To see the other types of publications on this topic, follow the link: Seder Service.

Journal articles on the topic 'Seder Service'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Seder Service.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Marcus, Joel. "Passover and Last Supper Revisited." New Testament Studies 59, no. 3 (2013): 303–24. http://dx.doi.org/10.1017/s0028688513000076.

Full text
Abstract:
Although Jesus' Last Supper probably took place on the night before Passover (as in John) rather than on the first night of Passover itself (as in the Synoptics), it contained elements strongly marked by the Jewish institution of the Passover seder (fixed order of service) and haggadah (ritual retelling of the exodus events). These elements were not, as some scholars of Judaism have recently argued, post-70 CE developments. Rather, evidence fromJubilees, Philo, and the NT itself indicates that seder and haggadah already existed in some form in the pre-70 period.
APA, Harvard, Vancouver, ISO, and other styles
2

McKinnon, James W. "The fourth-century origin of the gradual." Early Music History 7 (October 1987): 91–106. http://dx.doi.org/10.1017/s0261127900000553.

Full text
Abstract:
The conventional view on the origin of the gradual was stated succinctly by Peter Wagner: ‘The Responsorial solo in the mass is of apostolic origin…in imitation of the Jewish liturgy a solo from the psalmist was inserted between the readings.’ The precise form this view has taken more recently in the works of both musical and liturgical historians can be summarised as follows. The early Mass or Eucharist consisted of two major parts. The essential part, the Eucharist proper, had its origins in the Last Supper, a Jewish ceremonial meal, possibly the Passover Seder. This was preceded by a ‘service of the Word’, made up of four elements: scripture reading, discourse on the reading, congregational prayer and psalms sung in response to the readings. This pre-eucharistic service was plainly and simply an adoption en bloc of the ancient synagogue service.
APA, Harvard, Vancouver, ISO, and other styles
3

Samanta, S. K., A. Achilleos, S. Moiron, J. Woods, and M. Ghanbari. "Automatic Language Translation for Mobile SMS." International Journal of Information Communication Technologies and Human Development 2, no. 1 (2010): 43–58. http://dx.doi.org/10.4018/jicthd.2010010103.

Full text
Abstract:
In any form of communication it is vital that both parties can understand the same language, if they cannot a translator is required. Currently mobile users engage the service of a third party provider to translate an SMS text into a different language. The existing services have a number of drawbacks e.g. high cost to the user, not user friendly, they reduce the message space, and are inefficient. To communicate with a foreign person the sender must know the recipients preferred language and device display capability. What is needed is a service where a sender can send message in their native language without regard for the target tongue. We show that a mobile operator can provide a transparent service where the text message is automatically converted to the recipients preferred language. In comparison to the existing system, our implementation is efficient and cost effective and has large implications for commerce, language learning and person-to-person communication. A large number of services such as health care management, education, emergency notification, news, weather, and traffic reports and commerce applications can be delivered to vast mobile populations who are not able to enjoy the benefit of these services due to language barriers.
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Yao Qin. "Research on Security Architecture Based on Web Service System." Applied Mechanics and Materials 687-691 (November 2014): 1716–19. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1716.

Full text
Abstract:
Web service is a distributed Web application model, with platform independence, openness, loose coupling and other features. These features bring convenience to application integration, which also faces many security issues, mainly for computer hardware, applications, buffer overflows, message transmission process and other security threats. XML Web services architecture strengthen the security threats defense through digital signatures, encryption, and a series of measures of WS-Security by the sender, the receiver, the key server and assertion server which consist of SOAP security with characteristics like integrity, confidentiality, etc., effectively guaranteeing the safe operation of the Web services architecture.
APA, Harvard, Vancouver, ISO, and other styles
5

Miah, MA Monayem, and M. Enamul Haque. "Farm level impact study of power tiller operated seeder on service providers’ livelihood in some selected sites of Bangladesh." Bangladesh Journal of Agricultural Research 40, no. 4 (2016): 669–82. http://dx.doi.org/10.3329/bjar.v40i4.26941.

Full text
Abstract:
The custom hiring of power tiller operated seeder (PTOS) is highly profitable at farm level and service providers could improve their livelihood through this machine. The data and information on these aspects are scarce in Bangladesh. Therefore, an attempt was made to conduct this study to assess the uses pattern and the impacts of PTOS operations on service providers’ livelihood. A total of 53 service providers were randomly selected and interviewed for this study from Dinajpur and Rajbari districts. The study revealed that most respondents provided PTOS services almost throughout the year. The custom hiring of PTOS created many positive impacts on the livelihoods of the service providers. PTOS made a remarkable improvement in the livelihoods of its service providers in the study areas. The respondent service providers experienced a considerable increase in their land holdings (8.6%), annual income (63.4%), livestock resources (44%), farm equipment (20%), household assets position, and dwelling houses (42%). The increased income of beneficiaries are mostly spent on farm machinery, nutritious food, cloths, health care, education, and making of houses that indicate higher standard of riding to some extent, compared to pre PTOS service period. The service providers faced some problems like higher fuel cost, lack of riving facility, non-availability and higher price of spare parts, roller jam, and lack of trained driver. Financial support and technical assistance regarding PTOS should be made available by the government for service providers and local manufacturers for the higher adoption of PTOS in Bangladesh.Bangladesh J. Agril. Res. 40(4): 669-682, December 2015
APA, Harvard, Vancouver, ISO, and other styles
6

Pateiro-Rodriguez, Carlos, Javier Prado-Domínguez, Jesús Manuel García-Iglesias, and José Manuel Barreiro-Viñán. "Switching costs in the European postal service. Are there any solutions?" European Journal of Government and Economics 5, no. 2 (2017): 104. http://dx.doi.org/10.17979/ejge.2016.5.2.4319.

Full text
Abstract:
This article examines the costs of switching that may exist in the European postal sector, where it is carried out an ambitious process of opening to competition since 1997. Inadequate regulation of the access to some elements of postal infrastructure or services within the scope of the universal postal service exists. This article proposes adaptations to ensure transparent and non-discriminatory access conditions to elements of postal infrastructure in line with the sectorial directives aimed at strengthening competition in the long term in the postal market. The proposed adaptations focus on services such as postcode systems, address databases, post office boxes, delivery boxes, re-direction and return to sender services. All of them can help reduce the switching cost and thus strengthen competition.
APA, Harvard, Vancouver, ISO, and other styles
7

Millar, Morgan M., Hilary A. Hewes, Andrea L. Genovesi, et al. "The Effect of the Familiarity of a Survey Sender on Response Outcomes in a Large-Scale Survey of Emergency Medical Services Agencies." Evaluation & the Health Professions 44, no. 3 (2021): 260–67. http://dx.doi.org/10.1177/01632787211030635.

Full text
Abstract:
Survey response is higher when the request comes from a familiar entity compared to an unknown sender. Little is known about how sender influences response to surveys of organizations. We assessed whether familiarity of the sender influences response outcomes in a survey of emergency medical services agencies. Emergency medical services agencies in one U.S. state were randomly assigned to receive survey emails from either a familiar or unfamiliar sender. Both deployment approaches were subsequently used nationwide, with each state selecting one of the two contact methods. Experimental results showed that requests from the familiar sender achieved higher survey response (54.3%) compared to requests from the unfamiliar sender (36.9%; OR: 2.03; 95% CI: 1.23, 3.33). Similar results were observed in the subsequent nationwide survey; in states where the familiar sender deployed the survey, 62.0% of agencies responded, compared to 51.0% when the survey was sent by the unfamiliar sender (OR: 1.57; 95% CI: 1.47, 1.67). The response difference resulted in nearly 60 additional hours of staff time needed to perform telephone follow-up to nonrespondents. When surveying healthcare organizations, surveyors should recognize that it is more challenging to obtain responses without a pre-established relationship with the organizations.
APA, Harvard, Vancouver, ISO, and other styles
8

Kannan, Lucky, and Jebakumar R. "Public Sender Score System (S3) by ESPs for Email Spam Mitigation with Score Management in Mobile Application." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 17 (2020): 204. http://dx.doi.org/10.3991/ijim.v14i17.16609.

Full text
Abstract:
Many businesses use email as a medium for advertising and they use emails to communicate with their customers. In the email world, the most common issue that remains unresolved even now is spamming or in other terms unsolicited bulk email. Currently, there is no common way to regulate the practices of an email sender. This proposed system is to formulate a protocol common for all the ESPs or inbox providers and a centralized system that will easily find the spammers and block them. By this method, the Email Service Providers (ESPs) or Inbox Providers need not wait for the sender behaviour and then take actions on the sender or sender domain or sender IP address. Instead, they can get the sender history of reputation from blockchain where the ESPs or Inbox Provider provides a score based on the emails they have received from the sender. The ESPs can get the Public Sender Score(S3) from the mobile application or web application which provides the score management user interface and APIs. The email marketers can also monitor their score through the application.
APA, Harvard, Vancouver, ISO, and other styles
9

Antoro, Agus Dwi. "ANALISIS KUALITAS PELAYANAN DAN FASILITAS TERHADAP KEPUTUSAN PEMBELIAN (Studi Kasus Pada Soto Seger Mbok Giyem Di Boyolali)." EKOBIS : Jurnal Ilmu Manajemen dan Akuntansi 7, no. 2 (2020): 38–42. http://dx.doi.org/10.36596/ekobis.v7i2.142.

Full text
Abstract:
The development of business today is experiencing a very rapid growth. The developments are very significant and have a pretty good prospect. So such conditions make competition increasingly competitive especially in the field of culinary. Research was conducted to test the effect of quality of service and facilities to the purchase decision of Soto Seger Mbok Giyem in Boyolali. Accidental sampling technique with sample research samples 100. Multiple linear regression methods. The results of the research of quality of service and facilities simultaneously effect positive and significant against the purchase decision, quality of service and facilities to the decision of each of the influential positive and significant decisions Purchase. The decision to purchase Soto Seger Mbok Giyem in Boyolali can be explained by 38.5%, while the remaining 61.5% is explained by other variables.
 
 Keywords: purchasing decisions, quality of service, facilities
APA, Harvard, Vancouver, ISO, and other styles
10

Jin, Chunhua, Ge Kan, Guanhua Chen, Changhui Yu, Ying Jin, and Chengjie Xu. "Heterogeneous deniable authenticated encryption for location-based services." PLOS ONE 16, no. 1 (2021): e0244978. http://dx.doi.org/10.1371/journal.pone.0244978.

Full text
Abstract:
The location-based services can provide users with the requested location information. But users also need to disclose their current location to the location-based service provider. Therefore, how to protect user’s location privacy is a major concern. In this paper, we propose a heterogeneous deniable authenticated encryption scheme called HDAE for location-based services. The proposed scheme permits a sender in a public key infrastructure environment to transmit a message to a receiver in an identity-based environment. Our design utilizes a hybrid encryption method combing the tag-key encapsulation mechanism (tag-KEM) and the data encapsulation mechanism (DEM), which is well adopted for location-based services applications. We give how to design an HDAE scheme utilizing a heterogeneous deniable authenticated tag-KEM (HDATK) and a DEM. We also construct an HDATK scheme and provide security proof in the random oracle model. Comprehensive analysis shows that our scheme is efficient and secure. In addition, we give an application of the HDAE to a location-based services system.
APA, Harvard, Vancouver, ISO, and other styles
11

Zhao, Chun Xi. "Design of Extended Event Service Model Based on CORBA." Applied Mechanics and Materials 644-650 (September 2014): 3069–72. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3069.

Full text
Abstract:
In a distributed system, the event service reflects the mechanism between the sender and the recipient of the asynchronous event or flexible group communication. Based on the analysis of the CORBA event service model, the model for the limitations that exist, on the basis of the original model were effectively extensions.
APA, Harvard, Vancouver, ISO, and other styles
12

Le, Tho V., and Satish V. Ukkusuri. "Influencing Factors That Determine the Usage of the Crowd-Shipping Services." Transportation Research Record: Journal of the Transportation Research Board 2673, no. 7 (2019): 550–66. http://dx.doi.org/10.1177/0361198119843098.

Full text
Abstract:
The objective of this study is to understand how senders choose shipping services for different products, given the availability of both emerging crowd-shipping ( CS) and traditional carriers in a logistics market. Using data collected from a United States (U.S.) survey, Random Utility Maximization (RUM) and Random Regret Minimization (RRM) models have been employed to reveal factors that influence the diversity of decisions made by senders. Shipping costs, along with additional real-time services such as courier reputations, tracking info, e-notifications, and customized delivery time and location, have been found to have remarkable impacts on senders’ choices. Interestingly, potential senders were willing to pay more to ship grocery items such as food, beverages, and medicines by CS services. Moreover, the real-time services have low elasticities, meaning that only a slight change in those services will lead to a change in sender behavior. Finally, data-science techniques were used to assess the performance of the RUM and RRM models and found to have similar accuracies. The findings from this research will help logistics firms address potential market segments, prepare service configurations to fulfill senders’ expectations, and develop effective business operations strategies.
APA, Harvard, Vancouver, ISO, and other styles
13

Popov, A. Yu, Noureldin Sharaby, V. V. Zhurba, and Е. А. Chaika. "Analysis of the preparation technology of a row seeder for work." E3S Web of Conferences 193 (2020): 01035. http://dx.doi.org/10.1051/e3sconf/202019301035.

Full text
Abstract:
The level of preparation of a row seeder for work and its adaptability to adjustments and settings affects the efficiency of sowing. Analysis of the designs of modern row seeders shows that after-sales service remains a reserve for improving the efficiency of their use, and, therefore, increasing the agricultural crop yields. However, the technologies for the preparation and adjustment row seeders remain poorly understood, and the search for ways to reduce the complexity of maintenance for sowing units is an urgent task. The aim of the study is to build a mathematical model of the technology for checking, adjusting and tuning a row seeder on the basis of graph theory, determining a way to reduce the complexity of servicing maintenance a row seeder in preparation for sowing and justifying a rational way of organizing the seeder setting. Taking into account a number of assumptions and initial conditions, a list of operations for adjusting and setting the seeder is developed. A digraph of a row seeder preparation technology is constructed, which displays the sequence and relationship of the operations of preparation, adjusting and sitting its nodes and mechanisms. The critical path with the greatest time spent on seeder maintenance is determined. The methods for reducing the complexity of maintenance of a row seeder were established and it is recommended that further modernization of the units and mechanisms of the seeder by indicators in terms of suitability for verification, adjustment and setup. The methods of preparing the seeder for work by one performer are considered. The influence of economic factors on the number of performers during maintenance of the seeder before sowing is shown.
APA, Harvard, Vancouver, ISO, and other styles
14

Mohd Aman, Azana Hafizah, Rosilah Hassan, Aisha-Hassan Abdalla Hashim, and Huda Adibah Mohd Ramli. "Investigation of Internet of Things Handover Process for Information Centric Networking and Proxy Mobile Internet Protocol." Mehran University Research Journal of Engineering and Technology 38, no. 4 (2019): 867–74. http://dx.doi.org/10.22581/muet1982.1904.01.

Full text
Abstract:
IoT (Internet of Things) technically connects billions of entities to the Internet. The IoT is divided between the technology and the service itself. As a result, great efforts are needed to join data from many contexts and services. This reason has motivated proposals to develop solutions that can overcome existing issues of limitations for mobility, security, reliability and scalability of IoT. These billions of devices are interconnected to each other either using unicast, multicast or broadcast communications, and mixture of static and mobile communications. This paper aims to investigate the parameters of mobility performance in handover process for mobile multicast IoT environment. Investigation is done quantitatively by evaluating the parameters of handover process for IoT in two networking protocols that are possible to support acceptable mobility performance for IoT. The protocols are ICN (Information Centric Networking) and Proxy Mobile Internet Protocol. The evaluation parameters include packet loss and service recovery time. The metrics are extracted from the handover process flow for each network protocol topology. The service recovery time parameter is assumed as the time duration for each message to travel from sender to receiver, while packet loss parameter depends on the packet arrival rate and service recovery time. The results show that the ICN performs better than Proxy Mobile Internet Protocol.
APA, Harvard, Vancouver, ISO, and other styles
15

Sundari, Wiwik. "Semiotika Iklan TIKI." Lensa: Kajian Kebahasaan, Kesusastraan, dan Budaya 2, no. 2 (2012): 116–26. http://dx.doi.org/10.26714/lensa.2.2.2012.116-126.

Full text
Abstract:
Semiotics is the study of sign. Sign can be word, gesture, traffic light, flag, and so on. One of the fields which is closely related to semiotics is advertising. Through advertisement, producers send messages for their product strength to consumers. Those messages are conveyed through advertisement, producers, send messages for their product strength to consumers. Those messages are conveyed through various kinds of signs either in the form of language, picture, caption, icon, index, or symbol. Advertisement is also a medium consisting of many kinds of signs. Those signs are used to reveal the strength of product which is eventually expected to be able to influence consumers to use the service. There is communicative exchange in Tiki advertisement between sender and receiver. Sender (advertisement conceptor/maker) of this advertisement makes good use of reward polluter style, that is, persuading consumers to try a service of Tiki. To draw consumers' interest to use the service, Tiki advertisement uses imperative sentences as well as praising words in its product.
APA, Harvard, Vancouver, ISO, and other styles
16

Kartika, Amalia Indah, Zulkarnain Lubis, and Faoeza Hafiz Saragih. "Analisis Faktor Yang Mempengaruhi Tingkat Partisipasi Anggota Koperasi (Studi Kasus: KPRI-SEDAR)." Jurnal Ilmiah Pertanian ( JIPERTA) 2, no. 2 (2020): 158–68. http://dx.doi.org/10.31289/jiperta.v2i2.359.

Full text
Abstract:
Member participation is the participation of members in exercising their rights and obligations mentally or emotionally to improve or maintain or achieve cooperative goals. This study aims to determine the effect of member participation on satisfaction, level of trust, business environment, service quality, and motivation of members. This research was conducted at the Cooperative of the Republic of Indonesia Employees Percut Sei Tuan. Sampling in this study uses a Simple Random Sampling method. The number of samples examined in this study is 40 samples of cooperative members. This study uses the method of Classical Assumption Test and Multiple Linear Regression. The results of this study indicate The coefficient of R² value of 0.454 can be interpreted that 45.5% participation of members can be influenced by these variables,and the results study indicate that there are significant variables of Member Satisfaction, and where other variables such as the level of trust, business environment, service quality and member motivation there are no adherence to level participation level variables of member at the Cooperative of the Republic of Indonesia Employees.
APA, Harvard, Vancouver, ISO, and other styles
17

Markowska, Katarzyna, and Michał Jamka. "Performing a road transport service on the example of a transportation and forwarding company." WUT Journal of Transportation Engineering 120 (March 1, 2018): 279–86. http://dx.doi.org/10.5604/01.3001.0014.4780.

Full text
Abstract:
Road transport is one of the most popular forms of traveling. In Poland it has a dominant role; however, there are initiatives for its gradual reduction. Performing a road transport service enables the transportation of freight directly from the sender to the receiver. Performing a road transport service consists in planning the route and suitable means of transport, checking the quality of the cargo, checking the time, delivering the cargo and handling financial matters. It is inherently linked to features of customer service, such as: time, cost, quality and suitable transport documentation.
APA, Harvard, Vancouver, ISO, and other styles
18

Kumar, V., P. Jayalekshmy, G. Patra, and R. Thangavelu. "On remote exploitation of TCP sender for low-rate flooding denial-of-service attack." IEEE Communications Letters 13, no. 1 (2009): 46–48. http://dx.doi.org/10.1109/lcomm.2009.081555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Blackberry, I., J. C. Farmer, C. Morley, et al. "EVALUATION OF SERVICE NAVIGATION AND NETWORKING FOR DEMENTIA CARE IN RURAL COMMUNITIES (SENDER) APP." Innovation in Aging 1, suppl_1 (2017): 1351–52. http://dx.doi.org/10.1093/geroni/igx004.4965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zhu, Hailing, and Khmaies Ouahada. "Investigating Random Linear Coding from a Pricing Perspective." Entropy 20, no. 8 (2018): 548. http://dx.doi.org/10.3390/e20080548.

Full text
Abstract:
In this paper, we study the implications of using a form of network coding known as Random Linear Coding (RLC) for unicast communications from an economic perspective by investigating a simple scenario, in which several network nodes, the users, download files from the Internet via another network node, the sender, and the receivers as users pay a certain price to the sender for this service. The mean packet delay for a transmission scheme with RLC is analyzed and applied into an optimal pricing model to characterize the optimal admission rate, price and revenue. The simulation results show that RLC achieves better performance in terms of both mean packet delay and revenue compared to the basic retransmission scheme.
APA, Harvard, Vancouver, ISO, and other styles
21

Lønsmann, Leif. "Public Service radio - fra monopol til niche." MedieKultur: Journal of media and communication research 7, no. 15 (1991): 9. http://dx.doi.org/10.7146/mediekultur.v7i15.879.

Full text
Abstract:
Radioen har nået pensionsalderen. I hvert fald hvis man måler med den målestok, man pensionerer mennesker efter. BBC rundede de 67 år i 1989, DR gør det i 1993. Men på trods af sin alder er radioen i live - i bevægelse og udvikling - på godt og ondt. Der findes i dag til flere radio- stationer end no- gensinde, der tilsammen sender mere radio end nogen- sinde til flere lyttere end nogensinde før i radioens historie. Radioen er det mest brugte massemedium i verden, målt i tidsforbrug. Artiklen skitserer de centrale problemer for den monopolradio, som nu er under forandring. Ikke alene er dens unikke status ophævet, men dens almene forpligtelser udtrykt i public-service princippet er også under revurdering. Hvordan bør politikere og DR reagere på den ny situation - hvordan skal public-service principperne forvaltes? Det er de centrale temaer for diskussion i den følgende artikel.
APA, Harvard, Vancouver, ISO, and other styles
22

Ceriani, Roberto. "Scientific education and European citizenship. Suggestions and results from the European project SEDEC." Journal of Science Communication 06, no. 03 (2007): C01. http://dx.doi.org/10.22323/2.06030301.

Full text
Abstract:
Two concepts seemingly distant from each other, scientific education and European citizenship, have been the basis for "SEDEC - Science Education for the Development of European Citizenship", a European project funded by the European Commission in the framework of the Socrates/Comenius programme, aiming at producing training material addressed to European teachers. Started in autumn 2005, the project will end in 2008 with an in-service training course for European teachers and educators.
APA, Harvard, Vancouver, ISO, and other styles
23

Dong, Wei. "Research and Design of a Short Message Services Management System for Mobile Devices." Applied Mechanics and Materials 543-547 (March 2014): 2884–87. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2884.

Full text
Abstract:
The last few years has seen a massive growth of applications for smart phone operating systems such as Android, IOS. Short message services (SMS) is one of them. Although SMS as an application has existed for a long time, the method for managing short messages is rather outdated and very inconvenient. The is partially because most of the SMS applications are inherited from old fashioned mobile platforms, in which users of mobile phone usually concentrate on basic phone service and demand less for SMS. With the introduction of smart phone operating system, the old-fashioned method of short messages management is not suitable. To cope with this problem, in this paper we first conduct research on modern ways of short messages management, and then a short message services management system for mobile devices is designed. In this new system, more advanced options, such as messages query by date, by sender and sending a message to many receivers at the same time, for short messages is provided. Moreover, to validate our research and design, we implement the system based on Android platform. And we conduct some experiments with this system and test results shows that our system works quite well. With the mobile Internet becoming increasingly important to life, our research is expected to improve work efficiency greatly.
APA, Harvard, Vancouver, ISO, and other styles
24

Afianti, Farah, Wirawan, and Titiek Suryani. "Dynamic Cipher Puzzle for Efficient Broadcast Authentication in Wireless Sensor Networks." Sensors 18, no. 11 (2018): 4021. http://dx.doi.org/10.3390/s18114021.

Full text
Abstract:
The use of signature-based broadcast authentication for code and data dissemination in wireless sensor networks (WSNs) cannot be avoided. It increases security but requires high computation. Adversaries can exploit the latter condition as an opportunity to send many false signatures. Filtering methods can overcome this vulnerability. Cipher Puzzle is a filtering method that has low storage overhead along with high security, especially against denial of service (DoS) attacks. However, its number of hash iterations cannot be bounded, which causes sender-side delay. This paper proposes a Dynamic Cipher Puzzle (DCP), which uses a threshold function to limit the number of hash iterations. Hence, time at the sender-side can be used more efficiently. Besides, its dynamic puzzle-strength increases the obscurity of the transmitted packet. Simulation and experimental results were analyzed with Arduino 2560. The theoretical results show that the quadratic function outperformed the compared methods. The scheme decreased sender-side delay by 94.6% with a guarantee of zero solution probability in 1.728 × 10 − 13 . The experimental results show that the consumption of resources at the sensor node increases with an acceptable value. Moreover, DCP increases the complexity for the attacker to implement probability and signature-based DoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
25

Logeswaran, Rajasvaran, and Li-Choo Chen. "Load Balancing Algorithms in Distributed Service Architectures for Medical Applications." International Journal of Healthcare Information Systems and Informatics 5, no. 1 (2010): 76–90. http://dx.doi.org/10.4018/jhisi.2010110305.

Full text
Abstract:
This paper investigates the performance of two proposed load balancing algorithms for Object-Oriented Distributed Service Architectures (DSA) that are open and flexible, enabling rapid and easy development of new applications on various kinds of software and hardware platforms, catering for telecommunications and distributed medical applications. The proposed algorithms, namely, Node Status Algorithm and Random Sender Initiated Algorithm, have been developed as solutions to the performance problems faced by the DSA. The performance of the proposed algorithms have been tested and compared with baseline load balancing algorithms, namely the Random Algorithm and Shortest Queue Algorithm. Simulation results show that both the proposed algorithms perform better than the baseline algorithms, especially in heavily loaded conditions. This paper discusses the mechanisms of the algorithms and reports on the investigations that have been carried out in comparing the load balancing algorithms implemented on a DSA-based network, which is useful for the distributed computing requirements of the medical field.
APA, Harvard, Vancouver, ISO, and other styles
26

Mahendra, Wayan Dony, I. Made Sukarsa, and AA Kt Agung Cahyawan. "Reminder and Online Booking Features at Android-Based Motorcycle Repair Shop Marketplace." Scientific Journal of Informatics 7, no. 1 (2020): 43–51. http://dx.doi.org/10.15294/sji.v7i1.22212.

Full text
Abstract:
Generally, vehicle service is a must for the vehicle owner. However, due to tight work routines, people often forget to service their vehicles. In addition, the service process is still using a manual system, such as taking a queue number which leads to the long queue of the service time. An Android-based Motorcycle Repair Shop Information System provides a solution to remind people to do a regular service on their vehicles with a reminder feature and make online bookings. The system development uses the SDLC (System Development Life Cycle) method. The implementation process requires an Android smartphone and a computer device by using MySQL as data storage, Firebase as a notification sender, React native and Visual Studio Code are used for developing the system. The results of the UAT test (user acceptance testing) from 20 users show 55,8% answered agree to the display, features and flow of the system, 39,5% answered strongly agree to the three question parameters, and 4,7% answered disagree with the flow and display of the system.
APA, Harvard, Vancouver, ISO, and other styles
27

Brenner, Christian. "Wie Cloud Services das traditionelle Radiogeschäft modernisieren können." MedienWirtschaft 18, no. 1 (2021): 58–65. http://dx.doi.org/10.15358/1613-0669-2021-1-58.

Full text
Abstract:
radio.cloud ist ein komplett neues technisches und operationelles Konzept zur Produktion von Radioprogrammen für UKW, DAB+ und Webradios. Insbesondere bei Radio Networks und Radio-Sendergruppen spielt radio.cloud seine maximale Effizenzsteigerung, Skalierbarkeit und Flexibilität durch Mehrfachnutzung von Inhalten und Moderationen aus. Wir interviewen in diesem Beitrag Christian Brenner, einen Medienunternehmer mit Schwerpunkt auf technischen Innovationen. Brenner baute u. a. die Firma Smart-Cast auf, die für Sender wie Disney, Fox oder Cartoon Network in vielen Ländern Asiens das lokalisierte Content-Management als Software-as-a-Service abgewickelt hat. SmartCast ist heute Teil des Satellitenkonzerns SES/Astra. Sein aktuelles Projekt ist die neue Plattform radio.cloud (in Bayern bekannt als BayCloudNet), die die Produktion und Kontribution für Radiosender über seine Firma NexCast technisch revolutioniert. Christian Brenner hat selbst auch mehrere Radio- und Fernsehsender aufgebaut, kennt also die Anforderungen seiner Kunden, die er heute als Dienstleister bedient.
APA, Harvard, Vancouver, ISO, and other styles
28

Berdimuratov, Parakhat, Bakhtiyar Shaymardanov, Dilshod Ruziyev, Abdulaziz Khujakulov, Irina Gorlova, and Ohunjon Usarov. "Seeder of exact seeding of seeds of cotton on the crest with drip irrigation." E3S Web of Conferences 264 (2021): 04044. http://dx.doi.org/10.1051/e3sconf/202126404044.

Full text
Abstract:
The research aims to develop a seed drill for precise seeding on a ridge with drip irrigation. The basic principles and methods of classical mechanics, mathematical analysis, and statistics were used in this study. The existing technologies of sowing cotton seeds are analyzed. The authors have developed a method of seeding the cotton on the crest with drip irrigation and drill for its implementation, including the working body for fertilizer, shaper gasket comb attached to him Coulter, sigortac for seeding, packer roller, device for laying irrigation hose, and sigortac for sealing hose soil. Combining the operations of sowing cotton seeds with the simultaneous formation of ridges, fertilizing, and drip irrigation helps to reduce labor costs and increase the yield of raw cotton. This reduces the consumption of irrigation water, simplifies the design of the irrigation hose, and increases its service life
APA, Harvard, Vancouver, ISO, and other styles
29

Lian, Shiguo. "Trust Issues and Solutions in Multimedia Content Distribution." International Journal of Dependable and Trustworthy Information Systems 1, no. 3 (2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010070103.

Full text
Abstract:
Multimedia content distribution is a key technique for multimedia services, which transmits multimedia content from a sender to certain receiver(s). With the popularity of multimedia services, the trust issues in content distribution becomes urgent, including the authorized access, privacy protection, trusted payment, piracy surveillance, and so forth. This chapter introduces the trust issues in multimedia content distribution (e.g., authorization, authentication, privacy, payment, ownership, illegal distribution, forgery, etc.), reviews the latest research progress of the solutions, and presents some open issues and promising research topics. It is expected to provide valuable information to researchers or engineers in this field.
APA, Harvard, Vancouver, ISO, and other styles
30

Ye, Jingjing, Liwei Liu, and Tao Jiang. "Analysis of a Single-Sever Queue with Disasters and Repairs Under Bernoulli Vacation Schedule." Journal of Systems Science and Information 4, no. 6 (2016): 547–59. http://dx.doi.org/10.21078/jssi-2016-547-13.

Full text
Abstract:
AbstractThis paper studies a single-sever queue with disasters and repairs, in which after each service completion the server may take a vacation with probabilityq(0≤q≤1), or begin to serve the next customer, if any, with probabilityp(= 1− q). The disaster only affects the system when the server is in operation, and once it occurs, all customers present are eliminated from the system. We obtain the stationary probability generating functions (PGFs) of the number of customers in the system by solving the balance equations of the system. Some performance measures such as the mean system length, the probability that the server is in different states, the rate at which disasters occur and the rate of initiations of busy period are determined. We also derive the sojourn time distribution and the mean sojourn time. In addition, some numerical examples are presented to show the effect of the parameters on the mean system length.
APA, Harvard, Vancouver, ISO, and other styles
31

Kim, Hyun-Joo, Soo-Yong Kang, and Heon-Y. Yeom. "Sever Selection Schemes Considering Node Status For a Fault-Tolerant Streaming Service on a Peer-to-Peer Network." Journal of Information Processing Systems 2, no. 1 (2006): 6–12. http://dx.doi.org/10.3745/jips.2006.2.1.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Achsanty, Yunita, Heru Abrianto, and Ninuk Wiliani. "Implementasi Metode Algoritma KVC Untuk Pengamanan Pesan." Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) 3 (July 26, 2018): 73. http://dx.doi.org/10.30645/jurasik.v3i0.62.

Full text
Abstract:
Communication through message media or sms, Sort Message Service is not a point to point message but that communication by sent through sms network and stored in database operator. Message security on the network is threatened be read by people who are not responsible or called intercept. Therefore it will be develop some application on the mobile phone to modify the message be come a ciphertext and the information content of the messageis not known by others. In this application, the system encrypts the message into ciphertext using the key entered by the sender and then it will be sends to the destination number. For accepting the message, system will decrypt chipertext become plaintext using key by sender, then the message can be read by receiver. This application can be used by some one who wants to sending the secret message and very important without fear if the information can read by others. This application uses vigenere cipher method. The main parameter is the key and the message itself.
APA, Harvard, Vancouver, ISO, and other styles
33

Bolmont, Etienne. "What is a scientist’s job? From the drawings to the citizenship." Journal of Science Communication 06, no. 03 (2007): C05. http://dx.doi.org/10.22323/2.06030305.

Full text
Abstract:
IUFM is a centre for the in-service training of teachers and the development of didactic research. IUFM contribution to the SEDEC project is essentially built on a reflexion on educational implications of the links between science and European citizenship. We are convinced that European citizenship may be developed in scientific activities in school, by the introduction of communication moments, where pupils have to express and defend their ideas, and also to understand and accept the others’ ones. We have implemented two activities using the results of the SEDEC survey on science perception, that make the pupils get a better view on scientific research, especially in the knowledge of two scientific “jobs”, astronomer and botanist. Our approach consists of allowing the children express their conceptions of these jobs, of organising a debate to clarify these ideas, and of confronting them with other pupils’ opinions in Europe, with the history of the involved science and with direct testimonies of scientists. The project should be pursued in allowing classes in Europe to communicate about a scientific problem and so, to live their European citizenship.
APA, Harvard, Vancouver, ISO, and other styles
34

Dixit, Rashmi, and K. Ravindranath. "Encryption techniques & access control models for data security: A survey." International Journal of Engineering & Technology 7, no. 1.5 (2017): 107. http://dx.doi.org/10.14419/ijet.v7i1.5.9130.

Full text
Abstract:
In the process of sending information from sender to receiver, an unauthorized user may work in an active way (update it) or passive way (read or delay in sending). There must be some techniques which assures receiver that whatever information received from authorized user as well as must be same as sent from sender side, in addition to this receiver never make Denial of service. Nowadays sharing of information or resources is a very common thing from single user to the network to the cloud. When information is moving from one node to another node, security is a big challenge. When information is stored on the user’s computer, it is under control but when it is in movement user lose control over it. In the world of security, to convert information from one form to another form, Encryption is used, so that only authorized party will able to read. Encryption is a technique for any security-conscious organization.In this paper, we present basic access control models along with encryption techniques.
APA, Harvard, Vancouver, ISO, and other styles
35

Gordon, Steven, and San Choosang. "Verification of the FlexRay Transport Protocol for AUTOSAR In-Vehicle Communications." International Journal of Vehicular Technology 2010 (December 27, 2010): 1–23. http://dx.doi.org/10.1155/2010/238518.

Full text
Abstract:
The FlexRay Transport Protocol (FrTp) is designed to support reliable and efficient communication between various computers embedded in vehicles. It uses a standardised FlexRay communication bus and introduces a go-back-N style retransmission algorithm. A formal modelling language, Coloured Petri nets (CPN), has been applied to verify the protocol design. Separate CPN models of the FrTp service and protocol are developed and with state space analysis-used to prove for selected configurations that FrTp is deadlock-free and conforms to the service specification when transferring a single-protocol data unit from sender to receiver. In addition, closed-form solutions relating the state space size, retransmission limit, and number of segments are found, giving increased confidence that FrTp is error-free, even for configurations where the state explosion problem arises.
APA, Harvard, Vancouver, ISO, and other styles
36

Ibragimov, A. A., A. К. Karakhanov, A. A. Abdurakhmanov, A. Е. Eshdavlatov, P. A. Uteniyazov, and A. A. Khadzhiev. "Research Results for a New Onion Seed Drill." Agricultural Machinery and Technologies 14, no. 4 (2020): 12–16. http://dx.doi.org/10.22314/2073-7599-2020-14-4-12-16.

Full text
Abstract:
. For sowing small seeds of vegetables, in particular onions, special seeders are used. They are not produced in the Republic of Uzbekistan, while many diff erent pneumatic seeders are produced abroad. The authors note that foreign samples are complex in design, not adapted to local soil and climatic conditions, cannot provide even seed placement on ridges, and the cost of the seeders themselves and service are very high.(Research purpose) To develop a vegetable seeder in relation to the soil and climatic conditions of Uzbekistan, to determine the seeding rate of onion seeds depending on the length of the active part of the seed reel, to evaluate the formation quality of sowing ridges and irrigation furrows.(Materials and methods) The authors determined the sowing rate by turning the seeder drive wheel at a given length of the active part of the sowing reel and collecting the sown seeds in cups with further weighing. The quality of sowing ridges and irrigation furrows formation was evaluated by the method of profi ling the fi eld before and after the seeder’s pass.(Results and discussion) The authors developed a vegetable seeder that performed three operations in one pass: cutting irrigation furrows, forming sowing ridges of a trapezoidal shape and sowing onion seeds and other small-seeded vegetable crops in a three-row tape method in each tape. They found that the dependence of the seeding rate on the length of the active part of the reel had a slightly fragile parabolic shape, and the required seeding rates – 24-48 pieces per linear meter (3.9-7.8 kilograms per hectare) – were provided with the length of the sowing reel 3.3- 6.2 millimeters. It was proved that the seeder provided a high-quality formation of sowing ridges and irrigation furrows: the row spacing was 68.8 centimeters (installation spacing – 70 centimeters), the top ridge width was 42.5 centimeters (the predetermined one was 40 centimeters), the depth of irrigation furrows was on average 9.6 centimeters.(Conclusions) A vegetable seeder was developed for sowing small-seeded vegetable crops with the simultaneous formation of sowing ridges and cutting irrigation furrows, which ensured high-quality performance of all operations and observance of onion seeds.
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Xiao-Yu, Stefanie Kuenzel, José-Rodrigo Córdoba-Pachón, and Chris Watkins. "Privacy-Functionality Trade-Off: A Privacy-Preserving Multi-Channel Smart Metering System." Energies 13, no. 12 (2020): 3221. http://dx.doi.org/10.3390/en13123221.

Full text
Abstract:
While smart meters can provide households with more autonomy regarding their energy consumption, they can also be a significant intrusion into the household’s privacy. There is abundant research implementing protection methods for different aspects (e.g., noise-adding and data aggregation, data down-sampling); while the private data are protected as sensitive information is hidden, some of the compulsory functions such as Time-of-use (TOU) billing or value-added services are sacrificed. Moreover, some methods, such as rechargeable batteries and homomorphic encryption, require an expensive energy storage system or central processor with high computation ability, which is unrealistic for mass roll-out. In this paper, we propose a privacy-preserving smart metering system which is a combination of existing data aggregation and data down-sampling mechanisms. The system takes an angle based on the ethical concerns about privacy and it implements a hybrid privacy-utility trade-off strategy, without sacrificing functionality. In the proposed system, the smart meter plays the role of assistant processor rather than information sender/receiver, and it enables three communication channels to transmit different temporal resolution data to protect privacy and allow freedom of choice: high frequency feed-level/substation-level data are adopted for grid operation and management purposes, low frequency household-level data are used for billing, and a privacy-preserving valued-add service channel to provide third party (TP) services. In the end of the paper, the privacy performance is evaluated to examine whether the proposed system satisfies the privacy and functionality requirements.
APA, Harvard, Vancouver, ISO, and other styles
38

BOUDA, JAN, and JOSEF ŠPROJCAR. "QUANTUM COMMUNICATION BETWEEN ANONYMOUS SENDER AND ANONYMOUS RECEIVER IN THE PRESENCE OF STRONG ADVERSARY." International Journal of Quantum Information 09, no. 02 (2011): 651–63. http://dx.doi.org/10.1142/s0219749911007691.

Full text
Abstract:
While many scenarios of anonymous communication can be solved by various famous classical techniques including mix nets or dining cryptographers (DC), an abundant amount of anonymous tasks remains open. In this paper, we present a solution to one such task. Our protocol serves as a private communication channel for quantum messages while ensuring that both the sender and the receiver stay anonymous in a set of all parties. Our protocol is a continuation of our previous work on anonymous transmission of quantum information. The protocol does not require trusted parties, and is secure against an active adversary. It can also withstand denial of service attacks. The protocol exhibits an advantage of quantum resources over classical because no classical solution is known (in the same security settings). Entanglement swapping technique is used to create "symmetry" in the protocol, which makes it very transparent and easier to analyze. The security analysis we present is heavily based on our previous work on quantum anonymous communication. The task we implement is also a nice illustration of a cryptographic task where two parties in a multi-party protocol can be dishonest at the same time, but are not cooperating.
APA, Harvard, Vancouver, ISO, and other styles
39

Susanto, Cayandi, and Gregorius Genep Sukendro. "Komunikasi antara Jasa Kurir Sepeda dengan Pelanggan (Studi Kasus Kurir Kamiantar Jakarta)." Koneksi 3, no. 2 (2020): 463. http://dx.doi.org/10.24912/kn.v3i2.6457.

Full text
Abstract:
Bicycle courier for now is developing faster than bicycle courier services using motorcycles or cars, because for the use of bicycle transportation is fairly unique and fast in its delivery. The way to order and call a bicycle courier is also faster and it's very easy to just wait from the company to convey if there is an order and immediately accepted by the bicycle courier. The communication process between the bicycle courier service and its customers runs smoothly even though there are 2 customers namely the sender and recipient of the goods or packages. Interpersonal communication is considered very effective to change the behavior of others, if there are similarities about the meaning discussed. The special mark on interpersonal communication lies in the direct reverse flow. The backflow has an easy catch for communicators both verbally in the form of words and non-verbal in the form of body language such as nodding, smiling, frowning and so forth. During the interpersonal communication process it is very important the interaction of sharing information and feelings between individuals and individuals or between individuals so that feedback occurs and does not cause misunderstanding in communication Interpersonal communication plays an important role in communication activities between bicycle courier services with its customers. The aim of the writer to conduct this research is to find out the beginning or the initial stage of communication between the bicycle courier service and 2 customers, namely the sender and recipient of goods and to find out what obstacles / disturbances are when our Jakarta delivery couriers communicate with customers. Kurir sepeda untuk saat ini berkembang begitu cepat daripada jasa kurir sepeda yang menggunakan motor atau mobil, dikarenakan untuk penggunaan transportasi sepeda ini terbilang sangatlah unik dan cepat dalam pengirimannya. Cara memesan dan memanggil kurir sepeda pun lebih cepat juga dan mudah sekali tinggal menunggu dari perusahaan itu menyampaikan kalau ada pesanan dan langsung diterima oleh kurir sepeda tersebut. Proses komunikasi antara jasa kurir sepeda dengan pelanggannya berjalan dengan lancar walaupun pelanggan ada 2 yaitu pengirim dan penerima barang atau paket tersebut. Komunikasi antar pribadi dinilai sangat efektif untuk merubah perilaku orang lain, bila terdapat persamaan mengenai makna yang dibincangkan. Tanda khusus yang ada di komunikasi antar pribadi ini terletak pada arus balik langsung. Arus balik tersebut memiliki daya tangkap yang mudah untuk komunikator baik secara verbal dalam bentuk kata maupun non-verbal dalam bentuk bahasa tubuh seperti anggukan, senyuman, mengernyitkan dahi dan lain sebagainya. Selama proses komunikasi antar pribadi berlangsung sangat penting terjadinya interaksi berbagi informasi dan perasaan antara individu dengan individu atau individu dengan antar individu supaya terjadi umpan balik dan tidak menimbulkan kesalahpahaman dalam berkomunikasi Komunikasi antar pribadi berperan penting dalam kegiatan komunikasi antara jasa kurir sepeda dengan pelanggannya. Tujuan penulis melakukan penelitian ini yaitu dikarenakan untuk Untuk mengetahui permulaan atau tahap awal berjalannya komunikasi antara jasa kurir sepeda dengan 2 pelanggan yaitu pengirim dan penerima barang dan untuk mengetahui hambatan/gangguan apa saja saat kurir Kamiantar Jakarta berkomunikasi dengan pelanggan.
APA, Harvard, Vancouver, ISO, and other styles
40

Anshori, Yusuf, Deny Wiria Nugraha, and Arief Pratomo. "Implementasi Algoritma Luc Pada Aplikasi Keamanan Short Message Service (SMS) Berbasis Android." CESS (Journal of Computer Engineering, System and Science) 6, no. 1 (2021): 101. http://dx.doi.org/10.24114/cess.v6i1.21862.

Full text
Abstract:
Short Message Service (SMS) still has security problems with attempts to steal messages, intercept messages, hijack messages by parties who are not responsible for obtaining information. Cryptography is the science of maintaining the confidentiality of information from aspects that can threaten information security with certain mathematical algorithms and techniques. The Luc algorithm is a public key cryptographic algorithm that was developed using the lucas function. This study aims to implement the Luc algorithm on an Android-based SMS security application in the National Narcotics Agency of Central Sulawesi Province to maintain privacy in communication between the sender and recipient of the message. This application was created using an Android studio developer with the Java programming language. Based on the results of the first test for a sample of plain messages in the word KOTA PALU that uses public key 13 produces the message cipher P=Se!CQa. The second test result for the message sample on the word KOTA PALU that uses public key 29 generates the AD*`_$(NQ cipher message
APA, Harvard, Vancouver, ISO, and other styles
41

De Oliveira, Gabriel Luís Nogueira, Aliane Maria Motta Baeta, Brenner Henrique Maia Rodrigues, Marcos Antônio Nunes, and Ralfo Edmundo Da Silva Matos. "Proposta Metodológica para Identificação de vilas e povoados mineiros localizados mais próximos das sedes municipais de outros municípios vizinhos / Methodological proposal for identification of (...)." Caderno de Geografia 25, no. 44 (2015): 237–55. http://dx.doi.org/10.5752/p.2318-2962.2015v25n44p237.

Full text
Abstract:
Esta pesquisa é o resultado de estudos realizados para o projeto “Implantação do Laboratório de Atendimento às Demandas de Limites Municipais e Distritais de Minas Gerais”, executado pelo Instituto de Geoinformação e Tecnologia (IGTEC), da Secretaria de Estado de Ciência, Tecnologia e Ensino Superior do Governo de Minas Gerais. O projeto demandou o desenvolvimento de uma metodologia através da qual pudesse identificar os casos de ocorrência das vilas (sedes distritais) e dos povoados dos municípios mineiros que se encontram a distâncias inferiores às das sedes de municípios vizinhos em relação às suas respectivas sedes municipais. A metodologia se pautou pelas distâncias em linha reta, obtidas a partir dos centroides dos setores censitários dos municípios mineiros. O levantamento desses casos é importante para a compreensão do transbordamento de serviços intermunicipais e subsidiar a organização territorial do estado de Minas Gerais.Palavras-chave: Sedes Municipais; Vilas e Povoados; Setores censitários; Minas Gerais. AbstractThis research is the result of studies for the project “Implantação do Laboratório de Atendimento às Demandas de Limites Municipais e Distritais de Minas Gerais", executed by Instituto de Geoinformação e Tecnologia (IGTEC), part of the State Secretariat of Science, Tecnology and Superior Education of Minas Gerais government. The project required the development of a methodology to identify cases of occurrence of villages (districtal headquarters) and hamlets of Minas Gerais’ municipalities which are located closer to the other municipality headquarter instead of the own headquarter. The methodology was based by the distances in a straight line, obtained from the census sectors’ centroids. The survey of these cases is important to understand the overflow of intercity services and to support the territorial organization of the state of Minas Gerais.Keywords: Municipal headquarters; Villages and hamlets; Census sectors; Minas Gerais.
APA, Harvard, Vancouver, ISO, and other styles
42

Meléndez-Rojas, Patricio, Leniz Arancibia-Mesas, and Carolina Poblete-Carrasco. "Prevalence of soft tissue calcifications in CBCT images from the Oral and Maxillofacial Radiology Service at UNAB, Viña del Mar, Chile." Journal of Oral Research 9, no. 6 (2020): 457–65. http://dx.doi.org/10.17126/joralres.2020.090.

Full text
Abstract:
Soft tissue calcifications can indicate the presence of more serious, potentially life-threatening pathologies. Therefore, their study can lead to an early diagnosis of those conditions that have not yet become clinically apparent. Main objective: To determine the prevalence of calcifications in soft tissues of the head and neck in cone beam computed tomography images obtained from the Oral and Maxillofacial Radiology Service at Universidad Andrés Bello (UNAB), Viña del Mar, Chile. Material and Methods: Retrospective, cross-sectional, quantitative study. A total of 288 images of cone beam computed tomography (CBCT) were used. Images were obtained at random from the database of the Oral and Maxillofacial Radiology Service at UNAB, Viña Del Mar, between 2014 and 2019. Results: A prevalence of 59.72% of soft tissue calcifications was obtained. The most prevalent were: tonsilloliths and calcified stylohyoid ligament, accounting for 30.65% and 45.56%, respectively. Conclusion: A high prevalence of soft tissue calcifications was found in a population that has not been studied previously; therefore, it is important that the dentist perform a detailed analysis of the cone beam computed tomography.
APA, Harvard, Vancouver, ISO, and other styles
43

Henkel, Alexander P., Stefano Bromuri, Deniz Iren, and Visara Urovi. "Half human, half machine – augmenting service employees with AI for interpersonal emotion regulation." Journal of Service Management 31, no. 2 (2020): 247–65. http://dx.doi.org/10.1108/josm-05-2019-0160.

Full text
Abstract:
PurposeWith the advent of increasingly sophisticated AI, the nature of work in the service frontline is changing. The next frontier is to go beyond replacing routine tasks and augmenting service employees with AI. The purpose of this paper is to investigate whether service employees augmented with AI-based emotion recognition software are more effective in interpersonal emotion regulation (IER) and whether and how IER impacts their own affective well-being.Design/methodology/approachFor the underlying study, an AI-based emotion recognition software was developed in order to assist service employees in managing customer emotions. A field study based on 2,459 call center service interactions assessed the effectiveness of the AI in augmenting service employees for IER and the immediate downstream consequences for well-being relevant outcomes.FindingsAugmenting service employees with AI significantly improved their IER activities. Employees in the AI (vs control) condition were significantly more effective in regulating customer emotions. IER goal attainment, in turn, mediated the effect on employee affective well-being. Perceived stress related to exposure to the AI augmentation acted as a competing mediator.Practical implicationsService firms can benefit from state-of-the-art AI technology by focusing on its capacity to augment rather than merely replacing employees. Furthermore, signaling IER goal attainment with the help of technology may provide uplifting consequences for service employee affective well-being.Originality/valueThe present study is among the first to empirically test the introduction of an AI-fueled technology to augment service employees in handling customer emotions. This paper further complements the literature by investigating IER in a real-life setting and by uncovering goal attainment as a new mechanism underlying the effect of IER on the well-being of the sender.
APA, Harvard, Vancouver, ISO, and other styles
44

Musadad, Musadad, Indria Angga Dianita, and Pradipta Dirgantara. "Hotel Interdepartmental Communication: A Case of F&B Service and Sales & Marketing at Mercure Bandung Nexa." TRJ Tourism Research Journal 5, no. 1 (2021): 1. http://dx.doi.org/10.30647/trj.v5i1.97.

Full text
Abstract:
This study sought to investigate the communication between the Food & Beverage Department and the Sales & Marketing Department at Mercure Bandung Nexa through the perspective of hotel interdepartmental communication. It was benefited from employing a qualitative method. The data collection was conducted through in-depth interviews with the managers of the two departments and field observations. The data collected was then analyzed and carried out through the elements of communication: people (sender and receiver), message, channel, noise, feedback, and effect. This study found that communication between the two departments goes well to keep the service excellent. Based on the analysis of the elements of communication, the only major obstacle is the sudden event that can disrupt the communication process. This result has brought discussion in the context of excellent service being delivered through the communication between the Food & Beverage Department and Sales & Marketing Department. However, this study is limited in the number of informants. More informants should be involved to gather more reliable and deeper data. After all, this study contributes to enriching the application of Interdepartmental Communication in organizations, especially in a hotel.
 Keywords: Interdepartmental Communication, F&B Service, Sales & Marketing
APA, Harvard, Vancouver, ISO, and other styles
45

Zaen, Mohammad Taufan Asri, and Asep Yunandy. "PENGENDALI LAMPU MONITORING RUMAH DENGAN SHORT MESSAGE SERVICE (SMS) BERBASIS ARDUINO UNO." Jurnal Informatika dan Rekayasa Elektronik 1, no. 2 (2018): 47. http://dx.doi.org/10.36595/jire.v1i2.59.

Full text
Abstract:
The increasing activity of someone outside the home causes difficulties in controlling the lamps and monitoring the condition of the house from a distance, therefore it is necessary to control the lamps remotely. This research designed and built a lamps handling by short message service (SMS) based on arduino uno.
 Lamps handling by sms is a tool which act as the lamp and alarm switches at house, whenever without time limits as far as the GSM signal is still can be reached. Handling tool from distance by mobile sms act as an order producer, arduino uno as a microcontroller, sensor peer as a movement detector, gsm modul sim 900A as an information sender and acceptor and relay as a switcher of lamps or the alarms.
 The test results of this tool show that this too can be used based on the order which is given from distance to control the lamps and the alarms. Another function of this tool is to monitor the lamps condition by “cek” function to know in which lamp is on or off mode. It also can switch on an alarm and send some sms to the owner’s contact number when its sensor detected any object movements.
APA, Harvard, Vancouver, ISO, and other styles
46

Huang, Zhi Jian, Wei Peng, Yong Jun Wang, and Yuan Wang. "An Application of HVG Method to Studying Variations of LDoS Flow Packet Sequence Pattern." Advanced Materials Research 791-793 (September 2013): 1347–51. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.1347.

Full text
Abstract:
By mapping one dimension time series into two dimension graph, Horizontal Visibility Graph (short as HVG) method provides a new way to analyze time series structural properties, it has been used in economics, biology, sociology and other areas related. In this paper, we apply it to investigate the Low-rate Denial-of-Service (LDoS) flow packet sequence pattern variations. We establish the Packet Sequence Model and put new metrics to measure the pattern similarity. Using the data carried out on PlanetLab, we find out that the packet sequence time series of the receiver has a bigger HVG degree than the sender, indicating that the packet sequence patterns get more irregular under the impacts of end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
47

Nisar, Kashif, Angela Amphawan, and Suhaidi B. Hassan. "Comprehensive Structure of Novel Voice Priority Queue Scheduling System Model for VoIP Over WLANs." International Journal of Advanced Pervasive and Ubiquitous Computing 3, no. 4 (2011): 50–70. http://dx.doi.org/10.4018/japuc.2011100106.

Full text
Abstract:
Voice over Internet Protocol (VoIP) has grown quickly in the world of telecommunication. Wireless Local Area Networks (WLANs) are the most performance assuring technology for wireless networks, and WLANs have facilitated high-rate voice services at low cost and good flexibility. In a voice conversation, each client works as a sender or a receiver depending on the direction of traffic flow over the network. A VoIP application requires high throughput, low packet loss, and a high fairness index over the network. The packets of VoIP streaming may experience drops because of the competition among the different kinds of traffic flow over the network. A VoIP application is also sensitive to delay and requires the voice packets to arrive on time from the sender to the receiver side without any delay over WLAN. The scheduling system model for VoIP traffic is an unresolved problem. The objectives of this paper are to identify scheduler issues. This comprehensive structure of Novel Voice Priority Queue (VPQ) scheduling system model for VoIP over WLAN discusses the essential background of the VPQ schedulers and algorithms. This paper also identifies the importance of the scheduling techniques over WLANs.
APA, Harvard, Vancouver, ISO, and other styles
48

Chipare, Mwakanyadzenin Abigail, Agnes van Dyk, and Hans Justus Amukugo. "A health education programme to enhance the knowledge and communication skills of health care workers who serve people living with HIV / AIDS on HAART in Namibia." International Journal of Advanced Nursing Studies 4, no. 2 (2015): 137. http://dx.doi.org/10.14419/ijans.v4i2.4992.

Full text
Abstract:
<p>This paper aims at describing the findings of a health education programme that enhances the knowledge and communication skills of health-care workers who serve people living with HIV / AIDS on HAART in Namibia. Namibian health-care workers are unable to provide quality health care services to people who are living with HIV / AIDS (PLWHA) when they do not have the necessary knowledge, as well as adequate interpersonal communication and counselling skills. In a health care facility system, all patients either come from the community, or are referred from the wards or other departments by health-care workers. The health care worker as a sender conveys information (messages), and a patient (receiver) is expected to comprehend these messages and to respond by giving feedback to the sender who, in turn, provides feedback until the communication process is completed. The process should take place in a conducive environment without any interference, such as noise, to allow the swift completion of the communication process. The messages that both parties convey should be clear, accurate, coherent, and concise. This article covered the following: background, methods, ethical measures, results (participants’ responses) conclusions and recommendations.</p>
APA, Harvard, Vancouver, ISO, and other styles
49

Voyer, Peter A., and Chatura Ranaweera. "The impact of word of mouth on service purchase decisions." Journal of Service Theory and Practice 25, no. 5 (2015): 636–56. http://dx.doi.org/10.1108/jstp-04-2014-0070.

Full text
Abstract:
Purpose – Primarily, the purpose of this paper is to investigate the interaction and direct effects of tie strength between sender and receiver of word of mouth (WOM) and the receiver’s service purchase decision involvement on WOM influence. A secondary aim is to investigate how a distinctive conceptualization of perceived risk, consisting of two types (outcome risk and psychosocial risk), affects service purchase decision involvement. A conceptual model incorporating these constructs and associated hypotheses is developed and tested. Design/methodology/approach – In a survey of actual service consumers, respondents were asked to recall a recent instance where they had received service purchase information via WOM, and relate their responses to this instance. Established scales were used to measure the constructs. The hypothesized model was tested using structural equation modeling. Findings – Principally, findings demonstrate a strong interaction effect between service purchase decision involvement and tie strength. Also, results highlight the complexity of the perceived risk construct, suggesting that it is appropriately modeled as two types: outcome risk, and psychosocial risk. Research limitations/implications – This research has contributed to the service marketing literature by testing a model that predicts WOM influence. Evidence confirmed that the effect of service purchase decision involvement on WOM influence is moderated by tie strength. Additionally, a conceptualization of two different types of risk associated with purchase decisions was suggested, together with empirical confirmation of their hypothesized antecedent effects on service purchase decision involvement. Findings have special implications for the literatures of persuasion, social and interpersonal influence, as well as consumer behavior in general. Practical implications – To harness the power of WOM, managers should understand who their target audience is and how consumers are related to each other (tie strength) and to the service purchase decision (service purchase decision involvement). Recommendations are made with specific illustrations of how firms can leverage tie strength under conditions of low service purchase decision involvement to enhance WOM influence. Originality/value – The formidable power of WOM wields substantial influence on consumers, particularly within a service (vs goods) purchase context, typically characterized by higher perceived risk and lower search qualities. The significant interaction between tie strength and service purchase decision involvement is a unique contribution to the service WOM literature.
APA, Harvard, Vancouver, ISO, and other styles
50

Xie, Xian-zhong, Chuan-wen Li, Shuang-guo Cheng, He-lin Yang, and Shu Tang. "Distributed beamforming algorithm based on game theory in device-to-device communications." International Journal of Distributed Sensor Networks 14, no. 8 (2018): 155014771878692. http://dx.doi.org/10.1177/1550147718786929.

Full text
Abstract:
In the device-to-device communication network, there is the interference problem when device-to-device users share the same spectrum with cellular users, a distributed beamforming scheme based on non-cooperative game is proposed to maximize weighted sum rate under the rated transmit power and the users’ quality of service. Since the optimization problem is non-concave, we first obtain the solution of the Karush-Kuhn-Tucher (KKT) condition for the downlink beamforming problem of each sender by dual decomposition. Second, a distributed beamforming algorithm based on the non-cooperative game is proposed, which can quickly converge to the Nash equilibrium point with a lower information exchange overhead. Finally, the simulation results show that the proposed algorithm has better performance in terms of system sum rate and fairness than the existing algorithms.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography