Articles de revues sur le sujet « Mutual Store »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Mutual Store.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Mutual Store ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Tsai, Pei-Hsuan, Chih-Jou Chen et Jia-Wei Tang. « Key Factors Influencing Talent Retention and Turnover in Convenience Stores : A Comparison of Managers’ and Employees’ Perspectives ». SAGE Open 11, no 4 (octobre 2021) : 215824402110672. http://dx.doi.org/10.1177/21582440211067240.

Texte intégral
Résumé :
This study identifies the main factors influencing turnover among convenience store employees from a managerial perspective and infers the changes necessary to reduce such high turnover rates. Employing the decision-making trial and evaluation laboratory (DEMATEL) methodology, it investigates the degree of mutual influence between evaluation indicators and constructs a network relation map for evaluation dimensions and criteria. This study also uses the DEMATEL-based analytic network process method to compute the influential weights of each dimension and criteria. According to the empirical results of the causality model, convenience store employees must first improve the relatedness dimension, and managers must first improve the existence dimension. These findings can help convenience store managers address talent retention and turnover problems, develop effective strategies to lower the high turnover rates at convenience stores, and offer solutions to new industry entrants to avoid potential problems that might lead to early exit.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sandberg, Erik. « Coordination mechanisms in the store opening process ». International Journal of Retail & ; Distribution Management 42, no 6 (3 juin 2014) : 482–99. http://dx.doi.org/10.1108/ijrdm-01-2013-0024.

Texte intégral
Résumé :
Purpose – For many retailers organic growth through the opening of new stores is a crucial cornerstone of the business model. The purpose of this paper is to explore the store opening process conducted by retail companies. The research questions cover: first, the role and organisation of the establishment function in charge of the process; second, the activities and functions involved in the process; and third, the coordination mechanisms applied during the process. Design/methodology/approach – This research considers the store opening process as a company-wide project, managed by an establishment function, in which internal functions as well as external suppliers need to be coordinated. A multiple case study of eight retail companies is presented, focusing on the organisation of the establishment function, a mapping of the store opening process and the application of coordination mechanisms. Findings – The role and organisation of the establishment function is described and the store opening process is summarised into 11 main activities to be conducted by either the establishment function or other involved functions. During the store opening process six different coordination mechanisms are utilised, including mutual adjustments and direct supervision, as well as different types of standardisation. Originality/value – This research seeks to improve our understanding for the store opening process and how it can be managed and controlled in an effective manner.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Seo, Young Cheon. « A Study on the Protection of the Opportunity to Collect the Premiums of Semi-Large Stores ». Korea Real Estate Society 70 (31 décembre 2023) : 241–54. http://dx.doi.org/10.37407/kres.2023.41.4.241.

Texte intégral
Résumé :
According to the Commercial Lease Protection Act, revised in 2015 to protect the opportunity for commercial tenants to recover the premium, commercial tenants can recover the premium by arranging a new tenant to the lessor. However, tenants who are difficult to regard as relatively weak in the lease relationship are exceptionally protected from the opportunity to recover the premium, and tenants belonging to large stores and quasi-large stores are representative examples. Under this regulation, tenants who fall under franchise-type chain business stores of large-scale store managers or affiliates of companies restricted from mutual investment will not be protected from the opportunity to recover the premium. Tenants, who are franchisees, are far behind those of direct stores in the franchise chain business in terms of information and capital power. In the case of such franchisees, there are many cases in which a premium transaction contract is signed with a general tenant other than a franchise store when transferring and transferring the premium. In that case, there is a problem that the protection regulations for the opportunity to recover the premium are applied differently depending on the type operated by the transferee of the store. In order to solve this problem, the amendment of the Commercial Lease Protection Act should protect the opportunity to recover the premium by excluding the tenant who falls under the franchise chain business from the category of quasi-large stores.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Jayanti, Prasad, et Siddhartha Jayanti. « Deterministic Constant-Amortized-RMR Abortable Mutex for CC and DSM ». ACM Transactions on Parallel Computing 8, no 4 (31 décembre 2021) : 1–26. http://dx.doi.org/10.1145/3490559.

Texte intégral
Résumé :
The abortable mutual exclusion problem, proposed by Scott and Scherer in response to the needs in real-time systems and databases, is a variant of mutual exclusion that allows processes to abort from their attempt to acquire the lock. Worst-case constant remote memory reference algorithms for mutual exclusion using hardware instructions such as Fetch&Add or Fetch&Store have long existed for both cache coherent (CC) and distributed shared memory multiprocessors, but no such algorithms are known for abortable mutual exclusion. Even relaxing the worst-case requirement to amortized, algorithms are only known for the CC model. In this article, we improve this state of the art by designing a deterministic algorithm that uses Fetch&Store to achieve amortized O (1) remote memory reference in both the CC and distributed shared memory models. Our algorithm supports Fast Abort (a process aborts within six steps of receiving the abort signal) and has the following additional desirable properties: it supports an arbitrary number of processes of arbitrary names, requires only O (1) space per process, and satisfies a novel fairness condition that we call Airline FCFS . Our algorithm is short with fewer than a dozen lines of code.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Laas, Nataliia. « Liberating Consumption, Urban Communities, and Women's Activism during Late Stalinism ». Slavic Review 82, no 4 (2023) : 971–94. http://dx.doi.org/10.1017/slr.2024.2.

Texte intégral
Résumé :
In the first post-war decade, Stalinist authorities resumed pre-war practices of voluntary gatherings of store patrons in large cities. Such meetings, called “consumer conferences,” constituted embryonic manifestations of proletarian governance that municipal officials considered ideologically safe to employ in a period when Kremlin elites increased their crackdown measures against the wartime liberalization initiatives. Drawing on people's insider knowledge of local communities, city authorities aimed to gather economic information about consumer needs to improve the retail system. Yet, urban working-class women, the most committed conference participants, saw stores more than as simply places of consumption: the store contributed to the local community's safety, hygiene, health, emotional comfort, and mutual trust. Consumer conferences therefore turned into a forum for women's activism as female urbanites used customer gatherings to carve out part of a state-curated public space in which they exercised a measure of control over their neighborhoods’ well-being.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Haug, Anders, et Mia Borch Münster. « Design variables and constraints in fashion store design processes ». International Journal of Retail & ; Distribution Management 43, no 9 (14 septembre 2015) : 831–48. http://dx.doi.org/10.1108/ijrdm-11-2013-0207.

Texte intégral
Résumé :
Purpose – Several frameworks of retail store environment variables exist, but as shown by this paper, they are not particularly well-suited for supporting fashion store design processes. Thus, in order to provide an improved understanding of fashion store design, the purpose of this paper is to identify the most important store design variables, organise these variables into categories, understand the design constraints between categories, and determine the most influential stakeholders. Design/methodology/approach – Based on a discussion of existing literature, the paper defines a framework of store design variables and constraints between these. The framework is investigated through six case studies of fashion store design projects. Findings – Through a discussion of literature and empirical studies, the paper: identifies the most important store design variables, organises these variables into categories, provides an understanding of constraints between categories of variables, and identifies the most influential stakeholders. The paper demonstrates that the fashion store design task can be understood through a system perspective, implying that the store design task becomes a matter of defining a set of subsystems, while considering their mutual interdependencies. Research limitations/implications – The proposed framework may be used as a point of departure and a frame of reference for future research into fashion store design. Practical implications – The paper may support retail designers and retail managers in fashion store design processes by clarifying which store design variables to consider and providing an understanding of the constraints between them. Originality/value – The perspective on the fashion store design task offered by the proposed framework adds a layer of understanding to the way in which existing literature describes the challenges related to store design. The empirical studies of fashion store projects demonstrate that the described system perspective offers a useful way of organising fashion store designers’ experiences from design processes.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Manaha, Roberth Ricki Manaha, et Janeman Summah. « Design Simulation Queue Cake Shop With Lamport's Bakery Algorithm ». Jurnal Info Sains : Informatika dan Sains 11, no 2 (1 septembre 2021) : 1–4. http://dx.doi.org/10.54209/infosains.v11i2.40.

Texte intégral
Résumé :
Mutual exclusion is one of the mechanisms that can be used to solve concurrency problems in the operating system. In the operating system, there are resources that cannot be shared at the same time, such as printers. These kinds of resources are called critical resources. Programs that use critical resources are called entering critical regions/sections. Programmers cannot rely on the operating system to understand and enforce these limits. The mutual exclusion settlement process was submitted by several experts. One of them is Lamport with a method known as Lamport's Bakery Algorithm. The work process of Lamport's Bakery Algorithm starts from the buyer entering the store and receiving the sequence number. If there is a waiter who is idle (not being / will serve other buyers), then the buyer directly asks for service from the waiter. If not, then the buyer sits in the buyer's waiting area and waits until his turn. Shoppers who have finished being served out of the store and waiters who are idle serve the lowest numbered buyers who are waiting at the waiting place of the buyer
Styles APA, Harvard, Vancouver, ISO, etc.
8

Savard, Christophe, Emiliia Iakovleva, Daniil Ivanchenko et Anton Rassõlkin. « Accessible Battery Model with Aging Dependency ». Energies 14, no 12 (12 juin 2021) : 3493. http://dx.doi.org/10.3390/en14123493.

Texte intégral
Résumé :
Designed to store and discharge electrical energy, rechargeable batteries consist of elementary storage cell assemblies. Aging is affected by various aggravating factors, mainly temperature. There are many electric or electrochemical models which describe their operation. Most standard models do not consider the aging phenomena of batteries and their consequences, while batteries deteriorate when used or stored. Precisely, most battery models do not simulate the influence of cell aging on other cells. The model presented in this paper incorporates aging and the effects of mutual interactions between cells. The model can be established based on four measurement points on the cell characteristic curve and allows the simulation of a single cell’s or multiple coupled cells’ behavior. The model can then be easily implemented in simulation software like Matlab.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Fitriyani, Alisa, et Agung Triayudi. « SENTIMENT ANALYSIS OF REKSADANA ON BIBIT APPLICATIONS USING THE NAÏVE BAYES METHOD AND K-NEAREST NEIGHBOR (KNN) ». Jurnal Riset Informatika 4, no 2 (1 mars 2022) : 127–34. http://dx.doi.org/10.34288/jri.v4i2.304.

Texte intégral
Résumé :
The public's lack of interest in the capital market has made the top brass of capital market companies compete with each other to provide services in order to provide convenience for customers in the various services available and provide convenience in accessing financial information. The emergence of several startup companies that provide mutual fund investment products for investors, namely PT Bibit Reksadana Grow Together, which created a mutual fund application, namely Bibit Mutual Fund with more than one million users based on data downloaded on the play store by PT Bibit Grow Bersama which acts as a Mutual Fund Selling Agent (APERD) and sells 134 mutual fund products. So, to provide information to the public, it is necessary to have a sentiment analysis on how the opinions of users of the mutual fund seed application use the methodK-nearest neighbor (KNN) and Naïve Bayes, with the results of crawling data of 3800 tweets and scraping of 5000 reviews, then the text processing and labeling stages are carried out using the textblob library, with a high level of accuracy in the classification of tweet data and review data using the K-nearest neighbor method. Nearest Neighbor as much as 88%, 100%, and Naïve Bayes as much as 100%, 100%, it can be concluded that positive opinions from seed mutual fund users are more than negative sentiments.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Li, Shu, Xi Yang et Ping Yuan Liang. « A New Hash-Based Authentication Protocol for RFID Using Varying Identifiers ». Applied Mechanics and Materials 303-306 (février 2013) : 2112–16. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2112.

Texte intégral
Résumé :
This article proposed a new security protocol with satisfying the lightweight requirements of the security of RFID system. Using varying identifiers, the protocol can resist Forward attack, Traffic analysis and Tracking attack, Replay attack. The Back-end Server holds the new identifier and last identifier for every Tag can keep database synchronization. Each Tag store a unique Key that is the secret information which also store in the Back-end Server. Use the Key, the protocol can implement mutual authentication between Back-end Server and Tag. Then the paper compared the proposed protocol with the typical protocols in security, effective and cost. The results demonstrate that the protocol can effectively solve the security problem of RFID systems.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Wei, Feng, et Yan Zhu. « Self-Operated Store or Franchised Store ? Optimal Decisions for Online-to-Offline Supply Chain with a Demand Shift ». Mathematical Problems in Engineering 2020 (15 décembre 2020) : 1–15. http://dx.doi.org/10.1155/2020/8857424.

Texte intégral
Résumé :
Mutual shifts in offline and online demand have become the norm in supply chain operations. The online-to-offline (O2O) supply chain system consists of a platform vendor, a physical store, and a product. The platform vendor sells the product directly online and governs either the centralized decision-making of a self-operated store or the decentralized decision-making of a franchised store offline. In this study, supply chain decision models with and without demand shifts are constructed to obtain optimal wholesale and selling prices and to maximize profit. The coordination mechanism under decentralized decision-making is designed to optimize the O2O supply chain, and the validity and applicability of the model are verified by numerical simulation. Results show that, regardless of whether a store is self-operated or franchised, the total profit of the system increases, and online and offline prices depend on a range of demand shifts. With an increased proportion of online demand shifts, the offline selling price and total profit of the system increase, whereas the online selling price and profit of the platform vendor decrease under decentralized decision-making. When the fixed transfer payment fee is within a certain range, a two-part-tariff contract can effectively coordinate the supply chain. This study not only contributes to the theoretical literature on O2O supply chain systems but also provides practical decision-making support for managers.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Fronczek, Ann E., et Nicole A. Rouhana. « Attaining Mutual Goals in Telehealth Encounters : Utilizing King’s Framework for Telenursing Practice ». Nursing Science Quarterly 31, no 3 (19 juin 2018) : 233–36. http://dx.doi.org/10.1177/0894318418774884.

Texte intégral
Résumé :
Access to essential health-promoting nursing care is increasingly facilitated through the expanding scope and capabilities provided through the utilization of telehealth technologies. Telehealth technologies facilitate the nursing process with clients at a distance in multiple ways, such as video conferencing, video conferencing with peripheral diagnostic tools, and store and forward modalities. Nursing care needs to remain the focus of care, but technology is a useful ancillary tool to help clients achieve health outcomes. The authors of this article discuss nursing practice and the use of telehealth technology and how King’s concepts and theory of goal attainment can be used as a guiding framework.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Chu, Yungchi. « Manner Coffees Marketing Strategies : AReview ». Advances in Economics, Management and Political Sciences 8, no 1 (13 septembre 2023) : 275–79. http://dx.doi.org/10.54254/2754-1169/8/20230325.

Texte intégral
Résumé :
The worlds coffee consumption has been growing every year, and new coffee shops are opening and joining its competitors. Manner Coffee is a coffee chain brand established in 2015, with its first store in Shanghai, China. From one store to more than three hundred stores across China, it took merely a few years. Marketing strategies are significant for Manner Coffee to expand in the country, which leads to the purpose of this review paper. This paper aims to examine Manner Coffees marketing strategies. This research method is through the internet and official websites, or accounts. Manner Coffee has multiple strategies from its product to promotion methods. Manner Coffee is determined to Make Coffee Part of Your Life. It serves high-quality coffee at reasonable prices for its customers, which pricing is one of its advantages and strategy in marketing. Brand positioning is important for a brand, and specific planning and model are required to be unique from its competitors. Moreover, it collaborates with different industries which creates mutual benefits and raises brand awareness. Promotion is essential for marketing a product, and Manner Coffee has several strategies. With the combination of digital media and offline promotion methods, the brand has increased its brand recognition and strengthened its customer relationship.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Ajay Sharma. « A Study on Factors Influencing Indian Equity Investment Managers' Decision-Making Process ». TEST Engineering & ; Management 83 (12 mars 2020) : 27555–66. http://dx.doi.org/10.52783/testmagzine.v83.14605.

Texte intégral
Résumé :
Humans have been setting aside a portion of their income today to save for future expenses since the beginning of time. Until around four centuries ago, the most common ways to store money were in the form of land, animals, and precious metals. The rise of the banking and capital market sectors greatly expanded the range of possibilities. Mutual Funds are becoming more popular among Indians as a means of investing in the stock market. But, investors still don't know how a fund management makes decisions. In addition, most of the academic studies on this topic focus only on the US market and rely heavily on quantitative evidence. The purpose of this survey was to systematically investigate the influence different variables have on the investment choices made by Indian mutual fund managers.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Chen, Bing-Chang, Her-Tyan Yeh et Che-Chiang Wang. « The construction of mobile RFID authentication mechanism and relative ownership transfer protocols for supply chain ». Engineering Computations 33, no 6 (1 août 2016) : 1825–34. http://dx.doi.org/10.1108/ec-08-2015-0252.

Texte intégral
Résumé :
Purpose – The purpose of this paper is to complete the following works: construct RFID integration mechanism in the supply chain; build mutual authentication mechanism; and build the transfer mechanism in supply chain. Design/methodology/approach – In order to transfer RFID tag information to others safely in mobile RFID supply chain circumstances, the authors propose a RFID authentication mechanism which can ensure the identity and make the mutual authentication. Moreover, the authors propose a secure transfer method of ownership for the specific role in different regions under the structure of Mobile RFID. Findings – The task of administrator server is to check the order, store the merchandise information, distribute the authority, certify the security and transfer the ownership. It can make the whole supply chain more mobility, and transfer faster. Originality/value – The goals of this research are to achieve mainly: using mobile RFID system to design secure mutual authentication mechanism, transfer mechanisms with faster transfer and authority distribution. The authors introduce the security authentication and competence transfer mechanism in supply chain.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Risqiani, Renny. « ANTECEDENTS AND CONSEQUENCES OF IMPULSE BUYING BEHAVIOR ». Business and Entrepreneurial Review 15, no 1 (30 août 2017) : 1. http://dx.doi.org/10.25105/ber.v15i1.2083.

Texte intégral
Résumé :
The objective of this research is to identify and analyze the factors that of influence of consumers The purpose of this research is to analyze and determine the factors that influence consumer’s impulse buying behavior in mini market (convenience store) based on influence of variable store atmosphere, in-store browsing, in-store layouts, salesperson, promotional approach, reference group, use payment card and shopping emotion. This study attempts to analyze post-purchase consumer regret and investigates the influence of impulse behavior to post purchase regret.<br />The sample was collected and analyzed from 244 respondents of convenience store shoppers in ages in Greater Jakarta region. Structural Equation Modeling (SEM) and AMOS were used for data analysis and hypotheses testing.<br />Results indicate that there is a significant effect of the impulse buying behavior in the four variables; the role of salesperson, sales promotion, the participation of reference groups and payments made by debit card. As a result, this study addresses concerns about disappointed consumers after making an impulsive purchase.<br />This study emphasizes the importance of friendly and ready to help the consumers in sales person’s role to encourage consumers to make impulsive purchases. The readiness and friendliness of employees in serving consumers can occur when companies often provide training to employees.<br />Employees must pay particular attention and effort put into effect reward and punishment system that can increase work motivation. Furthermore, reference groups have an effect on impulsive buying behavior, and the tendency of consumers to shop more is high when accompanied with a mutual friend. In addition to sales person and reference group, promotions made by the store can also attract consumers and encourage them to make purchases impulsively. Additional value that can encourage the purchase of impulsive payment system is by using a debit card instead of credit card. In further research, the convenience store consumers do not make purchases in large quantities so payment using credit card does not give a significant effect while consumers can use a debit card in lieu of cash. Other research results show consumers regret after making an impulsive purchase. The negative consequence of consumer disappointment is that consumers become disloyal even spreading negative word of mouth. Thus, the company needs to explore these impacts in more detail and determine the factors that can reduce consumer disappointment This study examines the factors that cause and impact impulse buying behavior. The study was conducted at convenience stores in Greater Jakarta region. The results showed the impact of impulse buying behavior on consumer regret after doing impulse buying.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Hao, Zhuo, Sheng Zhong et Nenghai Yu. « A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing ». International Journal of Computers Communications & ; Control 6, no 2 (10 juin 2011) : 227. http://dx.doi.org/10.15837/ijccc.2011.2.2170.

Texte intégral
Résumé :
<p>Cloud computing is becoming popular quickly. In cloud computing, people store their important data in the cloud, which makes it important to ensure the data integrity and availability. Remote data integrity checking enables the client to perform data integrity verification without access to the complete file. This service brings convenience to clients, but degrades the server’s performance severely. Proper schemes must be designed to reduce the performance degradation.<br /> In this paper, a time-bound ticket-based mutual authentication scheme is proposed for solving this problem. The proposed authentication scheme achieves mutual authentication between the server and the client. The use of timebound tickets reduces the server’s processing overhead efficiently. The correspondence relationship between the digital ticket and the client’s smart card prevents user masquerade attack effectively. By security analysis, we show that the proposed scheme is resistant to masquerade attack, replay attack and password guessing attack. By performance analysis, we show that the proposed scheme has good efficiency. The proposed scheme is very suitable for cloud computing.</p>
Styles APA, Harvard, Vancouver, ISO, etc.
18

Dai, Haijing, Yan Lau et Ka Ho Lee. « Social Innovation, Value Penetration, and the Power of the Nonprofit Sector : Workers’ Co-Operative Societies in Hong Kong ». Nonprofit and Voluntary Sector Quarterly 48, no 6 (17 juillet 2019) : 1210–28. http://dx.doi.org/10.1177/0899764019863107.

Texte intégral
Résumé :
Using Care Store as a case study, this research examines the innovative development and value penetrations of workers’ co-operative societies in Hong Kong. Care Store operates through the practices of equality and mutual care, in the unfriendly neoliberalist social order of Hong Kong. The society penetrates the dominant models of labor organization and consumption process. But the penetration of structural inequalities is limited, because the female workers of the society remain low-income laborers, social boundary and exclusion still take place, and the workers internalize their cultural inferiority. In comparison with innovative organizations in other regions, workers’ co-operative societies in Hong Kong have little opportunity to rely on or collaborate with the public and private sectors, and they explore a more progressive path of penetration in development. Practices strengthening this path can not only sustain these young organizations but also enrich the understanding of the true potentials of the nonprofit sector.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Thi Thao Van Ho, Thi Thao Van Ho, Mi Jin Noh Mi Jin Noh, Yu Na Lee Yu Na Lee et Yang Sok Kim Yang Sok Kim. « Analyzing User Feedback on a Fan Community Platform 'Weverse' : A Text Mining Approach ». Korean Institute of Smart Media 13, no 6 (28 juin 2024) : 62–71. http://dx.doi.org/10.30693/smj.2024.13.6.62.

Texte intégral
Résumé :
This study applies topic modeling to uncover user experience and app issues expressed in users' online reviews of a fan community platform, Weverse on Google Play Store. It allows us to identify the features which need to be improved to enhance user experience or need to be maintained and leveraged to attract more users. Therefore, we collect 88,068 first-level English online reviews of Weverse on Google Play Store with Google-Play-Scraper tool. After the initial preprocessing step, a dataset of 31,861 online reviews is analyzed using Latent Dirichlet Allocation (LDA) topic modeling with Gensim library in Python. There are 5 topics explored in this study which highlight significant issues such as network connection error, delayed notification, and incorrect translation. Besides, the result revealed the app's effectiveness in fostering not only interaction between fans and artists but also fans' mutual relationships. Consequently, the business can strengthen user engagement and loyalty by addressing the identified drawbacks and leveraging the platform for user communication.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Tatubeket, Insan Kamil. « Psychological Analysis On Freud’s Personality Theory On Popov And Smirnov’s Dynamic Characters As Seen In The Bear By Anton Chekov ». Jurnal Ilmiah Langue and Parole 1, no 1 (23 juin 2017) : 68–86. http://dx.doi.org/10.36057/jilp.v1i1.9.

Texte intégral
Résumé :
The Bear is a literary work written by anton chekov in 1880 which tells of the story of a widow who dissolves in sorrow after being dying by a beloved husband who then personality or his formerly gentle, polite nature turned into a rough and grumpy as being carried away with a collector Harsh debt but turned into a romantic and gentle. Changes in attitudes that occur to the store antagonist and protagonist caused by loneliness and needs that harbor the sense of mutual need that in the end both are equally in love.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Zhao, Mingxiao. « Commercial Value and service innovation management of Lahos elders in the Internet age ». E3S Web of Conferences 218 (2020) : 02017. http://dx.doi.org/10.1051/e3sconf/202021802017.

Texte intégral
Résumé :
Lahos elders are outperformers among the old population, featuring good physical conditions, new ideas and strong consumption power. In the Internet age, Lahos elders boast tremendous market potential, and it is a focus of the old age market to grasp the market opportunities, explore consumption features, enrich the content of services and innovate on the service management modes. Lahos elders have large consumption needs, set store by socializing activities, and pursue quality in consumption. Innovative services that are characterized by mutual help, convenience, enrichment, education and sharing will become a dominating trend of the old age market.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Liang, Wei, Songyou Xie, Dafang Zhang, Xiong Li et Kuan-ching Li. « A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning ». ACM Transactions on Internet Technology 22, no 2 (31 mai 2022) : 1–20. http://dx.doi.org/10.1145/3426968.

Texte intégral
Résumé :
The Industrial Internet of Things ( IIoT ) is designed to refine and optimize the process controls, thereby leveraging improvements in economic benefits, such as efficiency and productivity. However, the Radio Frequency Identification ( RFID ) technology in an IIoT environment has problems such as low security and high cost. To overcome such issues, a mutual authentication scheme that is suitable for RFID systems, wherein techniques in Deep Learning ( DL ) are incorporated onto the Arbiter Physical Unclonable Function ( APUF ) for the secured access authentication of the IC circuits on the IoT, is proposed. The design applies the APUF-MPUF mutual authentication structure obtained by DL to generate essential real-time authentication information, thereby taking advantage of the feature that the tag in the PUF circuit structure does not need to store any essential information and resolving the problem of key storage. The proposed scheme also uses a bitwise comparison method, which hides the PUF response information and effectively reduces the resource overhead of the system during the verification process, to verify the correctness of the two strings. Security analysis demonstrates that the proposed scheme has high robustness and security against different conventional attack methods, and the storage and communication costs are 95.7% and 42.0% lower than the existing schemes, respectively.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Fukumoto, Michihisa, Kano Nakajima et Hiroki Takahashi. « Formation of LaNi5 Hydrogen Storage Alloy by Electrodeposition of La Using Molten Salt ». Coatings 12, no 9 (31 août 2022) : 1268. http://dx.doi.org/10.3390/coatings12091268.

Texte intégral
Résumé :
A hydrogen storage alloy was formed by electrodepositing La using a molten salt. La was electrodeposited using Ni as a substrate in NaCl-KCl-5.0 mol% LaF3 molten salt at electrodeposition temperatures of 750 °C and 900 °C. The electrodeposition potential was −2.25 V. The LaNi5 hydrogen storage alloy was then prepared by the electrodeposition of La and the mutual diffusion of the Ni substrate. As a result, it was clarified that La can be electrodeposited by using a molten salt. Single-phase LaNi5 was produced at 750 °C rather than at 900 °C. It became possible to uniformly form LaNi5, an intermetallic compound, on the substrate surface. The prepared hydrogen storage alloy was exposed to Ar-10%H2 to store hydrogen; at this time, hydrogen was stored by changing the sample temperature. The discharged hydrogen was measured by a gas sensor. It was clarified that the hydrogen storage and hydrogen discharge were the highest in the sample obtained by electrodepositing La for 1 h at 750 °C. LaNi5 formed by electrodeposition showed hydrogen storage properties, and this method was found to be effective even for samples with complex shapes.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Khan, Muhammad Nawaz. « Pakistan and Russia’s Convergence of Interests in the Emerging Geopolitical Environment ». Journal of Security & ; Strategic Analyses 8, no 2 (2 janvier 2023) : 27–52. http://dx.doi.org/10.57169/jssa.008.02.0191.

Texte intégral
Résumé :
The changing global environment has become an opportunity for Russia and Pakistan to redefine their relationship. Both countries believe in strong multilateralism as the way to go in foreign relations. They are quite conscious of peace and stability in the Eurasian region. Given the mutual benefits of fostering ties, Moscow and Islamabad are trying to move forward in three key broad areas where the convergence of interests is evident. They are emerging geopolitical and security milieus, geo-economic outlook and regional connectivity. Pakistan-Russia relations are set to exploit these realms and take them on an upward trajectory in years to come. In this paper, qualitative data has been dealt with analytically to identify how both countries could benefit from the changing strategic landscape to achieve these objectives. It pertains to the evolving geopolitical environment, inter-regional economic prospects, and emerging threats to regional stability (especially Afghanistan), which hold much in store for both in opting for a mutual course of action on regional and international fronts. The study explicitly examines the factors that may shape the commonality of interests in their foreign policy options.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Afifa Lufti Insani, Zamahsary Martha, Yenni Kurniawati et Zilrahmi. « Naive Bayes Classifier Method on Sentiment Analysis of Bibit Application Users in Play Store ». UNP Journal of Statistics and Data Science 1, no 5 (30 novembre 2023) : 420–25. http://dx.doi.org/10.24036/ujsds/vol1-iss5/102.

Texte intégral
Résumé :
The increasing public interest in investment and supported by technological advances has begun to appear investment applications in the community which aim to facilitate the public in making investments. One of the investment applications that is widely used today is the Bibit application. This application is widely used by novice investors because of its ease of opening accounts, disbursing funds, purchasing mutual funds and easy-to-understand application design. Because investment applications are still new to the community, there are still many people who doubt and worry about the quality of the Bibit application, marked by the number of reviews in the review column available on the play store. Reviews on the application become a forum for criticism and suggestions to the application and become one of the considerations for potential users. Because reviews can be positive or negative towards the Seedling application. Sentiment analysis is needed to analyze whether the sentiment tends to be positive or negative. Then, classification is carried out to obtain a classification model that can be used to predict user sentiment using the Naive Bayes Classifier method. The results obtained obtained seed application users tend to have positive sentiments with an accuracy value of 79.45%.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Fowler, Alison Margaret. « A Sampling Method for Quantifying the Information Content of IASI Channels ». Monthly Weather Review 145, no 2 (février 2017) : 709–25. http://dx.doi.org/10.1175/mwr-d-16-0069.1.

Texte intégral
Résumé :
There is a vast amount of information about the atmosphere available from instruments on board satellites. One example is the Infrared Atmospheric Sounding Interferometer (IASI) instrument, which measures radiances emitted from Earth’s atmosphere and surface in 8461 channels. It is difficult to transmit, store, and assimilate such a large amount of data. A practical solution to this has been to select a subset of a few hundred channels based on those that contain the most useful information. Different measures of information content for objective channel selection have been suggested for application to variational data assimilation. These include mutual information and the degrees of freedom for signal. To date, the calculation of these measures of information content has been based on the linear theory that is at the heart of operational variational data assimilation. However, the retrieval of information about the atmosphere from the satellite radiances can be highly nonlinear. Here, a sampling method for calculating the mutual information that is free from assumptions about the linearity of the relationship between the observed radiances and the state variables is examined. It is found that large linearization errors can indeed lead to large discrepancies in the value of mutual information. How this new estimate of information content can be used in channel selection is addressed, with particular attention given to the efficiency of the new method. It is anticipated that accounting for the nonlinearity in the channel selection will be beneficial when using nonlinear data assimilation methods currently in development.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Tasya, Tasya, et H. H. Daniel Tamburian. « Pengaruh Kredibilitas Raditya Dika terhadap Citra Merek Bibit ». Prologia 6, no 2 (2 novembre 2022) : 341–48. http://dx.doi.org/10.24912/pr.v6i2.15548.

Texte intégral
Résumé :
Digital investment trends are increasingly in demand by millennials who are new to financial literacy. Bibit are here to help novice investors who just want to start investing. Bibit, which was built in 2019, has become the most downloaded mutual fund investment application on the Apps Store and Google Play with 1 million downloads in 2020. The formation of the Bibit brand image as the best and most trusted mutual fund investment application is carried out by using a brand ambassador. Bibit chose Raditya Dika to be the brand ambassador for the Bibit application. The credibility of a Raditya Dika is believed to be able to influence the public's perception of the Bibit brand image. This study examines the influence of Raditya Dika's credibility on the brand image of Bibit. The purpose of this quantitative research is to find out the influence of Raditya Dika's credibility on the Brand Image of Bibit through a survey method. The population used is 100 millennial generation respondents who are Instagram followers and Bibit users. The results found by the researchers stated that Raditya Dika's credibility on the brand image of Bibit had a significant influence. Tren investasi digital semakin diminati oleh generasi milenial yang baru melek finansial. Bibit hadir untuk membantu investor pemula yang baru ingin memulai investasi tersebut. Bibit yang dibangun pada tahun 2019 menjadi aplikasi investasi reksadana paling banyak diunduh di Apps Store dan Google Play sebanyak satu juta pengunduh pada tahun 2020. Pembentukan citra merek Bibit sebagai aplikasi investasi reksadana terbaik dan terpercaya dilakukan dengan pemanfaatan brand ambassador. Bibit memilih Raditya Dika menjadi brand ambassador aplikasi Bibit. Kredibilitas seorang Raditya Dika dipercayai dapat mempengaruhi persepsi masyarakat terhadap citra merek Bibit. Penelitian ini meneliti pengaruh kredibilitas Raditya Dika terhadap Citra Merek Bibit. Tujuan penelitian kuantitatif ini adalah mencari pengaruh kredibilitas Raditya Dika terhadap Citra Merek Bibit melalui metode survei. Populasi yang digunakan yaitu 100 responden generasi milenial yang menjadi pengikut Instagram dan pengguna Bibit. Hasil penelitian menunjukkan bahwa kredibilitas Raditya Dika memengaruhi citra merek Bibit memiliki pengaruh yang signifikan.
Styles APA, Harvard, Vancouver, ISO, etc.
28

LIASHEVSKA, Viktoriia, et Nani DAVIDENKO. « ESTABLISHMENT OF ELECTRONIC COMMERCE AT THE ENTERPRISE ». Herald of Khmelnytskyi National University. Economic sciences 308, no 4 (28 juillet 2022) : 192–96. http://dx.doi.org/10.31891/2307-5740-2022-308-4-30.

Texte intégral
Résumé :
The study is devoted to the analysis of the state of e-commerce in enterprises. The article considers different approaches to understanding e-commerce as a component of e-business. An attempt is made to determine the place of e-commerce in the formation of the competitiveness of the enterprise. The advantages of using e-commerce for the company are provided, which include: cost reduction, coverage of a larger market segment and others. The advantages that appear to the consumer include: ease of finding stores online; the ability to obtain information about the entire range of the store without the help of a worker; possibility to receive the order at home; round-the-clock loyalty of the store; comparison of prices and quality of goods in different stores at home. Approaches to understanding the essence of e-commerce as a component of business education are considered. The existing models of e-business and their characteristics are given, namely: B2B, B2C, B2A, C2A, C2C. The article also identifies the functions and processes that include e-commerce, which include: ordering catalogs and price lists; connection of Internet applications with the internal system of office work; self-registration of consumers; the possibility of selling goods of different categories via the Internet; order processing according to the standard scheme; making online payments. The trend of growth of e-sales sales for 2018-2020 is illustrated, which indicates an increase in the number of people who use the services of e-commerce companies. Four levels of mutual relations of participants of trade processes and influence of their definition on production activity are resulted. The paper presents a list of disadvantages of using e-commerce for the consumer, which include the security of personal data, the possibility of fraud and others, as well as for the manufacturer, namely: high competition in the market, the possibility of the consumer. fraud, as well as the need for a longer analysis of all performance indicators on the site. The influence of the current state of introduction of e-commerce in the activity of the enterprise on the possible level of potential of development and increase of production indicators is analyzed.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Afebende, Ph.D, Godwin B. « Transformation of Institutional Repositories and the Knowledge Economy : The Imperatives of Knowledge Management in Libraries ». Journal of Education, Teaching and Social Studies 2, no 3 (24 août 2020) : p66. http://dx.doi.org/10.22158/jetss.v2n3p66.

Texte intégral
Résumé :
There is mutual intercourse between traditional roles of libraries and knowledge management practices which are concerned with how organisations track, measure, evaluate, share and make use of both tangible and intangible assets to meet their institutional or organizational demands. The establishment of institutional or knowledge repositories is a response to the demands and realities of acquiring , deploying and using new technologies and strategies to create , document , store , disseminate and reuse information to advance organizational objectives and mission. This paper discusses concepts of transformation, knowledge, knowledge management and the knowledge economy. It also touches on how knowledge is managed, paying specific attention to the role of libraries and librarians in knowledge management. Critical factor of IT/IT-based skills and funding are discussed as vital in achieving its success.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Syukron, Syukron. « Aplikasi Perpustakaan On-line : (Kajian Awal Layanan On-line Perpustakaan Perguruan Tinggi Menggunakan Aplikasi Go-jek©) ». Berkala Ilmu Perpustakaan dan Informasi 12, no 1 (20 septembre 2016) : 62. http://dx.doi.org/10.22146/bip.13044.

Texte intégral
Résumé :
Library is an information resource centre that provides intangible services. Library is also known as a not-for-profit-organization that provides places for reading. Libraries in Indonesia have not been professionally administered. But now library institutions at all levels, including those at the academic institutions, begin to revamp, continue the scientific tradition, develop the nation's civilization to save and store book collection in various subjects and languages with the help if information and communication technologies (ICT). The study explores the potentials that can be collaborated between library services and its information strength and the networked application such go-jek. The author identified the correlation between go-jek application model and academic library services. The study showed there was mutual need for both sides that could be collaborated.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Kamola, Mariusz. « Internet of Things with Lightweight Identities Implemented Using DNS DANE—Architecture Proposal ». Sensors 18, no 8 (1 août 2018) : 2517. http://dx.doi.org/10.3390/s18082517.

Texte intégral
Résumé :
Domain Name Service (DNS) and its certification related resource records are appealing alternative to the standard X.509 certification framework, in provision of identities for Internet of Things (IoT) smart devices. We propose to also use DNS to store device owner identification data in device certificates. A working demonstration software has been developed as proof of this concept, which uses an external identity provider run by national authorities. As a result, smart devices are equipped with certificates that safely identify both the device and its owner. Hardware requirements make such a framework applicable to constrained devices. It stimulates mutual trust in machine-to-machine and man-to-machine communication, and creation of a friendlier environment for sale, lease, and data exchange. Further extensions of the proposed architecture are also discussed.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Cui, Jian Guo, Kang Yi Fu, Yi Wen Qi, Li Ying Jiang et Hai Gang Liu. « Integrated Support Decision of Aircraft Hydraulic System Based on Sequence Operation Theory ». Applied Mechanics and Materials 385-386 (août 2013) : 176–79. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.176.

Texte intégral
Résumé :
There is a great deal of uncertainty in spare parts inventory support process of aircraft hydraulic system, which cause its support decision difficult. Built integrated support decision model of the spare parts inventory based on sequence operation theory. Regard the quantity of the spare parts demand, maintenance and store as one-dimensional discrete random variable, analyzing the mutual effect among the random events utilizing addition type convolution, subtraction type convolution, and type product, thus give a dynamic description of the spare parts inventory integrated support process. Provide optimal decision basis for the spare parts inventory integrated support of aircraft hydraulic system. Results of the experimental indicated that the result of the support decision modeling consistent with the actual demand and the support decision model proved to be validated.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Baashirah, Rania, et Abdelshakour Abuzneid. « SLEC : A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography ». Electronics 8, no 10 (15 octobre 2019) : 1166. http://dx.doi.org/10.3390/electronics8101166.

Texte intégral
Résumé :
Internet of Things (IoT) is a new paradigm that has been evolving into the wireless sensor networks to expand the scope of networked devices (or things). This evolution drives communication engineers to design secure and reliable communication at a low cost for many network applications such as radio frequency identification (RFID). In the RFID system, servers, readers, and tags communicate wirelessly. Therefore, mutual authentication is necessary to ensure secure communication. Normally, a central server supports the authentication of readers and tags by distributing and managing the credentials. Recent lightweight RFID authentication protocols have been proposed to satisfy the security features of RFID networks. Using a serverless RFID system is an alternative solution to using a central server. In this model, both the reader and the tag perform mutual authentication without the need for the central server. However, many security challenges arise from implementing lightweight authentication protocols in serverless RFID systems. We propose a new secure serverless RFID authentication protocol based on the famous elliptic curve cryptography (ECC). The protocol also maintains the confidentiality and privacy of the messages, tag information, and location. Although most of the current serverless protocols assume secure channels in the setup phase, we assume an insecure environment during the setup phase between the servers, readers, and tags. We ensure that the credentials can be renewed by any checkpoint server in the mobile RFID network. Thus, we implement ECC in the setup phase (renewal phase), to transmit and store the communication credentials of the server to multiple readers so that the tags can perform the mutual authentication successfully while far from the server. The proposed protocol is compared with other serverless frameworks proposed in the literature in terms of computation cost and attacks resistance.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Cubitt, Sean. « Ecocritical Media Arts and the War on Terra ». Media-N 17, no 2 (26 octobre 2021) : 27–38. http://dx.doi.org/10.21900/j.median.v17i2.761.

Texte intégral
Résumé :
Ecocritique accepts, as it must, that humans and environments have been ripped apart historically, sociologically, and aesthetically. But it also recognizes that because we have become strangers, dialogue between humans and environments is possible as it could not be if we were all one universal flux. Because of our mutual alienation, there are endless opportunities for misunderstanding when we capture, store, and process what we confront as Nature. Contemporary economic and political conditions driving ever more terrifying inequalities of wealth and power create the crisis implicit in ecocritique. The critical functions of art, which in these circumstances implies technical and creative aesthetic and political practice, concern the construction of a “we” that embraces the human and non- human victims of ecocide. The master’s tools might dismantle the master’s house, but can they build a different dwelling? Where are the practices that can produce more-than- human social change?
Styles APA, Harvard, Vancouver, ISO, etc.
35

Till, Andreas, Charlotte Fries et Wiebke K. Fenske. « Brain-to-BAT - and Back ? : Crosstalk between the Central Nervous System and Thermogenic Adipose Tissue in Development and Therapy of Obesity ». Brain Sciences 12, no 12 (1 décembre 2022) : 1646. http://dx.doi.org/10.3390/brainsci12121646.

Texte intégral
Résumé :
The body of mammals harbors two distinct types of adipose tissue: while cells within the white adipose tissue (WAT) store surplus energy as lipids, brown adipose tissue (BAT) is nowadays recognized as the main tissue for transforming chemical energy into heat. This process, referred to as ‘non-shivering thermogenesis’, is facilitated by the uncoupling of the electron transport across mitochondrial membranes from ATP production. BAT-dependent thermogenesis acts as a safeguarding mechanism under reduced ambient temperature but also plays a critical role in metabolic and energy homeostasis in health and disease. In this review, we summarize the evolutionary structure, function and regulation of the BAT organ under neuronal and hormonal control and discuss its mutual interaction with the central nervous system. We conclude by conceptualizing how better understanding the multifaceted communicative links between the brain and BAT opens avenues for novel therapeutic approaches to treat obesity and related metabolic disorders.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Sailaja, B., K. Meghana, Damayanthi S. Harika, S. Sandhya et Sushma V. Satya. « Secure multimedia data transfer using crypto and stegano algorithms ». i-manager’s Journal on Software Engineering 16, no 4 (2022) : 9. http://dx.doi.org/10.26634/jse.16.4.18820.

Texte intégral
Résumé :
Recent developments in Steganalysis have made it difficult to secure personal content, messages, or digital images using steganography. Using Steganalysis can easily reveal the presence of hidden information in storage files. This paper presents a new Steganographic approach to communication between two individuals. The approach presented in this paper uses both Steganographic and cryptographic methods. Cryptography uses Rivest–Shamir–Adleman (RSA) and Steganography use image Steganography to hide data. It also uses the mutual authentication process to satisfy all services in the field of cryptography, i.e., access control, confidentiality, integrity, and authentication. In this way, it can store data more securely. Since it uses the RSA algorithm to protect the data again, it performs Steganography to hide the data in the image. Thus, any other person on the network cannot access the data present on the network. Only the sender and receiver can extract the message from the data.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Talaki, Ezinam Bertrand, Olivier Savry, Mathieu Bouvier Des Noes et David Hely. « A Memory Hierarchy Protected against Side-Channel Attacks ». Cryptography 6, no 2 (20 avril 2022) : 19. http://dx.doi.org/10.3390/cryptography6020019.

Texte intégral
Résumé :
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valuable element to protect against information theft. Many first-order side-channel attacks have been reported on all its components from the main memory to the CPU registers. In this context, memory hierarchy encryption is widely used to ensure data confidentiality. Yet, this solution suffers from both memory and area overhead along with performance losses (timing delays), which is especially critical for cache memories that already occupy a large part of the spatial footprint of a processor. In this paper, we propose a secure and lightweight scheme to ensure the data confidentiality through the whole memory hierarchy. This is done by masking the data in cache memories with a lightweight mask generator that provides masks at each clock cycle without having to store them. Only 8-bit Initialization Vectors are stored for each mask value to enable further recomputation of the masks. The overall security of the masking scheme is assessed through a mutual information estimation that helped evaluate the minimum number of attack traces needed to succeed a profiling side-channel attack to 592 K traces in the attacking phase, which provides an acceptable security level in an analysis where an example of Signal to Noise Ratio of 0.02 is taken. The lightweight aspect of the generator has been confirmed by a hardware implementation that led to resource utilization of 400 LUTs.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Baloch, Marya, Mikel Alberro et Jalel Labidi. « Electrochemical Activity of Lignin Based Composite Membranes ». Polymers 13, no 4 (21 février 2021) : 643. http://dx.doi.org/10.3390/polym13040643.

Texte intégral
Résumé :
Our society’s most pressing challenges, like high CO2 emission and the constant battle against energy poverty, require a clean and easier solution to store and utilize the renewable energy resources. However, recent electrochemical components are expensive and harmful to the environment, which restricts their widespread deployment. This study proposes an easy method to synthesize and fabricate composite membranes with abundantly found biomass lignin polymer to replace conventional costly and toxic electrode materials. Easier manipulation of lignin within the polymeric matrix could provide the improved composite to enhance its electrochemical activity. Our major focus is to activate the quinone moiety via oxidation in the polymeric mixture using a strong ionic acid. The physico-chemical and electrochemical characterizations of two different lignins within varied polymeric mixture compositions have been carried out to confirm that the redox properties of pure unmodified lignin could be achieved via intrinsic mutual sharing of the structural properties and intercross linkage leading to improved integrity and redox activity/conductivity.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Kirschen, Matthew P., Mathew S. Davis-Ratner, Thomas E. Jerde, Pam Schraedley-Desmond et John E. Desmond. « Enhancement of Phonological Memory Following Transcranial Magnetic Stimulation (TMS) ». Behavioural Neurology 17, no 3-4 (2006) : 187–94. http://dx.doi.org/10.1155/2006/469132.

Texte intégral
Résumé :
Phonologically similar items (mell, rell, gell) are more difficult to remember than dissimilar items (shen, floy, stap), likely because of mutual interference of the items in the phonological store. Low-frequency transcranial magnetic stimulation (TMS), guided by functional magnetic resonance imaging (fMRI) was used to disrupt this phonological confusion by stimulation of the left inferior parietal (LIP) lobule. Subjects received TMS or placebo stimulation while remembering sets of phonologically similar or dissimilar pseudo-words. Consistent with behavioral performance of patients with neurological damage, memory for phonologically similar, but not dissimilar, items was enhanced following TMS relative to placebo stimulation. Stimulation of a control region of the brain did not produce any changes in memory performance. These results provide new insights into how the brain processes verbal information by establishing the necessity of the inferior parietal region for optimal phonological storage. A mechanism is proposed for how TMS reduces phonological confusion and leads to facilitation of phonological memory.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Kumar, N. Senthil, et Dinakaran Muruganantham. « Disambiguating the Twitter Stream Entities and Enhancing the Search Operation Using DBpedia Ontology ». International Journal of Information Technology and Web Engineering 11, no 2 (avril 2016) : 51–62. http://dx.doi.org/10.4018/ijitwe.2016040104.

Texte intégral
Résumé :
The web and social web is holding the huge amount of unstructured data and makes the searching processing more cumbersome. The principal task here is to migrate the unstructured data into the structured data through the appropriate utilization of named entity detections. The goal of the paper is to automatically build and store the deep knowledge base of important facts and construct the comprehensive details about the facts such as its related named entities, its semantic classes of the entities and its mutual relationship with its temporal context can be thoroughly analyzed and probed. In this paper, the authors have given and proposed the model to identify all the major interpretations of the named entities and effectively link them to the appropriate mentions of the knowledge base (DBpedia). They finally evaluate the approaches that uniquely identify the DBpedia URIs of the selected entities and eliminate the other candidate mentions of the entities based on the authority rankings of those candidate mentions.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Pardeshi, Mayuresh, Ruey-Kai Sheu et Shyan-Ming Yuan. « Hash-Chain Fog/Edge : A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge ». Sensors 22, no 2 (13 janvier 2022) : 607. http://dx.doi.org/10.3390/s22020607.

Texte intégral
Résumé :
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there have been several years of growing concerns regarding their security. Therefore, a novel model is designed that is stronger and effective against any kind of unauthorized attack, as IoT devices’ vulnerability is on the rise due to the mass production of IoT devices (embedded processors, camera, sensors, etc.), which ignore the basic security requirements (passwords, secure communication), making them vulnerable and easily accessible. Furthermore, crackable passwords indicate that the security measures taken are insufficient. As per the recent studies, several applications regarding its requirements are the IoT distributed denial of service attack (IDDOS), micro-cloud, secure university, Secure Industry 4.0, secure government, secure country, etc. The problem statement is formulated as the “design and implementation of dynamically interconnecting fog servers and edge devices using the mode-based hash chain for secure mutual authentication protocol”, which is stated to be an NP-complete problem. The hash-chain fog/edge implementation using timestamps, mode-based hash chaining, the zero-knowledge proof property, a distributed database/blockchain, and cryptography techniques can be utilized to establish the connection of smart devices in large numbers securely. The hash-chain fog/edge uses blockchain for identity management only, which is used to store the public keys in distributed ledger form, and all these keys are immutable. In addition, it has no overhead and is highly secure as it performs fewer calculations and requires minimum infrastructure. So, we designed the hash-chain fog/edge (HCFE) protocol, which provides a novel mutual authentication scheme for effective session key agreement (using ZKP properties) with secure protocol communications. The experiment outcomes proved that the hash-chain fog/edge is more efficient at interconnecting various devices and competed favorably in the benchmark comparison.
Styles APA, Harvard, Vancouver, ISO, etc.
42

OSAWA, Shuji, Makoto FUJIU et Junichi TAKAYAMA. « BASIC ANALYSIS ON POSSIBILITY OF SELF-HELP AND MUTUAL ASSISTANCE AIMED ON FOOD WHICH EXISTS FROM PEACE-TIME AT HOME AND RETAIL STORE ». Journal of Japan Society of Civil Engineers, Ser. A1 (Structural Engineering & ; Earthquake Engineering (SE/EE)) 75, no 4 (2019) : I_621—I_638. http://dx.doi.org/10.2208/jscejseee.75.i_621.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Chandrasekaran, Karthikeyan. « Functioning of an Android app “TNAU Paddy Expert System” and its User’s Feedback Sentiment Analysis ». Indian Research Journal of Extension Education 22, no 2 (1 avril 2022) : 113–21. http://dx.doi.org/10.54986/irjee/2022/apr_jun/113-121.

Texte intégral
Résumé :
TNAU paddy expert system app is a system that links people and institutions to promote mutual learning and utilize agriculture-related technologies, knowledge and information. The present study expounded the functions of an android app “TNAU paddy expert system”, also it was intended to fi nd out the nature of feedbacks provided by the TNAU paddy expert system app users and to foster the application more for eff ective usage through the feedbacks provided by the users. The feedback and ratings were collected from the TNAU Paddy expert system app (both in English and Tamil version) page in the open-source platform viz., Google play store, a total of 63 reviews and 109 users’ ratings were collected from the application interface present in the Google play store to fi nd out the nature of feedback and the level of satisfaction of the users. Sentiment analysis was carried out with the help of ‘MS Excel 365’ and ‘azure machine learning’ softwares. Then the data was also subjected to factor analysis with the help of Statistical Package for Social Sciences (SPSS) 16.0, to fi nd out the major opinions that were expressed by the TNAU Paddy expert system app users. TNAU Paddy expert system app was the application of scientifi c research which imparts the scientifi cally proven paddy technologies and agricultural practices for the betterment of the farming community, that aids farmers to make right decisions at the needed time and through crop doctor component it helps them by protecting their crop and reducing the time and cost.
Styles APA, Harvard, Vancouver, ISO, etc.
44

LEE, WEN-SHIUNG. « A NEW HYBRID MCDM MODEL COMBINING DANP WITH VIKOR FOR THE SELECTION OF LOCATION — REAL ESTATE BROKERAGE SERVICES ». International Journal of Information Technology & ; Decision Making 13, no 01 (janvier 2014) : 197–224. http://dx.doi.org/10.1142/s0219622014500333.

Texte intégral
Résumé :
Real estate brokerage services have developed from individual stores into a chain-store system, and the location of those stores plays a key role in their operation. The purpose of this study is to define and quantify the factors that affect the selection of a site for real estate brokerage services. Mutual relationships between the factors and sub-factors for site selection and their relative weights are also discussed to provide a complete set of decision evaluation models, then how to reduce the gaps to achieve the aspiration level. This research uses a new hybrid Multiple Criteria Decision Making (MCDM) model, combining the Decision Making Trial and Evaluation Laboratory (DEMATEL), DEMATEL-based Analytic Network Process (DANP), and VIšekriterijumsko KOmpromisno Rangiranje (VIKOR) methods to solve these problems. The DEMATEL technique is used to build an influential network relations map, and DANP is expected to obtain the influential weights using the basic concept of Analytic Network Process (ANP), to solve the dependence and feedback problems in the real world. Then, the VIKOR method is used to integrate the performance gaps from criteria to dimensions and overall. As the result shows, there is an interactive and auto-feedback relationship among the four dimensions. Among the 11 evaluation criteria, the income and consumption level is the most important consideration for selection of the site. The number and density of population ranks second in this regard. This study uses VIKOR method for selection of the best site, among three potential sites. Site A is closest to the aspiration level. Site A is better in this regard than the other two sites. The study develops and provides a decision-making system for the site selection in the real estate brokerage services.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Kim, MyeongHyun, SungJin Yu, JoonYoung Lee, YoHan Park et YoungHo Park. « Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain ». Sensors 20, no 10 (21 mai 2020) : 2913. http://dx.doi.org/10.3390/s20102913.

Texte intégral
Résumé :
In the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are difficult to share on the different medical platforms. Recently, blockchain technology is one of the popular alternatives to enable medical service centers based on different platforms to share EHRs. However, it is hard to store whole EHR data in blockchain because of the size and the price of blockchain. To resolve this problem, cloud computing is considered as a promising solution. Cloud computing offers advantageous properties such as storage availability and scalability. Unfortunately, the EHR system with cloud computing can be vulnerable to various attacks because the sensitive data is sent over a public channel. We propose the secure protocol for cloud-assisted EHR system using blockchain. In the proposed scheme, blockchain technology is used to provide data integrity and access control using log transactions and the cloud server stores and manages the patient’s EHRs to provide secure storage resources. We use an elliptic curve cryptosystems (ECC) to provide secure health data sharing with cloud computing. We demonstrate that the proposed EHR system can prevent various attacks by using informal security analysis and automated validation of internet security protocols and applications (AVISPA) simulation. Furthermore, we prove that the proposed EHR system provides secure mutual authentication using BAN logic analysis. We then compare the computation overhead, communication overhead, and security properties with existing schemes. Consequently, the proposed EHR system is suitable for the practical healthcare system considering security and efficiency.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Hmamouche, Youssef, Lotfi Lakhal et Alain Casali. « A scalable framework for large time series prediction ». Knowledge and Information Systems 63, no 5 (5 février 2021) : 1093–116. http://dx.doi.org/10.1007/s10115-021-01544-w.

Texte intégral
Résumé :
AbstractKnowledge discovery systems are nowadays supposed to store and process very large data. When working with big time series, multivariate prediction becomes more and more complicated because the use of all the variables does not allow to have the most accurate predictions and poses certain problems for classical prediction models. In this article, we present a scalable prediction process for large time series prediction, including a new algorithm for identifying time series predictors, which analyses the dependencies between time series using the mutual reinforcement principle between Hubs and Authorities of the Hits (Hyperlink-Induced Topic Search) algorithm. The proposed framework is evaluated on 3 real datasets. The results show that the best predictions are obtained using a very small number of predictors compared to the initial number of variables. The proposed feature selection algorithm shows promising results compared to widely known algorithms, such as the classic and the kernel principle component analysis, factor analysis, and the fast correlation-based filter method, and improves the prediction accuracy of many time series of the used datasets.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Boqing Feng, Boqing Feng, Mohan Liu Boqing Feng et Jiuqiang Jin Mohan Liu. « Density Space Clustering Algorithm Based on Users Behaviors ». 電腦學刊 33, no 2 (avril 2022) : 201–9. http://dx.doi.org/10.53106/199115992022043302018.

Texte intégral
Résumé :
<p>At present, insider threat detection requires a series of complex projects, and has certain limitations in practical applications; in order to reduce the complexity of the model, most studies ignore the timing of user behavior and fail to identify internal attacks that last for a period of time. In addition, companies usually categorize the behavior data generated by all users and store them in different databases. How to collaboratively process large-scale heterogeneous log files and extract characteristic data that accurately reflects user behavior is a difficult point in current research. In order to optimize the parameter selection of the DBSCAN algorithm, this paper proposes a Psychometric Data & Attack Threat Density Based Spatial Clustering of Applications with Noise algorithm (PD&AT-DBSCAN). This algorithm can improve the accuracy of clustering results. The simulation results show that this algorithm is better than the traditional DBSCAN algorithm in terms of Rand index and normalized mutual information.</p> <p>&nbsp;</p>
Styles APA, Harvard, Vancouver, ISO, etc.
48

Boqing Feng, Boqing Feng, Mohan Liu Boqing Feng et Jiuqiang Jin Mohan Liu. « Density Space Clustering Algorithm Based on Users Behaviors ». 電腦學刊 33, no 2 (avril 2022) : 201–9. http://dx.doi.org/10.53106/199115992022043302018.

Texte intégral
Résumé :
<p>At present, insider threat detection requires a series of complex projects, and has certain limitations in practical applications; in order to reduce the complexity of the model, most studies ignore the timing of user behavior and fail to identify internal attacks that last for a period of time. In addition, companies usually categorize the behavior data generated by all users and store them in different databases. How to collaboratively process large-scale heterogeneous log files and extract characteristic data that accurately reflects user behavior is a difficult point in current research. In order to optimize the parameter selection of the DBSCAN algorithm, this paper proposes a Psychometric Data & Attack Threat Density Based Spatial Clustering of Applications with Noise algorithm (PD&AT-DBSCAN). This algorithm can improve the accuracy of clustering results. The simulation results show that this algorithm is better than the traditional DBSCAN algorithm in terms of Rand index and normalized mutual information.</p> <p>&nbsp;</p>
Styles APA, Harvard, Vancouver, ISO, etc.
49

Nacházel, Tomáš, František Babič, Marco Baiguera, Pavel Čech, Martina Husáková, Peter Mikulecký, Karel Mls et al. « Tsunami-Related Data : A Review of Available Repositories Used in Scientific Literature ». Water 13, no 16 (9 août 2021) : 2177. http://dx.doi.org/10.3390/w13162177.

Texte intégral
Résumé :
Various organizations and institutions store large volumes of tsunami-related data, whose availability and quality should benefit society, as it improves decision making before the tsunami occurrence, during the tsunami impact, and when coping with the aftermath. However, the existing digital ecosystem surrounding tsunami research prevents us from extracting the maximum benefit from our research investments. The main objective of this study is to explore the field of data repositories providing secondary data associated with tsunami research and analyze the current situation. We analyze the mutual interconnections of references in scientific studies published in the Web of Science database, governmental bodies, commercial organizations, and research agencies. A set of criteria was used to evaluate content and searchability. We identified 60 data repositories with records used in tsunami research. The heterogeneity of data formats, deactivated or nonfunctional web pages, the generality of data repositories, or poor dataset arrangement represent the most significant weak points. We outline the potential contribution of ontology engineering as an example of computer science methods that enable improvements in tsunami-related data management.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Novakovskaia, iuliia Vadimovna. « What kind of education do we need ? » Moscow University Pedagogical Education Bulletin, no 1 (30 mars 2013) : 13–30. http://dx.doi.org/10.51314/2073-2635-2013-1-13-30.

Texte intégral
Résumé :
The essence of a human being is the creative potential that should be developed by the educational system. A person should be taught how to generalize and critically analyze the information rather than mechanically store it in mind. The system of unitary state examination is fundamentally incompatible with the task. The classical educational system should be preserved, but the subject syllabuses and programs should be modified so that unique scientifically correct methodical approaches form the basis of teaching and common textbooks, which should satisfy three main criteria, namely, the logical construction and description, the presence of examples of modern discoveries and achievements, and the illustration of mutual relations between diverse fields of knowledge. It should be taken into account that information technology can serve as the engine of progress and, at the same time, promote the degradation of the intellectual faculties of a human. The basic condition of the creation and development of cultured and well-educated community is the state ideology based on morale rather than enrichment cult.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie