67 research outputs found

    Key Lessons Learnt from Stakeholder Management in Design and Build Projects in Qatar

    Get PDF
    Stakeholders in the construction industry require accurate, reliable and timely information in order to streamline the design and construction of Projects. Design Bid Build or Design and Build contracts need a process for seeking the latest requirements, interests and existing assets of all the stakeholders involved. This to lead and guide the projects to deliver in a timely, cost-effective and safe manner. This paper summarizes the multi-discipline Stakeholder management challenges and their proactive approach during the execution of the Expressway Programme by Public Works Authority, Qatar illustrated by a case study and actual actions from the industry. Various internal surveys have been undertaken to assess the issues to be resolved. Key to managing the time and cost impacts on the construction projects are identifying the needs of stakeholders, stakeholder communication procedures, their requirements, identification of existing assets, expected future requirements and decisions among the stakeholder. Unique and innovation construction procedures are highlighted in order to overcome construction challenges

    Perancangan dan Implementasi Sistem Informasi Manajemen Aset pada Pemerintah Kabupaten Merangin Menggunakan Bahasa Pemrograman Php dan Mysql

    Get PDF
    Asset managements is most needed by every businessm especially in recording asset at the local government agencies. Setting is done so that each asset procurement of equipment and goods in these institutions can be properly maintained. In the presence of an inegrated asset management system within the scope of government Merangin to perform data collection and monitoring of assets that can be used as guidelines for decision-making in procurement and rejuvenation of  government asset

    Perencanaan Jembatan Beton Prategang Dengan Bentang 24 Meter Berdasarkan Standar Nasional Indonesia (SNI)

    Get PDF
    Bridge is used to connect divided road sections, which are seperated by obstacles such as deep valley, river, lake, irigation canals, railway, and also grade seperated roadway. The construction of a bridge must comply with several requirements namely stiffness, deflection, and load bearing requirement. This research is a structural analysis and design of prestressed concrete girder beam with 24m length and 6.5m width. Working loads are dead load (MS), additional dead load (MA), vehicle load (TD), braking load (TB), pedestrian load (TP), and wind load (EW). Internal forces are obtained using Finite Element Method in SAP2000 nonlinear. Design of the bridge structure follows the national standar SNI 1725:2016 and RSNI T-12-2004. Result of structural design and analysis of the prestressed concrete girder beam uses 4 prestressed beam (160cm height, 1.83m distance between beam), 20cm bridge slab, and diaphragm with the dimension of 20x165x125cm . The number of tendon used in the design is 3, and each tendon comprises of 12 strand. The amount of prestressed force caused by jacking is Pj=5351.30 kN with loss prestress 24.52%. Deflection caused on the prestressed beam is dmaks = 12.6 mm (<dijin =80 mm), and occuring stress is 8696 kPa (< allowed stress 18675 kPa)

    Implementasi Multi User Operating System (OS) Dengan CCBOOT

    Get PDF
    The development of hardware and software technology has caused cybercafe and computer labs to raise the level of the operating system installed on their hardware. The Windows 7 operating system that is usually paired with PC devices is not compatible because there is no software update available for the Windows 7 version. At present, the operating system used is WINDOWS 10, but businesses have difficulty implementing or installing WINDOWS 10 on the device. they. One application that is used to facilitate the use of WINDOWS 10 is CCBoot. This research was conducted by directly applying the use of WINDOWS 10 on a Personal Computer (PC) device with an additional CCboot application. From the results of this study will be concluded whether the implementation of a diskless system with CCBoot can optimize the use of hardware

    PENINGKATAN KOMPETENSI CARA KERJA KAMERA KABEL SEDERHANA MELALUI METODE PRAKTIK REPRODUKSI DAN INSEMINASI BUATAN

    Get PDF
    Selama ini mahasiswa dalam praktikum Reproduksi dan Inseminasi buatan hanya sebagai user pada praktikum palpasi rektal. Mereka hanya sebatas memahami penggunaan palpasi rektal sehingga pemahaman cara prosedur kerja terhadap tahapan inseminasi Buatan (IB) sedikit terhambat secara komprehensif sangatlah kurang, akibatnya mahasiswa tidak mampu memahami trouble shooting yang terjadi pada praktikum reproduksi dan inseminasi buatan selama proses palpasi rektal. Untuk mengatasi permasalahan di atas, dibutuhkan metode pembelajaran yang efektif dan efisien untuk meningkatkan pemahaman mahasiswa pada praktikum reproduksi dan inseminasi buatan. Peningkatan kompetensi tersebut dapat dilakukan dengan cara menerapkan metode praktik dengan bantuan kamera cabel sederhana dengan menggunakan bahan tambahan disen selang elastis padakamera cabel sehingga mahasiswa secara langsung dapat dengan mudah menemukan cervic sendiri karena di sambungkan dengan software dan smartphone yang terhubung dengan kabel USB yang dapat diuji coba pada praktikum reproduksi dan inseminasi buatan. Tujuan dari penelitian ini adalah meningkatkan pemahaman dan kompetensi cara kerja kamera kabel sederhana, menambah wawasan dalam mendisen kamera cabel sederhan agar dapat di pergunakan bagi dosen, PLP, mahasiswa, dan masyarakat secara umum, serta meningkatkan minat mahasiswa dalam praktikum reproduksi dan inseminasi buatan. Penelitian ini mampu meningkatkan kompetensi cara kerja kamera cabel sederhana yang dilakukan mahasiswa meskipun hasil dari modifikasi ini belum sempurna. Kata kunci : kamera kabel, inseminasi buata

    Cross-species amplification of 41 microsatellites in European cyprinids: A tool for evolutionary, population genetics and hybridization studies

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Cyprinids display the most abundant and widespread species among the European freshwater Teleostei and are known to hybridize quite commonly. Nevertheless, a limited number of markers for conducting comparative differentiation, evolutionary and hybridization dynamics studies are available to date.</p> <p>Findings</p> <p>Five multiplex PCR sets were optimized in order to assay 41 cyprinid-specific polymorphic microsatellite loci (including 10 novel loci isolated from <it>Chondrostoma nasus nasus, Chondrostoma toxostoma toxostoma </it>and <it>Leuciscus leuciscus</it>) for 503 individuals (440 purebred specimens and 63 hybrids) from 15 European cyprinid species. The level of genetic diversity was assessed in <it>Alburnus alburnus, Alburnoides bipunctatus, C. genei, C. n. nasus, C. soetta, C. t. toxostoma, L. idus, L. leuciscus, Pachychilon pictum, Rutilus rutilus, Squalius cephalus </it>and <it>Telestes souffia</it>. The applicability of the markers was also tested on <it>Abramis brama, Blicca bjoerkna </it>and <it>Scardinius erythrophtalmus </it>specimens. Overall, between 24 and 37 of these markers revealed polymorphic for the investigated species and 23 markers amplified for all the 15 European cyprinid species.</p> <p>Conclusions</p> <p>The developed set of markers demonstrated its performance in discriminating European cyprinid species. Furthermore, it allowed detecting and characterizing hybrid individuals. These microsatellites will therefore be useful to perform comparative evolutionary and population genetics studies dealing with European cyprinids, what is of particular interest in conservation issues and constitutes a tool of choice to conduct hybridization studies.</p

    A method framework of integrating information security into the enterprise architecture

    No full text
    Tietoturvan sisällyttämiseksi osaksi kokonaisarkkitehtuuria on kehitetty useita menetelmiä ja malleja. Tarjolla olevat mallit on kuitenkin usein koettu raskaiksi ja työläiksi käyttää, eivätkä ne kata kaikkia kokonaisarkkitehtuurin osa-alueita. Jotta tietoturva olisi mahdollista integroida kokonaisarkkitehtuuriin sen kaikille osa-alueille, yhtenä mahdollisena lähestymistapana on esitetty tietoturvan integroimista kokonaisarkkitehtuuriperiaatteista käsin. Tässä tutkielmassa raportoidaan suunnittelutieteellisellä menetelmällä kehitetty menetelmäkehys, jonka avulla voidaan luoda kokonaisarkkitehtuurin tietoturvaperiaatteita. Tutkimusaineistona on käytetty valmiita asiantuntijahaastatteluja, joissa 26 haastateltavaa vastasi Suomen julkisen hallinnon kokonaisarkkitehtuurin tilaa koskeviin kysymyksiin. Näistä poimittiin tarkasteltavaksi tietoturvaa koskevat osiot, joita käytettiin yhdessä kirjallisuuslähteiden kanssa määrittelemään lähtökohtia menetelmäkehyksen suunnittelulle. Menetelmäkehyksen luomisessa on hyödynnetty sekä tietoturvaperiaatteiden että kokonaisarkkitehtuuriperiaatteiden luomisen metamalleja ja se on mallinnettu ArchiMate-notaatiolla. Menetelmäkehyksen arvioimiseksi toteutettiin yhdeksän asiantuntijahaastattelua, joiden perusteella kehys muokattiin lopulliseen muotoon. Menetelmäkehyksen avulla tietoturva voidaan integroida osaksi kokonaisarkkitehtuurityötä jo työn varhaisessa vaiheessa, jolloin vältetään hankalaksi ja työlääksi koettu tietoturvavaatimusten ja kokonaisarkkitehtuurityön yhdistäminen.Several methods and models have been developed to integrate information security into the enterprise architecture. However, the models available are often difficult and laborious to use and do not cover all aspects of the enterprise architecture. In order to integrate information security into the enterprise architecture for all its components, one possible approach is to integrate information security from the enterprise architecture principles. This thesis reports a method framework developed by a design science method that can be used to create information security principles for the enterprise architecture. The research material used in this thesis is consists in part of ready-made expert interviews, where 26 interviewees answered questions about the state of the enterprise architecture of Finnish public administration. These included sections on information security that were used in conjunction with literary sources to determine the basis for designing a method framework. The method framework has been built using meta models from both information security principles and the creation of enterprise architectural principles and is modelled with ArchiMate notation. In order to evaluate the method framework, nine expert interviews were conducted on the basis of which the method framework was finalized. With the method framework, information security can be integrated into the enterprise architecture work in an early state, avoiding the difficult and laborious combination of information security requirements and enterprise architecture work

    Kokonaisarkkitehtuurin laadun ja kypsyystason yhteys

    No full text
    Tässä opinnäytetyössä tarkastellaan, onko kokonaisarkkitehtuurin kypsyystasolla ja kokonaisarkkitehtuurituotteen laadulla keskinäistä yhteyttä. Tämän selvittämiseksi valittiin kirjallisuuslähteistä ne artikkelit, joissa kokonaisarkkitehtuurin laatua tutkitaan laatuattribuuttien (quality attributes) kautta. Näiden artikkeleiden perusteella muodostettiin kahdeksan laatuattribuuttia. Näiden laatuattribuuttien kuvauksia verrattiin kolmen kypsyysmallin (JHKA:n kypsyystasomalli, EAMM, DyAMM) kypsyystasokuvauksiin. Näin haluttiin selvittää, kuuluvatko laatuattribuutit tietyille kypsyystasoille. Tämän tarkastelun perusteella näyttää siltä, että kokonaisarkkitehtuurituotteen laadulla ja kypsyystasolla on keskinäinen yhteys. Suurin osa laatuattribuuteista on mahdollista sijoittaa kuvausten perusteella tietyille kypsyystasoille. Tämän aineiston perusteella ei pystytty kuitenkaan selvittämään, onko kokonaisarkkitehtuurin kypsyydellä ja laadulla toistensa kanssa vaikutussuhdetta.This thesis examines if there is a relationship between the enterprise architecture maturity and the quality of the enterprise architecture product. To find this out, literature articles were selected from articles in which the quality of the enterprise architecture is studied through quality attributes. Based on these articles, eight quality attributes were created. The descriptions of these quality attributes were compared to the maturity descriptions of the three selected maturity models (JHKA´s Maturity Model, EAMM, DyAMM). This was to find out whether the quality attributes belong to certain maturity levels. Based on this review, it seems that there is a mutual link between the enterprise architecture product quality and the maturity level. It is possible to place most of the quality attributes to certain maturity levels based on their descriptions. However, based on this material, it was not possible to find out if the maturity of enterprise architecture and the quality of enterprise architecture influences each other
    • …
    corecore