Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24

Search results for: Azrin Esmady Ariffin

24 Prediction of Changes in Optical Quality by Tissue Redness after Pterygium Surgery

Authors: Mohd Radzi Hilmi, Mohd Zulfaezal Che Azemin, Khairidzan Mohd Kamal, Azrin Esmady Ariffin, Mohd Izzuddin Mohd Tamrin, Norfazrina Abdul Gaffur, Tengku Mohd Tengku Sembok

Abstract:

Purpose: The purpose of this study is to predict optical quality changes after pterygium surgery using tissue redness grading. Methods: Sixty-eight primary pterygium participants were selected from patients who visited an ophthalmology clinic. We developed a semi-automated computer program to measure the pterygium fibrovascular redness from digital pterygium images. The outcome of this software is a continuous scale grading of 1 (minimum redness) to 3 (maximum redness). The region of interest (ROI) was selected manually using the software. Reliability was determined by repeat grading of all 68 images and its association with contrast sensitivity function (CSF) and visual acuity (VA) was examined. Results: The mean and standard deviation of redness of the pterygium fibrovascular images was 1.88 ± 0.55. Intra- and inter-grader reliability estimates were high with intraclass correlation ranging from 0.97 to 0.98. The new grading was positively associated with CSF (p<0.01) and VA (p<0.01). The redness grading was able to predict 25% and 23% of the variance in the CSF and the VA respectively. Conclusions: The new grading of pterygium fibrovascular redness can be reliably measured from digital images and show a good correlation with CSF and VA. The redness grading can be used in addition to the existing pterygium grading.

Keywords: contrast sensitivity, pterygium, redness, visual acuity

Procedia PDF Downloads 410
23 Comparison of Corneal Curvature Measurements Conducted with Tomey AO-2000® and the Current Standard Biometer IOL Master®

Authors: Mohd Radzi Hilmi, Khairidzan Mohd Kamal, Che Azemin Mohd Zulfaezal, Ariffin Azrin Esmady

Abstract:

Purpose: Corneal curvature (CC) is an important anterior segment parameter. This study compared CC measurements conducted with two optical devices in phakic eyes. Methods: Sixty phakic eyes of 30 patients were enrolled in this study. CC was measured three times with the optical biometer and topography-keratometer Tomey AO-2000 (Tomey Corporation, Nagoya, Japan), then with the standard partial optical coherence interferometry (PCI) IOL Master (Carl Zeiss Meditec, Dublin, CA) and data were statistically analysed. Results: The measurements resulted in a mean CC of 43.86 ± 1.57 D with Tomey AO-2000 and 43.84 ± 1.55 D with IOL Master. Distribution of data is normal, and no significance difference in CC values was detected (P = 0.952) between the two devices. Correlation between CC measurements was highly significant (r = 0. 99; P < 0.0001). The mean difference of CC values between devices was 0.017 D and 95% limit of agreement was -0.088 to 0.12. Duration taken for measurements with the standard biometer IOL Master was longer (55.17 ± 2.24 seconds) than with Tomey AO-2000 (39.88 ± 2.38 seconds) in automatic mode. Duration of manual measurement with Tomey AO-2000 in manual mode was the shortest (28.57 ± 2.71 seconds). Conclusion: In phakic eyes, CC measured with Tomey AO-2000 and IOL Master showed similar values, and high correlation was observed between these two devices. This shows that both devices can be used interchangeably. Tomey AO-2000 is better in terms of faster to operate and has its own topography systems.

Keywords: corneal topography, corneal curvature, IOL Master, Tomey AO2000

Procedia PDF Downloads 304
22 Overcoming 4-to-1 Decryption Failure of the Rabin Cryptosystem

Authors: Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah

Abstract:

The square root modulo problem is a known primitive in designing an asymmetric cryptosystem. It was first attempted by Rabin. Decryption failure of the Rabin cryptosystem caused by the 4-to-1 decryption output is overcome efficiently in this work. The proposed scheme to overcome the decryption failure issue (known as the AAβ-cryptosystem) is constructed using a simple mathematical structure, it has low computational requirements and would enable communication devices with low computing power to deploy secure communication procedures efficiently.

Keywords: Rabin cryptosystem, 4-to-1 decryption failure, square root modulo problem, integer factorization problem

Procedia PDF Downloads 337
21 Planning for a Sustainable Islamic City in Malaysia

Authors: Mohd Yazid M. Yunos, R. Arinah, Nor Kalsum M. Isa, U. Nangkula, Nor A. Ismail, Nor F. Ariffin

Abstract:

Islamic City planning is a concept of optimizing the overall arrangement of land use without compromising community. The concept was influenced by the specific intentions in mind, applying certain ideological principles and objectives rooted in Islamic faith and Muslim culture using distinct design elements. Holy Quran and hadiths provide a foundation for understanding Islamic Principles as clearly shared by the established Islamic Cities such as Medina, Mecca and Jerusalem. This paper aimed to explore the principles and elements of an Islamic City through the review of relevant literature by the means of Content Analysis method. A theoretical framework of Islamic City Principles was then formulated to be the main outcome of the study. The finding is very important to be a useful starting point for future study, especially for formulating a clear guide for the development of upcoming Islamic City in Malaysia.

Keywords: Islamic principles, sustainable city planning, Islamic city, Malaysia

Procedia PDF Downloads 439
20 Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis

Authors: Yunos Zahri, Ariffin Aswami

Abstract:

Cyber terrorism represents the convergence of two worlds: virtual and physical. The virtual world is a place in which computer programs function and data move, whereas the physical world is where people live and function. The merging of these two domains is the interface being targeted in the incidence of cyber terrorism. To better understand why cyber terrorism acts are committed, this study presents the context of cyber terrorism from motivational perspectives. Motivational forces behind cyber terrorism can be social, political, ideological and economic. In this research, data are analyzed using a qualitative method. A semi-structured interview with purposive sampling was used for data collection. With the growing interconnectedness between critical infrastructures and Information & Communication Technology (ICT), selecting targets that facilitate maximum disruption can significantly influence terrorists. This work provides a baseline for defining the concept of cyber terrorism from motivational perspectives.

Keywords: cyber terrorism, terrorism, motivation, qualitative analysis

Procedia PDF Downloads 296
19 Simulation the Stress Distribution of Wheel/Rail at Contact Region

Authors: Norie A. Akeel, Z. Sajuri, A. K. Ariffin

Abstract:

This paper discusses the effect of different loading analysis on crack initiation life of wheel/rail in the contact region. A simulated three dimensional (3D) elasto plastic model of a wheel/rail contact is modeled using the fine mesh technique in the contact region by using Finite Element Method FEM code ANSYS 11.0 software. Different loads of approximately from 70 to 140 KN was applied on the wheel tread through the running surface on the railhead surface to simulate stress distribution (Von Mises) and a life prediction of the crack initiation under rolling contact motion. Stress analysis is achieved and the fatigue life to the rail head surface is calculated numerically by using a multi-axial fatigue life of crack initiation model. All results obtained from the previous researches are compared with this research.

Keywords: FEM, rolling contact, rail track, stress distribution, fatigue life

Procedia PDF Downloads 441
18 Social Network Impact on Self Learning in Teaching and Learning in UPSI (Universiti Pendidikan Sultan Idris)

Authors: Azli Bin Ariffin, Noor Amy Afiza Binti Mohd Yusof

Abstract:

This study aims to identify effect of social network usage on the self-learning method in teaching and learning at Sultan Idris Education University. The study involved 270 respondents consisting of students in the pre-graduate and post-graduate levels from nine fields of study offered. Assessment instrument used is questionnaire which measures respondent’s background includes level of study, years of study and field of study. Also measured the extent to which social pages used for self-learning and effect received when using social network for self-learning in learning process. The results of the study showed that students always visit Facebook more than other social sites. But, it is not for the purpose of self-learning. Analyzed data showed that 45.5% students not sure about using social sites for self-learning. But they realize the positive effect that they will received when use social sites for self-learning to improve teaching and learning process when 72.7% respondent agreed with all the statements provided.

Keywords: facebook, self-learning, social network, teaching, learning

Procedia PDF Downloads 426
17 Expert Review on Conceptual Design Model of Assistive Courseware for Low Vision (AC4LV) Learners

Authors: Nurulnadwan Aziz, Ariffin Abdul Mutalib, Siti Mahfuzah Sarif

Abstract:

This paper reports an ongoing project regarding the development of Conceptual Design Model of Assistive Courseware for Low Vision (AC4LV) learners. Having developed the intended model, it has to be validated prior to producing it as guidance for the developers to develop an AC4LV. This study requires two phases of validation process which are through expert review and prototyping method. This paper presents a part of the validation process which is findings from experts review on Conceptual Design Model of AC4LV which has been carried out through a questionnaire. Results from 12 international and local experts from various respectable fields in Human-Computer Interaction (HCI) were discussed and justified. In a nutshell, reviewed Conceptual Design Model of AC4LV was formed. Future works of this study are to validate the reviewed model through prototyping method prior to testing it to the targeted users.

Keywords: assistive courseware, conceptual design model, expert review, low vision learners

Procedia PDF Downloads 462
16 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 200
15 Heat Transfer and Turbulent Fluid Flow over Vertical Double Forward-Facing Step

Authors: Tuqa Abdulrazzaq, Hussein Togun, M. K. A. Ariffin, S. N. Kazi, A. Badarudin, N. M. Adam, S. Masuri

Abstract:

Numerical study of heat transfer and fluid flow over vertical double forward facing step were presented. The k-w model with finite volume method was employed to solve continuity, momentum, and energy equations. Different step heights were adopted for range of Reynolds number varied from 10000 to 40000, and range of temperature varied from 310K to 340 K. The straight side of duct is insulated while the side of double forward facing step is heated. The result shows augmentation of heat transfer due to the recirculation region created after and before steps. Effect of step length and Reynolds number observed on increase of local Nusselt number particularly at recirculation regions. Contour of streamline velocity is plotted to show recirculation regions after and before steps. Numerical simulation in this paper done by used ANSYS Fluent 14.

Keywords: turbulent flow, double forward, heat transfer, separation flow

Procedia PDF Downloads 396
14 Enzymatic Synthesis of Olive-Based Ferulate Esters: Optimization by Response Surface Methodology

Authors: S. Mat Radzi, N. J. Abd Rahman, H. Mohd Noor, N. Ariffin

Abstract:

Ferulic acid has widespread industrial potential by virtue of its antioxidant properties. However, it is partially soluble in aqueous media, limiting their usefulness in oil-based processes in food, cosmetic, pharmaceutical, and material industry. Therefore, modification of ferulic acid should be made by producing of more lipophilic derivatives. In this study, a preliminary investigation of lipase-catalyzed trans-esterification reaction of ethyl ferulate and olive oil was investigated. The reaction was catalyzed by immobilized lipase from Candida antarctica (Novozym 435), to produce ferulate ester, a sunscreen agent. A statistical approach of Response surface methodology (RSM) was used to evaluate the interactive effects of reaction temperature (40-80°C), reaction time (4-12 hours), and amount of enzyme (0.1-0.5 g). The optimum conditions derived via RSM were reaction temperature 60°C, reaction time 2.34 hours, and amount of enzyme 0.3 g. The actual experimental yield was 59.6% ferulate ester under optimum condition, which compared well to the maximum predicted value of 58.0%.

Keywords: ferulic acid, enzymatic synthesis, esters, RSM

Procedia PDF Downloads 265
13 Changes in Religious Belief after Flood Disasters

Authors: Sapora Sipon, Mohd Fo’ad Sakdan, Che Su Mustaffa, Najib Ahmad Marzuki, Mohamad Sukeri Khalid, Mohd Taib Ariffin, Husni Mohd Radzi, Salhah Abdullah

Abstract:

Flood disasters occur throughout the world including Malaysia. The major flood disaster that hit Malaysia in the 2014-2015 episodes proved the psychosocial and mental health consequences such as vivid images of destruction, upheaval, death and loss of lives. Flood, flood survivors reported that flood has changed one looks at their religious belief. The main objective of this paper is to investigate the changes in religious belief after the 2014-2015 Malaysia flood disaster. The total population of 1300 respondents who experienced the 2014-2015 Malaysia flood were surveyed a month after the disaster. The questionnaires were used to measure religiosity and stress. The results provide compelling evidence that religion played an important role in the lives of Malaysia flood disasters’ survivor where more than half of the respondents (>75%) experiencing the strengthening of their religious belief. It was also reported the victims’ strengthening of their religious belief proved to be a powerful factor in reducing stress in the aftermath of the flood.

Keywords: religious belief, flood disaster, humanity, society

Procedia PDF Downloads 315
12 Development of Risk-Based Decision-Making Framework for Batu Dam, Malaysia

Authors: Wan Noorul Hafilah Wan Ariffin, Lariyah Sidek, Marufuzzaman Mohammad , Hidayah Basri, Nor Hisham M. Ghazali, Md. Nasir Md. Noh, Mohd Azmi Ismai, Adrian M. Torres

Abstract:

The dam safety management is the crucial infrastructure as the dam failure has a catastrophic effect on the community. The dam safety management is the effective framework of key actions and activities to the dam owner to manage the safety of the dam for its entire life cycle. However, maintaining dam safety is a challenging task as there are changes in current dam states. These changes introduce new risks to the dam safety which have not been considered when the dam was designed. A new framework has to be developed to adapt to the changes in the dam risk and make the dams resilient. This study proposes a risk-based decision-making adaptation framework for dam safety management. The research focuses on climate change's impact on hydrological situations as it causes floods and damages the dam structure. The risk analysis framework is adopted to improve the dam management strategies. The proposed study encompasses four phases. To start with, measuring the effect by assessing the impact of climate change on embankment dams, the second phase is to analyze the potential embankment dam failures. The third is analyzing the different components of risks related to the dam, and finally, develop a robust decision-making framework.

Keywords: climate change, embankment dam, failure, risk-Informed decision-making

Procedia PDF Downloads 119
11 Numerical Study of Heat Transfer and Laminar Flow over a Backward Facing Step with and without Obstacle

Authors: Hussein Togun, Tuqa Abdulrazzaq, S. N. Kazi, A. Badarudin, M. K. A. Ariffin, M. N. M. Zubir

Abstract:

Heat transfer and laminar fluid flow over backward facing step with and without obstacle numerically studied in this paper. The finite volume method adopted to solve continuity, momentum and energy equations in two dimensions. Backward facing step without obstacle and with different dimension of obstacle were presented. The step height and expansion ratio of channel were 4.8mm and 2 respectively, the range of Reynolds number varied from 75 to 225, constant heat flux subjected on downstream of wall was 2000W/m2, and length of obstacle was 1.5, 3, and 4.5mm with width 1.5mm. The separation length noticed increase with increase Reynolds number and height of obstacle. The result shows increase of heat transfer coefficient for backward facing step with obstacle in compared to those without obstacle. The maximum enhancement of heat transfer observed at 4.5mm of height obstacle due to increase recirculation flow after the obstacle in addition that at backward. Streamline of velocity showing the increase of recirculation region with used obstacle in compared without obstacle and highest recirculation region observed at obstacle height 4.5mm. The amount of enhancement heat transfer was varied between 3-5% compared to backward without obstacle.

Keywords: separation flow, backward facing step, heat transfer, laminar flow

Procedia PDF Downloads 385
10 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10

Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin

Abstract:

The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.

Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10

Procedia PDF Downloads 93
9 Parameter Measurement Systems to Evaluate Performance of Archers

Authors: Muhammad Zikril Hakim Md. Azizi, Norhafizan Ahmad, Raja Ariffin Raja Ghazilla

Abstract:

Postural stability, attention level of the archer and particularly the vibrations of the bow itself plays a prominent role in determining the athletes performance. Many techniques and systems had been developing to monitor the parameters of the archers during training. In Malaysia, archery coaches tend to use non-scientific ways that they are familiar with, to evaluate archer performance. An approach that provides more affordable yet accurate systems to the masses and relatively easy system deployment procedure need to be proposed. Hence, this project will address to fulfil the needs. Three area of the archer parameter were included for data monitoring sensors. Attention level can be measured using EEG sensor, centre of mass linked to the postural stability can be measured by foot pressure sensor, and the bow vibrations in three axis will be relayed by the vibrations sensors placed directly on the bow using wireless sensors. Arduino based microcontroller used to relay all the data back to the interfacing systems. Interface systems will be using Python language and C++ framework for user interface and hardware interfacing systems. All sensor data can be observed in real time using the in-house applications, and each sessions can be saved to common files so that coach and the team can have a further discussion and comparisons.

Keywords: archery, graphical user interface, microcontroller, wireless sensor, monitoring system

Procedia PDF Downloads 221
8 Cryptocurrency Forensics: Analysis on Bitcoin E-Wallet from Computer Source Evidence

Authors: Muhammad Nooraiman bin Noorashid, Mohd Sharizuan bin Mohd Omar, Mohd Zabri Adil bin Talib, Aswami Fadillah bin Mohd Ariffin

Abstract:

Nowadays cryptocurrency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The cryptocurrency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin cryptocurrency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, digital wallet, digital forensics

Procedia PDF Downloads 227
7 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation

Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.

Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques

Procedia PDF Downloads 205
6 Exploring Students’ Self-Evaluation on Their Learning Outcomes through an Integrated Cumulative Grade Point Average Reporting Mechanism

Authors: Suriyani Ariffin, Nor Aziah Alias, Khairil Iskandar Othman, Haslinda Yusoff

Abstract:

An Integrated Cumulative Grade Point Average (iCGPA) is a mechanism and strategy to ensure the curriculum of an academic programme is constructively aligned to the expected learning outcomes and student performance based on the attainment of those learning outcomes that is reported objectively in a spider web. Much effort and time has been spent to develop a viable mechanism and trains academics to utilize the platform for reporting. The question is: How well do learners conceive the idea of their achievement via iCGPA and whether quality learner attributes have been nurtured through the iCGPA mechanism? This paper presents the architecture of an integrated CGPA mechanism purported to address a holistic evaluation from the evaluation of courses learning outcomes to aligned programme learning outcomes attainment. The paper then discusses the students’ understanding of the mechanism and evaluation of their achievement from the generated spider web. A set of questionnaires were distributed to a group of students with iCGPA reporting and frequency analysis was used to compare the perspectives of students on their performance. In addition, the questionnaire also explored how they conceive the idea of an integrated, holistic reporting and how it generates their motivation to improve. The iCGPA group was found to be receptive to what they have achieved throughout their study period. They agreed that the achievement level generated from their spider web allows them to develop intervention and enhance the programme learning outcomes before they graduate.

Keywords: learning outcomes attainment, iCGPA, programme learning outcomes, spider web, iCGPA reporting skills

Procedia PDF Downloads 141
5 Isolation and Identification Fibrinolytic Protease Endophytic Fungi from Hibiscus Leaves in Shah Alam

Authors: Mohd Sidek Ahmad, Zainon Mohd Noor, Zaidah Zainal Ariffin

Abstract:

Fibrin degradation is an important part in prevention or treatment of intravascular thrombosis and cardiovascular diseases. Plasmin like fibrinolytic enzymes has given new hope to patient with cardiovascular diseases by treating fibrin aggregation related diseases with traditional plasminogen activator which have many side effects. Various researches involving wide range of sources for production of fibrinolytic proteases, from bacteria, fungi, insects and fermented foods. But few have looked into endophytic fungi as a potential source. Sixteen (16) endophytic fungi were isolated from Hibiscus sp. leaves from six different locations in Shah Alam, Selangor. Only two endophytic fungi, FH3 and S13 showed positive fibrinolytic protease activities. FH3 produced 5.78cm and S13 produced 4.48cm on Skim Milk Agar after 4 days of incubation at 27°C. Fibrinolytic activity was observed; 3.87cm and 1.82cm diameter clear zone on fibrin plate of FH3 and S13 respectively. 18srRNA was done for identification of the isolated fungi with positive fibrinolytic protease. S13 had the highest similarity (100%) to that of Penicillium citrinum strain TG2 and FH3 had the highest similarity (99%) to that of Fusarium sp. FW2PhC1, Fusarium sp. 13002, Fusarium sp. 08006, Fusarium equiseti strain Salicorn 8 and Fungal sp. FCASAn-2. Media composition variation showed the effects of carbon nitrogen on protein concentration, where the decrement of 50% of media composition caused drastic decrease in protease of FH3 from 1.081 to 0.056 and also S13 from 2.946 to 0.198.

Keywords: isolation, identification, fibrinolytic protease, endophytic fungi, Hibiscus leaves

Procedia PDF Downloads 320
4 Determination of Alkali Treatment Conditions Effects That Influence the Variability of Kenaf Fiber Mean Cross-Sectional Area

Authors: Mohd Yussni Hashim, Mohd Nazrul Roslan, Shahruddin Mahzan Mohd Zin, Saparudin Ariffin

Abstract:

Fiber cross-sectional area value is a crucial factor in determining the strength properties of natural fiber. Furthermore, unlike synthetic fiber, a diameter and cross-sectional area of natural fiber has a large variation along and between the fibers. This study aims to determine the main and interaction effects of alkali treatment conditions that influence kenaf bast fiber mean cross-sectional area. Three alkali treatment conditions at two different levels were selected. The conditions setting were alkali concentrations at two and ten w/v %; fiber immersed temperature at room temperature and 1000C; and fiber immersed duration for 30 and 480 minute. Untreated kenaf fiber was used as a control unit. Kenaf bast fiber bundle mounting tab was prepared according to ASTM C1557-03. The cross-sectional area was measured using a Leica video analyzer. The study result showed that kenaf fiber bundle mean cross-sectional area was reduced 6.77% to 29.88% after alkali treatment. From the analysis of variance, it shows that the interaction of alkali concentration and immersed time has a higher magnitude at 0.1619 compared to alkali concentration and immersed temperature interaction that was 0.0896. For the main effect, alkali concentration factor contributes to the higher magnitude at 0.1372 which indicated the decrease pattern of variability when the level changed from lower to the higher level. Then, it was followed by immersed temperature at 0.1261 and immersed time at 0.0696 magnitudes.

Keywords: natural fiber, kenaf bast fiber bundles, alkali treatment, cross-sectional area

Procedia PDF Downloads 343
3 Failure to React Positively to Flood Early Warning Systems: Lessons Learned by Flood Victims from Flash Flood Disasters: the Malaysia Experience

Authors: Mohamad Sukeri Khalid, Che Su Mustaffa, Mohd Najib Marzuki, Mohd Fo’ad Sakdan, Sapora Sipon, Mohd Taib Ariffin, Shazwani Shafiai

Abstract:

This paper describes the issues relating to the role of the flash flood early warning system provided by the Malaysian Government to the communities in Malaysia, specifically during the flash flood disaster in the Cameron Highlands, Malaysia. Normally, flash flood disasters can occur as a result of heavy rainfall in an area, and that water may possibly cause flooding via streams or narrow channels. For this study, the flash flood disaster in the Cameron Highlands occurred on 23 October 2013, and as a result the Sungai Bertam overflowed after the release of water from the Sultan Abu Bakar Dam. This release of water from the dam caused flash flooding which led to damage to properties and also the death of residents and livestock in the area. Therefore, the effort of this study is to identify the perceptions of the flash flood victims on the role of the flash flood early warning system. For the purposes of this study, data collection was gathered from those flood victims who were willing to participate in this study through face-to-face interviews. This approach helped the researcher to glean in-depth information about their feeling and perceptions on the role of the flash flood early warning system offered by the government. The data were analysed descriptively and the findings show that the respondents of 22 flood victims believe strongly that the flash flood early warning system was confusing and dysfunctional, and communities had failed to response positively to it. Therefore, most of the communities were not well prepared for the releasing of water from the dam that caused property damage and 3 people were killed in Cameron Highland flash flood disaster.

Keywords: communities affected, disaster management, early warning system, flash flood disaster

Procedia PDF Downloads 595
2 Performance Comparison and Visualization of COMSOL Multiphysics, Matlab, and Fortran for Predicting the Reservoir Pressure on Oil Production in a Multiple Leases Reservoir with Boundary Element Method

Authors: N. Alias, W. Z. W. Muhammad, M. N. M. Ibrahim, M. Mohamed, H. F. S. Saipol, U. N. Z. Ariffin, N. A. Zakaria, M. S. Z. Suardi

Abstract:

This paper presents the performance comparison of some computation software for solving the boundary element method (BEM). BEM formulation is the numerical technique and high potential for solving the advance mathematical modeling to predict the production of oil well in arbitrarily shaped based on multiple leases reservoir. The limitation of data validation for ensuring that a program meets the accuracy of the mathematical modeling is considered as the research motivation of this paper. Thus, based on this limitation, there are three steps involved to validate the accuracy of the oil production simulation process. In the first step, identify the mathematical modeling based on partial differential equation (PDE) with Poisson-elliptic type to perform the BEM discretization. In the second step, implement the simulation of the 2D BEM discretization using COMSOL Multiphysic and MATLAB programming languages. In the last step, analyze the numerical performance indicators for both programming languages by using the validation of Fortran programming. The performance comparisons of numerical analysis are investigated in terms of percentage error, comparison graph and 2D visualization of pressure on oil production of multiple leases reservoir. According to the performance comparison, the structured programming in Fortran programming is the alternative software for implementing the accurate numerical simulation of BEM. As a conclusion, high-level language for numerical computation and numerical performance evaluation are satisfied to prove that Fortran is well suited for capturing the visualization of the production of oil well in arbitrarily shaped.

Keywords: performance comparison, 2D visualization, COMSOL multiphysic, MATLAB, Fortran, modelling and simulation, boundary element method, reservoir pressure

Procedia PDF Downloads 429
1 The Effect of Second Victim-Related Distress on Work-Related Outcomes in Tertiary Care, Kelantan, Malaysia

Authors: Ahmad Zulfahmi Mohd Kamaruzaman, Mohd Ismail Ibrahim, Ariffin Marzuki Mokhtar, Maizun Mohd Zain, Saiful Nazri Satiman, Mohd Najib Majdi Yaacob

Abstract:

Background: Aftermath any patient safety incidents, the involved healthcare providers possibly sustained second victim-related distress (second victim distress and reduced their professional efficacy), with subsequent negative work-related outcomes or vice versa cultivating resilience. This study aimed to investigate the factors affecting negative work-related outcomes and resilience, with the triad of support; colleague, supervisor, and institutional support as the hypothetical mediators. Methods: This was a cross sectional study recruiting a total of 733 healthcare providers from three tertiary care in Kelantan, Malaysia. Three steps of hierarchical linear regression were developed for each outcome; negative work-related outcomes and resilience. Then, four multiple mediator models of support triad were analyzed. Results: Second victim distress, professional efficacy, and the support triad contributed significantly for each regression model. In the pathway of professional efficacy on each negative work-related outcomes and resilience, colleague support partially mediated the relationship. As for second victim distress on negative work related outcomes, colleague and supervisor support were the partial mediator, and on resilience; all support triad also produced a similar effect. Conclusion: Second victim distress, professional efficacy, and the support triad influenced the relationship with the negative work-related outcomes and resilience. Support triad as the mediators ameliorated the effect in between and explained the urgency of having good support for recovery post encountering patient safety incidents.

Keywords: second victims, patient safety incidents, hierarchical linear regression, mediation, support

Procedia PDF Downloads 27