336 research outputs found

    An Organizational Level Advancement Ofmis and Its Security Milestones Intechnological Era

    Get PDF
    Today the most vital asset of any enterprise is its data and to maintain its security. In order to make your business successful in this era of modern economy and to compete with the advancing world, one must have to understand the importance of data management. Management Information System is a source of managing large amount of data of any firm and it has a powerful influence on the performance of an organization by maintaining its data electronically. This paper discusses the impact of MIS on performing various functions of an organization and how this software can increase the profitability, growth and innovation of an organization. In short, a positive relationship between an organization and MIS is discussed. With the increasing complexity in technology, there arise some serious issues of security which includes hacking, spoofing, cybercrime etc that needs to be catered. This research therefore covers possible solutions to such security threats along with some techniques and also discusses various types of information systems. The need therefore is to produce a way that encourages operating a secure information system for an organization

    An Overview on Cyber Attacks and its Types for Enhancing Data Security in Business World

    Get PDF
    For sensitive data of organizations there arises a need of ensuring privacy and protection measures in systems especially at various high-tech firms. Cyber attacks are a wide form of threat confronted on web by several users on daily basis. These attacks are fundamentally used to challenge system security of others yet there are likewise some moral programmers who get into other people frameworks' to aware them about their vulnerabilities and get paid in return for securing their systems. In any case, these assaults have caused a great deal of concern for businessmen. The research covers the major types of cyber attacks that can affect the business world in an immense manner along with an overview that how these threats work and how they can be possibly prevented from. The hacking procedures are showing signs of improvement step by step and so should our frameworks to remain safe from all sorts of latest attacks on our data in various forms

    Multimodal Interaction Recognition Mechanism by Using Midas Featured By Data-Level and Decision-Level Fusion

    Get PDF
    Natural User Interfaces (NUI's) dealing with gestures is an alternative of traditional input devices on multi-touch panels. Rate of growth in the Sensor technology has increased the use of multiple sensors to deal with various monitoring and compatibility issues of machines. Research on data-level fusion models requires more focus on the fusion of multiple degradation-based sensor data. Midas, a novel declarative language to express multimodal interaction patterns has come up with the idea of developers required patterns description by employing multi-model interaction mechanism. The language as a base interface deals with minimum complexity issues like controlling inversion and intermediary states by means of data fusion, data processing and data selection provisioning high-level programming abstractions

    Emergency airway management of a patient with tracheal stenosis

    Get PDF
    We are presenting a case of a 26 year old healthy male, who came with gradual worsening of dyspnoea following prolonged intubation and ventilation, after a road traffic accident five months back. On arrival in ER, he was hypoxaemic with severe respiratory distress. He was transferred to the operation room (OR) for emergency tracheostomy. During the transfer, he was placed in an upright position with oxygen at 15 L/M. In the OR, anaesthesia was induced with sevoflurane gradually. Direct laryngoscopy was done which revealed normal vocal cords. A size 4.00 mm ID endotracheal tube was impossible to pass more than 1-2 cm distal to vocal cords. Due to a large leak, size 8 tube was passed below the cords and cuff was inflated slightly to reduce air leak. Oxygen saturation dropped to 95-96% and surgeon was asked to start tracheostomy. Findings included an almost complete subglottic stenosis, 2 cm below the vocal cords. A tracheostomy tube was inserted below the stenotic lesion which was followed by direct laryngoscopy

    Marketing problems of farmers in Punjab, Pakistan : a case study

    Get PDF
    The incentives which encouraged the author to undertake this research work stem from the need for such work. First of all, comparatively little information is available within or outside Pakistan concerning the origins and evolution of planning and design characteristics of rural landscapes, and particularly the prevalent marketing structure and its related aspects of life in Punjab region. In Pakistan, sources of materials in the form of Government reports and special studies do exist, but they are widely scattered and relatively little attention is paid to them. This research study at Edinburgh University is an attempt to add to that scarce information by carrying out objective and systematic research on 'the comparative study of canal-irrigated (Bar) and wells-irrigated (Bet) areas with special reference to agricultural marketing problems of farmers in Punjab'. This study explores that the Bar areas, with the help of the British canal irrigation system, were planned in rural landscapes of Punjab and later due to overseas migration due to better education have proved prosperous as compared to the wells-irrigated (Bet) areas. This study mainly focusses on the comparison of agricultural marketing problems of the farmers from these planned and unplanned rural areas in the light of neoclassical, natural resource, locational and central place theories

    Effect of different nutraceuticals on phytochemical and mineral composition as well as medicinal properties of home made mixed vegetable pickles.

    Get PDF
    The present study was carried out to check the effect of different nutraceuticals on antioxidant activity, total phenolic contents, total flavonoid contents, antidiabetic activity, sensory evaluation and heavy metals of mixed vegetable pickles. The results were indicated that the P3 pickle sample which contained six medicinal plant powders showed the highest antioxidant activity (87.56 ± 0.02%), total phenolic contents (77.12 ± 0.01 mg GAE/100 g), total flavonoid contents (14.67 ± 0.06 QE mg/g) and antidiabetic activity (IC50= 25.89 ± 0.07 µg/mL). The level of heavy metals was varied in all of the selected pickles but below permissible limit while according to consumer point of view all sample were accepted

    Review on Huawei Fusion Sphere Security

    Get PDF
    The cloud computing virtualization stage is another method for giving computing resources that give clients available and financially savvy benefits, and bring hazards in meantime. In this way, ensuring the privacy, trustworthiness and accessibility of client information turns out to be significantly more basic to distributed computing frameworks. Huawei gives the virtualization stage security answers for confronting the dangers and difficulties postured to the distributed computing framework. This article portrays the techniques and measures received by Huawei cloud computing virtualization stage to react to the security dangers and alsodangerous to distributed computing frameworks. Huawei cloud computing virtualization stage is intended to give secure and solid server virtualization solutions for clients

    Comparison of upper lip bite test with Mallampati test in the prediction of difficult intubation at a tertiary care hospital of Pakistan

    Get PDF
    Objective: To determine the accuracy of the Upper lip bite test and Mallampati test in predicting difficult endotracheal intubation.Methods: The cross-sectional study was conducted at the Aga Khan University Hospital, a tertiary care facility in Karachi, Pakistan. Between June 1,2007 and May 31, 2008, 324 adult patients undergoing elective surgeries requiring general anaesthesia with endotracheal intubations were enrolled. Pre-operatively upper lip bite test and Mallampati test were performed for the assessment of airway by a specifically trained observer. Laryngoscopic view was rated by using Cormack and Lehane laryngoscopic grading once the patient was fully anaesthetised using standard anaesthesia technique. Completed data sheets were analysed using SPSS version 10. McNemar test and rank correlation coefficient were used to compare the upper lip bite test and the Mallampati test.Results: Of the 324 patients, 56 (17.3%) were classified as cases of difficult intubation. Upper lip bite test showed significantly higher accuracy, positive predictive value and negative predictive value than the Mallampati test. Comparison of specificity, however, did not reveal any significant difference between the two tests.CONCLUSION: Upper lip bite test is an acceptable alternative as a single test to predict difficult intubation in addition to other tests of airway assessment for the prediction of difficult intubation

    Role of Social Commerce Forums in Establishing Purchase Intention: A Nexus Between Credibility, Trust and E-Commerce Satisfaction

    Get PDF
    Social media is persuading to consumers in field of social commerce (S-Commerce) by providing goods or services and fulfill their demands in a very short period of time. Electronic-satisfaction (e-satisfaction) and credibility have distinctive activities of social media that motivate and successively build the trust at various stages of purchase intentions. For better understanding it is necessary to recognize the factors of social commerce such as referrals, reviews & ratings because they have a strong influence on buying behaviour of ecommerce consumers. A quantitative and descriptive approach has been projected through simple random sampling. A cross-sectional data of 250 participants were collected by a survey questionnaire from social commerce users examined through Partial Least Square- Structural Educational Modeling-3 (PLS-SEM-3). A social support theory has supported relationship on trust through social media activities, surface credibility, and presumedcredibility as well as e-commerce satisfaction. Interestingly trust, surface and presumed credibility considerably significant impact on e-commerce and social commerce satisfaction that leads to develop purchase intention. The current study theoretically contributes novel indicator, presumed credibility in the social commerce industry and practically it promotes specific websites that triggers trust

    AN OVERVIEW ON CYBER ATTACKS AND ITS TYPES FOR ENHANCING DATA SECURITY IN BUSINESS WORLD

    Get PDF
    For sensitive data of organizations there is a compelling need of ensuring privacy in several aspects and to inculcate protective measures in systems especially in various high-tech firms. Cyber-attacks are a wide form of threat confronted globally on the web by several users on daily basis. These attacks are fundamentally used to challenge system security of others, there are likewise some moral programmers who get into other people frameworks to make them aware about their vulnerabilities and they also get paid in return for securing such systems. In any case, these assaults have caused a great deal of concern for businessmen. Thisresearch covers the major types of cyber-attacks that can affect the business world in an immense manner along with an overview that how these threats work and how they can be possibly prevented. As the hacking mechanisms are showing signs of increased danger in a step by step manner, our frameworks should also take preventive measures to remain safe from all sorts of latest attacks on our data that can possibly attack in various forms
    • …
    corecore