SEARCH

Found 9580 related files. Current in page 6

gambar gambar sound system

Rental House Management System
by ijsrporg 0 Comments favorite 16 Viewed Download 0 Times

-We are stuck with technology when what we really want is just stuff that works. With the current paradigm shift in technological field, there is an urgent need to embrace and appreciate the power of technology. Housing sector remains vigilant to face the challenges of change by employing a new strategy that facilitates easy management of rental houses. Hence there is need to develop a rental house management system that can simplify work for the rental managers so that all their work can be efficient and effective

Linkage model between sustainable consumption and  waste management system

Indonesia as the 4 th most populous country in the world, has potential economic growth and also environmental degradation problems. DKI Jakarta Province (capital city) has the most dense area about 30% of the people. East Jakarta has the highest number of unmanaged waste (2,430 m3/day). It is because of the people do not apply the sustainable consumption and they do not obey the law (UU No. 18/2008 on Waste Management). To see the relation between the household income and their consumption (for food and non-food), I used the Spearman’s Rho Correlationand to build a linkage model between the household consumption and the waste management system, I used the System Dynamics Analysis. This paper used qualitative approach and used quantitative data also. This paper emphasized on the consumer behavior. The important finding to apply the sustainable consumption are the green motivation and the green lifestyle.

Event Identification for Wireless Sensor Network

Wireless sensor networks consist of sensor nodes with radio, processor, memory, battery and sensor hardware. With widespread deployment of these devices one can precisely monitor the environment. Sensor nodes are resource constrained in terms of radio range, processor speed, memory and power. WSNs are mostly unguarded and the wireless medium is broadcast. This makes them more vulnerable to attacks. Without proper security measures, an enemy can launch various kinds of attacks in hostile environments. These attacks can disrupt the normal working of WSNs and can defeat the purpose of their deployment. Therefore security is an important aspect of these networks. WSNs are often deployed to monitor important emergency events, such as forest fire and battlefield monitoring. System Monitoring Modules (SMM) should be integrated with Intrusion Detection Modules (IDM).

Effect of Servant Leadership on Affective Commitment  among Hotel Employees

Servant leadership is an issue of growing interest among scholars. Previous studies have shown that servant leadership has lead to positive behaviors which subsequently influence the individual-level outcomes.Therefore, underpinned by leader-member exchange theory (LMX) and social exchange theory, this study examined the effective of servant leadership on affective commitment among the hotel employee. Data were collected from a sample of 149 hotel employees working in Malaysia using convenience sampling. Statistical Analysis System (SAS) version 5.1 had been used in order to run the reliability analysis, frequency analysis, explaining the correlation coefficient analysis and test of hypothesized relationships among the dependent variable and the independent variables. The results of analysis confirmed that positive correlation exists between the empowerment, humility, stewardship, standing back, forgiveness, courage, accountability, authenticity and affective commitment

American Sign Language Detection
by ijsrporg 0 Comments favorite 12 Viewed Download 0 Times

Sign language: a natural, linguistically complete and a primary medium for the humans to interact. Nowadays, this language is prevalent amongst the deaf, dumb or blind individuals. However, with the conventional sign language not known to the signers, it adversely affects their interpersonal relationships in the society. There is a need of much more sophisticated method than communication through interpreters or writing. Our aim is to design a system in which sensor glove is used to capture the signs of the American Sign Language (ASL) and translate them to English displayed on a LCD.

Measuring Contributions of Information Technology on  Bank’s Service Offering: The Case of National

Increasing uses of information technology (IT) helps to solve problems of efficiency, speed and prompt services. This study aimed at measuring contributions of IT on bank services delivery and customer satisfaction (CS), specifically to assess whether customers are satisfied with operations, to determine major service quality (SQ) determinants and identify its relationship between these determinants and SQ as well as CS. This study adapted SERVQUAL instrument model developed by Parasuraman and others (1990) to gather information. Descriptive statistics (frequencies, means), multiple regressions and correlation analyses were used. Study found that customers were dissatisfied with service rendered, there are six factors that determine SQ and among those, service delivery system has strong influence on CS, there is strong positive multiple correlations between SQ determinants and CS as well as SQ itself

Design Template for a Small Scale Solar Power Plant in  Nigeria

This study presents the possibilities for power generation in Nigeria through the utilization of the sun’s energy. It highlights the basic science for the design and selection of components for successfully harnessing solar power. The article introduces a concise, rational and practical method of designing a Stand-alone photovoltaic system.

Legitimacy Crisis in Investor – State International  Arbitration System: A Critique on the Suggested

In recent years, investor – state arbitration system (ISA) has received a lot of attention and criticism in academic writings. A section of stakeholders have labelled this system as machinery for advancing foreign investors interests at the expense of the host state interests. It is contended that the system is overshadowed with flaws and lacks the necessary values of a legitimate adjudicative system. The often cited flaws in the system includes: lack of mechanism to avoid inconsistent decisions, lack of rules to ensure impartial and independent adjudication process, confidentiality of proceedings despite the fact that the disputes are public in nature and expensive adjudication process. Furthermore the system is condemned for encroaching on governments‘ regulatory powers.

A Risk Management Framework for Clouds Using Big  Data and Security Informatics usingAttack Trees an

Social media refers to the means of interactions among people in which they create, share, and exchange information and ideas in virtual communities and networks. The growth of Information and Communication Technology (ICT) has resulted in an enormous volume of security related information present on the web largely when it comes to social media networks. Therefore, with the changing face of cyber security, although it is difficult, it was found that detecting the potential cyber-attacks or crimes is possible and feasible with the vast improvements in ICT. Cloud computing uses ICT resources that are delivered as a service over a network which has opened a promising opportunity across the globe thus resulting a greater popularity of e-commerce. The proposed framework is developed to manage risks of social media networks using the attack tree method which is used to model the risk of the system and identify the possible attacking strategies which the adversaries may launch.