Search results for: Ahmad Saifizul Abdullah
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1452

Search results for: Ahmad Saifizul Abdullah

1032 Fabrication of Graphene Oxide Based Planar Hetero-Junction Perovskite Solar Cells

Authors: Khursheed Ahmad, Shaikh M. Mobin

Abstract:

In this work, we have developed a highly stable planar heterojunction perovskite solar cells (PSCs) with a architecture (ITO/GO/PEDOT:PSS/MAPbI3/PCBM/Carbon tape). The PSCs was fabricated under air using GO/PEDOT:PSS as hole transport layer while the carbon tape used as a back contact to complete the device. The fabricated PSCs device exhibited good stability and performance in terms of power conversion efficiency of 5.2%. The PSCs devices were exposed to ambient condition for 4 days which shows excellent stability confirmed by XRD analysis. We believed that the stability of the planar heterojunction perovskite solar cell may be due the presence of GO which inhibits the direct contact between PEDOT:PSS and MAPbI3.

Keywords: graphene oxide, perovskite solar cells, hole transport layer, PEDOT:PSS

Procedia PDF Downloads 157
1031 Encryption and Decryption of Nucleic Acid Using Deoxyribonucleic Acid Algorithm

Authors: Iftikhar A. Tayubi, Aabdulrahman Alsubhi, Abdullah Althrwi

Abstract:

The deoxyribonucleic acid text provides a single source of high-quality Cryptography about Deoxyribonucleic acid sequence for structural biologists. We will provide an intuitive, well-organized and user-friendly web interface that allows users to encrypt and decrypt Deoxy Ribonucleic Acid sequence text. It includes complex, securing by using Algorithm to encrypt and decrypt Deoxy Ribonucleic Acid sequence. The utility of this Deoxy Ribonucleic Acid Sequence Text is that, it can provide a user-friendly interface for users to Encrypt and Decrypt store the information about Deoxy Ribonucleic Acid sequence. These interfaces created in this project will satisfy the demands of the scientific community by providing fully encrypt of Deoxy Ribonucleic Acid sequence during this website. We have adopted a methodology by using C# and Active Server Page.NET for programming which is smart and secure. Deoxy Ribonucleic Acid sequence text is a wonderful piece of equipment for encrypting large quantities of data, efficiently. The users can thus navigate from one encoding and store orange text, depending on the field for user’s interest. Algorithm classification allows a user to Protect the deoxy ribonucleic acid sequence from change, whether an alteration or error occurred during the Deoxy Ribonucleic Acid sequence data transfer. It will check the integrity of the Deoxy Ribonucleic Acid sequence data during the access.

Keywords: algorithm, ASP.NET, DNA, encrypt, decrypt

Procedia PDF Downloads 208
1030 Electrochemical Detection of Hydroquinone by Square Wave Voltammetry Using a Zn Layered Hydroxide-Ferulate Modified Multiwall Carbon Nanotubes Paste Electrode

Authors: Mohamad Syahrizal Ahmad, Illyas M. Isa

Abstract:

In this paper, a multiwall carbon nanotubes (MWCNT) paste electrode modified by a Zn layered hydroxide-ferulate (ZLH-F) was used for detection of hydroquinone (HQ). The morphology and characteristic of the ZLH-F/MWCNT were investigated by scanning electron microscope (SEM), transmission electron microscope (TEM) and square wave voltammetry (SWV). Under optimal conditions, the SWV response showed linear plot for HQ concentration in the range of 1.0×10⁻⁵ M – 1.0×10⁻³ M. The detection limit was found to be 5.7×10⁻⁶ M and correlation coefficient of 0.9957. The glucose, fructose, sucrose, bisphenol A, acetaminophen, lysine, NO₃⁻, Cl⁻ and SO₄²⁻ did not interfere the HQ response. This modified electrode can be used to determine HQ content in wastewater and cosmetic cream with range of recovery 97.8% - 103.0%.

Keywords: 1, 4-dihydroxybenzene, hydroquinone, multiwall carbon nanotubes, square wave voltammetry

Procedia PDF Downloads 206
1029 The Impact of the Knowledge-Sharing Factors on Improving Decision Making at Sultan Qaboos University Libraries

Authors: Aseela Alhinaai, Suliman Abdullah, Adil Albusaidi

Abstract:

Knowledge has been considered an important asset in private and public organizations. It is utilized in the libraries sector to run different operations of technical services and administrative works. As a result, the International Federation of Library Association (IFLA) established a department “Knowledge Management” in December 2003 to provide a deep understanding of the KM concept for professionals. These are implemented through different programs, workshops, and activities. This study aims to identify the impact of the knowledge-sharing factors (technology, collaboration, management support) to improve decision-making at Sultan Qaboos University Libraries. This study conducted a quantitative method using a questionnaire instrument to measure the impact of technology, collaboration, and management support on knowledge sharing that lead to improved decision-making. The study population is the (SQU) libraries (Main Library, Medical Library, College of Economic and political science library, and Art Library). The results showed that management support, collaboration, and technology use have a positive impact on the knowledge-sharing process, and knowledge-sharing positively affects the decision making process.

Keywords: knowledge sharing, decision-making, information technology, management support, corroboration, Sultan Qaboos University

Procedia PDF Downloads 48
1028 Potential Impact of Climate Change on Suspended Sediment Changes in Mekong River Basin

Authors: Zuliziana Suif, Nordila Ahmad, Sengheng Hul

Abstract:

This paper evaluates the impact of climate change on suspended sediment changes in the Mekong River Basin. In this study, the distributed process-based sediment transport model is used to examine the potential impact of future climate on suspended sediment dynamic changes in the Mekong River Basin. To this end, climate scenarios from two General Circulation Model (GCMs) were considered in the scenario analysis. The simulation results show that the sediment load and concentration shows 0.64% to 69% increase in the near future (2041-2050) and 2.5% to 95% in the far future (2090- 2099). As the projected climate change impact on sediment varies remarkably between the different climate models, the uncertainty should be taken into account in sediment management. Overall, the changes in sediment load and concentration can have a great implication for related sediment management.

Keywords: climate change, suspended sediment, Mekong River Basin, GCMs

Procedia PDF Downloads 413
1027 Optimizing of Machining Parameters of Plastic Material Using Taguchi Method

Authors: Jumazulhisham Abdul Shukor, Mohd. Sazali Said, Roshanizah Harun, Shuib Husin, Ahmad Razlee Ab Kadir

Abstract:

This paper applies Taguchi Optimization Method in determining the best machining parameters for pocket milling process on Polypropylene (PP) using CNC milling machine where the surface roughness is considered and the Carbide inserts cutting tool are used. Three machining parameters; speed, feed rate and depth of cut are investigated along three levels; low, medium and high of each parameter (Taguchi Orthogonal Arrays). The setting of machining parameters were determined by using Taguchi Method and the Signal-to-Noise (S/N) ratio are assessed to define the optimal levels and to predict the effect of surface roughness with assigned parameters based on L9. The final experimental outcomes are presented to prove the optimization parameters recommended by manufacturer are accurate.

Keywords: inserts, milling process, signal-to-noise (S/N) ratio, surface roughness, Taguchi Optimization Method

Procedia PDF Downloads 603
1026 Quantitative Analysis of the Trade Potential of the United States with Members of the European Union: A Gravity Model Approach

Authors: Zahid Ahmad, Nauman Ali

Abstract:

This study has estimated the trade between USA and individual members of European Union using Gravity Model of Trade as The USA has a complex trade relationship with the European countries consist of a large number of consumers, which make USA dependent on EU for major of its total world trade. However, among the member of EU, the trade potential of USA with individual members of EU is not known. Panel data techniques e.g. Random Effect, Fixed Effect and Pooled Panel have been applied to secondary quantitative data to analyze the Trade between USA and EU. Trade Potential of USA with individual members of EU has been obtained using the ratio of Actual trade of USA with EU members and the trade as predicted by Gravity Model. The Study concluded that the USA has greater trade potential with 16 members of EU, including Croatia, Portugal and United Kingdom on top. On the other hand, Finland, Ireland, and France are the top countries with which the USA has exhaustive trade potential.

Keywords: analytical technique, economic, gravity, international trade, significant

Procedia PDF Downloads 273
1025 Analysis of Electricity Demand at Household Level Using Leap Model in Balochistan, Pakistan

Authors: Sheikh Saeed Ahmad

Abstract:

Electricity is vital for any state’s development that needs policy for planning the power network extension. This study is about simulation modeling for electricity in Balochistan province. Baseline data of electricity consumption was used of year 2004 and projected with the help of LEAP model up to subsequent 30 years. Three scenarios were created to run software. One scenario was baseline and other two were alternative or green scenarios i.e. solar and wind energy scenarios. Present study revealed that Balochistan has much greater potential for solar and wind energy for electricity production. By adopting these alternative energy forms, Balochistan can save energy in future nearly 23 and 48% by incorporating solar and wind power respectively. Thus, the study suggests to government planners, an aspect of integrating renewable sources in power system for ensuring sustainable development and growth.

Keywords: demand and supply, LEAP, solar energy, wind energy, households

Procedia PDF Downloads 402
1024 Influencers of E-Learning Readiness among Palestinian Secondary School Teachers: An Explorative Study

Authors: Fuad A. A. Trayek, Tunku Badariah Tunku Ahmad, Mohamad Sahari Nordin, Mohammed AM Dwikat

Abstract:

This paper reports on the results of an exploratory factor analysis procedure applied on the e-learning readiness data obtained from a survey of four hundred and seventy-nine (N = 479) teachers from secondary schools in Nablus, Palestine. The data were drawn from a 23-item Likert questionnaire measuring e-learning readiness based on Chapnick's conception of the construct. Principal axis factoring (PAF) with Promax rotation applied on the data extracted four distinct factors supporting four of Chapnick's e-learning readiness dimensions, namely technological readiness, psychological readiness, infrastructure readiness and equipment readiness. Together these four dimensions explained 56% of the variance. These findings provide further support for the construct validity of the items and for the existence of these four factors that measure e-learning readiness.

Keywords: e-learning, e-learning readiness, technological readiness, psychological readiness, principal axis factoring

Procedia PDF Downloads 362
1023 High-Frequency Induction Heat Sintering of Al/SiC/GNS Nanocomposites and Their Tribological Properties

Authors: Mohammad Islam, Iftikhar Ahmad, Hany S. Abdo, Yasir Khalid

Abstract:

High-frequency induction heat sintering (HFIHS) is a fast, efficient powder consolidation technique. In this work, aluminum (Al) powder was mixed with silicon carbide (SiC) and/or graphene nanosheets (GNS) in different proportions and compacted using HFIHS process to produce dense nanocomposites. The nanostructures dispersion was assessed via electron microscopy using both SEM and TEM. Tribological behavior of the nanocomposites was investigated at different loads to determine wear rate and coefficient of friction. The scratch profiles were examined under the microscope to correlate wear properties with the microstructure. While the addition of SiC nanoparticles enhances microhardness values, GNS incorporation promotes dry lubricity with strikingly different wear scratch morphologies. Such Al/SiC/GNS material compositions can be explored for use in automotive brake pad and thermal management applications.

Keywords: aluminum nanocomposites, silicon carbide, graphene nanosheets, tribology

Procedia PDF Downloads 282
1022 Presentation of the Model of Reliability of the Signaling System with Emphasis on Determining Best Time Schedule for Repairments and Preventive Maintenance in the Iranian Railway

Authors: Maziar Yazdani, Ahmad Khodaee, Fatemeh Hajizadeh

Abstract:

The purpose of this research was analysis of the reliability of the signaling system in the railway and planning repair and maintenance of its subsystems. For this purpose, it will be endeavored to introduce practical strategies for activities control and appropriate planning for repair and preventive maintenance by statistical modeling of reliability. Therefore, modeling, evaluation, and promotion of reliability of the signaling system appear very critical. Among the key goals of the railway is provision of quality service for passengers and this purpose is gained by increasing reliability, availability, maintainability and safety of (RAMS). In this research, data were analyzed, and the reliability of the subsystems and entire system was calculated and with emphasis on preservation of performance of each of the subsystems with a reliability of 80%, a plan for repair and preventive maintenance of the subsystems of the signaling system was introduced.

Keywords: reliability, modeling reliability, plan for repair and preventive maintenance, signaling system

Procedia PDF Downloads 151
1021 Numerical Study of Trailing Edge Serrations on a Wells Turbine

Authors: Abdullah S. AlKhalifa, Mohammad Nasim Uddin, Michael Atkinson

Abstract:

The primary objective of this investigation is to explore the aerodynamic impact of adding trailing edge serrations to a Wells turbine. The baseline turbine consists of eight blades with NACA 0015 airfoils. The blade chord length was 0.125 m, and the span was 0.100 m. Two modified NACA 0015 serrated configurations were studied: 1) full-span and 2) partial span serrations covering the trailing edge from hub to tip. Numerical simulations were carried out by solving the three-dimensional, incompressible steady-state Reynolds Averaged Navier-Stokes (RANS) equations using the k-ω SST turbulence model in ANSYS™ (CFX). The aerodynamic performance of the modified Wells turbine to the baseline was made by comparing non-dimensional parameters of torque coefficient, pressure drop coefficient, and turbine efficiency. A comparison of the surface limiting streamlines was performed to analyze the flow topology of the turbine blades. The trailing edge serrations generated a substantial change in surface pressure and effectively reduced the separated flow region, thus improving efficiency in most cases. As a result, the average efficiency increased across the range of simulated flow coefficients.

Keywords: renewable energy, trailing edge serrations, Wells turbine, partial serration

Procedia PDF Downloads 75
1020 Gender-Based Violence in Pakistan: Addressing the Root Causes

Authors: Hafiz Awais Ahmad

Abstract:

This paper aims to examine the root causes of gender-based violence (GBV) in Pakistan and proposes strategies to address this issue. Using a qualitative approach, this study analyzed data from various sources, including interviews with survivors of GBV and experts in the field. The findings revealed that GBV in Pakistan is deeply rooted in patriarchal attitudes and practices, economic insecurity, lack of education, and limited access to justice. The study recommends a multi-faceted approach to address GBV, including legislative reforms, awareness-raising campaigns, economic empowerment, and improved access to justice for survivors. Furthermore, the study highlights the importance of engaging men and boys in efforts to address GBV and promote gender equality. The findings of this study have important implications for policy-makers, practitioners, and researchers working towards ending GBV in Pakistan.

Keywords: gender-based violence, Pakistan, legislative reforms, advocacy

Procedia PDF Downloads 120
1019 Capsaicin Derivatives Enhanced Activity of α1β2γ2S-Aminobutyric Acid Type a Receptor Expressed in Xenopus laevis Oocytes

Authors: Jia H. Wong, Jingli Zhang, Habsah Mohamad, Iswatun H. Abdullah Ripain, Muhammad Bilal, Amelia J. Lloyd, Abdul A. Mohamed Yusoff, Jafri M. Abdullah

Abstract:

Epilepsy is one of the most common neurological diseases affecting more than 50 million of people worldwide. Epilepsy is a state of recurrent, spontaneous seizures with multiple syndromes and symptoms of different causes of brain dysfunction, prognosis, and treatments; characterized by transient, occasional and stereotyped interruptions of behavior whereby the excitatory-inhibitory activities within the central nervous system (CNS) are thrown out of balance due to various kinds of interferences. The goal of antiepileptic treatment is to enable patients to be free from seizures or to achieve control of seizures through surgical treatment and/or pharmacotherapy. Pharmacotherapy through AED plays an important role especially in countries with epilepsy treatment gap due to costs and availability of health facilities, skills and resources, yet there are about one-third of the people with epilepsy have drug-resistant seizures. Hence, this poses considerable challenges to the healthcare system and the effort in providing cost-effective treatment as well as the search for alternatives to treatment and management of epilepsy. Enhancement of γ-aminobutyric acid (GABA)-mediated inhibitory neurotransmission is one of the key mechanisms of actions of antiepileptic drugs. GABA type > a receptors (GABAAR) are ligand-gated ion channels that mediate rapid inhibitory neurotransmission upon the binding of GABA with a heteropentameric structure forming a central pore that is permeable to the influx of chloride ions in its activated state. The major isoform of GABAA receptors consists of two α1, two β2, and one γ2 subunit. It is the most abundantly expressed combinations in the brain and the most commonly researched through Xenopus laevis oocytes. With the advancing studies on ethnomedicine and traditional treatments using medicinal plants, increasing evidence reveal that spice and herb plants with medicinal properties play an important role in the treatment of ailments within communities across different cultures. Capsaicin is the primary natural capsaicinoid in hot peppers of plant genus Capsicum, consist of an aromatic ring, an amide linkage and a hydrophobic side chain. The study showed that capsaicins conferred neuroprotection in status epilepticus mouse models through anti-ictogenic, hypothermic, antioxidative, anti-inflammatory, and anti-apoptotic actions in a dose-dependent manner. In this study, five capsaicin derivatives were tested for their ability to increase the GABA-induced chloride current on α1β2γ2S of GABAAR expressed on Xenopus laevis oocytes using the method of two-microelectrode voltage clamp. Two of the capsaicin derivatives, IS5 (N-(4-hydroxy-3-methoxybenzyl)-3-methylbutyramide) and IS10 (N-(4-hydroxy-3-methoxybenzyl)-decanamide) at a concentration of 30µM were able to significantly increase the GABA-induced chloride current with p=0.002 and p=0.026 respectively. This study were able to show the enhancement effect of two capsaicin derivatives with moderate length of hydrocarbon chain on this receptor subtype, revealing the promising inhibitory activity of capsaicin derivatives through enhancement of GABA-induced chloride current and further investigations should be carried out to verify its antiepileptic effects in animal models.

Keywords: α1β2γ2 GABAA receptors, α1β2γ2S, antiepileptic, capsaicin derivatives, two-microelectrode voltage clamp, Xenopus laevis oocytes

Procedia PDF Downloads 338
1018 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 479
1017 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 39
1016 Chipless RFID Capacity Enhancement Using the E-pulse Technique

Authors: Haythem H. Abdullah, Hesham Elkady

Abstract:

With the fast increase in radio frequency identification (RFID) applications such as medical recording, library management, etc., the limitation of active tags stems from its need to external batteries as well as passive or active chips. The chipless RFID tag reduces the cost to a large extent but at the expense of utilizing the spectrum. The reduction of the cost of chipless RFID is due to the absence of the chip itself. The identification is done by utilizing the spectrum in such a way that the frequency response of the tags consists of some resonance frequencies that represent the bits. The system capacity is decided by the number of resonators within the pre-specified band. It is important to find a solution to enhance the spectrum utilization when using chipless RFID. Target identification is a process that results in a decision that a specific target is present or not. Several target identification schemes are present, but one of the most successful techniques in radar target identification in the oscillatory region is the extinction pulse technique (E-Pulse). The E-Pulse technique is used to identify targets via its characteristics (natural) modes. By introducing an innovative solution for chipless RFID reader and tag designs, the spectrum utilization goes to the optimum case. In this paper, a novel capacity enhancement scheme based on the E-pulse technique is introduced to improve the performance of the chipless RFID system.

Keywords: chipless RFID, E-pulse, natural modes, resonators

Procedia PDF Downloads 49
1015 Exposure Analysis of GSM Base Stations in Industrial Area

Authors: A. D. Usman, W. F. Wan Ahmad, H. H. Danjuma

Abstract:

Exposure due to GSM frequencies is subject of daily debate. Though regulatory bodies provide guidelines for exposure, people still exercise fear on the possible health hazard that may result due to long term usage. In this study, exposure due to electromagnetic field emitted by GSM base stations in industrial areas was investigated. The aimed was to determine whether industrial area exposure is higher as compared to residential as well as compliance with ICNIRP guidelines. Influence of reflection and absorption with respect to inverse square law was also investigated. Measurements from GSM base stations were performed at various distances in far field region. The highest measured peak power densities as well as the calculated values at GSM 1.8 GHz were 6.05 and 90 mW/m2 respectively. This corresponds to 0.07 and 1% of ICNIRP guidelines. The highest peak power densities as well as the calculated values at GSM 0.9 GHz were 11.92 and 49.7 mW/m2 respectively. These values were 0.3 and 1.1% of ICNIRP guidelines.

Keywords: Global System for Mobile Communications (GSM), Electromagnetic Field (EMF), far field, power density, Radiofrequency (RF)

Procedia PDF Downloads 451
1014 Android Application on Checking Halal Product Based on Augmented Reality

Authors: Saidatul A'isyah Ahmad Shukri, Haslina Arshad

Abstract:

This study was conducted to develop an application that provides Augmented Reality experience in identifying halal food products and beverages based on Malaysian Islamic Development Department (JAKIM) database for Muslim consumers in Malaysia. The applications is operating on the mobile device using the Android platform. This application aims to provide a new experience to the user how to use the Android application implements Augmentation Reality technology The methodology used is object-oriented analysis and design (OOAD). The programming language used is JAVA programming using the Android Software Development Kit (SDK) and XML. Android operating system is selected, and it is an open source operating system. Results from the study are implemented to further enhance diversity in presentation of information contained in this application and so can bring users using these applications from different angles.

Keywords: android, augmented reality, food, halal, Malaysia, products, XML

Procedia PDF Downloads 433
1013 Experimental Investigation on the Behavior of Steel Fibers Reinforced Concrete under Impact Loading

Authors: Feng Fu, Ahmad Bazgir

Abstract:

This study aimed to investigate and examine the structural behaviour of steel fibre reinforced concrete slabs when subjected to impact loading using drop weight method. A number of compressive tests, tensile splitting tests, as well as impact tests were conducted. The experimental work consists of testing both conventional reinforced slabs and SFRC slabs. Parameters to be considered for carrying out the test will consist of the volume fraction of steel fibre, type of steel fibres, drop weight height and number of blows. Energy absorption of slabs under impact loading and failure modes were examined in-depth and compared with conventional reinforced concrete slab are investigated.

Keywords: steel fibre reinforce concrete, compressive test, tensile splitting test, impact test

Procedia PDF Downloads 395
1012 Beneficial Ownership in Islamic Finance: The Need for Shari'ah Parameters

Authors: Nik Abdul Rahim Nik Abdul Ghani, Mat Noor Mat Zain, Ahmad Dahlan Salleh

Abstract:

Ownership of asset is an important aspect in ensuring the validity of sale contract. Nevertheless, in Islamic finance, the issue of beneficial ownership as practiced in the current system is seriously debated among Shariah scholars. It has been argued as violating the real concept of ownership (milkiyyah) in Shariah law. This article aims at studying the status of beneficial ownership from the Shariah perspective. This study begins with examining the meaning of ownership and its attributes from the Islamic point of view and followed by the discussion on the origin of beneficial ownership from the legal perspective. The approach that is applied to clarify the concept of beneficial ownership is content analysis. Subsequently, this study explains some current applications of beneficial ownership in Islamic finance to be analyzed further from the Shariah aspect. The research finding suggests that beneficial ownership should be recognized as a real ownership due to the fact that Shariah allows the transfer of ownership after the execution of offer (ijab) and acceptance (qabul).

Keywords: beneficial ownership, ownership, Islamic finance, parameter

Procedia PDF Downloads 242
1011 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10

Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin

Abstract:

The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.

Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10

Procedia PDF Downloads 147
1010 Scouring Rate Pattern/Monitoring at Coastal and Offshore Structures

Authors: Ahmad Saifullah Mazlan, Hossein Basser, Shatirah Akib

Abstract:

Scouring pattern evaluation and measuring its depth around coastal and offshore structures is very essential issue to assure the safety of the structures as well as providing needed design parameters. Scouring is known as one of the important phenomena which threatens the safety of infrastructures. Several countermeasures have been developed to control scouring by protecting the structures against water flow attack directly or indirectly by changing the water flow pattern. Recently, monitoring methods for estimating water flow pattern and scour depth are studied to track the safety of structures. Since most of studies regarding scouring is related to monitoring scouring around piers in rivers therefore it is necessary to develop researches investigating scouring around piers in coastal and offshore areas. This paper describes a review of monitoring methods may be used for detecting scour depth around piers in coastal and offshore structures.

Keywords: scour, monitoring, pier, coastal, offshore

Procedia PDF Downloads 611
1009 Geographic Information System-Based Identification of Road Traffic Crash Hotspots on Rural Roads in Oman

Authors: Mohammed Bakhit Kashoob, Mohammed Salim Al-Maashani, Ahmed Abdullah Al-Marhoon

Abstract:

The use of Geographic Information System (GIS) tools in the analysis of traffic crash data can help to identify locations or hotspots with high instances or risk of traffic crashes. The identification of traffic crash hotspots can effectively improve road safety measures. Mapping of road traffic crash hotspots can help the concerned authorities to give priority and take targeted measures and improvements to the road structure at these locations to reduce traffic crashes and fatalities. In Oman, there are countless rural roads that have more risks for traveling vehicles compared to urban roads. The likelihood of traffic crashes as well as fatality rate may increase with the presence of risks that are associated with the rural type of community. In this paper, the traffic crash hotspots on rural roads in Oman are specified using spatial analysis methods in GIS and traffic crash data. These hotspots are ranked based on the frequency of traffic crash occurrence (i.e., number of traffic crashes) and the rate of fatalities. The result of this study presents a map visualization of locations on rural roads with high traffic crashes and high fatalities rates.

Keywords: road safety, rural roads, traffic crash, GIS tools

Procedia PDF Downloads 119
1008 Research Approaches for Identifying Images of the Past in the Built Environment

Authors: Ahmad Al-Zoabi

Abstract:

Development of research approaches for identifying images of the past in the built environment is at a beginning stage, and a review of the current literature reveals a limited body of research in this area. This study seeks to make a contribution to fill this void. It investigates the theoretical and empirical studies that examine the built environment as a medium for communicating the past in order to understand how images of the past are operationalized in these studies. Findings revealed that image could be operationalized in several ways depending on the focus of the study. Three concerns were addressed in this study when defining the image of the past: (a) to investigate an 'everyday' popular image of the past; (b) to look at the building's image as an integrated part of a larger image for the city; and (c) to find patterns within residents' images of the past. This study concludes that a future study is needed to address the effects of different scales (size and depth of history) of cities and of different cultural backgrounds of images of the past.

Keywords: architecture, built environment, image of the past, research approaches

Procedia PDF Downloads 285
1007 Measurement and Analysis of Radiation Doses to Radiosensitive Organs from CT Examination of the Cervical Spine Using Radiochromic Films and Monte Carlo Simulation Based Software

Authors: Khaled Soliman, Abdullah Alrushoud, Abdulrahman Alkhalifah, Raed Albathi, Salman Altymiat

Abstract:

Radiation dose received by patients undergoing Computed Tomography (CT) examination of the cervical spine was evaluated using Gafchromic XR-QA2 films and CT-EXPO software (ver. 2.3), in order to document our clinical dose values and to compare our results with other benchmarks reported in the current literature. Radiochromic films were recently used as practical dosimetry tool that provides dose profile information not available using the standard ionisation chamber routinely used in CT dosimetry. We have developed an in-house program to use the films in order to calculate the Entrance Dose Length Product (EDLP) in (mGy.cm) and to relate the EDLP to various organ doses calculated using the CT-EXPO software. We also calculated conversion factor in (mSv/mGy.cm) relating the EDLP to the effective dose (ED) from the examination using CT-EXPO software. Variability among different types of CT scanners and dose modulation methods are reported from at least three major CT brands available at our medical institution. Our work describes the dosimetry method and results are reported. The method can be used as in-vivo dosimetry method. But this work only reports results obtained from adult female anthropomorphic Phantom studies.

Keywords: CT dosimetry, gafchromic films, XR-QA2, CT-Expo software

Procedia PDF Downloads 447
1006 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 120
1005 Classifying ERP Implementation’s Risks in Banking Sectors Based on Different Implementation Phases

Authors: Farnaz Farzadnia, Ahmad Alibabaei

Abstract:

Enterprise Resource Planning (ERP) systems are considered as complicated information systems. Many organizations failed implementing ERP systems because it is a very difficult, time-consuming and expensive process. Enterprise resource planning system is appropriate for organizations in all economic sectors. As banking is currently considered a non-typical area for ERP usage, there are very little studies on ERP implementation in banking. This paper presents a general risks taxonomy. In this research, after identifying implementation risks, a process quality management method has been applied to identify relations between risks of implementation ERP in banking sectors and implementation phases. Oracle application implementation method titled as AIM used in this research for classifying the risks. These findings will help managers to develop better strategies for supervising and controlling ERP implementation projects.

Keywords: AIM implementation, bank, enterprise resource planning, risk, process quality management method

Procedia PDF Downloads 512
1004 Buckling Analysis of Composite Shells under Compression and Torsional Loads: Numerical and Analytical Study

Authors: Güneş Aydın, Razi Kalantari Osgouei, Murat Emre Öztürk, Ahmad Partovi Meran, Ekrem Tüfekçi

Abstract:

Advanced lightweight laminated composite shells are increasingly being used in all types of modern structures, for enhancing their structural efficiency and performance. Such thin-walled structures are susceptible to buckling when subjected to various loading. This paper focuses on the buckling of cylindrical shells under axial compression and torsional loads. Effects of fiber orientation on the maximum buckling load of carbon fiber reinforced polymer (CFRP) shells are optimized. Optimum fiber angles have been calculated analytically by using MATLAB program. Numerical models have been carried out by using Finite Element Method program ABAQUS. Results from analytical and numerical analyses are also compared.

Keywords: buckling, composite, cylindrical shell, finite element, compression, torsion, MATLAB, optimization

Procedia PDF Downloads 562
1003 Comparison of Selected Pier-Scour Equations for Wide Piers Using Field Data

Authors: Nordila Ahmad, Thamer Mohammad, Bruce W. Melville, Zuliziana Suif

Abstract:

Current methods for predicting local scour at wide bridge piers, were developed on the basis of laboratory studies and very limited scour prediction were tested with field data. Laboratory wide pier scour equation from previous findings with field data were presented. A wide range of field data were used and it consists of both live-bed and clear-water scour. A method for assessing the quality of the data was developed and applied to the data set. Three other wide pier-scour equations from the literature were used to compare the performance of each predictive method. The best-performing scour equation were analyzed using statistical analysis. Comparisons of computed and observed scour depths indicate that the equation from the previous publication produced the smallest discrepancy ratio and RMSE value when compared with the large amount of laboratory and field data.

Keywords: field data, local scour, scour equation, wide piers

Procedia PDF Downloads 373