1,787 research outputs found

    Subsystem trade-off environmental control and life support for orbiter phase B contractor

    Get PDF
    Environmental control and life support subsystem for space shuttle orbite

    From Capitulations to Unequal Treaties: The Matter of an Extraterritorial Jurisdiction in the Ottoman Empire

    Get PDF
    In the nineteenth century, justice in the Ottoman Empire appeared to international jurists deeply corrupted and far from the Western model. European consular jurisdictions, as in the past, solved this embarrassment in the prevalent and private interest of Western States in order to control the Mediterranean area. This perpetrated abjuration to recognize an autonomous and sovereign Ottoman administration of justice in civil or criminal cases in which foreigners were involved continued, in spite of the fact that the Porte provided excellent examples of intersection, reception and appropriation of foreign models to construct a new legal system, and to transform society. This process of “westernization” or “modernization” formally started in 1839, by the Hatt Hümayün of Gülkhâne. In order to halt the contradictions derived from the coexistence of the last (French and English) treaties of commerce of 1838 and their confirmation of privileges and consular jurisdiction with the driven effort of Ottoman juridical reforms of Tanzîmât period, in 1840 in both Turkey and Egypt, mixed traders councils composed of local and foreign traders were established. In 1840 the “commercial board” was born in Turkey and, in 1848, European Powers holding capitulary privileges negotiated the formal recognition of mixed tribunals (which were regulated in 1873 and formally inaugurated in 1875). This embarrassing situation was getting worse and accumulating contradictions when in 1856, at the Congress of Paris, the Ottoman Empire was “admitted to participate in the advantages of European Public Law and system” (art. 7 of the Treaty). Thanks to those words, the logical preamble of consular jurisdictions and their extraterritoriality (mitigated by the “monstrous” compromise of mixed tribunals), formally failed. There was a need to investigate and redefine the paradigmatic declensions of sovereignty in the relations between European Powers and the Ottoman Empire during the nineteenth century

    The Effects of Social Commerce Design as Social Commerce on Consumer Purchase Decision Making (A Study on Instagram – Indonesia)

    Get PDF
    This study aims to determine how the influence of design quality on purchase decision making on Instagram-Indonesia. The factors tested in this study are design quality (usability factor, functional factor, and social factor) as exogenous variables, while purchase decision making (product awareness, information search, evaluation, purchase, and post-purchase) as endogenous variables. The research method used in this study is descriptive and causality research methods. The populations in this study are consumers who make purchases online through Instagram. The sampling technique used in this study is probability-sampling technique with simple random sampling technique, while the number of samples in this study amounted to 400 respondents. The analytical method used in this study is Stuctural Equation Modeling (SEM) based on Partial Least Square (PLS) at a significance level of 5%. The program used in analyzing data using SmartPLS version 3.2.8 Software. Based on the results of the study show that usability factors, functional factors, and social factors influence product awareness. Usability factor does not affect information search. While functional factors and social factors influence information search. Usability factors, functional factors, and social factors influence evaluation. Usability factor does not affect purchase. While functional factors and social factors affect purchase. Usability factor does not affect post-purchase. While functional factors and social factors affect post-purchase

    RANCANG BANGUN SISTEM ADMINISTRASI PROGRAM STUDI SISTEM INFORMASI UNIVERSITAS PEMBANGUNAN NASIONAL “VETERAN” JAWA TIMUR

    Get PDF
    ABSTRAK Universitas Pembangunan Nasional Program Studi Sistem Informasi khususnya bagian Sesprodi untuk mengelola data arsip masuk dan arsip keluar, dan mencatat transaksi keuangan masih manual. Permasalahan yang timbul adalah ingin membuat suatu sistem yang dapat mengelola data arsip masuk dan arsip keluar agar lebih efisien, mengelola transaksi keuangan yang masuk dan keluar dan mengelola agenda kegiatan Sesprodi. Tujuan Rancang Bangun Sistem Administrasi Program Studi Sistem Informasi ini adalah untuk mempermudah mengelola arsip dari arsip masuk atau arsip keluar. Mencatat transaksi keuangan yang masuk dan keluar beserta agenda kegiatan. Hasil yang didapat adalah aplikasi sistem berbasis PHP yang dapat mencatat transaksi-transaksi keuangan program studi Sistem Informasi, data arsip-arsip yang masuk maupun keluar, agenda kegiatan Sesprodi dan reminder. Kata Kunci : transaksi keuangan, sistem administrasi, Program Studi Sistem Informasi

    Endodontic retreatment of a lower canine associated with a periapical lesion: case report of an unusual anatomy

    Get PDF
    Abstract Objectives To describe the endodontic orthograde retreatment of a lower canine with a rare anatomy, affected by a symptomatic periapical lesion. Materials and methods A 30-year-old Caucasian woman came to our office reporting severe pain and swelling located at the right mandible. A two-roots/two-canals configuration was discovered for the lower canine which sustained the periapical infection; a missed lingual canal was not recognized and treated at the previous primary endodontic therapy. A full pre-operative examination and diagnosis, the application of modern endodontic strategies along with the use of magnification technologies (like the Surgical Operating Microscope - SOM) and proper disinfection protocols were employed for endodontic re-treatment. Result and conclusions Healing of the periapical infection was clinically and radiographically confirmed at a 9-month follow-up. Endodontists should know the anatomical variations of human teeth and be vigilant about them when approaching treatments. More than a single radiographic projection is recommended in the diagnostic phase. Careful procedures related to instrumentation, cleaning and filling of the entire root canal system enhance the potential for healing of apical lesions

    Security Management Framework for the Internet of Things

    Get PDF
    The increase in the design and development of wireless communication technologies offers multiple opportunities for the management and control of cyber-physical systems with connections between smart and autonomous devices, which provide the delivery of simplified data through the use of cloud computing. Given this relationship with the Internet of Things (IoT), it established the concept of pervasive computing that allows any object to communicate with services, sensors, people, and objects without human intervention. However, the rapid growth of connectivity with smart applications through autonomous systems connected to the internet has allowed the exposure of numerous vulnerabilities in IoT systems by malicious users. This dissertation developed a novel ontology-based cybersecurity framework to improve security in IoT systems using an ontological analysis to adapt appropriate security services addressed to threats. The composition of this proposal explores two approaches: (1) design time, which offers a dynamic method to build security services through the application of a methodology directed to models considering existing business processes; and (2) execution time, which involves monitoring the IoT environment, classifying vulnerabilities and threats, and acting in the environment, ensuring the correct adaptation of existing services. The validation approach was used to demonstrate the feasibility of implementing the proposed cybersecurity framework. It implies the evaluation of the ontology to offer a qualitative evaluation based on the analysis of several criteria and also a proof of concept implemented and tested using specific industrial scenarios. This dissertation has been verified by adopting a methodology that follows the acceptance in the research community through technical validation in the application of the concept in an industrial setting.O aumento no projeto e desenvolvimento de tecnologias de comunicação sem fio oferece múltiplas oportunidades para a gestão e controle de sistemas ciber-físicos com conexões entre dispositivos inteligentes e autônomos, os quais proporcionam a entrega de dados simplificados através do uso da computação em nuvem. Diante dessa relação com a Internet das Coisas (IoT) estabeleceu-se o conceito de computação pervasiva que permite que qualquer objeto possa comunicar com os serviços, sensores, pessoas e objetos sem intervenção humana. Entretanto, o rápido crescimento da conectividade com as aplicações inteligentes através de sistemas autônomos conectados com a internet permitiu a exposição de inúmeras vulnerabilidades dos sistemas IoT para usuários maliciosos. Esta dissertação desenvolveu um novo framework de cibersegurança baseada em ontologia para melhorar a segurança em sistemas IoT usando uma análise ontológica para a adaptação de serviços de segurança apropriados endereçados para as ameaças. A composição dessa proposta explora duas abordagens: (1) tempo de projeto, o qual oferece um método dinâmico para construir serviços de segurança através da aplicação de uma metodologia dirigida a modelos, considerando processos empresariais existentes; e (2) tempo de execução, o qual envolve o monitoramento do ambiente IoT, a classificação de vulnerabilidades e ameaças, e a atuação no ambiente garantindo a correta adaptação dos serviços existentes. Duas abordagens de validação foram utilizadas para demonstrar a viabilidade da implementação do framework de cibersegurança proposto. Isto implica na avaliação da ontologia para oferecer uma avaliação qualitativa baseada na análise de diversos critérios e também uma prova de conceito implementada e testada usando cenários específicos. Esta dissertação foi validada adotando uma metodologia que segue a validação na comunidade científica através da validação técnica na aplicação do nosso conceito em um cenário industrial

    Effect of different dental articulating papers on SEMG activity during maximum clenching

    Get PDF
    This study evaluated the influence of two different occlusal indicators (articulating papers of 40\u3bcm and 200\u3bcm) on muscular activity of the temporalis anterior (TA) and superficial masseter (MS) during maximum voluntary clenches (MVC), using surface electromyography (SEMG). It was hypothesized that an articulating paper positioned between dental arches during MVC elicits a different muscular activity compared with the occlusion on natural dentition (without the occlusal indicator). 30 healthy adult subjects with a complete, natural dentition were recruited; SEMG activity was recorded in the following experimental conditions: MVC with cotton rolls for standardization purposes; MVC on natural dentition; MVC onto the 40 \u3bcm or 200\u3bcm paper indicator positioned on right or left side of the dental arch. Percentage Overlapping Coefficient (POC; separate values obtained for TA and MS), antero-posterior coefficient (APC) and total muscle activities (IMP) were the analyzed SEMG parameters. The use of an occlusal indicator statistically changed POC_TA, POC_MS and IMP median values (p 0.05). In conclusion, the examined articulating papers affected two specific SEMG parameters (POC and IMP); the recorded muscular activity with the occlusal indicator varied regardless left or right side positioning, and independently from tested paper thicknesses
    corecore