central management
Recently Published Documents


TOTAL DOCUMENTS

101
(FIVE YEARS 31)

H-INDEX

5
(FIVE YEARS 1)

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 472
Author(s):  
Abdullah Waqas ◽  
Nasir Saeed ◽  
Hasan Mahmood ◽  
Muhannad Almutiry

Fifth-generation and beyond networks target multiple distributed network application such as Internet of Things (IoT), connected robotics, and massive Machine Type Communication (mMTC). In the absence of a central management unit, the device need to search and establish a route towards the destination before initializing data transmission. In this paper, we proposes a destination search and routing method for distributed 5G and beyond networks. In the proposed method, the source node makes multiple attempts to search for a route towards the destination by expanding disk-like patterns originating from the source node. The source node increases the search area in each attempt, accommodating more nodes in the search process. As a result, the probability of finding the destination increases, which reduces energy consumption and time delay of routing. We propose three variants of routing for high, medium, and low-density network scenarios and analyze their performance for various network configurations. The results demonstrate that the performance of the proposed solution is better than previously proposed techniques in terms of time latency and reduced energy consumption, making it applicable for 5G and beyond networks.


2022 ◽  
Vol 12 (1) ◽  
Author(s):  
Norah Alrebdi ◽  
Abdulatif Alabdulatif ◽  
Celestine Iwendi ◽  
Zhuotao Lian

AbstractCentral management of electronic medical systems faces a major challenge because it requires trust in a single entity that cannot effectively protect files from unauthorized access or attacks. This challenge makes it difficult to provide some services in central electronic medical systems, such as file search and verification, although they are needed. This gap motivated us to develop a system based on blockchain that has several characteristics: decentralization, security, anonymity, immutability, and tamper-proof. The proposed system provides several services: storage, verification, and search. The system consists of a smart contract that connects to a decentralized user application through which users can transact with the system. In addition, the system uses an interplanetary file system (IPFS) and cloud computing to store patients’ data and files. Experimental results and system security analysis show that the system performs search and verification tasks securely and quickly through the network.


2021 ◽  
Vol 5 (Supplement_1) ◽  
pp. 308-308
Author(s):  
Walter Boot ◽  
Sara Czaja ◽  
Wendy Rogers ◽  
Joseph Sharit ◽  
Neil Charness

Abstract PRISM 2.0 was designed to run on Android tablets and made use of both customized apps that relied on Google’s browser and e-mail functionality as well as commercial apps, such as Microsoft’s Skype for videoconferencing. We also made use of functionality provided by our partner AT&T, such as their sim cards to provide cell-based internet connectivity to participants who did not have access to Wi-Fi internet services to their home (cable, DSL), as well as tablet management software to deploy updates. The Miami site provided central management and tablet deployment and redeployment services and support as well as coordinating locally provided tech support at the three sites. We discuss some of the technical challenges associated with these arrangements. We focus on how changes to the operating system broke some of our apps necessitating substitution of other apps and provision of new training, and how Covid-19 affected technical support.


2021 ◽  
Vol 69 (5. ksz.) ◽  
pp. 184-201
Author(s):  
János Schmehl

During the coronavirus pandemic the Hungarian Prison Service had to introduce measures that were unknown for the service previously and which had a significant impact on the daily duty of the staff. To adapt measures taken by the government for the prison service, the pandemic risks occurring during the special activities had to be modelled. The Operational Body built-up and operated in the Hungarian Prison Service Headquarters took several measures that ensured the framework of rules needed for successful protection. The virus could not enter the Hungarian prisons during the first wave and later on the statistics show more favorable infection and mortality rates among the inmates than in civil life. The current study presents the strategy of defense and the method of central management, as well as provides insight into the background of the decisions made.


2021 ◽  
Vol 15 (3) ◽  
pp. 642-649
Author(s):  
Igor A. Ivankov

Introduction: the article analyzes legislative norms regulating the activities of operational units of the Federal Penitentiary Service of Russia. Aim: by analyzing the norms of the current intelligence-gathering, penal enforcement and criminal-procedural legislation, to put forward proposals for introducing amendments to certain norms so as to improve the effectiveness of legal regulation of the activities of operational units of the penal system. Methods: comparative legal method, empirical methods of description and interpretation, theoretical methods of formal and dialectical logic. Private scientific methods: legal-dogmatic method and the method of interpretation of legal norms. Results: having analyzed certain norms of the current intelligence-gathering, penal enforcement and criminal-procedural legislation, we see that the norms under consideration are in a certain contradiction, and there are also gaps in the legislative regulation of the activities of operational units of the Federal Penitentiary Service of Russia. Conclusions: we argue that structural operational units of the territorial and central management bodies of the Federal Penitentiary Service of Russia can conduct intelligence-gathering activities outside the territory of correctional institutions, including cases when such activities are conducted according to regulations set out as the tasks of intelligence-gathering activities in institutions executing sentences in the form of imprisonment. We also argue that operational units of the territorial bodies of the Federal Penitentiary Service of Russia can conduct intelligence-gathering activities aimed at establishing the location of convicts, those who have escaped from correctional institutions, their detention and delivery to the investigator (inquirer) for conducting investigative actions. We note legal gaps in the legislative regulation of these measures and propose amendments to legislative acts aimed at improving the effectiveness of law enforcement practice.


Author(s):  
Muyideen Omuya Momoh ◽  
P.U. Chinedu ◽  
W. Nwankwo ◽  
D. Aliu ◽  
M.S. Shaba

In recent times, more scholastic and social attention have been paid to blockchain and its distributed ledger system mechanism. The reasons for this ever-increasing attention cannot be far-fetched: blockchain now occupies a copious position in the present-day ways of doing things economically, digitally and ‘digital-socially’. Blockchain could be described as a distributed ledger system that allows secure transactions without a central management system. In this distributed ledger system, transactions are coded into blocks, which are linked to each other in the form of a chain. The first application of blockchain is in the bitcoin cryptocurrency. Though not limited to bitcoin, blockchain finds usefulness in security and trusts for instance, digital assets could be coded into blocks to ensure and enforce quality of trust. Consequent upon the quality of trust the blockchain confers on a digital asset, transparency among participating nodes is guaranteed.  This is because, any change made to any record in a given block automatically initiates and enforces a corresponding change in all other blocks in the chain hence tampering or breach is almost impossible.  Owing to its impressive prospects in the socioeconomic and political ecosystem, this paper was conceived to examine the current developments around this novel technology with particular emphasis on its benefits and proposed  challenges and needs to fill the gap created in the vital socioeconomic domains. The paper concludes that the blockchain technology is a plausible approach to restoring the trust, confidentiality, availability and integrity in transactions in the cyberspace and the world at large as majority of the global economy thrives in the cloud.


NORMA ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 42
Author(s):  
Muhammad Firdausy Maulana Witapratama

Concerns about Covid 19 by notaries in doing the Deed. This study aims to examine the Implementation of the Notary Position in Doing Deeds Before and during the Covid-19 Pandemic Period, and to Assess Obstacles in the Duties of Notary Positions in Doing Deeds during the Covid-19 Pandemic Period). The type of research used by the author is descriptive type research. Descriptive research is a problem-solving procedure investigated by describing or describing the current state of the subject and object of research based on existing facts. The results of the research in the Assignment of Notary Positions in Doing Deeds Before and during the Covid 19 Pandemic Period differed from the difference in the health protocol and the presence of the appeasers based on SK Number 65/33-III/ PP-INI/2020 dated March 17, 2020, regarding the matter referred to In the main point of the letter, the Central Management of the Indonesian Notary Association (PP-INI) and all of its staff expressed concern over the massive development of the spread of Covid-19 which directly affected the implementation of the duties of a Notary public in providing services to the public and in this regard, this PP urges all members to follow the health protocols set by the government to overcome the spread of Covid-19.Keywords: CoronaViruses, Notary, Decree.


Author(s):  
Víctor Martínez

El propósito de este ensayo es reflexionar sobre el sistema de gobierno de los programas de proximidad comunitaria de la política en salud mental proponiendo el concepto de Gobernanza SocioComunitaria, entendida como un modo de conducir estos programas gestionando lo común “desde abajo” (Vega, 2019, p. 50)) mediante un dispositivo que posibilite la toma de decisiones colectivas entre los actores institucionales y comunitarios involucrados. Es un manejo de los programas que se opone a la modalidad gerencial verticalista y burocrática donde la construcción de lo común está capturada enteramente por el equipo central de gestión. Explicito los argumentos que apoyan esta tesis en tres secciones: salud mental y comunidad, la gestión del conocimiento en los programas de proximidad comunitaria, para finalizar con una descripción más detallada de la Gobernanza SocioComunitaria como modalidad de gestión de estos programas. -- The purpose of this essay is to reflect on the government system of community proximity programs in mental health public policies by submitting the concept of SocioCommunity Governance. This, understood to carry out these programs by managing the common “from below” (Vega, 2019, p. 50), through a device that enables collective decision-making among the institution and the community actors involved. This program management opposes top-down approach and bureaucratic leadership in which the construction of the common is entirely contained by the central management team. The arguments that support this thesis are explained in three sections: mental health and community, knowledge management in community proximity programs and, at last, a more detailed description of the SocioCommunity Governance as a management modality applied to these programs.


Author(s):  
M. Borovyk ◽  
M. Novikova ◽  
O. Kozyrieva

The article examines the essence of network-centrism and network-centric management, as well as the features, capabilities, advantages and disadvantages of implementing the principles of network-centric management in the activities of modern business structures. The contribution of A. Sebrowski, J. Garstka, D. Alberts and F. Stein to the formation of the concept of network-centric management is considered. The origin of the concept of «network-centrism» and «network-centric management» is studied. The essence of the network-centric approach is investigated and the specifics of its use in the process of managing complex socio-economic systems are determined. It is proposed to improve the management of modern business structures by implementing the principles of network-centric management in their activities. The main levels at which business structures should be managed in accordance with the network-centric approach to management are identified. On the basis of the analysis of traditional principles of network-centrism, it is proposed to introduce into the management of business structures the principles of: formation of a single distributed information infrastructure, unimpeded information exchange; individual information management; interdependence and coherence of the elements of the management system, mandatory validation of information and intellectual integration of the elements of the management system of the business structure. The main advantages and disadvantages of implementing the principles of network-centric management in the activities of modern business structures are identified. The expediency of implementing the principles of network-centric management in the activities of modern business structures, in order to increase the effectiveness of their activities through effective management of information support based on the construction of an information network that allows interconnection of all elements of the management system using available information is substantiated.


2021 ◽  
Vol 4 (1) ◽  
pp. 1
Author(s):  
Ahmad Yani ◽  
Taupiq Qurrahman

A code of ethics is a pattern of rules, procedures, signs, ethical guidelines when carrying out an activity / a job. The notary code of ethics is all moral principles that guide in carrying out the position of a notary, whether it applies to Notaries or other people who hold and carry out the position of notary public. The Indonesian Notary Association as the only forum for Notaries has a very important role in making rules and enforcing the professional code of ethics for Notaries, because one of the complementary tools in the Indonesian notary association is the presence of an Honorary Council. The Honorary Council upholds the code of ethics, dignity and dignity of the Notary, which is independent and free from partiality in carrying out its duties and authorities in the association. The objectives of this study are 1. What are the obligations and prohibitions against Notaries, 2. How is the Authority of the Honorary Council of the Indonesian Notary Association in Imposing Sanctions for Violation of the Notary's Code of Ethics in Indonesia. The methodology used in this research is normative juridical. The results of the discussion are: Notaries have obligations and prohibitions, both those regulated by law and those regulated by a code of ethics. If the notary violates the law, the notary has indirectly violated the code of ethics. However, notaries who violate the code of ethics do not necessarily violate the law. In addition, in upholding the code of ethics, the Central Honorary Council only has the authority to give warnings and proposals to the central management to make a temporary dismissal (schorsing) of association members who violate the code of ethics


Sign in / Sign up

Export Citation Format

Share Document