system point
Recently Published Documents


TOTAL DOCUMENTS

88
(FIVE YEARS 4)

H-INDEX

13
(FIVE YEARS 0)

2021 ◽  
Vol 10 (2) ◽  
pp. 149-160
Author(s):  
Arseniy Georgievich Babichev ◽  
Elmira Robertovna Khakimova

The article examines the legal nature of terrorism from the Russian legal system point of view. The relevance of the research stems from the large scale, sophistication, and cruelty with which terrorist crimes have been committed over the recent decades. Terrorism has nowadays become a global threat, and any government, including government of the Russian Federation, must take it into consideration when formulating its domestic and foreign policy. In countering terrorist crimes, current regulations of the Criminal Code of Russian Federation take rather important part. Punishment differentiation, depending on corpus delicti and consequences, as well as correct qualification of terrorist crimes, are the most important conditions of those regulation’s efficient application. This problem is in fact interdisciplinary one, which is proved by researchers from other scientific fields: not only law scientists, but also psychologists, historians, political scientists. All the listed illustrates relevance, timeliness, and expediency of researching the problems mentioned. The purpose of the study is formulating recommendations for solving the above-mentioned issues of improving the existing criminal (and other) measures and developing new viable and practically applicable criminal measures for countering terrorist crimes.


2021 ◽  
Author(s):  
Safar M. Maghdid ◽  
halgurd maghdid

<p>The number of connected mobile devices and Internet of Things (IoT) is growing around us, rapidly. Since, most of the people daily activities are relying on these connected things or devices. Specifically, this past year (with COVID-19) changed daily life in abroad and this is increased the use of IoT enabled technologies in health sector, work, and play. Further, the most common service via using these technologies is the localization/positioning service for different applications including: geo-tagging, billing, contact tracing, health-care system, point-of-interest recommendations, social networking, security, and more. Despite the availability of a large number of localization solutions in the literature, the precision of localization cannot meet the needs of consumers. For that reason, this paper provides an in-depth investigation of the existing technologies and techniques in the localization field, within the IoT era. Furthermore, the benefits and drawbacks of each technique with enabled technologies are illustrated and a comparison between the utilized technologies in the localization is made. The paper as a guideline is also going through all of the metrics that may be used to assess the localization solutions. Finally, the state-of-the-art solutions are examined, with challenges and perspectives regarding indoors/outdoors environments are demonstrated.</p>


2021 ◽  
Author(s):  
Safar M. Maghdid ◽  
halgurd maghdid

<p>The number of connected mobile devices and Internet of Things (IoT) is growing around us, rapidly. Since, most of the people daily activities are relying on these connected things or devices. Specifically, this past year (with COVID-19) changed daily life in abroad and this is increased the use of IoT enabled technologies in health sector, work, and play. Further, the most common service via using these technologies is the localization/positioning service for different applications including: geo-tagging, billing, contact tracing, health-care system, point-of-interest recommendations, social networking, security, and more. Despite the availability of a large number of localization solutions in the literature, the precision of localization cannot meet the needs of consumers. For that reason, this paper provides an in-depth investigation of the existing technologies and techniques in the localization field, within the IoT era. Furthermore, the benefits and drawbacks of each technique with enabled technologies are illustrated and a comparison between the utilized technologies in the localization is made. The paper as a guideline is also going through all of the metrics that may be used to assess the localization solutions. Finally, the state-of-the-art solutions are examined, with challenges and perspectives regarding indoors/outdoors environments are demonstrated.</p>


2021 ◽  
Vol 74 (2) ◽  
Author(s):  
Hamilton Leandro Pinto de Andrade ◽  
Antônio Carlos Vieira Ramos ◽  
Juliane de Almeida Crispim ◽  
Marcelino Santos Neto ◽  
Luiz Henrique Arroyo ◽  
...  

ABSTRACT Objectives: to identify risk clusters for the occurrence of tuberculosis and its treatment outcomes. Methods: ecological study, in a city in Maranhão, using data from the Notifiable Diseases Information System. Point density analysis and isotonic scanning techniques were used to identify areas with the highest occurrence of treatment outcomes and identify risk areas for possible tuberculosis cases. Results: most tuberculosis cases occurred in the male, adult, brown-skinned population. Also, most of the reported cases were classified as pulmonary and as new cases that progressed to a cure. The areas with the highest density of cure, death and abandonment are located in the central region of the city. Conclusions: the central region of the urban area of the city, with high demographic density and poor sanitary and socioeconomic conditions, presented a greater cluster of tuberculosis cases.


2020 ◽  
Vol 5 (3) ◽  
pp. 418-424
Author(s):  
Muslimah Muslimah

Writing activities are essentially not only to give birth to a thought and a feeling, but also a disclosure of knowledge ideas and the life experience of a person in writing language. The study used a qualitative approach with case study techniques. With the research subject grade V students MI ma'arif NU 1 Kaliwangi. Data collection techniques with interviews, observations, and documentation. Analytics Data uses the Miles and Huberman model. Results showed (a) mature planning before the process of dissection (b) the implementation of creative learning with the image media assisted by the LCD, and Worksheet (c) Self-reliance assessment techniques with direct observation, and system point, (d) The lack of introductory media such as dictionaries changed basic barriers.


2020 ◽  
Vol 5 (3) ◽  
pp. 418-424
Author(s):  
Muslimah

Writing activities are essentially not only to give birth to a thought and a feeling, but also a disclosure of knowledge ideas and the life experience of a person in writing language. The study used a qualitative approach with case study techniques. With the research subject grade V students MI ma'arif NU 1 Kaliwangi. Data collection techniques with interviews, observations, and documentation. Analytics Data uses the Miles and Huberman model. Results showed (a) mature planning before the process of dissection (b) the implementation of creative learning with the image media assisted by the LCD, and Worksheet (c) Self-reliance assessment techniques with direct observation, and system point, (d) The lack of introductory media such as dictionaries changed basic barriers.


2020 ◽  
Author(s):  
Jingjing Guo ◽  
Jiacong Sun

Abstract With the ubiquitous mobile devices and the advanced wireless communication, location-based service (LBS) helps people to enjoy a convenient lifestyle and has attracted numerous research interests. As a basic query process in LBS system, point location requires to find a region containing the query point. Since location belongs to sensitive information and also leads other private information leaked, it is urgent to design a secure and efficient point location scheme. In this paper, we propose a point location scheme named SecPL to protect sensitive information while supporting high efficient location query. Specifically, we introduce a LineTest scheme from asymmetric scalar-product-preserving encryption (ASPE) to facilitate the checking of whether a point lies above or below a line. Furthermore, the SecPL scheme is designed by leveraging LineTest and order-preserving encryption (OPE) scheme. Through detailed security analysis, we demonstrate that SecPL scheme achieves data privacy and query privacy at the same time. Finally, the performance evaluation demonstrates the high efficiency of the proposed SecPL scheme.


2020 ◽  
Vol 4 ◽  
pp. 75-82
Author(s):  
Patrick Farfal

Because of many features of handicap, such as the number of actors and interactions, the complexity of the field, handicap must be considered from a system point of view, and dealt with as any system. That makes it possible to build a comprehensive response to the question of the inclusion and full citizenship of people with disabilities, better than some fragmentary solutions often proposed. The paper emphasizes relationships inside the disability field and external relationships with the environment, namely valid people in everyday life and workfield; the consideration of those external relationships leads to the compensation of handicap for a better accessibility to buildings, transports, care, communication, and soon; unexpected spin-offs of that compensation on the whole of population can be observed.


2020 ◽  
Vol 32 (3) ◽  
pp. 531-551 ◽  
Author(s):  
Abraham Cyril Issac ◽  
Rupashree Baral ◽  
Timothy Colin Bednall

Purpose The nature of knowledge and the way it is assimilated do play a vital role in influencing knowledge sharing tendencies. These specific factors coupled with the ineffectiveness of the intrinsic knowledge management system point towards an inherent knowledge hiding tendency that exists within every organization. Knowledge hiding is established as an intentional attempt to hide knowledge when it is requested. In the recent past, scholars have investigated the factors causing hiding of the task-related knowledge. However, there is still no clear understanding of the strategic factors that lead to knowledge hiding in organizations and which of these factors are the most critical ones. The purpose of this paper is to identify the most critical strategic factors that cause knowledge hiding in different contexts. Design/methodology/approach This research study tries to identify these factors from the literature, corroborate it with industry experts and model the same with the aid of total interpretive structural modelling. This is followed by Matrice d'Impacts Croises Multiplication Appliquée a un Classement and sensitivity analysis, which determines the unique driving factors and their powers, which vary based on industry sectors and years of work experience. Findings This study found out that knowledge hiding behaviour is more pronounced in the initial years of an individual within the organization and similarly in the final years of an individual within the organization. In a period in between both these, there are no critical driving factors that infuse knowledge hiding. Originality/value This is one of the first comprehensive research studies that unravel the dynamic nature of the strategic factors engendering knowledge hiding across two different dimensions, namely, industry sectors and work-experience of individuals. This study categorically aims to aid the management in bringing out necessary interventions to curb the menace of knowledge hiding.


Sign in / Sign up

Export Citation Format

Share Document