While much importance is given for protecting one's data and confidential information from outsid... more While much importance is given for protecting one's data and confidential information from outside one's boundaries little is talked about the risks involved inside the organization. Users inside an organization had direct physical access to confidential information and are well aware of the resource access controls. Hence securing the intranet from its trusted users becomes critical. Statistics show that 80% of all computer frauds is committed by internal end users. This paper briefly explains the definition and the architecture of the intranet and discusses the physical security of the intranet components and also security of the organizations data both from the internal users and also from the outside world (Internet).
Article history: In today’s booming industry, many business are seeing to have quality their prod... more Article history: In today’s booming industry, many business are seeing to have quality their product,Accepted October 2014 premises, factories, merchandise and services to be certificate. Quality certification isAvailable online December 2014 becoming more relevant in today’s market, mainly because people are more aware of JEL Classification consumerism concept. It is not just about religious related matter but it extends to theM12, M21, M54 products or services being demand safe for customer as well as have healthier benefits.
In this paper, what i have been discussed, is analyzing penalties and cost shifts based on severa... more In this paper, what i have been discussed, is analyzing penalties and cost shifts based on several elements for nurse scheduling problem (NSP). NSP’s issue is to assign nurses to different tasks based on constraints. The problem is known to be NP-hard, in other words it does not have a solution or needs years to be solved. In this work we try to solve the problem by satisfying the constraints set, and we also include the nurse’s preference and try to balance the difficulty level of all the involved nurses. We also analyze the complexity of the problem as a function of parameters such as number of nurses, number of shifts, and optimality of the function. According to the importance in practice, many scientists have developed NSP problems in a satisfactory time limit.
While much importance is given for protecting one's data and confidential information from outsid... more While much importance is given for protecting one's data and confidential information from outside one's boundaries little is talked about the risks involved inside the organization. Users inside an organization had direct physical access to confidential information and are well aware of the resource access controls. Hence securing the intranet from its trusted users becomes critical. Statistics show that 80% of all computer frauds is committed by internal end users. This paper briefly explains the definition and the architecture of the intranet and discusses the physical security of the intranet components and also security of the organizations data both from the internal users and also from the outside world (Internet).
Article history: In today’s booming industry, many business are seeing to have quality their prod... more Article history: In today’s booming industry, many business are seeing to have quality their product,Accepted October 2014 premises, factories, merchandise and services to be certificate. Quality certification isAvailable online December 2014 becoming more relevant in today’s market, mainly because people are more aware of JEL Classification consumerism concept. It is not just about religious related matter but it extends to theM12, M21, M54 products or services being demand safe for customer as well as have healthier benefits.
In this paper, what i have been discussed, is analyzing penalties and cost shifts based on severa... more In this paper, what i have been discussed, is analyzing penalties and cost shifts based on several elements for nurse scheduling problem (NSP). NSP’s issue is to assign nurses to different tasks based on constraints. The problem is known to be NP-hard, in other words it does not have a solution or needs years to be solved. In this work we try to solve the problem by satisfying the constraints set, and we also include the nurse’s preference and try to balance the difficulty level of all the involved nurses. We also analyze the complexity of the problem as a function of parameters such as number of nurses, number of shifts, and optimality of the function. According to the importance in practice, many scientists have developed NSP problems in a satisfactory time limit.
Uploads
According to the importance in practice, many scientists have developed NSP problems in a satisfactory time limit.
According to the importance in practice, many scientists have developed NSP problems in a satisfactory time limit.