CINXE.COM
Search results for: DNA integrity
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: DNA integrity</title> <meta name="description" content="Search results for: DNA integrity"> <meta name="keywords" content="DNA integrity"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="DNA integrity" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="DNA integrity"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 777</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: DNA integrity</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">777</span> Comparison of Presented Definitions to Authenticity and Integrity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Golnaz%20Salehi%20Mourkani">Golnaz Salehi Mourkani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Two conception of Integrity and authenticity, in texts have just applied respectively for adaptive reuse and conservation, which in comparison with word “Integrity” in texts related to adaptive reuse is much more seen than Authenticity, which is often applied with conservation. According to Stove, H., (2007) in some cases, this conception have used with this form “integrity/authenticity” in texts, that cause to infer one conception of both. In this article, with referring to definitions and comparison of aspects specialized to both concept of “Authenticity and Integrity” through literature review, it was attempted to examine common and distinctive aspects of each one, then with this method we can reach their differences in adaptive reuse. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adaptive%20reuse" title="adaptive reuse">adaptive reuse</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity" title=" integrity"> integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticity" title=" authenticity"> authenticity</a>, <a href="https://publications.waset.org/abstracts/search?q=conservation" title=" conservation"> conservation</a> </p> <a href="https://publications.waset.org/abstracts/18744/comparison-of-presented-definitions-to-authenticity-and-integrity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18744.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">431</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">776</span> Comparison of Presented Definitions and Aspects of Authenticity and Integrity in Adaptive Reuse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Golnaz%20Salehi%20Mourkani">Golnaz Salehi Mourkani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Two conception of Integrity and authenticity, in texts have just applied respectively for adaptive reuse and conservation, which in comparison with word “Integrity” in texts related to adaptive reuse is much more seen than Authenticity, which is often applied with conservation. According to Stove, H. (2007) in some cases, this conception have used with this form “integrity/authenticity” in texts, that cause to infer one conception of both. In this article, with referring to definitions and comparison of aspects specialized to both concept of “Authenticity and Integrity” through literature review, it was attempted to examine common and distinctive aspects of each one, then with this method we can reach their differences in adaptive reuse. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adaptive%20reuse" title="adaptive reuse">adaptive reuse</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity" title=" integrity"> integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticity" title=" authenticity"> authenticity</a>, <a href="https://publications.waset.org/abstracts/search?q=conservation" title=" conservation"> conservation</a> </p> <a href="https://publications.waset.org/abstracts/18769/comparison-of-presented-definitions-and-aspects-of-authenticity-and-integrity-in-adaptive-reuse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18769.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">460</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">775</span> Identifying Teachers’ Perception of Integrity in School-Based Assessment Practice: A Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abd%20Aziz%20Bin%20Abd%20Shukor">Abd Aziz Bin Abd Shukor</a>, <a href="https://publications.waset.org/abstracts/search?q=Eftah%20Binti%20Moh%20Hj%20Abdullah"> Eftah Binti Moh Hj Abdullah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This case study aims to identify teachers’ perception as regards integrity in School-Ba sed Assessment (PBS) practice. This descriptive study involved 9 teachers from 4 secondary schools in 3 districts in the state of Perak. The respondents had undergone an integrity in PBS Practice interview using a focused group discussion method. The overall findings showed that the teachers believed that integrity in PBS practice could be achieved by adjusting the teaching methods align with learning objectives and the students’ characteristics. Many teachers, parents and student did not understand the best practice of PBS. This would affect the integrity in PBS practice. Teachers did not emphasis the principles and ethics. Their integrity as an innovative public servant may also be affected with the frequently changing assessment system, lack of training and no prior action research. The analysis of findings showed that the teachers viewed that organizational integrity involving the integrity of PBS was difficult to be implemented based on the expectations determined by Malaysia Ministry of Education (KPM). A few elements which assisted in the achievement of PBS integrity were the training, students’ understanding, the parents’ understanding of PBS, environment (involving human resources such as support and appreciation and non-human resources such as technology infrastructure readiness and media). The implications of this study show that teachers, as the PBS implementers, have a strong influence on the integrity of PBS. However, the transformation of behavior involving PBS integrity among teachers requires the stabilisation of support and infrastructure in order to enable the teachers to implement PBS in an ethical manner. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=assessment%20integrity" title="assessment integrity">assessment integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity" title=" integrity"> integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=perception" title=" perception"> perception</a>, <a href="https://publications.waset.org/abstracts/search?q=school-based%20assessment" title=" school-based assessment"> school-based assessment</a> </p> <a href="https://publications.waset.org/abstracts/41309/identifying-teachers-perception-of-integrity-in-school-based-assessment-practice-a-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41309.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">774</span> Ramadan and Ethical Integrity in the United Arab Emirates</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gabriel%20Andrade">Gabriel Andrade</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Ramadan is a time of intense religious salience in the Islamic world. Apart from ritual engagement, it is also a time for reflection on devotion and shared humanity. This prompts the issue if Ramadan has an effect on moral integrity and decision-making. Methods: The present study seeks to answer that question. A group of Muslim students in the United Arab Emirates (UAE) were assessed on moral integrity both during and after Ramadan. Results: Results came out showing that Ramadan has no significant effect on participants’ moral integrity. Conclusion: It is concluded that Ramadan has no effect on participants’ moral behavior, and this is potentially explained by the UAE’s increased secularization in recent decades. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ramadan" title="Ramadan">Ramadan</a>, <a href="https://publications.waset.org/abstracts/search?q=United%20Arab%20Emirates" title=" United Arab Emirates"> United Arab Emirates</a>, <a href="https://publications.waset.org/abstracts/search?q=moral%20integrity" title=" moral integrity"> moral integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=secularization" title=" secularization"> secularization</a>, <a href="https://publications.waset.org/abstracts/search?q=trolley%20dilemmas" title=" trolley dilemmas"> trolley dilemmas</a> </p> <a href="https://publications.waset.org/abstracts/187722/ramadan-and-ethical-integrity-in-the-united-arab-emirates" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187722.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">42</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">773</span> Evaluation of Structural Integrity for Composite Lattice Structure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jae%20Moon%20Im">Jae Moon Im</a>, <a href="https://publications.waset.org/abstracts/search?q=Kwang%20Bok%20Shin"> Kwang Bok Shin</a>, <a href="https://publications.waset.org/abstracts/search?q=Sang%20Woo%20Lee"> Sang Woo Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, evaluation of structural integrity for composite lattice structure was conducted by compressive test. Composite lattice structure was manufactured by carbon fiber using filament winding method. In order to evaluate the structural integrity of composite lattice structure, compressive test was done using anti-buckling fixture. The delamination occurred 84 Tons of compressive load. It was found that composite lattice structure satisfied the design requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=composite%20material" title="composite material">composite material</a>, <a href="https://publications.waset.org/abstracts/search?q=compressive%20test" title=" compressive test"> compressive test</a>, <a href="https://publications.waset.org/abstracts/search?q=lattice%20structure" title=" lattice structure"> lattice structure</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20integrity" title=" structural integrity"> structural integrity</a> </p> <a href="https://publications.waset.org/abstracts/73662/evaluation-of-structural-integrity-for-composite-lattice-structure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73662.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">502</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">772</span> An Ontology-Based Framework to Support Asset Integrity Modeling: Case Study of Offshore Riser Integrity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Sheikhalishahi">Mohammad Sheikhalishahi</a>, <a href="https://publications.waset.org/abstracts/search?q=Vahid%20Ebrahimipour"> Vahid Ebrahimipour</a>, <a href="https://publications.waset.org/abstracts/search?q=Amir%20Hossein%20Radman-Kian"> Amir Hossein Radman-Kian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes an Ontology framework for knowledge modeling and representation of the equipment integrity process in a typical oil and gas production plant. Our aim is to construct a knowledge modeling that facilitates translation, interpretation, and conversion of human-readable integrity interpretation into computer-readable representation. The framework provides a function structure related to fault propagation using ISO 14224 and ISO 15926 OWL-Lite/ Resource Description Framework (RDF) to obtain a generic system-level model of asset integrity that can be utilized in the integrity engineering process during the equipment life cycle. It employs standard terminology developed by ISO 15926 and ISO 14224 to map textual descriptions of equipment failure and then convert it to a causality-driven logic by semantic interpretation and computer-based representation using Lite/RDF. The framework applied for an offshore gas riser. The result shows that the approach can cross-link the failure-related integrity words and domain-specific logic to obtain a representation structure of equipment integrity with causality inference based on semantic extraction of inspection report context. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asset%20integrity%20modeling" title="asset integrity modeling">asset integrity modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=interoperability" title=" interoperability"> interoperability</a>, <a href="https://publications.waset.org/abstracts/search?q=OWL" title=" OWL"> OWL</a>, <a href="https://publications.waset.org/abstracts/search?q=RDF%2FXML" title=" RDF/XML"> RDF/XML</a> </p> <a href="https://publications.waset.org/abstracts/131416/an-ontology-based-framework-to-support-asset-integrity-modeling-case-study-of-offshore-riser-integrity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131416.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">188</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">771</span> Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Boukhatem%20Mohammed%20Belkaid">Boukhatem Mohammed Belkaid</a>, <a href="https://publications.waset.org/abstracts/search?q=Lahdir%20Mourad"> Lahdir Mourad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AES" title="AES">AES</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity" title=" integrity"> integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20images" title=" medical images"> medical images</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=decryption" title=" decryption"> decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=key" title=" key"> key</a>, <a href="https://publications.waset.org/abstracts/search?q=correlation" title=" correlation"> correlation</a> </p> <a href="https://publications.waset.org/abstracts/17879/secure-transfer-of-medical-images-using-hybrid-encryption-authentication-confidentiality-integrity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17879.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">540</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">770</span> The Evaluation of Surface Integrity during Machining of Inconel 718 with Various Laser Assistance Strategies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Szymon%20Wojciechowski">Szymon Wojciechowski</a>, <a href="https://publications.waset.org/abstracts/search?q=Damian%20Przestacki"> Damian Przestacki</a>, <a href="https://publications.waset.org/abstracts/search?q=Tadeusz%20Chwalczuk"> Tadeusz Chwalczuk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper is focused on the evaluation of surface integrity formed during turning of Inconel 718 with the application of various laser assistance strategies. The primary objective of the work was to determine the relations between the applied machining strategy and the obtained surface integrity, in order to select the effective cutting conditions allowing the obtainment of high surface quality. The carried out experiment included the machining of Inconel 718 in the conventional turning conditions, as well as during the continuous laser assisted machining and sequential laser assistance. The surface integrity was evaluated by the measurements of machined surface topographies, microstructures and the microhardness. Results revealed that surface integrity of Inconel 718 is strongly affected by the selected machining strategy. The significant improvement of the surface roughness formed during machining of Inconel 718, can be reached by the application of simultaneous laser heating and cutting (LAM). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Inconel%20718" title="Inconel 718">Inconel 718</a>, <a href="https://publications.waset.org/abstracts/search?q=laser%20assisted%20machining" title=" laser assisted machining"> laser assisted machining</a>, <a href="https://publications.waset.org/abstracts/search?q=surface%20integrity" title=" surface integrity"> surface integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=turning" title=" turning"> turning</a> </p> <a href="https://publications.waset.org/abstracts/72088/the-evaluation-of-surface-integrity-during-machining-of-inconel-718-with-various-laser-assistance-strategies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72088.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">769</span> Evaluation of Cast-in-Situ Pile Condition Using Pile Integrity Test</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20I.%20Hossain">Mohammad I. Hossain</a>, <a href="https://publications.waset.org/abstracts/search?q=Omar%20F.%20Hamim"> Omar F. Hamim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a case study on a pile integrity test for assessing the integrity of piles as well as a physical dimension (e.g., cross-sectional area, length), continuity, and consistency of the pile materials. The recent boom in the socio-economic condition of Bangladesh has given rise to the building of high-rise commercial and residential infrastructures. The advantage of the pile integrity test lies in the fact that it is possible to get an approximate indication regarding the quality of the sub-structure before commencing the construction of the super-structure. This paper aims at providing a classification of cast-in-situ piles based on characteristic reflectograms obtained using the Sonic Integrity Testing program for the sub-soil condition of Narayanganj, Bangladesh. The piles have been classified as 'Pile Type-1', 'Pile Type-2', 'Pile Type-3', 'Pile type-4', 'Pile Type-5' or 'Pile Type-6' from the visual observations of reflections from the generated stress waves by striking the pile head with a handheld hammer. With respect to construction quality and integrity, piles have been further classified into three distinct categories, i.e., satisfactory, may be satisfactory, and unsatisfactory. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cast-in-situ%20piles" title="cast-in-situ piles">cast-in-situ piles</a>, <a href="https://publications.waset.org/abstracts/search?q=characteristic%20reflectograms" title=" characteristic reflectograms"> characteristic reflectograms</a>, <a href="https://publications.waset.org/abstracts/search?q=pile%20integrity%20test" title=" pile integrity test"> pile integrity test</a>, <a href="https://publications.waset.org/abstracts/search?q=sonic%20integrity%20testing%20program" title=" sonic integrity testing program"> sonic integrity testing program</a> </p> <a href="https://publications.waset.org/abstracts/126450/evaluation-of-cast-in-situ-pile-condition-using-pile-integrity-test" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/126450.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">768</span> Acrosomal Integrity, DNA Integrity and Post-Thawing Motility of Goat Semen after Methionine Supplementation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20A.%20El-Battawy">K. A. El-Battawy</a>, <a href="https://publications.waset.org/abstracts/search?q=W.%20S.%20El-Nattat"> W. S. El-Nattat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the present investigation was to evaluate the impact of methionine on the preservation, acrosomal integrity, DNA integrity and post thawing motility of extended goat semen. Semen samples were diluted with a Tris-based extender containing the additive methionine 1.5, 2.5 and 5mM then the diluted samples were kept in glass tubes and cooled from 37°C to 5°C in a cold cabinet, and maintained at 5°C. Sperm motility (SM%), alive sperm (AS%), sperm abnormalities (SA%) acrosomal integrity and DNA integrity were determined at 5°C for periods of 0,24, 48and 72 h of liquid storage. Furthermore, the influence of methionine on post-thawing motility was assessed. The results elaborated that the addition of methionine and L-tyrosine particularly 2.5mM of methionine significantly improved SM% and reduced dead sperm %. Furthermore, the addition of 2.5mM methionine improved post-thawing motility (43.75 ± 1.25% vs. 32.50 ± 3.23 in the control group). Moreover, the frequency of acrosomal defects was lower in treated groups than in control. In conclusion, the addition of methionine induced remarkable physiological effects on goat semen quality during conservation for 7-days-long period at 5°C and improved its freezability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=methionine" title="methionine">methionine</a>, <a href="https://publications.waset.org/abstracts/search?q=acrosome" title=" acrosome"> acrosome</a>, <a href="https://publications.waset.org/abstracts/search?q=semen" title=" semen"> semen</a>, <a href="https://publications.waset.org/abstracts/search?q=cryopreservation" title=" cryopreservation"> cryopreservation</a> </p> <a href="https://publications.waset.org/abstracts/41790/acrosomal-integrity-dna-integrity-and-post-thawing-motility-of-goat-semen-after-methionine-supplementation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41790.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">405</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">767</span> Power Integrity Analysis of Power Delivery System in High Speed Digital FPGA Board</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anil%20Kumar%20Pandey">Anil Kumar Pandey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Power plane noise is the most significant source of signal integrity (SI) issues in a high-speed digital design. In this paper, power integrity (PI) analysis of multiple power planes in a power delivery system of a 12-layer high-speed FPGA board is presented. All 10 power planes of HSD board are analyzed separately by using 3D Electromagnetic based PI solver, then the transient simulation is performed on combined PI data of all planes along with voltage regulator modules (VRMs) and 70 current drawing chips to get the board level power noise coupling on different high-speed signals. De-coupling capacitors are placed between power planes and ground to reduce power noise coupling with signals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=power%20integrity" title="power integrity">power integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=power-aware%20signal%20integrity%20analysis" title=" power-aware signal integrity analysis"> power-aware signal integrity analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=electromagnetic%20simulation" title=" electromagnetic simulation"> electromagnetic simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=channel%20simulation" title=" channel simulation"> channel simulation</a> </p> <a href="https://publications.waset.org/abstracts/48620/power-integrity-analysis-of-power-delivery-system-in-high-speed-digital-fpga-board" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48620.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">436</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">766</span> Secure Transfer of Medical Images Using Hybrid Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Boukhatem%20Mohamed%20Belkaid">Boukhatem Mohamed Belkaid</a>, <a href="https://publications.waset.org/abstracts/search?q=Lahdi%20Mourad"> Lahdi Mourad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AES" title="AES">AES</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity" title=" integrity"> integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20images" title=" medical images"> medical images</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=decryption" title=" decryption"> decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=key" title=" key"> key</a>, <a href="https://publications.waset.org/abstracts/search?q=correlation" title=" correlation"> correlation</a> </p> <a href="https://publications.waset.org/abstracts/16664/secure-transfer-of-medical-images-using-hybrid-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16664.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">443</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">765</span> The Development of an Integrity Cultivating Module in School-Based Assessment among Malaysian Teachers: A Research Methodology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eftah%20Bte.%20Moh%20Hj%20Abdullah">Eftah Bte. Moh Hj Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Abd%20Aziz%20Bin%20Abd%20Shukor"> Abd Aziz Bin Abd Shukor</a>, <a href="https://publications.waset.org/abstracts/search?q=Norazilawati%20Binti%20Abdullah"> Norazilawati Binti Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Rahimah%20Adam"> Rahimah Adam</a>, <a href="https://publications.waset.org/abstracts/search?q=Othman%20Bin%20Lebar"> Othman Bin Lebar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The competency and integrity required for better understanding and practice of School-based Assessment (PBS) comes not only from the process, but also in providing the support or ‘scaffolding’ for teachers to recognize the student as a learner, improve their self-assessment skills, understanding of the daily teaching plan and its constructive alignment of the curriculum, pedagogy and assessment. The cultivation of integrity in PBS among the teachers is geared towards encouraging them to become committed and dedicated in implementing assessments in a serious, efficient manner, thus moving away from the usual teacher-focused approach to the student-focused approach. The teachers show their integrity via their professional commitment, responsibility and actions. The module based on the cultivation of integrity in PBS among Malaysian teachers aims to broaden the guidance support for teachers (embedded in the training), which consists of various domains to enable better evaluation of complex assessment tasks and the construction of suitable instrument for measuring the relevant cognitive, affective and psychomotor domains to describe the students’ achievement. The instrument for integrity cultivation in PBS has been developed and validated for measuring the effectiveness of the module constructed. This module is targeted towards assisting the staff in the Education Ministry, especially the principal trainers, teachers, headmasters and education officers to acquire effective intervention for improving the PBS assessors’ integrity and competency. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=school-based%20assessment" title="school-based assessment">school-based assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=assessment%20competency%20integrity%20cultivation" title=" assessment competency integrity cultivation"> assessment competency integrity cultivation</a>, <a href="https://publications.waset.org/abstracts/search?q=professional%20commitment" title=" professional commitment"> professional commitment</a>, <a href="https://publications.waset.org/abstracts/search?q=module" title=" module"> module</a> </p> <a href="https://publications.waset.org/abstracts/40997/the-development-of-an-integrity-cultivating-module-in-school-based-assessment-among-malaysian-teachers-a-research-methodology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40997.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">410</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">764</span> MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Boukhatem%20Mohammed%20Belkaid">Boukhatem Mohammed Belkaid</a>, <a href="https://publications.waset.org/abstracts/search?q=Lahdir%20Mourad"> Lahdir Mourad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AES" title="AES">AES</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity" title=" integrity"> integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=satellite%20MSG" title=" satellite MSG"> satellite MSG</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=decryption" title=" decryption"> decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=key" title=" key"> key</a>, <a href="https://publications.waset.org/abstracts/search?q=correlation" title=" correlation"> correlation</a> </p> <a href="https://publications.waset.org/abstracts/16590/msg-image-encryption-based-on-aes-and-rsa-algorithms-msg-image-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16590.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">383</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">763</span> Data Integrity: Challenges in Health Information Systems in South Africa </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Thulare">T. Thulare</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Herselman"> M. Herselman</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Botha"> A. Botha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Poor system use, including inappropriate design of health information systems, causes difficulties in communication with patients and increased time spent by healthcare professionals in recording the necessary health information for medical records. System features like pop-up reminders, complex menus, and poor user interfaces can make medical records far more time consuming than paper cards as well as affect decision-making processes. Although errors associated with health information and their real and likely effect on the quality of care and patient safety have been documented for many years, more research is needed to measure the occurrence of these errors and determine the causes to implement solutions. Therefore, the purpose of this paper is to identify data integrity challenges in hospital information systems through a scoping review and based on the results provide recommendations on how to manage these. Only 34 papers were found to be most suitable out of 297 publications initially identified in the field. The results indicated that human and computerized systems are the most common challenges associated with data integrity and factors such as policy, environment, health workforce, and lack of awareness attribute to these challenges but if measures are taken the data integrity challenges can be managed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20integrity" title="data integrity">data integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20integrity%20challenges" title=" data integrity challenges"> data integrity challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=hospital%20information%20systems" title=" hospital information systems"> hospital information systems</a>, <a href="https://publications.waset.org/abstracts/search?q=South%20Africa" title=" South Africa"> South Africa</a> </p> <a href="https://publications.waset.org/abstracts/129195/data-integrity-challenges-in-health-information-systems-in-south-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129195.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">181</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">762</span> Anti-Graft Instruments and Their Role in Curbing Corruption: Integrity Pact and Its Impact on Indian Procurement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jot%20Prakash%20Kaur">Jot Prakash Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper aims to showcase that with the introduction of anti-graft instruments and willingness of the governments towards their implementation, a significant change can be witnessed in the anti-corruption landscape of any country. Since the past decade anti-graft instruments have been introduced by several international non-governmental organizations with the vision of curbing corruption. Transparency International’s ‘Integrity Pact’ has been one such initiative. Integrity Pact has been described as a tool for preventing corruption in public contracting. Integrity Pact has found its relevance in a developing country like India where public procurement constitutes 25-30 percent of Gross Domestic Product. Corruption in public procurement has been a cause of concern even though India has in place a whole architecture of rules and regulations governing public procurement. Integrity Pact was first adopted by a leading Oil and Gas government company in 2006. Till May 2015, over ninety organizations had adopted Integrity Pact, of which majority of them are central government units. The methodology undertaken to understand impact of Integrity Pact on Public procurement is through analyzing information received from important stakeholders of the instrument. Government, information was sought through Right to Information Act 2005 about the details of adoption of this instrument by various government organizations and departments. Contractor, Company websites and annual reports were used to find out the steps taken towards implementation of Integrity Pact. Civil Society, Transparency International India’s resource materials which include publications and reports on Integrity Pact were also used to understand the impact of Integrity Pact. Some of the findings of the study include organizations adopting Integrity pacts in all kinds of contracts such that 90% of their procurements fall under Integrity Pact. Indian State governments have found merit in Integrity Pact and have adopted it in their procurement contracts. Integrity Pact has been instrumental in creating a brand image of companies. External Monitors, an essential feature of Integrity Pact have emerged as arbitrators for the bidders and are the first line of procurement auditors for the organizations. India has cancelled two defense contracts finding it conflicting with the provisions of Integrity Pact. Some of the clauses of Integrity Pact have been included in the proposed Public Procurement legislation. Integrity Pact has slowly but steadily grown to become an integral part of big ticket procurement in India. Government’s commitment to implement Integrity Pact has changed the way in which public procurement is conducted in India. Public Procurement was a segment infested with corruption but with the adoption of Integrity Pact a number of clean up acts have been performed to make procurement transparent. The paper is divided in five sections. First section elaborates on Integrity Pact. Second section talks about stakeholders of the instrument and the role it plays in its implementation. Third section talks about the efforts taken by the government to implement Integrity Pact in India. Fourth section talks about the role of External Monitor as Arbitrator. The final section puts forth suggestions to strengthen the existing form of Integrity Pact and increase its reach. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corruption" title="corruption">corruption</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity%20pact" title=" integrity pact"> integrity pact</a>, <a href="https://publications.waset.org/abstracts/search?q=procurement" title=" procurement"> procurement</a>, <a href="https://publications.waset.org/abstracts/search?q=vigilance" title=" vigilance"> vigilance</a> </p> <a href="https://publications.waset.org/abstracts/34644/anti-graft-instruments-and-their-role-in-curbing-corruption-integrity-pact-and-its-impact-on-indian-procurement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34644.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">339</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">761</span> Trusted Neural Network: Reversibility in Neural Networks for Network Integrity Verification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malgorzata%20Schwab">Malgorzata Schwab</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashis%20Kumer%20Biswas"> Ashis Kumer Biswas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this concept paper, we explore the topic of Reversibility in Neural Networks leveraged for Network Integrity Verification and crafted the term ''Trusted Neural Network'' (TNN), paired with the API abstraction around it, to embrace the idea formally. This newly proposed high-level generalizable TNN model builds upon the Invertible Neural Network architecture, trained simultaneously in both forward and reverse directions. This allows for the original system inputs to be compared with the ones reconstructed from the outputs in the reversed flow to assess the integrity of the end-to-end inference flow. The outcome of that assessment is captured as an Integrity Score. Concrete implementation reflecting the needs of specific problem domains can be derived from this general approach and is demonstrated in the experiments. The model aspires to become a useful practice in drafting high-level systems architectures which incorporate AI capabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=trusted" title="trusted">trusted</a>, <a href="https://publications.waset.org/abstracts/search?q=neural" title=" neural"> neural</a>, <a href="https://publications.waset.org/abstracts/search?q=invertible" title=" invertible"> invertible</a>, <a href="https://publications.waset.org/abstracts/search?q=API" title=" API"> API</a> </p> <a href="https://publications.waset.org/abstracts/144758/trusted-neural-network-reversibility-in-neural-networks-for-network-integrity-verification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144758.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">760</span> Spatial Integrity of Seismic Data for Oil and Gas Exploration</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Afiq%20Juazer%20Rizal">Afiq Juazer Rizal</a>, <a href="https://publications.waset.org/abstracts/search?q=Siti%20Zaleha%20Misnan"> Siti Zaleha Misnan</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Zairi%20M.%20Yusof"> M. Zairi M. Yusof</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Seismic data is the fundamental tool utilized by exploration companies to determine potential hydrocarbon. However, the importance of seismic trace data will be undermined unless the geo-spatial component of the data is understood. Deriving a proposed well to be drilled from data that has positional ambiguity will jeopardize business decision and millions of dollars’ investment that every oil and gas company would like to avoid. Spatial integrity QC workflow has been introduced in PETRONAS to ensure positional errors within the seismic data are recognized throughout the exploration’s lifecycle from acquisition, processing, and seismic interpretation. This includes, amongst other tests, quantifying that the data is referenced to the appropriate coordinate reference system, survey configuration validation, and geometry loading verification. The direct outcome of the workflow implementation helps improve reliability and integrity of sub-surface geological model produced by geoscientist and provide important input to potential hazard assessment where positional accuracy is crucial. This workflow’s development initiative is part of a bigger geospatial integrity management effort, whereby nearly eighty percent of the oil and gas data are location-dependent. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=oil%20and%20gas%20exploration" title="oil and gas exploration">oil and gas exploration</a>, <a href="https://publications.waset.org/abstracts/search?q=PETRONAS" title=" PETRONAS"> PETRONAS</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic%20data" title=" seismic data"> seismic data</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20integrity%20QC%20workflow" title=" spatial integrity QC workflow"> spatial integrity QC workflow</a> </p> <a href="https://publications.waset.org/abstracts/80296/spatial-integrity-of-seismic-data-for-oil-and-gas-exploration" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80296.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">223</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">759</span> Subsea Control Module (SCM) - A Vital Factor for Well Integrity and Production Performance in Deep Water Oil and Gas Fields</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okoro%20Ikechukwu%20Ralph">Okoro Ikechukwu Ralph</a>, <a href="https://publications.waset.org/abstracts/search?q=Fuat%20Kara"> Fuat Kara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The discoveries of hydrocarbon reserves has clearly drifted offshore, and in deeper waters - areas where the industry still has limited knowledge; and that were hitherto, regarded as being out of reach. This shift presents significant and increased challenges in technology requirements needed to guarantee safety of personnel, environment and equipment; ensure high reliability of installed equipment; and provide high level of confidence in security of investment and company reputation. Nowhere are these challenges more apparent than on subsea well integrity and production performance. The past two decades has witnessed enormous rise in deep and ultra-deep water offshore field developments for the recovery of hydrocarbons. Subsea installed equipment at the seabed has been the technology of choice for these developments. This paper discusses the role of Subsea Control module (SCM) as a vital factor for deep-water well integrity and production performance. A case study for Deep-water well integrity and production performance is analysed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=offshore%20reliability" title="offshore reliability">offshore reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=production%20performance" title=" production performance"> production performance</a>, <a href="https://publications.waset.org/abstracts/search?q=subsea%20control%20module" title=" subsea control module"> subsea control module</a>, <a href="https://publications.waset.org/abstracts/search?q=well%20integrity" title=" well integrity"> well integrity</a> </p> <a href="https://publications.waset.org/abstracts/29562/subsea-control-module-scm-a-vital-factor-for-well-integrity-and-production-performance-in-deep-water-oil-and-gas-fields" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29562.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">512</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">758</span> Towards a Secure Storage in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Elkholy">Mohamed Elkholy</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Elfatatry"> Ahmed Elfatatry</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20integrity" title=" data integrity"> data integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20confidentiality" title=" data confidentiality"> data confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=Kerberos%20authentication" title=" Kerberos authentication"> Kerberos authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20security" title=" cloud security"> cloud security</a> </p> <a href="https://publications.waset.org/abstracts/48494/towards-a-secure-storage-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48494.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">757</span> Good Governance in Perspective: An Example of Transition from Corruption towards Integrity within a Developing Country (Pakistan)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saifullah%20Khalid">Saifullah Khalid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Governance and good governance are among the main topics in international discussions about the success factors for social and economic development. The image of developing countries as for example Pakistan in this respect is bad (in TI Corruption Index nr. among countries). Additionally, the police are among the sectors and organizations which are seen as most corrupt in many countries. However, in case of Pakistan there seem to be exceptions to the rule, and improvement can be brought in specific police departments. This paper represents the findings of Islamabad traffic police (ITP). In Pakistan, the police, in general, have been stigmatized for being the most corrupt department in the country. However, the few recent examples of Motorway police and its replicated model of Islamabad traffic police changed the perception about police and policing. These police forces have shown that Policing in Pakistan can be changed for better. In this paper, the research question that is addressed is: How corrupt are (traffic) police forces in Pakistan and what factors influence corruption within that police force? And What lessons can be learned from that to improve police integrity? Both qualitative and quantitative tools are utilized for data collection. The overall picture of the factors is not so easy to interpret and summarise. Nevertheless paying a better salary does not seem to limit integrity violations, neither does recruitment and selection and leadership, while supervision and control, training and stimulating the positive and limiting the negative elements of culture appear to be important in curbing (sometimes specific) integrity violations in the context of Pakistani police forces. The study also leads to a number of suggestions for curbing corruption and other integrity violations in the Pakistan police. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corruption%20control" title="corruption control">corruption control</a>, <a href="https://publications.waset.org/abstracts/search?q=governance" title=" governance"> governance</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity%20violations" title=" integrity violations"> integrity violations</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamabad%20traffic%20police" title=" Islamabad traffic police"> Islamabad traffic police</a>, <a href="https://publications.waset.org/abstracts/search?q=Pakistan" title=" Pakistan"> Pakistan</a> </p> <a href="https://publications.waset.org/abstracts/64181/good-governance-in-perspective-an-example-of-transition-from-corruption-towards-integrity-within-a-developing-country-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64181.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">216</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">756</span> The Synergistic Effects of Blockchain and AI on Enhancing Data Integrity and Decision-Making Accuracy in Smart Contracts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sayor%20Ajfar%20Aaron">Sayor Ajfar Aaron</a>, <a href="https://publications.waset.org/abstracts/search?q=Sajjat%20Hossain%20Abir"> Sajjat Hossain Abir</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashif%20Newaz"> Ashif Newaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Mushfiqur%20Rahman"> Mushfiqur Rahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Investigating the convergence of blockchain technology and artificial intelligence, this paper examines their synergistic effects on data integrity and decision-making within smart contracts. By implementing AI-driven analytics on blockchain-based platforms, the research identifies improvements in automated contract enforcement and decision accuracy. The paper presents a framework that leverages AI to enhance transparency and trust while blockchain ensures immutable record-keeping, culminating in significantly optimized operational efficiencies in various industries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20integrity" title=" data integrity"> data integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts" title=" smart contracts"> smart contracts</a> </p> <a href="https://publications.waset.org/abstracts/185868/the-synergistic-effects-of-blockchain-and-ai-on-enhancing-data-integrity-and-decision-making-accuracy-in-smart-contracts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185868.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">55</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">755</span> Assets Integrity Management in Oil and Gas Production Facilities through Corrosion Mitigation and Inspection Strategy: A Case Study of Sarir Oilfield</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iftikhar%20Ahmad">Iftikhar Ahmad</a>, <a href="https://publications.waset.org/abstracts/search?q=Youssef%20Elkezza"> Youssef Elkezza</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sarir oilfield is in North Africa. It has facilities for oil and gas production. The assets of the Sarir oilfield can be divided into five following categories, namely: (i) well bore and wellheads; (ii) vessels such as separators, desalters, and gas processing facilities; (iii) pipelines including all flow lines, trunk lines, and shipping lines; (iv) storage tanks; (v) other assets such as turbines and compressors, etc. The nature of the petroleum industry recognizes the potential human, environmental and financial consequences that can result from failing to maintain the integrity of wellheads, vessels, tanks, pipelines, and other assets. The importance of effective asset integrity management increases as the industry infrastructure continues to age. The primary objective of assets integrity management (AIM) is to maintain assets in a fit-for-service condition while extending their remaining life in the most reliable, safe, and cost-effective manner. Corrosion management is one of the important aspects of successful asset integrity management. It covers corrosion mitigation, monitoring, inspection, and risk evaluation. External corrosion on pipelines, well bores, buried assets, and bottoms of tanks is controlled with a combination of coatings by cathodic protection, while the external corrosion on surface equipment, wellheads, and storage tanks is controlled by coatings. The periodic cleaning of the pipeline by pigging helps in the prevention of internal corrosion. Further, internal corrosion of pipelines is prevented by chemical treatment and controlled operations. This paper describes the integrity management system used in the Sarir oil field for its oil and gas production facilities based on standard practices of corrosion mitigation and inspection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=assets%20integrity%20management" title="assets integrity management">assets integrity management</a>, <a href="https://publications.waset.org/abstracts/search?q=corrosion%20prevention%20in%20oilfield%20assets" title=" corrosion prevention in oilfield assets"> corrosion prevention in oilfield assets</a>, <a href="https://publications.waset.org/abstracts/search?q=corrosion%20management%20in%20oilfield" title=" corrosion management in oilfield"> corrosion management in oilfield</a>, <a href="https://publications.waset.org/abstracts/search?q=corrosion%20prevention" title=" corrosion prevention"> corrosion prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=inspection%20activities" title=" inspection activities"> inspection activities</a> </p> <a href="https://publications.waset.org/abstracts/157058/assets-integrity-management-in-oil-and-gas-production-facilities-through-corrosion-mitigation-and-inspection-strategy-a-case-study-of-sarir-oilfield" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157058.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">754</span> Pool Fire Tests of Dual Purpose Casks for Spent Nuclear Fuel</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20S.%20Bang">K. S. Bang</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20H.%20Yu"> S. H. Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20C.%20Lee"> J. C. Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20S.%20Seo"> K. S. Seo</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20H.%20Lee"> S. H. Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Dual purpose casks are used for storage and transport of spent nuclear fuel assemblies. Therefore, they satisfy the requirements prescribed in the Korea NSSC Act 2013-27, the IAEA Safety Standard Series No. SSR-6, and US 10 CFR Part 71. These regulatory guidelines classify the dual purpose cask as a Type B package, and state that a Type B package must be able to withstand a temperature of 800°C for a period of 30 min. Therefore, a fire test was conducted using a one-sixth slice of a real cask to estimate the thermal integrity of the dual purpose cask at a temperature of 800°C. The neutron shield reached a maximum temperature of 183°C, which indicates that dual purpose cask was properly insulated from the heat of the flames. The temperature rise of the basket during the fire test was 29°C. Therefore, the integrity of a spent nuclear fuel is estimated to be maintained. The temperature was lower when a cooling pin was installed. The neutron shielding was therefore protected adequately by cooling pin. As a result, the thermal integrity of the dual purpose cask was maintained and the cask is judged to be sufficiently safe for temperatures under 800°C. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dual%20purpose%20cask" title="dual purpose cask">dual purpose cask</a>, <a href="https://publications.waset.org/abstracts/search?q=spent%20nuclear%20fuel" title=" spent nuclear fuel"> spent nuclear fuel</a>, <a href="https://publications.waset.org/abstracts/search?q=pool%20fire%20test" title=" pool fire test"> pool fire test</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity" title=" integrity"> integrity</a> </p> <a href="https://publications.waset.org/abstracts/28403/pool-fire-tests-of-dual-purpose-casks-for-spent-nuclear-fuel" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28403.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">461</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">753</span> Data Integrity between Ministry of Education and Private Schools in the United Arab Emirates</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rima%20Shishakly">Rima Shishakly</a>, <a href="https://publications.waset.org/abstracts/search?q=Mervyn%20Misajon"> Mervyn Misajon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Education is similar to other businesses and industries. Achieving data integrity is essential in order to attain a significant supporting for all the stakeholders in the educational sector. Efficient data collect, flow, processing, storing and retrieving are vital in order to deliver successful solutions to the different stakeholders. Ministry of Education (MOE) in United Arab Emirates (UAE) has adopted ‘Education 2020’ a series of five-year plans designed to introduce advanced education management information systems. As part of this program, in 2010 MOE implemented Student Information Systems (SIS) to manage and monitor the students’ data and information flow between MOE and international private schools in UAE. This paper is going to discuss data integrity concerns between MOE, and private schools. The paper will clarify the data integrity issues and will indicate the challenges that face private schools in UAE. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=education%20management%20information%20systems%20%28EMIS%29" title="education management information systems (EMIS)">education management information systems (EMIS)</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20information%20system%20%28SIS%29" title=" student information system (SIS)"> student information system (SIS)</a>, <a href="https://publications.waset.org/abstracts/search?q=United%20Arab%20Emirates%20%28UAE%29" title=" United Arab Emirates (UAE)"> United Arab Emirates (UAE)</a>, <a href="https://publications.waset.org/abstracts/search?q=ministry%20of%20education%20%28MOE%29" title=" ministry of education (MOE)"> ministry of education (MOE)</a>, <a href="https://publications.waset.org/abstracts/search?q=%28KHDA%29%20the%20knowledge%20and%20human%20development%20authority" title=" (KHDA) the knowledge and human development authority"> (KHDA) the knowledge and human development authority</a>, <a href="https://publications.waset.org/abstracts/search?q=Abu%20Dhabi%20educational%20counsel%20%28ADEC%29" title=" Abu Dhabi educational counsel (ADEC)"> Abu Dhabi educational counsel (ADEC)</a> </p> <a href="https://publications.waset.org/abstracts/43280/data-integrity-between-ministry-of-education-and-private-schools-in-the-united-arab-emirates" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43280.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">222</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">752</span> Influence of Machining Process on Surface Integrity of Plasma Coating</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Zl%C3%A1mal">T. Zlámal</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Petr%C5%AF"> J. Petrů</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Pag%C3%A1%C4%8D"> M. Pagáč</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Krajkovi%C4%8D"> P. Krajkovič</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For the required function of components with the thermal spray coating, it is necessary to perform additional machining of the coated surface. The paper deals with assessing the surface integrity of Metco 2042, a plasma sprayed coating, after its machining. The selected plasma sprayed coating serves as an abradable sealing coating in a jet engine. Therefore, the spray and its surface must meet high quality and functional requirements. Plasma sprayed coatings are characterized by lamellar structure, which requires a special approach to their machining. Therefore, the experimental part involves the set-up of special cutting tools and cutting parameters under which the applied coating was machined. For the assessment of suitably set machining parameters, selected parameters of surface integrity were measured and evaluated during the experiment. To determine the size of surface irregularities and the effect of the selected machining technology on the sprayed coating surface, the surface roughness parameters Ra and Rz were measured. Furthermore, the measurement of sprayed coating surface hardness by the HR 15 Y method before and after machining process was used to determine the surface strengthening. The changes of strengthening were detected after the machining. The impact of chosen cutting parameters on the surface roughness after the machining was not proven. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=machining" title="machining">machining</a>, <a href="https://publications.waset.org/abstracts/search?q=plasma%20sprayed%20coating" title=" plasma sprayed coating"> plasma sprayed coating</a>, <a href="https://publications.waset.org/abstracts/search?q=surface%20integrity" title=" surface integrity"> surface integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=strengthening" title=" strengthening"> strengthening</a> </p> <a href="https://publications.waset.org/abstracts/85489/influence-of-machining-process-on-surface-integrity-of-plasma-coating" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85489.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">267</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">751</span> Gas Transmission Pipeline Integrity Management System Through Corrosion Mitigation and Inspection Strategy: A Case Study of Natural Gas Transmission Pipeline from Wafa Field to Mellitah Gas Plant in Libya</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Osama%20Sassi">Osama Sassi</a>, <a href="https://publications.waset.org/abstracts/search?q=Manal%20Eltorki"> Manal Eltorki</a>, <a href="https://publications.waset.org/abstracts/search?q=Iftikhar%20Ahmad"> Iftikhar Ahmad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Poor integrity is one of the major causes of leaks and accidents in gas transmission pipelines. To ensure safe operation, it is must to have efficient and effective pipeline integrity management (PIM) system. The corrosion management is one of the important aspects of successful pipeline integrity management program together design, material selection, operations, risk evaluation and communication aspects to maintain pipelines in a fit-for-service condition. The objective of a corrosion management plan is to design corrosion mitigation, monitoring, and inspection strategy, and for maintenance in a timely manner. This paper presents the experience of corrosion management of a gas transmission pipeline from Wafa field to Mellitah gas plant in Libya. The pipeline is 525.5 km long and having 32 inches diameter. It is a buried pipeline. External corrosion on pipeline is controlled with a combination of coatings and cathodic protection while internal corrosion is controlled with a combination of chemical inhibitors, periodic cleaning and process control. The monitoring and inspection techniques provide a way to measure the effectiveness of corrosion control systems and provide an early warning when changing conditions may be causing a corrosion problem. This paper describes corrosion management system used in Mellitah Oil & Gas BV for its gas transmission pipeline based on standard practices of corrosion mitigation and inspection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corrosion%20mitigation%20on%20gas%20transmission%20pipelines" title="corrosion mitigation on gas transmission pipelines">corrosion mitigation on gas transmission pipelines</a>, <a href="https://publications.waset.org/abstracts/search?q=pipeline%20integrity%20management" title=" pipeline integrity management"> pipeline integrity management</a>, <a href="https://publications.waset.org/abstracts/search?q=corrosion%20management%20of%20gas%20pipelines" title=" corrosion management of gas pipelines"> corrosion management of gas pipelines</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention%20and%20inspection%20of%20corrosion" title=" prevention and inspection of corrosion"> prevention and inspection of corrosion</a> </p> <a href="https://publications.waset.org/abstracts/178928/gas-transmission-pipeline-integrity-management-system-through-corrosion-mitigation-and-inspection-strategy-a-case-study-of-natural-gas-transmission-pipeline-from-wafa-field-to-mellitah-gas-plant-in-libya" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/178928.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">750</span> An Efficient Traceability Mechanism in the Audited Cloud Data Storage</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ramya%20P">Ramya P</a>, <a href="https://publications.waset.org/abstracts/search?q=Lino%20Abraham%20Varghese"> Lino Abraham Varghese</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Bose"> S. Bose</a> </p> <p class="card-text"><strong>Abstract:</strong></p> By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20integrity" title="data integrity">data integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20group" title=" dynamic group"> dynamic group</a>, <a href="https://publications.waset.org/abstracts/search?q=group%20signature" title=" group signature"> group signature</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20auditing" title=" public auditing"> public auditing</a> </p> <a href="https://publications.waset.org/abstracts/31170/an-efficient-traceability-mechanism-in-the-audited-cloud-data-storage" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31170.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">749</span> Preserving Digital Arabic Text Integrity Using Blockchain Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zineb%20Touati%20Hamad">Zineb Touati Hamad</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Ridda%20Laouar"> Mohamed Ridda Laouar</a>, <a href="https://publications.waset.org/abstracts/search?q=Issam%20Bendib"> Issam Bendib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the massive development of technology today, the Arabic language has gained a prominent position among the languages most used for writing articles, expressing opinions, and also for citing in many websites, defying its growing sensitivity in terms of structure, language skills, diacritics, writing methods, etc. In the context of the spread of the Arabic language, the Holy Quran represents the most prevalent Arabic text today in many applications and websites for citation purposes or for the reading and learning rituals. The Quranic verses / surahs are published quickly and without cost, which may cause great concern to ensure the safety of the content from tampering and alteration. To protect the content of texts from distortion, it is necessary to refer to the original database and conduct a comparison process to extract the percentage of distortion. The disadvantage of this method is that it takes time, in addition to the lack of any guarantee on the integrity of the database itself as it belongs to one central party. Blockchain technology today represents the best way to maintain immutable content. Blockchain is a distributed database that stores information in blocks linked to each other through encryption, where the modification of each block can be easily known. To exploit these advantages, we seek in this paper to justify the use of this technique in preserving the integrity of Arabic texts sensitive to change by building a decentralized framework to authenticate and verify the integrity of the digital Quranic verses/surahs spread on websites. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arabic%20text" title="arabic text">arabic text</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity" title=" integrity"> integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=quran" title=" quran"> quran</a>, <a href="https://publications.waset.org/abstracts/search?q=verification" title=" verification"> verification</a> </p> <a href="https://publications.waset.org/abstracts/143009/preserving-digital-arabic-text-integrity-using-blockchain-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143009.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">164</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">748</span> Non-Chronological Approach in Crane Girder and Composite Steel Beam Installation: Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Govindaraj%20Ramanathan">Govindaraj Ramanathan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The time delay and the structural stability are major issues in big size projects due to several factors. Improper planning and poor coordination lead to delay in construction, which sometimes result in reworking or rebuilding. This definitely increases the cost and time of project. This situation stresses the structural engineers to plan out of the limits of contemporary technology utilizing non-chronological approach with creative ideas. One of the strategies to solve this issue is through structural integrity solutions in a cost-effective way. We have faced several problems in a project worth 470 million USD, and one such issue is crane girder installation with composite steel beams. We have applied structural integrity approach with the proper and revised planning schedule to solve the problem efficiently with minimal expenses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construction%20management" title="construction management">construction management</a>, <a href="https://publications.waset.org/abstracts/search?q=delay" title=" delay"> delay</a>, <a href="https://publications.waset.org/abstracts/search?q=non-chronological%20approach" title=" non-chronological approach"> non-chronological approach</a>, <a href="https://publications.waset.org/abstracts/search?q=composite%20beam" title=" composite beam"> composite beam</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20integrity" title=" structural integrity"> structural integrity</a> </p> <a href="https://publications.waset.org/abstracts/57704/non-chronological-approach-in-crane-girder-and-composite-steel-beam-installation-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57704.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=25">25</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=26">26</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=DNA%20integrity&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>