Suchergebnisse
Filter
120 Ergebnisse
Sortierung:
Institutioneller Rassismus in der Justiz
Blog: Verfassungsblog
Bengt Fuchs, Richter am VG Gera, steht unter Verdacht, seine richterliche Unabhängigkeit missbraucht zu haben. Er lehnte Klagen von Geflüchteten aus Nigeria und Eritrea deutlich häufiger ab als seine Kolleg*innen im Bundesdurchschnitt. Rassismus in der Justiz gefährdet die politische Gleichheit aller Bürger*innen und dient damit der autoritär-populistischen Strategie, die Erzählung vom "wahren", weißen Volk Wirklichkeit werden zu lassen. Es braucht deshalb dringend mehr Forschung und einen rassismussensiblen Bewusstseinswandel in der Justiz.
Sekolah Staf Dan Komando Angkatan Darat (SESKOAD): Doktrin Dan Implementasi Lewat Seminar Angkatan Darat 1965 – 1974
This reasearch discusses the history of the birth of the Army Staff and Command School (SESKOAD) and the development of curriculum and doctrine in 1965-1974. This research uses historical research methods. The sources used in this study are primary and secondary sources. Primary sources used in the form of archives, interviews, newspapers and periodicals. While the secondary sources used are books relating to the research theme. The Army Staff and Command School (SESKOAD) is a higher education institution in the Army. Its formation in 1951 was aimed at fulfilling the positions of officers and staff within the Army. The Army Staff and Command School also played a role in developing doctrines in the Army to the TNI. The tasks carried out by SESKOAD were important in the development of the TNI since its inception. The results of the study concluded that SESKOAD as an educational institution did not only play a role in the Army and TNI. Through the Army Seminar II organized by SESKOAD, the development of doctrine made an expansion in the role of the educational institution. The development of the New Order became one of the discussions in the Army Seminar II which emphasized the role of SESKOAD not only in the military field, but more broadly at the national level, especially in government.
BASE
Optimizing routing and radio resource allocation for Multihop D2D Communications in 5G Networks ; Optimisation du routage et de l'allocation des ressources radio pour les communications D2D multi-saut dans les réseaux 5G
Recently, Device-to-Device (D2D) has been brought inside mobile (cellular) networks with the introduction of the LTE-D2D standard into the 5G ecosystem. This cellular D2D operates in the same operator's frequencies used for regular communications with access points (i.e., base stations). In D2D mode, terminals can communicate directly and do not need to go through a base station. However, D2D communications are authorized and controlled by operators to implement their requirements and policies. A notable example of D2D is data offloading, which helps in reducing traffic congestion in mobile networks. In this scenario, terminals collaborate using their D2D connections to carry data, usually over multiple D2D hops, using other terminals as relays and avoiding base stations. However, the latter still must decide on routing (e.g., which devices should be part of the path) and wireless resource allocation (which frequencies to use by devices). Also, base stations must manage interferences between D2D and cellular communication since they all share the same spectrum. Besides, there is also the energy issue in employing battery-constrained terminals as relays. Another concern, in offloading designs, is how they scale when terminals density increases, such as in crowded-platform scenarios. These scenarios include mobile users in waiting halls of airports and train stations, or stadiums. In such situations, the decision problems mentioned before must be solved rapidly. Doing so avoids long delays in communications that can affect user experience or limit responsiveness. In this thesis, we address the problem of optimizing routing and wireless resource allocation in multihop D2D systems with a focus on data offloading. Our proposals to solve the problem consider practical aspects of the LTE-D2D standard. Moreover, we also address the mentioned energy and scalability concerns. We propose three contributions to deal with these problems. In the first contribution, we propose a novel method (JRW-D2D) to solve jointly routing and resource allocation in the aim of offloading unicast flows inside one cell over the LTE-D2D relaying system. The proposal JRW-D2D is based on Integer Linear Programming (ILP) and gives good results in terms of reliability, latency, and acceptance ratio. In the second contribution, we present two methods to solve the same problem for both unicast and multicast traffic. In the first step, we introduce an optimal ILP-based method (JRW-D2D-MC) to solve routing and resource allocation jointly. Next, to address the scalability issue in JRW-D2D-MC, we propose another scalable method (JRW-D2D-CG) based on the Column-Generation technique. Finally, our third contribution considers the energy issue, where we put forward two energy-aware schemes to solve routing and resource allocation. Initially, we propose an ILP-based method for Energy-Efficient Joint Routing and Resource Allocation (JRRA-EE). In the next step, we highlight the non-scalability of JRRA-EE and introduce a novel parametric three-stage method called Heuristic Energy-aware Routing and Resource Allocation (HERRA). Both JRRA-EE and HERRA consider energy consumption using a state-of-the-art empirical model for LTE-D2D terminals. Moreover, we evaluate the performance of our contributions based on network simulations in NS-3, which we have extended to support the LTE-D2D standard. ; Récemment, D2D (Device-to-Device) a été intégré aux réseaux mobiles avec l'introduction de la norme LTE-D2D dans l'écosystème 5G. Ce D2D cellulaire fonctionne aux mêmes fréquences que l'opérateur utilisé pour les communications régulières avec les points d'accès (c.à.d. les stations de base). En mode D2D, les terminaux peuvent communiquer directement et n'ont pas besoin de passer par une station de base. Cependant, les communications D2D sont autorisées et contrôlées par les opérateurs pour mettre en œuvre leurs exigences et leurs politiques. Le délestage de données est un exemple notable de D2D, qui aide à réduire la congestion du trafic dans les réseaux mobiles. Dans ce scénario, les terminaux collaborent en utilisant leurs connexions D2D pour transporter les données, généralement sur plusieurs sauts D2D, en utilisant d'autres terminaux comme relais et en évitant les stations de base. Toutefois, ces derniers doivent décider du routage (par exemple, quels terminaux devraient faire partie du chemin) et de l'allocation de ressources sans fil (quelles fréquences à utiliser par les terminaux). De plus, les stations de base doivent gérer les interférences entre les communications, D2D et cellulaires, car elles partagent toutes le même spectre. En outre, il y a aussi le problème énergétique lié à l'utilisation de relais soumis aux contraintes de batterie. Un autre enjeu, dans ces conceptions de délestage, concerne la manière dont elles évoluent lorsque la densité des terminaux augmente (p. ex., dans les scénarios de plate-forme surpeuplée). Ces scénarios incluent des utilisateurs mobiles dans les halls d'attente des aéroports et des gares, ou des stades. Dans de telles situations, les problèmes de décision susmentionnés doivent être résolus rapidement. Cela évite de longs délais dans les communications qui peuvent affecter l'expérience utilisateur ou limiter la réactivité. Dans cette thèse, nous abordons le problème de l'optimisation du routage et de l'allocation de ressources sans fil dans les systèmes D2D multi-sauts en mettant l'accent sur le délestage de données. Nos propositions pour résoudre le problème prennent en compte les aspects pratiques de la norme LTE-D2D. De plus, nous répondons également aux enjeux mentionnés en matière d'énergie et d'évolutivité. Nous proposons trois contributions pour traiter ces problèmes. Dans la première contribution, nous proposons une nouvelle méthode (JRW-D2D) pour résoudre conjointement le routage et l'allocation de ressources afin de délester des flux unicast sur un système de relais LTE-D2D. La proposition JRW-D2D est basée sur la programmation linéaire en nombres entiers (ILP) et donne de bons résultats en termes de fiabilité, de latence et de taux d'acceptation. Dans la deuxième contribution, nous présentons deux méthodes pour résoudre le même problème pour les trafics unicast et multicast. Dans la première étape, nous présentons une méthode optimale basée sur ILP (JRW-D2D-MC) pour résoudre conjointement le routage et l'allocation de ressources. Ensuite, pour résoudre le problème de non-évolutivité de JRW-D2D-MC, nous proposons une autre méthode évolutive (JRW-D2D-CG) basée sur la génération de colonnes. Enfin, notre troisième contribution aborde la question de l'énergie, dans laquelle nous avons présenté deux systèmes axés sur l'énergie pour résoudre les problèmes de routage et d'allocation de ressources. Dans un premier temps, nous proposons une méthode (JRRA-EE) basée sur ILP. Dans l'étape suivante, nous mettons en évidence la non-évolutivité de JRRA-EE et présentons une nouvelle méthode paramétrique à trois étapes appelée (HERRA) et basée sur l'heuristique. Les deux méthodes JRRA-EE et HERRA considèrent la consommation d'énergie à l'aide d'un modèle empirique de pointe pour les terminaux LTE-D2D. De plus, nous évaluons la performance de nos contributions sur la base de simulations de réseau dans NS-3 que nous avons étendu pour prendre en charge la norme LTE-D2D.
BASE
Promosi Perpustakaan dalam Upaya Meningkatkan Kunjungan Perpustakaan
Library is one the information sources with an ability to comprise knowledge, technology, art, and culture. It is also an institution that has democratic, economic and strategic position to make endeaver to educate nation and play a role as an instrument to conduct an active learning as well as long life education lifelong learning for either individual or collective.
BASE
Harris: Iraq: Its People, Its Society, Its Culture (Book Review)
In: The Middle East journal, Band 14, S. 478
ISSN: 0026-3141
The Effects of Psi Morphology on the Detection Efficiency of the Au-Nps Hot Spot SERS Sensors
In: Iraqi journal of science, S. 157-166
ISSN: 0067-2904
This work is related to the investigation of the effects of porous silicon (PSi) morphologies on the performance of plasmonic gold nanoparticles (Au-NPs) hot spot SERS sensors for the detection of amoxicillin molecules. Two Si wafers with different resistivity values of 10 and 100 Ω.cm were used to synthesize a PSi layer of pores- and mud-like structures, respectively, by pulsed photo chemical etching process. The hot spot SERS sensors were synthesized by incorporating the Au-NPs within the PSi morphologies of pores- and mud- like structures which are characterized by high density of nucleation sites. Plasmonic Au- NPs with different sizes and hot spot regions were incorporated into the porous structures by the ion reduction process. It was recognized that the PSi morphologies have a considerable influence on the fabrication process of the detection sensors and, consequently, on the detection process. The plasmonic Au-NPs hot spot SERS sensor based on the PSi morphology of the mud-like structures shows higher sensitivity than that of pores-like structures, even at very low concentrations of amoxicillin solutions.
World Affairs Online
STRATEGI KOMUNIKASI CALEG DPRD MUNA PADA PEMILU TAHUN 2019 DALAM MERAIH DUKUNGAN PEMILIH PEMULA DI KECAMATAN PASIKOLAGA KABUPATEN MUNA
ABSTRAK Tujuan penelitian ini adalah untuk mengetahui stratergi komunikasi caleg DPRD Muna pada pemilu tahun 2019 dalam meraih dukungan pemilih pemula di kecamatan Pasikolaga. Penelitian ini menggunakan teori Harold D. Lasswell yaitu cara yang terbaik untuk menerangkan kegiatan komunikasi adalah menjawab pertanyaan siapa, apa yang disampaikan, media apa yang digunakan, siapa sasarannya, dan bagaimana efeknya. Kemudian metode penelitian yang digunakan dalam penelitian ini yaitu Kualitatif adapun teknik penentuan informan dalam penelitian ini adalah purposive sampling sedangkan teknik pengumpulan data yang digunakan yaitu observasi, wawancara dan dokumentasi.Hasil penelitian menunjukan bahwa strategi komunikasi yang digunakan caleg ada 3 (tiga) yaitu strategi dor to dor, kampanye atau diskusi dan money politik. Sedangkan untuk pesan yang disampaikan caleg kepada pemilih pemula untuk meraih dukungan yaitu pesan yang bersifat persuasif atau membujuk, pesan yang bersifat memaksa dan mengajak. Untuk media yang digunakan caleg dalam menyampaikan pesan kepada pemilih pemula untuk meraih dukungan yaitu media online seperti WhatsApp, Instagram dan Facebook, selain itu para celeg juga membuat baliho juga membagikan stiker dan kartu nama kepada pemilih pemula agar mudah di ingat pada saat pemilihan di TPS. Kata Kunci: Strategi Komunikasi, Caleg, dan Pemilih Pemula
BASE
Generalizations of Supplemented and Lifting Semimodules
In: Iraqi journal of science, S. 3876-3889
ISSN: 0067-2904
In this paper, principally supplemented (-supplemented), and principally lifting (-lifting) semimodules are defined as generalizations of principally supplemented (-supplemented), and principally lifting (-lifting) modules. Let be a semiring. An -semimodule is called a principally supplemented (-supplemented) semimodule, if for all there exists a subsemimodule of with and small (-small) in . In this paper, we examine properties of principally -supplemented semimodules and generalize results on principally -supplemented modules to semimodules. Besides, we characterize -semiperfect semimodules as a generalization of -semiperfect modules.
ANTESEDEN KEAHLIAN OPERATOR SISTEM PENGELOLAAN ASET DESA DI KABUPATEN SITUBONDO
Sistem Pengelolaan Aset Desa (SIPADES) is a village asset administration recording application. This application provides orderly administrative facilities for the village so that the risk of losing assets can be reduced. The purpose of this study is to test and prove various individual aspects that affect operator competence in running SIPADES. The focus of the study is on the internal factors which include anxiety and computer attitudes. Another factor tested was operator training in using SIPADES in the Situbondo District Government. The data used in this study are primary data. The technique of obtaining data using a survey method. The population that is the object of research is all of the operator of the SIPADES application in Situbondo Regency. Four hypotheses were tested using multiple regression. The gender variable was used as the control variable. The results show that all hypotheses can be accepted. The variables of anxiety, attitude, and training have an effect on the operator's competence in operating SIPADES. The implication of the research is that the village government should increase the number of SIPADES operator training. This training can increase competence to run applications.
BASE
PROFIL GURU HARAPAN MASA DEPAN
AbstrakGuru adalah pendidik profesional dengan tugas untuk mendidik, mengajar, membimbing, mengarahkan, melatih, menilai, dan mengevaluasi peserta didik pada pendidikan anak usia dini jalur pendidikan formal, pendidikan dasar, dan pendidikan menengah. Guru mempunyai kedudukan sebagai tenaga profesional pada jenjang pendidikan dasar, pendidikan menengah, dan pendidikan anak usia dini pada jalur pendidikan formal yang diangkat sesuai dengan peraturan perundang-undangan yaitu: pertama, pengakuan kedudukan guru sebagai tenaga profesional dibuktikan dengan sertifikat pendidik. Kedua, Kedudukan guru sebagai tenaga profesional berfungsi untuk meningkatkan martabat dan peran guru sebagai agen pembelajaran berfungsi untuk meningkatkan mutu pendidikan nasional ketiga, Kedudukan guru dan dosen sebagai tenaga profesional bertujuan untuk melaksanakan sistem pendidikan nasional dan mewujudkan tujuan pendidikan nasional, yaitu berkembangnya potensi peserta didik agar menjadi manusia yang beriman dan bertakwa kepada Tuhan Yang Maha Esa, berakhlak mulia, sehat, berilmu, cakap, kreatif, mandiri, serta menjadi warga negara yang demokratis dan bertanggung jawab. AbstractA teacher is a professional educator with the task of educating, teaching, guiding, directing, training, assessing, and evaluating students in early childhood education through formal education, basic education, and secondary education. The teacher has a position as a professional at the level of basic education, secondary education, and early childhood education in the formal education pathways that are appointed by laws and regulations, namely: first, the recognition of the position of teachers as professionals as evidenced by certificates of educators. Second, the position of the teacher as a professional staff function to improve the dignity and the role of the teacher as a learning agent functions to improve the quality of national education. Third, the position of the teacher and lecturer as professional staff aims to implement the national education system ...
BASE
National Cyber Governance Awareness Policy and Framework
In: International journal of legal information: IJLI ; the official journal of the International Association of Law Libraries, Band 47, Heft 2, S. 70-89
ISSN: 2331-4117
AbstractDespite an ongoing drive by governments and law enforcers around the world to improve the sophistication of their risk mitigation measures, cyber-attacks are continually increasing. A study from Computer Crime and Intellectual Property Section (CCIPS) shows more than 4,000 ransomware attacks occurred daily in 2016. That's a 300 percent increase over 2015, where 1,000 ransomware attacks were seen per day. Cyber criminals are successfully penetrating even the most high-profile companies and governmental agencies. The breach at the NSA was truly alarming and just one recent example of the dire situation the country, and world, face as cybercrime intensifies and the cyber security talent shortage becomes more serious.Accordingly, the purpose of this research is to focus on cyber education at the national, government, and law enforcement level examining the methodology to set the tone from the top ensuring alignment between governments, law enforcers, private sector, and academic level. It also examines the gaps in cyber laws and educational governance initiatives and their impact on efficient execution of cyber policies for various regions of the world with a focus on the United Arab Emirates and the United States of America.Finally, this article recommends policy guidelines and a compliance manual framework for governments and law enforcers to consider ensuring that cyber risks are properly addressed and mitigated in a structured and coherent way.
Policy Development and Frameworks for Cyber Security in Corporates and Law Firms
In: International journal of legal information: IJLI ; the official journal of the International Association of Law Libraries, Band 46, Heft 3, S. 137-162
ISSN: 2331-4117
AbstractDespite an ongoing drive by organizations around the
world to improve the sophistication of their risk
mitigation measures, cyber-attacks are continually
increasing. A study by Panda Labs shows in Q3 in
2016 alone, 18 million new malware samples were
captured.2 Another study from Computer Crime and
Intellectual Property Section (CCIPS) shows more
than 4,000 ransomware attacks occurred daily in
2016. That's a 300% increase over 2015, where 1,000
ransomware attacks were seen per day.3 These studies reflect the double effect of
technology—connecting the world and facilitating
cyber-attacks simultaneously.