Information and communication technology (ICT) has been the most active element of investment in recent years, and until in the recent past, the excellent development of investment in ICT has been at the focus on or contribute the gross domestic product (GDP) in Saudi Arabia. Saudi Arabia, like many other countries, has been a witness to the socioeconomic impact of the ICT revolution. The main reason behind this revolution is the rapid development of ICT infrastructure and its usage in the Saudi Arabia. The government policies are centered on the ICT infrastructure, construct and usage uptake which could cover or increase in the future.\n\nPurpose: The main purpose of this study was to find out the current infrastructure, growth of prepaid mobile, postpaid mobile, Internet, fixed wireless, and current investment in Saudi Arabia.\n Results: The total number of mobile users reaching about 51 million and overall mean (±SD) was 28.93±20.26 which is indicating excellent growth. However, Prepaid subscription cove 86% of the mobile market in Saudi Arabia, the overall mean (±SD) of prepaid mobile users was 23.86±18.77 showing very good and significant growth (p=0. 001). The broadband are used by 2.92 million of users in Saudi Arabia, the overall mean(±SD) was 1.25±1.03 that is showing a huge growth of broadband in the Internet users in the kingdom is now reaching 16.5 million users.\nConclusion: The study has found out an excellent growth of ICT in Saudi Arabia. It has confirmed the ICT has a significant growth in Saudi Arabian economies and government sector as well as social sector. Prepaid mobile subscription, internet users, mobile data users are increasing day by day.
In this study the determination of pesticide residues namely, malathion in cucumber collected from local markets in Riyadh city has been carried out. Samples of treated cucumbers were collected and analyzed during a 14 days period for obtaining the residue amount of malathion. A liquid–liquid sampling technique has been applied to ultra-performance liquid chromatography/tandem mass spectrometry for analysis of residual malathion in cucumber. Multiple reactions monitoring for two transitions was acquired while the transition with higher sensitivity used for quantification and the transition with lower sensitivity used for confirmation analysis of malathion. The proposed method has been validated by establishing performance parameters such as percent recovery, precision, linear ranges, limits of detection (0.0042 µg/ml) and limits of quantification (0.014 µg/ml). The obtained recoveries of malathion in fresh cucumber samples of 10 replicates were found to be in the range between 96.9 and 101.2% (%RSD ˂ 5.2) for two fortification levels (0.02 and 0.1 mg/kg). The intra-day and inter-day RSD values were obtained between 1.7 and 2.1%. The extracted cucumber samples have shown different level of contamination upto certain time interval (7 days) and after that no residues between 11-14 days were detected.
Since there are several places located in active seismic zones in the world, serious damages and losses have happened due to major scaled earthquakes. Especially, buildings having soft story irregularity have been severely damaged or collapsed during these seismic events. Behavior of existing structures under several loading conditions is not completely determined due to some uncertainties. This situation reveals the importance of design and analysis of structures under seismic effects. Several non-linear static procedures have been developed in recent years. Non-linear methods are defined in codes to determine the performance levels of structures more accurately. However, displacement based ones give more realistic results. These methods provide more reliable evaluation possibilities for existing structures with developing computer technology. In this study, non-linear performance analysis of reinforced concrete structures with 3, 5 and 7 stories which have soft story irregularity is performed according to FEMA-356, FEMA-440 and Turkish Earthquake Code-2007. Damage ratios of the structural members and global performance levels are determined as well as modal properties and story drift ratios after non-linear finite elements analysis for each structure.
Objectives 1) to analyse econometrically the relation between different contributors and the gross average wage (GAV). 2) Using the simple polynomial model, to analyse the dynamics of real wage rigidity 3) to propose the pro-labour policy means that would soften the real wages rigidity and the increase the wage share in GDP. \nMethod. The regressive analysis of real wage driving factors and the multinomial logit model of GAW rigidity have been applied. \nData. Both the wages and driving factors in Lithuania are based on panel data from 2002-2013. The downward nominal and real wage rigidities are derived on the basis of individual wage change distributions observed in firms. \nResults. A strong linear relation between the real average wage and three driving factors was proved. It circumstantiates that the economy of country is clearly export-sided. A strong rigidity of the real wage and the stiffening of rigidity over past few years were proved in Lithuania. A shift in the bargaining power of the employers to the employees was found too. \nConclusions. The upward pressure on wages was caused by the decline in unemployment and is a result of strongly improved job market position of employees in Lithuania.
Email is currently the most widely used communication system in daily life. To improve security and efficiency, most email systems adopt Public Key Infrastructure (PKI) as the mechanism to implement security. However, such systems are not very efficient because of the expensive public key certificate management and problems in scalability. Identity Based Cryptography (IBC) is another method, but it has the inherent drawback of Key Escrow. \n This paper proposes an implementation of a practical, secure email system based on certificateless cryptography, which uses Domain Name System (DNS) as the infrastructure for public key exchange and a secure key token/fingerprint authentication system for user authentication.
This paper studies the optimal system for three different series system configurations with mixed standby (include cold standby and warm standby) components and imperfect coverage. The time-to-failure for each of the active and warm standby components are assumed to be exponentially distributed with respective parameters and . The repair time distribution of each server is generally distribution. This paper present a recursive method, using the supplementary variable technique and treating the supplementary variable as the remaining repair time, to develop the steady-state availability, (or Av), for three availability models. For each availability model, the explicit expressions for the for two various repair time distribution, such as exponential and k-stage Erlang are provided. For all three configurations, comparisons are done for specific values of distribution parameters and of the cost of the components. Finally, the configurations are ranked based on Av and cost/ benefit where benefit is Av
Let $C[0,t]$ denote a generalized Wiener space, the space of real-valued continuous functions on the interval $[0,t]$ and define a random vector $Z_n : C[0,t]\\to\\mathbb R^n$ by $Z_n(x)=(\\int_0^{t_1}h(s) dx(s),\\cdots,\\int_0^{t_n}h(s) dx(s))$, where $0
In mathematics, one always tries to get new structures from given ones. This also applies to the realm of graphs, where one can generate many new graphs from a given set of graphs. In this paper we derive simple formulas of the complexity, number of spanning trees, for extensions Moser graphs and Franklin graphs, using linear algebra, Chebyshev polynomials and matrix analysis techniques.
ABSTRACT \nPurpose: The study aims to examine the level of self-perception of Sinop University students and their perspective toward of violence against women. \nMethod: This is a cross-sectional study. The universe consists of Sinop University students and the sample consists of 1975 students who agreed to participate in the research. ‘The Social Comparison Scale’ developed by Gilbert, Allan and Trent in 1991 and adapted to Turkish by Sahin, Durak and Sahin in 1993 was administered to identify the self-perception of students. The study used a Personal Information Form designed by the researchers. Data was analysed using chi-square test, percentage statistics, and analysis of variance (ANOVA). \nNew Results: 52.5% of the participating students were male and 47.5% were female. 85.5% were in the age group of 19-23. 46.1% had a very high level of self-perception, 37.3% a high level of self-perception, 11.1% a moderate level of self-perception, 4.1% a low level of self-perception, 1.5% a very low level of self-perception. \nConclusions: The present study concluded that the majority of the university students had high self-perception and disapproved violence against women.
Successful supply chain management provides an enterprise a new competitive advantage. However, successful supply chain performance is based on a high level of trust and strong commitment among supply chain partners. Although the literature often mentions a relationship between trust and commitment, a lack of trust in supply chain partners will cause poor performance in the transaction result. Certain studies have indicated that communication, a partner’s reputation of perceived benefits, fairness, and relationship tenure are within social exchange theories. However, other studies have indicated that service quality influences the trust level of partners. This study attempted to integrate the two types of social exchange and service quality theories by constructing an integration model that influences the factors of trust and commitment. We used structural equation modeling (SEM) to test the model. The results of this study indicate that a hospital’s trust in its supply chain partner is highly associated with commitment. This study investigated the medical device procurement staff from hospitals in Taiwan. From 600 distributed questionnaires, we received 328 completed questionnaires, for a response rate of 54.7%. The results indicated that communication and perceived benefits have a positive effect on trust, and service quality has a positive effect on trust and commitment. This result provides a reference for hospitals and the partner relationships of suppliers, as well as managerial decision variables in the supply chain management of medical devices.
The determination of the relevant chemical and electrochemical parameters (homogeneous chemical rate constant kc, the equilibrium constant K and the standard reduction potential E0) of the ECrev mechanism were done using new method of convolutive voltammetry. The established relationships for convolution voltammetry of the ECrev mechanism at planar electrodes were used for data treatment and determination of the homogeneous and heterogeneous kinetic parameters and diffusion coefficients from the faradaic current irrespective of the rate of electron transfer. Tests for fast and slow electron transfer within ECrev are also considered. Condesim package of digital simulation was used to generate the theoretical cyclic voltammograms, treat and display the simulated data presented here. The captured experimental data were combined with digital simulation to verify the nature of electrode reaction as well as confirmation of the electrochemical parameters determined experimentally. It was found that convolutive voltammetry provided higher sensitivity, and more accurate method for determination of the electrochemical parameters than ordinary cyclic voltammetry
The IT services delivered by cloud computing provide benefits for businesses by offering fast start-up, flexibility, scalability and lower costs. Data security and privacy are some of the biggest challenges in Cloud Computing. Today there is an eminent need for providing efficient access to and securing large amounts of cloud data, especially when interacting with public cloud servers. This paper proposes an efficient encryption scheme for secure storage of and access to data in public cloud that enables searching and moving encrypted data without violations of privacy. The proposed method can protect data against external attackers, as well as from corrupt insiders. The public cloud server cannot learn anything about the encrypted data or about the encrypted queries, and data access is managed by the owner of data. An authorized client can decrypt data only with a key provided by the owner. Any query can be answered in a constant time regardless of the data size. The proposed model meets the requirements of data security, high performance, and detection of unauthorized modifications.
The present work was undertaken with the aim to evaluate physicochemical quality of milk in three main raw cow milk producers’ districts in Albania. The milk freezing point (MFP) is often used for the control of milk chain quality especially for possible adulteration with water. The aim of this work was to find any relationship between MFP and milk composition parameters. 51 bulk milk samples were analyzed for physicochemical parameters including MFP. Milk samples were taken in October 2013. All physicochemical parameters were correlated with the MFP. The correlations were regularly consistent between districts. Statistical analysis of data revealed that the most interesting correlation was MFP versus protein content (–0.427) for (P ≤ 0.05) and the raw milk seems divided in two groups that belong to different districts. In conclusion MFP would be considered as an important qualitative indicator, especially for its practical application.
In this paper, we propose two kinds of weighted analytic function spaces. First, we introduce a\ngeneral class of analytic functions which extend the generalized Hardy space. We investigate the\ncontinuity of the point evaluations on this space. Secondly, we consider a broad class of weighted\nBergman spaces, the so called (A*p_µ). Then, we prove that an interpolation problem has a solution in\n(A*p_µ).