database updates
Recently Published Documents


TOTAL DOCUMENTS

56
(FIVE YEARS 3)

H-INDEX

13
(FIVE YEARS 0)

Author(s):  
Jeremy Y. Ng

Abstract Objectives St. John’s wort (Hypericum perforatum) has been used in traditional medicine for centuries for different conditions, including kidney and lung ailments, insomnia, depression, and to aid wound healing. The objective of the present bibliometric analysis is to capture the characteristics of research publications on the topic of St. John’s wort. Methods Searches were run on April 09, 2021, and results were exported on the same day to prevent discrepancies between daily database updates. Trends associated with this subset of publications were identified and presented. Bibliometric networks were constructed and visualized using the software tool VOSviewer. Results A total of 1,970 publications were published by 5,849 authors across 961 journals from 1859 to 2021. Beginning in the late 1990s, a steep increase was found in the volume of publication on this topic. The journal that published the largest number of publications was Phytotherapy Research. The most productive countries included Germany and the United States. Conclusions The present study provides the characteristics of the St. John’s wort literature that allows understanding of the past, present, and future of research in this area. It is a useful evidence-based framework on which to base future research actions and academic directions.


Now a days we face such a lot of problems associated with road. To avoid this problem many methods has implemented but still problem is not fixed. In past days manual methods are used for inspection of road but due to traffic manual method does not work properly. Also manual method takes lot of time and still gives wrong output. To resolve all this problems we used this advanced techniques to detects the condition of road. Automatic detection of potholes and humps is used for sending the alert to government authority for maintenance of road. To find out the poor condition of roads such as potholes and unequal elevation to avoid accidents and damage of vehicles this projects is very much useful. Here, Ultrasonic sensors are used to analyze and calculate the depth and height of potholes as well as humps. Ultrasonic sensors uses ultrasonic waves to find out the distance between sensor and target object. To find out correct geographical position coordinates of the potholes and irregular humps we will be using the receiver of GPS. The data which is sensed by GPS includes pothole and hump location in the form of latitude, longitude, which is stored in the server. This gives information to the government authorities about the correct position. So that, government can take all possible decisions related to maintenance as early as possible and avoid accidents based on data provided by the GPS. Once the problem will be rectified the database updates accordingly and alerts or notification is given through short message service


2018 ◽  
Vol 2 (2) ◽  
Author(s):  
Adhitya Alfani ◽  
Amrie Firmansyah

ABSTRACT This study aims to evaluate internal control in the import duty cycle that focuses on the procedure for receipt of import duties on customs services for Bonded Zones. This study uses a case study of the Customs and Excise Supervision and Service Office of Bekasi, where most of its activities carry out customs, excise services for bonded zones, and are one of the offices that serve customs services and supervision in the largest Bonded Zones in Indonesia. This study used descriptive qualitative methods and was conducted during the February period. July 2016. The results of the study show that in general, the application of the import service system for BC 2.5 documents within the KPPBC Bekasi has good related internal controls which include general control and application control. However, there are still weaknesses in employee placement system, employee skills, especially in very important parts, data reconciliation, and manual database updates can result in reduced data accuracy. Keywords: customs duties, internal control, revenue cycle. ABSTRAK Penelitian ini bertujuan untuk mengevaluasi pengendalian internal pada siklus penerimaan bea masuk yang berfokus pada prosedur penerimaan bea masuk untuk Kawasan Berikat termasuk. Penelitian ini menggunakan studi kasus Kantor Pengawasan dan Pelayanan Bea dan Cukai Bekasi yang sebagian besar kegiatannya melakukan pelayanan kepabeanan dan cukai untuk kawasan berikat dan merupakan salah satu kantor yang melayani pelayanan dan pengawasan di bidang kepabeanan untuk Kawasan Berikat terbesar di Indonesia. Penelitian ini menggunakan metode kualitatif deskriptif dan dilakukan selama periode Februari s.d. Juli 2016. Hasil penelitian menunjukkan bahwa pada umumnya penerapan sistem pelayanan impor dokumen BC 2.5 di lingkungan KPPBC Bekasi sudah memiliki pengendalian internal yang baik terkait yang meliputi pengendalian umum dan pengendalian aplikasi. Namun, masih terdapat kelemahan terkait dengan sistem penempatan pegawai, kecakapan pegawai khususnya di bagian-bagian yang sangat penting, rekonsiliasi data dan update data base yang masih manual dapat mengakibatkan tingkat akurasi data menjadi berkurang. Kata Kunci: bea masuk, pengendalian internal, siklus penerimaan.


2017 ◽  
Vol 2017 (1) ◽  
pp. 133-143
Author(s):  
Константин Гулаков ◽  
Konstantin Gulakov ◽  
Василий Гулаков ◽  
Vasiliy Gulakov ◽  
Юрий Сковородников ◽  
...  

The paper deals with the study of one of the urgent problems of real time applications in which objects have spatial and temporal dependences. With the development of wireless communication and position-ing technologies the problem of storage in a database and indexing a large quantity of moving objects becomes urgent. In this paper there is offered an idea based on the method of hashing allowing the consider-able decrease of the quantity of database updates and the fulfillment of an indexing procedure possible. The paper reports the following basic approaches to the solution of the problem mentioned: a hashing; LP-layer; a division of space into blocks; coverings be-tween blocks; the use of a dynamic update of blocks, and also combinations of approaches. In order to draw conclusions of efficiency of hash-functions offered there was carried out a work on the experimental assessment of methods mentioned. The results of the comparison of methods are presented according to different criteria: productivity, a quantity of database updates, amount of disk memory pages used. The conclusions and recommendations for use are formulated.


2016 ◽  
Vol 10 (3) ◽  
pp. 67-86 ◽  
Author(s):  
Mahmood Fazlali ◽  
Peyman Khodamoradi ◽  
Farhad Mardukhi ◽  
Masoud Nosrati ◽  
Mohammad Mahdi Dehshibi

Malware is defined as any type of malicious code that is the potent to harm a computer or a network. Modern malwares are accompanied with mutation characteristics, namely polymorphism and metamorphism. They let malwares to generate enormous number of variants. Rising number of metamorphic malwares entails hardship in analyzing them for signature extraction and database updates. In spite of the broad use of signature-based methods in the security products, they are not able detect the new unseen morphs of malware, and it is stemmed from changing the structure of malware as well as the signature in each infection. In this paper, a novel method is proposed in which the proportion of opcodes is used for detecting the new morphs. Decision trees are utilized for classification and detection of malware variants based on the rate of opcode frequencies. Three metrics for evaluating the proposed method are speed, efficiency and accuracy. It was observed in the course of experiments that speed and time complexity will not be challenging factors; because of the fast nature of extracting the frequencies of opcodes from source assembly file. Empirical validation reveals that the proposed method outperforms the entire commercial antivirus programs with a high level of efficiency and accuracy.


genesis ◽  
2015 ◽  
Vol 53 (8) ◽  
pp. 498-509 ◽  
Author(s):  
Leyla Ruzicka ◽  
Yvonne M. Bradford ◽  
Ken Frazer ◽  
Douglas G. Howe ◽  
Holly Paddock ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document