scholarly journals Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators’ Self-Assessment Errors

2019 ◽  
Vol 2019 ◽  
pp. 1-8
Author(s):  
Mariusz Kamola

Interdependency of critical digital services can be modeled in the form of a graph with exactly known structure but with edge weights subject to estimation errors. We use standard and custom centrality indexes to measure each service vulnerability. Vulnerability of all nodes in the graph gets aggregated in a number of ways into a single network vulnerability index for services whose operation is critical for the state. This study compares sensitivity of various centralities combined with various aggregation methods to errors in edge weights reported by service operators. We find that many of those combinations are quite robust and can be used interchangeably to reflect various perceptions of network vulnerability. We use graphs of source files’ dependencies for a number of open-source projects, as a good analogy for real critical services graph, which will remain confidential.

Author(s):  
Seong Yun Cho ◽  
Hyung Keun Lee ◽  
Hung Kyu Lee

In this paper, performance of the initial fine alignment for the stationary nonleveling strapdown inertial navigation system (SDINS) containing low-grade gyros is analyzed. First, the observability is analyzed by conducting a rank test of an observability matrix and by investigating the normalized error covariance of the extended Kalman filter based on the ten-state model. The results show that the accelerometer biases on horizontal axes are unobservable. Second, the steady-state estimation errors of the state variables are derived using the observability equation. It is verified that the estimates of the state variables have errors due to the unobservable state variables and nonleveling attitude angles of a vehicle containing the SDINS. Especially, this paper shows that the larger the attitude angles of the vehicle are, the greater the estimation errors are. Finally, it is shown that the performance of the eight-state model excluding the two unobservable state variables is better than that of the ten-state model in the fine alignment by a Monte Carlo simulation.


2009 ◽  
Vol 78 (7) ◽  
pp. 457-472 ◽  
Author(s):  
Balaji Janamanchi ◽  
Evangelos Katsamakas ◽  
Wullianallur Raghupathi ◽  
Wei Gao

2019 ◽  
Vol 1 (2) ◽  
Author(s):  
Marina Rúbia Mendonça Lôbo De Carvalho ◽  
Andressa Guimarães Freire

<p>Os atos, condutas e comportamentos do Poder Público gozam de presunção de legitimidade, gerando, em diversas situações, expectativas nos indivíduos. Pode o Estado, no uso de suas prorrogativas, violar aquelas expectativas, causando efeitos negativos à ordem econômica, por despertarem desconfiança e instabilidade nas relações com o Poder Público. Delimitada a ênfase do presente trabalho à função administrativa do Estado, visou-se compreender o princípio da proteção da confiança como instrumento de tutela da expectativa legítima do indivíduo, por impor limites à Administração Pública na anulação de atos administrativos. Nessa situação, viu-se que referido princípio pode conflitar com a legalidade e a autotutela, sendo o caso de se buscar um juízo de ponderação, que resultará na manutenção do ato ou na sua anulação, esta podendo ser com efeitos <em>ex tunc</em>, com efeitos <em>ex nunc</em> ou com a modulação temporal dos efeitos para um determinado momento futuro.</p><p> </p><p>The acts, practices and behaviors of the Public Power in the exercise of legitimation, can generate, in several situations, expectations in individuals. The Estate, in use of its prerogatives, can breach expectations, generating a negative economic response, lack of confidence and instability in its relations. Thus, the principle of protection defends the preservations of these state acts, which effects extend in time, giving the individual an expectation of continuity, even if they are illegal or unconstitutional. Delimiting the emphasis of the present work on the administrative function of the State, it was intended to understand the principle of the protection of trust as an instrument to protect the legitimate expectation of the individual, for imposing limits to the Public Administration in the annulment of administrative acts. In this situation, it was seen that this principle may conflict with legality and self-assessment, being the case of seeking a weighing judgment, which will result in the maintenance of the act or its annulment, this being possible with the temporal modulation of the effects for a certain future moment.</p><p> </p><p> </p>


2018 ◽  
Vol 1 (2) ◽  
Author(s):  
Agista Ayu Aksari

On 1st July 2012 SOE (State-Owned Enterprises)become the Value Added Tax (VAT) collector. According to the regulation of the Ministher of Finance No.85/PMK.03/2012 about the appointment of the State Owned Enterprises to collect, deposit and reporting Value Added Tax (VAT) and Sales Tax on Luxurious Goods, and precedures for collecting, depositing and reporting. The purpose of this research is to determine the difference between SOE as a Value Added Tax collector and not as a Value Added Tax collector.The object of this research is PT Pelabuhan Indonesia III cabang Benoa. The data analysis in this research is to analyze the calculation and reportig of VAT before being VAT collector and when it became VAT collector.The result of this research it is known that are the application of the value added tax on PT Pelabuhan Indonesia III Cabang Benoa before becoming tax collector is charged directly by fiskus and has official assessment system and as a PT Pelabuhan Indonesia III Cabang Benoa has a self assessment system whereby PT Pelabuahan Indonesia III Cabang Benoa became ILL wapu. Differnce in PT Pelabuhan Indonesia III Cabang Benoa as a collector, and the collector Is a time before becoming a collector has aself just my assessment system whereas before becoming a collector has official assessment system. Tax eceipt when it became a collector of VAT using duplicate counts 3 before becoming a collector only uses 2 of the double. For SSp before becoming a duplicate while using 4 collector as a collector to use duplicate. DOI 10.5281/zenodo.1214932


2019 ◽  
Vol 14 (1) ◽  
pp. 60-67 ◽  
Author(s):  
Sambit Priyadarshi ◽  
S. N. Ojha ◽  
Arpita Sharma

A study was conducted in Odisha, a state on the east coast of India, with the objective of assessing the vulnerability of fishers’ livelihood to climate change. The state was chosen for study since it is considered as one of the most vulnerable states due to climate change. A total of 120 fishers were interviewed from two districts, Balasore and Ganjam, to assess their livelihood vulnerability by considering their exposure, sensitivity and adaptive capacity to climate change. A composite livelihood vulnerability index by suggesting that fishers are vulnerable to climate change. For fishers of + 0.03 and for Ganjam it was 0.5 minima 0, and maxima 1 was used for the purpose. Baleswar the score was 0.56 0.04, s. The aggregated vulnerability score was found to be 0.54+The composite livelihood vulnerability index approach calculates vulnerability by aggregating data for a set of indicators for the components of vulnerability which include exposure, sensitivity, and adaptive capacity + 0.04. Vulnerability score was relatively higher in Baleswar due to higher scores on the exposure and sensitivity parameters overshadowing the higher adaptive capacity. The study shows evidence that marine fishers of Odisha are vulnerable to climate change. Also, it throws light on the location and context specificity of livelihood vulnerability.


2012 ◽  
Vol 5 (1) ◽  
pp. 101
Author(s):  
Supriyanto Supriyanto

This classroom action research was aimed at improving students’ learning activities and students’ English dialog skills in the state senior high school 3 Salatiga. The research was carried out in the state senior high school 3 Salatiga from January to June 2012. The subject of the research was 38 students of grade XI natural science 2. While the objects of research were  rummy game method, students’ learning activities and students’ English dialog skills. This action research was conducted in two cycles. Each consisted of planning, acting, observing, and reflecting. In cycle 1, the researcher implemented  rummy game method with big groups and ready made cards while in cycle 2, the researcher applied  rummy game method with small groups and student designed cards. To collect the data the researcher gave self-assessment test and performance test before the first cycle, after the first cycle, and after the second cycle. The data analysis was done by descriptive comparison namely by comparing scores in the previous condition with those of the first cycle and the second cycle. The research findings revealed that there was significant improvement of average scores in students’ learning activities namely 13.8 % from 56.8 % in the previous condition to 70.6 % in cycle 2 and in students’ English dialog skill namely 5.8 from 72.7 in the previous condition to 78.5 in cycle 2. Hence, hypothesis stating that using  rummy game method is able to improve students’ learning activities and English dialog skill in the state senior high school 3 Salatiga grade XI natural science 2 even semester year 2011/2012 is proven right.Keywords:  Rummy Game Method; Learning Activities; English Dialog Skill


2021 ◽  
Vol 14 (11) ◽  
pp. 1950-1963
Author(s):  
Jie Liu ◽  
Wenqian Dong ◽  
Qingqing Zhou ◽  
Dong Li

Cardinality estimation is a fundamental and critical problem in databases. Recently, many estimators based on deep learning have been proposed to solve this problem and they have achieved promising results. However, these estimators struggle to provide accurate results for complex queries, due to not capturing real inter-column and inter-table correlations. Furthermore, none of these estimators contain the uncertainty information about their estimations. In this paper, we present a join cardinality estimator called Fauce. Fauce learns the correlations across all columns and all tables in the database. It also contains the uncertainty information of each estimation. Among all studied learned estimators, our results are promising: (1) Fauce is a light-weight estimator, it has 10× faster inference speed than the state of the art estimator; (2) Fauce is robust to the complex queries, it provides 1.3×--6.7× smaller estimation errors for complex queries compared with the state of the art estimator; (3) To the best of our knowledge, Fauce is the first estimator that incorporates uncertainty information for cardinality estimation into a deep learning model.


Author(s):  
Natalia Ermashkevich ◽  
G. Ron'zhin

The article examines the prerequisites for the formation of Industry 4.0 in Russia within the framework of which companies need to use business process automation tools, assesses the state of the global and domestic market for ERP systems and automation tools, reveals the dependence of the use of ready-made software and Open Source technologies.


2021 ◽  
Vol 2 (70) ◽  
pp. 202-212
Author(s):  
Jacek Kulicki

In the opinion of the author, doubts are raised as to the manner of determining the scope of the tax and the tax base by relating these elements of the tax to the so-called significant digital presence of the digital sector enterprise in the territory of Poland. The amount of the tax rate (7%) also raises doubts. The introduction of a tax on certain digital services may also be associated with a decrease in income tax revenues of the state and local government budgets.


Author(s):  
Puspadhar Das

Mifos is an open source enterprise solution for microfinance. This chapter is a practitioner’s point of view on implementation of Mifos in an organization, based on the author’s experience in implementing Mifos at Asomi, a microfinance institution operating in the state of Assam, India. The factors to be considered in selection and implementation of Mifos are discussed. Various inputs, analyses and resources required for implementation are discussed. Any organization must have a concrete set of operational strategies that enables it to track its borrowers and loan portfolio effectively and on time in order to succeed. Wrong assumptions and choice of wrong technology may only aggravate MIS implementation. Development of technology has removed all the barriers to technologies and has enabled organizations to develop computerised systems streamlined to their operational needs and not the other way round. It is attempted to justify this by using the case of Mifos.


Sign in / Sign up

Export Citation Format

Share Document