Furthermore, we provide data owner with efficiently generated authenticator with encoding process simultaneously. This scheme is proven to be highly efficient, secure and the performance evaluation of this scheme makes this feasible to integrate with An Accredit Reliability and Reputation Calculation and Management Scheme for Cloud and wireless Sensor Networks Alliance. The most important element and key to our work is to enable and assist CSU in choosing authentic and desirable CSP as well as instructing CSP to select genuine SNP that delivers desirable service to the CSU. Hence we focus more on authorization of CSP and SNP rather than authentication of CSU. So, SNP and CSP are applied to certify by internationally recognized Information Security Management System (ISMS) standard by ISO. An SLA (Service Level Agreement) is a negotiated agreement between two or more parties, ion which one is the customer and the others are Cloud Service providers. SLA specifies the level of serviceability, performance, availability, operation and other parameters of the service. Usually, SLA addresses the segments about service: performance measurement, duties, problem management, warranties, definition, and termination. The result of the service received by the CSU is nothing but the subject of SLA. A PLA (Privacy Level Agreement) is also an agreement to describe how CSP maintains its level of privacy protection. The SLA between CSP and CSU provides specific attributes and minimum levels of other performance (e.g., cloud operations time, cloud processing speed) of CSP, while PLA address personal data protection and information privacy issues about cloud service.
The equivalent soil mass (ESM) is one of the methods being used to assess SOC and other soil nutrients on a normalized soil mass per unit area basis to account for differences in soil masses caused by soil management [13-16,18]. In the ESM calculation scenario, soil masses associated with different management practices are stan- dardized to a particular soil mass per unit area of a speci- fied layer and the equivalent soil C mass is adjusted to the ESM [13,16,19]. The goal of using the ESM and its associated equivalent C mass calculation is to reduce the SOC error calculated in soil profiles due to changing soil ρ b under different management practices [13,16]. Lee et
The equations USLE (Wishmeier & Smith 1978) and RUSLE (Renard et al. 1997) are widely used and accepted methods over the world for calculating average annual soil loss. Development of geoinforma- tion systems (GIS), remote sensing (RS) and distance monitoring technologies bring a lot of possibilities for integration with these equations as the USLE/ RUSLE-GIS method. The greatest benefits include very accurate height data reached by LiDAR technol- ogy, on the other hand disproportion with accuracy of soil and vegetation data and discrepancies in rainfall erosivity calculation (Brychta & Janeček 2017) may cause large errors. The inappropriate integration with GIS and RS data may result in many simplifications and distortions. Many authors developed different methods of crop-management factor evaluation (C) and rainfall erosivity factor (R) estimation due to lack of optimal data for calculation according to original methodology. Approaches to C calculation can be divided into 7 groups based on:
11 Read more
The mining loss rate and dilution rate are the key indicators for the mining technology and management level of mining enterprises. Aiming at the practical problems such as the large workload but inaccurate data of the traditional loss and dilution calculation method, this thesis introduces the operating principle and process of calculating the loss rate and dilution rate at the mining fields by adopting geological models. As an example, authors establishes 3D models of ore- body units in the exhausted area and mining fields in Yangshu Gold Mine in Liaoning Province, and conduct Boolean calculation among the models to obtain the calculation parameters of loss and dilution, and thereby calculate out the dilution rate and loss rate of the mining fields more quickly and accurately.
petitive environment of globalised economies, under circumstances of the continual and fast changing external surrounding, it is important to use various calculation methods for the efficient economic per- formance management. Those calculation methods ensure that the costs expended for production can be analysed from different points of view. it can be, for example, from these points of view:
Portfolio performance calculation for wealth management can be very com- plicated for the laymen and consequently for clients of banks. In this paper, we want to demystify some important issues related to portfolio performance calcu- lation with the aim that clients will be able to in the future better understand what is contained in the financial reporting they received from their bank. In the following brief literature review, we would like to provide several references that pursue the same goal: making financial reporting accessible to everybody. We believe this is the first important measure of risk management. In general, the books or articles suggested are complex since they integrate high-level mathe- matics. Nevertheless, there are of excellent quality. The first ones we mention are related to general performance calculation (Christopherson et al., 2009; Tyson, 1999; Grinold & Kahn, 2000). Then there are more specific calculations like the Dietz-weighted performance (Bacon, 2008; Feibel, 2003; Le Sourd, 2007). For references about consolidated portfolio performance we can suggest (Brealey et al., 1995; Reilly & Brown, 1997). Performance attribution represents a topic on its own in terms of portfolio performance and many texts exist (see Brinson et al., 1986, 1991). Finally, all the literature on bonds and interest rate calculations are usually very specialized on this theme (Homer & Leibowitz, 1972; Smith, 2011).
18 Read more
A reasonable coal mine safety control model is very important for coal mine safety management. In this paper, a calculation model of coal mine safety management is researches based on Kalman filtering algorithm. Unlike traditional regression analysis, this model is based on state equation. The model design and parameter identification method are discussed in details. An example of actual coal production is given out and analyzed with this method. The calculation results show that the average prediction error rate of this model is less compared with traditional linear regression and exponential one. Regression parameters such as H and C in this model can be explained with practical safety management factors.
This section discusses about the related work. Grid computing research has produced security technologies based not on direct inter-organizations trust relationships, but rather on the use of VO as a bridge among the en- tities participating in a particular community or function . The secure grid environment must employ mecha- nisms to secure authentication, authorization, data encryption, resource protection and secure communication. Grid security itself presents several unique security challenges, including managing user identities  across lo- cal and global networks, managing the diversity of local resources/user security systems trust relationships be- tween entities, end-user key and credential management and providing security to resources against malicious acts of grid users . Designing a secure grid implies taking into account the needs of grid users to secure re- mote resources that protect the integrity and confidentiality of data and also the needs of resource owners to en- sure that only authorized, trustworthy individuals are using their systems . Cody et al. have separated the se- curity solutions into system based and behavior based solutions. For example, a grid developer/administrator looking to implement a specific technology as his grid system might turn immediately to the system-based solu- tions, while a researcher studying behavioral aspects of security of the classification system can use behavioral solutions . Trust management will fall under the category of behavioral solutions. Trust differs from authen- tication. Authentication seeks to expose the identity of someone attempting to gain access to the grid. The
Unifying information technology that is supported by increasingly advanced software or hardware will help a lot in the process and data of employees in the company. Almost all companies in terms of decision making, information dissemination, increased effectiveness of work and services have used computer information systems. Currently at PT. Cannet Electrics Indonesian, there is no system that supports the operations and planning of the company. Application and management of employees such as employee data, department data, employee leave, employee permits, employee attendance, salary calculation, employee performance appraisal and manual documentation management. Where each process is still
Background and purpose: Even-aged forests prevail in Croatia’s forestry. Rotation period is based mostly on natural parameters. In practice, rotation period is given by Croatian Rulebook of forest management. Cutting age is determined based on inventory data and many other stand characteristics. Rotation period is a planned time and it always has to be unique for particular tree species, and cutting age is the age of a stand at the mo- ment of the final cut. The aim of the paper is to compare rotation period based on economic parameters and ro- tation period determined by using forest inventory data. Material and methods: Owing to absence of long term stand calculation data, research object was taken from Forest Management Handbook (1995). Mean annual in- crement (MAI) and current annual increment (CAI) pro- vided fundamental data for calculations. The research was conducted at one hectare Common Beech (Fagus sylvatica L.) stand. Assortment structure and value of timber was estimated by the present cutting value meth- od calculated by using Croatian forests Ltd. Price list for the year 2008. Labor costs in forest exploitation were also taken into account.
Information required to compute path calculation precisely is size of demand gained from each ingress egress pair in network. But this is difficult to be realized. Instead, the location of ingress egress pair can be exploited to predict the high-loaded paths. Other necessary information such as network topology and the residual bandwidth become the important keys to the success of MIRA algorithm.
They used the IDEF0 (Integrated Definition Function Modeling) method in the work, accepted as the state standard in the USA and as the recommendations of RF Gosstandart Р 50.1.028-2001. CASE (Computer-Aided Software/System Engineering) means ERwin Process Modeler r7.3 was selected as the tool for analysis, organization, and reorganization of business processes. During the evaluation of the effectiveness of the clinical trial management system, the authors used the net present value (NPV) calculation method.The article proposed the methodological principles of management optimization, which included the construction of two models of business processes in the clinical studies of a pharmaceutical company before and after modernization ("AS-IS" and "AS-WILL"). The structure of the AS-WILL model has a new functional unit "To support clinical research", which can allow organizing the company activities more efficiently through the introduction of highly specialized positions - a logistics expert and an expert in regulatory procedures. For the economic evaluation of modernization, negative cash flows were taken into account and distributed throughout the quarters during the clinical study, a discount rate was determined depending on the projected risks and NPV value was calculated. The authors found that the business process model including the "Clinical Research Support" unit, can increase net present value.
Despite effective treatment options, more than 40% of cancer patients receive inadequate pain manage- ment. Our previous pilot study resulted in substantial adaptations of a cancer pain self-management inter- vention, the German PRO-Self © Plus Pain Control Program originally developed in the United States. This program will be implemented into clinical prac- tice at the Medical Center-University of Freiburg. The purpose of this multiple methods pilot study is to test the implementation regarding feasibility and ef- fects in clinical practice. In a randomized, wait-list controlled pilot study, adult oncology in-patients of a palliative care consultation service with pain >3/10 will be recruited. The intervention will be performed by a specialized advanced practice nurse with an in- hospital visit and, after discharge, via phone calls and visits. The follow-up will be personalized according to a clinical algorithm that factors in pain intensity, sa- tisfaction with pain management, and patient adhe- rence. The intervention includes structured and tai- lored components and is based on three key strategies: information, skill building and nurse coaching. The specific aims of this study are threefold: 1) to test the feasibility of the study and intervention procedures; 2) to establish effect sizes of main outcome variables (e.g. decrease pain intensity, reduce the number of pa- tients with pain as main symptom) for subsequent power calculation; 3) to explore participants’ expe- riences with pain self-management support and their view of burden and benefit from study participation
10 Read more
The purpose of this research is to observe the task of personal interaction in customer relationship management in the project business. From whole study and larger number of analysis and calculation it is concluded that personal interaction (Pi) and customer relationship management (CRM) in project business have a positive impact on each other and is positively correlated with each other by increasing one variable the second variable will also increase and vice versa.
12 Read more
The eHealth management platform must perform the calculation based on medians that will be determined by analyzing the values of women who have or not positive cases of trisomy. These values will be provided by the data sources of health institutions that are part of the project. The fact of having local data sources let us include in the study specific characteristics of the population or region that could influence the median calculations. These characteristics cannot be analyzed with data from foreign woman and other regions.
11 Read more
This module provides lecturer with accurate value about the consistency of student attending the class session. This module by default will add up the number of attendance once new attendance information is added. From the attendance data, the attendance status will be grouped and categorized accordingly. After that, the calculation process that involved is total up the absent status of the absentees and converts the number of present status into percentage based on subject. Hence, lecturer is able to view and read the calculated value without counting it manually.
24 Read more
Thus, as a developing country, Malaysia also has fallen into construction waste problems in line with the rapid development of construction sector. In tandem, with increasing demand of infrastructure projects, residential Abstract: Construction waste becomes a global issue facing by practitioners and researchers around the world. Waste can affects success of construction project significantly. More specifically, it has major impact on construction cost, construction time, productivity and sustainability aspects. This paper aims to identify various factors causing construction waste in Malaysia. Study was carried out through structured questionnaire focusing three major parties (i.e. clients, consultants and contractors) involved in construction project. Data was analyzed with Statistical Software Package SPSS. Reliability of data was found as 0.917 which showed that data collected was highly reliable. The calculation of Mean Rank of the construction waste causes found that the 5 key causes are Poor site management and supervision, Lack of experience, inadequate planning and scheduling, Mistakes and errors in design and finally Mistakes during construction. Spearman correlation analysis showed that Mistakes during construction was highly correlated with Rework (with 0.829 correlation value) and Slow information flow between parties (with a value of 0.60) and vice versa. Through identifying the causes and its correlation of the construction waste it gives better understanding to the construction community for future construction projects which benefit not only in term of economy but also the environment.
the parents. The absentees report was very useful for the pre calculation of food preparation. This system provides an easy process for monitoring hostel student’s activities by the warden. In the proposed model we can use two biometric devices; it is placed in the warden room and watchman room in main gate. The students must place their fingerprint in both of these devices. This technique increases the protection of the outlet students and used to collects the exit time and date of the students.
Induced by incorporating the powerful data storage and data processing abilities of cloud computing (CC) as well as ubiquitous data gathering capability of wireless sensor networks (WSNs), CC-WSN integration received a lot of attention from both academia and industry. However, authentication as well as trust and reputation calculation and management of cloud service providers (CSPs) and sensor network providers (SNPs) are two very critical and barely explored issues for this new paradigm. To fill the gap, this paper proposes a novel authenticated trust and reputation calculation and management (ATRCM) system for CC-WSN integration. Considering the authenticity of CSP and SNP, the attribute requirement of cloud service user (CSU) and CSP, the cost, trust, and reputation of the service of CSP and SNP, the proposed ATRCM system achieves the following three functions: 1) authenticating CSP and SNP to avoid malicious impersonation attacks; 2) calculating and managing trust and reputation regarding the service of CSP and SNP; and 3) helping CSU choose desirable CSP and assisting CSP in selecting appropriate SNP. Detailed analysis and design as well as further functionality evaluation results are presented to demonstrate the effectiveness of ATRCM, followed with system security analysis.
However, the data is not sufficient for the purpose of logistics cost calculation since transport and storage data published by both DOS and MOF is based on total gross income of primary service companies (logistics provider). This means that the transport and storage data from in-house logistics activities are excluded from the published figures, whereas it accounted for a large percentage of the total logistics costs. Furthermore, the „transport‟ term used in the report published by DOS and MOF include public transport, whereas public transportation does not being a part of logistics system.