5,500 research outputs found

    Copper-acrylic enamel serves as lubricant for cold drawing of refractory metals

    Get PDF
    Acrylic enamel spray containing metallic copper pigment lubricates refractory metal tubing during cold drawing operations so that the tubing surface remains free from scratches and nicks and does not seize in the die. Zirconium alloys, zirconium, tantalum alloys, niobium alloys, vanandium alloys and titanium alloys have been drawn using this lubricant

    Can solvable extensions of a nilpotent subalgebra be useful in the classification of solvable algebras with the given nilradical?

    Get PDF
    We construct all solvable Lie algebras with a specific n-dimensional nilradical n_{n,3} which contains the previously studied filiform nilpotent algebra n_{n-2,1} as a subalgebra but not as an ideal. Rather surprisingly it turns out that the classification of such solvable algebras can be reduced to the classification of solvable algebras with the nilradical n_{n-2,1} together with one additional case. Also the sets of invariants of coadjoint representation of n_{n,3} and its solvable extensions are deduced from this reduction. In several cases they have polynomial bases, i.e. the invariants of the respective solvable algebra can be chosen to be Casimir invariants in its enveloping algebra.Comment: 19 page

    Environmental Disaster in Japan

    Get PDF

    The use of information technology in human resource management in American enterprises

    Get PDF
    Theoretical background: The ongoing development of information technology (IT) has caused IT solutions to be increasingly applied in human resource management (HRM). The implementation of such solutions is highly advantageous to enterprises because they streamline the provision of services to job candidates and employees, and save time and money. This is particularly important for high-tech enterprises using the latest scientific and technological advances and innovative solutions.Purpose of the article: The objective of the study was to examine the use of IT tools in recruitment and selection, development and training, motivation, talent management and personnel services. Research methods: The research employed the case study method. Documentation analysis, interview techniques and observations were carried out in enterprises. The paper describes three case studies of high-tech companies headquartered in Silicon Valley in the United States.Main findings: High-tech enterprises in Silicon Valley deploy a wide range of IT tools for recruitment and selection, development and training, motivation, talent management and human resource (HR) services, thus supporting personnel management processes and increasing the efficiency of administrative tasks. The type and scope of the applied IT solutions depended on the size of the company. Large enterprises had a tendency to integrate specifi tools used in HR processes into one employee management system. The research showed a number of advantages regarding IT tool implementation in HRM, such as improved HR management efficiency due to data integration, obtaining a better match between employee competences, their development capacities and company demands. Moreover, the use of IT tools increased employee engagement in the performance of tasks. The implementation of IT tools in HRM produces certain limitations since technologies can be static and information can be transferred in one direction only. Therefore, face-to-face relationships, opportunities for sharing opinions between employees and prospects for development are essential in enterprises because they impact employee engagement.Theoretical background: The ongoing development of information technology (IT) has caused IT solutions to be increasingly applied in human resource management (HRM). The implementation of such solutions is highly advantageous to enterprises because they streamline the provision of services to job candidates and employees, and save time and money. This is particularly important for high-tech enterprises using the latest scientific and technological advances and innovative solutions.Purpose of the article: The objective of the study was to examine the use of IT tools in recruitment and selection, development and training, motivation, talent management and personnel services. Research methods: The research employed the case study method. Documentation analysis, interview techniques and observations were carried out in enterprises. The paper describes three case studies of high-tech companies headquartered in Silicon Valley in the United States.Main findings: High-tech enterprises in Silicon Valley deploy a wide range of IT tools for recruitment and selection, development and training, motivation, talent management and human resource (HR) services, thus supporting personnel management processes and increasing the efficiency of administrative tasks. The type and scope of the applied IT solutions depended on the size of the company. Large enterprises had a tendency to integrate specific tools used in HR processes into one employee management system. The research showed a number of advantages regarding IT tool implementation in HRM, such as improved HR management efficiency due to data integration, obtaining a better match between employee competences, their development capacities and company demands. Moreover, the use of IT tools increased employee engagement in the performance of tasks. The implementation of IT tools in HRM produces certain limitations since technologies can be static and information can be transferred in one direction only. Therefore, face-to-face relationships, opportunities for sharing opinions between employees and prospects for development are essential in enterprises because they impact employee engagement

    SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users\u27 Traffic Patterns

    Get PDF
    Network anomalies are correlated to activities that deviate from regular behavior patterns in a network, and they are undetectable until their actions are defined as malicious. Current work in network anomaly detection includes network-based and host-based intrusion detection systems. However, network anomaly detection schemes can suffer from high false detection rates due to the base rate fallacy. When the detection rate is less than the false positive rate, which is found in network anomaly detection schemes working with live data, a high false detection rate can occur. To overcome such a drawback, this paper proposes a superior behavior-based anomaly detection system (SuperB) that defines legitimate network behaviors of authorized users in order to identify unauthorized accesses. I define the network behaviors of the authorized users by training the proposed deep learning model with time series data extracted from network packets of each of the users. Then, the trained model is used to classify all other behaviors (I define these as anomalies) from the defined legitimate behaviors. As a result, SuperB effectively detects all anomalies of network behaviors. The simulation results show that SuperB needs at least five end-to-end network conversations to achieve over 95% accuracy and over 93% true positive rate. Some simulations achieved 100% accuracy and true positive rate. The simulations use live network data combined with the CICIDS2017 data set. The performance has an average of less than 1.1% false positive rate, with some simulations showing 0%. The execution time to process each conversation is 85.20 ± 0.60 milliseconds (ms), and thus it takes about only 426 ms to process five conversations to identify an anomaly

    IT TOOLS SUPPORTING EMPLOYEE MANAGEMENT IN A HIGH-TECH ENTERPRISE

    Get PDF
    Nowadays, the rapid development of Information Technologies in several fields of socio-economic activity can be observed. High-tech companies develop or implement IT solutions in numerous areas, including employee management. In the studied high-tech enterprise, the IT solutions are used in order to facilitate employee management in recruitment and selection, development and training, evaluation, motivation, talent management and personnel-related services. The company implemented an integrated employee management system. This enabled data integration and improvement of employee management. Owing to the implementation of the tools, the company improve work efficiency in the course of procedures being standardized

    Growth and Differentiation of Transplanted Epithelial Cell Cultures*

    Get PDF

    Fabrication techniques developed for small- diameter, thin-wall tungsten and tungsten alloy tubing

    Get PDF
    Report describes methods for the fabrication of tungsten and tungsten alloys into small-diameter, thin-wall tubing of nuclear quality. The tungsten, or tungsten alloy tube blanks are produced by double extrusion. Plug-drawing has emerged as an excellent secondary fabrication technique for the reduction of the overall tube dimensions

    Reconciliation of anti-money laundering instruments and European data protection requirements in permissionless blockchain spaces

    Get PDF
    Artykuł ten zmierza do pogodzenia wymagań unijnego rozporządzenia o ochronie danych osobowych (RODO) i instrumentów przeciwdziałania praniu brudnych pieniędzy i finansowania terroryzmu (AML/CFT) wykorzystywanych w dostępnych publicznie ekosystemach permissionless bazujących na technologi rozproszonych rejestrów (DLT). Dotychczasowe analizy skupiają się zazwyczaj jedynie na jednej z tych regulacji. Natomiast poddanie analizie ich wzajemnych oddziaływań ujawnia brak ich koherencji w sieciach permissionless DLT. RODO zmusza członków społeczności blockchain do wykorzystywania technologii anonimizujących dane albo przynajmniej zapewniających silną pseudonimizację, aby zapewnić zgodność przetwarzania danych z wymogami RODO. Jednocześnie instrumenty globalnej polityki AML/CFT, które są obecnie implementowane w wielu państwach stosowanie do wymogów ustanawianych przez Financial Action Task Force (FATF), przeciwdziałają wykorzystywaniu technologii anonimizacyjnych wbudowanych w protokoły sieci blockchain. Rozwiązania proponowane w tym artykule mają na celu spowodowanie kształtowania sieci blockchain w taki sposób, aby jednocześnie zabezpieczały one dane osobowe użytkowników zgodnie z wysokimi wymogami RODO, jednocześnie adresując ryzyka AML/CFT kreowane przez transakcje w takiej anonimowej lub silnie pseudonimowej przestrzeni. Poszukiwanie nowych instrumentów polityki państw jest konieczne aby zapewnić że państwa nie będą zwalczać rozwoju wszystkich anonimowych sieci blockchian, gdyż jest to konieczne do zapewnienia ich zdolność do realizacji wysokich wymogów RODO w zakresie ochrony danych przetwarzanych na blockchain. Ten artykuł wskazuje narzędzia AML/CFT, które mogą być pomocne do tworzenia blockchainów wspierających prywatność przy jednoczesnym zapewnieniu wykonalności tych narzędzi AML/CFT. Pierwszym z tych narzędzi jest wyjątkowy dostęp państwa do danych transakcyjnych zapisanych na zasadniczo nie-trantsparentnym rejestrze, chronionych technologiami anonimizacyjnymi. Takie narzędzie powinno być jedynie opcjonalne dla danej sieci (finansowej platformy), jak długo inne narzędzia AML/CFT są wykonalne i są zapewniane przez sieć. Jeżeli żadne takie narzędzie nie jest dostępne, a dana sieć nie zapewni wyjątkowego dostępu państwu (państwom), wówczas regulacje powinny pozwalać danemu państwu na zwalczanie danej sieci (platformy finansowej) jako całości. Efektywne narzędzia w tym zakresie powinny obejmować uderzenie przez państwo (państwa) w wartość natywnej kryptowaluty, a nie ściganie indywidualnych jej użytkowników. Takie narzędzia mogą obejmować atak (cyberatak) państwa lub państw który podważy zaufanie użytkowników do danej sieci.This article is an attempt to reconcile the requirements of the EU General Data Protection Regulation (GDPR) and anti-money laundering and combat terrorist financing (AML/CFT) instruments used in permissionless ecosystems based on distributed ledger technology (DLT). Usually, analysis is focused only on one of these regulations. Covering by this research the interplay between both regulations reveals their incoherencies in relation to permissionless DLT. The GDPR requirements force permissionless blockchain communities to use anonymization or, at the very least, strong pseudonymization technologies to ensure compliance of data processing with the GDPR. At the same time, instruments of global AML/CFT policy that are presently being implemented in many countries following the recommendations of the Financial Action Task Force, counteract the anonymity-enhanced technologies built into blockchain protocols. Solutions suggested in this article aim to induce the shaping of permissionless DLT-based networks in ways that at the same time would secure the protection of personal data according to the GDPR rules, while also addressing the money laundering and terrorist financing risks created by transactions in anonymous blockchain spaces or those with strong pseudonyms. Searching for new policy instruments is necessary to ensure that governments do not combat the development of all privacy-blockchains so as to enable a high level of privacy protection and GDPR-compliant data processing. This article indicates two AML/CFT tools which may be helpful for shaping privacy-blockchains that can enable the feasibility of such tools. The first tool is exceptional government access to transactional data written on non-transparent ledgers, obfuscated by advanced anonymization cryptography. The tool should be optional for networks as long as another effective AML/CFT measures are accessible for the intermediaries or for the government in relation to a given network. If these other measures are not available and the network does not grant exceptional access, the regulations should allow governments to combat the development of those networks. Effective tools in that scope should target the value of privacy-cryptocurrency, not its users. Such tools could include, as a tool of last resort, state attacks which would undermine the trust of the community in a specific network
    corecore