790 research outputs found

    Ekspresi Religi Islam Dalam Novel Haji Backpacker Karya Aguk Irawan Mn

    Full text link
    This study discusses the Islamic Religious Expression in the Novel Haji Backpacker Aguk work Irawan MN . This study also discusses the description of Islamic religious expression found in the novel Haji Backpacker Aguk work Irawan MN. This study used a qualitative approach and descriptive method that aims to describe how Islamic religious expression contained in the novel Holy Woman Shahraz Qaisra work . Results of this study is to interpret the description of Islamic religious expression found in the novel Haji Backpacker Aguk work Irawan MN . The results also as a form of documentation of Islamic religious expression that exist in the novel Haji Backpacker Aguk work Irawan MN

    Persepsi Mahasiswa Universitas Riau Terhadap Pelaksanaan Pidana Pokok Dan Pidana Tambahan Menurut UU No 31 Tahun 1999 Tentang Tindak Pidana Korupsi

    Full text link
    This research is based on the problems that arise from the observations made by the researcher that is about the implementation of additional criminal and additional crimes under UU No. 31 of 1999 on corruption crime. Based on preliminary data obtained from the literature study is many problems in the implementation of the main criminal and additional crimes on the defendant corruption crime, for example, multitafsir rule or penalty that is still considered mild in the perpetrators of corruption crime classified as extraordinary crimes or extraordinary crimes. The formulation of the problem in this research is (1) How is the perception of student Riau university to the main punishment according to UU no 31 year 1999 about corruption crime? (2) How is the perception of student of university Riau toward additional criminal according to UU no 31 year 1999 about corruption crime?. The purpose of this research is to find out the perception of students of Riau university on the implementation of principal criminal and additional crimes according to UU no 31 year 1999 about corruption crime. This research is descriptive qualitative method. Population in this research is student of university of Riau from 9 faculty, then simplified become 3 faculty which study jurisprudence only. The sample in this study amounted to 120 people from 3 faculties. Data collection techniques used interviews, questionnaires, and literature studies. Based on the results of this research can be concluded the perception of university of Riau students on implementation of basic criminal according to UU No. 31 of 1999 on corruption is good. Nevertheless, the perspective of university of Riau students on the additional criminal implementation according to UU No. 31 of 1999 on corruption crime is not good

    Data anonymization using pseudonym system to preserve data privacy

    Get PDF
    Data collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools. With the use of such services, less time is needed to attain the required output, and also managing the jobs will be simpler for users. General services employ a unique identifier for the aim of storing data in a digital database. However, it may be associated with some limitations and challenges. There is a link between the unique identifier and the data holder, e.g., name, address, Identity card number, etc. Attackers can manipulate a unique identifier for stealing the whole data. To get the data needed, attackers may even eavesdrop or guess. It results in lack of data privacy protection. As a result, it is necessary to take into consideration the data privacy issues in any data digital data storage. With the use of current services, there is a high possibility of exposure and leak of data/information to an unauthorized party during their transfer process. In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. To address such risks, this paper suggests the use of a biometric authentication method by means of a palm vein during the authentication process. Furthermore, a pseudonym creation technique is adopted to make the database record anonymous, which can make sure the data is properly protected. This way, any unauthorized party cannot gain access to data/information. The proposed system can resolve the information leaked, the user true identity is never revealed to others

    Temperature influence on total volatile compounds (TVOCs) inside the car cabin of visible light transmittance

    Get PDF
    In the automotive industry indoor air quality or Vehicle Indoor Air Quality (VIAQ) are caused by various substances emitted from interior materials inside a vehicle. The volatile organic compounds (VOCs) are an example of emitted substances from the interior materials which is harmful to the human body. As stated by previous researches, there is a strong correlation between the total VOCs emission and interior temperature. This occurs due to the solar radiation through the back window glasses, windscreen and side window glasses. This trapped heat can accelerate the melting process of trim materials such as hard plastic and rubber, thus causing the emission of total VOCs (TVOCs). Therefore, reducing the percentage of visible light transmittance (VLT) will help to reduce radiation process. The aim of this study is to investigate the effect of VLT level on TVOCs emission in the vehicle cabin under static condition (parked and unventilated) and operating condition (driving and air-conditioned). For static condition the result shows that the TVOCs concentration linearly decreases whenever the percentage of VLT level decreases. However, for operating condition the percentage of VLT have less significance after 50 minutes driving time. In conclusion, the VLT levels have a strong relationship to the TVOCs concentration despite after a long driving time

    Photo-degradation of Surfactant Compounds Using Uv Rays with Addition of Tio2 Catalysts in Laundry Waste

    Full text link
    The utility of synthetic cleaners or commonly called as detergents have developed far indeed in this century. The effective and efficient use of detergents in cleaning process, was attracted to be used in laundry\u27s industry commercially, though, it has some drawback to the society and environments. Since the active materials in the compounds can cause irritating to the skins, cataracts to mature eyes and some other environmental issues due to the excess of foams can prevent oxygen dilution in the water so it be hazardous to water living organisms. Once the promising method to solve this problem is by photo-degradation using photo-catalyst. Photo-catalyst is the process using light and catalyst in order to accelerate chemical transformation, thus, solar or uv-rays can be used as light sources. This research aims at to show the ability of catalyst TiO2 to degrade active material in linear alkyl benzene sulphonate (LAS) and alkyl benzene sulphonate (ABS) which is available in commercial detergent. Photo-degradation of LAS and ABS compounds was determined by optimum capacity TiO2 and irradiance time. Whereas, for environmental application, the degrade compounds such Rinso® and Wipol® was chosen since it is commonly used in daily life. Beside, artificial water waste and laundry water was chosen to show the environmental effect. The result shows that the optimum number of catalyst TiO2 addition for LAS degradation was 1.5 g, and optimum time was 120 minute. Whereas the optimum number of catalyst TiO2 addition for ABS degradation was 2.0 g, and optimum time was 120 minute as well. Thus, for detergent Rinso®, at optimum catalyst addition, we found degradation number was 75.83%, and for detergent Wipol®, at optimum catalyst addition, we found degradation number was 57.94%. Whereas, for artificial waste at optimum catalyst addition, we found degradation number was 91.32%, and for laundry water waste at optimum catalyst addition, we found degradation number was 70.27%

    Two secure non-symmetric role Key-Agreement protocols

    Get PDF
    Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through eliminating the need to using Bilinear Pairings. In this paper, we proposed two novel Identity-Based Authenticated Key Agreement protocols over non-symmetric role participants without using Bilinear Pairings. The results show that our proposed schemes beside of supporting security requirements of Key Agreement protocols, require a subset of operations with low complexity in compare with related protocols in this scientific area
    corecore