Abstract: The purposes of this research were 1) to survey the
number of drugstores that unlawful dispense of asthma prescription
drugs, in form of drug combinations in the Phaya Thai district of
Bangkok, 2) to find the steroids contained in that drug combinations,
3) to find a means for informing general public about the dangers of
drugs and for a campaign to stop dispensing them.
Researcher collected drug combinations from 69 drugstores in
Phaya Thai district from Feb 15, 2012 to Mar 15, 2012. The survey
found 30.43%, 21, drug stores, sold asthma drug combinations to
customers without a prescription. These collected samples were
tested for steroid contamination by using Immunochromatography
kits. Eleven samples, 52.38%, were found contaminated with
steroids. In short, there should be control and inspection of
drugstores in the distribution of steroid medications. To improve the
knowledge of self health maintenance and drug usage among public,
Thai Government and Department of Public Health should educate
people about the side effects of using drug combinations and steroids.
Abstract: To strengthen the capital market, there is a need to
integrate the capital markets within the region by removing legal or informal restriction, specifically, stock market liberalization. Thus the paper is to investigate the effects of the subsequent stock market liberalization on stock market integration in 4 ASEAN countries (Malaysia, Indonesia, Thailand, Singapore) and Korea from 1997 to 2007. The correlation between stock market liberalization and stock
market integration are to be examined by analyzing the stock prices
and returns within the region and in comparison with the world
MSCI index. Event study method is to be used with windows of ±12
months and T-7 + T. The results show that the subsequent stock
market liberalization generally, gives minor positive effects to stock
returns, except for one or two countries. The subsequent
liberalization also integrates the markets short-run and long-run.
Abstract: In this study we present our developed formative
assessment tool for students' assignments. The tool enables lecturers
to define assignments for the course and assign each problem in each
assignment a list of criteria and weights by which the students' work
is evaluated. During assessment, the lecturers feed the scores for each
criterion with justifications. When the scores of the current
assignment are completely fed in, the tool automatically generates
reports for both students and lecturers. The students receive a report
by email including detailed description of their assessed work, their
relative score and their progress across the criteria along the course
timeline. This information is presented via charts generated
automatically by the tool based on the scores fed in. The lecturers
receive a report that includes summative (e.g., averages, standard
deviations) and detailed (e.g., histogram) data of the current
assignment. This information enables the lecturers to follow the class
achievements and adjust the learning process accordingly. The tool
was examined on two pilot groups of college students that study a
course in (1) Object-Oriented Programming (2) Plane Geometry.
Results reveal that most of the students were satisfied with the
assessment process and the reports produced by the tool. The
lecturers who used the tool were also satisfied with the reports and
their contribution to the learning process.
Abstract: Adhesively bonded joints are preferred over the
conventional methods of joining such as riveting, welding, bolting
and soldering. Some of the main advantages of adhesive joints
compared to conventional joints are the ability to join dissimilar
materials and damage-sensitive materials, better stress distribution,
weight reduction, fabrication of complicated shapes, excellent
thermal and insulation properties, vibration response and enhanced
damping control, smoother aerodynamic surfaces and an
improvement in corrosion and fatigue resistance. This paper presents
the behavior of adhesively bonded joints subjected to combined
thermal loadings, using the numerical methods. The joint
configuration considers aluminum as central adherend with six
different outer adherends including aluminum, steel, titanium, boronepoxy,
unidirectional graphite-epoxy and cross-ply graphite-epoxy
and epoxy-based adhesives. Free expansion of the joint in x
direction was permitted and stresses in adhesive layer and interfaces
calculated for different adherends.
Abstract: Phishing, or stealing of sensitive information on the
web, has dealt a major blow to Internet Security in recent times. Most
of the existing anti-phishing solutions fail to handle the fuzziness
involved in phish detection, thus leading to a large number of false
positives. This fuzziness is attributed to the use of highly flexible and
at the same time, highly ambiguous HTML language. We introduce a
new perspective against phishing, that tries to systematically prove,
whether a given page is phished or not, using the corresponding
original page as the basis of the comparison. It analyzes the layout of
the pages under consideration to determine the percentage distortion
between them, indicative of any form of malicious alteration. The
system design represents an intelligent system, employing dynamic
assessment which accurately identifies brand new phishing attacks
and will prove effective in reducing the number of false positives.
This framework could potentially be used as a knowledge base, in
educating the internet users against phishing.
Abstract: Recently there has been a growing interest in the field
of bio-mimetic robots that resemble the behaviors of an insect or an
aquatic animal, among many others. One of various bio-mimetic robot
applications is to explore pipelines, spotting any troubled areas or
malfunctions and reporting its data. Moreover, the robot is able to
prepare for and react to any abnormal routes in the pipeline. Special
types of mobile robots are necessary for the pipeline monitoring tasks.
In order to move effectively along a pipeline, the robot-s movement
will resemble that of insects or crawling animals. When situated in
massive pipelines with complex routes, the robot places fixed sensors
in several important spots in order to complete its monitoring. This
monitoring task is to prevent a major system failure by preemptively
recognizing any minor or partial malfunctions. Areas uncovered by
fixed sensors are usually impossible to provide real-time observation
and examination, and thus are dependent on periodical offline
monitoring. This paper proposes a monitoring system that is able to
monitor the entire area of pipelines–with and without fixed
sensors–by using the bio-mimetic robot.
Abstract: The so-called all-pass filter circuits are commonly
used in the field of signal processing, control and measurement.
Being connected to capacitive loads, these circuits tend to loose their
stability; therefore the elaborate analysis of their dynamic behavior is
necessary. The compensation methods intending to increase the
stability of such circuits are discussed in this paper, including the socalled
lead-lag compensation technique being treated in detail. For
the dynamic modeling, a two-port network model of the all-pass filter
is being derived. The results of the model analysis show, that
effective lead-lag compensation can be achieved, alone by the
optimization of the circuit parameters; therefore the application of
additional electric components are not needed to fulfill the stability
requirement.
Abstract: Multiphase flow transport in porous medium is very common and significant in science and engineering applications. For example, in CO2 Storage and Enhanced Oil Recovery processes, CO2 has to be delivered to the pore spaces in reservoirs and aquifers. CO2 storage and enhance oil recovery are actually displacement processes, in which oil or water is displaced by CO2. This displacement is controlled by pore size, chemical and physical properties of pore surfaces and fluids, and also pore wettability. In this study, a technique was developed to measure the pressure profile for driving gas/liquid to displace water in pores. Through this pressure profile, the impact of pore size on the multiphase flow transport and displacement can be analyzed. The other rig developed can be used to measure the static and dynamic pore wettability and investigate the effects of pore size, surface tension, viscosity and chemical structure of liquids on pore wettability.
Abstract: The purpose of this study is to present a non invasive
method for the marginal adaptation evaluation in class V composite
restorations. Standardized class V cavities, prepared in human
extracted teeth, were filled with Premise (Kerr) composite. The
specimens were thermo cycled. The interfaces were examined by
Optical Coherence Tomography method (OCT) combined with the
confocal microscopy and fluorescence. The optical configuration
uses two single mode directional couplers with a superluminiscent
diode as the source at 1300 nm. The scanning procedure is similar to
that used in any confocal microscope, where the fast scanning is enface
(line rate) and the depth scanning is much slower (at the frame
rate). Gaps at the interfaces as well as inside the composite resin
materials were identified. OCT has numerous advantages which
justify its use in vivo as well as in vitro in comparison with
conventional techniques.
Abstract: In this paper is presented a Geographic Information System (GIS) approach in order to qualify and monitor the broadband lines in efficient way. The methodology used for interpolation is the Delaunay Triangular Irregular Network (TIN). This method is applied for a case study in ISP Greece monitoring 120,000 broadband lines.
Abstract: In this paper, a new approach based on the extent of
friendship between the nodes is proposed which makes the nodes to
co-operate in an ad hoc environment. The extended DSR protocol is
tested under different scenarios by varying the number of malicious
nodes and node moving speed. It is also tested varying the number of
nodes in simulation used. The result indicates the achieved
throughput by extended DSR is greater than the standard DSR and
indicates the percentage of malicious drops over total drops are less
in the case of extended DSR than the standard DSR.
Abstract: Non-saturated soils that while saturation greatly
decrease their volume, have sudden settlement due to increasing
humidity, fracture and structural crack are called loess soils. Whereas
importance of civil projects including: dams, canals and
constructions bearing this type of soil and thereof problems, it is
required for carrying out more research and study in relation to loess
soils. This research studies shear strength parameters by using
grading test, Atterberg limit, compression, direct shear and
consolidation and then effect of using cement and lime additives on
stability of loess soils is studied. In related tests, lime and cement are
separately added to mixed ratios under different percentages of soil
and for different times the stabilized samples are processed and effect
of aforesaid additives on shear strength parameters of soil is studied.
Results show that upon passing time the effect of additives and
collapsible potential is greatly decreased and upon increasing
percentage of cement and lime the maximum dry density is
decreased; however, optimum humidity is increased. In addition,
liquid limit and plastic index is decreased; however, plastic index
limit is increased. It is to be noted that results of direct shear test
reveal increasing shear strength of soil due to increasing cohesion
parameter and soil friction angle.
Abstract: Transaction management is one of the most crucial requirements for enterprise application development which often require concurrent access to distributed data shared amongst multiple application / nodes. Transactions guarantee the consistency of data records when multiple users or processes perform concurrent operations. Existing Fault Tolerance Infrastructure for Mobile Agents (FTIMA) provides a fault tolerant behavior in distributed transactions and uses multi-agent system for distributed transaction and processing. In the existing FTIMA architecture, data flows through the network and contains personal, private or confidential information. In banking transactions a minor change in the transaction can cause a great loss to the user. In this paper we have modified FTIMA architecture to ensure that the user request reaches the destination server securely and without any change. We have used triple DES for encryption/ decryption and MD5 algorithm for validity of message.
Abstract: Telecommuting has become an increasingly popular
work arrangement. However, little research has examined the impact
of telecommuting on the relationship between employees and the
organization. This study aims to shed light on this aspect by
comparing the loyalty of telecommuters and non telecommuters as it
can be viewed from three angles: organizational loyalty, peer loyalty,
and professional loyalty. Furthermore, this paper will explore the
dynamics among employee loyalty, productivity, and job
satisfaction. Whereas previous studies had looked on employees that
are not fully telecommuting, the current study concentrates on
employees that are exclusively working from home.
Abstract: In this work, we study the impact of dynamically changing link slowdowns on the stability properties of packetswitched networks under the Adversarial Queueing Theory framework. Especially, we consider the Adversarial, Quasi-Static Slowdown Queueing Theory model, where each link slowdown may take on values in the two-valued set of integers {1, D} with D > 1 which remain fixed for a long time, under a (w, p)-adversary. In this framework, we present an innovative systematic construction for the estimation of adversarial injection rate lower bounds, which, if exceeded, cause instability in networks that use the LIS (Longest-in- System) protocol for contention-resolution. In addition, we show that a network that uses the LIS protocol for contention-resolution may result in dropping its instability bound at injection rates p > 0 when the network size and the high slowdown D take large values. This is the best ever known instability lower bound for LIS networks.
Abstract: Estimation of voltage stability based on optimal
filtering method is presented. PV curve is used as a tool for voltage stability analysis. Dynamic voltage stability estimation is done by
using particle filter method. Optimum value (nose point) of PV curve can be estimated by estimating parameter of PV curve equation
optimal value represents critical voltage and
condition at specified point of measurement. Voltage stability is then estimated by analyzing loading margin condition c stimating equation. This
maximum loading
ecified dynamically.
Abstract: A steady two-dimensional magnetohydrodynamics
flow and heat transfer over a stretching vertical sheet influenced by
radiation and porosity is studied. The governing boundary layer
equations of partial differential equations are reduced to a system of
ordinary differential equations using similarity transformation. The
system is solved numerically by using a finite difference scheme
known as the Keller-box method for some values of parameters,
namely the radiation parameter N, magnetic parameter M, buoyancy
parameter l , Prandtl number Pr and permeability parameter K. The
effects of the parameters on the heat transfer characteristics are
analyzed and discussed. It is found that both the skin friction
coefficient and the local Nusselt number decrease as the magnetic
parameter M and permeability parameter K increase. Heat transfer
rate at the surface decreases as the radiation parameter increases.
Abstract: In the recent years multimedia traffic and in particular
VoIP services are growing dramatically. We present a new algorithm
to control the resource utilization and to optimize the voice codec
selection during SIP call setup on behalf of the traffic condition
estimated on the network path.
The most suitable methodologies and the tools that perform realtime
evaluation of the available bandwidth on a network path have
been integrated with our proposed algorithm: this selects the best
codec for a VoIP call in function of the instantaneous available
bandwidth on the path. The algorithm does not require any explicit
feedback from the network, and this makes it easily deployable over
the Internet. We have also performed intensive tests on real network
scenarios with a software prototype, verifying the algorithm
efficiency with different network topologies and traffic patterns
between two SIP PBXs.
The promising results obtained during the experimental validation
of the algorithm are now the basis for the extension towards a larger
set of multimedia services and the integration of our methodology
with existing PBX appliances.
Abstract: This paper aims to perform the second law analysis of
thermodynamics on the laminar film condensation of pure saturated
vapor flowing in the direction of gravity on an ellipsoid with variable
wall temperature. The analysis provides us understanding how the
geometric parameter- ellipticity and non-isothermal wall temperature
variation amplitude “A." affect entropy generation during film-wise
condensation heat transfer process. To understand of which
irreversibility involved in this condensation process, we derived an
expression for the entropy generation number in terms of ellipticity
and A. The result indicates that entropy generation increases with
ellipticity. Furthermore, the irreversibility due to finite temperature
difference heat transfer dominates over that due to condensate film
flow friction and the local entropy generation rate decreases with
increasing A in the upper half of ellipsoid. Meanwhile, the local
entropy generation rate enhances with A around the rear lower half of
ellipsoid.
Abstract: This paper presents three models which enable the
customisation of Universal Description, Discovery and Integration
(UDDI) query results, based on some pre-defined and/or real-time
changing parameters. These proposed models detail the requirements,
design and techniques which make ranking of Web service discovery
results from a service registry possible. Our contribution is two fold:
First, we present an extension to the UDDI inquiry capabilities. This
enables a private UDDI registry owner to customise or rank the query
results, based on its business requirements. Second, our proposal
utilises existing technologies and standards which require minimal
changes to existing UDDI interfaces or its data structures. We believe
these models will serve as valuable reference for enhancing the
service discovery methods within a private UDDI registry
environment.