Abstract: In reference to the legal state in the Thai legal system,
most people understand the minor principles of the legal state form,
which are the principles that can be explained and understood easily
and the results can be seen clearly, especially in the legitimacy of
administrative acts. Therefore, there is no awareness of justice, which
is the fundamental value of Thai law. The legitimacy of administrative
acts requires the administration to adhere to the constitution and
legislative laws in enforcement of the laws. If it appears that the
administrative acts are illegitimate, the administrative court, as the
court of justice, will revoke those acts as if they had never been set in
the legal system, this will affect people’s trust as they are unaware as
to whether the administrative acts that appoint their lives are
legitimate or not. Regarding the revocation of administrative orders
by the administrative court as if those orders had never existed, the
common individual surely cannot be expected to comprehend the
security of their juristic position. Therefore, the legal state does not
require a revocation of the government’s acts to terminate its legal
results merely because those acts are illegitimate, but there should be
considerations and realizations regarding the “The Principle of the
Protection of Legitimate Expectation,” which is a minor principle in
the legal state’s content that focuses on supporting and protecting
legitimate expectations of the juristic position of an individual and
maintaining justice, which is the fundamental value of Thai law.
Abstract: Conservation works in Malaysia that is procured by
public organisation usually follow the traditional approach where the
works are tendered based on Bills of Quantities (BQ). One of the
purposes of tendering is to enable the selection of a competent
contractor that offers a competitive price. While competency of the
contractors are assessed by their technical knowledge, experience and
track records, the assessment of pricing will be dependent on the
tender amount. However, the issue currently faced by the
conservation works sector is the difficulty in assessing the
competitiveness and reasonableness of the tender amount due to the
high variance between the tenders amount. Thus, this paper discusses
the factors that cause difficulty to the tenderers in pricing
competitively in a bidding exercise for conservation tenders. Data on
tendering is collected from interviews with conservation works
contractors to gain in-depth understanding of the barriers faced in
pricing tenders of conservation works. Findings from the study lent
support to the contention that the variance of tender amount is very
high amongst tenderers. The factors identified in the survey are the
format of BQ, hidden works, experience and labour and material
costs.
Abstract: The eccentric connectivity index based on degree and
eccentricity of the vertices of a graph is a widely used graph invariant
in mathematics.
In this paper, we present the explicit eccentric connectivity index,
first and second Zagreb indices for a Corona graph and sub divisionrelated
corona graphs.
Abstract: The Blue Nile Basin is the most important tributary of
the Nile River. Egypt and Sudan are almost dependent on water
originated from the Blue Nile. This multi-dependency creates
conflicts among the three countries Egypt, Sudan, and Ethiopia
making the management of these conflicts as an international issue.
Good assessment of the water resources of the Blue Nile is an
important to help in managing such conflicts. Hydrological models
are good tool for such assessment. This paper presents a critical
review of the nature and variability of the climate and hydrology of
the Blue Nile Basin as a first step of using hydrological modeling to
assess the water resources of the Blue Nile. Many several attempts
are done to develop basin-scale hydrological modeling on the Blue
Nile. Lumped and semi distributed models used averages of
meteorological inputs and watershed characteristics in hydrological
simulation, to analyze runoff for flood control and water resource
management. Distributed models include the temporal and spatial
variability of catchment conditions and meteorological inputs to
allow better representation of the hydrological process. The main
challenge of all used models was to assess the water resources of the
basin is the shortage of the data needed for models calibration and
validation. It is recommended to use distributed model for their
higher accuracy to cope with the great variability and complexity of
the Blue Nile basin and to collect sufficient data to have more
sophisticated and accurate hydrological modeling.
Abstract: This research was conducted in the Mae Sot
Watershed where located in the Moei River Basin at the Upper
Salween River Basin in Tak Province, Thailand. The Mae Sot
Municipality is the largest urban area in Tak Province and situated in
the midstream of the Mae Sot Watershed. It usually faces flash flood
problem after heavy rain due to poor flood management has been
reported since economic rapidly bloom up in recent years. Its
catchment can be classified as ungauged basin with lack of rainfall
data and no any stream gaging station was reported. It was attached
by most severely flood events in 2013 as the worst studied case for
all those communities in this municipality. Moreover, other problems
are also faced in this watershed, such shortage water supply for
domestic consumption and agriculture utilizations including a
deterioration of water quality and landslide as well. The research
aimed to increase capability building and strengthening the
participation of those local community leaders and related agencies to
conduct better water management in urban area was started by mean
of the data collection and illustration of the appropriated application
of some short period rainfall forecasting model as they aim for better
flood relief plan and management through the hydrologic model
system and river analysis system programs. The authors intended to
apply the global rainfall data via the integrated data viewer (IDV)
program from the Unidata with the aim for rainfall forecasting in a
short period of 7-10 days in advance during rainy season instead of
real time record. The IDV product can be present in an advance
period of rainfall with time step of 3-6 hours was introduced to the
communities. The result can be used as input data to the hydrologic
modeling system model (HEC-HMS) for synthesizing flood
hydrographs and use for flood forecasting as well. The authors
applied the river analysis system model (HEC-RAS) to present flood
flow behaviors in the reach of the Mae Sot stream via the downtown
of the Mae Sot City as flood extents as the water surface level at
every cross-sectional profiles of the stream. Both models of HMS and
RAS were tested in 2013 with observed rainfall and inflow-outflow
data from the Mae Sot Dam. The result of HMS showed fit to the
observed data at the dam and applied at upstream boundary discharge
to RAS in order to simulate flood extents and tested in the field, and
the result found satisfying. The product of rainfall from IDV was fair
while compared with observed data. However, it is an appropriate
tool to use in the ungauged catchment to use with flood hydrograph
and river analysis models for future efficient flood relief plan and
management.
Abstract: Governments collect and produce large amounts of
data. Increasingly, governments worldwide have started to implement
open data initiatives and also launch open data portals to enable the
release of these data in open and reusable formats. Therefore, a large
number of open data repositories, catalogues and portals have been
emerging in the world. The greater availability of interoperable and
linkable open government data catalyzes secondary use of such data,
so they can be used for building useful applications which leverage
their value, allow insight, provide access to government services, and
support transparency. The efficient development of successful open
data portals makes it necessary to evaluate them systematic, in order
to understand them better and assess the various types of value they
generate, and identify the required improvements for increasing this
value. Thus, the attention of this paper is directed particularly to the
field of open data portals. The main aim of this paper is to compare
the selected open data portals on the national level using content
analysis and propose a new evaluation framework, which further
improves the quality of these portals. It also establishes a set of
considerations for involving businesses and citizens to create eservices
and applications that leverage on the datasets available from
these portals.
Abstract: This paper presents two types of microstrip bandpass
filter (BPF) at microwave frequencies. The first one is a tunable BPF
using planar patch resonators based on a varactor diode. The filter is
formed by a triple mode circular patch resonator with two pairs of
slots, in which the varactor diodes are connected. Indeed, this filter is
initially centered at 2.4 GHz; the center frequency of the tunable
patch filter could be tuned up to 1.8 GHz simultaneously with the
bandwidth, reaching high tuning ranges. Lossless simulations were
compared to those considering the substrate dielectric, conductor
losses and the equivalent electrical circuit model of the tuning
element in order to assess their effects. Within these variations,
simulation results showed insertion loss better than 2 dB and return
loss better than 10 dB over the passband. The second structure is a
BPF for ultra-wideband (UWB) applications based on multiple-mode
resonator (MMR) and rectangular-shaped defected ground structure
(DGS). This filter, which is compact size of 25.2 x 3.8 mm2, provides
in the pass band an insertion loss of 0.57 dB and a return loss greater
than 12 dB. The proposed filters presents good performances and the
simulation results are in satisfactory agreement with the
experimentation ones reported elsewhere.
Abstract: Artificial intelligence applications are commonly used
in industry in many fields in parallel with the developments in the
computer technology. In this study, a fire room was prepared for the
resistance of wooden construction elements and with the mechanism
here, the experiments of polished materials were carried out. By
utilizing from the experimental data, an artificial neural network
(ANN) was modelled in order to evaluate the final cross sections of
the wooden samples remaining from the fire. In modelling,
experimental data obtained from the fire room were used. In the
developed system, the first weight of samples (ws-gr), preliminary
cross-section (pcs-mm2), fire time (ft-minute), and fire temperature
(t-oC) as input parameters and final cross-section (fcs-mm2) as output
parameter were taken. When the results obtained from ANN and
experimental data are compared after making statistical analyses, the
data of two groups are determined to be coherent and seen to have no
meaning difference between them. As a result, it is seen that ANN
can be safely used in determining cross sections of wooden materials
after fire and it prevents many disadvantages.
Abstract: The research studies the behaviors based on
sufficiency economy philosophy at individual and community
levelsas well as the satisfaction of the urban community leaders by
collecting data with purposive sampling technique. For in-depth
interviews with 26 urban community leaders, the result shows that
the urban community leaders have good knowledge and
understanding about sufficiency economy philosophy. Especially in
terms of money spending, they must consider the need for living and
be economical. The activities in the community or society should not
take advantage of the others as well as colleagues. At present, most of
the urban community leaders live in sufficient way. They often spend
time with public service, but many families are dealing with debt.
Many communities have some political conflict and high family
allowances because of living in the urban communities with rapid
social and economic changes. However, there are many communities
that leaders have applied their wisdom in development for their
people by gathering and grouping the professionals to form activities
such as making chilli sauce, textile organization, making artificial
flowers to worship the sanctity. The most prominent group is the foot
massage business in Wat Pracha Rabue Tham. This professional
group is supported continuously by the government. One of the
factors in terms of satisfaction used for evaluating community leaders
is the customary administration in brotherly, interdependent way
rather than using the absolute power or controlling power, but using
the roles of leader to perform the activities with their people intently,
determinedly and having public mind for people.
Abstract: Since, it is essential to provide homeless people by the
earthquake with safe, habitable accommodation repairing medium
and slight levels of damage at the connection parts should be
undertaken. In order to prove that a repaired connection was
sufficiently strong, a precast beam to column post tensioned
connection was tested in three phases. In phase one, the middle level
damage was observed at 6% drift at these connections. As a result of
the extra loads applied, little damage was observed. In the last phase,
the four connections tested in the first phase were repaired using
epoxy resin and then retested. The results from the tests on the
repaired precast and the undamaged specimens showed that the
repaired specimens were sufficiently strong, thus proving that repair
to damaged precast beam to column post tensioned connections can
be undertaken.
Abstract: Newly synthesized Polypropylene-g-Polyethylene
glycol polymer was first time used for a compartment-less enzymatic
fuel cell. Working electrodes based on Polypropylene-g-Polyethylene
glycol were operated as unmediated and mediated system (with
ferrocene and gold/cobalt oxide nanoparticles). Glucose oxidase and
bilirubin oxidase was selected as anodic and cathodic enzyme,
respectively. Glucose was used as fuel in a single-compartment and
membrane-less cell. Maximum power density was obtained as 0.65
nW cm-2, 65 nW cm-2 and 23500 nW cm-2 from the unmediated,
ferrocene and gold/cobalt oxide modified polymeric film,
respectively. Power density was calculated to be ~16000 nW cm-2 for
undiluted wastewater sample with gold/cobalt oxide nanoparticles
including system.
Abstract: The main aim of this research was to investigate a
prototype bamboo shading device. There were two objectives to this
study: first, to investigate the effects of non-chemical treatments on
bamboo shading devices damaged by powder-post beetles and fungi,
and second to develop a prototype bamboo shading device. This
study of the effects of non-chemical treatments on bamboo shading
devices damage by powder-post beetles in the laboratory showed
that, among seven treatments tested, wood vinegar treatment can
protect powder-post beetles better than the original method by up to
92.91%. It was also found that wood vinegar treatment shows the
best performance in fungi protection and works better than the
original method by up to 40%. A second experiment was carried out
by constructing four bamboo shading devices and installing them on
a building for 28 days. All aspects of shading device were
investigated in terms of their beauty, durability, and ease of
construction and assembly. The final prototype was developed from
the lessons learned from the test results. In conclusion, this study
showed the effectiveness of some natural preservatives against insect
and fungi damage, and it also illustrated the characteristics of a
prototype bamboo shading device that can be constructed by rural
workers within one week.
Abstract: The development of Drugs Delivery System (DDS)
has been widely investigated in the last decades. In this paper, first a
general overview of traditional and modern wound dressing is
presented. This is followed by a review of what scientists have done
in the medical environment, focusing on the possibility to develop a
new alternative for DDS through transdermal pathway, aiming to
treat melanoma skin cancer.
Abstract: Large-scale data stream analysis has become one of
the important business and research priorities lately. Social networks
like Twitter and other micro-blogging platforms hold an enormous
amount of data that is large in volume, velocity and variety.
Extracting valuable information and trends out of these data would
aid in a better understanding and decision-making. Multiple analysis
techniques are deployed for English content. Moreover, one of the
languages that produce a large amount of data over social networks
and is least analyzed is the Arabic language. The proposed paper is a
survey on the research efforts to analyze the Arabic content in
Twitter focusing on the tools and methods used to extract the
sentiments for the Arabic content on Twitter.
Abstract: This paper seeks to analyse the benefits of big data
and more importantly the challenges it pose to the subject of privacy
and data protection. First, the nature of big data will be briefly
deliberated before presenting the potential of big data in the present
days. Afterwards, the issue of privacy and data protection is
highlighted before discussing the challenges of implementing this
issue in big data. In conclusion, the paper will put forward the debate
on the adequacy of the existing legal framework in protecting
personal data in the era of big data.
Abstract: This paper examines how “Zakat” provides fair
income redistribution and aids the struggle against poverty. Providing
fair income redistribution and combating poverty constitutes some of
the fundamental tasks performed by countries all over the world.
Each country seeks a solution for these problems according to their
political, economic and administrative styles through applying
various economic and financial policies. The same situation can be
handled via “zakat” association in Islam. Nowadays, we observe
different versions of “zakat” in developed countries. Applications
such as negative income tax denote merely a different form of
“zakat” that is being applied almost in the same way but under
changed names. However, the minimum values to donate under zakat
(e.g. 85 gr. gold and 40 animals) get altered and various amounts are
put into practice. It might be named as negative income tax instead of
zakat, nonetheless, these applications are based on the Holy Koran
and the hadith released 1400 years ago. Besides, considering the
savage and slavery in the world at those times, we might easily
recognize the true value of the zakat being applied for the first time
then in the Islamic system. Through zakat, governments are able to
transfer incomes to the poor as a means of enabling them achieve the
minimum standard of living required. With regards to who benefits
from the Zakat, an objective and fair criteria was used to determine
who benefits from the zakat contrary to the notion that it was based
on peoples’ own choices. Since the zakat is obligatory, the transfers
do not get forwarded directly but via the government and get
distributed, which requires vast governmental organizations. Through
the application of Zakat, reduced levels of poverty can be achieved
and also ensure the fair income redistribution.
Abstract: It is important to take security measures to protect
your computer information, reduce identify theft, and prevent from
malicious cyber-attacks. With cyber-attacks on the continuous rise,
people need to understand and learn ways to prevent from these
attacks. Cyber-attack is an important factor to be considered if one is
to be able to protect oneself from malicious attacks. Without proper
security measures, most computer technology would hinder home
users more than such technologies would help. Knowledge of how
cyber-attacks operate and protective steps that can be taken to reduce
chances of its occurrence are key to increasing these security
measures. The purpose of this paper is to inform home users on the
importance of identifying and taking preventive steps to avoid cyberattacks.
Throughout this paper, many aspects of cyber-attacks will be
discuss: what a cyber-attack is, the affects of cyber-attack for home
users, different types of cyber-attacks, methodology to prevent such
attacks; home users can take to fortify security of their computer.
Abstract: Qatar, a Gulf country highly dependent on its oil and
gas revenues – is looking to innovate, diversify, and ultimately reach
its aim of creating a knowledge economy to prepare for its post-oil
era. One area that the country is investing in is Contemporary Art,
and world renowned artists such as Damien Hirst and Richard Serra –
have been commissioned to design site-specific art for the public
spaces of the city of Doha as well as in more remote desert locations.
This research discusses the changing presence, role and context of
public art in Doha, both from a historical and cultural overview, and
the different forms and media as well as the typologies of urban and
public spaces in which the art is installed. It examines the process of
implementing site-specific artworks, looking at questions of scale,
history, social meaning and formal aesthetics. The methodologies
combine theoretical research on the understanding of public art and
its role and placement in public space, as well as empirical research
on contemporary public art projects in Doha, based on documentation
and interviews and as well as site and context analysis of the urban or
architectural spaces within which the art is situated. Surveys and
interviews – using social media - in different segments of the
contemporary Qatari society, including all nationalities and social
groups, are used to measure and qualify the impacts and effects on
the population.
Abstract: Near-infrared spectroscopy (NIRS) has been widely
used as a non-invasive method to measure brain activity, but it is
corrupted by baseline drift noise. Here we present a method to measure
regional cerebral blood flow as a derivative of NIRS output. We
investigate whether, when listening to languages, blood flow can
reasonably localize and represent regional brain activity or not. The
prefrontal blood flow distribution pattern when advanced
second-language listeners listened to a second language (L2) was most
similar to that when listening to their first language (L1) among the
patterns of mean and standard deviation. In experiments with 25
healthy subjects, the maximum blood flow was localized to the left
BA46 of advanced listeners. The blood flow presented is robust to
baseline drift and stably localizes regional brain activity.
Abstract: Random epistemologies and hash tables have garnered
minimal interest from both security experts and experts in the last
several years. In fact, few information theorists would disagree with
the evaluation of expert systems. In our research, we discover how
flip-flop gates can be applied to the study of superpages. Though
such a hypothesis at first glance seems perverse, it is derived from
known results.