1,787 research outputs found
Subsystem trade-off environmental control and life support for orbiter phase B contractor
Environmental control and life support subsystem for space shuttle orbite
From Capitulations to Unequal Treaties: The Matter of an Extraterritorial Jurisdiction in the Ottoman Empire
In the nineteenth century, justice in the Ottoman Empire appeared to international jurists deeply corrupted and far from the Western model. European consular jurisdictions, as in the past, solved this embarrassment in the prevalent and private interest of Western States in order to control the Mediterranean area. This perpetrated abjuration to recognize an autonomous and sovereign Ottoman administration of justice in civil or criminal cases in which foreigners were involved continued, in spite of the fact that the Porte provided excellent examples of intersection, reception and appropriation of foreign models to construct a new legal system, and to transform society. This process of “westernization” or “modernization” formally started in 1839, by the Hatt Hümayün of Gülkhâne. In order to halt the contradictions derived from the coexistence of the last (French and English) treaties of commerce of 1838 and their confirmation of privileges and consular jurisdiction with the driven effort of Ottoman juridical reforms of Tanzîmât period, in 1840 in both Turkey and Egypt, mixed traders councils composed of local and foreign traders were established. In 1840 the “commercial board” was born in Turkey and, in 1848, European Powers holding capitulary privileges negotiated the formal recognition of mixed tribunals (which were regulated in 1873 and formally inaugurated in 1875). This embarrassing situation was getting worse and accumulating contradictions when in 1856, at the Congress of Paris, the Ottoman Empire was “admitted to participate in the advantages of European Public Law and system” (art. 7 of the Treaty). Thanks to those words, the logical preamble of consular jurisdictions and their extraterritoriality (mitigated by the “monstrous” compromise of mixed tribunals), formally failed. There was a need to investigate and redefine the paradigmatic declensions of sovereignty in the relations between European Powers and the Ottoman Empire during the nineteenth century
The Effects of Social Commerce Design as Social Commerce on Consumer Purchase Decision Making (A Study on Instagram – Indonesia)
This study aims to determine how the influence of design quality on purchase decision making on Instagram-Indonesia. The factors tested in this study are design quality (usability factor, functional factor, and social factor) as exogenous variables, while purchase decision making (product awareness, information search, evaluation, purchase, and post-purchase) as endogenous variables.
The research method used in this study is descriptive and causality research methods. The populations in this study are consumers who make purchases online through Instagram. The sampling technique used in this study is probability-sampling technique with simple random sampling technique, while the number of samples in this study amounted to 400 respondents. The analytical method used in this study is Stuctural Equation Modeling (SEM) based on Partial Least Square (PLS) at a significance level of 5%. The program used in analyzing data using SmartPLS version 3.2.8 Software.
Based on the results of the study show that usability factors, functional factors, and social factors influence product awareness. Usability factor does not affect information search. While functional factors and social factors influence information search. Usability factors, functional factors, and social factors influence evaluation. Usability factor does not affect purchase. While functional factors and social factors affect purchase. Usability factor does not affect post-purchase. While functional factors and social factors affect post-purchase
RANCANG BANGUN SISTEM ADMINISTRASI PROGRAM STUDI SISTEM INFORMASI UNIVERSITAS PEMBANGUNAN NASIONAL “VETERAN” JAWA TIMUR
ABSTRAK
Universitas Pembangunan Nasional Program Studi Sistem Informasi
khususnya bagian Sesprodi untuk mengelola data arsip masuk dan arsip keluar, dan
mencatat transaksi keuangan masih manual. Permasalahan yang timbul adalah ingin
membuat suatu sistem yang dapat mengelola data arsip masuk dan arsip keluar agar
lebih efisien, mengelola transaksi keuangan yang masuk dan keluar dan mengelola
agenda kegiatan Sesprodi. Tujuan Rancang Bangun Sistem Administrasi Program
Studi Sistem Informasi ini adalah untuk mempermudah mengelola arsip dari arsip
masuk atau arsip keluar. Mencatat transaksi keuangan yang masuk dan keluar
beserta agenda kegiatan. Hasil yang didapat adalah aplikasi sistem berbasis PHP
yang dapat mencatat transaksi-transaksi keuangan program studi Sistem Informasi,
data arsip-arsip yang masuk maupun keluar, agenda kegiatan Sesprodi dan reminder.
Kata Kunci : transaksi keuangan, sistem administrasi, Program Studi Sistem
Informasi
Endodontic retreatment of a lower canine associated with a periapical lesion: case report of an unusual anatomy
Abstract Objectives To describe the endodontic orthograde retreatment of a lower canine with a rare anatomy, affected by a symptomatic periapical lesion. Materials and methods A 30-year-old Caucasian woman came to our office reporting severe pain and swelling located at the right mandible. A two-roots/two-canals configuration was discovered for the lower canine which sustained the periapical infection; a missed lingual canal was not recognized and treated at the previous primary endodontic therapy. A full pre-operative examination and diagnosis, the application of modern endodontic strategies along with the use of magnification technologies (like the Surgical Operating Microscope - SOM) and proper disinfection protocols were employed for endodontic re-treatment. Result and conclusions Healing of the periapical infection was clinically and radiographically confirmed at a 9-month follow-up. Endodontists should know the anatomical variations of human teeth and be vigilant about them when approaching treatments. More than a single radiographic projection is recommended in the diagnostic phase. Careful procedures related to instrumentation, cleaning and filling of the entire root canal system enhance the potential for healing of apical lesions
Security Management Framework for the Internet of Things
The increase in the design and development of wireless communication technologies
offers multiple opportunities for the management and control of cyber-physical systems
with connections between smart and autonomous devices, which provide the delivery
of simplified data through the use of cloud computing. Given this relationship with the
Internet of Things (IoT), it established the concept of pervasive computing that allows
any object to communicate with services, sensors, people, and objects without human
intervention. However, the rapid growth of connectivity with smart applications through
autonomous systems connected to the internet has allowed the exposure of numerous
vulnerabilities in IoT systems by malicious users.
This dissertation developed a novel ontology-based cybersecurity framework to
improve security in IoT systems using an ontological analysis to adapt appropriate
security services addressed to threats. The composition of this proposal explores
two approaches: (1) design time, which offers a dynamic method to build security
services through the application of a methodology directed to models considering
existing business processes; and (2) execution time, which involves monitoring the IoT
environment, classifying vulnerabilities and threats, and acting in the environment,
ensuring the correct adaptation of existing services.
The validation approach was used to demonstrate the feasibility of implementing the
proposed cybersecurity framework. It implies the evaluation of the ontology to offer
a qualitative evaluation based on the analysis of several criteria and also a proof of
concept implemented and tested using specific industrial scenarios. This dissertation
has been verified by adopting a methodology that follows the acceptance in the research
community through technical validation in the application of the concept in an industrial
setting.O aumento no projeto e desenvolvimento de tecnologias de comunicação sem fio oferece
múltiplas oportunidades para a gestão e controle de sistemas ciber-físicos com conexões
entre dispositivos inteligentes e autônomos, os quais proporcionam a entrega de dados
simplificados através do uso da computação em nuvem. Diante dessa relação com
a Internet das Coisas (IoT) estabeleceu-se o conceito de computação pervasiva que
permite que qualquer objeto possa comunicar com os serviços, sensores, pessoas e objetos
sem intervenção humana. Entretanto, o rápido crescimento da conectividade com as
aplicações inteligentes através de sistemas autônomos conectados com a internet permitiu
a exposição de inúmeras vulnerabilidades dos sistemas IoT para usuários maliciosos.
Esta dissertação desenvolveu um novo framework de cibersegurança baseada em
ontologia para melhorar a segurança em sistemas IoT usando uma análise ontológica
para a adaptação de serviços de segurança apropriados endereçados para as ameaças. A
composição dessa proposta explora duas abordagens: (1) tempo de projeto, o qual oferece
um método dinâmico para construir serviços de segurança através da aplicação de uma
metodologia dirigida a modelos, considerando processos empresariais existentes; e (2)
tempo de execução, o qual envolve o monitoramento do ambiente IoT, a classificação de
vulnerabilidades e ameaças, e a atuação no ambiente garantindo a correta adaptação dos
serviços existentes.
Duas abordagens de validação foram utilizadas para demonstrar a viabilidade da
implementação do framework de cibersegurança proposto. Isto implica na avaliação da
ontologia para oferecer uma avaliação qualitativa baseada na análise de diversos critérios
e também uma prova de conceito implementada e testada usando cenários específicos.
Esta dissertação foi validada adotando uma metodologia que segue a validação na
comunidade científica através da validação técnica na aplicação do nosso conceito em
um cenário industrial
Effect of different dental articulating papers on SEMG activity during maximum clenching
This study evaluated the influence of two different occlusal indicators (articulating papers of 40\u3bcm and 200\u3bcm) on muscular activity of the temporalis anterior (TA) and superficial masseter (MS) during maximum voluntary clenches (MVC), using surface electromyography (SEMG). It was hypothesized that an articulating paper positioned between dental arches during MVC elicits a different muscular activity compared with the occlusion on natural dentition (without the occlusal indicator). 30 healthy adult subjects with a complete, natural dentition were recruited; SEMG activity was recorded in the following experimental conditions: MVC with cotton rolls for standardization purposes; MVC on natural dentition; MVC onto the 40 \u3bcm or 200\u3bcm paper indicator positioned on right or left side of the dental arch. Percentage Overlapping Coefficient (POC; separate values obtained for TA and MS), antero-posterior coefficient (APC) and total muscle activities (IMP) were the analyzed SEMG parameters. The use of an occlusal indicator statistically changed POC_TA, POC_MS and IMP median values (p 0.05). In conclusion, the examined articulating papers affected two specific SEMG parameters (POC and IMP); the recorded muscular activity with the occlusal indicator varied regardless left or right side positioning, and independently from tested paper thicknesses
- …