Purpose This paper aims to address the user perspective about usability, security and use of five authentication schemes (text and graphical passwords, biometrics and hardware tokens) from a population not covered previously in the literature. Additionally, this paper explores the criteria users apply in creating their text passwords. Design/methodology/approach An online survey study was performed in spring 2019 with university students in Mexico and Bosnia and Herzegovina. A total of 197 responses were collected. Findings Fingerprint-based authentication was most frequently perceived as usable and secure. However, text passwords were the predominantly used method for unlocking computer devices. The participants preferred to apply personal criteria for creating text passwords, which, interestingly, coincided with the general password guidelines, e.g. length, combining letters and special characters. Originality/value Research on young adults’ perceptions of different authentication methods is driven by the increasing frequency and sophistication of security breaches, as well as their significant consequences. This study provided insight into the commonly used authentication methods among youth from two geographic locations, which have not been accounted for previously.
Saeh, Bassam, Nadnaravni jezik Kur'ana, s engleskog preveo: Munir Drkić. Sarajevo: Centar za napredne studije, 2018. str. 104. ISBN 978-9958-022-68-5.
Background The objectives of the study were to investigate the organizational characteristics of acute care facilities worldwide in preventing and managing infections in surgery; assess participants’ perception regarding infection prevention and control (IPC) measures, antibiotic prescribing practices, and source control; describe awareness about the global burden of antimicrobial resistance (AMR) and IPC measures; and determine the role of the Coronavirus Disease 2019 pandemic on said awareness. Methods A cross-sectional web-based survey was conducted contacting 1432 health care workers (HCWs) belonging to a mailing list provided by the Global Alliance for Infections in Surgery. The self-administered questionnaire was developed by a multidisciplinary team. The survey was open from May 22, 2021, and June 22, 2021. Three reminders were sent, after 7, 14, and 21 days. Results Three hundred four respondents from 72 countries returned a questionnaire, with an overall response rate of 21.2%. Respectively, 90.4% and 68.8% of participants stated their hospital had a multidisciplinary IPC team or a multidisciplinary antimicrobial stewardship team. Local protocols for antimicrobial therapy of surgical infections and protocols for surgical antibiotic prophylaxis were present in 76.6% and 90.8% of hospitals, respectively. In 23.4% and 24.0% of hospitals no surveillance systems for surgical site infections and no monitoring systems of used antimicrobials were implemented. Patient and family involvement in IPC management was considered to be slightly or not important in their hospital by the majority of respondents (65.1%). Awareness of the global burden of AMR among HCWs was considered very important or important by 54.6% of participants. The COVID-19 pandemic was considered by 80.3% of respondents as a very important or important factor in raising HCWs awareness of the IPC programs in their hospital. Based on the survey results, the authors developed 15 statements for several questions regarding the prevention and management of infections in surgery. The statements may be the starting point for designing future evidence-based recommendations. Conclusion Adequacy of prevention and management of infections in acute care facilities depends on HCWs behaviours and on the organizational characteristics of acute health care facilities to support best practices and promote behavioural change. Patient involvement in the implementation of IPC is still little considered. A debate on how operationalising a fundamental change to IPC, from being solely the HCWs responsibility to one that involves a collaborative relationship between HCWs and patients, should be opened.
We study the flavor structure of the lepton and baryon number-conserving dimension-6 operators in the Standard Model effective field theory (SMEFT). Building on the work of [1], we define several well-motivated flavor symmetries and symmetry-breaking patterns that serve as competing hypotheses about the ultraviolet (UV) dynamics beyond the SM, not far above the TeV scale. In particular, we consider four different structures in the quark sector and seven in the charged lepton sector. The set of flavor-breaking spurions is (almost) always taken to be the minimal one needed to reproduce the observed charged fermion masses and mixings. For each case, we explicitly construct and count the operators to the first few orders in the spurion expansion, providing ready-for-use setups for phenomenological studies and global fits. We provide a Mathematica package SMEFTflavor (https://github.com/aethomsen/SMEFTflavor) to facilitate similar analyses for flavor symmetries not covered in this work.
Digital transformation represents an inevitable aspect of the modern business environment by establishing a new value system that relies on vertical and horizontal value chains, as well as the provision of companies' products and services. A transformation is undertaken through three steps: digital business environment; digital users' experience and digital business models and ecosystem. Health care systems represent perfect systems for digital transformation processes as they are confronted with the challenge to provide their users with the best possible outcomes of health care while reducing costs. The increased number of older and chronically patients, as well as those patients who want to take control of their own health data, represent special challenges. In this case, digital transformation is not only a desirable concept but also a necessary one. This paper presents the concept of digital transformation in healthcare, with a special focus on the key elements of construction that make these processes possible. It also provides an overview of the modern software solution implemented through these processes.
Digital transformation represents a connective tissue of the global economic system and therefore is an unavoidable element in the process of improvement, both developed and underdeveloped countries. In contrast to digitalization, which was the initiator of digital transformation and relied exclusively on the introduction of digital technologies, digital transformation is interpreted as much wider and requires a special set of skills and competencies. From the perspective of technological innovations, which is the key segment of this process, it is necessary to recognize relevant elements that ensure that the process of digital transformation runs smoothly. Initially, in order to identify the digital competencies of which the process consists, it is necessary to analyze the process of digital transformation itself. After the analysis, the focus shifts to the digital competencies needed to fulfill the identified skills. In this paper, an analysis of digital transformation is performed and the necessary competencies that employees need to have for this process to be successful within the business ecosystem are identified. Relying on DIGCOMP as guidance for digital competencies, recommendations and suggestions were formed in order to connect these two areas.
The paper presents an approach to reverse engineering of a relational database schema. The approach enables database schema extraction from the corresponding metadata stored in the data dictionary by executing a universal set of queries regardless of the source database management system. The concrete queries are generated by combining predefined templates with concrete metadata for the particular source system. Based on the proposed approach, we implemented a software tool and experimentally validated it. The implemented solution enables reverse engineering of relational databases managed by several contemporary database management systems.
In contemporary electrical power systems real-time power line monitoring and supervision are commonly performed using simple non-invasive devices with contactless magnetic field measurement. Measured magnetic fields are commonly employed for fault detection in fault passage indicators, but they can also be used to determine electrical and non-electrical power line variables. In this paper a novel adaptive method for conductor sag estimation is proposed, using magnetic field measurement. The method is based on the properly calibrated approximate power line magnetic field model, in which catenary-shaped conductors are modeled by tilted straight-line conductors of infinite length. By this approximation, the overhead power line model can be used in simple devices for power line monitoring in real-time. Applicability and accuracy of the proposed method for power line conductor sag estimation is verified by computer simulations and measurements on a three-phase overhead line model, scaled to laboratory conditions.
The study focused on assessing and testing Windows 10 to identify possible vulnerabilities and their ability to withstand cyber-attacks. CVE data, alongside other vulnerability reports, were instrumental in measuring the operating system's performance. Metasploit and Nmap were essential in penetration and intrusion experiments in a simulated environment. The study applied the following testing procedure: information gathering, scanning and results analysis, vulnerability selection, launch attacks, and gaining access to the operating system. Penetration testing involved eight attacks, two of which were effective against the different Windows 10 versions. Installing the latest version of Windows 10 did not guarantee complete protection against attacks. Further research is essential in assessing the system's vulnerabilities are recommending better solutions.
Most modern missiles implement some variant of proportional navigation (PN) guidance law. In order to implement this form of navigation, the missile has to measure line of sight (LOS) rate. Devices capable to measure LOS rate are referred to as the seekers. This article aims to present analysis of a missile seeker mathematical models with purpose to obtain LOS rate estimation used for implementation of PN in three dimensions. This paper includes MATLAB simulations of developed seeker with 6-DOF nonlinear missile mathematical model and autopilot presented in earlier works by the authors.
With the decreasing reserves of conventional sources and the high emission of harmful gases caused by them, the inclusion of renewable energy sources in power system is increasing. However, to best utilize them, different site location criteria for PV generator installment need to be considered in the decision-making process. This paper presents Fuzzy Analytical Hierarchical Process (AHP) method used in energy planning to find the best Photovoltaic (PV) system site location for the established criteria and factors. Eight criteria were identified and evaluated. These include the solar energy potential, distance to the transmission line, PV surface slope, sunshine duration, the total amount of energy/PV, the temperature ratio, site survey, and performing shading analysis. PVGIS software tool is used to collect necessary data. Evaluation criteria are prioritized by applying fuzzy AHP, fuzzifying the inputs of the decision matrix using triangular fuzzy numbers. The obtained results and the methodology show potential in finding the best location where the PV system can be best utilized.
In this paper, the design and implementation of parallel instrumented tests of Android applications are presented. Instrumented unit tests are tests that run on physical devices and emulators, and they can take advantage of the Android framework APIs. Android is the leading mobile operating system worldwide and the quality of mobile applications is as important as in any other desktop or web application. Evaluation and quality of those applications are accomplished by using automated testing tools. Parallel testing radically reduces the cost and time with regard to traditional testing methodologies. The paper uses a method and tools developed by Roman Kushnarenko from Medisafe. All the tools are available on the author's GitHub repository under the MIT license. The method is benchmarked on a simple application with different devices and emulators. Experiments show how tests parallelization scales with a different number of tests and devices.
Detecting changes in web pages is a process that has many uses for regular users and developers alike. This paper lists and explains the usual steps in the development of one tool that detects changes. Two tools are implemented and tested on real-life web pages. Changes that can be detected in these tools are based on DOM (Document Object Model) trees. Results for two methods of tree comparisons are presented and discussed.
Non‐Down‐syndrome‐related acute megakaryoblastic leukemia (non‐DS‐AMKL) is a rare form of leukemia that can present with a variety of initial symptoms, including fever, rash, bruising, bleeding, or other more clinically challenging symptoms. Herein, we describe a 19‐month‐old female patient who presented with left lower extremity pain and language regression who was diagnosed with AMKL, not otherwise specified (NOS), on the basis of peripheral blood and bone marrow analysis, as well as cytogenetic and molecular diagnostic phenotyping. Of note, in addition to this patient's karyotype showing trisomy 3, a fusion between CBFA2T3 (core‐binding factor, alpha subunit 2, translocated to, 3) on chromosome 16 and GLIS2 (GLIS family zinc finger protein 2), also on chromosome 16, was observed. Patients with AMKL who have trisomy 3 with CBFA2T3::GLIS2 fusions are rare, and it is not known if the co‐occurrence of these abnormalities is coincidental or biologically related. This highlights the continued need for further expansion of genetic testing in individuals with rare disease to establish the groundwork for identifying additional commonalities that could potentially be used to identify therapeutic targets or improve prognostication.
Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više