Abstract: This paper analysis performance of disbursement
procedure of public works project in Thailand. The results of
research were summarised based on contracts, submitted invoice,
inspection dated, copies of disbursement dated between client and
their main contractor and interviewed with persons involved in
central and local government projects during 1994-2008 in Thailand.
The data collection was to investigate the disbursement procedure
related to performance in disbursement during construction period
(Planned duration of contract against Actual execution date in each
month). A graphical presentation of a duration analysis of the
projects illustrated significant disbursement formation in each
project. It was established that the shortage of staff, the financial
stability of clients, bureaucratic, method of disbursement and
economics situation has play major role on performance of
disbursement to their main contractors.
Abstract: Electronic banking must be secure and easy to use and
many banks heavily advertise an apparent of 100% secure system
which is contestable in many points. In this work, an alternative
approach to the design of e-banking system, through a new solution
for user authentication and security with digital certificate called
LumaCert is introduced. The certificate applies new algorithm for
asymmetric encryption by utilizing two mathematical operators
called Pentors and UltraPentors. The public and private key in this
algorithm represent a quadruple of parameters which are directly
dependent from the above mentioned operators. The strength of the
algorithm resides in the inability to find the respective Pentor and
UltraPentor operator from the mentioned parameters.
Abstract: The overall service performance of I/O intensive
system depends mainly on workload on its storage system. In
heterogeneous storage environment where storage elements from
different vendors with different capacity and performance are put
together, workload should be distributed according to storage
capability. This paper addresses data placement issue in short video
sharing website. Workload contributed by a video is estimated by the
number of views and life time span of existing videos in same
category. Experiment was conducted on 42,000 video titles in six
weeks. Result showed that the proposed algorithm distributed
workload and maintained balance better than round robin and random
algorithms.
Abstract: In this work we report the recent progresses that have been achieved by our group in the last half decade on the field of computational proteomics. Specifically, we discuss the application of Molecular Dynamics Simulations and Electronic Structure Calculations in drug design, in the clarification of the structural and dynamic properties of proteins and enzymes and in the understanding of the catalytic and inhibition mechanism of cancer-related enzymes. A set of examples illustrate the concepts and help to introduce the reader into this important and fast moving field.
Abstract: Natural language processing systems pose a unique
challenge for software architectural design as system complexity has
increased continually and systems cannot be easily constructed from
loosely coupled modules. Lexical, syntactic, semantic, and pragmatic
aspects of linguistic information are tightly coupled in a manner that
requires separation of concerns in a special way in design,
implementation and maintenance. An aspect oriented software
architecture is proposed in this paper after critically reviewing
relevant architectural issues. For the purpose of this paper, the
syntactic aspect is characterized by an augmented context-free
grammar. The semantic aspect is composed of multiple perspectives
including denotational, operational, axiomatic and case frame
approaches. Case frame semantics matured in India from deep
thematic analysis. It is argued that lexical, syntactic, semantic and
pragmatic aspects work together in a mutually dependent way and
their synergy is best represented in the aspect oriented approach. The
software architecture is presented with an augmented Unified
Modeling Language.
Abstract: In data mining, the association rules are used to search
for the relations of items of the transactions database. Following the
data is collected and stored, it can find rules of value through
association rules, and assist manager to proceed marketing strategy
and plan market framework. In this paper, we attempt fuzzy partition
methods and decide membership function of quantitative values of
each transaction item. Also, by managers we can reflect the
importance of items as linguistic terms, which are transformed as
fuzzy sets of weights. Next, fuzzy weighted frequent pattern growth
(FWFP-Growth) is used to complete the process of data mining. The
method above is expected to improve Apriori algorithm for its better
efficiency of the whole association rules. An example is given to
clearly illustrate the proposed approach.
Abstract: In this work, new experimental data for slugging
frequency in inclined gas-liquid flow are reported, and a new
correlation is proposed. Scale experiments were carried out using a
mixture of air and water in a 6 m long pipe. Two different pipe
diameters were used, namely, 38 and 67 mm. The data were taken
with capacitance type sensors at a data acquisition frequency of 200
Hz over an interval of 60 seconds. For the range of flow conditions
studied, the liquid superficial velocity is observed to influence the
frequency strongly. A comparison of the present data with
correlations available in the literature reveals a lack of agreement. A
new correlation for slug frequency has been proposed for the inclined
flow, which represents the main contribution of this work.
Abstract: HIV-1 genome is highly heterogeneous. Due to this
variation, features of HIV-I genome is in a wide range. For this
reason, the ability to infection of the virus changes depending on
different chemokine receptors. From this point of view, R5 HIV
viruses use CCR5 coreceptor while X4 viruses use CXCR5 and
R5X4 viruses can utilize both coreceptors. Recently, in
Bioinformatics, R5X4 viruses have been studied to classify by using
the experiments on HIV-1 genome.
In this study, R5X4 type of HIV viruses were classified using
Auto Regressive (AR) model through Artificial Neural Networks
(ANNs). The statistical data of R5X4, R5 and X4 viruses was
analyzed by using signal processing methods and ANNs. Accessible
residues of these virus sequences were obtained and modeled by AR
model since the dimension of residues is large and different from
each other. Finally the pre-processed data was used to evolve various
ANN structures for determining R5X4 viruses. Furthermore ROC
analysis was applied to ANNs to show their real performances. The
results indicate that R5X4 viruses successfully classified with high
sensitivity and specificity values training and testing ROC analysis
for RBF, which gives the best performance among ANN structures.
Abstract: PROFIBUS (PROcess FIeld BUS) which is defined with international standarts (IEC61158, EN50170) is the most popular fieldbus, and provides a communication between industrial applications which are located in different control environment and location in manufacturing, process and building automation. Its communication speed is from 9.6 Kbps to 12 Mbps over distances from 100 to 1200 meters, and so it is to be often necessary to interconnect them in order to break these limits. Unfortunately this interconnection raises several issues and the solutions found so far are not very satisfactory. In this paper, we propose a new solution to interconnect PROFIBUS segments, which uses a wireless MAN based on the IEEE 802.16 standard as a backbone system. Also, the solution which is described a model for internetworking unit integrates the traffic generated by PROFIBUS segments into IEEE 802.16 wireless MAN using encapsulation technique.
Abstract: Because road traffic accidents are a major source of death worldwide, attempts have been made to create Advanced Driver Assistance Systems (ADAS) able to detect vehicle, driver and
environmental conditions that are cues for possible potential accidents. This paper presents continued work on a novel Nonintrusive
Intelligent Driver Assistance and Safety System (Ni-DASS)
for assessing driver attention and hazard awareness. It uses two onboard
CCD cameras – one observing the road and the other observing
the driver-s face. The windscreen is divided into cells and analysis of
the driver-s eye-gaze patterns allows Ni-DASS to determine the windscreen cell the driver is focusing on using eye-gesture templates.
Intersecting the driver-s field of view through the observed
windscreen cell with subsections of the camera-s field of view containing a potential hazard allows Ni-DASS to estimate the
probability that the driver has actually observed the hazard. Results
have shown that the proposed technique is an accurate enough
measure of driver observation to be useful in ADAS systems.
Abstract: In this paper the authors present the framework of a
system for assisting users through counseling on personal health, the
Personal Health Assistance Service Expert System (PHASES).
Personal health assistance systems need Personal Health Records
(PHR), which support wellness activities, improve the understanding
of personal health issues, enable access to data from providers of
health services, strengthen health promotion, and in the end improve
the health of the population. This is especially important in societies
where the health costs increase at a higher rate than the overall
economy. The most important elements of a healthy lifestyle are
related to food (such as balanced nutrition and diets), activities for
body fitness (such as walking, sports, fitness programs), and other
medical treatments (such as massage, prescriptions of drugs). The
PHASES framework uses an ontology of food, which includes
nutritional facts, an expert system keeping track of personal health
data that are matched with medical treatments, and a comprehensive
data transfer between patients and the system.
Abstract: The purpose of this work was to inspect the potential
of vincristine-dextran complex loaded solid lipid nanoparticles for
drug delivery to the brain.
The nanoparticles were stained with a fluorescence dye and their
plasma pharmacokinetic and brain concentrations were investigated
following injection to rats.
The result revealed a significant improvement in the plasma
concentration profile of the SLN injected animals as well as a sharp
increased concentration in the brains.
Abstract: Metrics is the process by which numbers or symbols
are assigned to attributes of entities in the real world in such a way as
to describe them according to clearly defined rules. Software metrics
are instruments or ways to measuring all the aspect of software
product. These metrics are used throughout a software project to
assist in estimation, quality control, productivity assessment, and
project control. Object oriented software metrics focus on
measurements that are applied to the class and other characteristics.
These measurements convey the software engineer to the behavior of
the software and how changes can be made that will reduce
complexity and improve the continuing capability of the software.
Object oriented software metric can be classified in two types static
and dynamic. Static metrics are concerned with all the aspects of
measuring by static analysis of software and dynamic metrics are
concerned with all the measuring aspect of the software at run time.
Major work done before, was focusing on static metric. Also some
work has been done in the field of dynamic nature of the software
measurements. But research in this area is demanding for more work.
In this paper we give a set of dynamic metrics specifically for
polymorphism in object oriented system.
Abstract: In the present work the internal sulfate attack on
pastes made from pure clinker phases was studied. Two binders were
produced: (a) a binder with 2% C3A and 18% C4AF content; (b) a
binder with 10% C3A and C4AF content each. Gypsum was used as
the sulfate bearing compound, while calcium carbonate added to
differentiate the binders produced. The phases formed were identified
by XRD analysis. The results showed that ettringite was the
deterioration phase detected in the case of the low C3A content
binder. Carbonation occurred in the specimen without calcium
carbonate addition, while portlandite was observed in the one
containing calcium carbonate. In the case of the high C3A content
binder, traces of thaumasite were detected when calcium carbonate
was not incorporated in the binder. A solid solution of thaumasite and
ettringite was found when calcium carbonate was added. The amount
of C3A had not fully reacted with sulfates, since its corresponding
peaks were detected.
Abstract: ZnO nanostructure were synthesized via microwave
method using zinc acetate as starting material, guanidinium as
structure directing agents, and water as solvent.. This work
investigates the photodegradation of azo dyes using the ZnO Flowerlike
in aqueous solutions. As synthesized ZnO samples were
characterized using X-Ray powder diffraction (XRD), scanning
electron microscopy (SEM), and FTIR spectroscopy.In this work
photodecolorization of congored azo dye under UV irradiation by
nano ZnO was studied.
Abstract: In wireless and mobile communications, this progress
provides opportunities for introducing new standards and improving
existing services. Supporting multimedia traffic with wireless networks
quality of service (QoS). In this paper, a grey-fuzzy controller for radio
resource management (GF-RRM) is presented to maximize the number
of the served calls and QoS provision in wireless networks. In a
wireless network, the call arrival rate, the call duration and the
communication overhead between the base stations and the control
center are vague and uncertain. In this paper, we develop a method to
predict the cell load and to solve the RRM problem based on the
GF-RRM, and support the present facility has been built on the
application-level of the wireless networks. The GF-RRM exhibits the
better adaptability, fault-tolerant capability and performance than other
algorithms. Through simulations, we evaluate the blocking rate, update
overhead, and channel acquisition delay time of the proposed method.
The results demonstrate our algorithm has the lower blocking rate, less
updated overhead, and shorter channel acquisition delay.
Abstract: Intrusion detection systems (IDS)are crucial components
of the security mechanisms of today-s computer systems.
Existing research on intrusion detection has focused on sequential
intrusions. However, intrusions can also be formed by concurrent
interactions of multiple processes. Some of the intrusions caused
by these interactions cannot be detected using sequential intrusion
detection methods. Therefore, there is a need for a mechanism that
views the distributed system as a whole. L-BIDS (Lattice-Based
Intrusion Detection System) is proposed to address this problem. In
the L-BIDS framework, a library of intrusions and distributed traces
are represented as lattices. Then these lattices are compared in order
to detect intrusions in the distributed traces.
Abstract: Hybrid photovoltaic thermal (PV/T) solar system comprises a solar collector which is disposed on photovoltaic solar cells. The disadvantage of a conventional photovoltaic cell is that its performance decreases as the temperature increases. Indeed, part of the solar radiation is converted into electricity and is dissipated as heat, increasing the temperature of the photovoltaic cell with respect to the ambient temperature. The objective of this work is to study experimentally and implement a hybrid prototype to evaluate electrical and thermal performance. In this paper, an experimental study of two new configurations of hybrid collectors is exposed. The results are given and interpreted. The two configurations of absorber studied are a new combination with tubes and galvanized tank, the other is a tubes and sheet.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created
Abstract: Severe acute respiratory syndrome (SARS) is a respiratory disease in humans which is caused by the SARS coronavirus. The treatment of coronavirus-associated SARS has been evolving and so far there is no consensus on an optimal regimen. The mainstream therapeutic interventions for SARS involve broad-spectrum antibiotics and supportive care, as well as antiviral agents and immunomodulatory therapy. The Protein- Ligand interaction plays a significant role in structural based drug designing. In the present work we have taken the receptor Angiotensin converting enzyme 2 and identified the drugs that are commonly used against SARS. They are Lopinavir, Ritonavir, Ribavirin, and Oseltamivir. The receptor Angiotensin converting enzyme 2 (ACE-2) was docked with above said drugs and the energy value obtained are as follows, Lopinavir (-292.3), Ritonavir (-325.6), Oseltamivir (- 229.1), Ribavirin (-208.8). Depending on the least energy value we have chosen the best two drugs out of the four conventional drugs. We tried to improve the binding efficiency and steric compatibility of the two drugs namely Ritonavir and Lopinavir. Several modifications were made to the probable functional groups (phenylic, ketonic groups in case of Ritonavir and carboxylic groups in case of Lopinavir respectively) which were interacting with the receptor molecule. Analogs were prepared by Marvin Sketch software and were docked using HEX docking software. Lopinavir analog 8 and Ritonavir analog 11 were detected with significant energy values and are probable lead molecule. It infers that some of the modified drugs are better than the original drugs. Further work can be carried out to improve the steric compatibility of the drug based upon the work done above for a more energy efficient binding of the drugs to the receptor.