Abstract: Dengue disease is an infectious vector-borne viral
disease that is commonly found in tropical and sub-tropical regions,
especially in urban and semi-urban areas, around the world and
including Malaysia. There is no currently available vaccine or
chemotherapy for the prevention or treatment of dengue disease.
Therefore prevention and treatment of the disease depend on vector
surveillance and control measures. Disease risk mapping has been
recognized as an important tool in the prevention and control
strategies for diseases. The choice of statistical model used for
relative risk estimation is important as a good model will
subsequently produce a good disease risk map. Therefore, the aim of
this study is to estimate the relative risk for dengue disease based
initially on the most common statistic used in disease mapping called
Standardized Morbidity Ratio (SMR) and one of the earliest
applications of Bayesian methodology called Poisson-gamma model.
This paper begins by providing a review of the SMR method, which
we then apply to dengue data of Perak, Malaysia. We then fit an
extension of the SMR method, which is the Poisson-gamma model.
Both results are displayed and compared using graph, tables and
maps. Results of the analysis shows that the latter method gives a
better relative risk estimates compared with using the SMR. The
Poisson-gamma model has been demonstrated can overcome the
problem of SMR when there is no observed dengue cases in certain
regions. However, covariate adjustment in this model is difficult and
there is no possibility for allowing spatial correlation between risks in
adjacent areas. The drawbacks of this model have motivated many
researchers to propose other alternative methods for estimating the
risk.
Abstract: A cross sectional survey design was used to collect
data from 370 diabetic patients. Two instruments were used in
obtaining data; in-depth interview guide and researchers- developed
questionnaire. Fisher's exact test was used to investigate association
between the identified factors and nonadherence. Factors identified
were: socio-demographic factors such as: gender, age, marital status,
educational level and occupation; psychosocial obstacles such as:
non-affordability of prescribed diet, frustration due to the restriction,
limited spousal support, feelings of deprivation, feeling that
temptation is inevitable, difficulty in adhering in social gatherings
and difficulty in revealing to host that one is diabetic; health care
providers obstacles were: poor attitude of health workers, irregular
diabetes education in clinics , limited number of nutrition education
sessions/ inability of the patients to estimate the desired quantity of
food, no reminder post cards or phone calls about upcoming patient
appointments and delayed start of appointment / time wasting in
clinics.
Abstract: In the Enhanced Oil Recovery (EOR) method, use of Carbon dioxide flooding whereby CO2 is injected into an oil reservoir to increase output when extracting oil resulted significant recovery worldwide. The carbon dioxide function as a pressurizing agent when mixed into the underground crude oil will reduce its viscosity and will enable a rapid oil flow. Despite the CO2’s advantage in the oil recovery, it may result to asphaltene precipitation a problem that will cause the reduction of oil produced from oil wells. In severe cases, asphaltene precipitation can cause costly blockages in oil pipes and machinery. This paper presents reviews of several studies done on mathematical modeling of asphaltene precipitation. The synthesized result from several researches done on this topic can be used as guide in order to better understand asphaltene precipitation. Likewise, this can be used as initial reference for students, and new researchers doing study on asphaltene precipitation.
Abstract: Researchers of drug-drug interaction alert systems
have often suggested that there were high overridden rate for alerts and
also too false alerts. However, research about decreasing false alerts is
scant. Therefore, the aim of this article attempts to proactive
identification of false alert for drug-drug interaction and provide
solution to decrease false alerts. This research involved retrospective
analysis prescribing database and calculated false alert rate by using
MYSQL and JAVA. Results of this study showed 17% of false alerts
and the false alert rate in the hospitals (37%) was more than in the
clinics. To conclude, this study described the importance that
drug-drug interaction alert system should not only detect drug name
but also detect frequency or route, as well as in providing solution to
decrease false alerts.
Abstract: This article illustrates a model selection management approach for virtual prototypes in interactive simulations. In those numerical simulations, the virtual prototype and its environment are modelled as a multiagent system, where every entity (prototype,human, etc.) is modelled as an agent. In particular, virtual prototyp ingagents that provide mathematical models of mechanical behaviour inform of computational methods are considered. This work argues that selection of an appropriate model in a changing environment,supported by models? characteristics, can be managed by the deter-mination a priori of specific exploitation and performance measures of virtual prototype models. As different models exist to represent a single phenomenon, it is not always possible to select the best one under all possible circumstances of the environment. Instead the most appropriate shall be selecting according to the use case. The proposed approach consists in identifying relevant metrics or indicators for each group of models (e.g. entity models, global model), formulate their qualification, analyse the performance, and apply the qualification criteria. Then, a model can be selected based on the performance prediction obtained from its qualification. The authors hope that this approach will not only help to inform engineers and researchers about another approach for selecting virtual prototype models, but also assist virtual prototype engineers in the systematic or automatic model selection.
Abstract: Environment-assisted cracking (EAC) is one of the most serious causes of structural failure over a broad range of industrial applications including offshore structures. In EAC condition there is not a definite relation such as Paris equation in Linear Elastic Fracture Mechanics (LEFM). According to studying and searching a lot what the researchers said either a material has contact with hydrogen or any other corrosive environment, phenomenon of electrical and chemical reactions of material with its environment will be happened. In the literature, there are many different works to consider fatigue crack growing and solve it but they are experimental works. Thus, in this paper, authors have an aim to evaluate mathematically the pervious works in LEFM. Obviously, if an environment is more sour and corrosive, the changes of stress intensity factor is more and the calculation of stress intensity factor is difficult. A mathematical relation to deal with the stress intensity factor during the diffusion of sour environment especially hydrogen in a marine pipeline is presented. By using this relation having and some experimental relation an analytical formulation will be presented which enables the fatigue crack growth and critical crack length under cyclic loading to be predicted. In addition, we can calculate KSCC and stress intensity factor in the pipeline caused by EAC.
Abstract: Face Recognition has always been a fascinating research area. It has drawn the attention of many researchers because of its various potential applications such as security systems, entertainment, criminal identification etc. Many supervised and unsupervised learning techniques have been reported so far. Principal Component Analysis (PCA), Self Organizing Maps (SOM) and Independent Component Analysis (ICA) are the three techniques among many others as proposed by different researchers for Face Recognition, known as the unsupervised techniques. This paper proposes integration of the two techniques, SOM and PCA, for dimensionality reduction and feature selection. Simulation results show that, though, the individual techniques SOM and PCA itself give excellent performance but the combination of these two can also be utilized for face recognition. Experimental results also indicate that for the given face database and the classifier used, SOM performs better as compared to other unsupervised learning techniques. A comparison of two proposed methodologies of SOM, Local and Global processing, shows the superiority of the later but at the cost of more computational time.
Abstract: Gated community has gained its dominant in residential areas development that it has become the standard development pattern of the newly built residential areas in contemporary China. The form of gated community has its own advantages and rationality that meet the needs of quite a lot of residents, but it-s also believed by researchers that the form has great damage to the urban morphology and development, and has a negative impact on residents- living style. However, there is still a considerable controversy of the origins and outcomes. Though recognized as a global phenomenon, gated community developed in China is greatly to do with the specific local forces, respect to the unique historical, political and socio-cultural momentums. A historical review of the traditional settlements in China and the trends that how Gated community has gained its contemporary form, is indispensable for comprehending the local forces, and provide a new perspective to solve the controversy.
Abstract: Repetitive systems stand for a kind of systems that
perform a simple task on a fixed pattern repetitively, which are
widely spread in industrial fields. Hence, many researchers have been
interested in those systems, especially in the field of iterative learning
control (ILC). In this paper, we propose a finite-horizon tracking
control scheme for linear time-varying repetitive systems with uncertain
initial conditions. The scheme is derived both analytically
and numerically for state-feedback systems and only numerically for
output-feedback systems. Then, it is extended to stable systems with
input constraints. All numerical schemes are developed in the forms
of linear matrix inequalities (LMIs). A distinguished feature of the
proposed scheme from the existing iterative learning control is that
the scheme guarantees the tracking performance exactly even under
uncertain initial conditions. The simulation results demonstrate the
good performance of the proposed scheme.
Abstract: Subsurface erosion in river banks and its details, in
spite of its occurrence in various parts of the world has rarely been
paid attention by researchers. In this paper, quantitative concept of
the subsurface bank erosion has been investigated for vertical banks.
Vertical banks were simulated experimentally by considering a sandy
erodible layer overlaid by clayey one under uniformly distributed
constant overhead pressure. Results of the experiments are indicated
that rate of sandy layer erosion is decreased by an increase in
overburden; likewise, substituting 20% of coarse (3.5 mm) sand layer
bed material by fine material (1.4 mm) may lead to a decrease in
erosion rate by one-third. This signifies the importance of the bed
material composition effect on sandy layers erosion due to subsurface
erosion in river banks.
Abstract: In recent years, everything is trending toward digitalization
and with the rapid development of the Internet technologies,
digital media needs to be transmitted conveniently over the network.
Attacks, misuse or unauthorized access of information is of great
concern today which makes the protection of documents through
digital media a priority problem. This urges us to devise new data
hiding techniques to protect and secure the data of vital significance.
In this respect, steganography often comes to the fore as a tool for
hiding information. Steganography is a process that involves hiding
a message in an appropriate carrier like image or audio. It is of
Greek origin and means "covered or hidden writing". The goal of
steganography is covert communication. Here the carrier can be sent
to a receiver without any one except the authenticated receiver only
knows existence of the information. Considerable amount of work
has been carried out by different researchers on steganography. In this
work the authors propose a novel Steganographic method for hiding
information within the spatial domain of the gray scale image. The
proposed approach works by selecting the embedding pixels using
some mathematical function and then finds the 8 neighborhood of
the each selected pixel and map each bit of the secret message in
each of the neighbor pixel coordinate position in a specified manner.
Before embedding a checking has been done to find out whether the
selected pixel or its neighbor lies at the boundary of the image or not.
This solution is independent of the nature of the data to be hidden
and produces a stego image with minimum degradation.
Abstract: Dr Eliyahu Goldratt has done the pioneering work in
the development of Theory of Constraints. Since then, many more
researchers around the globe are working to enhance this body of
knowledge. In this paper, an attempt has been made to compile the
salient features of this theory from the work done by Goldratt and
other researchers. This paper will provide a good starting point to the
potential researchers interested to work in Theory of Constraints. The
paper will also help the practicing managers by clarifying their
concepts on the theory and will facilitate its successful
implementation in their working areas.
Abstract: In the past decade, because of wide applications of
hybrid systems, many researchers have considered modeling and
control of these systems. Since switching systems constitute an
important class of hybrid systems, in this paper a method for optimal
control of linear switching systems is described. The method is also
applied on the two-tank system which is a much appropriate system
to analyze different modeling and control techniques of hybrid
systems. Simulation results show that, in this method, the goals of
control and also problem constraints can be satisfied by an
appropriate selection of cost function.