515 research outputs found

    ANALISIS DEFORMASI DAN RETAKAN STRUKTUR TEROWONGAN AKIBAT BEBAN STATIK DAN BEBAN KERETA API DENGAN METODE ELEMEN HINGGA

    Get PDF
    Kerusakan yang terjadi akibat meningkatnya sistem transportasi pada terowongan seperti retakan dan deformasi menyebabkan dilakukannya beberapa analisis pemodelan untuk mengetahui dan mencegah terjadinya kerusakan pada terowongan. Penelitian ini bertujuan menganalisis kerusakan yang disebabkan deformasi dan retakan pada lapisan shotcrete terowongan dengan menggunakan dua analisis pemodelan yaitu pemodelan menggunakan lapisan pseudoshell yang dikembangkan Shi (2009) dan pemodelan akibat beban kereta api. Objek penelitian adalah lapisan shotcrete terowongan Sieberg, Austria. Pada pemodelan dengan lapisan pseudoshell, digunakan lapisan dengan ketebalan 0,03 m, 0,06 m dan 0,1 m dengan beban merata sebagian pada sisi kiri terowongan dan beban terpusat pada kedua sisi dengan asumsi lebar retakan maksimum yang telah dicapai adalah 1 mm serta analisa berdasarkan beban kereta api saat bergerak dengan kecepatan 36 km/h dan 100 km/h dengan asumsi waktu pelayanan selama 15 tahun. Asumsi lalu lintas kereta api yang melintas dalam sehari adalah 5 kali. Beberapa data yang dikumpulkan selanjutnya akan dianalisis menggunakan perangkat lunak Atena V5. Hasil yang diperoleh adalah pada pemodelan pseudoshell, untuk beban merata sebagian sisi kiri terowongan, besaran deformasi dengan pemodelan pseudoshell dengan tebal 0,03 m, 0,06 m dan 0,1 m adalah 48,33mm, 42,75 mm dan 35,5 mm. Untuk beban terpusat pada sisi kiri terowongan, besaran deformasi dengan pemodelan pseudoshell dengan tebal 0,03 m, 0,06 m dan 0,1 m adalah 8,6 mm, 10,8 mm dan 8,361 mm. Untuk beban terpusat pada sisi kanan terowongan, besaran deformasi dengan pemodelan pseudoshell dengan tebal 0,03 m, 0,06 m dan 0,1 m adalah 44,65 mm, 32,75 mm dan 28,02 mm. Untuk pemodelan kereta api dengan kecepatan v=36 km/h didapatkan deformasi pada sisi kiri 7,9x10-2 mm dan kanan 3,4510-2 mm. Untuk pemodelan kereta api dengan kecepatan v=100 km/h didapatkan deformasi pada sisi kiri sebesar 1,11x10-1 mm dan kanan sebesar 0,0354 mm

    Quantitative economics of security: software vulnerabilities and data breaches

    Get PDF
    Includes bibliographical references.2016 Summer.Security vulnerabilities can represent enormous risks to society and business organizations. A large percentage of vulnerabilities in software are discovered by individuals external to the developing organization. These vulnerabilities are often exchanged for monetary rewards or a negotiated selling price, giving rise to vulnerability markets. Some of these markets are regulated, while some are unregulated. Many buyers in the unregulated markets include individuals, groups, or government organizations who intend to use the vulnerabilities for potential attacks. Vulnerabilities traded through such markets can cause great economic, organizational, and national security risks. Vulnerability markets can reduce risks if the vulnerabilities are acquitted and remedied by the software developers. Studying vulnerability markets and their related issues will provide an insight into their underlying mechanisms, which can be used to assess the risks and develop approaches for reducing and mitigating the potential risks to enhance the security against the data breaches. Some of the aspects of vulnerability—discovery, dissemination, and disclosure—have received some recent attention. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. This dissertation suggests that a major fraction of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored. Reports of buying and selling the vulnerabilities are now appearing in the press; however, the nature of the actual vulnerability markets needs to be analyzed. We have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located outside of the US. We have contacted several of the most prolific discoverers in order to collect firsthand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. We found that the discoverers had enough experience and good reputation to work officially with a good salary in some well- known software development companies. Many security breaches have been reported in the past few years, impacting both large and small organizations. Such breaches may occur through the exploitation of system vulnerabilities. There has been considerable disagreement about the overall cost and probability of such breaches. No significant formal studies have yet addressed this issue of risk assessment, though some proprietary approaches for evaluating partial data breach costs and probabilities have been implemented. These approaches have not been formally evaluated or compared and have not been systematically optimized. This study proposes a consolidated approach for identifying key factors contributing to the breach cost by minimizing redundancy among the factors. Existing approaches have been evaluated using the data from some of the well-documented breaches. It is noted that the existing models yield widely different estimates. The reasons for this variation are examined and the need for better models is identified. A complete computational model for estimating the costs and probabilities of data breaches for a given organization has been developed. We consider both the fixed and variable costs and the economy of scale. Assessing the impact of data breaches will allow organizations to assess the risks due to potential breaches and to determine the optimal level of resources and effort needed for achieving target levels of security

    The effects of contract modifications on Shari'ah compliant products in the United States

    Get PDF
    Islamic banking in the United States of America, became recognized as an alternative to expand into the market of traditional Muslim consumers, living in the United States. Because of strict regulatory guidelines, no Islamic banks exist in the United States. Instead, conventional banks, Islāmic banking windows (IBW) and other financial institutions offer Shari‘ah compliant products by modifying classical Islamic contracts or attaching a rider to define contract verbiage. This study reviewed techniques of adapting contracts used for Shari‘ah compliant products in the United States to determine if the contracts maintain the true characteristics of the original classical Islamic contracts. Contracts in Islamic sacred law provide protections by ensuring wealth is not wasted, and no injustice is performed by either of the contracting parties. Wealth protection and justice are the inherit characteristics of contracts in the Islāmic law. Any changes or modifications may void or decrease the protections provided in Islamic law. This research reviewed the theoretical aspects of contract modifications, by analyzing the procedures used for the derivative Shari‘ah compliant product contracts used in the Islamic finance industry in the United States. Data was evaluated and compared with the requirements of classical Islamic contract equivalents, to determine the effects of these changes.Religious Studies and ArabicD. Phil. (Religious Studies

    Understanding Consumer Behavior in E-shopping: A Case Study of Iraq with an overview of E-shopping in the global and Arab regions

    Full text link
    In the age of technology and the spread of the Internet, the diffusion, of e-shopping has increased. The Internet has made the commercial transactions faster and simplest and both the sellers and buyers get benefited by this technology. E- shopping provides a perfect example of the business revolution. Electronic Commerce has made life easier and more innovative of an individual. Consumer Behavior from e shopping differs from the spot market. The paper's goal was to review the consumer behavior in electronic- shopping and analyses the factors which influence customers' behavior in e-shopping at Iraq. The research question in this paper is the way that consumers act during e-shopping. Data was accumulated from the questionnaire survey by using Google Forms. The survey was prepared in the Arabic language. The data were collected in April 2017. A total of 492 respondents participated in the study. The study has shown the majority of Iraqisג are not doing e- shopping with 47%, therefore, it's clear that the tendency of e shopping is not very well known in the Iraqi economy as mostly and whole individuals, usually visit the store before e-shopping. also, It was given an overview of the e-shopping in globally and in the Arab regio

    Effect of quercetin on parenchymatous organ of the alloxan induced diabetes in male rats

    Get PDF
    Background: Diabetes is directly involved in oxidative stress production. Therefore, this work was conducted to investigate the histopathological changes which occur in parenchymatous and to evaluate the antioxidant effect of quercetin in alloxan induced diabetes in male albino rats.Methods: Thirty-six male albino rats were divided into six groups of 6 rats in each group and treated as follows: a control group, quercetin group, diabetic control group, diabetic with quercetin group, diabetic with insulin group, diabetic with quercetin plus insulin group, alloxan was administered as a single dose (140 mg/kg body weight) to induce diabetes.Results: Result showed histopathological changes which included degenerative to necrotic changes of the liver, kidney and pancreas and this are due to the effect of oxidative stress that occurred from diabetes by alloxan. Conversely, quercetin significantly modulated improved histopathological changes founded on this study with or without of insulin, furthermore, results showed that damaged tissues where improved when groups of rats treated with quercetin and insulin together.Conclusions: It has been concluded that the quercetin could be promising antioxidants for reducing the risk of oxidation induced by diabetes that lead to nephrotoxicity, hepatotoxicity and pancreatic damage

    Enhanced structure of a double-pass erbium-doped fiber amplifier for multiple wavelength amplifications.

    Get PDF
    We demonstrate an enhanced double-pass erbium-doped fiber amplifier for multichannel amplification. The multichannel selection is formed by combining a demultiplexer and a multiplexer together in the fiber-loop mirror. The structure is able to filter out the amplified spontaneous emission that saturates the amplifier gain in the small signal regime. The maximum average gain of 47.2 dB is obtained with a gain enhancement of 12.8 dB at a -50-dBm signal power per channel. The noise figure penalty is almost negligible for a signal power per channel of less than -15 dBm
    corecore