357 research outputs found

    Saudi Cement Industry - A Comparative Study of Profitability Position during Economic Slowdown

    Get PDF
    Infrastructure is one of the favorite projects of every developed and developing nation. Construction industry occupies a prominent place in the infrastructure development of a country. Cement is one the elementary material components in the construction industry. Saudi Arabia has shown a weaker performance in generation of revenue over a period of five years from 2015 to 2019. In a situation of economic slowdown it becomes a challenge for the business concerns to maintain their profitability. The present study is designed to analyze and compare the profitability position of cement companies in the kingdom of Saudi Arabia during this period. The study belongs to top five cement companies in terms of market value and revenue generation in the kingdom of Saudi Arabia. To measure the profitability gross profit ratio, operating ratio, operating profit ratio, net profit ratio and return on investment have been used as variables. One way anova has been used to test the hypotheses. The study shows that these companies do not differ significantly from one another in terms of gross profit, operating profit and net profit but they differ significantly when return on investment is compared. Cement companies can increase their profitability by improving the components of those ratios that have been the cause of decline in profitability

    Research productivity of University of Delhi: A Scientometric Study

    Get PDF
    Scientometrics studies have now a days become popular to evaluate and rank research productivity of authors, institutions and universities globally. Number of such studies has been published in various journals, conference proceedings, review papers, book chapters, and research reports. The study was taken to analysis research productivity of University of Delhi during the last 30 years

    Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme

    Get PDF
    Violation of one’s intellectual ownership rights by the others is a common problem which entertainment industry frequently faces now-a-days. Sharing of information over social media platforms such as Instagram, WhatsApp and twitter without giving credit the owner causes huge financial losses to the owner and hence needs an immediate attention. Digital watermarking is a promising technique to protect owners’ right against digital piracy. Most of the state-of-the-art techniques does not provides adequate level of resilience against majority of video specific attacks and other commonly applied attacks. Therefore, this paper proposes a highly transparent and robust video watermarking solution to protect the owners rights by first convert each video frame into YCbCr color components and then select twenty five strongest speeded-up robust features (SURF) points of the normalized luminance component as points for both watermark embedding and extraction. After applying variety of geometric, simple signal processing and video specific attacks on the watermarked video meticulous analysis is performed using popular metrics which reveals that the proposed scheme possesses high correlation value which makes it superior for practical applications against these attacks. The scheme also proposes a novel three-level impairment scale for subjective analysis which gives stable results to derive correct conclusions

    A Review of Information Security from Consumer’s Perspective Especially in Online Transactions

    Get PDF
    In the current internet technology, most of the transactions to banking system are effective through online transaction. Predominantly all these e-transactions are done through e-commerce web sites with the help of credit/debit cards, net banking and lot of other payable apps. So, every online transaction is prone to vulnerable attacks by the fraudulent websites and intruders in the network. As there are many security measures incorporated against security vulnerabilities, network thieves are smart enough to retrieve the passwords and break other security mechanisms. At present situation of digital world, we need to design a secured online transaction system for banking using multilevel encryption of blowfish and AES algorithms incorporated with dual OTP technique. The performance of the proposed methodology is analyzed with respect to number of bytes encrypted per unit time and we conclude that the multilevel encryption provides better security system with faster encryption standards than the ones that are currently in use

    What Is The New and Sensitive Tumor Marker for Detection of Different Kidney Tumors? Modern Study to Isolation, Purification and Characterization of N-Acetyl Galactosamine Binding Lectin From Sera Of Patients With Kidney Cancer

    Get PDF
    The present study was designed to investigate lectins in sera of patients with kidney tumors, in addition to non tumoral kidney disease patients. Fifty five patients of malignant kidney tumors were enrolled in addition to 23 patients of benign kidney tumors, and 18 patients of non tumoral kidney diseases used as control groups, in addition to 46 healthy individuals were also investigated. The age of patients and healthy individuals were 10-90 years. The measurement of total serum proteins revealed significant (p < 0.001) decrease in patients of malignant tumors when compared with those of benign, non tumoral diseases, and healthy individuals. The conditions of the hemagglutination assay of serum lectin activity were optimized. They were Tris buffer of 20 mM and pH 7.4, 60 mM CaCl2, 800 µg of defatted serum, 30 ËšC for serum samples, 60 minutes for serum samples, and human blood of group A+ suspension with 1.4 optical density. The measurement of the specific hemagglutination activity of lectins demonstrated significant (p < 0.001) elevation in patients of malignant tumors when compared with those of other patients and healthy individuals. Lectin activity was pointed out to be significantly (r = 0.767 at p < 0.0005) positively correlated with stage of malignancies. The cutoff value of the specific hemagglutination activity was found to equal 6 SHU for discriminatory malignant kidney tumors. Serum lectins activity were indicated to be inhibited by galactose, mannose, lactose, and N-acetyl galactosamine. Purification of lectin from sera of patients with malignant kidney tumors by affinity chromatography with the use of silver stain revealed N-Acetyl Galactosamine Binding Lectin (GalNAcBL). The purified folds and the yield was 178 with 32.4%. The polyacrylamide gel electrophoresis (PAGE) of purified lectin demonstrated one band consisted lectin activity. The approximate molecular weight of GalNAcBL was determined and found to be 63.83. Purified lectin was characterized through the assessment of the capability to agglutinate RBCs, inhibition by EDTA, pH dependency, thermal dependent, and carbohydrate contents. GalNAcBL were observed to be calcium dependence lectins (C-type). These results suggest that the diagnosis of the specific hemagglutination activity of lectin is promising biomarker for discrimination of malignant kidney tumor patients and the purified lectin could be introduced in the field of biomarkers.Â

    Analisis Faktor Faktor Yang Mempengaruhi Opini Going Concern

    Get PDF
    Penelitian ini bertujuan untuk menguji adanya pengaruh audit tenure, reputasi KAP, disclosure, debt default terhada penerimaan opini audit going concern. Hipotesis yang diajukan adalah (1) Audit tenure berpengaruh terhadap penerimaan opini audit going concern, (2) Reputasi auditor berpengaruh terhadap penerimaan opini audit going concern, (3) Disclosr berpengaruh terhadap penerimaan opini audit going concern, (4) Debt Default berpengauh terhadap penerimaan opini audit going cocern. Penelitian ini dilakukan dengan menggunakan 15 perusahaan manufaktur yang listing di BEI pada tahun 2008-2011. Sampel dipilih dengan menggunakan metode purposive sampling. Data dianilisis dengan menggunakan model analisis regresi logistik. Hasil penelitian menunjukkan bahwa audit tenure, reputasi KAP dan disclosure tidak berpengaruh terhadap penerimaan opini audit going concern. deb default memiliki pengaruh terhadap penerimaan opini audit going concern

    Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment

    Get PDF
    Cloud computing is an incipient and quickly evolving model, with new expenses and capabilities being proclaimed frequently. The increases of user on cloud with the expansion of variety of services, with that the complete allocation of resource with the minimum latent time for Virtual machine is necessary. To allocate this virtual cloud computing resources to the cloud user is a key technical issue because user demand is dynamic in nature that required dynamic allocation of resource too. To improve the allocation there must be a correct balanced algorithmic scheduling for Resource Allocation Technique. The aim of this work is to allocate resource to scientific experiment request coming from multiple users, wherever customized Virtual machines (VM) are aloft in applicable host out there in cloud. Therefore, properly programmed scheduling cloud is extremely vital and it’s significant to develop efficient scheduling methods for appropriately allocation of VMs into physical resource. The planned formulas minimize the time interval quality so as of O (Log n) by adopting KD-Tree

    A Case Report of Small Vessel Vasculitis Secondary to Steroids Use

    Get PDF
    A 47 year old Saudi male, presented to hospital* with the chief complaint of skin rash over the buttocks and lower limbs of one day duration. The rash followed steroids treatment to treat local allergic reaction to hair dye. The patient was quite well before that and his medical history, examination and laboratory investigation revealed nothing of concern. After admission, the skin rash had progressed to multiform rash and pustules following administration of methyl prednisolone 40 mg intravenously

    Designing of Wide Area Network with the use of Frame Relay Concept in Real Time Environment: a Proposal

    Get PDF
    Thes e days inter-domain routing protocol, i.e., BGP (Border Gateway Protocol), is getting complicated day by day due to policy mis-configuration by individual autonomous systems. Existing configuration analysis techniques are either manual or tedious, or do not scale beyond a small number of nodes due to the state explosion problem. To aid the diagnosis of mis-configurations in real -world large BGP systems, this paper presents BGP based on Packet Switching Technology and Inter-VLAN where as packet switching technology is WAN technology. Inter - VLAN is a technology to communicate between two ormore VLAN. A company can send or receive any type of data, either text image, video etc. Another important part of network is security. This network would make use of following protocol for security purpose such as PAP, CHAP, ACL, and NAT. The key idea is that, all transmissions are broken into units called packets, each of which contains addressing information that identifies both the source and destination nodes. These packets are then routed through various intermediaries, known as Packet Switching Exchanges(PSEs), until they reach their destination.And there are two parameters associated with a Frame Relay connection are; Committed Information Rate (CIR), Peak Information Rate (PIR) Cisco configuration guidelines, as well as arbitrary user -defined networks. This method improves theapplicability, efficiency, and benefits of the network deployment, it also introduces an infrastructure that enables networking researchers to interact with advanced formal method tool
    • …
    corecore