Abstract: The increasing development of wireless networks and
the widespread popularity of handheld devices such as Personal
Digital Assistants (PDAs), mobile phones and wireless tablets
represents an incredible opportunity to enable mobile devices as a
universal payment method, involving daily financial transactions.
Unfortunately, some issues hampering the widespread acceptance of
mobile payment such as accountability properties, privacy protection,
limitation of wireless network and mobile device. Recently, many
public-key cryptography based mobile payment protocol have been
proposed. However, limited capabilities of mobile devices and
wireless networks make these protocols are unsuitable for mobile
network. Moreover, these protocols were designed to preserve
traditional flow of payment data, which is vulnerable to attack and
increase the user-s risk. In this paper, we propose a private mobile
payment protocol which based on client centric model and by
employing symmetric key operations. The proposed mobile payment
protocol not only minimizes the computational operations and
communication passes between the engaging parties, but also
achieves a completely privacy protection for the payer. The future
work will concentrate on improving the verification solution to
support mobile user authentication and authorization for mobile
payment transactions.
Abstract: This study aims to initiate sustainable water management for tourist accommodations in Amphawa, Samut Songkram Province, Thailand. Wastewater generated by tourist accommodation was conducted in 10 homestays and resorts in Amphawa during August – October, 2011. The prominent parameters which are of pH, Dissolved Oxygen (DO), Biochemical Oxygen Demand (BOD), Fat Oil and Grease (FOG), Nitrate (No3-), and Phosphate (PO43-) were conducted monthly. The results revealed that some parameters were over national water quality standard (Class II). Especially, 90% of tourist accommodations have been recorded that FOG was over the standard of wastewater quality from accommodation (group I: total room of accommodation less than 200 rooms). Therefore, grease trap and natural treatment should be utilized in tourist accommodations in order to reduce the discharged of fat, oil, and grease from tourism activities. In addition, number of tourists also relate statistically with BOD and Nitrate at 0.05 level of significance.
Abstract: In recent decades, the lean methodology, and the
development of its principles and concepts have widely been applied
in supply chain management. One of the most important strategies of
being lean is having efficient inventory within the chain. On the other
hand, managing inventory efficiently requires appropriate
management of safety stock in order to protect against increasing
stretch in the breaking points of the supply chain, which in turn can
result in possible reduction of inventory. This paper applies a safety
stock cost minimization model in a manufacturing company. The
model results in optimum levels and locations of safety stock within
the company-s supply chain in order to minimize total logistics costs.
Abstract: Traditional optical networks are gradually evolving towards intelligent optical networks due to the need for faster bandwidth provisioning, protection and restoration of the network that can be accomplished with devices like optical switch, add drop multiplexer and cross connects. Since dense wavelength multiplexing forms the physical layer for intelligent optical networking, the roll of high speed all optical switch is important. This paper analyzes such an ultra-high speed polymer electro-optic switch. The performances of the 2x2 optical waveguide switch with rectangular, triangular and trapezoidal grating profiles on various device parameters are analyzed. The simulation result shows that trapezoidal grating is the optimized structure which has the coupling length of 81μm and switching voltage of 11V for the operating wavelength of 1550nm. The switching time for this proposed switch is 0.47 picosecond. This makes the proposed switch to be an important element in the intelligent optical network.
Abstract: Data mining, which is the exploration of
knowledge from the large set of data, generated as a result of
the various data processing activities. Frequent Pattern Mining
is a very important task in data mining. The previous
approaches applied to generate frequent set generally adopt
candidate generation and pruning techniques for the
satisfaction of the desired objective. This paper shows how
the different approaches achieve the objective of frequent
mining along with the complexities required to perform the
job. This paper will also look for hardware approach of cache
coherence to improve efficiency of the above process. The
process of data mining is helpful in generation of support
systems that can help in Management, Bioinformatics,
Biotechnology, Medical Science, Statistics, Mathematics,
Banking, Networking and other Computer related
applications. This paper proposes the use of both upward and
downward closure property for the extraction of frequent item
sets which reduces the total number of scans required for the
generation of Candidate Sets.
Abstract: This paper proposes an easy-to-use instruction hiding
method to protect software from malicious reverse engineering
attacks. Given a source program (original) to be protected, the
proposed method (1) takes its modified version (fake) as an input,
(2) differences in assembly code instructions between original and
fake are analyzed, and, (3) self-modification routines are introduced
so that fake instructions become correct (i.e., original instructions)
before they are executed and that they go back to fake ones after
they are executed. The proposed method can add a certain amount
of security to a program since the fake instructions in the resultant
program confuse attackers and it requires significant effort to discover
and remove all the fake instructions and self-modification routines.
Also, this method is easy to use (with little effort) because all a user
(who uses the proposed method) has to do is to prepare a fake source
code by modifying the original source code.
Abstract: The ability to detect and classify the type of fault
plays a great role in the protection of power system. This procedure
is required to be precise with no time consumption. In this paper
detection of fault type has been implemented using wavelet analysis
together with wavelet entropy principle. The simulation of power
system is carried out using PSCAD/EMTDC. Different types of
faults were studied obtaining various current waveforms. These
current waveforms were decomposed using wavelet analysis into
different approximation and details. The wavelet entropy of such
decompositions is analyzed reaching a successful methodology for
fault classification. The suggested approach is tested using different
fault types and proven successful identification for the type of fault.
Abstract: This paper applies the homotopy analysis method method to a nonlinear differential-difference equation arising in nanotechnology. Continuum hypothesis on nanoscales is invalid, and a differential-difference model is considered as an alternative approach to describing discontinued problems. Comparison of the approximate solution with the exact one reveals that the method is very effective.
Abstract: An experimental study is presented on the effect of
Conservation Agriculture (CA) compared to Conventional
Agriculture (ConvA) upon Maize Yield based on split-plot model.
Two factors have been considered: A Factor-Fertilization with two
variants: A1- N40P40 kg/ha and A2- N90P70 kg/ha; B Factor- Crop
protection with 4 variants : B1- 4 treatments, B2-3 treatments, B3- 2
treatments and B4- 1 treatment. In comparison with conventional
agriculture, CA determined lower maize yields. Fertilization is the
key factor determining a yield gain of 973.58 kg/ha in ConvA and
1,123.33 kg/ha in CA. A reduced number of treatments determined a
yield decline. The A-B interaction had a positive effect on maize
yield when a larger amount of fertilizer and 4 or 3 treatments were
applied in ConvA and a benefic in CA for highest fertilization level
and 2 treatments. The B2A2 ConvA variant was the most efficient
leading to 302.67 kg/ha gain while B3A2 CA variant brought 181.33
kg production gain.
Abstract: Propranolol is worldwide hypertension drug that is active in S-isomer. Patients must use this drug throughout their lives, and this action employsa significant level of expenditure. A simpler synthesis and lower cost can reduce the price for the patient. A sis pathway of S-propranolol starting from protection of (R,S)-propranolol with di-t-butyldicarbonate and then the product is oxidized with pyridiniumchlorochromate. The selective reduction of ketone occurrs with sodiumborohydride in the presence of metal chloride provided S-propranolol.
Abstract: As a by-product of its "cyberspace" status, electronic
commerce is global, encompassing a whole range of B2C
relationships which need to be approached with solutions provided at
a local level while remaining viable when applied to global issues.
Today, the European Union seems to be endowed with a reliable
legal framework for consumer protection. A question which remains,
however, is enforcement of this protection. This is probably a matter
of time and awareness from both parties in the B2C relationship.
Business should realize that enhancing trust in the minds of
consumers is more than a question of technology; it is a question of
best practice. Best practice starts with the online service of high
street banks as well as with the existence of a secure, user-friendly
and cost-effective payment system. It also includes the respect of
privacy and the use of smart cards as well as enhancing privacy
technologies and fair information practice. In sum, only by offering
this guarantee of privacy and security will the consumer be assured
that, in cyberspace, his/her interests will be protected in the same
manner as in a traditional commercial environment.
Abstract: The use of contour strips of perennial vegetation with
bio-fuel potential can improve surface water quality by reducing
NO3-N and sediment outflow from cropland to surface water-bodies.
It also has economic benefits of producing ethanol. In this study,
The Soil and Water Assessment Tool (SWAT) model was applied to
a watershed in Iowa, USA to examine the effectiveness of contour
strips of switch grass in reducing the NO3-N outflows from crop
fields to rivers or lakes. Numerical experiments were conducted to
identify potential subbasins in the watershed that have high water
quality impact, and to examine the effects of strip size on NO3-N
reduction under various meteorological conditions, i.e. dry, average
and wet years. Useful information was obtained for the evaluation of
economic feasibility of growing switch grass for bio-fuel in contour
strips. The results can assist in cost-benefit analysis and decisionmaking
in best management practices for environmental protection.
Abstract: On existing online shopping on the web, SSL and
password are usually used to achieve the secure trades. SSL shields
communication from the third party who is not related with the trade,
and indicates that the trader's web site is authenticated by one of the
certification authority. Password certifies a customer as the same
person who has visited the trader's web site before, and protects the
customer's privacy such as what the customer has bought on the site.
However, there is no forensics for the trades in those cased above.
With existing methods, no one can prove what is ordered by
customers, how many products are ordered and even whether
customers have ordered or not. The reason is that the third party has to
guess what were traded with logs that are held by traders and by
customers. The logs can easily be created, deleted and forged since
they are electronically stored. To enhance security with digital
forensics for electronic commerce on the web, I indicate a secure
method with cellular phones.
Abstract: Lighting is not only important for the safety of traffic,
but also it is very important for the protection of pedestrians.
Improvement on visibility in a long distance, lighting, signing,
reduces considerably the risk of accidents in crosswalks. This paper
evaluates different aspects of crosswalks including signing and
lighting to improve road safety.
Abstract: Protection of slope and embankment from erosion has
become an important issue in Bangladesh. The constructions of
strong structures require large capital, integrated designing, high
maintenance cost. Strong structure methods have negative impact on
the environment and sometimes not function for the design period.
Plantation of vetiver system along the slopes is an alternative
solution. Vetiver not only serves the purpose of slope protection but
also adds green environment reducing pollution. Vetiver is available
in almost all the districts of Bangladesh. This paper presents the
application of vetiver system with geo-jute, for slope protection and
erosion control of embankments and slopes. In-situ shear tests have
been conducted on vetiver rooted soil system to find the shear
strength. The shear strength and effective soil cohesion of vetiver
rooted soil matrix are respectively 2.0 times and 2.1 times higher than
that of the bared soil. Similar trends have been found in direct shear
tests conducted on laboratory reconstituted samples. Field trials have
been conducted in road embankment and slope protection with
vetiver at different sites. During the time of vetiver root growth the
soil protection has been accomplished by geo-jute. As the geo-jute
degrades with time, vetiver roots grow and take over the function of
geo-jutes. Slope stability analyses showed that vegetation increase
the factor of safety significantly.
Abstract: This paper presents a new approach for the protection
of Thyristor-Controlled Series Compensator (TCSC) line using
Support Vector Machine (SVM). One SVM is trained for fault
classification and another for section identification. This method use
three phase current measurement that results in better speed and
accuracy than other SVM based methods which used single phase
current measurement. This makes it suitable for real-time protection.
The method was tested on 10,000 data instances with a very wide
variation in system conditions such as compensation level, source
impedance, location of fault, fault inception angle, load angle at
source bus and fault resistance. The proposed method requires only
local current measurement.
Abstract: Image watermarking has become an important tool for
intellectual property protection and authentication. In this paper a
watermarking technique is suggested that incorporates two
watermarks in a host image for improved protection and robustness.
A watermark, in form of a PN sequence (will be called the secondary
watermark), is embedded in the wavelet domain of a primary
watermark before being embedded in the host image. The technique
has been tested using Lena image as a host and the camera man as
the primary watermark. The embedded PN sequence was detectable
through correlation among other five sequences where a PSNR of
44.1065 dB was measured. Furthermore, to test the robustness of the
technique, the watermarked image was exposed to four types of
attacks, namely compression, low pass filtering, salt and pepper noise
and luminance change. In all cases the secondary watermark was
easy to detect even when the primary one is severely distorted.
Abstract: A submerged horizontal plate type breakwater is
pointed out as an efficient wave protection device for cage culture in
marine fishery. In order to reveal the wave elimination principle of this
type breakwater, boundary element method is utilized to investigate
this problem. The flow field and the trajectory of water particles are
studied carefully. The flow field analysis shows that: the interaction of
incident wave and adverse current above the plate disturbs the water
domain drastically. This can slow down the horizontal velocity and
vertical velocity of the water particles.
Abstract: The adverse effects of Clindamycin (Clind.) /
Ibuprofen (Ibu.) combination on liver, kidney, blood elements and the
significances of antioxidants (N-acetylcysteine and Zinc) against
these effects were evaluated. The study includes: Group I; control
n=30, Group II; patients on Clind.300mg/Ibu.400mg twice daily for a
week n=30, Group III; patients on Clind.300mg/Ibu.400mg+Nacetylcysteine
200mg twice daily for a week n=15 and Group IV;
patients on Clind.300mg/Ibu.400mg+Zinc50mg twice daily for a
week n=15. Serum malondialdehyde (MDA), alanine transferase
(ALT), aspartate transferase (AST), γ glutamyl transferase (GGT),
creatinine, blood urea nitrogen (BUN) were measured. Applying one
way ANOVA followed by Tuckey Kramer post test, Group II showed
significant increase in ALT, AST, GGT, BUN and decrease in Hb,
RBCs, platelets than Group I. Group III showed significant decrease
in ALT, AST, GGT, BUN than Group II. Moreover, Group IV
showed significant decrease in ALT, AST, GGT and increase in Hb,
RBCs, and platelets than Group II. Conclusively, Adding Zinc or Nacetylcysteine
buffer the oxidative stress and improve the therapeutic
outcome of Clindamycin/Ibuprofen combination.
Abstract: Here we report on the utilization of Laser-Induced
Breakdown Spectroscopy (LIBS) for determination of Quantum Dots
(QDs) in liquid solution. The process of optimization of experimental
conditions from choosing the carrier medium to application of colloid
QDs is described. The main goal was to get the best possible signal to
noise ratio.
The results obtained from the measurements confirmed the capability
of LIBS technique for qualitative and afterwards quantitative
determination of QDs in liquid solution.