81 research outputs found

    The Discussion of the HRM Practices and Procedures in Non-Profit Organization: A Case Study of Sunshine Consulting Call Center

    Get PDF
    Sunshine Consulting Call Center (SCCC) is a call centre (CC) which offers consulting service to women who are suffering domestic violence. It is a non-profit organization that provides high quality service with low cost. All of SCCC’s operators are volunteers. So, the Human Resource Management (HRM) practices and procedures in SCCC are different with that of profit CC. The recruitment process lays emphasis on recruitees’ emotional intelligence; performance management uses more informal evaluation rather than hard monitoring; training should not only offer to new recruiters, but also old volunteers; employees well-being consideration, which include stress management, work-life policies and occupational health and safety (OHS) also offered to retain and motivate volunteers

    A Genetic and Simulated Annealing Combined Algorithm for Optimization of Wideband Antenna Matching Networks

    Get PDF
    A genetic and simulated annealing combined algorithm is presented and applied to optimize broadband matching networks for antennas. As a result, advantages of both the genetic algorithm (GA) and simulated annealing (SA) are taken. Effectiveness and efficiency of the presented combined algorithm are demonstrated by optimization of a wideband matching network for a VHF/UHF discone-based antenna. The optimized parameters provide significant improvements of VSWR and transducer power gain for the antenna

    A Hybrid SIE-PDE Formulation Without Boundary Condition Requirement for Transverse Magnetic Electromagnetic Analysis

    Full text link
    A hybrid surface integral equation partial differential equation (SIE-PDE) formulation without the boundary condition requirement is proposed to solve the transverse magnetic (TM) electromagnetic problems. In the proposed formulation, the computational domain is decomposed into two overlapping domains: the SIE and PDE domains. In the SIE domain, complex structures with piecewise homogeneous media, e.g., highly conductive media, are included. An equivalent model for those structures is constructed by replacing them with the background medium and introducing a surface equivalent electric current density on an enclosed boundary to represent their electromagnetic effects. The remaining computational domain and homogeneous background medium replaced domain consist of the PDE domain, in which inhomogeneous or non-isotropic media are included. Through combining the surface equivalent electric current density and the inhomogeneous Helmholtz equation, a hybrid SIE-PDE formulation is derived. It requires no boundary conditions, and is mathematically equivalent to the original physical model. Through careful construction of basis functions to expand electric fields and the equivalent current density, the discretized formulation is made compatible with the SIE and PDE domain interface. The accuracy and efficiency are validated through two numerical examples. Results show that the proposed SIE-PDE formulation can obtain accurate results, and significant performance improvements in terms of CPU time and memory consumption compared with the FEM are achieved

    Concentric circles and spiral configurations for large correlator arrays in radio astronomy

    Get PDF
    Aperture synthesis arrays are commonly used in radio astronomy to take images of radio point sources, with the planned Square Kilometre Array (SKA) being the most common example. One approach to enhancing the quality of the images is to optimize an antenna array configuration in a possible SKA implementation. An ideal arrangement must ensure optimal configurations to capture a clear image by either decreasing the sidelobe level (SLL) in the l-m domain or increasing the sampled data in the spatial-frequency domain. In this paper a novel configuration is considered to optimize the array by considering all possible observation situations through the positions of the antenna array elements via a mathematical model that we call geometrical method (GM). To demonstrate its efficiency, the technique is applied to developing an optimal configuration for the elements of the Giant Metrewave Radio Telescope (GMRT). The effect of these changes, particularly in the forms of circular and spiral arrangements, is discussed. It is found that a spiral configuration results in fewer overlapping samples than the number of antennas placed along three arms of the GMRT with fewer than 11% and 27% overlapping samples in the snapshot and 6 hr tracking observations, respectively. Finally, the spiral configuration reduces the first SLL from -13.01 dB, using the arms of the current GMRT configuration, to - 15.64 dB.Web of Science1564art. no. 17

    Power Analysis Attacks against IEEE 802.15.4 Nodes

    Get PDF
    IEEE 802.15.4 is a wireless standard used by a variety of higher-level protocols, including many used in the Internet of Things (IoT). A number of system on a chip (SoC) devices that combine a radio transceiver with a microcontroller are available for use in IEEE 802.15.4 networks. IEEE 802.15.4 supports the use of AES-CCM* for encryption and authentication of messages, and a SoC normally includes an AES accelerator for this purpose. This work measures the leakage characteristics of the AES accelerator on the Atmel ATMega128RFA1, and then demonstrates how this allows recovery of the encryption key from nodes running an IEEE 802.15.4 stack. While this work demonstrates the attack on a specific SoC, the results are also applicable to similar wireless nodes and to protocols built on top of IEEE 802.15.4

    Side Channel Power Analysis of an AES-256 Bootloader

    Get PDF
    Side Channel Attacks (SCA) using power measurements are a known method of breaking cryptographic algorithms such as AES. Published research into attacks on AES frequently target only AES-128, and often target only the core Electronic Code-Book (ECB) algorithm, without discussing surrounding issues such as triggering, along with breaking the initialization vector. This paper demonstrates a complete attack on a secure bootloader, where the firmware files have been encrypted with AES-256-CBC. A classic Correlation Power Analysis (CPA) attack is performed on AES-256 to recover the complete 32-byte key, and a CPA attack is also used to attempt recovery of the initialization vector (IV)
    corecore