complete access
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 14)

H-INDEX

7
(FIVE YEARS 1)

Author(s):  
Heri Purwanto ◽  
Taupik Ridwan ◽  
Yanwar Aryanggara

One of the current operational activities of PT. Geoff Maksimal Jaya is the distribution of goods, every item that has been produced will be stored in the warehouse to be entrusted or distributed to shops, wholesalers, and other related parties. However, data documentation activities related to the distribution of these goods are still carried out manually, so that access to obtain any information is still limited. In response to these problems, the purpose of this study was made to get easy access to information by utilizing the BlueSeer ERP application as a reference for designing information systems. The development method used in this research is the waterfall. It is hoped that this can help companies access information on operational activities of distributing goods effectively and efficiently. In the future, this research can be developed by adding several other aspects such as monitoring the delivery of goods in order to cover the complete access to information on operational activities of the distribution of goods.


2021 ◽  
Vol 2113 (1) ◽  
pp. 012054
Author(s):  
Yu Wang ◽  
Zongchun Wei ◽  
Haibo Bao ◽  
Gaofeng Deng ◽  
Jiangwei Li ◽  
...  

Abstract In order to solve the problem that the process of WAPI terminal connection is troublesome, this paper proposes an intelligent support and command system of WAPI terminal equipment based on centralized control AC + AP architecture. The system stores WAPI certificate on AC (centralized controller), WAPI terminal equipment is associated with AP (wireless access point), and AP equipment notifies AC of the associated events of the terminal, AC equipment and terminal equipment enter authentication and complete certificate authentication. Complete access authentication through AC and terminal equipment, and store the unicast and multicast keys generated by authentication negotiation on AC. This method is more convenient to maintain the certificate. At the same time, on the premise of ensuring the security of the certificate, it also improves the encryption and decryption efficiency and improves the user’s business experience.


2021 ◽  
Vol 6 (8) ◽  
pp. 669-675
Author(s):  
Vicente Carlos da Silva Campos ◽  
Francisco Guerra Pinto ◽  
Diogo Constantino ◽  
Renato Andrade ◽  
João Espregueira-Mendes

Complete access to the posterior medial compartment of the knee may represent a technical challenge during arthroscopy in patients with a tight tibiofemoral joint space. Medial collateral release reduces direct iatrogenic cartilage damage in the medial compartment of the knee through manipulation with instruments. We recommend performing medial collateral release in surgeries that access the posteromedial compartment (e.g. partial meniscectomy for ruptures of the posterior horn of medial meniscus or posterior root repairs) when the patient has a tight tibiofemoral joint space. There are two main techniques to perform medial collateral release: inside-out and outside-in. Regardless of the technique used, releasing medial ligament structures is a safe and effective method to be used in the diagnosis and treatment of injuries to the medial compartment. Cite this article: EFORT Open Rev 2021;6:669-675. DOI: 10.1302/2058-5241.6.200128


Al-Lisan ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 71-84
Author(s):  
Heni Verawati ◽  
Uswatun Hasanah

Arabic learning is positively associated with the growth of Islamic studies. The better comprehension and mastery of Arabic, the faster and the greater the standard of Islamic studies would be. It can also be considered an effort to avoid any misconceptions or misinterpretations in understanding Islam's primary sources (Quran and Hadits) written in Arabic. Therefore, there is a need for more in-depth and continuous study to develop effective Arabic language learning, especially in a modern context. This paper aims to examine some of the previous discussions and research on reforming Arabic language learning to develop Islamic studies in a modern context.  Arabic learners today are different from learners in the past who focus more on routine activities by relying on written sources. In this modern era, learners have complete access and freedom to determine the direction of learning they want and need for themselves. Moreover, the main priority in improving Arabic learning quality is by optimizing modern media and technology. Therefore, Arabic language experts need to partner and synergize with competent human resources to develop modern Arabic education and learning technology to produce a better education system in Arabic Learning and support Islamic Studies' development.


Author(s):  
Boudheb Tarik ◽  
Elberrichi Zakaria

Classifying data is to automatically assign predefined classes to data. It is one of the main applications of data mining. Having complete access to all data is critical for building accurate models. Data can be highly sensitive, such as biomedical data, which cannot be disclosed or shared with third party, because it can harm individuals and organizations. The challenge is how to preserve privacy and usefulness of data. Privacy preserving classification addresses this problem. Collaborative models are constructed over networks without violating the data owners' privacy. In this article, the authors address two problems: privacy records deduplication of the same records and privacy-preserving classification. They propose a randomized hash technic for deduplication and an enhanced privacy preserving classification of biomedical data over horizontally distributed data based on two homomorphic encryptions. No private, intermediate or final results are disclosed. Experimentations show that their solution is efficient and secure without loss of accuracy.


Author(s):  
Valavunar A. Subramanian ◽  
Nirav C. Patel

The most commonly performed incision for coronary revascularization is median sternotomy as it allows complete access to all target vessels and safe establishment of cardiopulmonary bypass. For targeted revascularization, various minimally invasive incisions can be used to access the left anterior descending artery, marginal arteries, and right coronary arteries in isolation. Grafting is then performed on the beating heart under direct vision.


2020 ◽  
pp. 4-11
Author(s):  
A. G. Sokolova ◽  
F. Ya. Balitsky ◽  
V. D. Sizarev

The paper presents the results of the specific vibration condition monitoring approach for maintenance of unique critical equipment provided complete access impossibility to its components (due to radiation environment) throughout the entire operation period. The approach bases on the previously proposed S-discriminants of vibrations which are calculated with adaptation to the reference state of the equipment. The method showed its high efficiency in detecting the moment of machine operation process imbalance and in tracking the equipment components degradation, starting from the earliest stage. It is illustrated on the example of the movable neutron reflector PO-3 of the IBR-2 research reactor that it is possible not only to detect in time the moment when a fault occurs, but also to make a preliminary express diagnosis of its condition.


In this day and age, cash can be required whenever or anyplace for example, shopping, voyaging or wellbeing crises and so on. That additionally expands the danger of getting stolen. Bank is a part of most secure spot to keep cash. In any case, consider the possibility that somebody will take your card and by one way or another he / she knows your secret key, this will give him / her complete access to yours cash. according to the present situation the online exchange Is single time secure secret word (OTP). There are ln OTP era numerous variables that can make OTP special each time it is produced. Run Client Identification right now using Facial Recognition to validate the Client. If an incident or disaster situation should arise, authentication usage of OTP and the person's picture and mail to the account holder should be possible should also be captured. Accordingly, with the current method, our goal is to strengthen the security fight


2020 ◽  
Author(s):  
William Icefield

One understanding of the Niels Bohr's interpretation of quantum mechanics suggests that the measurement problem arises because an observer description of reality is incomplete due to lack of complete access to an entire system of observed and observer. In general, an additional and external measuring observer is required to access the entire system. Inevitable entanglement between observers, measurement apparatus and measured objects is key to such an understanding of the measurement problem. Quantum mechanics only provides a complete `incomplete' description of reality. Nevertheless, some issues, especially providing an account of why a preferred measurement basis arises, remain. Replacing relations between observed and observer in relational quantum mechanics with those between effective (approximate) theories, one arrives at a more clear understanding of why the measurement problem arises and how a preferred measurement basis is determined. The measurement problem exists because of measurement apparatus limitations, which only allow us to formulate and verify effective theories that inevitably neglect some details of nature.


2020 ◽  
Vol 34 (04) ◽  
pp. 6639-6647 ◽  
Author(s):  
Puyudi Yang ◽  
Jianbo Chen ◽  
Cho-Jui Hsieh ◽  
Jane-Ling Wang ◽  
Michael Jordan

Deep neural networks obtain state-of-the-art performance on a series of tasks. However, they are easily fooled by adding a small adversarial perturbation to the input. The perturbation is often imperceptible to humans on image data. We observe a significant difference in feature attributions between adversarially crafted examples and original examples. Based on this observation, we introduce a new framework to detect adversarial examples through thresholding a scale estimate of feature attribution scores. Furthermore, we extend our method to include multi-layer feature attributions in order to tackle attacks that have mixed confidence levels. As demonstrated in extensive experiments, our method achieves superior performances in distinguishing adversarial examples from popular attack methods on a variety of real data sets compared to state-of-the-art detection methods. In particular, our method is able to detect adversarial examples of mixed confidence levels, and transfer between different attacking methods. We also show that our method achieves competitive performance even when the attacker has complete access to the detector.


Sign in / Sign up

Export Citation Format

Share Document