa Malaysia, the Philippines Stock Exchange, the Singapore Exchange and the Stock Exchange of Thailand from 2014 to 2018 in web.idx.id, www.bursamalaysia.com.com, www.pse.com.ph, www.set.or.th and the www2.sgx.com/ The findings suggest that cash flow and firm size have a beneficial impact on investment decision-making, leverage has a detrimental influence on investment decision-making whereas acquisition incentives have little impact on investment decision-making.
APA, Harvard, Vancouver, ISO, and other styles
40

Gelinas, Ulric J. (Joe), and Janis L. Gogan. "Accountants and Emerging Technologies: A Case Study at the United States Department of the Treasury Bureau of Engraving and Printing." Journal of Information Systems 20, no. 2 (2006): 93–116. http://dx.doi.org/10.2308/jis.2006.20.2.93.

Full text
Abstract:
Based on an in-depth field study of a pilot test of an eProcurement system, this paper introduces the topic of accountants' roles in emerging technology assessments, and presents a teaching case for use in an accounting information systems class. The United States Department of the Treasury Bureau of Engraving and Printing (BEP) was one of three federal agencies participating in the test, which was sponsored by the Treasury's Financial Management Service (FMS). In May 2004 the liaison at BEP reviewed the key accomplishments and challenges in the pilot test, including the reactions of participating suppliers, and considered whether to sign on to participate in another pilot test. The teaching case examines accountants' participation in several aspects of the pilot test. We then discuss the implications for practitioners, and offer suggestions for further research on accountants and emerging information technologies.
APA, Harvard, Vancouver, ISO, and other styles
41

Popchev, Ivan P., and Daniela A. Orozova. "Towards a Multistep Method for Assessment in e-Learning of Emerging Technologies." Cybernetics and Information Technologies 20, no. 3 (2020): 116–29. http://dx.doi.org/10.2478/cait-2020-0032.

Full text
Abstract:
AbstractIn the Fourth Industrial Revolution some important leading technologies are identified as emerging technologies with unknown in advance potential risks. Emphasized is the need for new approaches and solutions for forming of increased information awareness, knowledge and competencies in the present and future generations to use the possibilities of Industry 4.0 for technological breakthroughs. A method for evaluation and prognosis of the knowledge, skills and competencies of the students in the virtual education space is proposed in the form of a five-step process. The method can be adapted to new technologies and applications. Research and analysis of the method are carried out in the academic course ‘Artificial Intelligence’ at the Burgas Free University with the application of the instruments of the Orange system for experimentation and inference.
APA, Harvard, Vancouver, ISO, and other styles
42

Sun, C., S. Choy, Z. Chua, I. Aitkenhead, and Y. Kuleshov. "GEOGRAPHIC INFORMATION SYSTEM FOR DROUGHT RISK MAPPING IN AUSTRALIA – DROUGHT RISK ANALYSER WEB APP." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-3/W1-2020 (November 18, 2020): 139–44. http://dx.doi.org/10.5194/isprs-archives-xliv-3-w1-2020-139-2020.

Full text
Abstract:
Abstract. Australia frequently experiences extended periods of severe droughts which have a significant negative impact on populations and economy. To improve preparedness for drought, decision-support tools which provide comprehensive information about current dry conditions are essential. In this paper, we present a conceptual design for a Drought Risk Analyser (DRA) – web-based information App for drought risk mapping developed using geographic information system (GIS). The developed DRA is based on combining Drought Hazard/Vulnerability/Exposure Indices (DHI, DVI and DEI respectively) into a final Drought Risk Index (DRI) for total of 542 Local Government Areas (LGA) in Australia. Drought indicators selected to compute drought hazard – the Standardised Precipitation Index (SPI), the Vegetation Health Index (VHI) and Soil Moisture – were obtained through the World Meteorological Organization (WMO) Space-based Weather and Climate Extremes Monitoring (SWCEM) international initiative. Australian Bureau of Statistics (ABS) census data were used to develop the drought-related population vulnerability index – DVI. Australian national Digital Elevation Model and catchment scale land use data were used to calculate the DEI. Implemented functionality of the designed DRA is illustrated using a case study for the 2019 drought in Australia. The DRA App will be beneficial for Australian farmers and rural communities to assist with decision making, as well as for LGA planners to gain insights on current state of drought risk at both local and national levels. The developed methodology of using space-based observations for assessing drought hazard could be applied for developing similar web-based information tools in drought-prone areas of other countries.
APA, Harvard, Vancouver, ISO, and other styles
43

Larin, A. A., M. V. Gutnyk, S. S. Tkachenko, and S. O. Horielova. "The contribution of Kharkiv enterprises to the rocket and space industry development." Kosmìčna nauka ì tehnologìâ 27, no. 4 (2021): 83–90. http://dx.doi.org/10.15407/knit2021.04.083.

Full text
Abstract:
The article reviews the contribution of Ukrainian enterprises to the development of the rocket and space industry. The most important part of a space or combat ballistic missile is the control system (CS), on which the success of its application depends. Kharkov (Kharkiv) enterprises – the “Kommunar” plant and the Design Bureau “Electropriborostroenia” (SDB-692, now the RPA “Khartron”) were the largest manufacturers of control systems not only in Ukraine but throughout the Soviet Union. These systems were not only produced serially but also developed at these enterprises. The formation and development of Kharkov enterprises of the space industry is the most important page in the history of the development of not only cosmonautics but also science and technology. Despite the large number of works devoted to the development of rocket and space technology in Ukraine, the history of the development and production of control systems has not been sufficiently studied. Due to the secrecy of work in the field of rocket and space technology (RST), there are very few sources for studying the history of its creation. Therefore, the most important part of the work was interviewing the leading experts of SDB-692 in the field of the rocket and spacecraft control systems, which included A. M. Kalnoguz, Yu. A. Kuznetsov, V. Ya. Makarenko, V. G. Sukhorebrov and V. A. Uralov. Based on these interviews, a special fund was created in the Central State Scientific and Technical Archive of Ukraine. Control systems for many combat ballistic missiles, including P-7, P-7A, P-12, P-16, as well as the most powerful missile in the world P-36M2, which was named in the USA “Satana” (SS-18 “Satan”), “Proton”, “Zenith”, “Energia”, and “Cyclone” launch vehicles, “Kvant”, “Kvant-2”, “Crystal”, “Priroda”, “Spectrum” orbital modules, more than 150 satellites of the “Cosmos” series, and other objects were developed and serially produced at Kharkov enterprises. In the 1970s, SDB-692 created the USSR’s first onboard digital electronic computer. On its basis, a test and launch complex “Electronic launch” was developed, designed for pre-launch testing of control systems for ballistic missiles and launch vehicles.
APA, Harvard, Vancouver, ISO, and other styles
44

Shen, Wenjing. "Book Reviews." INFORMS Journal on Applied Analytics 51, no. 4 (2021): 325–28. http://dx.doi.org/10.1287/inte.2021.1085.

Full text
Abstract:
In Book Reviews, we review an extensive and diverse range of books. They cover theory and applications in operations research, statistics, management science, econometrics, mathematics, computers, and information systems. In addition, we include books in other fields that emphasize technical applications. The editor will be pleased to receive an email from those willing to review a book, with an indication of specific areas of interest. If you are aware of a specific book that you would like to review, or that you think should be reviewed, please contact the editor. The following books are reviewed in this issue of INFORMS Journal on Applied Analytics, 51(4), July–August: Applications of Operations Research and Management Science for Military Decision Making, William P. Fox, Robert Burks; Behavioral Operational Research: A Capabilities Approach, Leroy White, Martin Kunc, Katharina Burger, Jonathan Malpass.
APA, Harvard, Vancouver, ISO, and other styles
45

Gambis, D. "Long-term Earth Orientation Monitoring Using Various Techniques." International Astronomical Union Colloquium 178 (2000): 337–44. http://dx.doi.org/10.1017/s0252921100061467.

Full text
Abstract:
AbstractA continuous composite series of polar motion components extending from 1846 until now called EOP (IERS) C01 is available at the Earth Orientation Section of the Central Bureau of the IERS. This series is the basis of the IERS system. It relies on different series derived from optical astrometry until 1972 and geodetic techniques since. It is given at 0.1 year intervals (1846–1889) and 0.05 year intervals (1890-now). Its accuracy has dramatically improved from 100 mas in 1846 to about 0.2 mas at present.Now the IERS combined solutions involve mainly the contributions of VLBI, GPS and SLR techniques. It is regularly recomputed to take advantage of the improvement of the various recent individual contributions and of the refinement of the analyses procedures.The objective of this paper is to describe this long-term polar motion series and to present the evolution and the state of the art of the multi-technique EOP combined solutions and the predictions regularly computed at the IERS/CB.
APA, Harvard, Vancouver, ISO, and other styles
46

Khan, Zahid, Muhammad Zahid Khan, Sikandar Ali, et al. "Internet of Things-Based Smart Farming Monitoring System for Bolting Reduction in Onion Farms." Scientific Programming 2021 (July 23, 2021): 1–15. http://dx.doi.org/10.1155/2021/7101983.

Full text
Abstract:
According to the Pakistan Bureau of Statistics, Pakistan is amongst the top ten onion-producing countries in the world. Though in Pakistan, most of the districts of Khyber Pakhtunkhwa produce onions, Malakand division lonely contributes 60% of the total onion production of the country. In onion farming, bolting is an insidious phenomenon that occurs in onion plants due to fluctuations in environmental factors such as temperature, humidity, and light intensity. Due to bolting, the flowering stem of an onion plant is produced before the crop is harvested, resulting in a poor-quality harvest and yield. Therefore, from a farmer’s perspective, it is highly desirable to monitor and control the environmental factors to avoid bolting. In this paper, we propose and design a new prototype, namely, a smart farming monitoring system (SFMS) for bolting reduction, which is based on the generic three-layered IoT architecture. By using IoT (Internet of things) technology and careful remote monitoring, a more favorable environment can be provided to reduce and avoid onion bolting. To analyze the efficacy and performance of the proposed SFMS, a real test-bed implementation was carried out. The SFMS prototype was installed both in the open and in a greenhouse environment to monitor onion crops. Based on the data received via sensors, the percentage of onion bolting was recorded as 16.7% in the open environment while 3% in the closed environment. In the closed environment, optimal temperature, humidity, and light intensity were provided to the onion crops using the SFMS. For this reason, the percentage of onion bolting was reduced from 16.7% to 3%, consequently yielding better onion production. Moreover, the SFMS is a low-cost, easy-to-install solution that is developed with locally available hardware and resources, and we believe that this new solution can transform conventional onion farming into a more productive and convenient smart farming in the region.
APA, Harvard, Vancouver, ISO, and other styles
47

Petrycova, Valentyna. "UKRAINE IS IN THE WORLD OF INFORMATION COMMUNITY: THE ORIGINS OF THE NATIONAL SCHOOL OF COMPUTER SCIENCE." Almanac of Ukrainian Studies, no. 22 (2017): 125–31. http://dx.doi.org/10.17721/2520-2626/2017.22.21.

Full text
Abstract:
The article presents the problem of studying the origins of the theory and practice of information in Ukraine at the beginning of the 20th century. The hypothesis concerning the orientation of the national, mainly socio-humanitarian science, to the summing up of the accumulated knowledge in the historical time of the state creation of the Ukrainian nation is formulated. The views of the leading figures of the Ukrainian science on the tasks of the first weight in the scientific work on the creation of various types and sources of information (bibliographic) sources are outlined. The activities of the Ukrainian Academy of Sciences (UAN) in the period of its organizational structuring of 1918-1932 years are described separately along the way of creation of the information base on the national science "Ukrainian bibliographic repertoire". The attention was paid to the administrative activities of the UAN on the structuring of scientific institutes, committees of commissions, bureau and their functions of bibliographic summarization of the thematic and branch directions of Ukrainian science. The peculiarities of the bibliographic strategy of the Ukrainian Academy of Sciences as revealed by the national versus the information strategy of the USA in the direction of communication technologies of the 1930s were revealed. The presented facts of the historical context concerning the first germs of the organization of system bibliographic activity in Ukraine allow the creation of original, socio-humanitarian knowledge regarding the formation of a national school of computer science in Ukraine, led by academician V. Glushkov in the second half of the twentieth century. The prospect of such a scientific vision of the history of computer science in Ukraine is due to modern research in the field of information philosophy.
APA, Harvard, Vancouver, ISO, and other styles
48

Qian, Qianyanhui, and Wenqi Liu. "Quality Credit Supervision Research Based on Minimum Dataset." International Journal of Fuzzy System Applications 5, no. 2 (2016): 64–73. http://dx.doi.org/10.4018/ijfsa.2016040105.

Full text
Abstract:
As a social management and public service sector, it is convenient for the government to collect and use data, and hence business data become the origin of the big data of government. In order to improve the scientific level of government supervision and management, it is necessary to strengthen the scientific arrangement by using the existing service data. This paper takes a successful example of implementation of e-government, which is “basic quality and technical supervision and management information system” using by bureau of quality and technical supervision in Kunming. After obtaining the quality information from the original public database, this paper used the thinking model which combining the quality credit information and the minimum dataset, then choosing candidate factors with importance rating from minimum dataset by using R language and random forest algorithm. At last, forming and analyzing the minimum dataset of enterprise quality credit supervision through logical argument.
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.

Full text
Abstract:
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. To fill this job shortage we need a workforce with strong hands-on experience in the latest technologies and software tools to catch up with the rapid evolution of network technologies. It is vital that the IT professionals possess up-to-date technical skills and think and act one step ahead of the cyber criminals who are constantly probing and exploring system vulnerabilities. There is no perfect security mechanism that can defeat all the cyber-attacks; the traditional defensive security mechanism will eventually fail to the pervasive zero-day attacks. However, there are steps to follow to reduce an organization’s vulnerability to cyber-attacks and to mitigate damages. Active security tests of the network from a cyber-criminal’s perspective can identify system vulnerabilities that may lead to future breaches. “If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. But if you know the enemy and know yourself, you need not fear the result of hundred battles” (Sun, 2013). Penetration testing is a discipline within cybersecurity that focuses on identifying and exploiting the vulnerabilities of a network, eventually obtaining access to the critical business information. The pentesters, the security professionals who perform penetration testing, or ethical hackers, break the triad of information security - Confidentiality, Integrity, and Accountability (CIA) - as if they were a cyber-criminal. The purpose of ethical hacking or penetration testing is to know what the “enemy” can do and then generate a report for the management team to aid in strengthening the system, never to cause any real damages. This paper introduces the development of a penetration testing curriculum as a core class in an undergraduate cybersecurity track in Information Technology. The teaching modules are developed based on the professional penetration testing life cycle. The concepts taught in the class are enforced by hands-on lab exercises. This paper also shares the resources that are available to institutions looking for teaching materials and grant opportunities to support efforts when creating a similar curriculum in cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
50

Стахов, Алексей Петрович. "МОЙ ПУТЬ В БОЛЬШУЮ НАУКУ". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 2 (21 червня 2019): 6–17. http://dx.doi.org/10.32620/reks.2019.2.01.

Full text
Abstract:
The article is a summary of Alexey Stakhov scientific way, who in 1961 graduated from Radio Engineering Faculty Kharkiv Aviation Institute with honors and became the first graduate of the faculty who in 1972, at the age of 32, defended his doctoral thesis on the specialty “computer engineering” and in 1974 received academic title of professor in the department of information-measuring systems (Taganrog Radio Engineering Institute).From 1961 to 1963 he worked as an engineer at the famous space company “Design Bureau of Electrical Instrument Engineering” (now the firm “Khartron”). From 1963 to 1966 he studied in the graduate school of the Technical Cybernetics Department of the Kharkiv Institute of Radio Electronics under the supervision of Professor Alexander A. Volkov.In 1971, in connection with the completion of his doctoral thesis, Alexey Stakhov was elected to the post of the Head of Information-Measuring Technology Department of Taganrog Radio Engineering Institute (1971-1977).Alexey Stakhov became the first Soviet professor who in early 1976 was selected by the USSR Ministry of Education for a 2-month work at Vienna Technical University.At the final stage of his stay in Austria, A. P. Stakhov delivered the extensive lecture “Algorithmic Measurement Theory and the Foundations of Computer Arithmetic” at the joint meeting of Computer and Cybernetic Societies of Austria. With this lecture, international recognition of the Stakhov’s scientific direction began.The USSR Ambassador to Austria, Mikhail Efremov, sent the extensive letter to the USSR State Committee on Science and Technology with a proposal to patent Prof. Stakhov’s inventions abroad. The results of the patenting exceeded all expectations. The 65 patents, granted by the patent offices of the USA, Japan, England, France, Germany, Canada, and other countries protect the priority of the scientific direction, created by A.P. Stakhov.In more detail with the scientific achievements of Prof. A.P. Stakhov can be found by reading his biographical article in English Wikipedia https://en.wikipedia.org/wiki/Alexey_Stakhov and its page in google citation https://scholar.google.com.ua/citations?user=oDcIzrUAAAAJ&hl=uk.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography