Abstract: Plastic waste is a big issue in Thailand, but the amount of recycled plastic in Thailand is still low due to the high investment and operating cost. Hence, the rest of plastic waste are burnt to destroy or sent to the landfills. In order to be financial viable, an effective reverse logistics infrastructure is required to support the product recovery activities. However, there is a conflict between reducing the cost and raising environmental protection level. The purpose of this study is to build a goal programming (GP) so that it can be used to help analyze the proper planning of the Thailand-s plastic recycling system that involves multiple objectives. This study considers three objectives; reducing total cost, increasing the amount of plastic recovery, and raising the desired plastic materials in recycling process. The results from two priority structures show that it is necessary to raise the total cost budget in order to achieve targets on amount of recycled plastic and desired plastic materials.
Abstract: This study was conducted to investigate the incidence
of pathogenic bacteria: Salmonella, Shigella, Escherichia coli O157
and Staphylococcus aureus in cakes and tarts collected from thirtyfive
confectionery producing and selling premises located within
Tripoli city, Libya. The results revealed an incidence of S. aureus
with 94.4 and 48.0 %, E. coli O157 with 14.7 and 4.0 % and Salmonella
sp. with 5.9 and 8.0 % in cakes and tarts samples respectively;
while Shigella was not detected in all samples. In order to determine
the source of these pathogenic bacteria, cotton swabs were taken
from the hands of workers on the production line, the surfaces of
preparation tables and cream whipping instruments. The results
showed that the cotton swabs obtained from the hands of workers
contained S. aureus and Salmonella sp. with an incidence of 42.9 and
2.9 %, the cotton swabs obtained from the surfaces of preparation
tables 22.9 and 2.9 % and the cotton swabs obtained from the cream
whipping instruments 14.3 and 0.0 % respectively; while E. coli
O157 and Shigella sp. were not detected in all swabs. Additionally,
other bacteria were isolated from the hands of workers and the Surfaces
of producing equipments included: Aeromonas sp., Pseudomonas
sp., E. coli, Klebsiella sp., Enterobacter sp., Citrobacter sp.,
Proteus sp., Serratia sp. and Acinetobacter sp. These results indicate
that some of the cakes and tarts might pose threat to consumer's
health. Meanwhile, occurrences of pathogenic bacteria on the hands
of those who are working in production line and the surfaces of
equipments reflect poor hygienic practices at most confectionery
premises examined in this study. Thus, firm and continuous surveillance
of these premises is needed to insure the consumer's health and
safety.
Abstract: Mobile IPv6 (MIPv6) describes how mobile node can change its point of attachment from one access router to another. As a demand for wireless mobile devices increases, many enhancements for macro-mobility (inter-domain) protocols have been proposed, designed and implemented in Mobile IPv6. Hierarchical Mobile IPv6 (HMIPv6) is one of them that is designed to reduce the amount of signaling required and to improve handover speed for mobile connections. This is achieved by introducing a new network entity called Mobility Anchor Point (MAP). This report presents a comparative study of the Hierarchical Mobility IPv6 and Mobile IPv6 protocols and we have narrowed down the scope to micro-mobility (intra-domain). The architecture and operation of each protocol is studied and they are evaluated based on the Quality of Service (QoS) parameter; handover latency. The simulation was carried out by using the Network Simulator-2. The outcome from this simulation has been discussed. From the results, it shows that, HMIPv6 performs best under intra-domain mobility compared to MIPv6. The MIPv6 suffers large handover latency. As enhancement we proposed to HMIPv6 to locate the MAP to be in the middle of the domain with respect to all Access Routers. That gives approximately same distance between MAP and Mobile Node (MN) regardless of the new location of MN, and possible shorter distance. This will reduce the delay since the distance is shorter. As a future work performance analysis is to be carried for the proposed HMIPv6 and compared to HMIPv6.
Abstract: Risk of infectious disease outbreaks is related to the
hygiene among the population. To assess the actual risks and modify
the relevant emergency procedures if necessary, a hygiene survey
was conducted among undergraduate students on the Rhodes
University campus. Soap was available to 10.5% and only 26.8% of
the study participants followed proper hygiene in relation to food
consumption. This combination increases the risk of infectious
disease outbreaks at the campus. Around 83.6% were willing to wash
their hands if soap was provided. Procurement and availability of
soap in undergraduate residences on campus should be improved, as
the total cost is estimated at only 2000 USD per annum. Awareness
campaigns about food-related hygiene and the need for regular handwashing
with soap should be run among Rhodes University students.
If successful, rates of respiratory and hygiene-related diseases will be
decreased and emergency health management simplified.
Abstract: In the current research, neuro-fuzzy model and regression model was developed to predict Material Removal Rate in Electrical Discharge Machining process for AISI D2 tool steel with copper electrode. Extensive experiments were conducted with various levels of discharge current, pulse duration and duty cycle. The experimental data are split into two sets, one for training and the other for validation of the model. The training data were used to develop the above models and the test data, which was not used earlier to develop these models were used for validation the models. Subsequently, the models are compared. It was found that the predicted and experimental results were in good agreement and the coefficients of correlation were found to be 0.999 and 0.974 for neuro fuzzy and regression model respectively
Abstract: The research study evaluated the performance of
irrigation system by using special scientific tools like Remote
Sensing and GIS technology, so that proper measurements could be
taken for the sustainable agriculture and water management.
Different performance evaluation parameters had been calculated for
the purposed data was gathered from field investigation and different
government and private organizations. According to the calculations,
organic matter ranges from 0.19% (low value) to 0.76% (high value).
In flat irrigation system for wheat yield ranges from 3347.16 to
5260.39 kg/ha, while the total water applied to wheat crop ranges
from 252.94 to 279.19 mm and WUE ranges from 13.07 to 18.37
kg/ha/mm. For rice yield ranges from 3347.47 to 5433.07 kg/ha with
total water supplied to rice crop ranges from 764.71 to 978.15 mm
and WUE ranges from 3.49 to 5.71 kg/ha/mm. Similarly, in raised
bed system wheat yield ranges from 4569.13 to 6008.60 kg/ha, total
water supplied ranges from 158.87 to 185.09 mm and WUE ranges
from 27.20 to 33.54 kg/ha/mm while in rice crop, yield ranges from
5285.04 to 6716.69 kg/ha, total water supplied ranges from 600.72 to
755.06 mm and WUE ranges from 6.41 to 10.05 kg/ha/mm. Almost
51.3% water saving is observed in bed irrigation system as compared
to flat system. Less water supplied to beds is more affective as its
WUE value is higher than flat system where more water is supplied
in both the seasons. Similarly, RWS values show that maximum
water deficit while minimum area is getting adequate water supply.
Greater yield is recorded in bed system as plant per square meter is
more in bed system in comparison of flat system Thus, the integration
of GIS tools to regularly compute performance indices could provide
irrigation managers with the means for managing efficiently the
irrigation system.
Abstract: Snake bite cases in Malaysia most often involve the
species Naja-naja and Calloselasma rhodostoma. In keeping with the
need for a rapid snake venom detection kit in a clinical setting, plate
and dot-ELISA test for the venoms of Naja-naja sumatrana,
Calloselasma rhodostoma and the cobra venom fraction V antigen
was developed. Polyclonal antibodies were raised and further used to
prepare the reagents for the dot-ELISA test kit which was tested in
mice, rabbit and virtual human models. The newly developed dot-
ELISA kit was able to detect a minimum venom concentration of
244ng/ml with cross reactivity of one antibody type. The dot-ELISA
system was sensitive and specific for all three snake venom types in
all tested animal models. The lowest minimum venom concentration
detectable was in the rabbit model, 244ng/ml of the cobra venom
fraction V antigen. The highest minimum venom concentration was
in mice, 1953ng/ml against a multitude of venoms. The developed
dot-ELISA system for the detection of three snake venom types was
successful with a sensitivity of 95.8% and specificity of 97.9%.
Abstract: This paper simulates the ad-hoc mesh network in rural areas, where such networks receive great attention due to their cost, since installing the infrastructure for regular networks in these areas is not possible due to the high cost. The distance between the communicating nodes is the most obstacles that the ad-hoc mesh network will face. For example, in Terranet technology, two nodes can communicate if they are only one kilometer far from each other. However, if the distance between them is more than one kilometer, then each node in the ad-hoc mesh networks has to act as a router that forwards the data it receives to other nodes. In this paper, we try to find the critical number of nodes which makes the network fully connected in a particular area, and then propose a method to enhance the intermediate node to accept to be a router to forward the data from the sender to the receiver. Much work was done on technological changes on peer to peer networks, but the focus of this paper will be on another feature which is to find the minimum number of nodes needed for a particular area to be fully connected and then to enhance the users to switch on their phones and accept to work as a router for other nodes. Our method raises the successful calls to 81.5% out of 100% attempt calls.
Abstract: Many IT projects come to failure because of having
technical approach, focusing on the final product and lack of proper
attention to strategic alignment. Project management models quite
often have technical management view [4], [8], [13], [14]. These
models focus greatly on the finalization of the project product and the
delivery of the product to the customer. However, many project
problems are due to lack of attention to the needs and capabilities of
the organizations or disregarding how to deploy and use the product
in the organization. In this regard, in the current research we are
trying to present a solution with the purpose of raising the value of
the project in an organization. This way, the project outputs will be
properly deployed in the organization. Therefore, a comprehensive
model is presented which takes into account the whole processes
from initial step of project definition to the deployment of the final
outputs in the organization and then the definition of all roles and
responsibilities to put the model into practice. Taking into account
the opinions of experts and project managers, to prove the
performance of the model, the project problems were recognized and
based on the model, categorized and analyzed. And at the end it is
made clear that ignoring the proper definition of the project and not
having a proper understanding of the expected value on the one hand
and not supervising the emerged value in the process of production
and installment are among the most important factors that bring a
project to failure.
Abstract: The increase in energy demand has raised concerns
over adverse impacts on the environment from energy generation. It
is important to understand the status of energy consumption for
institutions such as Curtin Sarawak to ensure the sustainability of
energy usage, and also to reduce its costs. In this study, a preliminary
audit framework was developed and was conducted around the
Malaysian campus to obtain information such as the number and
specifications of electrical appliances, built-up area and ambient
temperature to understand the relationship of these factors with
energy consumption. It was found that the number and types of
electrical appliances, population and activities in the campus
impacted the energy consumption of Curtin Sarawak directly.
However, the built-up area and ambient temperature showed no clear
correlation with energy consumption. An investigation of the diurnal
and seasonal energy consumption of the campus was also carried out.
From the data, recommendations were made to improve the energy
efficiency of the campus.
Abstract: In this paper, we propose a novel adaptive voltage control strategy for boost converter via Inverse LQ Servo-Control. Our presented strategy is based on an analytical formula of Inverse Linear Quadratic (ILQ) design method, which is not necessary to solve Riccati’s equation directly. The optimal and adaptive controller of the voltage control system is designed. The stability and the robust control are analyzed. Whereas, we can get the analytical solution for the optimal and robust voltage control is achieved through the natural angular velocity within a single parameter and we can change the responses easily via the ILQ control theory. Our method provides effective results as the stable responses and the response times are not drifted even if the condition is changed widely.
Abstract: This paper focuses on a technique for identifying the geological boundary of the ground strata in front of a tunnel excavation site using the first order adjoint method based on the optimal control theory. The geological boundary is defined as the boundary which is different layers of elastic modulus. At tunnel excavations, it is important to presume the ground situation ahead of the cutting face beforehand. Excavating into weak strata or fault fracture zones may cause extension of the construction work and human suffering. A theory for determining the geological boundary of the ground in a numerical manner is investigated, employing excavating blasts and its vibration waves as the observation references. According to the optimal control theory, the performance function described by the square sum of the residuals between computed and observed velocities is minimized. The boundary layer is determined by minimizing the performance function. The elastic analysis governed by the Navier equation is carried out, assuming the ground as an elastic body with linear viscous damping. To identify the boundary, the gradient of the performance function with respect to the geological boundary can be calculated using the adjoint equation. The weighed gradient method is effectively applied to the minimization algorithm. To solve the governing and adjoint equations, the Galerkin finite element method and the average acceleration method are employed for the spatial and temporal discretizations, respectively. Based on the method presented in this paper, the different boundary of three strata can be identified. For the numerical studies, the Suemune tunnel excavation site is employed. At first, the blasting force is identified in order to perform the accuracy improvement of analysis. We identify the geological boundary after the estimation of blasting force. With this identification procedure, the numerical analysis results which almost correspond with the observation data were provided.
Abstract: The scientific achievements coming from molecular
biology depend greatly on the capability of computational
applications to analyze the laboratorial results. A comprehensive
analysis of an experiment requires typically the simultaneous study
of the obtained dataset with data that is available in several distinct
public databases. Nevertheless, developing a centralized access to
these distributed databases rises up a set of challenges such as: what
is the best integration strategy, how to solve nomenclature clashes,
how to solve database overlapping data and how to deal with huge
datasets. In this paper we present GeNS, a system that uses a simple and yet innovative approach to address several biological data integration issues. Compared with existing systems, the main
advantages of GeNS are related to its maintenance simplicity and to its coverage and scalability, in terms of number of supported
databases and data types. To support our claims we present the current use of GeNS in two concrete applications. GeNS currently contains more than 140 million of biological relations and it can be
publicly downloaded or remotely access through SOAP web services.
Abstract: The objective of present work is to stimulate the
machining of material by electrical discharge machining (EDM) to
give effect of input parameters like discharge current (Ip), pulse on
time (Ton), pulse off time (Toff) which can bring about changes in the
output parameter, i.e. material removal rate. Experimental data was
gathered from die sinking EDM process using copper electrode and
Medium Carbon Steel (AISI 1040) as work-piece. The rules of
membership function (MF) and the degree of closeness to the
optimum value of the MMR are within the upper and lower range of
the process parameters. It was found that proposed fuzzy model is in
close agreement with the experimental results. By Intelligent, model
based design and control of EDM process parameters in this study
will help to enable dramatically decreased product and process
development cycle times.
Abstract: Newcastle Disease Virus (NDV), an avian
paramyxovirus, is a highly contagious, generalised virus disease of
domestic poultry and wild birds characterized by gastro-intestinal,
respiratory and nervous signs. In this study, it was shown that NDV
strain AF2240 and V4-UPM are cytolytic to Human Promyelocytic
Leukemia, HL60 and Human T-lymphoblastic Leukemia, CEM-SS
cells. Results from MTT cytolytic assay showed that CD50 for NDV
AF2240 against HL60 was 130 HAU and NDV V4-UPM against
HL60 and CEM-SS were 110.6 and 150.9 HAU respectively.
Besides, both strains were found to inhibit the proliferation of cells in
a dose dependent manner. The mode of cell death either by apoptosis
or necrosis was further analyzed using acridine orange and propidium
iodide (AO/PI) staining. Our results showed that both NDV strains
induced primarily apoptosis in treated cells at CD50 concentration. In
conclusion, both NDV strains caused cytolytic effects primarily via
apoptosis in leukemia cells.
Abstract: Location-based services (LBS) exploit the known
location of a user to provide services dependent on their geographic
context and personalized needs [1].
The development and arrival of broadband mobile data networks
supported with mobile terminals equipped with new location
technologies like GPS have finally created opportunities for
implementation of LBS applications. But, from the other side,
collecting location information data in general raises privacy
concerns.
This paper presents results from two surveys of LBS acceptance in
Croatia. The first survey was administered on 181 students, and the
second extended survey involved pattern of 180 Croatian citizens.
We developed questionnaire which consists of descriptions of 15
different applications with scale which measures perceptions and
attitudes of users towards these applications.
We report the results to identify potential commercial applications
for LBS in B2C segment. Our findings suggest that some types of
applications like emergency&safety services and navigation have
significantly higher rate of acceptance than other types.
Abstract: Ants are fascinating creatures that demonstrate the
ability to find food and bring it back to their nest. Their ability as a
colony, to find paths to food sources has inspired the development of
algorithms known as Ant Colony Systems (ACS). The principle of
cooperation forms the backbone of such algorithms, commonly used
to find solutions to problems such as the Traveling Salesman
Problem (TSP). Ants communicate to each other through chemical
substances called pheromones. Modeling individual ants- ability to
manipulate this substance can help an ACS find the best solution.
This paper introduces a Dynamic Ant Colony System with threelevel
updates (DACS3) that enhance an existing ACS. Experiments
were conducted to observe single ant behavior in a colony of
Malaysian House Red Ants. Such behavior was incorporated into the
DACS3 algorithm. We benchmark the performance of DACS3 versus
DACS on TSP instances ranging from 14 to 100 cities. The result
shows that the DACS3 algorithm can achieve shorter distance in
most cases and also performs considerably faster than DACS.
Abstract: In this paper we analyze the application of a formal proof system to the discrete logarithm problem used in publickey cryptography. That means, we explore a computer verification of the ElGamal encryption scheme with the formal proof system Isabelle/HOL. More precisely, the functional correctness of this algorithm is formally verified with computer support. Besides, we present a formalization of the DSA signature scheme in the Isabelle/HOL system. We show that this scheme is correct what is a necessary condition for the usefulness of any cryptographic signature scheme.
Abstract: Medical images require special safety and confidentiality because critical judgment is done on the information provided by medical images. Transmission of medical image via internet or mobile phones demands strong security and copyright protection in telemedicine applications. Here, highly secured and robust watermarking technique is proposed for transmission of image data via internet and mobile phones. The Region of Interest (ROI) and Non Region of Interest (RONI) of medical image are separated. Only RONI is used for watermark embedding. This technique results in exact recovery of watermark with standard medical database images of size 512x512, giving 'correlation factor' equals to 1. The correlation factor for different attacks like noise addition, filtering, rotation and compression ranges from 0.90 to 0.95. The PSNR with weighting factor 0.02 is up to 48.53 dBs. The presented scheme is non blind and embeds hospital logo of 64x64 size.
Abstract: The objective of this research is to investigate the
advantages of using large-diameter 0.7 inch prestressing strands in
pretention applications. The advantages of large-diameter strands are
mainly beneficial in the heavy construction applications. Bridges and
tunnels are subjected to a higher daily traffic with an exponential
increase in trucks ultimate weight, which raise the demand for higher
structural capacity of bridges and tunnels. In this research, precast
prestressed I-girders were considered as a case study. Flexure
capacities of girders fabricated using 0.7 inch strands and different
concrete strengths were calculated and compared to capacities of 0.6
inch strands girders fabricated using equivalent concrete strength.
The effect of bridge deck concrete strength on composite deck-girder
section capacity was investigated due to its possible effect on final
section capacity. Finally, a comparison was made to compare the
bridge cross-section of girders designed using regular 0.6 inch strands
and the large-diameter 0.7 inch. The research findings showed that
structural advantages of 0.7 inch strands allow for using fewer bridge
girders, reduced material quantity, and light-weight members. The
structural advantages of 0.7 inch strands are maximized when high
strength concrete (HSC) are used in girder fabrication, and concrete
of minimum 5ksi compressive strength is used in pouring bridge
decks. The use of 0.7 inch strands in bridge industry can partially
contribute to the improvement of bridge conditions, minimize
construction cost, and reduce the construction duration of the project.