759 research outputs found

    Modeling & Control of Methoxy-Methyl-Heptane Separation Process

    Get PDF
    A study in Lehigh University Bethlehem, Pennsylvania has proposed the chemical 2-methoxy-2-methylheptane (MMH) as a great alternative gasoline additive to replace methyl tert-butyl ether (MTBE) in order to avoid groundwater contamination. In MMH production process, the chemistry involves the liquid phase reversible reaction of methanol with 2-methyl-1-heptene (MH) to form MMH. However, methanol and MH also undergo an undesirable reaction to form dimethyl ether (DME) and 2-methyl-2-heptanol (MHOH). The approach adopted in this paper is to do a modeling and control of the MMH separation process to achieve a specified yield of MMH. The MMH separation process features three distillation columns in series. The first distillation column separate DME from the rest of product, second distillation column separates MH from the rest of product, and the third distillation column separates the final product MMH from MHOH. Process model is obtained through system identification using input-output testing data. A model predictive control strategy would be developed to replace regulatory control in order to sustain production at optimum cost the current regulatory control. This project also explained the function of gasoline additive, why replacement of MTBE with MMH as gasoline additive is needed, and MTBE’s effect on environment

    Improving Reuse of Distributed Transaction Software with Transaction-Aware Aspects

    Get PDF
    Implementing crosscutting concerns for transactions is difficult, even using Aspect-Oriented Programming Languages (AOPLs) such as AspectJ. Many of these challenges arise because the context of a transaction-related crosscutting concern consists of loosely-coupled abstractions like dynamically-generated identifiers, timestamps, and tentative value sets of distributed resources. Current AOPLs do not provide joinpoints and pointcuts for weaving advice into high-level abstractions or contexts, like transaction contexts. Other challenges stem from the essential complexity in the nature of the data, operations on the data, or the volume of data, and accidental complexity comes from the way that the problem is being solved, even using common transaction frameworks. This dissertation describes an extension to AspectJ, called TransJ, with which developers can implement transaction-related crosscutting concerns in cohesive and loosely-coupled aspects. It also presents a preliminary experiment that provides evidence of improvement in reusability without sacrificing the performance of applications requiring essential transactions. This empirical study is conducted using the extended-quality model for transactional application to define measurements on the transaction software systems. This quality model defines three goals: the first relates to code quality (in terms of its reusability); the second to software performance; and the third concerns software development efficiency. Results from this study show that TransJ can improve the reusability while maintaining performance of TransJ applications requiring transaction for all eight areas addressed by the hypotheses: better encapsulation and separation of concern; loose Coupling, higher-cohesion and less tangling; improving obliviousness; preserving the software efficiency; improving extensibility; and hasten the development process

    [The Evolution of Private Tahfiz Governance in Malaysia] Evolusi Tadbir Urus Tahfiz Swasta di Malaysia

    Get PDF
    The existence of private tahfiz centres in Malaysia is encouraging and continues to grow over the years. Thus, strengthening the governance of such institutions is a necessity especially in this age of digital transformation. To begin with, the study will outline the strengths and weaknesses of existing governance and followed by the analysis of the elements of evolutionary governance of private tahfiz institutions in the country. In fact, the standards that cover all aspects of good tahfiz management will be proposed and to be endorsed by relevant bodies and approved by the Council of Rulers. Most importantly, the findings of this study will provide guidelines to the management of private tahfiz institutions in Malaysia to improvise the administration and to develop religious schools to suit the needs of current times in line with the main policies of the Malaysian government through the National Tahfiz Council. Besides, the proposed standard will be a key reference for stakeholders such as the Department of Islamic Development Malaysia (JAKIM) and also to achieve the national aspiration to produce 125,000 huffaz (tahfiz school graduates) by 2050 through the National Tahfiz Education Policy (NTEP) and National Transformation.   Kewujudan institusi tahfiz swasta di dalam negara Malaysia amat menggalakkan dan terus meningkat saban tahun. Justeru, pemerkasaan urus tadbir institusi tahfiz swasta menjadi satu keperluan pada era masa kini yang menjurus ke arah transformasi. Sebagai permulaan, kajian akan menghuraikan kelemahan dan kekuatan tadbir urus dan melaksanakan analisa elemen evolusi urus tadbir institusi tahfiz swasta di Malaysia. Seterusnya, piawaian yang merangkumi semua aspek pengurusan yang baik akan dicadangkan serta mendapat sokongan pengesahan dari pihak yang mempunyai autoriti. Hasil dapatan kajian yang bakal dijalankan akan memberikan panduan kepada pengurusan institusi tahfiz swasta di Malaysia dalam usaha mentransformasikan urus tadbir selaras dengan polisi utama kerajaan Malaysia melalui Majlis Tahfiz Negara. Di samping itu, cadangan piawaian yang akan dibangunkan boleh menjadi rujukan utama pihak berkepentingan seperti Jabatan Kemajuan Islam (JAKIM) sekaligus melancarkan hasrat untuk mencapai 125,000 huffaz menjelang tahun 2050 yang termaktub didalam Dasar Pendidikan Tahfiz Negara (DPTN)

    Design And Analysis Of a Multi-channel Optical Fibre Lan Based On Modified Csma/cd Protocol

    Get PDF
    Nowadays, optical communication is widely employed by telecommunication providers in the whole world due to its ability to support high bit rate applications. The urge to provide end-to-end fibre connectivity arises to overcome the bottleneck problem that occurs when packets are transmitted on the slower speed medium such as copper. In optical transmission, bandwidth utilisation can be improved further by using multiple wavelengths or channels in a single fibre. This thesis discusses the implementation of multiple wavelengths technique for Local Area Network (LAN) environment. It proposes a new Ethernet-based protocol that uses multiple wavelengths for transmission, which runs on a single fibre. Ethernet/IEEE 802.3 is chosen because of its widespread employment in today's network and the ability of extending the transmission rate up to gigabit transmission. Even though light does not collide with each other, receiver contention might occur if more than one signal arrives at the receiver at the same time. Therefore, some arbitration mechanism is needed to synchronise the transmission and the tuning time of the respective transmitter and receiver. The proposed design is based on the physical bus topology with n number of connected nodes and m number of operating wavelengths. All nodes are able to listen to all wavelengths. A fast control unit is used, which is responsible for packet scheduling. The packets are scheduled based on a pre-computed time. Both transmitter and receiver will be asked to tune to the· allocated wavelength. The transmitter can start transmitting and the receiver will start tuning at a specified time. Control packets are used for handshaking purposes. The main operation is placed at the control unit so that no added complexity is experienced by the receiver. Thus, this technique further reduces the cost. A suitable range of channels is obtained from the result. The network performance is evaluated against several design parameters by comparing the performance of each channel. The result shows a significant improvement whereby the throughput and efficiency are increased and average delay is minimised compared to the conventional system

    Vulnerability assessment in the use of biometrics in unsupervised environments

    Get PDF
    Mención Internacional en el título de doctorIn the last few decades, we have witnessed a large-scale deployment of biometric systems in different life applications replacing the traditional recognition methods such as passwords and tokens. We approached a time where we use biometric systems in our daily life. On a personal scale, the authentication to our electronic devices (smartphones, tablets, laptops, etc.) utilizes biometric characteristics to provide access permission. Moreover, we access our bank accounts, perform various types of payments and transactions using the biometric sensors integrated into our devices. On the other hand, different organizations, companies, and institutions use biometric-based solutions for access control. On the national scale, police authorities and border control measures use biometric recognition devices for individual identification and verification purposes. Therefore, biometric systems are relied upon to provide a secured recognition where only the genuine user can be recognized as being himself. Moreover, the biometric system should ensure that an individual cannot be identified as someone else. In the literature, there are a surprising number of experiments that show the possibility of stealing someone’s biometric characteristics and use it to create an artificial biometric trait that can be used by an attacker to claim the identity of the genuine user. There were also real cases of people who successfully fooled the biometric recognition system in airports and smartphones [1]–[3]. That urges the necessity to investigate the potential threats and propose countermeasures that ensure high levels of security and user convenience. Consequently, performing security evaluations is vital to identify: (1) the security flaws in biometric systems, (2) the possible threats that may target the defined flaws, and (3) measurements that describe the technical competence of the biometric system security. Identifying the system vulnerabilities leads to proposing adequate security solutions that assist in achieving higher integrity. This thesis aims to investigate the vulnerability of fingerprint modality to presentation attacks in unsupervised environments, then implement mechanisms to detect those attacks and avoid the misuse of the system. To achieve these objectives, the thesis is carried out in the following three phases. In the first phase, the generic biometric system scheme is studied by analyzing the vulnerable points with special attention to the vulnerability to presentation attacks. The study reviews the literature in presentation attack and the corresponding solutions, i.e. presentation attack detection mechanisms, for six biometric modalities: fingerprint, face, iris, vascular, handwritten signature, and voice. Moreover, it provides a new taxonomy for presentation attack detection mechanisms. The proposed taxonomy helps to comprehend the issue of presentation attacks and how the literature tried to address it. The taxonomy represents a starting point to initialize new investigations that propose novel presentation attack detection mechanisms. In the second phase, an evaluation methodology is developed from two sources: (1) the ISO/IEC 30107 standard, and (2) the Common Evaluation Methodology by the Common Criteria. The developed methodology characterizes two main aspects of the presentation attack detection mechanism: (1) the resistance of the mechanism to presentation attacks, and (2) the corresponding threat of the studied attack. The first part is conducted by showing the mechanism's technical capabilities and how it influences the security and ease-of-use of the biometric system. The second part is done by performing a vulnerability assessment considering all the factors that affect the attack potential. Finally, a data collection is carried out, including 7128 fingerprint videos of bona fide and attack presentation. The data is collected using two sensing technologies, two presentation scenarios, and considering seven attack species. The database is used to develop dynamic presentation attack detection mechanisms that exploit the fingerprint spatio-temporal features. In the final phase, a set of novel presentation attack detection mechanisms is developed exploiting the dynamic features caused by the natural fingerprint phenomena such as perspiration and elasticity. The evaluation results show an efficient capability to detect attacks where, in some configurations, the mechanisms are capable of eliminating some attack species and mitigating the rest of the species while keeping the user convenience at a high level.En las últimas décadas, hemos asistido a un despliegue a gran escala de los sistemas biométricos en diferentes aplicaciones de la vida cotidiana, sustituyendo a los métodos de reconocimiento tradicionales, como las contraseñas y los tokens. Actualmente los sistemas biométricos ya forman parte de nuestra vida cotidiana: es habitual emplear estos sistemas para que nos proporcionen acceso a nuestros dispositivos electrónicos (teléfonos inteligentes, tabletas, ordenadores portátiles, etc.) usando nuestras características biométricas. Además, accedemos a nuestras cuentas bancarias, realizamos diversos tipos de pagos y transacciones utilizando los sensores biométricos integrados en nuestros dispositivos. Por otra parte, diferentes organizaciones, empresas e instituciones utilizan soluciones basadas en la biometría para el control de acceso. A escala nacional, las autoridades policiales y de control fronterizo utilizan dispositivos de reconocimiento biométrico con fines de identificación y verificación individual. Por lo tanto, en todas estas aplicaciones se confía en que los sistemas biométricos proporcionen un reconocimiento seguro en el que solo el usuario genuino pueda ser reconocido como tal. Además, el sistema biométrico debe garantizar que un individuo no pueda ser identificado como otra persona. En el estado del arte, hay un número sorprendente de experimentos que muestran la posibilidad de robar las características biométricas de alguien, y utilizarlas para crear un rasgo biométrico artificial que puede ser utilizado por un atacante con el fin de reclamar la identidad del usuario genuino. También se han dado casos reales de personas que lograron engañar al sistema de reconocimiento biométrico en aeropuertos y teléfonos inteligentes [1]–[3]. Esto hace que sea necesario investigar estas posibles amenazas y proponer contramedidas que garanticen altos niveles de seguridad y comodidad para el usuario. En consecuencia, es vital la realización de evaluaciones de seguridad para identificar (1) los fallos de seguridad de los sistemas biométricos, (2) las posibles amenazas que pueden explotar estos fallos, y (3) las medidas que aumentan la seguridad del sistema biométrico reduciendo estas amenazas. La identificación de las vulnerabilidades del sistema lleva a proponer soluciones de seguridad adecuadas que ayuden a conseguir una mayor integridad. Esta tesis tiene como objetivo investigar la vulnerabilidad en los sistemas de modalidad de huella dactilar a los ataques de presentación en entornos no supervisados, para luego implementar mecanismos que permitan detectar dichos ataques y evitar el mal uso del sistema. Para lograr estos objetivos, la tesis se desarrolla en las siguientes tres fases. En la primera fase, se estudia el esquema del sistema biométrico genérico analizando sus puntos vulnerables con especial atención a los ataques de presentación. El estudio revisa la literatura sobre ataques de presentación y las soluciones correspondientes, es decir, los mecanismos de detección de ataques de presentación, para seis modalidades biométricas: huella dactilar, rostro, iris, vascular, firma manuscrita y voz. Además, se proporciona una nueva taxonomía para los mecanismos de detección de ataques de presentación. La taxonomía propuesta ayuda a comprender el problema de los ataques de presentación y la forma en que la literatura ha tratado de abordarlo. Esta taxonomía presenta un punto de partida para iniciar nuevas investigaciones que propongan novedosos mecanismos de detección de ataques de presentación. En la segunda fase, se desarrolla una metodología de evaluación a partir de dos fuentes: (1) la norma ISO/IEC 30107, y (2) Common Evaluation Methodology por el Common Criteria. La metodología desarrollada considera dos aspectos importantes del mecanismo de detección de ataques de presentación (1) la resistencia del mecanismo a los ataques de presentación, y (2) la correspondiente amenaza del ataque estudiado. Para el primer punto, se han de señalar las capacidades técnicas del mecanismo y cómo influyen en la seguridad y la facilidad de uso del sistema biométrico. Para el segundo aspecto se debe llevar a cabo una evaluación de la vulnerabilidad, teniendo en cuenta todos los factores que afectan al potencial de ataque. Por último, siguiendo esta metodología, se lleva a cabo una recogida de datos que incluye 7128 vídeos de huellas dactilares genuinas y de presentación de ataques. Los datos se recogen utilizando dos tecnologías de sensor, dos escenarios de presentación y considerando siete tipos de instrumentos de ataque. La base de datos se utiliza para desarrollar y evaluar mecanismos dinámicos de detección de ataques de presentación que explotan las características espacio-temporales de las huellas dactilares. En la fase final, se desarrolla un conjunto de mecanismos novedosos de detección de ataques de presentación que explotan las características dinámicas causadas por los fenómenos naturales de las huellas dactilares, como la transpiración y la elasticidad. Los resultados de la evaluación muestran una capacidad eficiente de detección de ataques en la que, en algunas configuraciones, los mecanismos son capaces de eliminar completamente algunos tipos de instrumentos de ataque y mitigar el resto de los tipos manteniendo la comodidad del usuario en un nivel alto.Programa de Doctorado en Ingeniería Eléctrica, Electrónica y Automática por la Universidad Carlos III de MadridPresidente: Cristina Conde Vila.- Secretario: Mariano López García.- Vocal: Farzin Derav

    Pengaruh Intergreen terhadap Kinerja Simpang Bersinyal Jl. Prof Moh Yamin – Jl. Abdurrahman Saleh di Kota Palu

    Get PDF
    Permasalahan pada simpang Jalan Prof. Moh Yamin – Jalan Dr. Abdurrahman Saleh terletak pada waktu sinyal Traffic Light, dimana nilai pada waktu sinyal All Red(semua merah) yaitu 5 detik sehingga nilai Intergreen (waktu antar hijau) menjadi 8 detik melebihi nilai normal pada MKJI 1997, yang mengakibatkan kendaraan memerlukan waktu lebih lama pada saat melewati simpang tersebut. Penelitian ini bertujuan untuk mengetahui pengaruh intergreen terhadap kinerja simpang bersinyal. Pelaksanaan pengambilan data volume lalu lintas pada hari Selasa,07 September 2021. Waktu survei dibagi menjadi 3 jam puncak pagi, siang, dan sore hari pengambilan data volume lalu lintas menggunakan kamera CCTV. Volume lalu lintas tertinggi pada jam puncak sore hari (16:00 – 18:00) WITA. Penanganan simpang Jalan Prof. Moh Yamin – Jalan Dr. Abdurrahman Saleh terdapat empat skenario, skenario satu yang sangat berpengaruh terhadap kinerja simpang Jalan Prof. Moh Yamin – Jalan Dr. Abdurrahman Saleh. Secara analisis dapat mempengaruhi kinerja simpang khususnya meningkatkan nilai kapasitas sebesar 9%, mengurangi nilai derajat kejenuhan sebesar 9%, serta mengurangi nilai tundaan sebesar 22%. Dalam penanganan simpang Jalan Prof. Moh Yamin – Jalan Dr. Abdurrahman Saleh dilakukan empat skenario penanganan simpang Jalan Prof. Moh Yamin – Jalan Dr. Abdurrahman Saleh. Skenario satu yang memungkinkan untuk di terapkan di lapangan diperoleh waktu sinyal All Red (semua merah) yaitu 2 detik, nilai Intergreen (waktu antar hijau) yaitu 5 detik, dengan menyesuaikan waktu sinyal hijau berdasarkan waktu siklus 173 detik. Diperoleh nilai tundaan pada seluruh lengan simpang yaitu ≥ 60 det/smp dengan tingkat pelayanan simpang dalam kategori F

    Modeling & Control of Methoxy-Methyl-Heptane Separation Process

    Get PDF
    A study in Lehigh University Bethlehem, Pennsylvania has proposed the chemical 2-methoxy-2-methylheptane (MMH) as a great alternative gasoline additive to replace methyl tert-butyl ether (MTBE) in order to avoid groundwater contamination. In MMH production process, the chemistry involves the liquid phase reversible reaction of methanol with 2-methyl-1-heptene (MH) to form MMH. However, methanol and MH also undergo an undesirable reaction to form dimethyl ether (DME) and 2-methyl-2-heptanol (MHOH). The approach adopted in this paper is to do a modeling and control of the MMH separation process to achieve a specified yield of MMH. The MMH separation process features three distillation columns in series. The first distillation column separate DME from the rest of product, second distillation column separates MH from the rest of product, and the third distillation column separates the final product MMH from MHOH. Process model is obtained through system identification using input-output testing data. A model predictive control strategy would be developed to replace regulatory control in order to sustain production at optimum cost the current regulatory control. This project also explained the function of gasoline additive, why replacement of MTBE with MMH as gasoline additive is needed, and MTBE’s effect on environment

    Perancangan Sistem Informasi Penjualan CCTV Berbasis Web Di Khaesya CCTV

    Get PDF
    Peracangan Sistem Informasi Penjualan CCTV Berbasis WEB Di Khaesya Cctv. Tujuan utama penelitian ini adalah untuk meningkatkan penjualan prodak cctv di Khaesya cctv. Melalui perancangan sistem informasi berbasis web. Subyek penelitian ini adalah admin dan para user. Hasil penelitian menunjukan bahwa pengoperasian aplikasi ini membantu kinerja khaesya cctv dalam penyampaian informasi prodak dan hargas sehingga informasi lebih mudah diakses kapan pun dan dimana pun. Yang sebelumnya Khaesya cctv masih menggunkan sistem metode penjualan konvensional menjadi berbasis web, sehingga promosi penjualan lebih efesien dan mudah diakses oleh siapapun. Kesimpulan penelitian ini bahwa penerapan sistem informasi penjualan cctv berbasis web ini dapat membantu kelancaran penjualan di Khaesya Cctv

    PENGARUH CELEBRITY ENDORSER TERHADAP KEPUTUSAN PEMBELIAN DI EIGER STORE ROYAL PLAZA SURABAYA

    Get PDF
    Penelitian ini bertujuan untuk menjelaskan dan menganalisis dampak dari penggunaan Celebrity Endorser pada keputusan pembelian produk Eiger Store Royal Plaza Surabaya. Jenis penelitian dalam penelitian ini menggunakan metode penelitian secara deskripstif dengan melakukan pendekatan secara kuantitatif yang menggunakan teknik pengambilan sampel ialah metode accidental sampling dengan jumlah responden sebanyak 105 responden. Responden dalam penelitian ini adalah konsumen yang sedang melakukan pembelian pada Eiger Store Royal Plaza Surabaya. Teknik yang di gunakan dalam pengumpulan data yaitu dari hasil angket yang telah di isi oleh responden, dokumentasi dan wawancara dengan pengolahan data menggunakan SPPS versi 16.0. Hasil dari penelitian ini menunjukkan variabel Celebrity Endorser memiliki pengaruh yang signifikan pada variabel keputusan pembelian, dengan besaran nilai t hitung yang di dapat lebih besar dari t-tabel yaitu 2,203 > 1,983. Jadi variabel Celebrity Endorser memiliki pengaruh signifikan pada keputusan pembelian dalam penelitian ini
    corecore