conference proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfadita evalina fitria...

383

Upload: others

Post on 24-Jan-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat
Page 2: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

Conference Proceedings

June 27-29, 2015 Seoul, South Korea

SICASE

Seoul International Conference on Applied Science and Engineering

SICBENS

Seoul International Conference on Biological Engineering & Natural Science

Page 3: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

SICASE

Seoul International Conference on Applied Science and Engineering

ISBN 978-986-89536-5-9

SICBENS

Seoul International Conference on Biological Engineering & Natural Science

ISBN 978-986-89536-3-5

Page 4: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

1

Content

General Information ................................................................................................................ 3

Conference Organization ........................................................................................................ 5

SICASE International Committee Board ........................................................................................... 5

SICBENS International Committee Board ........................................................................................ 6

Special Thanks to Session Chairs ........................................................................................... 7

Conference Schedule ................................................................................................................ 8

Natural Sciences Keynote Speech ......................................................................................... 10

Tutorial Course ...................................................................................................................... 12

Oral Sessions –June 27th

, 2015 .............................................................................................. 13

Civil Engineering ................................................................................................................................ 13

SICASE-735 ............................................................................................................................... 14

SICASE-748 ............................................................................................................................... 23

SICASE-777 ............................................................................................................................... 24

SICASE-828 ............................................................................................................................... 33

Computer & Information Science I / Electrical and Electronic Engineering ............................... 42

SICASE-727 ............................................................................................................................... 43

SICASE-388 ............................................................................................................................... 63

SICASE-776 ............................................................................................................................... 71

SICASE-818 ............................................................................................................................... 80

Biological Engineering / Biomedical Engineering / Fundamental Science .................................... 88

SICASE-701 ............................................................................................................................... 90

SICASE-729 ............................................................................................................................... 95

SICBENS-1292 .......................................................................................................................... 97

SICBENS-1300 ........................................................................................................................ 106

SICASE-732 ............................................................................................................................. 107

SICASE-829 ............................................................................................................................. 108

Oral Sessions –June 28th

, 2015 ............................................................................................ 129

Material Science & Engineering ...................................................................................................... 129

SICASE-771 ............................................................................................................................. 131

SICASE-772 ............................................................................................................................. 140

SICASE-734 ............................................................................................................................. 151

SICASE-740 ............................................................................................................................. 164

SICASE-753 ............................................................................................................................. 175

SICASE-755 ............................................................................................................................. 183

Environmental Sciences .................................................................................................................... 192

SICASE-708 ............................................................................................................................. 194

Page 5: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

2

SICASE-805 ............................................................................................................................. 203

SICASE-843 ............................................................................................................................. 204

SICASE-840 ............................................................................................................................. 211

SICBENS-1326 ........................................................................................................................ 221

Computer & Information Science II ............................................................................................... 234

SICASE-723 ............................................................................................................................. 235

SICASE-703 ............................................................................................................................. 243

SICASE-759 ............................................................................................................................. 252

Mechanical Engineering ................................................................................................................... 272

SICASE-704 ............................................................................................................................. 273

SICASE-722 ............................................................................................................................. 279

SICASE-820 ............................................................................................................................. 286

SICASE-819 ............................................................................................................................. 294

Poster Presentation .............................................................................................................. 302

Poster Session (1) ............................................................................................................................... 302

Biomedical Engineering / Biological Engineering / Natural Science .................................. 302

SICASE-745 ............................................................................................................................. 305

SICASE-797 ............................................................................................................................. 309

SICBENS-1287 ........................................................................................................................ 318

SICBENS-1306 ........................................................................................................................ 320

SICBENS-1330 ........................................................................................................................ 322

SICBENS-1334 ........................................................................................................................ 323

SICBENS-1333 ........................................................................................................................ 325

SICBENS-1336 ........................................................................................................................ 327

SICBENS-1303 ........................................................................................................................ 329

Poster Session (2) ............................................................................................................................... 331

Civil Engineering / Electrical and Electronic Engineering / Environmental Sciences

/Fundamental & Applied Sciences / Material Science and Engineering ............................ 331

SICASE-798 ............................................................................................................................. 333

SICASE-803 ............................................................................................................................. 343

SICASE-796 ............................................................................................................................. 353

SICASE-779 ............................................................................................................................. 361

SICASE-765 ............................................................................................................................. 362

SICASE-823 ............................................................................................................................. 366

SICASE-743 ............................................................................................................................. 380

Page 6: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

3

General Information

Venue

Courtyard by Marriott Seoul Times Square

442 Yeongdeungpo-dong 4-ga, Yeongdeungpo-gu, Seoul, 150-798 South Korea

Phone: +82 2 2638 3000

Fax: +82 2 2638 3001

Registration Time

4th

Floor, Courtyard by Marriott Seoul Times Square

Saturday, June 27, 2015 08:30-17:00

Sunday, June 28, 2015 08:30-15:00

Poster Area

Hallway, 4th Floor, Courtyard by Marriott Seoul Times Square

Mounting Presentation Removal

Poster Session (1)

Saturday, June 27, 2015 13:20-13:30 13:30-14:30 14:30-14:40

Poster Session (2)

Saturday, June 27, 2015 14:50-15:00 15:00-16:00 16:00-16:10

Poster Session (3)

Saturday, June 27, 2015 16:20-16:30 16:30-17:30 17:30-17:40

Floor Map

Page 7: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

4

Oral Instructions

- Total length of each session is 90 minutes. The specific length of each presentation

depends on the number of presentations in that session.

- All presentation rooms are equipped with a screen, an LCD projector, and a laptop

computer installed with PowerPoint software. You will be able to insert your USB flash

drive into the computer and double click on your presentation to open it in PowerPoint.

We recommend that you bring two copies of your presentation in case of one fails. You

may also link your own laptop computer to the projector cable, however if you use your

own Mac please ensure you have the requisite connector.

Poster Instructions

- Materials Provided by the Conference Organizer:

1. X-frame display & Base Fabric Canvases (60cm×160cm)

2. Adhesive Tapes or Clamps

- Materials Prepared by the Presenters:

1. Home-made Poster(s)

- Requirement for the Posters:

1. Material: not limited, can be posted on the canvases

2. Size: smaller than 60cm*160cm

A Polite Request to All Participants

Participants are requested to arrive in a timely fashion for all addresses, whether to their own, or to

those of other presenters. Presenters are reminded that the time slots should be divided fairly and

equally between the number of presentations, and that they should not overrun. The session chair is

asked to assume this timekeeping role.

Organizer

Higher Education Forum (HEF)

Tel: + 886 2 2740 1498〡www.prohef.org

Page 8: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

5

Conference Organization

SICASE International Committee Board

Khalid M. Mosalam, University of California, Berkeley

Chueerat Jaruskulchai, Kasetsart University

M. Cheralathan, SRM University

J N Bandyopadhyay, Indian Institute of Technology Kharagpur

S. Dhar, University of Calcutta

Poongothai Shankar, Annamalai University

Amit Agrawal, Indian Institute of Technology Bombay

Cheng Li, The Hong Kong Polytechnic University

T.M. Indra Mahlia, University of Malaya

Kunal Ghosh, Indian Institute of Technology Kanpur

Narayanan Kulathuramaiyer, University of Sarawak Malaysia

Arup K. Sarma, Indian Institute of Technology Guwahati

Suresh K Bhargava, School of Applied Sciences

Rapeepan Pitakaso, Ubonratchthani University

Jie Liu, Carleton University

Carlos Alejandro Figueroa, Plasmar Tecnologia

Poul Vaeggemose, VIA University College Denmark

Maha M. O. Khayyat, Umm Al-Qura University

Kant Kanyarusoke, Cape Peninsula University of Technology

Paramita Bhattacharjee, Jadavpur University

Nathalia Devina Widjaja, Binus International University

C. M. Khalique, North-West University,South Africa

Page 9: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

6

SICBENS International Committee Board

C H OH, National University of Singapore

Lim Koon Ong Pk, Universiti Sains Malaysia

Parin Chaivisuthangkura, Srinkharinwirot University

Zulkifli Hj. Shamsuddin, Universiti Putra Malaysia

Avinash C. Sharma, GGS Indraprastha University

E. Shaji, University of Kerala

A. M. Chandra, University of Calcutta

Chien-Cheng Chang, National Taiwan University

Stephen Redmond, The University of New South Wales

J. Gao, The University of Hong Kong

P.K.Barhai, Birla Institute of Technology

Singh, Gauri Shankar, Indian Institute of Technology Roorkee,

Mohd. Nasir Mohd. Desa, Universiti Putra Malaysia

Aliakbar Roodbari, Shahroud University of Medical Sciences

Olivia J Fernando, Annamalai University

K. Padmakumar, Kerala University Campus

John Hearne, Royal Melbourne Institute of Technology

Hamed M. El-Shora, Mansoura University

Huabei Jiang, The University of Florida

Page 10: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

7

Special Thanks to Session Chairs

Fumihiko Isada Kansai University

Ya-Fen Lee Toko University

Chua Bee Seok Universiti Malaysia Sabah

Yonglei Tao Grand Valley State University

Moon J. Lee University of Florida

Tatiana Vladimirovna Kolpakova Transbaikal State University

Vinoth Jagaroo Boston U. School of Medicine & Emerson College

Hwee Ling Lim The Petroleum Institute

Adita Evalina Fitria Universitas Indonesia

Minnie M. Liangco Pampanga State Agricultural University

Prapat Pentamwa Suranaree University of Technology

Gigi Lam Tung Wah College

Seonho Choi Bowie State University

Pratuang Dinnaratna Kasetsart University

Yanhua Wu Nanyang Technolocial University

Page 11: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

8

Conference Schedule

Saturday, June 27, 2015

Oral Presentation

Time Information

08:30-17:00 Registration

09:00-10:30 Civil Engineering Room 2

10:30-10:45 Tea Break

11:00-12:15 Natural Sciences Keynote Speech (SBPA) Room 1

12:00-13:00 Lunch Time 5F

13:00-14:30 Computer & Information Science I / Electrical and Electronic

Engineering

Room 2

14:30-14:45 Tea Break

14:45-16:15 Tutorial Room 1

16:15-16:30 Tea Break

16:30-18:00

Economics Room 1

Biological Engineering / Biomedical Engineering /

Fundamental Science

Room 2

Page 12: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

9

Saturday, June 27, 2015

Poster Session ,4F Pre-Function Area

Time Information

13:30-14:30 Poster Session (1)

Biomedical Engineering / Biological Engineering / Natural Science

15:00-16:00

Poster Session (2)

Civil Engineering / Electrical and Electronic Engineering / Environmental

Sciences / Fundamental & Applied Sciences / Material Science and

Engineering

Sunday, June 28, 2015

Oral Presentation

Time Information

08:30-15:00 Registration

09:00-10:30 Material Science & Engineering Room 2

10:30-10:45 Tea Break

10:45-12:15 Environmental Sciences Room 2

12:00-13:00 Lunch Time 5F

13:00-14:30 Computer & Information Science II Room 2

14:30-14:45 Tea Break

14:45-16:15 Mechanical Engineering Room 2

Page 13: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

10

Natural Sciences Keynote Speech

Room 1

2015/06/27 Saturday 11:00-12:15

Topic:Probabilistic Analysis of Volcanic Ash Dispersion over Korea

Keynote Speech:Lee, Sungsu, Ph.D

Professor

School of Civil Engineering, Chungbuk National University, 1

Chungbukdae-gil, Cheongju, Rep. of Korea

In 2010, a series of volcanic eruption of Mt. Eyjafjallajokull in Iceland put a hold on the air

travel in the continent of Europe and affects all over the world. Besides this direct impact,

numerous indirect effects were found from the aftermath. In January of 2011, another series of

eruption from Mt. Shinmoedake, Kyushu, Japan also alerted Japan and the world. With these

series of events, the reports from Chinese seismologists since 2002 have drawn an attention and

initiated discussions on the possibility of the eruption of Mt. Baekdu which is located on the

border of North Korea and Machuria, China. It was found that Mt. Baekdu has history of

eruptions more than 20 times since 10th

century and its strongest one in 10th

century was

believed to be about 1000 times that of Mt. Eyjafjallajokull.

Alerted from the series of events and the rediscovered facts about Mt. Baekdu, Korea has

thought of potential threats from volcanos, that is, not only Mt. Baekdu but also volcanos in the

vicinity of Korea, knowing that there are more than 10 Chinese volcanos within 1000km from

Seoul and tens of Japanese ones. If any of those volcanos erupts, the most effects on Korean

peninsula will come from ash dispersion and this study focuses on the probabilistic analysis of

volcanic ash dispersion both in the air and on the land.

Thousands of hypothetical eruptions from Mt. Baekdu are assumed and the ash from the vent is

simulated by a well-known numerical model employing particle tracking method based on

lagrangian scheme. It is assumed that each eruption starts at midnight and lasts for 24 hours on

every day from Jan. 1st , 2008 to Dec. 31

st, 2013. The meteorological conditions including wind

and pressure on each day are borrowed from reanalysis data of NCEP, which represents the

real weather conditions. With these enormous amount of computed outputs, the probabilistic

estimation of airborne and fallout ashes has been carried out over Korea and adjacent regions in

Page 14: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

11

North-East Asia. The results show that once it happens, the ash can sweep the part of Korean

peninsula and travel across the East Sea to Japan and to the Pacific.

Therefore, it is very essential to establish the international collaboration and the cooperation in

the research of volcanic risk in North-East Asia.

This work was supported by the grant from Natural Hazard Mitigation Research Group funded

by Ministry of Public Safety and Security, South Korea.

Educational Background

B.S. : Seoul National University, Dept of Navar Architecture, Rep. of Korea (1986)

M.S. : Seoul National University, Dept of Navar Architecture, Rep. of Korea (1988)

Ph.D : Colorado State University, Ft. Collins, CO, USA, Dept of Civil Engineering

(1997)

- Dissertation : Large Eddy Simulation of Flow past a Square Cylinder using Finite

Element Method

- Adviser : Prof. Bogusz Bienkiewicz

Work Experience

Researcher, Agency for Defense Development, Rep. of Korea (1988-1993)

- Major Experience : Computational Fluid Dynamics for Rotating Machinery,

Design of Propellers

Research Assistant, Dept of Civil Engineering , Colorado State University

(1994-1997)

Research Associate, National Oceanic and Atmospheric Administration

(NOAA)/CIRES, Boulder, CO, USA (1998-1999)

- Major Experience: LES for Stratified Flow around Bodies

Research Professor, Dept of Mechanical Engineering, Inha University, Rep. of Korea

(2000)

Professor, School of Civil Engineering, Chungbuk National University, Rep. of Korea

(2000-Present)

Director of Volcanic Disaster Preparedness Research Center (2012-).

Field of Interests

Computational Fluid Dynamics and its application to Turbulent Wind Flow

Large Eddy Simulation of Turbulent Flow around Buildings and Moving Bridges

Typhoon Simulation using Statistical/Stochastic Approaches

Structural Vulnerability to Wind

Wind Damage Analysis and Mitigation

Micro-Meteorology for Urban Region

Page 15: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

12

Tutorial Course

Room 1

2015/06/27 Saturday 14:45-16:15

Speaker: Sounghwa Walker, M.Ed.

Topic: Engaging the audience through empowering

nonverbal communication

Background of the speaker

Entered the teaching profession in 1994; CA teaching

credential in Math

Taught English (Korea) & Mathematics (Southern California, USA)

Taught various education courses (University of California, Riverside, USA)

Presented papers at numerous international conferences

Conducted a workshop (45 min.) at the 2015 national conference on Future Educators

Association, Washington, DC

Educational Psychology, PhD in progress

(Faculty Advisor: Dr. Keith Widaman, Distinguished Professor)

Instructor: Graduate School of Education at UC Riverside, USA

1. Introduction (10 min.): Purpose of the presentation (Knowing who we are)

2. Nonverbal Communication - NVC (35 min.)

a) What is it & why should we care?

b) Relationships between NV communication & presentation

c) Group activities & volunteers

3. Improving Nonverbal Communication Skills (35 min.)

a) Practical application of NVC skills

b) Engaging the audience

c) Empowering NVC

4. Closing (10 min.)

Page 16: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

13

Oral Sessions –June 27th

, 2015

Civil Engineering

Session Chair: Ya-Fen Lee

SICASE-735

A New Conceptual Sustainable Water Resources Research

Choo, Tai Ho︱Pusan National University

Yoon, Hyeon Cheol︱Pusan National University

Yun, Gwan Seon︱Pusan National University

Kwak, Kil Sin︱Pusan National University

SICASE-748

Measuring Financial Liquidity of Construction Contractors in Hong Kong

Tsang, Yick Tat︱City University of Hong Kong

SICASE-777

Evaluating the Rescue Performance of Flooding Disaster Based on Residents’ Perception

Ya-Fen Lee︱Toko University

Yun-Yao Chi︱Chang Jung Christian University

Ching-Hui Peng︱Chang Jung Christian University

SICASE-828

Fatique Resistance of Warm Mix Asphalt Using Bayat Natural Zeolite and Elastomeric

Polymer Bitumen

Ani Tjitra Handayani︱College of Technology STTNAS, Indonesia

Bagus Hario Setiaji︱Diponegoro University

Ani Prabandiyani︱Diponegoro University

2015/6/27 Saturday 09:00-10:30 Room 2

Page 17: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

14

SICASE-735

A New Conceptual Sustainable Water Resources Research

Choo, Tai Ho

Department of Civil and Environmental Engineering, Pusan National University,

South Korea

[email protected]

Yoon, Hyeon Cheol*

Department of Civil and Environmental Engineering, Pusan National University,

South Korea

[email protected]

Yun, Gwan Seon

Department of Civil and Environmental Engineering, Pusan National University,

South Korea

[email protected]

Kwak, Kil Sin

Department of Civil and Environmental Engineering, Pusan National University,

South Korea

[email protected]

Abstract

A paradigm about the water resources management is changing the operation management to

the nation water security. At this stage, the sustainable water resources are a matter of great

interest. There are many methods to secure the water resources. Among others, constructing a

dam is direct and active. In the Korea, however, the dam construction is more and more

difficult because of the decrease of a suitable location, the opposition of community Residents

and environment group and negative public opinion. Therefore, a new conceptual Multipurpose

Regulating Dam is suggested in the present paper. The Multipurpose Regulating Dam can

provide securing water resources, flood control, hydroelectric power, eco-environmental

instream flow and recreation as well as the use of function of existing dam. The Multipurpose

Regulating Dam saves the construction and compensation costs due to the use of conventional

river channel, and has an advantage economically. Also, it will improve negative eyes from the

local residents. The research sequence introduces basic concepts for the Multipurpose

Regulating Dam construction, and the propriety Evaluation, the decision of dam type and the

verification of operation rule are approached sequentially. The verification is applied to Yeong

Cheon Dam(water supply only) in the Korea.

Page 18: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

15

The appropriate operation scenario is selected after establishing the various scenarios by

HEC-Ressim modeling. The results show securing water resources of 14 million ton and the

flood control of 15.4 million ton in comparison with solo operation of existing dam. If the

current research is advanced and continuous, it will be a good alternative as new water

management method.

Keywords: eco-environmental instream flow, flood control, hydroelectric power, Multipurpose

Regulating Dam, water resources

1. Introduction

To cope with and adapt to various water-related disasters in response to the crisis according to

climate change is a common concern of all countries (UNWWDR 4, 2002). In last June 2013,

Ganges River and its branch were flooded due to localized heavy rains in the Hindustan

(northern area of India), and more than 5,000 people were killed or disappeared caused by the

occurrence of large-scale landslide. Also, it was estimated that in November of that year, while

the Philippines were hit hard by a super typhoon „Haiyan‟, approximately 8,000 casualties were

occurred, whereas, since a drought was deepened due to a record-heat wave in China, over 600

million people in 13 castles such as Hunan suffered from a drinking water shortage, and the

economic loss of about 940 billion won, such as the crops damage was occurred. Thus, if water

is excessive or deficient, it gives much damage to human. However, because the available

water resources have the restriction of time and space, the preserved amount of water is limited.

Therefore, the establishment of the response measures in accordance with a climate change,

leading to the increase of the intensity and incidence frequency of flooding and drought, at the

same time the that distribution of the sufficient water is conducted by maximally utilizing the

available water resources is essential. In fact, the most direct and positive method is to secure

the water resources by means of the structures such as a dam, a dammed pool for irrigation,

and Estuary Bank. In order to compensate the temporal and spatial imbalance of water

resources, most of methods are compensating the water shortage of a period of water shortage

by adjust the peak discharge and by storing the surplus water resources, using a dam in a flood

season (Chung et.Al, 2010).

But in the Korea these methods require the long period from planning to construction, and need

the selection of the right place for construction, and suffer from the opposite of many

environmental groups and the local residents owing to the large-scale civil engineering projects.

In addition, if exceeding the marginal capacity of the structure, there is also the case that the

utility becomes a dead dog. Even though this drawback, many countries around the world are

securing still the water resources through the methods by the various structures, such as dams

and barrage, and that is to say, it indirectly shows the point that these methods are the most

effective than other alternatives.

Page 19: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

16

But the reality is faced with a very difficult situation to build a large dam. First, it is the

tendency that the suitable places to build a dam are gradually decreased, and because the

negative perception of local residents or environmental groups, and the public opinion against

the large structures (particularly, dam) for water resources are very strong, and the problem

losing hometown, and the cultural property issues along with astronomical compensation

amount should be solved, it is the difficult situation to promote the business. Therefore, to

develop the water resources projects, the improvement direction should be sought based on the

current situation diagnosis.

Therefore, the current study proposed a new conceptual “Blue Reservoir”. Accordingly, first,

the authors have established the definition of the Blue reservoir, and they have suggested the

matters, operation and the application method of model that shall be considered to install the

Blue reservoir, and they have also presented the results applying it to the actual river basin

through a case study.

2. The Definition of Blue Reservoir

The Blue reservoir is basically installed in online at the channel in the direct downstream of the

dam having various purposes such as a multipurpose dam, water supply dam, and a

hydroelectric dam. In other words, it has the similar form to the existing balancing reservoir

dam. But there are many differences between the Blue reservoir and the existing balancing

reservoir. The existing balancing reservoir played a role that evenly discharges it to the

downstream over 24 hours after storing the water discharging through the Peak-load power at

the multipurpose dam and hydroelectric dam. Whereas a Blue dam provides the water bowl for

the security of the water resources in the watershed along with flood control effect by utilizing

the discharge flow of the flood period meaninglessly flowing to downstream. Also the Blue

dam can uniformly discharge the flow rate for ecological environment preservation to the

downstream beyond the concept of the flow rate for maintaining a river, and it can help for the

restore integrity of a river and the safety security of ecosystem by preventing the cold-weather

damage.

And it has many right functions that the demand and supply through self-electrical generation

is possible and can use also the stored water for the local recreation, and it has the advantage

that can establish its own operation rules by reflecting the operation rules of the existing dam.

Above all, the Blue dam has the advantage that can minimize the environmental damage,

because the construction costs become cheaper and the construction period can be shortened by

utilizing the existing channel as it is. Wolff and Gleick(2002) have suggested that will provide

potentially very positive opportunity if the harmony with nature is formed by using the dam

that the environment is not almost damaged. Furthermore, it is expected that the Blue dam can

present the solutions for large water structure with the opposite of the environmental groups

and the local residents, and the social negative perception due to the loss of hometown and

Page 20: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

17

compensation issues, and the cultural property issues, and it is considered that it will be the

good alternative in the current situation that the right place of a dam is gradually decreased.

3. Research Area

In this study, the Blue reservoir was installed in the downstream of Yeongcheon dam which is

a water supply dam located at the riverside of Geumhogang River in Gyeongsangbuk-do as

shown in Fig. 1.

The Yeongchen dam is located at Jayang-myeon in Yeongcheon-si, Gyeongsangbuk-do, the

height of the dam is 42m, the length is 300m, and total storage capacity is 96.4 million ,

This dam was constructed for the purpose of industrial and domestic water supply, and the

irrigation water and river maintenance water supply for the downstream area of the dam. In

addition, unusually the Yeongcheon dam is using the water supplied from Imha dam located in

the other river basin, and supply water through a raceway to other region, and is producing the

electricity of 6GWh at the small hydraulic plant with the station capacity of 1 MW.

4. The Research Process

The installation technique of Blue reservoir proposed in this study consists of the validation

steps such as the evaluation of installation possibility, the capacity and operation decision, and

its flow chart is shown in Fig. 2.

Page 21: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

18

Whether the installation is possible should be determined by conducting the evaluation for the

security of water quantity if the Blue reservoir will be installed at the downstream of the dam.

In other words, it is evaluated by calculating the water quantity discharged in excess in flood

seasons.

The position of the Blue reservoir must determine by considering the aerial photograph and the

land utilization, and the capacity of the reservoir is decided by quantitatively presenting

through the hydrologic statistic techniques targeting the morphological analysis through GIS

(geographic information system) and the flow rate directly discharged from the original dam

into the river.

The storage capacity of the Blue reservoir and the operation rules are finally determined by

reviewing whether the improvement of the river flow condition in the Blue reservoir and the

increase of additional water quantity for electricity generation are possible, while maintaining,

as it is, the water supply and the electricity discharge of the original dam through a simulation.

5. Installation Guide of Blue Reservoir

As a result comparing the annual water supply and the operating performance data, it was

analyzed that the security of water of 133M per year is possible as shown in Fig. 3.

Page 22: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

19

The annual maximum discharge per the duration among the discharge flow discharged from the

original dam into the river is consisted as the input data, and the probability discharge per the

frequency-duration was calculated through the process such as the basic statistics, preliminary

analysis, parameter estimation and the goodness of fit test. In this study, in order to calculate

the optimum storage capacity by considering the amount of dredging, the water level-storage

capacity curves of 30.4, 34.8, and 39.8 M corresponding to the duration of 7 days for

100-year frequency, the duration of 6 days for 200-year frequency, respectively, and the

duration of 10 days for 200-year frequency were calculated.

The Blue reservoir‟s effects are analyzed by using HEC-ressim model. The water level (Daily)

of the reservoir among the operation performance data of the original dam was designated as a

calibration target, and its period is from 2001 to 2013. The spill occurred in the dam basin and

the inflow (Daily) through the raceway are the upstream boundary conditions, and the water

supply and the electricity discharge are the downstream boundary conditions, and the water

level of the original dam was calibrated by the overtropping discharge through the sluice, that

is, a parameter. The electricity discharge and the water supply were built as input data, and the

model was calibrated with the discharge flow by the gate operation as the parameter. The

observations of the original dam and the simulated hydrological curve are the same as Fig. 4.

As a result conducting the linear regression analysis using this result, the coefficient of

determination was analyzed as 0.9977 (Fig. 5).

Page 23: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

20

The Blue reservoir is focused on whether the original dam can additionally supply the water for

river maintenance and the water quantity for electricity generation by securing the excessive

flow rate of the downstream while maintaining the operation of the dam, as it is. In order to

determine the most ideal capacity and the additional discharge, 12 scenarios were composed as

shown in Table 1.

The flow-duration variability was reviewed by year in order to determine the optimal volume

and operation of the Blue reservoir, and low flow (Q533) of scenario 9 that added 10% was

determined since the scenario can provide the additional water supply in comparison with other

scenario also in 2008, 2009 and 2010 corresponding to the drought year. To compare with the

installation effect of Blue reservoir, the result of unilateral operation of Yeong Cheon Dam and

the scenario 9 simulation result are summarized as shown in the table 2. The flow-duration in

the river is improved because Existing water supply maintains at the same time and low

flow(Q355)of downstream in the river increased about 8%.

Page 24: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

21

In addition, the peak discharge flow corresponding to the flood control benefit was reduced as

much as about 8.5/sec as 13-year average, and it was analyzed that the electricity generation

discharge corresponding the power generation benefit increased as much as 92.5 M in

comparison with the unilateral operation. This is because the power discharge is achieved

through small hydro power plant when the water for agricultural use and the water for river

maintenance will be discharged, and the Blue reservoir also is the same. Finally, the 13-year

average water quantity of about 11.1 M was additionally secured.

6. Conclusion

In this study, the authors have proposed the Blue reservoir installation technique of new

concept in order to secure the water resources, and the simulation of the YeongCheon dam

established in HEC-ResSim was calibrated, and the effect of the proposed technique was

analyzed by applying to a model.

The scenario 9 can supply the additional water (water for agricultural use + water for

maintaining) of 12-year average 6.85M into the downstream river, at the same time, the

water quantity for the hydroelectric power generation was increased by using of 49.21M, and

it was simulated that the water of the average 9.87 M can be secured in addition over the

entire period. It is considered that the Blue reservoir proposed in this study will contribute to

the vitalization of the local economy by better river water supply and the algae blooms

occurrence reduction, the flood damage reduction of the local residents in downstream, and the

offer of recreation using the secured reservoir by means of the contribution to the increase in

the water bowl, the increase of the water quantity for hydroelectric power generation which is

the clean energy, and the supply of the additional water in the water that has flown into the

existing river.

Page 25: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

22

7. Acknowledgement

This research was supported by a grant (11-TI-C06) from Advanced Water Management

Research Program funded by Ministry of Land, Infrastructure and Transport of Korean

government.

8. Reference

[1] Chung, G.H., Ryu, G.H. and Kim, J.H.(2010) Optimization of Multi-reservoir operation

considering water demand uncertainty in the Han river basin. Journal of the Korean

Society of Hazard Mitigation, KOSHAM, 10(1), 89-102.

[2] UNISDR(United Nations International Strategy for Disaster Reduction Secretariat). 2011.

Global Assessment Report on Disaster Risk Reduction. Geneva, UNISDR.

[3] Korea Water Resources Corporation (2013) Dam Operation Manual.

[4] Wolff, G. and Gleick, P. H.2002. The soft path for water. P.H. Gleick(ed.) The Worldd‟s

Water : The Biennial Report on Freshwater Resources, 2002-2003. Washington DC, Island

Press, pp. 1-32.

Page 26: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

23

SICASE-748

Measuring Financial Liquidity of Construction Contractors in Hong Kong

Tsang, Yick Tat

Department of Civil and Architectural Engineering,

City University of Hong Kong

[email protected]

Abstract

Construction business is sensitive to the fluctuation of its socio-economic environment. The

financial liquidity is one of the key concerns in maintaining the survival and competitiveness of

a construction contractor due to the highly capitalized and risky nature of construction industry.

This research investigated the financial liquidity of construction contractors in Hong Kong

based on the published financial data of listed construction companies between 1992 and 2010.

The liquidity was empirically modelled by means of factor analysis based on a number of

financial ratios. The time trend of the liquidity was further analysed by correlating with a pool

of identified driving determinants such as macroeconomic performance, construction market

demand, tender price, construction productivity, construction cost, etc., by means of bivariate

cross-correction analysis. The findings served the basis of understanding and predicting the

business well-being of construction contractors in reacting to the contextual change and

provided an insight to the corporate managements, clients and creditors in monitoring the

contractors‟ financial health.

Keywords: Construction contractor, liquidity, factor analysis, cross-correlation analysis

Page 27: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

24

SICASE-777

Evaluating the Rescue Performance of Flooding Disaster Based on Residents’

Perception

Ya-Fen Lee

Department of Leisure and Recreation Management, Toko University, Taiwan

[email protected]

Yun-Yao Chi, Ching-Hui Peng

Department of Land Management and Development, Chang Jung Christian University, Taiwan

Abstract

Under the global climate change, costal urban in Taiwan will face the threat of flooding in the

future, whose nature and condition differs from the fire. Thus, flooding rescue is a major issue

in the disaster prevention and protection. A sample of residents in the high-potential area of

flooding in Tainan, Taiwan provided information about their perception in influence factors of

flooding rescue performance. In this study, a model to evaluate the rescue performance of

flooding disaster based on residents‟ perception was proposed and the illustration of rescue

performance was presented as well.

Key words: global climate change, flooding, rescue performance, structural equation modeling

1. Introduction

Due to the influence of the global climate change in recent years, the flooding victims and

property loss are increasing constantly with the increasing occurrence frequencies of flooding

all around the world. Taiwan locates on the Pacific climate zones and the typhoon-induced

heavy rainfall occurs every year. In recent years, the serious flooding disaster often happens,

especially in the coastal lowlands in Taiwan. For example, the torrential rainfall induced by

Typhoon Morakot in August, 2009, initiated a flooding disaster and submerged a lot of coastal

cities in southern Taiwan, which caused many flooding victims trapped to wait rescued. The

flooding rescue experiences during typhoon Morakot are unforgettable for firefighters in

Taiwan and the related issues of rescue performance of flooding disaster begin to be concerned

deeply.

The Fire Bureau, Taiwan owns many considerable experiences of fire rescue tasks. However,

the rescue nature and condition of flooding disaster differs from that of fire disaster. It is not

familiar with flooding rescue tasks for firefighters. When the serious flooding attacks coastal

lowlands, Taiwan in the future, the amount and distribution of rescued victims will be over

than fire event, which will be a large Challenget in flooding disaster prevention and protection

Page 28: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

25

for firefighters.

Therefore, a practical performance evaluation is necessary to judge the rescue performance of

flooding disaster.

Edwards(1991) pointed that the coincidence of individual ability and expected ability for a

work can be used to express the work performance. In this study, the rescue performance of

flooding disaster based on urban residents‟ perception was evaluated. The urban residents

living in high potential flooding area are sampled to examine their perception and attitude in

flooding disaster rescue. The structural equation modeling is then used to develop the model to

evaluate the rescue performance of flooding disaster. The study results can supply a reference

on the prevention and protection of flooding disaster in the future.

2. Literature Review

The Article 2 at the disaster prevention and protection act, Taiwan formulates the hazards

caused by any of the following disasters: windstorm, flooding, earthquake, drought, frost, and

debris flow is called a disaster. It is a rule that the disaster prevention and protection units

should usage completely all kinds of supplies and facilities for disaster prevention and

protection. Fritz(1961) and Mileti(1999) indicated that a disaster is a hazard occurrence, which

destroys seriously the social operation and causes loss of life, property and environment.

Therefore, the disaster prevention and protection is not only the rescue of firefighting unit, but

also use well the resources of human, equipment and facilities to mitigate loss of life and

property in the shortest time (Yeh, 2003). Chen(2002) pointed out that flooding prevention and

protection affairs includes the prevention propaganda of heavy rain and strong winds to

residents before disaster, remove of collapsed tree and dropped banner, disaster area control,

victims trapped rescue, Search for missing people, pumping of basement in water, and

transportation of food and water, which need the implement and assistance of firefighters. 柯

志明(2006) took Taipei, Taiwan as an example and indicated that the influence factors of

flooding rescue performance includes the training frequency, extent and content of disaster

prevention and protection, performance assessment, unit character, management operation,

commanding and coordination of rescue workers, grasp of disaster situations, information

delivery and supports from other units. Hu(2005) studied the rescue performance of disaster

rescue system of Nantou County Government, Taiwan during Typhoon-Mindulle-caused

flooding disaster, 2004, and pointed out some shortcomings such as lack of dedicated unit,

apply procedure complicatedly of helicopters, weak role of national army and police on rescue

system, and poor communicate of official and unofficial between Organizations. Yang(2009)

emphasized that the information system should be planned synthetically to construct the

governmental information integration platform for delivering the disaster situation efficiently

and systemically based on the rescue problems of Typhoon-Morakot-caused flooding disaster.

Yang(2009) also denoted that the works of disaster rescue can be connected by information,

Page 29: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

26

mobilization and inter-organizational cooperation based on the literatures.

3. Method

The purpose of the study was to analyze residents‟ perception toward influence factors of

rescue performance of flooding disaster and to develop a practical evaluation model of rescue

performance of flooding disaster. The residents in the high-potential area of flooding in Tainan,

Taiwan were sampled to explore their perception in influence factors of flooding rescue

performance. First, the initial questionnaire was developed based on a review of literatures and

through experts‟ interview and was revised by the content validity index. The content validity

index (CVI) proposed by Waltz and Bausell (1981) was analyzed to test the fit of items to the

domain of content represented in an instrument for developing the formal questionnaire in this

study. The four rating scale (Lynn, 1986) was used to response the proportion of experts who

are in agreement about items, which includes a rating of 1 = not relevant, 2 = somewhat

relevant, 3 = quite relevant, and 4 = very relevant. The ratings of 1 and 2 are considered

“content invalid,”whereas ratings of 3 and 4 are considered to be “content valid”(Lynn,

1986). The CVI of each item can be calculated by the proportion agreement of experts on each

item. An item can be retained as the calculated CVI is greater than the threshold of 3.5. After

executing the CVI, the content of questionnaire was ensured and the formal questionnaire was

developed. In this study, the 5-point scale including 1 = highly disagree, 2 = disagree, 3 =

somewhat agree, 4 = quite agree and 5 = agree was used and the mean of each item in the

questionnaire were calculated to obtain the agreement level of responds.

The reliability scale test was carried out for all sections in order to assessing the internal

consistency of variables. According to document of Babbie (1992), the value of Cronbach‟s

alpha was classified based on a reliability index in which 0.90 –1.00 is very high, 0.70 - 0.89 is

high, 0.30 – 0.69 is moderate, and 0.00 – 0.29 is low. Next, target residents were sampled to

examine their perception in influence factor of rescue performance for a given flooding disaster.

Finally, the structural equation modeling was used to develop an evaluation model of rescue

performance of flooding disaster based on residents‟ perception.

4. Results and Discussion

4.1 Instrument Development

Five experienced fire captains in Taiwan were interviewed in 2013 years to develop the initial

questionnaire for evaluating the resuce performance of flooding disaster. The interview results

were listed as follow.

1. As the predicted rainfall exceeds the standard rainfall before a typhoon occurs, the related

departments should composite an anti-disaster preparedness and response group

immediately for disaster prevention and protection. At this time, the firefighters play the

Page 30: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

27

major roles on the disaster rescue works in a flooding disaster area.

2. Before disaster, the pre-deployment are conduct by the fire Bureau, Taiwan. The rescue

workers, lifeboat and equipment are pre-arranged in a potential disaster area. The disaster

deliver system should be ensured the function. The order about people evacuation should be

implemented by district office staffs and polices. As a disaster is announced and delivered

by resident, the condition of flooding disaster should be delivered correctly, the rescue work

should be implemented at once, and the police and traffic units should be noticed to

blockade the roads in a disaster area for avoiding others to enter. The victims should be

rescued instantly and send to a hospital for saving their life.

3. During disaster, the residents in a disaster area will be evacuated to many locations. A rescue

team is consisted of two firefighters and one lifeboat, and about twenty victims can be

rescued by each team one day. Of course, many teams can implement the rescue works at

the same time, and firefighters and volunteer fire can be replaced to rescue. Under the

different disaster circumstance (e.g. flooding range, flooding depth, flooding velocity,

dangerous level, victims‟ amount and time pressure) and full preparation rate of different

equipment, the rescue performance of flooding disaster has a great variation.

4. Nodaway, there are seven fire battalions comprising 53 fire detachments. The responsible

area of every fire detachment is determined by an administrative district, which will not be

adjusted based on a disaster domain. A total of 481 firefighters and 116 volunteer fires are

distributed in the potential flood disaster area in Tainan, Taiwan, which is not enough to

execute the rescue works of flooding disaster. About 200 human are needed in Tainan,

Taiwan for disaster prevention and mitigation.

5. The rescue equipment of flooding disaster in Tainan, Taiwan includes lifeboat, speedboat,

hovercraft, inflatable, water scooter, pump, command vehicles and ambulances. The full

preparation rate of above equipment is higher than 95%.

As noted in the literature review and interview records, the initial questionnaire is consisted of

three sections including rescue dispatch, rescue mobilization, and Inter-organizational

cooperation comprising a total of 9 factors, and a total of 20 items. The detailed contents of

initial questionnaire in this study depict in table 1.

Next, the content validity index (CVI) was used to revise the items of initial questionnaire. The

analytical results of CVI show all items in the initial questionnaire are greater than 3.5 (see

Table 1) and all items can be retained to form the formal questionnaire in this study.

4.2 Data Collection and Sample Characteristics

The final questionnaire was conducted with the households living in the flooding-prone

districts in Tainan, Taiwan. Only a respondent with over than 20 years old in a household was

chosen randomly to explore the perception of rescue performance of flooding disaster. In this

Page 31: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

28

study, a total of 350 samples were distributed during July to October, 2014, and 226 samples

were obtained with a valid response rate of 67.1%. Of 266 respondents, majority of

respondents are men with a rate of 57.0% and got married with a rate of 68.9%. 42.1% had a

bachelor diploma and 23.7% are aged between 51-60 years old. The resident period of

responds are divided approximately into two groups, that is, 11 to25 years and over than 40

years. About 24.3 % of responds had suffered over than 5 experiences of flooding and the

average flooding records are 2.3.

4.3 Descriptive Information

In this study, the mean of each item in the questionnaire were calculated to obtain the

agreement level of respondents. As shown in table 1, the agreement level of items ranges in

3.975 to 4.277, which revealed responds commonly agree with the items. Among the section of

“rescue dispatch”, the highest and lowest agreement levels were the items of “Check rescue

equipment (X2)” and “Inquire ability of disaster (x4)” respectively. Similarly, among the

section of “rescue mobilization”, the highest and lowest agreement levels were the items of

“Announce and delivery system of disaster (x6)” and “Training of rescue groups (x12)”

respectively. Among the section of “Inter-organizational cooperation”, the highest and lowest

agreement levels were the items of “Follow command and contact from disaster response

center (x18)” and “Circumstance understanding degree to flooding -prone area (x15)”

separately.

4.4 Analytical Results of Structural Equation Modeling

In order to assessing the internal consistency of variables, the Cronbach‟s alpha proposed by

Babbie (1992) was used to calculate the alpha of each section. As shown in Table 1, the

resulting alpha values ranged from 0.550 to 0.738, which fall into the classification of moderate

and high. That is to say, the alpha values in this study were within the acceptable range to

assure reliability.

The structural equation modeling was used to develop the rescue performance evaluation of

flooding disaster based on 235 respondents‟ opinion. Table 2 listed the results of goodness-of –

fit of the proposed model, which shows the proposed model pass through the verification. The

weights of items in the proposed model were listed in table 3.

4.4 Illustration of Application

Table 3 presented illustrated application of the proposed model to calculate the rescue

performance of flooding disaster. The rescue performance value of flooding disaster can be

calculated by summation of score of each item. The score of each item was the multiply of

weigh and valuation of each item. The illustrated rescue performance value was 74.39, which

was greater than 70. If a threshold value is assumed to be 70, the illustrated case can be

Page 32: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

29

regarded as good rescue performance.

5. Conclusion

The need of modern people for the service of firefighters is increasing. Thus, the rescue ability

of disaster should be strengthen and stressed for firefighter department to fit the need of people.

Under the change of global climate, the rescue of flooding disaster is major issue for firefighter

department in Taiwan. Because residents is the principal part of rescue works, the residents in a

high potential disaster area were investigated to develop an evaluation model of performance

rescue of flooding disaster using the structural equation modeling. An illustration was used to

present the calculation procedure of rescue performance of flooding disaster as well. The

proposed model should be revaluated revised through actual implementation.

Page 33: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

30

Page 34: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

31

References

C. E. Fritz, Disasters in R. K. Merton and R. Nisbet (Eds.), Contemporary Social Problems

(New York, 1961).

D. S. Mileti, (1999), Disasters by Design : a reassessment of natural hazards in the United

States (Washington, 1999).

C.H. Yeh, Proposing a Fire Rescue Management Strategy for High-rise Superstructure, Master

Page 35: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

32

thesis of Graduate Institute of Civil and Disaster Prevention Engineering at National

Taipei University of Technique, Taiwan (2003).

C.Y. Chen, A study of Fire Department Rescue about Keelung River Flood-The Example of

Taipei City Fire Department Rescue Nari Typhoon, Master thesis of Department of Fire

Science at Central Police University, Taiwan (2002).

S.W. Hu, Master thesis of EMBA of Master Program in Urban Governance at Tunghai

University, Taiwan (2005).

Y.N. Yang, Research on Disaster Rescue System: The 88 Flood Case in Taiwan, Journal of

Public Administration 32, 143-169 (2009).

C.F. Waltz and R.B. Bausell, Nursing research: Design, statistics, and computer analysis.

Philadelphia:F. A. Davis. (1981).

M.R. Lynn, Determination and quantification of content validity, Nursing Research 35,

382-385 (1986).

E. Babbie, The practice of social research. California: Wardsworth Publishing Company

(1992).

J.R. Edwards, Person-job fit: A conceptual integration, literature review, and methodological

critique, International review of industrial and organizational psychology (1991).

Page 36: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

33

SICASE-828

Fatique Resistance of Warm Mix Asphalt Using Bayat Natural Zeolite and

Elastomeric Polymer Bitumen

Ani Tjitra Handayani 1Doctoral Candidate at Civil Engineering Department, Diponegoro University, Indonesia

[email protected]

Bagus Hario Setiaji

Civil Engineering Department, Diponegoro University, Indonesia

[email protected]

Ani Prabandiyani

Civil Engineering Department, Diponegoro University, Indonesia

[email protected]

Abstract

The development of increasingly dense traffic and weather changes greatly affect the quality of

the pavement which could cause premature damage. Polymer modified asphalt is used to reduce

the early damage and increase the durability of pavement to various damage such as fatigue,

cracking due to temperature changes. All this time Polymer asphalt mixing process is using hot

asphalt metode. According to the name the hot mixing asphalt requires heating at a certain

temperature which is quite high on the Asphalt Mixing Plant (AMP), also requires a certain

density. Some countries have developed asphalt mixture known as Warm Mix Asphalt by mix

and compaction temperatures lower than hot asphalt mixtures using added material. Research

using experimental methods with polymer bitumen as a binder in the warm mixed asphalt with

the added material of natural zeolite, thus obtained mixture quality hot asphalt mixture

equivalent but processed by low mixing and compaction temperatures. Levels of 1% natural

zeolite materials added to the warm mix asphalt with asphalt binder polymer in addition to

reduce the temperature of mixing / compaction temperature of 10 ° C on a hot asphalt mixture of

pure asphalt binder without zeolite from 156oC becoming 146oC also have greater fatigue

resistance, of hot mix asphalt with pure asphalt binder.

Keywords: Fatigue Resistance, Zeolite as a Material added, Asphalt Polymers

1. Introduction

1.1 Background

Polymer modified asphalt is used to improve the durability of pavement to various damage such

as fatigue, permanent deformation, cracking due to temperature changes, [1].

Page 37: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

34

But unfortunately polymer modified asphalt mixing process, this time using the method of Hot

Mix Asphalt. Hot asphalt mixture using a polymer modified asphalt intended to increase

resistance to a variety of damages, require the mixing temperature in Asphalt Mixing Plant,

which is higher around 175oC [2]. Mixing temperature is the temperature where the bitumen has

a viscosity of 170 ± 20 cSt viscosity whereas for asphalt compaction temperatures between 280 ±

30 cSt [3]. High temperature of mixing and compaction in the process of making asphalt

mixture resulted in a lot of fuel, exhaust emissions are large and high costs [4].

Some countries have developed asphalt mixture with mixing and compaction temperatures lower

than hot asphalt mixture known as Warm Mix Asphalt. Warm mix asphalt technology has

become the main method in the use of road construction in the United States and the world, it is

because the fuel savings, environmentally friendly [8]. Warm Mix Asphalt, produced in AMP

and compacted in the field while maintaining the required workability so it can be spread and

compacted well [5]. Classification of warm mix asphalt based on the technology, can be

classified into three types; based on chemical uses, water uses and process using water and

additive[5]. Most research warm mix asphalt using pure asphalt binder with the added ingredient

of synthetic zeolite. In this research, the material used is asphalt binder polymer elastomer types

Starbit E-55and the added materials used are natural zeolite Bayat. Natural zeolite serves as a

material added by utilizing the water it contains, can increase the volume of bitumen/asphalt

during mixing and compaction [7]. Using elastomeric polymer bitumen as the bonding material,

While the bonding material using asphalt elastomeric polymer, with with expectations of getting

a mixture that has a great fatigue resistance that can be mixed and compacted with a bunch of

lower temperature than the hot mix asphalt with pure asphalt binder that is often used in

Indonesia.

1.2 Objectives

The main objectives of this research include: (1) examine the effect of zeolite as an added

material to develop warm mix asphalt using asphalt polymer with the added material of natural

zeolite (2) assess the optimum zeolite content that meets the specifications Marshall (3) assess

the fatigue resistance of asphalt hot mix asphalt with polymer binder at the mixing temperature

GCC and compaction temperatures lower than hot mix asphalt binder pure asphalt penetration 60

/ 70.

2. Experimental Work

2.1 Materials and Mix Proportion

This warm mix asphalt research using materials added natural zeolite, types of mineral

mordenite sourceds from Bayat, Central Java, Indonesia, in powder form through sieve no.400.

Page 38: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

35

Natural zeolites are used because they are cheap and Indonesia is one of the countries with the

largest deposits of natural zeolites [11].

Before use the zeolite first processed by chemical activation methods to clean the surface of the

pore, to dispose impurity compounds, and re-measure the location of the atoms that are

exchanged, so that the zeolite pores can be cleaned to increase the water content to be used, In

this research, the polymer modified asphalt was a polymeric bitumen elastomeric. Based on the

ability of Elastomeric polymer bitumen are more resistant to deformation after receiving a load

on its surface, will stretch the surface and return to its original shape after the load is lost. In

this research, Elastomeric polymer bitumen/asphalt used was asphalt Starbit E-55. To get a

comparable mix of warm asphalt mixture using elastomeric polymer bitumen without zeolite

[10]. The aggregate was from Subang, West Java, with the combined aggregate gradation to

wear layers.

2.2 Details of Experimental Tests.

The first thing to do is to test the materials to be used, the aggregate, Elastomeric polymer

bitumen/asphalt (Starbit E-55) and natural zeolite, penetration bitumen 60/70. Asphalt testing

performed on elastomeric polymer bitumen and penetration bitumen 60/70. Tests conducted on

two kinds of aggregate, the coarse aggregate and fine aggregate, which are both taken from

Subang, West Java. Before making an asphalt mixture, natural zeolite as an ingredient added,

activated in advance using chemical activation. Then Marshall experiments conducted to obtain

the optimum bitumen content in asphalt content between 5% to 7%, with increases of 0.5% each,

on any mixture containing zeolite content of 0%, 1% and 3% were mixed at temperatures of

mixing and compaction temperatures, according to the results of testing of elastomeric polymer

bitumen 0% zeolite is between 173 ° C - 179 ° C, whereas, the compaction temperature between

159 oC - 165 oC. In this study for normal mixture (without zeolite) for comparison with the

binder is a mixture of pure bitumen 60/70 penetration mixing temperature was set to 156 ° C, and

compaction temperatures of 142 oC.

Elastomeric polymer asphalt mixture characteristics were evaluated using Marshall [10] on each

mix asphalt Starbit E-55 with levels of natural zeolite (0%, 1%, 3%). Based on the experiment

Marshall obtained the optimum bitumen content of 5.8% (0% zeolite content), 5.86% (1%

zeolite content) and 5.95% (3% zeolite content).

Blend asphalt mixture Starbit E-55, with the zeolite content variation tested with Marshall. Then

obtained mixture that produces values that meet the specifications. The connection of viscosity

and temperature of the elastomeric polymer bitumen with material added natural zeolite can not

be done, because the process of mixing zeolite done by the dry method. Aggregate heated first,

then the natural zeolite and asphalt poured simultaneously. If seen by viscosity and is associated

only with the mixing and compaction temperatures, as if the addition of natural zeolite as

Page 39: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

36

material added cannot reduce the temperature of mixing and compaction.This is in accordance

with research which states that viscosity measurements and conditions in this way only suitable

for conventional asphalt, but not suitable for warm mix asphalt testing [12]. To find out the

fatigue resistance of warm mixed asphalt using asphalt binder Starbit E-55, which combined

natural zeolite as an added ingredient, testing the mixture with mixing and compaction

temperatures lower than normal temperature (176oC / 162oC). Mixing / compaction temperature

used was 166oC / 152oC; 156oC / 142oC; 146oC / 132oC. For comparison hot mix asphalt with

pure asphalt binder mixed and compacted at a temperature of 156oC / 145oC.

Analysis will be conducted on the experimental results, which include testing of all the

properties of the mixture are planned. The nature of the mixture and volumetric done by testing

on a variety of mixing and compaction temperatures, with several levels of zeolite materials

added, and compare the properties of each of the pure asphalt binder and asphalt mixture with a

polymer binder.

3. Results and Discussion

3.1 Aggregate Tests performed on coarse aggregate, fine aggregate and gradation, the results

can be seen in Table 1, Table 2 and Figure 1.

Page 40: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

37

Based on Table 1 the results of testing of coarse aggregate and Table 2 the results of testing of

fine aggregate, and Figure 1 gradation test results, the results showed that all three test

materials that will be used to make the mixtures according to the specifications. Zeolite using

chemical activation method test result produces moisture content of 18.99%. Table 3 shows the

results of testing 60/70 penetration bitumen, bitumen of penetration 60/70 looks that meet the

specifications [3] so that the material consists of aggregates, asphalt and zeolites can be used to

make asphalt mixture. In this study, the effect of the use of warm mix asphalt binder to be

analyzed based on the results of the Marshall test. Mix asphalt, penetration 60/70, used as a

benchmark mix from warm mix asphalt with asphalt binder polymer and additive materials

zeolite levels 1% and 3% which used to reduce the temperature. Effect of natural zeolite levels

on asphalt mixture Starbit E-55 as shown in Table 3.

Page 41: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

38

In Table 1, it appears in general that, with using the polymer bitumen as a binder in hot mix

asphalt with added zeolite materials as a medium to reduce the temperature, make VIM value

increased due to the water vapor produced from heating the zeolite causing the air cavity

between the aggregate grains encased in asphalt increased, while the value of the stability

increased on the condition of 1% zeolite content, but the content of zeolite for more than 1% lead

to decreased stability values. Thus, the mixture can be selected to decrease the temperature of

mixing and compaction temperatures are elastomeric polymer modified asphalt mixture with

zeolite content passes 1% as shown in Table 5.

To determine the effect of the use of polymer bitumen as a binder in the warm mixed asphalt to

the fatigue resistance, can be seen in Table 5, Table 6 and Figure 2.

Page 42: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

39

Based on Figure 2 and Table 6 and Table 7 shows that the strain rate is inversely proportional to

the amount of loading up to collapse, the greater the strain given, Causes, the number of loading

cycles will be shorter. This is because the magnitude of the applied strain causes the greater the

voltage generated to maintain the strain. The load received in the mixture will be greater, thus

have an impact on

In general, asphalt mixture with asphalt binder Starbit E-55 and 1%n natural zeolite as a material

added had pretty good resistance to fatigue compared with the asphalt mixture with pure asphalt

binder penetration 60/70. Can be seen from the average number of repetitions of loading to

collapse in asphalt mixture of normal Starbit 66367.5 higher than in the mixture of asphalt binder

asphalt, penetration 60/70 size 39097.5.

Page 43: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

40

The average load repetitions to collapse on the warm mixed asphalt, asphalt mix Starbit E-55

with 1% zeolite higher than the mixture asphalt penetration 60/70.

4. Conclusions

Based on the test results, the influence of the polymer as a binder asphalt on warm mix asphalt

with natural zeolite as a material added, can be concluded, that the asphalt binder polymer can be

used in hot mix asphalt to the required temperature for mixing / compaction 10oC lower than the

required temperature at the warm mix asphalt with asphalt binder 60/70 penetration. Based on

the average number of repetitions, loading to collapse on asphalt mixture of normal Starbit

66367.5 higher than the asphalt mixture with asphalt binder 60/70 penetration 39097.5. The

average load repetitions to collapse on the warm mix asphalt blend asphalt Starbit E-55 with 1%

zeolite higher than the asphalt mixture 60/70 penetration.

5. Acknowledgement

The authors highly appreciate the financial support from Sekolah Tinggi Teknologi Nasional

Yogyakarta (STTNAS Yogyakarta). The support of the Building Material Laboratory staffs at

the Faculty of Engineering, Pusat Penelitian dan Pengembangan Jalan, Bandung,Indonesia and

for their assistance in conducting the experimental works are also gratefully acknowledged.

Disclosure

The paper has not been previously published, is not currently submitted for review to any other

journal, and will not be submitted elsewhere before a decision is made by this journal.

References

[1] Yildrim, Y. 2007.Polimer Modified Asphalt Binders, Journal Construction & Building

Materials, Vol.21 No.1. pp.66-72,2007.

[2] Indonesia, Kementrian Pekerjaan Umum. Spesifikasi Umum Revisi 2. Jakarta: Ditjen Bina

Marga, 2010.

[3] Asphalt Institute. Mix Design Methods for Asphalt Concrete and Other Hot Mix Types.

MS-2 Sixth Edition Lexington: Asphalt Institute, 1993.

[4] D‟Angelo, J., Harm, E., Bartoszek, J., Baumgardner, G., Corrigan, M., Cowsert, J.,

Harman,T., Jamshidi, M., Jones,W., Newcomb, D., Prowell, B., Sines, R., dan Yeaton, B.

2008, „Warm Mix Asphalt: European Practice‟, Publication FHWA-PL-08-007. FHWA,

U.S Depertmen of Transportation, February 2008.

[5] Gierhart, D. Warm Mix Asphalt-what is it and how can we benefit?. In SE States Pavement

Association Management and Design Conference Southeast Pavement Preservation

Partnership Meeting.Lexington, 2009.

[6] Cho, Doong Woo. Development of Warm Mix Asphalt Technology. In Joint Work Shop

Between KICT and IRE October 29-30, 2012. Bandung.IRE, 2012.

Page 44: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

41

[7] Prowell, B.D, Hurley,G.C and B. Frank. Warm Mix Asphalt. Best Practices, National

Asphalt Pavement Association, Lanham:NAPA, 2011.

[8] Hurley, G. dan Prowell, B.D. Evaluation of Potential Processes for Use in Warm Mix

Asphalt, Journal of the Association of Asphalt Paving Technologists. Proceedings of the

Technical Sessions, 2006 Annual Meeting. Vol.75, pp. 41-90, 2006.

[9] Hurley, G. C. dan Prowell, B. D. 2009, Evaluation of Aspha-Min Zeolite for Use in

Warm-mix Asphalt, NCAT Report 05-04, National Center for Asphalt Technology, Auburn

University, Auburn, Alabama

[10] American Association of State Highway and Transportation Officials 2012. Resistance to

plastic flow of bituminous Mixtures Using Marshall Apparatus. AASHTO 2008. Standard

Specifications for Transportation Materials and Methods of Sampling and Testing,

Washington, DC.

[11] Sugih, P. 2008, Evaluasi Memanfaatkan Sumber Daya Alam Daerah di Sumatera Barat,

Media Litbang Provinsi Sumatera Utara, Vol.5, No.4, pp.246-254.

[12] Zaumanis. M. 2010. Warm Mix Asphalt Investigation Master of Science. Thesis, Riga

Technical University.

Page 45: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

42

Computer & Information Science I / Electrical and Electronic

Engineering

Session Chair: Yonglei Tao

SICASE-727

Pw/GAKE: An Efficient and Provably-Secure Password-based Authenticated Group-Key

Exchange Protocol

Wuyang Cai︱Dalian University of Technology

Yuan Tian︱Dalian University of Technology

SICASE-388

The Newest Double-Population Particle Swarm Optimization

Wenjing Liu︱Inner Mongolia University of Science & Technology

Jianguo Wang︱Inner Mongolia University of Science & Technology

Zhijie Zhang︱Inner Mongolia University of Science & Technology

Da Lv︱Bao Tou College

SICASE-776

Learning Issues in Opportunistic Software Development

Yonglei Tao︱Grand Valley State University

SICASE-818

Active Low Pass Filter with Transmission Zero Using OTA-TURC

Sorapong Wachirarattanapornkul︱King Mongkut’s Institute of Technology Ladkrabang

(KMITL)

2015/6/27 Saturday 13:00-14:30 Room 2

Page 46: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

43

SICASE-727

Pw/GAKE: An Efficient and Provably-Secure Password-based

Authenticated Group-Key Exchange Protocol

Wuyang Cai

Software School, Dalian University of Technology, P.R. China

[email protected]

Yuan Tian

Software School, Dalian University of Technology, P.R. China

[email protected]

Abstract

The authenticated group key exchange protocol is one of the most fundamental security

components in network environment, particularly in contemporary wireless mobile/ad hoc

networks. The password-based key exchange protocol accepts quite a lot of research because of

its practical advantages, however, most schemes are for 2-party cases. In this paper a

highly-efficient, password-based authenticated group-key exchange protocol named Pw/GAKE

is constructed which security is based-on the Decisional Diffie-Hellman Problem‟s hardness.

During this protocol‟s session all group members have only one-round message transmission

and only need to carry out exponential and fast hash computation(no public-key schemes are

required), making it particularly suitable to small-scale groups in modern wireless/ad hoc

networks. The protocol‟s security is proved in random-oracle model by reducing its security to

Abdella-Pointcheval‟s 2-party key-exchange protocol (SPAKE)‟s security.

Keywords: Password-based Authentication, Group Key Exchange, Decisional Diffie-Hellman

Problem, Provable Security.

1. Introduction

Authenticated group-key exchange protocol is one of the most critical security infrastructures

for modern networks, particularly for wireless mobile and ad hoc networks. In comparison with

traditional 2-party key-exchange mechanisms, group-key exchange is subjected to some new

requirements and properties together with more complicated security proof[1-4,17-20]. For

example, the realistic group communication environment is usually dynamic in which group

members can join or leave, as a result the group-key needs to be updated correspondingly and

the communication complexity is relatively more demanding than 2-party protocols.

Furthermore, a reliable group-key exchange protocol must have a rigorous security proof in

terms of contemporary cryptography theory. So far lots of group-key exchange protocols have

been proposed, some by cryptography but more by application community, however, only few

Page 47: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

44

of them have satisfactory security proofs. Most schemes have only heuristic analysis which is

quite insufficient for secure applications, e.g., the famous Ateniese-Steiner-Tsudik protocol[2]

is found to have lots of security flaws[19]. Fortunately Bresson, et al. in [3] established a

widely acceptable group-key exchange security model which is similar as the semantic

(computational indistinguishability) security model established by Bellare-Rogaway for 2-party

key exchange protocols.

Authentication is one of the necessary requirements for the group-key exchange protocol. In

contrast to the long random secret number, the short and easy-to-remember password is an

efficient and popular solution to authentication in practice. Intuitively speaking, a

password-based solution is secure if it prevents any dictionary attacks and as a result the

relatively most efficient attack is (provably) on-line password guessing.

Besides the 2-party password-based authenticated key-exchange protocols[5-11] there are also

solutions to the case of group communications[1,12-15,20], among which most are in the

random-oracle model and based-on some Diffie-Hellman hardness variants. Some of them

have O(N) while others have O(1) communication complexity[13] (where N is the group size).

The widely accepted security model for the password-based authenticated group-key exchange

protocol is recently established in [12]. In [20] a O(1) communication complexity solution is

constructed in standard-model which computation complexity is much higher than

random-oracle solutions. Compared with the 2-party protocol design, there are more challenges

to the efficient group solutions.

2. Contributions

In this paper we construct an efficient and provably-secure password-based authenticated

group-key exchange protocol based-on the decisional Diffie-Hellman hardness, named

Pw/GAKE hereafter, in the random-oracle model. This construction is an interesting extension

of the Abdalla-Pointcheval‟s 2-party protocol SPAKE[7] in the group scenario([7] proposed

two versions, SPAKE 1 and SPAKE 2, which slight differences are not essential to our

Pw/GAKE‟s construction so they are simply called SPAKE hereafter). Pw/GAKE‟s security is

proved in terms of security notion in [12]. More interestingly, this security proof is a reduction

from Pw/GAKE‟s security to SPAKE‟s security (i.e., any attack against Pw/GAKE is reduced

to an attack against SPAKE).

As for the performance, in addition to the high computation efficiency a random-oracle-based

solution can generally have, Pw/GAKE needs no complicated cryptographic computations and

its only operations come from hash and power calculations on the underlying (mathematical)

group. The typically related works are [12,13]. [12]‟s prototype comes from [2] and [13] is

actually a variant of the Bermester-Desmedt scheme. All these works (including ours) are

based-on essentially the same computational hardness hypothesis. Pw/GAKE and [12] have

Page 48: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

45

O(N) communication complexity but Pw/GAKE needs only one-round message

communication (during which the message transferred from the first to the last group member)

and one broadcast, however, [12] needs one-round communication plus N peer-to-peer

authentications between each group member and the group controller. With respect to

computation complexity, each group member in Pw/GAKE only needs O(N) power, one hash

and one message authentication code(just another hash) operation while each member in [12]

needs O(N) power, O(1) hash (but O(N) for the controller) and one zero-knowledge proof

operation. [13] has only O(1) communication complexity but it needs (besides the random

oracle) the ideal cipher scheme. Each member in [13] needs O(1) power, O(1) hash and O(1)

ideal cipher encryption/decryption operations. In practice the ideal cipher‟s implementation is

much more complicated than the random oracle. In addition, [12-13] need three random oracles

but Pw/GAKE needs only one.

It‟s worthwhile to indicate that a theoretical solution with O(1)-communication complexity is

not always efficient in realistic network environments. Its real efficiency depends on the

underlying media access control mechanism[21]. For example, in the collision-free network

(e.g., TDMA channel) such solution can reach its ideal performance. However, in the colliding

network (e.g., wired/wireless Ethernet or CSMA channel) the actual communication

complexity depends on the channel‟s overhead: the higher the overhead is, the closer the

performance is to the O(N) solution, as a result in such environment the solutions with O(1)

and O(N) communication complexity usually have no significant differences.

Organization Section 3 presents necessary notions, hardness hypothesis and the security

model. Section 4 presents Pw/GAKE‟s construction. For the sake of space all details and proofs

are put in the appendices.

Notations x||y represents the concatenation of the string x and y. |x| is the bit-size of the binary

string x. If X is a set, |X| represents X‟s cardinality and a←$X represents that a is generated

from X at random with uniform distribution. Poly (k) represents a given polynomial in the

complexity parameter k.

P.P.T. means “probabilistic polynomial time”,PPT

means “P.P.T. indistinguishability”,... FDP

means “perfect indistinguishability”(i.e., having the same probabilistic distribution

function(P.D.F)). All algorithms are represented via pesudo programming language where

/*...*/ presents the comments.

Page 49: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

46

3. Computational Hardness Hypothesis and Security Model

3.1 Group Diffie-Hellman Problem and the Hardness Hypothesis

q is a k-bit prime, G is a (cyclic) group of order q and g is a generator of G.

Definition 3.1(Diffie-Hellman Configuration) Let N be an interger greater than 2, x1,…,xN∈Zq,

z(j,i)∈G for 1≤j≤i≤N, ρ∈G. The expression ij xxx ...ˆ...1 represents ijj xxxx ..... 111 . An expression

ξ≡(z(j,i):1≤j≤i≤N; ρ) is defined as a true G-DDHP(N) configuration on (x1,…,xN) if for each j

and i we have z(j,i)=ij xxx

g...ˆ...1

and ρ=Nxx

g......1

; ξ is defined as a false G-DDHP(N) configuration

on (x1,…,xN) if for each j and i we have z(j,i)=ij xxx

g...ˆ...1

but ρ is a random element in G.

Definition 3.2(Hardness of Decisional Diffie-Hellman Problem, or G-DDHP(N) Hardness for

simplicity) Let k be the complexity parameter, N=poly(k), Y=(G,g)q(k) be the ensemble of

prime order (cyclic) groups, g be a (public) generator of G. For any P.P.T. algorithm A, consider

the following experiment)()(

, kExp NDDHPG

AG

:

x1,…,xN←$Zq;

z(j,i)←ij xxx

g...ˆ...1

, 1≤j≤i≤N;

b←$0,1;

ρ0←Nxx

g......1

; ρ1←$G;

/* so (z(j,i),1≤j≤i≤N; ρ0) is a true G-DDHP(N) configuration on (x1,…,xN) while (z(j,i),1≤j≤i≤N;

ρ1) is the false configuration on (x1,…,xN).*/

d←A((z(j,i),1≤j≤i≤N; ρb));

output(b d);

Define A‟s advantage)()(

, kAdv NDDHPG

AG

≡|2P[1)()(

, kExp NDDHPG

AG ]-1|

= |P[x1,…,xN←$Zq; ξ←(x1,…,xN)‟s true G-DDHP(N) configuration: A(ξ)=1]

- P[x1,…,xN←$Zq; ξ←(x1,…,xN)‟s false G-DDHP(N) configuration: A(ξ)=1]|

(The (x1,…,xN) in the above two probabilistic expressions represent the same group of random

numbers). The G-DDHP(N) hardness on Y means that for any P.P.T. algorithm A its advantage

)()(

, kAdv NDDHPG

AG

is negligible in k. The upper-bound of the advantage for all A is notated as

)()( kAdv NDDHPG

G

.

Page 50: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

47

For our Pw/GAKE‟s security proof(theorem 4.1) the following statement is needed.

Theorem 3.1[3,16]

k、N、Y=(G,g)q(k) have the meaning in definition 3.2. If the decisional

Diffie-Hellman problem is hard on Y, then the G-DDHP(N) problem is also hard on Y.

Concretely: )()( tAdv NDDHPG

G

≤ O(N)))(( 3NOtAdv DDHP

G .

3.2 Security Model

This subsection presents the security model for password-based authenticated group-key

exchange protocol. This model is in computational indistinguishability style and is essentially

the same as that established in [12,13]. Furthermore, in case of two members this model is

reduced to the traditional 2-party password-based authenticated key exchange protocol‟s

seurity mode(e.g., that established in [7]).

A password-based authenticated group-key exchange protocol Π consists of three transactions

(sub-protocols): pwGrpKey, pwJoin and pwRemove. k denotes the complexity parameter,

A=(A1,A2) denotes the two-phase attacker and )((.), kExp pwGKS

denotes an environment providing

A with the following interfaces which are modeled as oracles accessed by A to describe A‟s

passive/active attacking capabilities.

GrpSetup(aux, gid): create a group and assign a set of secret information (including the

password) for group members. aux represents any public information assigned by A, e.g., the

members‟ identities, and gid is the group identity. Furthermore we suppose that every occurred

group transaction is associated with a unique sid and the global transaction identity is gid||sid.

Execute(opcode, param): run a protocol‟s transaction‟s (i.e., one of pwGrpKey, pwJoin and

pwRemove) instance where param is the set of running parameters assigned by A. For example,

Execute(“pwGrpKey”, gid) generates a group-key on the group gid, Execute(“pwJoin”, (gid,U0))

adds a member U0 to the group gid. Execute returns the transaction‟s transcripts (message flow)

to A. Actually this interface describes passive attacks from A(in particular this provides all

information for A to launch its dictionary attacks).

Send(U, M): send the attacker-crafted message M(always including gid||sid as one of its

components) to the member U and return the response of U to A. this interface describes A‟s

active attacks and w.l.o.g. the calling to Send can be regarded as the on-line password-guessing

attacks.

KeyReveal(gid, sid): return the group-key, denoted by Kg(gid||sid), of the group gid to A

generated during its transaction sid and label the transaction gid||sid as “disclosed”. If the

transaction gid||sid has finished then the returning value is null. This interface describes the

Page 51: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

48

known-key attacks and the protocol‟s forward-security.

Corrupt(gid, sid, U): return to A with all instantaneous states of the transaction sid and

permanent secrets of the member U in group gid( if the password can vary with transaction

instances then the password is regarded as an instantaneous state component, otherwise it is a

permanent secret). Furthermore, all transactions on group gid participated by U at and after the

time when Corrupt is called will be labeled as “disclosed” and U is labeled as “corrupted”.

This interface describes A‟s intrusion and known-key attacks (i.e., A collects passwords from

those groups other than the target. We note that some proposed protocols can really resist such

attack but not explicitly present it).

Let Δ denote the candidate password dictionary. Consider the following experiment for the

protocol Π:

1))(, kExp conspwGKS

A

/*for key-consistency property*/

gid*||sid*←AO(.,.)

(k,Δ);

/*where O(.,.) represents the interfaces accessible by A, e.g.,

O(“GrpSetup”,s) means A calls GrpSetup(s), O(“Send”, (a,M))

means A calls Send(a,M), etc. */

if (in the transaction gid*||sid* all members normally terminate

∧there exist members Ui and Uj such that their output K*i≠K*j

∧A doesn‟t corrupt Ui and Uj)

/* where K*i is the group-key output by Ui*/

then output(1);

else output(0);

Define A‟s advantage )(, kAdv conspwGKS

A

≡P[)(, kExp conspwGKS

A

=1].

2))(, kExp indpwGKS

B

, B=(B1,B2): /*for key-security property*/

(St, gid*||sid*)←B1O(.,.)

(k,Δ);

/*w.l.o.g., suppose the transaction gid*||sid* already finished.*/

if( in the transaction gid*||sid* all members normally terminate

∧all members output the same group-key K*g )

then

Z0←K*g; Z1←$0,1

|Z0|; b←

$0,1;

d←B2O(.,.)

(St,Zb); /*Zb is called B‟s test-key hereafter.*/

if (transaction gid*||sid* is not labled as “disclosed”)

output(b d);

else halt;

Page 52: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

49

else halt;

Define B‟s advantage )(, kAdv indpwGKS

B

≡|P[)(, kExp indpwGKS

B

=1|~halt]-1/2|.

The upper-bound of such advantages for all attacking algorithms are notated by

)(kAdv conspwGKS

and )(kAdv indpwGKS

respectively. The protocol Π is defined as semantic

secure (or secure for simplicity), if 1)for any P.P.T. attacker A, the advantage )(, kAdv conspwGKS

A

is negligible, and 2)for any P.P.T. attacker B, we have )(, kAdv indpwGKS

B

≤O(qs)/|Δ|+έ(k) where

έ(k) is negligible in k and qs is the number of queries for B to call its oracle Send(.).

4. Pw/GAKE

Let q be a prime number and its bit-size |q|=k be the complexity parameter. G is a (cyclic)

group of order q and g is G‟s (public) generator. H:0,1+→0,1

L(k) is a random

oracle,∑=(MKG,Tag,Vf) is a UF_CMA secure MAC scheme and f is a pesudo-random

function.

N is the number of group members. For a given group G=U1,…,UN, Ui means it‟s i-th

member which has a public element Mi∈G. All Ui share the password pw.

The adjacent member identifier i and i+1 means that the member Ui and Ui+1 are neighbors in

some specific sense(only meaningful in communication but not in security). s represents a

unique transaction identifier. Each group member Ui has its own specific state including a

secret random number xi. The expression ij xxx ...ˆ...1 means ijj xxxx ..... 111 . To avoid lengthy

expressions we hereafter often use the set of words to express the concatenation of these words

(the meaning is always clear).

Protocol Pw/GAKE:

U1 randomly generates x1←$Zq and a new transaction identifier s, stores its state (x1,

pwxMg 1

1

)

and sends U2 with the following message:

(init, s, pwx

Mg 11

)

On receiving the message from U1, U2 verifies that s is fresh, randomly generates x2←$Zq,

stores the state (x2,pwx

Mg 22

) and sends U3 with the message

Page 53: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

50

(init, s, pwx

Mg 11

||pwx

Mg 22

||pwxx

Mg 221

)

(Note that pwxx

Mg 221

=pwxpwpwx

MMMg 21121 )/)(( and all

pw

iMcan be pre-computed).

In general, Ui(1≤i≤N-1) randomly generates xi←$Zq, stores its state (xi,

pw

i

xMg i

) and sends Ui+1

with the message

(init, s, pwx

Mg 11

||…||pw

i

xMg i

||pw

i

xxMg i...1

||pw

i

xxxxMg iij 11 ...ˆ...

:1≤j≤i-1||pw

i

xxMg i

1

...... 11

)

When UN receives the following message

(init, s, pwx

Mg 11

||…||pw

N

xMg N

11

||pw

N

xxMg N

1

... 11

||pw

N

xxxMg Nj

1

...ˆ... 11

:1≤j≤N-2||pw

N

xxMg N

2

...... 21

)

from UN-1 it does:

verify that s is fresh;

xN←$Zq;

K(N)←NN xpw

N

pw

N

xxMMg )/( 11

... 11

; K a(N)←f(K(N)||1);

Kg(N)←H(U1||…||UN||pwx

Mg 11

||…||pw

N

xMg N

||pw||K(N));

erase xN;

tN←Tag(Ka(N), N||s||pwx

Mg 11

||…||pw

N

xMg N

);

broadcast the following message

(grpkey, s, pwx

Mg 11

||…||pw

N

xMg N

||pw

N

xxxMg Nj ...ˆ...1

:1≤j≤N-1, tN);

On receiving the above broadcasted message each Ui(1≤i≤N-1) does:

K(i)←iNNi xpw

N

pw

N

xxxxMMg )/)(( 11 ...ˆ...

; erase xi;

Kg(i)←H(U1||…||UN||pwx

Mg 11

||…||pw

N

xMg N

||pw||K(i));

/* Kg(i) is the group-key generated by Ui, pw

i

xMg i

comes from Ui‟s state and other pw

j

xMg j

‟s

come from the message. */

Ka(i)←f(K(i)||1);

Verify Vf(Ka(i), N||s||pwx

Mg 11

||…||pw

N

xMg N

, tN)=1;

Page 54: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

51

Broadcast (end, s, Tag(Ka(i), i||s||pwx

Mg 11

||…||pw

N

xMg N

));

On receiving the broadcasted messages (end, s, tj) from Uj(j≠i,N) each Ui(1≤i≤N) verifies that

Vf(Ka(i), j||s||pwx

Mg 11

||…||pw

N

xMg N

, tj)=1. If the verification is true for all j≠i,N the Ui outputs

“accepted, Kg(i), U1,…,UN” otherwise outouts “rejected”.

Note that when N=2 the Pw/GAKE is just the protocol SPAKE2(or SPAKE1 if pw is not

included in the group-key‟s computation formula).

It‟s not hard to check that Pw/GAKE has all features overviewed in section 2. In summary,

the design of Pw/GAKE mainly for small-size group applications is reasonable and practical.

Let Y=(G,g)q(k) be an ensemble of prime order (cyclic) groups on which DDHP is hard.

N is any given constant. Other symbols, e.g., H, ∑, f, have the same meaning as in before.

Theorem 4.1 Pw/GAKE is secure under the above conditions.

5. References

[1] M.Manulis, Security-Focused Survey on Group Key Exchange Protocols, Tech. Report

06-27, Horst-Goertz Institute, Ruhr University of Bochum, Mar 2006.

[2] G.Atenses, M.Steiner, G.Tsudik New Multiparty Authentication Services and Key

Agreement Protocols, IEEE Journal of Selected Areas in Communications, 18(4):628-639,

2000

[3] E.Bresson, O.Chevassut, D.Pointcheval Provably-Secure Authenticated Group

Diffie-Hellman Key Exchange. ACM Transactions on Information and System Security,

16(3):421-454, 2011.

[4] Y.Kim, A.Perrig, G.Tsudik, Tree-based Group Key Agreement, ACM Transactions on

Information and System Security, 7(1):60-96, 2004.

[5] P..Mackenzie, The PAK Suite: Protocols for Password Authenticated Key Exchange, Tech.

Report 2012-46, DIMACS, 2012.

[6] P. Mackenzie, More Efficient Password Authenticated Key Exchange, In D.Naccache ed:

RSA Conf‟01, LNCS Vol.2020, 351-377, 2001.

[7] M.Abdella D.Pointcheval Simple Password-Based Encrypted Key Exchange Protocols, In

Menezes ed: Topics in Cryptology, LNCS Vol.3376, 191-208, 2005.

[8] M.Bellare, D.Pointcheval, P.Rogaway Authenticated Key Exchange Secure Against

Dictionary Attacks, Proc. Eurocrpt‟00, LNCS Vol.1807, 139-155, 2000.

[9] R.Gennaro, Y.Lindell, A Framework for Password-based Authenticated Key Exchange,

Proc. Eurocrypt‟03, LNCS Vol.2656, 524-543, 2003.

[10] R.Canetti, S.Halevi, J.Katz et al, Universally Composable Password-based Key Exchange,

Eurocrypt‟05, 2005.

Page 55: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

52

[11] Feng Deng-Guo, ChenWei-Dong Modularized Design and Analysis of Password-based

Security Protocol, Science in China Series E, 2007,37(1):223-237

[12] E.Bresson, O.Chevassut, D.Pointcheval A Security Solution for IEEE 802.11 Ad hoc Mode:

Password-authentication and Group-Diffie-Hellman Key Exchange, International Journal

of Wireless and Mobile Computing, Special Issue on Security of Computer Networks and

Mobile Systems, 2(1), 4-13, 2007.

[13] M.Abdalla, E.Bressen, O.Chevassut et al, Password-based Group Key Exchange in a

Constant Number of Rounds, In Proc. 9th

International Workshop on Theory and Practice

in Public Key Cryptography(PKC‟06), LNCS Vol.3958, 427-438, 2006.

[14] R.Dutta, R.Barua, Password-based Encrypted Group Key Agreement, International Journal

of Network Security, 6(1):30-41, 2013.

[15] E.Bressen, O.Chevassut, D.Pointcheval, Group Diffie-Hellman Key Exchange Secure

Against Dictionary Attacks, Proc. ASIACRYP‟02, LNCS vol.2501:497-514, 2002

[16] .E.Bressen, D.Pointcheval, The Group Diffie-Hellman Problems, Proc. SAC‟02, In

K.Nyberg ed: LNCS Vol.2595, 325-338, 2002.

[17] Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee, Constant-round Authenticated Group Key

Exchange for Dynamic Groups, In P.J.Lee ed: Advances in Cryptology‟04, LNCS

Vol.3329, 245-259, 2004.

[18] J.Katz, M.Yung, Scalable Protocols for Authenticated Group Key Exchanges, In D.Boneh

ed: Advances in Cryptology‟03, LNCS Vol.2729, 110-125, 2003.

[19] O.Pereria, J-J Quisquater Some Attacks on Authenticated Group Key Agreement Protocols,

Journal of Computer Security, 22(4):555-580, 2012.

[20] J-M Bohli, M.L.G.Vasco, R.Steinwandt Password-Authenticated Constant-Round Group

Key Establishment with a Common Refernce String, Public Key Cryptology, LNCS

Vol.3958, 2006.

[21] K.Pahlavan, P.Krishnamurthy Principles of Wireless Networks: A Unified Approach(5th

ed),

Prentice-Hall Inc., 2005.

6. Appendices

6.1 Some Auxiliary Lemmas

For the security proof in section 4 we present some auxiliary conclusions which also may be of

independent values.

For a given P.P.T. algorithm BN consider the experiment)()(*

, kExp NDDHPG

BG N

(called

G*-DDHP(N) problem hereafter):

x1,…,xN←$Zq;

b←$0,1;

Page 56: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

53

ρ0←Nxx

g......1

; ρ1←$G;

d←BN(1x

g ||…||Nx

g || ρb);

output(b d);

Define BN‟s advantage)()(*

, kAdv NDDHPG

BG N

=|P[)()(*

, kExp NDDHPG

BG N

=1]-1/2| and its upper-bound for

all BN is notated as)()(* kAdv NDDHPG

G

. Note that G*-DDHP(2) is just the decisional

Diffie-Hellman problem(DDHP).

Δ is a public dictionary. For a given P.P.T. algorithm CN consider the experiment

)()(*

),,( kExp NDDHPMG

CG N

(called G*M-DDHP(N) problem hereafter):

x1,…,xN←$Zq; r←

$Δ;

M1,…,MN←$G;

b←$0,1;

ρ0←r

N

xxMg N.....1

; ρ1←$G;

d←CN(M1||…||MN, Δ, rx

Mg 11

||…||r

N

xMg N

|| ρb);

output(b d);

Define CN‟s advantage )()(*

),,( kAdv NDDHPMG

CG N

=|P[)()(*

),,( kExp NDDHPMG

CG N

=1]-1/2| and its

upper-bound for all CN is notated as )()(*

),( kAdv NDDHPMG

G

. When empasizing time complexity,

we use the computation time t instead of k as the variable.

Lemma 6.1 r∈Δ、x1,..., xN∈Zq, r, x1,..., xN are unpublic random numbers which are

independent each other, M1,..., MN are public, R is random and DDHP is hard on Y, then 1x

g

||…||Nx

g ||Nxx

g.....1

PPT

1x

g ||…||Nx

g ||R and

rxMg 1

1

||…||r

N

xMg N

||r

N

xxMg N.....1

PPT

rx

Mg 11

||…||r

N

xMg N

||R

Concretely:

)()(* tAdv NDDHPG

G

≤))1(()1(* OtAdv NDDHPG

G

≤))(( NOtAdv DDHP

G

Page 57: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

54

)()(*

),( tAdv NDDHPMG

G

≤))(()(* NOtAdv NDDHPG

G

≤))(( 2NOtAdv DDHP

G

Proof (1)We construct the solver BN-1 for G*-DDHP(N-1) problem from the solver BN for

G*-DDHP(N) problem. For the input V=v1||…||vN-1||ρ where vi=ix

g and ρ which is either

11...... Nxxg or a random element on G, BN-1 does:

xN←$Zq;

d←BN(v1||…||vN-1||Nx

g ||Nx

);

return(d);

Then)()(*

, tAdv NDDHPG

BG N

≤))1(()1(*

, 1OtAdv NDDHPG

BG N

and furthermore)()(* tAdv NDDHPG

G

))1(()1(* OtAdv NDDHPG

G

. By induction on N we finally have )()(* tAdv NDDHPG

G

))(( NOtAdv DDHP

G

(2) Let CN be the P.P.T. solver for G*M-DDHP(N) problem, from CN we construct the solver

BN for G*-DDHP(N) problem. For the input V=v1||…||vN||ρ where vi=ix

g and ρ is either

Nxxg

......1

or a random element on G, BN does:

M1,…, MN←$G; r←

$Δ;

d←CN (M1||…||MN,Δ,rMv 11 ||…||

r

NN Mv||

r

NM,);

return(d);

So)()(*

),( tAdv NDDHPMG

G

≤))(()(* NOtAdv NDDHPG

G

and by induction on N we get

)()(*

),( tAdv NDDHPMG

G

≤))(()(* NOtAdv NDDHPG

G

≤))(( 2NOtAdv DDHP

G .

Lemma 6.2 r∈Δ、x1,..., xN+1∈Zq, r、x1,..., xN+1 are unpublic random numbers which are

independent each other, M is public, R is random and DDHP is hard on Y, then

R||rxxxx

Mg NNj 11 ...ˆ...

:1≤j≤N-1... FDP

rx

Mg N 1

||rxxxx

Mg NNj 11 ...ˆ...

:1≤j≤N-1.

(hereafter we use the notation ||uj: 1≤j≤n instead of u1||...||un to avoid the lengthy expressions)

Proof Let h=11...... Nxx

g , xiyi=1 mod q, then 11 ...ˆ... Nj xxx

g =jy

h and 1Nx

g =Nyy

h...1

so

Page 58: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

55

R||rxxx

Mg Nj 11 ...ˆ...

:1≤j≤N-1= R||ry

Mh j

:1≤j≤N-1

rxMg N 1

||rxxx

Mg Nj 11 ...ˆ...

:1≤j≤N-1=ryy

Mh N...1

||ry

Mh j

:1≤j≤N-1

Since ryy

Mh N...1

=ryyy

Mh NN )( 11...

and yN is probabilistically independent with y1,…,yN-1,

R||ry

Mh j

:1≤j≤N-1 has the same distribution as ryy

Mh N...1

|| ry

Mh j

:1≤j≤N-1, which ends

the proof.

Lemma 6.3 r∈Δ、x1,..., xN+1∈Zq, r、x1,..., xN+1 are unpublic random numbers which are

independent each other, M is public, R is random and DDHP is hard on Y, then

rxxx

Mg Nj 11 ...ˆ...

:1≤j≤N-1||RPPT

rxxx

Mg Nj 11 ...ˆ...

:1≤j≤N-1||rxxx

Mg NN 111...

Proof. Let D be the P.P.T. distinguisher for rxxx

Mg Nj 11 ...ˆ...

:1≤j≤N-1||rxxx

Mg NN 111...

and

rxxx

Mg Nj 11 ...ˆ...

:1≤j≤N-1||R, we construct the solver E for G-DDHP(N-1) problem(defined in

sec.3.1)from D. For G-DDHP(N-1)‟s given input η=z(j.i): i≤j≤N-1; ρ where z(j,i)=ij xxx

g...ˆ...1

and ρ is11...... Nxx

g or a random element on G, E does:

xN, xN+1←$Zq; M←

$G; r←

$Δ;

return(D(M,rxx

MNjz NN 1)1,( :1≤j≤N-1||

rxMN 1

));

Let)()(*

),( tAdv NDDHPG

G

be the upper-bound of the advantage to P.P.T.-distinguish

rxxx

Mg Nj 11 ...ˆ...

:1≤j≤N-1||rxxx

Mg NN 111...

and pwxxx

Mg Nj 11 ...ˆ...

:1≤j≤N-1||R, it‟s easy to get

that )()(*

),( tAdv NDDHPG

G

≤ ))(()1( NOtAdv NDDHPG

G

. Furthermore by theorem 3.1 we get

)()(*

),( tA d v NDDHPG

G

≤ O(N)))(( 3NOtAdv DDHP

G .

6.2 Party Password-based Authenticated Key-exchange Protocol SPAKE

Suppose two participants U1 and U2 share the password pw, H is a random oracle,

∑=(MKG,Tag,Vf) is a secure(i.e., unforgeable against chosen message attack or UF_CMA

forshort) message authentication code (MAC) scheme, f is a pesudo-random function. The

2-party key exchange protocol SPAKE between U1 and U2 is presented in Fig.1[7].

Page 59: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

56

It‟s easy to see that K1=K2=gxy

and sk1=sk2=H(U1||U2||X*||Y*||pw||g

xy). Actuallly Fig.1 is an

enhanced version of SPAKE 2(SPAKE1 is the same as SPAKE2 except that pw is not explicitly

included in sk1 and sk2‟s derivation.) where, in comparision to the version in [7], we add a

message U1→U2:s, t1 and two MAC operations in order to make SPAKE have explicit

consistency property([7] only proved SPAKE‟s key-security property). Such enhancement

obviously doesn‟t impact SPAKE‟s security. According to [7] both SPAKE 1/2‟s security rely on

the computational Diffie-Hellman problem‟s hardness(SPAKE 1‟s security directly relies‟ on

S-PCCDHP‟s hardness, more details can refer to [7]‟s section 4 and 5).

It‟s not hard to prove the enhanced SPAKE‟s consistency property: Let X2*, Y1*, t1*, t2* be the

message components received by U2 and U1 respectively. The fact that both U1 and U2

normally terminate implies that Vf(Ka1, 2||s||X*||Y1*,t*2)=1 and Vf(Ka2, 1||s||X2*||Y*,t*1)=1.

Since X* and Y* are random and A corrupts neither U1 nor U2(so A doesn‟t known the key Ka1

and Ka2), it must be true that X2*=X* and Y1*=Y*(otherwise the attacker can successfully forge

at least one new message/authentication-code pair, i.e., (2||s||X*||Y1*,t*2) or (1||s||X2*||Y*,t*1),

for the MAC scheme ∑, contradicting ∑‟s UF_CMA security) therefore (sk1, U1,U2)=(sk2,

U1,U2) with a (negligible) exception probability upper-bounded by )(_ kAdv CMAUF

, i.e.,

),,(2/1 se

conspwGKS

SPAKE qqtExp

≤ )(_ tAdv CMAUF

where t、qe、qs are respectively the attacker‟s computation time and number of queries for the

oracle-Excute() and oracle-Send().

Note that from theoretical perspective in the (enhanced) protocol SPAKE it‟s unnecessary to

explicitly include the random session identifier s, because X* and Y* are already random

numbers so X*||Y* can play the same role as s. In practice, however, verifying the fact that s is

not repeated is usually much easier than verifying the same fact on X* and Y*(which are group

elements) so the protocol explicilty include the session id and we do the similiar thing in our

group protocol‟s design in the following.

Page 60: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

57

6.3 Security Proof of Pw/GAKE

Theorem 4.1 Pw/GAKE is secure under the above conditions.

Proof At first we can get the consequence of consistency almost verbatimly following the

argument on SPAKE’s consistency at the end of section 6.2:

),,(/ se

conspwGKS

GAKEPw qqtExp

≤O(N) )(_ tAdv CMAUF

In the following we focus on proving Pw/GAKE‟s security. To emphasize the number of

members in the group, N, during the protocol‟s running we use the notation Pw/GAKE(N). The

critical point in the proof is to establish a relationship between Pw/GAKE(N+1)‟s security and

Pw/GAKE(N)‟s security.

Let AN+1=(AN+1,1,AN+1,2) be the P.P.T. attacker against Pw/GAKE(N+1), we construct an attacker

AN=(AN,1, AN,2) against Pw/GAKE(N) based-on A N+1. Let g(k) and m(k) be respectively the

upper-bound of number of groups attacked by AN+1 and the number of transactions in each

attack. Let M1, M2, ..., MN be public parameters acquired by AN. AN performs the following

steps 1)-5):

1)generate gid0←$

1,...,g(k), sid0←$

1,...,m(k)(i.e.,guessing AN+1,1‟s output gid*||sid*) and

xN+1←$Zq;

2)call AN+1 with parameters M1, M2,..., MN,1Nx

NMand simulate the environment

)()1(/ kExp indpwGKS

NGAKEPw

to interact with AN+1: if the transaction initiated by AN+1( via a request to

Page 61: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

58

one of the environment‟s interfaces) is not that of gid0||sid

0,,AN creates group members U1,

U2, ..., creates a group and assigns its members with a shared password pw (a new password for

each new transaction) and runs Pw/GAKE(N+1) to response the request to)()1(/ kExp indpwGKS

NGAKEPw

from AN+1. Obviously such simulations for)()1(/ kExp indpwGKS

NGAKEPw

on these transactions are perfect.

Each time AN+1 queries H, AN queries it‟s own oracle H with the same parameters and responses

AN+1 with the returning values.

If AN+1 outpus gid*||sid*≠gid0||sid

0 then AN halts. Otherwiase AN outputs gid*||sid*(i.e.,

gid0||sid

0). Denote M(k)≡g(k)m(k) and note that P[gid*||sid*=gid

0||sid

0]≥1/M(k).

3)AN forwards the test-key(refer to sec.3.2) Zb provided by )()(/ kExp indpwGKS

NGAKEPw

to AN+1

and then proceeds.

4)When AN+1 initiates its request for Pw/GAKE(N+1)‟s transaction gid0||sid

0, AN initiates

the corresponding request for the oracle of its own(i.e., calls the same interface of

)()(/ kExp indpwGKS

NGAKEPw

with the same input). If the output ξ returned by the oracle is not

Pw/GAKE(N)‟s grpkey-message, then AN forwards ξ to A N+1 and then sends the message η

responsed by AN+1 to ξ‟s target; If ξ is Pw/GAKE(N)‟s grpkey-message, i.e., ξ=(grpkey,

gid0||sid

0, σ1||…||σN||ωj,N:1≤j≤N-1, tN), then AN randomly generates R0←

$G and sends AN+1

with the following message ξ1

0(to simualte the communication UN→UN+1):

ξ10= (init, gid

0||sid

0, σ1||…||σN||R0||ωj,N:1≤j≤N-1||λN-1)

where λN-1 is the component in the last init-message (init, gid0||sid

0, σ1||…||σN-1|| λN-1||

ωj,N-1:1≤j≤N-2||ωN-1,N-1) of Pw/GAKE(N) obtained by AN;

If AN+1 initiates the request for Pw/GAKE(N+1)‟s grpkey-message and ξ is the same message as

the above, then AN randomly generates R1,R2←$G and forwards the following message ξ

11 to

AN+1:

ξ11= (grpkey, gid

0||sid

0, σ1||…||σN||R1||

1

,Nx

Nj:1≤j≤N-1||R2, t)

5)At last A N outputs whatever is output by A N+1.

Without loss of generality, suppose )()1(/ kExp indpwGKS

NGAKEPw

does not halt so )()(/ kExp indpwGKS

NGAKEPw

doesn‟t halt either. In the event that all members participating the transaction gid0||sid

0 normally

terminate with the same key and gid0||sid

0 is not labeled as “disclosed”, it‟s obvious that

Page 62: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

59

σi=pw

i

xMg i

, 1≤i≤N-1; ωj,N =pw

N

xxxMg Nj ...ˆ...1

:1≤j≤N-1

with the exception probability of O(N)/2L(k)

where L(k) is the key-size. Denote

)(!),1(/ kExp indpwGKS

ANGAKEPwsimulated N

‟s message flow as Ψ1 and the real

)(!),1(/ kExp indpwGKS

ANGAKEPw N

‟s

message flow as Ψ0. Summarize the above arguments, (from AN+1‟s perspective) the only

difference between Ψ0 and Ψ

1 is:

The counterpart of ξ1

0 in Ψ0 is ξ

00 = (init, gid

0||sid

0,

pwxMg 1

1

||…||pw

N

xMg N

||pw

N

xxMg N.....1

||

pw

N

xxxMg

Nj ...ˆ...1

:1≤j≤N-1||pw

N

xxMg N

1

..... 11

);

The counterpart of ξ11 in Ψ

0 is ξ

01 = (grpkey, gid

0||sid

0,

pwxMg 1

1

||…||pw

N

xMg N

||pw

N

xMg N

11

||pw

N

xxxMg Nj

1

...ˆ... 11

:1≤j≤N-1||pw

N

xxxMg NN

1

... 111

, t) where MN+1=1Nx

NM;

All other corresponding messages in Ψ0 and Ψ

1 have the same distribution.

For further analysis, we need the following lemma which indicates that, from AN+1‟s

perspective, AN‟s test-key Zb is P.P.T. indistinguishable from AN+1‟s test-key.

Lemma 6.4 H is a random oracle, pw∈Δ, x1,..., xN+1∈Zq, pw, x1,..., xN+1 are all independently

random and unknown, g, M1,..., MN+1,U1,...,UN+1,pwx

Mg 11

,…, pw

N

xMg N

11

are public(butNxx

g...1

,

11... Nxxg are unknown), DDHP is hard for Y, then

H(U1||…||UN||pwx

Mg 11

||…||pw

N

xMg N

||pw||Nxx

g...1

)

is P.P.T. indistinguishable from

H(U1||…||UN+1||pwx

Mg 11

||…||pw

N

xMg N

11

||pw||11... Nxx

g )

Proof Denote h0≡H(U1||…||UN||pwx

Mg 11

||…||pw

N

xMg N

||pw||Nxx

g...1

), h1≡H(U1||…||UN||UN+1||

pwxMg 1

1

||…||pw

N

xMg N

||pw

N

xMg N

11

||pw||11... Nxx

g ), h*N≡pwx

Mg 11

||…||pw

N

xMg N

|| pw||Nxx

g...1

, h*R≡

pwxMg 1

1

||…||pw

N

xMg N

||pw||R where R is an arbitrary random number. Denote the upper-bound

of the advantage of the P.P.T.-distinguisher for h0 and h1 as )(, tAdv indSK

MH

and the upper-bound

Page 63: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

60

of the advantage of the P.P.T.-distinguisher for h*N and h*R as )(tAdv indSK

H

where t is the

computation time. The proof consists of the following two steps:

(1)Claim: Under the above conditions we have h*N

PPT

h*R .

Let D be a P.P.T.-distinguisher for h*N and h*R, we construct a P.P.T. distinguisher E via D to

distinguish 1x

g ||…||Nx

g ||Nxx

g...1

and 1x

g ||…||Nx

g ||R. i.e., E efficiently solves the

G*-DDHP(N) problem(sec.6.1). For the given input (1x

g ,…,Nx

g , ρb) where b∈0,1, E

performs:

randomly generate r, M1,...,MN;

return(D(rx

Mg 11

||…||r

N

xMg N

||r||ρb));

Obviously)(, tAdv indSK

DH

≤))(()(*

, NOtAdv NDDHPG

EG

and furthermore by lemma 6.1 we have

)(tAdv indSK

H

≤))(()(* NOtAdv NDDHPG

G

≤))(( 2NOtAdv DDHP

G . As a result h*N

PPT

h*R .

(2) By the above fact we get

h0 = H(U1||…||UN||pwx

Mg 11

||…||pw

N

xMg N

||pw||Nxx

g...1

)

PPT

H(U1||…||UN||pwx

Mg 11

||…||pw

N

xMg N

||pw||R)

PDF

H(U1||…||UN||UN+1||pwx

Mg 11

||…||pw

N

xMg N

11

||pw||R)

PPT

H(U1||…||UN||UN+1||pwx

Mg 11

||…||pw

N

xMg N

11

||pw||11... Nxx

g ) = h1

and it‟s easy to derive the inequality

)(, tAdv indSK

MH

≤ 2 ))1(( OtAdv indSK

H

≤ 2))(( 2

, NOtAdv DDHP

EG

which ends lemma 6.4‟s proof.

Now by lemma 6.1‟s second part we get

pwxMg 1

1

||…||pw

N

xMg N

||pw

N

xxMg N.....1

||pw

N

xxxMg

Nj ...ˆ...1

:1≤j≤N-1||pw

N

xxMg N

1

..... 11

)

PPT

pwx

Mg 11

||…||pw

N

xMg N

||R0||pw

N

xxxMg

Nj ...ˆ...1

:1≤j≤N-1||pw

N

xxMg N

1

..... 11

)

Page 64: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

61

i.e., ξ10

PPT

ξ0

0 .

Furthermore by lemma 6.2-6.3 we get

pwxMg 1

1

||…||pw

N

xMg N

|| R1||pw

N

xxxMg Nj

1

...ˆ... 11

:1≤j≤N-1|| R2

PPT

pwx

Mg 11

||…||pw

N

xMg N

||pw

N

xMg N

11

||pw

N

xxxMg Nj

1

...ˆ... 11

:1≤j≤N-1|| R2

PPT

pwx

Mg 11

||…||pw

N

xMg N

||pw

N

xMg N

11

||pw

N

xxxMg Nj

1

...ˆ... 11

:1≤j≤N-1||pw

N

xxxMg NN

1

... 111

i.e., ξ11

PPT

ξ0

1. Combining all the above analysis we get

)(!),1(/ kExp indpwGKS

ANGAKEPwsimulated N

PPT

)(!),1(/ kExp indpwGKS

ANGAKEPw N

and concretely

| P[)(

!),1(/ kExp indpwGKS

ANGAKEPwsimulated N

=1]-P[)(

!),1(/ kExp indpwGKS

ANGAKEPw N

=1]|

≤ O(N)))(( 3NOtAdv DDHP

G + O(N)/2

L(k), so

)(),(/ tAdv indpwGKS

ANGAKEPw N

= | P[)(),(/ tAdv indpwGKS

ANGAKEPw N

=1]-1/2 |

≥ (1/M(k))| P[)(

!),1(/ kExp indpwGKS

ANGAKEPwsimulated N

=1]-1/2 |

≥ (1/M(k))| P[)(

1),1(/ tAdv indpwGKS

ANGAKEPw N

=1]-1/2 |

–(1/M(k))| P[)(

!),1(/ kExp indpwGKS

ANGAKEPwsimulated N

=1]- P[)(

1),1(/ tAdv indpwGKS

ANGAKEPw N

=1]|

≥ (1/M(k))()(

1),1(/ tAdv indpwGKS

ANGAKEPw N

–O(N)))(( 3NOtAdv DDHP

G - O(N)/2

L(k) )

equally

)()1(/ tAdv indpwGKS

NGAKEPw

≤ M(k))()(/ tAdv indpwGKS

NGAKEPw

+ O(N)))(( 3NOtAdv DDHP

G +O(N)/2

L(k)

This is the relationship between the security of Pw/GAKE(N+1) and Pw/GAKE(N). By

recursion on N upto N=2, we get the desired relationship bewteen the security of

Pw/GAKE(N+1) and SPAKE:

)()1(/ tA d v i n dp w G K S

NG A K EPw

Page 65: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

62

M(k)N-1 )()2(/ tAdv indpwGKS

GAKEPw

+))((()( 3

21 jNOtAdvNkM DDHP

G

j

Nj + +O(N)/2L(k)

)

≤ M(k)N-1 )(tAdv indpwGKS

SPAKE

+ O(M(k)N-1

N)()))((( 3 kMNOtAdv DDHP

G +1/2

L(k) )

It is already proved in [7] that SPAKE 1/2 are secure under CDHP‟s hardness hypothesis, in

particular, SPAKE is secure under DDHP‟s hardness hypothesis. As a result, for any constant N

the right-hand-side of the above inequality is always negligible in k, which proves

Pw/GAKE(N)‟s security.

Note1: Theorem 4.1 requires DDHP‟s hardness on Y=(G,g)q(k), a stronger condition than that

of the original protocol SPAKE but still a widely used and practical hypothesis.

Note2: In the full version paper concrete efficiency analysis is done for the protocol‟s

instantiations with some specific MAC schemes and DDHP-hard groups.

Page 66: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

63

SICASE-388

The Newest Double-Population Particle Swarm Optimization

Wenjing Liu

Inner Mongolia University of Science & Technology, China

[email protected]

Jianguo Wang*

Inner Mongolia University of Science & Technology China

[email protected]

Zhijie Zhang

Inner Mongolia University of Science & Technology, China

[email protected]

Da Lv

Bao Tou College, China

[email protected]

Abstract

In the iteration process of the particle swarm optimization algorithm, there exist the poor

diversity of population and premature phenomenon. In order to increase the diversity of

population, a new double-population particle swarm optimization (DP-PSO) that based on the

cooperative double-population is proposed. The population will be divided into two parts: local

optimization and global optimization (add the characteristic of the local optimization). For

global optimization, to be using a self-adapting strategy to adjust the accelerating factors which

ensure the swarms to avoid the local extreme and improve the local and global search ability.

Experiments show that the proposed DP-PSO method has been significantly improved in both

convergence speed and computational accuracy.

Keywords:Particle swarm optimization;Double-population;Dynamic adjust; Accelerating

factor

1. Introduction

Particle swarm optimization (PSO) [1] algorithm is proposed in 1995 by James Kennedy and

Russell Eberhart, the basic idea is influenced by the research on the behavior of birds and they

used the model of biological group by the biologists Frank Heppner. Due to the method is

simple and easy to implement, the less parameters and it is not dependent on the issues such as

information characteristics , currently PSO has achieved to success in the applications such as

Page 67: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

64

the function optimization, engineering design and optimization, electric power system [2] , the

robot control [3] and other fields.

However, PSO is also easy to be trapped in local optimum and it has the slow convergence

speed in the late stage and the weak accuracy. Therefore, scholars have proposed many

improved methods, for example Shi and Eberhart introduce the inertia weight w in PSO and

they proposed using an adaptive inertial weight to balance the global convergence and the

convergence speed in the evolutionary process, this evolution equation was called standard

PSO algorithm by scholars [4], [5]. Inertial weight w make particle keep moving, make it have

the trend of expanding searching space, and have the ability to explore new areas. A larger w

has the global convergence ability, and a smaller w has a strong ability of local convergence.

Along with the increase of number of iterations, inertial weight should constantly decrease, so

that particle swarm algorithm has a strong ability of global convergence in initial stage, and

later it has a strong ability of local convergence. Therefore, Shi put forward an adjusting

strategy that uses a linearly decreasing inertia weight, inertial weight should meet:

Where Max-number is the truncated generation, t is the current iteration and w is decreasing

from 0.9 to 0.4. For experimental results of the test, the effect is good. Also, there are many

other improvement methods about w[6],[7]. Clerc introduces a convergence factor in the

update formula to control the trend of convergence in the algorithm, the experimental results

show that this method has better convergence, but for some functions,it cannot reach the

global optimal in the prescriptive iteration times [8]. In the PSO algorithm, c1 and c2 are used to

adjust the particle, s best position and its companions

, best position to influence the movement

of particles. Ratnaweera, A and Halgamuge, S. K. apply linearly decreasing method to adjust

the accelerating factor for the balance of local and global optimization [9]. Then, according to

the change trend of c1 and c2 in different periods, Lin. M. uses cosine function to adjust

accelerating factor [10].The experimental results show that this method has obtained the certain

effect.

In this paper, to consider the influence of the population diversity and the accelerating factors

in the algorithm, an improved particle swarm optimization based on a double-population is

proposed and this paper uses a self-adapting strategy to adjust the accelerating factors in global

optimization. The experimental results show that the proposed DP-PSO is stable and effective;

it performs high accuracy and fast convergence.

Page 68: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

65

2. The Standard Particle Swarm Optimization

Particle swarm optimization algorithm is similar to other evolutionary algorithms, it also uses

the concept of group and evolution, and it performs operation on the basis of the fitness value

of the individual (particles). PSO algorithm regards every individual as a volume-less particle

(a point) in the n-dimensional search space, every particle has a certain velocity in this space,

while in PSO each particle (individual) is updated according to its own flying experience and

the flying experience of group. The ith particle is represented as Xi=(xi1,xi2,… …,xin).

Vi=(vi1,vi2,… …,vin) is the velocity of the ith particle. The best previous position (the position

giving the best fitness value) of the ith particle is recorded and represented as Pi=

(pi1,pi2,… …,pin). The index of the best particle among all the particles in the population is

represented by the symbol g. The particles are manipulated according to the following

equation:

where w is the inertia weight, c1 and c2 are two accelerating factors, and r1 and r2 are two

random functions in the range [0, 1]. All particles in PSO are kept as members of the

population through the course of the run (a run is defined as the total number of generations of

the evolutionary algorithms prior to termination). It is the velocity of the particle which is

updated according to its own previous best position and the previous best position of its

companions. The particles fly with the updated velocities [11].

3. New Double-population Particle Swarm Optimization

3.1 Improved Accelerating Factors

Accelerating factors c1 and c2 represent the weight of acceleration which will pull the particles

to the local optimal location and the global optimal location. Through the research, it founds

that algorithm in ideal condition, all the particles should be as much as possible to fly over the

whole search space, so that it can increase the diversity of particles in the initial stage, and in

the end of the search, the particles with fast velocities and accuracy converge to the global

optimal solution. In this paper we analyze the influence of the accelerating factors to the

algorithm, we propose a strategy which uses arctan function to adjust the accelerating factors to

make the balance between global search and local search. The accelerating factors equation of

c1 and c2 should meet:

Page 69: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

66

Where, c1start and c2start are initial value of c1 and c2, c1end and c2end are final value of c1 and c2,

Tmax is the maximum iterating times, e is adjustment coefficient which control the decay of

the curve. Here we let Tmax=1000, c1start=2.75, c1end=1.25, c2start=0.5, c2end=2.25, e=6and make

comparisons with comparing LPSO、CPSO. The results are depicted in Fig.1.

The whole optimization process of DP-PSO is depicted as follows:

In the initial stage, c1 should be larger so that it is easy to find the optimal value and the

decreasing speed of c1 should be fast in order to improve the convergence speed; and c2 should

be smaller in order to reduce the influence of other particles and improve the global search

ability.

In the late stage, the decreasing speed of c1 should slow down to improve stability; and c2

should be gradually increased so that it can improve the ability of social information sharing

and improve the local searching [12].

3.2 The Strategy of Population Division

When the particle swarm optimization algorithm was used, all particles are following the

global optimal individual to update their positions in the iteration process, that would make the

particles gather around a point, so that the diversity of population fall rapidly, it causes

premature phenomenon. In order to increase the diversity of population, we apply cooperative

double-population of coevolution, where the population will be divided into two populations

and then use two different evolution models. The detailed strategy of population division is

described as follows:

Page 70: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

67

Firstly, it supposes the population has N particles, the population is composed of two parts: Q1

(local optimization) and Q2 (global optimization), Q1 has n1 particles and Q2 has n2 particles,

N=n1+n2; and then use different evolution model for the two parts respectively, where the

population of Q1 uses the equation of the rapid convergence to improve the local optimization

ability; The population of Q1 uses the equation which has global search ability; finally, we use

the equations (4) and (5) to adjust the accelerating factor. The evolution equations are depicted

as follows:

The inertia weight w is employed to control the impact of the previous velocity on current

velocity, and influence the balance between global and local exploration abilities. The role of

Q1 is quickly searching in local area. A smaller inertia weight tends to facilitate local

exploration to fine-tune the current search area, and it has strong local convergence ability, its

task is searching in the area between the current global best position and individual best

position (nearby the global best position), where accelerating the convergence; The role of Q2

is global search around a wide range, when the particles find the new best position, through the

information exchange between particles, Q1 will be guided to the new best position. Due to the

group cooperation, it is not only increasing the diversity of population, but also improving the

efficiency of optimization.

4. Simulation

In this paper, we use three classic functions: Sphere, Rastrigrin and Griewank to test the

standard particle swarm optimization (PSO), LPSO, CPSO and DP-PSO and make

comparisons, the detailed results are depicted in Table 1.

Parameters Setting: the population size N = 30, the maximum iterating times Tmax = 1000, the

dimension is 20, for the single-peak function Sphere function, in the evolution equation

accelerating factor take c1 = c2 = 2, Rastrigrin and Griewank function use equations (4) and (5),

c1start=2.75,c1end=1.25,c2start=0.5,c2end=2.25, adjustment coefficient e = 6, all algorithms are

using linear self-adapting inertia diminishing strategy, every test runs 50 times, taking the

minimum, the maximum and the average as test results.

Page 71: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

68

Table 2 gives the optimal results of three test functions for four algorithms. Table 1 data show

that, for Griewank function, the optimization precision of these methods is very close, it shows

that these methods have the strong global optimization ability. Performing in Sphere (one-peak

function) and Rastrigrin (multi-modal function), the optimization precision of DP-PSO is better

than other methods, it illustrates that DP-PSO do not only have the strong global optimization

ability, but also have a better local optimization ability. For one-peak function, the better

performance of DP-PSO is due to the contribution of the convergence of group Q1. For

multi-modal function, the performance of DP-PSO benefits from the global search of group Q2.

Fig.2 are the curves which fitness value change following the iteration times, in the Fig.2, we

can see from the graphs that DP-PSO has higher optimizing efficiency and accuracy than other

methods.

Page 72: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

69

5. Conclusion

PSO algorithm is a kind of high efficient and novel intelligent optimization algorithm, and its

operation is simple, the performance is well, also it need further improvements. This paper

proposes a strategy based on the cooperative double-population of co-evolution, and we use a

self-adapting strategy to adjust the accelerating factors. In the strategy of dividing populations,

although the evolution equation of each group is generally particle swarm evolution equation

(only different parameter selection), but different parameters settings increase the diversity of

the group, make the particles have defined roles, and improve the searching efficiency.

Through the tests of the classical functions, it shows that the performance of DP-PSO is

evidently better than other PSO algorithms.

6. Acknowledgment

Project supported by the National Natural Science Foundation of China (Grant No.21366017 ) ,

Inner Mongolia department of application and research and development (Grant No.20130302)

and Inner Mongolia University of Science and Technology Innovative Start-up Foundation

(Grant No.2014QDL024).

7. References

1. Kennedy, J., Eberhart, R.C.: Particle swarm optimization. Proceeding of IEEE International

Conference on Neural Networks, 1942-1948 (1995)

2. Zeng J., Liu Z., He S., Yang H.: Study of the reactive power optimization based on

sub-region particle swarm algorithm. Power System Protection and Control, Vol.40, No.1,

Jan.1 (2012)

3. Liu L., Cai Z.: Multi-robot cooperative localization based on particle swarm optimization.

Journal of Central South University (Science and Technology), Vol.42, No.3, Mar (2011)

4. Shi, Y.H., Eberhart, R.C.: Modified particle swarm optimizer. Proceedings of the IEEE

Conference on Evolutionary Computation, ICEC, p 69-73 (1998)

5. Shi, Y.H., Eberhart, R.C.: Parameter selection in particle swarm optimizer. IEEE

Page 73: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

70

International Conference on Evolutionary Computation. Alaska, May 4-9 (1998)

6. Cheng G., Li M., Zhang X.: Particle swarm optimization algorithm based on local reach for

inertia weight. Application Research of Computers, Vol.28, No.3, Mar (2011)

7. Zhao Y., Xu J.: Modified particle swarm optimization algorithm. Computer Engineering and

Applications, 46(2):31-33(2010)

8. Clerc, M., Kennedy, J.: The Particle Swarm-explosion, Stability, and Convergence in a

Multidimensional Complex Space. IEEE Trans. on Evolutionary Computation, 6(1): 58-73

(2002)

9. Ratnaweera, A., Halgamuge, S.K.: Self-organizing hierarchical particle swarm optimizer

with time-varying acceleration coefficients. Evolutionary Computation, 8(3): 240-255

(2004)

10. Lin M., Liu F., Jiang X.: A particle swarm optimization method with dynamic adjustment

accelerating factor. Computer Knowledge and Technology, Vol.5, No.34, December, pp.

9816-9818 (2009)

11. Zeng J., Jie J., Cui Z.: Particle swarm optimization. Beijing Science Press (2004)

12. Chen H., Fan Y., Deng S.: A dynamic accelerating factor adaptive particle swarm

optimization algorithm. Journal of China University of Petroleum (Edition of Social

Sciences), 34 (6):173-176 (2010)

Page 74: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

71

SICASE-776

Learning Issues in Opportunistic Software Development

Yonglei Tao

School of Computing and Information Systems

Grand Valley State University, USA

[email protected]

Abstract

Opportunistic software development is a method of software development in which developers

meld together software pieces they found, rather than starting from scratch. It is a practical

method for problem solving and also offers great educational value. Using opportunistic

software development in a classroom setting exposes students to programming tasks they are

not prepared for. Students must learn what they need to know at the time they need to use and

effective learning is crucial for successful completion of their tasks. As such, it creates a

realistic educational context for students to pursue self-directed learning. However, one cannot

assume that desired results simply happen when students are placed in such a situation. Our

experience shows that careful guidance from the instructor is indispensible to ensure students

meet their learning objectives in an orderly manner.

Keyword: Opportunistic Software Development, Self-Directed Learning, Computer Science

Education

1. Introduction

As technologies evolve, software developers in the future are more likely to work with systems

they cannot possibly develop from scratch or use diverse tools that they were never taught in

their former education. It is important that computer science educators make it possible for

students to gain experience in using, modifying, and combining software components available

on the Web [1].

Opportunistic software development is a method of software development in which developers

meld together software pieces they found, rather than starting from scratch. Most often the

developer finds unrelated software components that weren‟t designed to work together but

provide functionality needed in a new system [5]. Opportunistic software development

emphasizes speed and ease of development over code robustness and maintainability; therefore,

it is useful for writing code to prototype, ideate, and discover [2]. Opportunistic software

development is reported in the literature as being effective for problem solving [3] and also

having great educational value [4, 13].

Page 75: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

72

The challenge for computer science educators is twofold. They must teach a significant level of

specialized, rapidly evolving knowledge that often requires quick and cost-effective updates.

At the same time, they strive to improve the quality of students‟ learning experience [9]. Using

opportunistic software development principles in computer science education not only

encourages students to develop solutions that cross the boundaries of different technologies [4],

but also stimulates students to make a conscious effort to learn what they need to use [13]. As a

consequence, it creates a realistic educational context for computer science educators to meet

the challenge in a balanced way.

In this paper, we describe our approach to guiding students through opportunistic software

development for non-trivial class projects. Opportunistic software development provides a

unique opportunity for students to pursue self-directed learning. But one cannot assume that

desired learning objectives simply happen when students are placed in such a situation. Our

experience shows that careful guidance from the instructor is still indispensible, especially

when students are exposed to tasks they were not fully prepared for.

This paper is organized as follows. Section 2 introduces related work. Section 3 discusses an

approach to guiding students in opportunistic software development and section 4 describes our

experience with using it for programming projects in two courses. Section 5 summarizes the

results of a survey taken by participating students. Finally section 6 concludes this paper.

2. Related Work

Learning is the central issue in education. Research has shown that most learning in the

workplace takes place outside of formal training and, given the swiftly changing nature of the

field, computer science graduates, more than most workers, need to be able to learn new topics

outside of organized classes [7]. As such, computer science educators have devoted significant

attention to enhance students‟ learning skills. A large number of reports about learning issues

in computer science education can be found in the literature. Many of them focus on

encouraging students to participate in self-directed learning [14-16].

Self-directed learning or active learning is known as a process by which individuals take the

initiative, with or without the assistance of others, in identifying their learning needs, locating

resources for learning, choosing appropriate learning strategies, and evaluating learning

outcomes [6]. As an instructional method, self-directed learning allows engagement in the

learning process and requires students to think about and be actively involved in meaningful

learning activities [10].

Students are highly motivated when pursuing self-directed learning. Self-directed learning is

goal oriented in which students view problems as challenges, not obstacles [12].

Page 76: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

73

Studies have shown that students can also master difficult subjects more effectively via

self-directed learning activities [11].

Student leaning can be improved when instructors move from traditional lecture-style

instruction to a student-centered, interactive instruction. In such a situation, the teacher

becomes a facilitator, guiding and coaching, rather than directing and lecturing, students learn

by doing [8]. Clearly, self-directed learning does not relieve educators of assisting students in

the learning process; instead it requires an innovative way to meet the challenge.

3. Our Approach

As computer science instructors, we tend to teach students to be proficient in a particular

technology before letting them to apply the knowledge in a non-trivial project. In opportunistic

software development, however, students must face tasks they are not fully prepared for.

Students have to analyze the needs of a new system, search the Web for relevant components to

meet their needs, and adapt or modify the selected components to build the intended system. In

this process, students are often exposed to technologies they have never been taught; they must

learn what they need to know at the time they need to use it.

In opportunistic software development, functional requirements determine development tasks

which in turn determine the learning objectives for students. Clearly, learning is not random; it

depends on one‟s view about what to do and how to proceed in the development process.

We consider a two-phase process as critical to ensure students meet their learning objectives in

an orderly manner.

(1) Breakdown system requirements to identify user tasks

(2) Develop each task opportunistically and incrementally

A task is an activity that the user performs to achieve a certain goal. It describes a small piece

of functionality for the intended application. Since students are new in the subject area,

guidance from the instructor is necessary. We use a Web application project as an example to

describe our approach below.

A web application is often viewed as consisting of several layers built with different

programming tools, for example, HTML, PHP, and MySQL. Traditional teaching methods

attempt to familiarize students with each of these tools in isolation before giving them an

opportunity to use. While appropriate in a rigorous web programming course at the junior or

senior level, doing so would divert too much attention from the primary topics in courses that

are not entirely devoted to web programming.

Page 77: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

74

Alternatively we consider a web application as a collection of partitions with each crosscutting

the layers of the application to fulfill a user task, for example, login, form filling, data

retrieving, and file uploading. Each partition is a functional unit that can be created, tested, and

run independently. And its limited functionality leads to a short development cycle.

Incremental development and rapid iteration allow students to focus on a small number of new

concepts in each development cycle and also give them the ability to verify each unit of

functionality as soon as it is built.

Our intention is to have students learn web programming as they develop a practical web

application. Students work on various partitions over a number of development cycles. At the

beginning of each cycle, we help students find a small example to illustrate key programming

concepts in an application-independent manner. Students then build an initial version of the

partition under consideration according to the given example. Such a version is executable but

accomplishes only partial functionality. Students must explore further to find what they need to

do and how they can accomplish their objectives. Often they search the Web for pieces of code

with the desired functionality, copy them to their programs, and modify them to meet the

requirements. In this process, knowledge is partially and incrementally obtained as

opportunities – the needs to meet requirements and the availability of relevant materials – arise.

Successful discovery and use of new knowledge allow students to gradually extend their

programs to completion.

4. Experiment and Observation

We have experimented with using opportunistic software development for programming

projects in two different classes. One project was to build a Web application to support the

coop program of the engineering school in our university, which involved only a small group

of sophomore students. And the other one was to develop a multimodal user interface for an

online ticketing application. It involved fifteen students in a graduate class.

4.1 A Web Application Project

Here we illustrate our approach through activities in creating a login form. Since it was the first

task for students to do in this project, we had more involvement in the preparatory work than

that for other tasks.

We began with introducing to students a simple login form that was made of an HTML

document and a PHP script with limited functionality, that is, validating the user input against a

hardcoded data. We also discussed relevant programming concepts and demonstrated how to

run the login form from a browser.

Page 78: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

75

Then we guided students through the current development cycle in a stepwise manner. We

asked students to perform adequate testing on each version of their programs before moving on

to the next step. Given below are steps that we guided them to take for building a login form:

Creating an application-specific login form on the basis of the given example.

Adding code to handle a forgotten password; that is, allowing the user to submit an email

address and receive a valid password via email from the system administrator.

Adding code to validate the user input using the information in a password table of a

MySQL database.

Students wrote code via cut-and-paste and in-place modification from pieces of code they

found on the Web. In this process, what they learned is more than programming concepts. For

example, a student combined normal password processing and forgotten password handling

into one PHP script, but found the default button behaved inconsistently in different browsers.

Solving that problem relied on certain system-specific knowledge that students could never be

prepared for. Ultimately, a solution was found with the instructor‟s assistance. Clearly, it is a

realistic scenario and working through such scenarios helps students develop problem-solving

skills.

Students could produce surprising results at times. For example, a student found a piece of

code with a JavaScript statement to bring up a message box for error notification. He

successfully integrated it into his PHP code, making his program more robust, even though

using any programming tool beyond HTML, PHP, and MySQL was not expected. Such a case

is not unusual when students engage in opportunistic learning.

4.2 A Multimodal User Interface Design Project

In this project, a multimodal user interface was defined as one allowing the user to interact with

an application via either touch or voice. Ideally, it should be a cohesive integration of a GUI

(Graphical User Interface) and a VUI (Voice User Interface).

Students had to face challenges at multiple levels. A multimodal user interface should provide

the required functionality and also guidance for the user to achieve their goals. While students

understood the visual design for a user interface, they were not familiar with issues and

techniques of voice interface design. In addition, they never had any exposure to speech

recognition technologies in their previous courses.

A speech recognition engine is available in almost every programming platform, including

Microsoft Visual Studio, Java (such as CMU Sphinx), Android, as well as Google Web Toolkit.

Since students had different programming backgrounds and preferences, we allowed them to

Page 79: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

76

choose the tools they wanted to use. We also provided an overview on various speech

recognition technologies to assist them in making an appropriate decision.

At the beginning, students conducted a functional decomposition to identify user tasks that the

intended user interface must support. Due to the complexity of this project, students selected a

relatively simple task to begin with and proceeded to implement it according to opportunistic

software development principles.

We asked students to develop this project by incorporating voice-activated control into a

graphical user interface, rather than building two user interfaces independently. As such,

students took three steps to achieve the goals for each task:

Develop a graphical user interface

Add voice-activated control

Address issues of integration between touch and voice capabilities

Code examples about how to use speech recognition engine can be found on the Web. Often

they include very limited functionality, for example, two or three screen elements and a simple

grammar for speech recognition. Nonetheless, they demonstrate the basic structure of such a

program. Students searched the Web to find an appropriate example and modified it

incrementally to achieve the required functionality. Obviously, they must obtain a thorough

understanding on the existing code before making any modification. Hence, students had to

learn what they needed to know, including concepts and techniques for speech recognition,

natural language understanding, and dialog management.

Students met diverse difficulties, especially with implementing voice-activation control and

resolving integration issues, such as how to design a grammar to reduce ambiguity, how to

modify configuration files to adjust the confidence level for speech recognition, and how to

handle errors of various categories. Difficulties they had often motivated them to learn new

knowledge, exchange ideas with their classmates, and work out creative solutions.

5. Student Feedback

We conducted an evaluation survey to collect feedback from students about their experience

with opportunistic software development.

Many students considered the learning experience they had as the most important benefit.

Students felt that they had learned more than they would do in the conventional way. Listed

below are a few comments from students:

Page 80: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

77

“Building this application was a learning experience in itself.”

“By figuring out on our own, we learn more because we had to figure it out each time we

wanted to implement something new, rather than just coping out notes that were used in class.”

“When I first started I had a brief idea what needed to be accomplished, but honestly I had

minimal experience with website and database applications. I think learning these applications

in a work atmosphere helped me way more in the long run.”

Students also considered as beneficial for them to choose technologies that they wanted to use,

even though those technologies were not previously taught. As a result, students were highly

motivated to acquire and apply new knowledge as illustrated by comments below:

“Working with new techniques provided us with a great benefit because we were able to

use what we wanted to, and not what someone had taught us.”

“It was my first voice user interface I ever did. It gave me a great experience with speech

recognition technology through challenges I had.”

On the other hand, it did take a considerable amount of time for students to learn a new

technology. Due to the lack of a broad view about existing technologies, some of them did not

consider that they had made the best choice for themselves at the beginning. Given below are

some comments in this regard.

“We learned more while doing research, but we also used valuable time that could have

been better spent on making our application the best.”

“I wish I had looked into other options more carefully before making the decision (about

which technology to use).”

In addition, students were proud of what they had accomplished. Some of them posted their

projects on the Internet to show what they were able to do.

Clearly, it is beneficial for students to follow the opportunistic software development principles

when developing a practical project. However, it is a challenge for the instructor to help

students learn what they need to use without diverting too much attention from the primary

course objectives.

6. Summary

In most software engineering methods, programming activities are viewed as being systematic,

starting from high level goals that are in turn decomposed into achievable actions via a

successive refinement process. Deviating from conventional approaches, several recent studies

emphasize the opportunistic nature of the programming process [2-5].

Page 81: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

78

Our experience indicates that software development often involves a mixture of top-down and

opportunistic activities. As described above, a key element of our approach is to identify user

tasks. Using a top-down strategy first not only helps students cope with software complexity,

but also creates a foundation for them to develop their programs in an opportunistic manner. A

strictly opportunistic process is neither realistic nor feasible in a classroom setting.

Opportunistic software development encourages just-in-time learning of new knowledge and

skills [2]. It makes it less compulsory for the instructor to motivate students. As a result, the

focus of teaching shifts from preparing students for what they must know to guiding them

through the development process. Since students have to explore an unfamiliar domain

themselves, they may run into a wide range of obstacles. Using an opportunistic approach

requires greater attention to individual students, which may be problematic for a large class.

Learning is the central issue in education. Computer science instructors are especially

concerned with students‟ learning skills due the rapidly changing nature of this field. Our initial

use of an opportunistic approach has proven to be a positive learning experience for students.

We plan to continue our effort of incorporating this approach into our curriculum. We also plan

to investigate several ethical and pedagogical issues that may arise when using this approach,

such as whether it is appropriate to use code found from the Web for personal or commercial

purposes, and what adverse effects it may have on students‟ programming habits.

7. References

[1] Cohen, J.: Updating Computer Science Education, Communications of ACM. Vol. 48, No. 6,

June 2005, PP.29-31.

[2] Brandt, J, et al.: Two Studies of Opportunistic Programming: Interleaving Web Foraging,

Learning, and Writing Code. Proceedings of ACM CHI „09, Boston, Massachusetts, April

2009, pp 1589-1598.

[3] Robillard, P.: Opportunistic Problem Solving in Software Engineering. IEEE Software,

November/December 2005, pp. 60-67.

[4] Obrenovic, Z., et al.: Stimulating Creativity through Opportunistic Software Development.

IEEE Software, November/December 2008, pp. 64-70.

[5] Ncube, C., et al.: Opportunistic Software System Development: Making Systems from

what‟s Available. IEEE Software, November/December 2008, pp. 38-41.

[6] Knowles, M.: Self-Directed Learning. Follet, Chicago, 1975. p. 18.

[7] Boustedt, J., et al.: Students‟ Perception of the Differences between Formal and Informal

Learning. ICER ‟11. Aug. 8-9, 2011, Providence, Rhode Island, USA, pp. 61-68.

[8] Towhidnejad, M., et al.: Transforming Engineering and Science Education through Active

Learning. Proceedings of IEEE Frontiers in Education (FIE), 2014, pp.859-863.

Page 82: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

79

[9] Longstreet, C. S. and Copper, K.: Curriculum Design Factors for Constructing Serious

Educational Game: a Learning Objective Centric Approach. Proceedings of Computer

Games: AI, Animation, Mobile, Multimedia, Educational and Serious Games (CGAMES),

2014, IEEE.

[10] Zepke, N. and Leach, L.: Improving Student Engagement: Ten Proposals for Action.

Active Learning in Higher Education, 11:167-177, 2010.

[11] Tsai, F. S., et al.: From Boxes to Bees: Active Learning in Freshman Calculus.

Proceedings of Global Engineering Education Conference (EDUCON), 2013, Berlin,

Germany, IEEE, pp.59-68.

[12] Swart, A. J. and Sutherland, T.: Co-operative Learning versus Self-directed Learning in

Engineering: Student Preferences and Implications. Proceedings of IEEE Frontiers in

Education (FIE), 2014, pp. 1466-1470.

[13] Tao, Y. and Plouff, C.: An Opportunistic Approach for Learning Web Programming.

Proceedings of IEEE FIE ‟10 (the 40th annual Frontiers In Education conference),

Arlington, Virginia, Oct. 27-30, 2010.

[14] Stephen, F. and Ruben, R.: Constructive Pedagogy Meets Agile Development - a Case

Study. Proceedings of 2010 Seventh International Conference on Information Technology,

IEEE Computer Society, April 12-14 2010, Las Vegas, Nevada, USA.

[15] Edward, G. and Carolyn, M.: Student-Generated Active-Learning Exercises. Proceedings

of ACM SIGCSE ‟09, March 3-7, Chattanooga, Tennessee, USA, pp 81-85.

[16] Barry, E. F., et al.: Teaching OO Methodology in a Project-Driven CS2 Course.

Proceedings of ACM OOPSLA ‟05, Oct. 16-20, 2005, San Diego, California, USA, pp

338-343.

Page 83: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

80

SICASE-818

Active Low Pass Filter with Transmission Zero Using OTA-TURC

Sorapong Wachirarattanapornkul

Faculty of Engineering, King Mongkut‟s Institute of Technology Ladkrabang

(KMITL),Thailand

[email protected]

Abstract

This paper describes a active low pass filter with transmission zero by using the passive

element which 2 types of uniformly distributed RC line (hereafter called URC) such as one

three-capacitive layers URC and one double capacitive layers URC (hereafter called TURC and

DURC with respectively) and active element as two operational transconductance amplifier or

OTA. The simulation results by PSPICE and MATLAB as shown a steeper rate in cut-off, and

this has low sensitivity in the pass band of active and passive elements to confirm this circuit

idea.

Keyword: active low pass filter, transmission zero, TURC, OTA

1. Introduction

The uniformly distributed RC line or URC is one of electronic devices that applied in filter

circuit by using URC as the lumped RC circuits. [1]-[8] And URC has many structure such as

lumped RC, VLSI circuit and distributed RC elements in thin-film technology is built using

smaller substrate area, and less parasitic problems at high frequency. Nowadays, URC elements

have three types of discrimination based on the capacitive layers such as, URC [1]-[2] has one

capacitive layer, DURC [3]-[4] has double capacitive layers and TURC [6]-[8] has three

capacitive layers. The structure of the general URC consists of layer of conductors, resistive

layer and dielectrics can be sandwiched together in many permutations.

The general of filter circuits are some disadvantages as ripple magnitude in the pass band or a

slow rate at stop band. Thus we are to propose this circuit by combination the DURC, TURC

and OTA which has a steeper rate in cut-off and the minimum attenuation in the stop band.

Page 84: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

81

2. DURC and TURC

For basically to circuit symbol of the DURC and TURC in this part as show in Fig. 1

Fig. 1 as shows the passive DURC and TURC symbol circuits, by Fig.1 (a) as show DURC

circuit symbol you can see DURC components has double capacitive layers (CD1 and CD2) one

resister layer (RD1), then Fig.1 (b) as show as TURC circuit symbol with has three capacitive

layers (CT1, CT2 and CT3) and one resister layer (RT1) For analysis the admittance parameters

[Yij] of the DURC and TURC in Fig.1 by set one port of DURC and TURC to connect ground

as show in eq.(1) and eq.(2) with respectively.

[

] [

( )

( )

( ) ( ) ] [

] (1)

Where *( ) ( )+,

,

, ,

√ ,

and are the values of total resistance and capacitive of DURC, and is the complex

frequency.

[

] [

( )

( )

( )

( )

( )

( )

( )

( )

] [

] (2)

Page 85: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

82

Where *( ) ( )+,

*( ) ( )+,

* ( ) +,

,

,

, ,

√ ,

and are the values of total resistance and capacitive of TURC, and is the complex

frequency.

3. OTA

The OTA or operational transconductance amplifier is one of active building block circuit used

to active device, Basically OTA has 3 port as input port in voltage has 2 ports ( ( ) and

( ), one output port in current ( o) and transconductance gain (gm) to change current

output. By the circuit symbol of OTA as shown in Fig. 2, and the characteristic of OTA as

shown in equation (3).

gm( ( ) ( )) (3)

Where gm

at

is bias current of OTA

4. The Proposed of Active Low Pass Filter with Transmission Zero Circuit

The proposed of active low pass filter with transmission zero circuit using the combination of a

TURC and DURC are shown in Fig.2. For the circuit design structure has 2 sections as, the

first section is a DURC and a TURC are cascade, the second section is active element as two

OTA in amplifier circuit for adjust gain frequency response.

Page 86: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

83

The transfer function of the proposed circuit in Fig.3, is given as:

T( ) −α α

+sinhP P

−α α

+sinhP P

K

, −(α +α K)-

α −α α

γ+sinhP P

δ− −α α

co +sinhP P

α K

α −sinhP P

(4)

Where γ β

,

δ β

( ),

K gm

gm , β

,

,

,

3

,

√𝑠 , √𝑠 ,

, ,

Page 87: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

84

In Fig. 4 as shown as the frequency response of the proposed circuit when varies K with K is

ratio between transconductance gains of OTAs in circuit (K gm

gm ⁄ ), you can seen in

response has two transmission zeros in stop band which has the results in greater slope. And the

peak of transmission zeros in the stop band is depend on gm

gm ⁄ .

5. Simulation Results

The simulation result in frequency response by MATLAB and PSPICE of the proposed circuit

in Fig.3, and transfer function in equation as (4). We choose values of the circuit elements as

follow:

00KΩ,

U 8pF,

U 00pF, (5)

0. 8 ,

0. 8 , 0. ,

gm gm 0. 8

Page 88: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

85

Fig. 5 as shown as the frequency response of the proposed circuit with compare MATLAB and

PSPICE, you can seen that the frequency response of MATLAB and PSPICE as conformable.

And the sensitivity response of the active and passive element of the proposed circuit as shown in

Fig. 6, as low sensitivity in the passband.

Page 89: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

86

6. Conclusion

The active low pass filter with transmission zero using OTA-TURC for propose and discuss.

This circuit has four parameters as; , , , and K gm

gm ⁄ for used to adjustment

in magnitude of transmission zero, and steeper slope. In improve to sensitivity analysis of

active (OTA) and passive (TURC and DURC) element of the proposed circuit has low in the

passband. Finally This proposed circuit will be suitable to fabrication by LSI process.

Acknowledgement

This work is supported by Faculty of Engineering, King Mongkut‟s Institute of Technology

Ladkrabang (KMITL).

References

[1] M.S. Ghausi/J.J. Kelly, “Introduction to Distributed Par ameter Networks with Application

to Integrated Circuits,” Holt, Rinehart and Winston, INC. pp.-136-141

[2] M. Teramoto, S. Sudo, Y.suzuki, “On the Design of the Active Low Pass Filer using

Double Layer Uniformly Distributed RC Line,” JIC-CSCC’95, 1995

[3] K. Janchitrapongvej, et.al “Notch Tunable Filters using Double Layer Uniformly

Distributed RC Line,” 1998 IEEE APCC/ICCS, Vol 2, pp.590-592.

[4] S. Sorapong, J. Kanok, M. Teramoto, and S. Sudo, “Notch Frequency Adjustable Active

Filer Using Uniformly Distributed RC Line,” IEEE Asia Pacific Conference on Circuits

and Systems Proceedings, China, p.568-570. Dec 2000

Page 90: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

87

[5] S. Sorapong, J. Kanok, et.al, “On The Realization of Active Filter with Notch

Characteristics using Multilayer Uniformly Distributed RC Line,” IFCS2002 The

International Conference on Fundamentals of Electronics Communications and Computer

Sciences, pp.14_10-14_13, Japan, March 2002.

Page 91: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

88

Biological Engineering / Biomedical Engineering /

Fundamental Science

Session Chair: Vinoth Jagaroo

SICASE-701

Experimental and FEM Study of Red-Blood Cells

Zhao Yong︱Alfaisal University

Mohamed Tarek Abdelaty︱Alfaisal University

Ibrahim Nabeel Muhssen︱Alfaisal University

Muhammad Usman Zafar︱Alfaisal University

Nourah Abdulaziz N Alrubaiq︱Alfaisal University

Arwa Abdullah S Alanqary︱Alfaisal University

Samah F. AlAbbasi︱Alfaisal University

Randa AlNounou︱Kingdom of Saudi Arabia

SICASE-729

Neurocognitive Systems and Biomedical Engineering: Optimization through the

Phenotype-Marker Approach and Neuroinformatics

Vinoth Jagaroo︱Boston U. School of Medicine & Emerson College

William J. Bosl︱University of San Francisco

SICBENS-1292

Single and Mixed Microbial Biosorbents and the Influence of Their Varying Dosages on

Removal of Lead (Pb) in Multi-Metal Solutions

Adeline Su Yien Ting︱Monash University Malaysia

Carrie Siew Fang Sim︱Monash University Malaysia

SICBENS-1300

Obesity Crusade through Structural Study on FTO and Its Inhibitor Design

Yonggui Gao︱Nanyang Technological University

Joel D.W.Toh︱Institute of Molecular and Cell Biology

Lingyi Sun︱National University of Singapore

Esther C. Y. Woon︱National University of Singapore

2015/6/27 Saturday 16:30-18:00 Room 2

Page 92: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

89

SICASE-732

Case Study: Experimental of New Propeller Design 2 Blades Type and Observation

Cavitation of Tailing Thai Boat

Jaruphant Noosomton︱Kasetsart University

Sarinya Sanitwong Na Ayutthayaa︱Kasetsart University

SICASE-829

Model and Algorithm of Violator Detector Network problem: Application on Traffic

Network

Amber Shafiq︱Korea Advanced Institute of Science & Technology

Page 93: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

90

SICASE-701

Experimental and FEM Study of Red-Blood Cells

Zk Abdelaty, Muhammad Usman Zafar, Nourah Abdulaziz N hao Yong*,

Mohamed TareAlrubaiq, Arwa Abdullah S Alanqary

College of Engineering, Alfaisal University, Kingdom of Saudi Arabia

[email protected]

Ibrahim Nabeel Muhssen, Samah F. AlAbbasi

College of Medicine, Alfaisal University, Kingdom of Saudi Arabia

Randa Al Nounou

Department of Pathology, King Faisal Specialist Hospital & Reseach Center,

Kingdom of Saudi Arabia

Abstract

Blood cells are composed of 99.9% erythrocytes, red blood cells. Erythrocytes transport

oxygen to all cells of the body through narrow blood capillaries. The mechanical properties and

deformability of erythrocytes are therefore vital in maintaining their ability to perform their

functions. Many factors and diseases are known to change erythrocytes in both shape and

mechanical properties, such as: sickle cell anaemia, and carbon monoxide. The effect of such

changes on the functionality of red blood cells in vivo however remains everyone‟s educated

guess. In this study, finite element analysis was used to model, analyse, and visualise the

functionality of red blood cells in a number of realistic biological settings. Experimental results

for cell properties and biological settings were obtained from literature and experimental

measurements using a nano-indentation testing. The commercial FEA package ANSYS was

used on a parallel cluster to perform the analysis. Statistical data are to be obtained from FEA

results to help determine the probabilistic effect of several biological factors on the

performance of red blood cells in the body.

Key words: red blood cells; finite element method; nano-indentation; smoking

1. Introduction

Blood consists of plasma and blood cells. Blood plays a very important role in keeping our

bodies alive, it serves as a medium for transporting nutrients and wastes to and from body cells.

Moreover, it plays a major role in defending our body from pathogens.

Red blood cells (erythrocytes) account for 99.9% of blood cells. Their principal function is the

transport of oxygen from the lungs to respiring tissues, and carbon dioxide from tissues back to

Page 94: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

91

the lungs. This is achieved through the presence of haemoglobin, a conjugated metallo-protein

(Ashton, 2013). The non-nucleated erythrocyte is unique among human cells in that the plasma

membrane, its only structural component, accounts for all of its diverse antigenic, transport,

and mechanical characteristics (Mohandas & Gallagher, 2008). The ability of cell membrane to

bind and transport oxygen is what makes its physiological function possible (Zuk,

Targosz-Korecka, & Szymonski, 2011).

Erythrocytes health is related to the mechanical properties of the cells. One of the unique

mechanical features of the normal red cell membrane is its high elasticity, which enables the

cell to rapidly respond to applied fluid stresses in the circulation (Mohandas & Gallagher,

2008). Erythrocytes abnormalities are the most common inherited disorders (Mohandas &

Gallagher, 2008). Many of those disorders lead to a decreased elasticity which may lead to

haemolysis (rapturing of cell membrane) thus causing a decrease in the number of erythrocytes.

This is due to the decrease in the ability of erythrocytes to pass repeatedly through the

microcirculation. A decrease in erythrocyte deformability may therefore lead to tissue death

and necrosis. Hereditary blood disorders are also common in Saudi Arabia; in the premarital

screening and genetic counselling (PMS&GC), results showed that 2.7 out of each examined

1000 were positive for sickle cell diseases & 42.4 out of each examined 1000 were carriers for

sickle cell diseases (Memish, Owaidah, & Saeedi, 2011).

According to (Mohandas & Gallagher, 2008), biophysical studies showed that the following 3

features are the primary regulators of the ability of the cell‟s capacity to undergo the necessary

deformations:

(1) Geometry of the cell, particularly cell surface area to volume ratio;

(2) Cytoplasmic viscosity determined by intracellular haemoglobin concentration; and

(3) Membrane deformability: determined by the protein spectrin.

Extensive research has been done in studying the mechanical properties of red blood cells, and

their ability to deform and change in shape. Researches have also looked at the effect of

different drugs [e.g. (Zuk et al., 2011)], and storage conditions on those properties.

The interaction between erythrocytes, and chemicals and molecules in our blood affect the

membrane elasticity. Membrane proteins interact with so-called xenobiotics (eg, drugs) from

the blood and facilitate their transportation within the circulation. Some drugs which bind with

the cell membrane can modify the structure and elastic properties of red blood cells, and may

eventually cause haemolysis of the erythrocyte (Zuk et al., 2011). In (Zuk et al., 2011), the

effect of two drugs used in asthma treatment was tested and it was found that they cause a

decrease in the ability of erythrocytes to bind to oxygen and transport it.

Page 95: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

92

One of the molecules that bind to the haemoglobin of erythrocytes is carbon monoxide (CO).

CO has much higher affinity for haemoglobin than oxygen (Varma, Mulay, & Chemtob, 2009).

This account for its high toxicity, when haemoglobin binds to carbon monoxide (CO),

carboxyhemoglobin (COHb) is formed. Despite the fact that carbon monoxide poisoning is

prevalent, no previous research was done on the effect of carbon monoxide binding to the

erythrocytes on their mechanical properties. Carbon monoxide poisoning is highly severe,

especially for the organs with the highest demand for oxygen such as the brain and heart, which

are more vulnerable to injury (e.g. myocardial infarction, arrhythmias ,etc.) (Lippi, Rastelli,

Meschi, Borghi, & Cervellin, 2012).

Pollution is one of the most significant factors that increase the level of CO in the atmosphere.

Another important factor is smoking. Smoking tends to produce carbon monoxide, thus

smokers tend to have a higher level of CO in their blood. In Saudi Arabia, smoking is one of

the major problems. (Al-Nozha et al., 2009) showed that overall prevalence of smoking among

Saudis was 12.8%. Males (1555) were significantly smoking more than females (662) with a

prevalence of 18.7% and 7.3% respectively.

In this study, the effect of carbon monoxide on mechanical properties of erythrocytes shall be

analysed. This study will help in better evaluating the risks of exposure even to a low level of

CO.

2. Nano-Indentation Experiment

Different methods exist for studying the mechanical compliance S of soft tissues, beside

nanoindentation, such as: AFM probing (McNally & Borgens, 2004), soft substrate stretching

(Brown, 2000), optical tweezers, (Dao, Lim, & Suresh, 2003) and magnetic-bead attachment

(Wang, Butler, & Ingber, 1993). In this study however the nanoindenter currently available at

Alfaisal University shall be utilized to calculate the mechanical compliance of red blood cells.

The advent of nanoindentation, or depth-sensing indentation, has provided a method for

determining time-dependent mechanical properties on a size scale compatible with tissue

dimensions in controlled, physiological environments. (Gupta, 2008) Depth-sensing

indentation involves the application of a controlled load or displacement to an indenter,

inducing local deformation of the surface beneath the indenter tip. Both the load and the

displacement are monitored simultaneously during loading and unloading of the indenter, and

the resulting load-displacement curve shall be used to characterize the mechanical compliance

of the surface using the following formula.(Gupta, 2008; Zhang, 2008)

( − ) ( )

( − ) ( ) ,

Page 96: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

93

where is the force applied to the RBC specimen, E is the Young's modulus of the

specimen which is 1/S, is the Poisson's ratio (often assumed to be 0.5), is the half

opening angle of the indenting tip, and is the indentation depth. (Zhang, 2008) From the

above equation, and are provided by the nanoindentation measurements, is a

known property of the indenter‟s head used, is assumed, and S can therefore be determined.

Different types of heads are commonly used in nanoindentation, such as: pyramidal heads

which include the Berkovich, Vickers and Knoop indenters. Other heads commonly used are:

spherical, conospherical and cylindrical (flatpunch) indenters. Figure 1 shows three different

types of commonly used indenters. Due to the smaller contact area, pyramidal indentation is

less sensitive than conospherical and flatpunch indentation to surface irregularities and

asperities. Conospherical tips are therefore recommended for testing most polymerical and

biological materials. (Gupta, 2008) In this research, a conospherical indenter shall be used.

3. Finite Element Modelling

In an attempt to better visualize the effect of carbon monoxide on the mechanical compliance

and the functionality of RBC, a finite element model for the passage of a red blood cell in a

thin capillary shall be analyzed using the finite element package ABAQUS/CAE. The model

will be based on the values for mechanical compliance computed from experimentation.

4. Modelling of RBCs in Capillaries

5. Conclusion

6. References

Al-Nozha, M. M., Al-Mazrou, Y. Y., Arafah, M. R., Al-Maatouq, M. A., Khalil, M. Z., Khan,

N. B., … Nouh, M. S. (2009). Smoking in Saudi Arabia and its relation to coronary artery

Page 97: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

94

disease. Journal of the Saudi Heart Association, 21(3), 169–76.

doi:10.1016/j.jsha.2009.06.007

Ashton, N. (2013). Physiology of red and white blood cells. Anaesthesia & Intensive Care

Medicine, 14(6), 261–266. Retrieved from

http://www.sciencedirect.com/science/article/pii/S1472029913000787

Brown, T. D. (2000). Techniques for mechanical stimulation of cells in vitro: a review. Journal

of biomechanics, 33(1), 3–14. Retrieved from

http://www.ncbi.nlm.nih.gov/pubmed/10609513

Dao, M., Lim, C. T., & Suresh, S. (2003). Mechanics of the human red blood cell deformed by

optical tweezers. Journal of the Mechanics and Physics of Solids, 51(11-12), 2259–2280.

doi:10.1016/j.jmps.2003.09.019

Gupta, S. (2008). Analytical and Numerical Nanoindentation Studies of Compliant

Biomaterials and Soft Tissues (pp. 1–52).

Lippi, G., Rastelli, G., Meschi, T., Borghi, L., & Cervellin, G. (2012). Pathophysiology, clinics,

diagnosis and treatment of heart involvement in carbon monoxide poisoning. Clinical

Biochemistry, 45(16), 1278–1285. Retrieved from

http://www.sciencedirect.com/science/article/pii/S0009912012002731

McNally, H. A., & Borgens, R. Ben. (2004). Three-dimensional imaging of living and dying

neurons with atomic force microscopy. Journal of neurocytology, 33(2), 251–8. Retrieved

from http://www.ncbi.nlm.nih.gov/pubmed/15322383

Memish, Z. A., Owaidah, T. M., & Saeedi, M. Y. (2011). Marked regional variations in the

prevalence of sickle cell disease and β-thalassemia in Saudi Arabia: findings from the

premarital screening and genetic counseling program. Journal of epidemiology and global

health, 1(1), 61–8. doi:10.1016/j.jegh.2011.06.002

Mohandas, N., & Gallagher, P. G. (2008). Red cell membrane: past, present, and future. Blood,

112(10), 3939–48. doi:10.1182/blood-2008-07-161166

Varma, D. R., Mulay, S., & Chemtob, S. (2009). Carbon Monoxide: From Public Health Risk

to Painless Killer. In R. C. Gupta (Ed.), Handbook of Toxicology of Chemical Warfare

Agents (pp. 271–292). Retrieved from

http://www.sciencedirect.com/science/article/pii/B9780123744845000201

Wang, N., Butler, J. P., & Ingber, D. E. (1993). Mechanotransduction across the cell surface

and through the cytoskeleton. Science (New York, N.Y.), 260(5111), 1124–7. Retrieved

from http://www.ncbi.nlm.nih.gov/pubmed/7684161

Zhang, W. L. (2008). Design, Modeling, Fabrication, and Characterization of a MEMS Device

for Measuring the Mechanical Compliance of a Biological Cell.

Zuk, A., Targosz-Korecka, M., & Szymonski, M. (2011). Effect of selected drugs used in

asthma treatment on morphology and elastic properties of red blood cells. International

journal of nanomedicine, 6, 249–57. doi:10.2147/IJN.S15802

Page 98: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

95

SICASE-729

Neurocognitive Systems and Biomedical Engineering: Optimization through

the Phenotype-Marker Approach and Neuroinformatics

Vinoth Jagaroo

Boston U. School of Medicine & Emerson College

[email protected]

William J. Bosl

University of San Francisco

[email protected]

Abstract

This paper highlights the relevance of the phenotype-marker approach in neuroscience to

biomedical engineering for the brain sciences. In behavioral neuroscience, a rapidly emerging

approach to resolving the multidimensional nature of neurocognitive processes is that of

neurocognitive phenotypes – the precise delineation of neural circuits and their componential

role in behavior, and mapped across a genome-to-phenome pathway. This approach is critically

enabled by neuroinformatics – informatics geared to the discovery of relationships between

complex data sets in the neurosciences. Together, phenotypes and neuroinformatics

(phenomics) define a new framework for neuroscience discovery. The central point of the

paper is that continuing advances in biomedical engineering pertaining to the brain become

clinically useful if articulated within this new relational framework.

Neuroscience has achieved remarkable breakthroughs in recent decades. It is now possible to

conceive of realistic frameworks to discover measureable neural correlates of behavior and

behavioral disorders. The recent US National Institute of Mental Health Strategic Plan calls

for the development of new ways of classifying psychopathology based on observable behavior

and neurobiological measures. The goal of this strategy is to discover the fundamental “units

of behavior” – cognitive phenotypes -- that can be reliably measured and used not only for

classification of psychopathological disease but also for mapping neurophysiological measures

to these units of behavior. The emphasis on cognitive and neural phenotypes is central to this

strategy.

Conventional interpretation of brain research data inevitably aligns with one or more

operational models. For example, functional imaging studies heavily adopt the notion of

cortical centers/modules within a larger network. While valid, this model has also come

under criticism for over-reliance on a distributed nodal-network perspective. Complex

dynamical models of the brain involving nonlinear system properties (drawn from physics and

Page 99: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

96

engineering), or immunohistochemical parcellations of the brain (a perspective drawn from

brain oncology), are examples of models that have been less amenable to neuroscientists.

A comprehensive understanding of the brain requires the delineation of multiple levels of

neural complexity and how these map to behavioral measures or cognitive phenotypes, and

hence the powerful new trajectory of the phenotype-marker approach.

The paper: (a) first provides an overview of phenomics. (b) As it central illustrative example,

it then examines the area of brain-computer interface – examples of signal interpretation from

experimental neural implants and from portable EEG headsets are considered, first outside the

neural marker framework and then within it, to show how interpretation and engineering

efficacy are aided by a neurophenotype approach. (c) Some current developments in

neuroinformatics and neurocognitive markers are reviewed with the aim of addressing their

relevance to brain related biomedical engineering initiatives. Special attention is given to the

use of machine learning algorithms to find patterns in multidimensional neurophysiological

measures and map them to behaviorally defined phenotypes.

The paper may be of relevance to neuroscientists, neuro-engineers, and data scientists,

especially those interested in the exciting frontier of neural systems interface with computers

and machines.

Page 100: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

97

SICBENS-1292

Single and Mixed Microbial Biosorbents and the Influence of Their Varying

Dosages on Removal of Lead (Pb) in Multi-Metal Solutions

Adeline Su Yien Ting*, Carrie Siew Fang Sim

School of Science, Monash University Malaysia, Malaysia

[email protected]; [email protected]

Abstract

In this study, the fungal isolate Saccharicola bicolour (Sb) was applied as mixed biosorbent

with a metal-tolerant bacterium Stenotrophomonas maltophilia (Sm). The influence of

adsorbent dosages (0.10, 0.50, 1.00, 1.50 g) of the mixed biosorbent (Sm+Sb) was also tested

and compared against respective single biosorbents (Sm, Sb) to determine their efficacy in

removing Pb in multi-metal solutions. Results revealed that single biosorbent Sm was the most

effective in adsorbing Pb, followed by mixed biosorbent (Sm+Sb) and Sb single biosorbent.

Biosorbent dosage as low as 0.10 g was sufficient to remove Pb effectively, with highest

biosorption at this dosage reported for single application of Sm (8.712 mg g-1

), followed by

mixed biosorbent of Sm + Sb (4.946 mg g-1

) and by single biosorbent of Sb (2.389 mg g-1

). The

biosorption process for all three biosorbents complied with the pseudo-second order kinetic.

The FTIR-analysis indicated that functional groups detected in most biosorbents include

hydroxyl, amino, methyl, alkene, carbonyl, and carboxyl groups. Although single biosorbent

Sb has the most number of spectra peaks (11 peaks) compared to Sm+Sb (10 peaks) and Sm (8

peaks), efficacy was not significantly enhanced.

Keywords: biosorbent dosage; mixed biosorbent; Saccharicola bicolour; single biosorbent;

Stenotrophomonas maltophilia; Pb removal

1. Introduction

Lead (Pb) in the environment is of great concern due to their toxicity to living organisms. It is a

non-essential metal ion, often discharged from mining and welding industries, and has extreme

effects on cardiovascular, nervous, immune and reproductive systems [1, 2]. Throughout the

years, physicochemical processes have been employed to remove Pb and other metals from the

environment, which include ion exchange, reverse osmosis and chemical precipitation [3, 4].

These methods however, were less effective in low metal concentrations. As an alternative,

biosorption using biological materials are sought resulting in various bacterial (Bacillus,

Pseudomonas) and fungal (Aspergillus, Penicillium) species established as biosorbents [5].

Early studies performed were mostly on the use of single biosorbents. However, in this study,

mixed microbial biosorbents were used to mimic the various microorganisms in the natural

environment [6], and how they may interact with one another and influence biosorption.

Page 101: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

98

In this study, the biosorbents were tested in varying dosages as biosorbent dosages are known

to influence metal biosorption attributed to availability of binding sites on the surface of

biosorbents. In addition, we determined the mechanism of biosorption of the biosorbents via

kinetic modelling and examined their surface properties using the FTIR approach. The novelty

in our approach is the use of Saccharicola bicolour and Stenotrophomonas maltophilia, in

which the former is a new fungal endophyte, recently discovered to tolerate several key metals

[7]; and the latter a well-known bacterium with tolerance to Cu [8]. We also attempted this

study using multi-metal solution where it mimics the natural wastewaters. Hence, this paper

reports the influence of biosorbent dosages of mixed biosorbents (Sm+Sb) and their respective

single biosorbents (Sm, Sb) on the removal of Pb in multi-metal solutions.

2. Materials and Methods

Isolate Preparation and Biosorbent Development

The bacterial isolate S. maltophilia (Sm) used in this study was isolated from river sediment of

the Penchala River, Kuala Lumpur, Malaysia [8] while the fungal isolate S. bicolour (Sb) was

isolated from Phragmites, a plant used to treat leachate [7]. Both Sm and Sb were maintained

on Nutrient Agar (NA, Merck) and Potato Dextrose Agar (PDA, Merck), respectively, at room

temperature (25±2oC). To generate biomass, Sm was inoculated to 250 mL of Nutrient Broth

(NB, Merck) while Sb was cultured in 250 mL Potato Dextrose Broth (PDB, Merck). After 3-5

days of incubation, biomass of Sm was retrieved by centrifugation (9000 rpm, 7 min) while for

Sb, biomass was obtained via filtration using Whatman No. 1 filter paper. Both biomass were

autoclaved (121oC, 20 min), oven-dried, powdered, sieved (mesh size ~ 0.08 cm) and stored in

sterile bottles at room temperature (25±2oC) until use.

Biosorption Study

The biosorbents were prepared and assigned as Treatments 1 (T1), 2 (T2), 3 (T3) where T1:

Sm only, T2: Sb only, and T3: Sm+Sb (mixed-biosorbent). The dosage for each treatment

(biosorbent) was varied from 0.1, 0.5, 1.0 to 1.5 g biosorbent, and inoculated to 15 mL of

multi-metal solution (containing 100 ppm each of Pb, Cu, Zn, Cd). The initial pH was adjusted

to pH 5 and incubated with agitation (150 rpm, 480 min). At every sampling period (15, 30, 60,

120, 240, 360, 480 min), the solutions were filtered with filter paper and the collected filtrates

were analysed using Atomic Absorption Spectroscopy (AAS) [Agilent Technologies 240

Series AA, air-acetylene flame]. The settings were 15mA, with wavelength 217.0 nm for Pb.

The biosorption capacities (Q) were then calculated based on [9] as follows:

Page 102: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

99

Kinetic Modelling

To predict the rate controlling mechanisms, pseudo-first and pseudo-second order kinetic

models were used. Pseudo-first order kinetic involves the following equation:

Log (qe-qt)=log qe-

.

where qe: metal adsorbed at equilibrium; qt: metal adsorbed at particular time; k1: rate constant;

t: time

Pseudo-second order kinetic is expressed as:

t

where t/qt: contact time divided with adsorption at particular time; ƙ2: rate constant; qe:

adsorption

For pseudo-first order, plots of log (qe-qt) against t should give a linear relationship of which k

and qe were derived from the slope and intercept of the graph, respectively. Similarly, for plots

of pseudo-second order, t/q against t should give straight lines. The adsorption, qe and rate

constant, k2 were derived from the slope and intercept, respectively. Compliance to pseudo-first

order model suggests that neither boundary layer nor external resistance occurs at the

beginning of the biosorption process while a good fit to pseudo-second order model indicates

that biosorption is limited by chemisorption [10].

FTIR Analysis

The functional groups present on the surfaces of all the biosorbents were analysed using

Fourier Transform Infrared Spectroscopy (FTIR) [Thermo Scientific NicoletTM

iSTM

10] via the

Attenuated Total Reflectance (ATR) method. The dried and powdered biosorbents (as prepared

in previous sections), was directly introduced into the ATR diamond crystal. The IR

absorbance data were then obtained with a total of 16 scans at resolution of 4 cm-1

, for

wavenumbers ranging from 600-40000 cm-1

[11]. Spectra with percentage transmittance

against wavenumbers were generated for the single and mixed biosorbents. Functional groups

represented by the peaks generated were then identified.

Page 103: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

100

Statistical Analysis

The obtained data were analysed using ANOVA (Analysis of Variance). The mean and

standard deviations were compared with Tukey comparisons (HSD(0.05)) using the Statistical

Packaging for the Social Science (SPSS) software version 20.0.

3. Results and Discussions

Biosorption of Pb by Biosorbents and the Influences of Dosages

The single biosorbent Sm (T1) adsorbed Pb more effectively than mixed biosorbent (T3:

Sm+Sb) with 1.111 to 8.712 mg g-1

removed by the former, compared to lower levels of 0.573

to 4.946 mg g-1

of Pb adsorbed by the latter (Figure 1). The inferior performance by mixed

biosorbent (T3: Sm+Sb) may have been attributed to the presence of Sb in the biosorbent, as

the single biosorbent Sb (T2: Sb) removed only 0.551 to 2.389 mg g-1

of Pb. All three

biosorbents however, showed a similar trend where Pb was removed most effectively when

0.10 g biosorbent was used. At this dosage, single biosorbent of Sm (T1) adsorbed 8.712,

followed by mixed biosorbent (T3: Sm+Sb) with 4.946 and T2 (Sb) with 2.389 mg g-1

of Pb

(Figure 1). Increase in biosorbent dosages to 0.50, 1.00 and 1.50 g resulted in a significant

decline in amount of Pb adsorbed (except for T1: Sm), with lowest biosorption occurring at

1.50 g for T2: Sb (0.551 mg g-1

) and T3: Sm+Sb (0.573 mg g-1

). For T1: Sm, the lowest

biosorption was recorded when 1.00 g of biosorbent was used instead (1.111 mg g-1

) (Figure

1).

Our observations here suggest that biosorbents of the bacterial (Sm) origin may have superior

biosorption potential than fungi (Sb), presumably due to the negatively-charged surfaces of

bacteria that were capable of binding to cations [12]. Bacteria also have outer membranes

which are rich in negatively-charged phosphate groups which aids in metal binding. The

addition of Sb to Sm (mixed biosorbent) was antagonistic for the biosorption of Pb, as lower

levels were removed compared to use of single biosorbent Sm. This may be a result of ligands

and functional groups of the two organisms competing for metal cations thus interfering with

biosorption. It is also possible that the antagonistic interaction observed in this study is between

a combination of fungal (Sb) and bacterial (Sm) isolate, as other studies have shown that

mixtures of bacteria-bacteria biosorbents were able to remove more metals than their single

biosorbents [13]. For fungal biosorbents, biosorption is better when applied as mixed

biosorbent (T3: Sm+Sb) compared to single biosorbent (T2: Sb).This has been reported by [14]

although the mixtures used in their study were of fungal-fungal origin. Further investigations

using more combinations of bacterial-fungal and fungal-fungal as mixed biosorbents are

recommended. There may also be an influence of metal-metal interaction between the metals in

the multi-metal solution, where metal preference for binding may occur depending on the type

of biosorbent used. In reference to biosorbent dosages, lower dosages applied were more

Page 104: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

101

beneficial than higher dosages. One of the possible reasons is that aggregation of biomass

occurs when larger dosages are used resulting in lesser surface area for biosorption [15].

Kinetic Modelling for Biosorbents

Biosorption of Pb to Sm (T1), Sb (T2) and Sm+Sb (T3) is a rate-limiting step, and occurs as a

result of exchange of electrons between biosorbent and metal cations [10]. The compliance to

pseudo-second order was evident with higher R2 values derived compared to comparisons with

pseudo-first order (Table 1). In addition, the calculated qeq values were similar to

experimental qeqex values derived from pseudo-second order kinetic, suggesting a good fit to

pseudo-second order kinetic (Table 1).

Functional Groups Analysis via FTIR

There were approximately 8, 11 and 10 peaks observed in the spectra for T1 (Sm), T2 (Sb) and

T3 (Sm+Sb), respectively (Table 2, Figure 2). For T1 (Sm) peaks at wavenumbers 3265.88

cm-1

, 2924.87 cm-1

, 1633.36 cm-1

, 1519.94 cm-1

, 1455.20 cm-1

, 1393.04 cm-1

, 1223.66 cm-1

and

1065.54 cm-1

were detected, indicating possible functional groups of hydroxyl or amide,

methyl, alkene or carbonyl, aromatic alkene or nitro, methyl and carboxyl respectively (Table

2). As for T2 (Sb), a total of 11 peaks could be seen in this single biosorbent spectrum with

Page 105: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

102

wavenumbers 3265.53 cm-1

, 2922.38 cm-1

, 2852.60 cm-1

, 1743.37 cm-1

, 1625.73 cm-1

, 1548.76

cm-1

, 1376.63 cm-1

, 1311.60 cm-1

, 1236.37 cm-1

, 1151.59 cm-1

and 1027.30 cm-1

which

suggested possible functional groups of hydroxyl or amide, methyl, carbonyl, alkene or

carbonyl, aromatic alkene or nitro, methyl, nitro and carboxyl groups respectively (Table 2,

Figure 2). In mixed biosorbents, though there were differences in the number of peaks

observed; hydroxyl, amino and carboxyl groups are consistently present in all the biosorbents

(single and mixed biosorbents) suggesting primary roles in binding of Pb (Table 2, Figure 2).

4. Conclusion

To conclude, the single biosorbent of Sm was superior in removing Pb, followed by the mixed

biosorbent (Sm+Sb) while single biosorbent of the fungal origin (Sb) was the least effective.

Biosorption was attributed to the functional groups present on the biosorbents, which were

generally similar for single and mixed biosorbents. The biosorbent dosage that was most

effective in removing Pb was 0.10 g (for all three biosorbents) for 15 ml of multi-metal

solution.

Acknowledgements

This project supports a main project funded by the Ministry of Higher Education (MOHE)

under the FRGS scheme (FRGS/2/2013/STWN01/MUSM/02/2). The authors are also grateful

to Monash University Malaysia for the facilities to conduct the study.

Page 106: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

103

Page 107: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

104

References

[1] L. Järup, Hazards of heavy metal contamination, British Medical Bulletin, 2003, 68:

167-182.

[2] World Health Organization, 2006.

Page 108: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

105

[3] A. Malik, E. Grohmann, Environmental Protection Strategies for Sustainable Development,

2011, Springer, New York.

[4] R. Mohee, A. Mudhoo, Bioremediation and Sustainability: Research and Applications,

2012, John Wiley & Sons, Canada.

[5] R. Boopathy, Factors limiting bioremediation technologies, Bioresource Technology, 2000,

74: 63-67.

[6] H. Mikeskova, C. Novotny, K. Svobodova, Interspecific interactions in mixed microbial

cultures in a biodegradation perspective, Applied Microbiology and Biotechnology, 2012,

95: 861-870.

[7] C.S.F. Sim, W.S. Tan, A.S.Y. Ting, Endophytes from Phragmites for metal removal:

evaluating their metal tolerance, adaptive behaviour and biosorption efficacy,

Désalination and Water Treatment, 2015, DOI: 10.1080/19443994.2015.1013507.

[8] A.S.Y. Ting, C.C. Choong, Utilization of non-viable cells compared to viable cells of

Stenotrophomonas maltophilia for copper (Cu(ii)) removal from aqueous solutions,

Advances in Environmental Biology, 2009, 3: 204-209.

[9] S. Zafar, F. Aqil, I. Ahmad, Metal tolerance and biosorption potential of filamentous fungi

isolated from metal contaminated agricultural soil, Bioresource Technology, 2007, 98 (13):

2557–2561

[10] J. Febrianto, A.N. Kosasih, J. Sunarso, Y.H. Ju, N. Indraswati, S. Ismadji, 2009.

Equilbrium and kinetic studies in adsorption of heavy metals using biosorbent: a summary

of recent studies, Journal of Hazardous Materials, 2009, 162: 616-645.

[11] M. Iqbal, A. Saeed, S.I. Zafar, FTIR spectrophotometry, kinetics and adsorption isotherms

modelling, ion exchange and EDX analysis for understanding the mechanism of Cd2+

and

Pb2+

removal by mango peel waste, Journal of Hazardous Materials, 2009, 164: 161-171.

[12] P. Sanasi, J. Kader, B.S. Ismail, S. Salmijah, Sorption of Cr(VI), Cu(II), Pb(II) by growing

and non-growing cells of a bacterial consortium, Bioresource Technology, 2006, 97:

740-747.

[13] R. Gourdon, S. Bhande, E. Rus, S.S. Sofer, Comparison of cadmium biosorption by

gram positive and gram negative bacteria from activated sludge, Biotechnology Letters,

1990, 12: 839-842.

[14] R. Pan, L.Cao, R. Zhang, Combined effects of Cu, Cd, Pb, and Zn on the growth and

uptake of consortium of Cu-resistant Penicillium sp. A1 and Cd-resistant Fusarium sp.

A19, Journal of Hazardous Materials, 2009, 171 (1-3):761-766.

[15] A. Ö zer, G. Gürbüz, A. Ç alimli, B.K. Körbahti, B.K., Biosorption of copper (II) ions on

Enteromorpha prolifera: application of response surface methodology (RSM), Chemical

Engineering Journal, 2009, 146: 377–387.

Page 109: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

106

SICBENS-1300

Obesity Crusade through Structural Study on FTO and Its Inhibitor Design

Joel D.W.Toh

Institute of Molecular and Cell Biology, Singapore

Lingyi Sun, Esther C. Y. Woon

Department of Pharmacy, National University of Singapore, Singapore

Yong-Gui Gao

Institute of Molecular and Cell Biology, Singapore

School of Biological Sciences, Nanyang Technological University, Singapore

[email protected]

The AlkB family of nucleic acid demethylases are of intense biological and medical interest

because of their roles in nucleic acid repair and epigenetic modification. However their

functional and molecular mechanisms are unclear, hence, there is strong interest in developing

selective inhibitors for them. FTO protein, known as fat mass and obesity-associated protein,

belongs to the AlkB family. As the first mRNA demethylase that has been identified, the FTO

gene has been implicated in causing obesity, which is relevant to many diseases in humans.

Here we report the identification of key residues within the nucleotide-binding sites of the

AlkB subfamilies that likely determine their substrate specificity. We further provide proof of

principle that a strategy exploiting these inherent structural differences can enable selective and

potent inhibition of the AlkB subfamilies. This is demonstrated by the first report of a

subfamily-selective and cell-active FTO inhibitor 12. The distinct selectivity of 12 for FTO

against other AlkB subfamilies and 2OG oxygenases shall be of considerable interest with

regards to its potential use as a functional probe. The strategy outlined here is likely applicable

to other AlkB subfamilies, and, more widely, to other 2OG oxygenases.

Page 110: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

107

SICASE-732

Case Study: Experimental of New Propeller Design 2 Blades Type and

Observation Cavitation of Tailing Thai Boat

Sarinya Sanitwong Na Ayutthaya*

Kasetsart University, Faculty of International Maritime Studies, Thailand

[email protected]

Jaruphant Noosomton

Kasetsart University, Faculty of International Maritime Studies, Thailand

[email protected]

Abstract

This paper presents to new design of propeller 2 blade types of low-speed and observation

cavity flow around ship propellers experimentally. Testing of different types new model

propellers and local type propellers are performed in this study. The first a 2-blades, skew angle

18°, Developed area 35 call model-A (B2-18-35) and model-B a local type propeller which

commonly used by Thai fisherman. The cavitation phenomenon of model A and B at 850 rpm

were compared. It can be observed that cavitation of model A was less than model B at both

speeds. Surprisingly, cavitation at face of blade was observed for model-B, causing adverse

effect to performance of the propeller.

Keywords: Developed Area, Skew Angle, Cavitation Number ()

Page 111: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

108

SICASE-829

Model and Algorithm of Violator Detector Network problem: Application on

Traffic Network

Amber Shafiq

Department of Industrial and Systems Engineering, Kaist

[email protected]

Abstract

This paper utilizes the flow interception model with the objective of locating detectors on

transportation network to maximize the expected benefit to catch the violators who are threat

for public safety. We install the detectors where peoples or vehicles come from the residential

area near candidate location or flow passing by candidate location. Model was then solved

using two approaches: a mathematical approach and a greedy heuristic approach. The results

show that the improved greedy heuristic gives a solution that is very close to optimum in terms

of the number of detectors needed to intercept a given percentage of the vehicle flow. Several

numerical experiments are conducted to illustrate the computational efficiency and solution

quality of the proposed heuristic algorithm.

Keywords: Facilities planning and design, Flow interception problem, Traffic Network, Greedy

Heuristic, Genetics Algorithm

Introduction

In most facility location problems, the task is to locate facilities on a network to service a set of

customers located on the vertices of the network. The objective is to optimize the cost of

facility location or the cost of assigning customers to facilities, or both. Different variants of

facility location problems arise as a result of problem-specific characteristics such as the type

and number of facilities to locate and the type and quality of service required. Flow

interception problems form a distinct class where customers are not located on the vertices of

the network. Instead, they flow on the network between their respective origins and

destinations. The problem is to install detectors to optimize the expected benefit by catching

the violators on a traffic network. A violator can be caught by a detector at any node/candidate

location on its path and the benefit may depend on the position of the facility, flow and covered

length of the vehicle on the link before detection.

Traditional location_allocation models, such as the maximal covering location model (MCLM)

and the p-median model, aim to locate network facilities to optimally serve demand expressed

as weights at nodes [1_4]. Nowadays, many customers purchase services as part of routine

pre-planned trips, i.e., the daily commute to and from home and the workplace, instead of

Page 112: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

109

making a special-purpose trip to obtain a service. Such facilities include convenience stores,

gas stations, ATM machines, drugstores, laundries and restaurants. Thus, as the purchasing

behavior changes, there are cases where demand in a network is now expressed as flows, rather

than nodes. To solve these types of facility locations in a network where demand is not

expressed at nodes, but is exerted by traffic flowing between origins and destinations, Hodgson

[5] and Berman [6] present the flow interception problem (FIP) and developed a heuristic

greedy algorithm to solve the FIP. The basic problem of FIP [5,6] is to locate m facilities to

intercept as much flow as possible from a given set of pre-existing flows on the network. It

assumes the ``interception'' occurs if a flow passes through at least one facility. The focus is on

maximizing the total consumption of the service by ``flow-by'' customers traveling on

preplanned paths (e.g. daily commute). Based on the basic FIP, they also published a series of

studies for a class of FIP [7_9].

Real-time traffic information is sampled by detectors to monitor traffic status and to develop

control strategies. The effectiveness of a traffic surveillance system depends on not only the

accuracy of the sampled information but also the coverage over the transportation network.

However, implementing these new technologies usually requires large investment. Accuracy

and coverage are often two conflicting objectives due to limited resources: collecting high

quality information usually relies on sophisticated and expensive technologies and thus limited

budget would restrict the number of installations; on the other hand, due to the limited effective

range of most sensors, complete coverage over a network usually requires dense installations.

To balance this trade-off, intensive studies have been conducted to determine efficient and

reliable deployment of surveillance systems. Lam and Lo (1990) proposed a heuristic approach

to select locations for traffic volume count sensors in a roadway network. Yang et al. (1991)

conducted a robust analysis on the utility of traffic counting points for traffic O–D flow

estimation. Yang and Zhou (1998) proposed a sensor deployment framework to maximize such

utilities. This framework has been extended to accommodate turning traffic information

(Bianco et al., 2001,2006), existing installations and O–D information content (Ehlert et al.,

2006), screen line problem (Yang et al., 2006), time-varying network flows (Fei et al., 2007;

Fei and Mahmassani, 2008), railcar inspection under potential sensor failures (Ouyang et al.,

2009), and unobserved link flow estimation (Hu et al., 2009). The emergence of advanced

traffic sensing technologies also enabled flow estimation for individual O–D paths. For

example, Gentili and Mirchandani (2005) investigated guidelines for locating advanced traffic

sensors that are able to read both a vehicle‟s identification and its route information. Castillo et

al. (2008) proposed a mathematical model to determine the optimal locations of vehicle plate

scanning sensors for path flow reconstruction.

Page 113: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

110

Based on the above theory we want to locate detectors on traffic network to maximize the

expected benefit by catching the maximum violators. The violators are mixed with common

public or vehicles volume from any origin to destination.

Expected benefit depends on the vehicle flow volume and length or speed covered by the

violator travelling on assigned origin like home to destination as workplace or simply passing

through the detector location. The detector location is assigned as downstream and upstream

location of the nodes on the routes covered the OD pairs.

Literature Review

Dimensional variation is inherent to any manufacturing process. Therefore, it is important to

model and predict how it propagates through the processes. Fast and accurate evaluation of

inherent process variation can be critical in determining the final dimensional variation of an

assembled product and in selecting robust product/process designs. Several models have been

proposed in the past to predict how variation propagates during assembly. Initial approaches

were focused on rigid part assembly using either the Root Sum Squares (RSS) method or

Monte Carlo Simulation. Detailed review and discussion can be found in Lee and Woo(1990)

and Chase and Parkinson(1991).

Significant research has been conducted on fixture fault diagnosis, including the use of

principal component analysis (PCA) and designated component analysis (DCA). PCA is a

systematic methodology to diagnose fixture faults by extracting the principal components from

the measured data on the subassembly (Hu and Wu 1992). Because of its entire dependence on

the measurement data, the root cause of principal components extracted may not always have a

physical meaning. To address this problem, the method of designated component analysis

(DCA) was developed by Liu and Hu (2005). This approach first defines mutually orthogonal

dimensional variation patterns (called diagnostic vectors) for a part, each of which is associated

with one or more fixture faults. Then, actual measurement data are decomposed into the

components of the diagnostic vectors, disclosing the major components and thus the associated

fixture faults. DCA is a powerful method for simple problems, but it is not always obvious how

to define physically meaningful, mutually orthogonal patterns for complex part geometries.

More physics-based diagnostic vectors, which are only constrained to be linearly independent

with each other, were derived by Ceglarek and Shi (1996). The diagnostic vectors are defined

by simple geometric analyses of rigid body movement for each fixture fault. The same

diagnostic vectors were used for diagnosis of multiple fixture faults using the least squares

method by Apley and Shi (1998).This diagnosis approach was adopted by Camelio, Hu, and

Yim (2005) for the fixture fault diagnosis in the assembly of complaint parts, where the

diagnostic vectors corresponding to fixture faults were obtained by finite element analyses

(FEA). Furthermore, Camelio, Hu, and Yim (2005) also presented a methodology to determine

Page 114: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

111

the optimal locations of sensors on the parts by applying the effective independence (EfI)

method so that different diagnostic vectors can readily be distinguished from each other.

At station level, Liu et al.(1996) and Liu and Hu(1997) proposed a model to analyze the effect

of deformation and springback on assembly variation by applying linear mechanics and

statistics. Using finite element methods (FEM), they constructed a sensitivity matrix for

compliant parts of complex shapes. The sensitivity matrix establishes the linear relationship

between the incoming part deviation and the output assembly deviation. Long and Hu(1998)

extended this model to a unified model for variation simulation by considering part variation

and locating fixture variation. Shiu et al (1997) presented a simplified flexible beam

representation of body structures. Huang and Ceglarek(2002) presented a discrete cosine-

transformation (DCT) based decomposition method for modeling and control of compliant

assemblies form error. The method decomposes the dimensional error field into a series of

independent error modes. At multi-station level, Lawless et al(1999) proposed a method called

Variation Driver Analysis using time series analysis. The method is based in tracking the

characteristics of individual parts as they pass through multiple stations using autoregressive

models. Comparatively, little research has been done in multi-station systems considering

compliant, non-rigid parts. Liu and Hu(1997) developed a model to evaluate the spot weld

sequence in sheet metal assembly. This model considered a process where welding was carried

out in multiple stages. Chang and Gossard (1997) presented a graphic approach for

multi-station assembly of compliant parts. However, there are no analytical models for

variation analysis in multi-station compliant assembly systems.

It is critical to develop realistic models for sheet metal assembly process that consider

compliant parts and also include the station-to-station interaction in multi-station assembly

systems. Such models can be quite useful during both the design and launch stage of the

manufacturing system. During design, such models can be used to predict product variation so

that changes in parts or processes can be made early. During the launch of the manufacturing

system, such models can aid in the diagnosis of root causes of variation. The purpose of this

paper is to present a methodology for modeling the impact of part and tooling variation on the

dimensional quality on a multi-station assembly system with compliant sheet metal parts and

study how variation propagates from different subassemblies to the final product by defining a

geometric variation correlation measure.

PCA for Pattern Identification

The application of PCA in variation pattern identification for assembly systems was first

proposed by Hu and Wu. These patterns often are closely related to rigid body motions due to

fixture failure and can be diagnosed by comparing them with a set of pre-assumed hypothetical

variation patterns based on knowledge of the product/process. The purpose of PCA is to

Page 115: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

112

transform p correlated variables . . . into new uncorrelated

variables . . . , as defined in the following linear transformation:

From a geometric perspective, this is a coordinate rotation in the dimensional space. In Eq.

(1), the transformation matrix consists of p rows of mutually orthogonal vectors called

eigenvectors. The ith row of matrix B, described as , . . . - , is the ith eigenvector

of the covariance matrix obtained in the form

Where is the ith eigenvalue of the covariance matrix , and is an identity matrix. If one

wish to transform a set of variable by a linear transformation , whether is

orthogonal or not.

Example:

The data of 8 metal sheets is given:

Mean of the Principle Components:

Page 116: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

113

In the figure x-axis, y-axis and z-axis are measured in mm and z-axis gives us the mean value

of the 8 principle components of the given data.

Mean of the Data (Using pc and Eigen Vectors)

In the figure x-axis, y-axis and z-axis are measured in mm and z-axis gives us the mean value

of the data obtained from pc‟s and Eigen vectors while going to backward direction.

Designated Component Analysis

The calculation of a principal component is a totally data-driven process, i.e., the measurement

data determines the eigenvectors and eigenvalues. The pattern compounding effect of PCA

0 5 10 15 200

10

20

0

1

2

3

4

5

05

1015

20

0

5

10

15

20

0

5

10

15

Page 117: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

114

actually makes the interpretation of variation patterns difficult. The ability to distinguish less

significant patterns is also affected by the compounding effect. Because of this, only when a

variation pattern is very significant (usually the first eigenvector), we can approximate and

interpret it to a known pattern such as rigid body motion. The second and other eigenvectors

are usually hard to interpret.

Unlike PCA, in which we first estimate variation patterns statistically and then compare them

with physically known patterns, DCA first defines variation patterns with known physical

interpretations, and then measure their statistical significance. A basic requirement for those

known patterns (or vectors) is that they must be orthogonal to each other. As a result, the

designated components can be detected for existence, and also be decomposed, removed from

the original data domain, and analyzed and monitored individually. Furthermore, the

correlation among these designated components can be analyzed and utilized for diagnostic

purposes.

This is where DCA differs from the other process-oriented methods and methods based on

factor analysis.

With the same format as used for the definition of eigenvectors in Eq. (1), the designated

patterns (vectors) are denoted as the following obtained using Gram-Schmidt

orthonormalization:

After designating mutually orthogonal variation patterns, their corresponding designated

components can be calculated using the following equation:

Or

Where W are the designated components, D are the designated variation patterns and Y is the

given data of 8 sheets.

Page 118: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

115

DCA Based Fault Diagnosis

The percent contribution of each pattern, , to the total variation can be calculated individually

as a proportion of the measurement data variation explained by each pattern. The total variation

of the system is defined as the sum of the variance of all patterns. The effect of each pattern is

calculated as the effect of the estimated variance of each significant pattern in the total

variation of the significant patterns. Therefore, the contribution of each pattern is obtained as

follows:

( 𝑠 𝑠 )

( )

This equation characterizes the contribution ratio of to system variation.

Percentage Contribution of Each Designated Pattern Significance Level

According to the significance level of each variation pattern we can remove the rigid body

motion of Tz and By .

Gram-Schmidt Orthonormalization

In mathematics, particularly linear algebra and numerical analysis, the Gram–Schmidt process

is a method for orthonormalising a set of vectors in an inner product space, most commonly the

Euclidean space Rn. The Gram–Schmidt process takes a finite, linearly independent set S =

v1, …, vk for k ≤ n and generates an orthogonal set S′ = u1, …, uk that spans the same

k-dimensional subspace of Rn as S.

We define the projection operator by

where denotes the inner product of the vectors u and v. This operator projects the vector v

orthogonally onto the line spanned by vector u.

The Gram–Schmidt process then works as follows:

Page 119: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

116

The sequence u1, ..., uk is the required system of orthogonal vectors, and the normalized vectors

e1, ..., ek form an orthonormal set. The calculation of the sequence u1, ..., uk is known as Gram–

Schmidt orthogonalization, while the calculation of the sequence e1, ..., ek is known as Gram–

Schmidt orthonormalization as the vectors are normalized.

To check that these formulas yield an orthogonal sequence, first compute ‹ u1,u2 › by substituting

the above formula for u2: we get zero. Then use this to compute ‹ u1,u3 › again by substituting the

formula for u3: we get zero. The general proof proceeds by mathematical induction.

Geometrically, this method proceeds as follows: to compute ui, it projects vi orthogonally onto

the subspace U generated by u1, ..., ui−1, which is the same as the subspace generated by v1, ...,

vi−1. The vector ui is then defined to be the difference between vi and this projection, guaranteed

to be orthogonal to all of the vectors in the subspace U.

The Gram–Schmidt process also applies to a linearly independent countably infinite sequence

vii. The result is an orthogonal (or orthonormal) sequence uii such that for natural number n:

the algebraic span of v1, ..., vn is the same as that of u1, ..., un.

Page 120: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

117

If the Gram–Schmidt process is applied to a linearly dependent sequence, it outputs the 0

vector on the ith step, assuming that vi is a linear combination of v1, ..., vi−1. If an orthonormal

basis is to be produced, then the algorithm should test for zero vectors in the output and discard

them because no multiple of a zero vector can have a length of 1. The number of vectors output

by the algorithm will then be the dimension of the space spanned by the original inputs.

Geometric Variation

Geometric variation is obtained using the following formula:

∑ ( 𝑠 )

Where C‟values(significance level of each designated pattern) are the weights and mode shapes

are the corresponding designated component and „i‟ is the total number of mode shapes which

is 5 in our case.

Geometric Variation of Weighted Mode Shape

This figure tells us about the geometric variation of all 5 weighted mode shapes. In the figure

x-axis, y-axis and z-axis are measured in mm and z-axis gives us geometric variation of the 5

mode shapes.

0

5

10

15

20

05

1015

20

0.01

0.012

0.014

0.016

0.018

0.02

Page 121: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

118

Variation Pattern of Original Data

In the figure x-axis, y-axis and z-axis are measured in mm and z-axis gives us the mean value

of the 8 sheet data.

Error Variation Pattern between Geometric Variation and Original Data

This error is calculated using following formula

Where geometric variation is the sum of weights of 5 mode shape variation and data matrix is

the 8 sheet data.

In the figure x-axis, y-axis and z-axis are measured in mm and z-axis gives us the error value

between geometric variation of mode shapes and the given data.

We also calculated the error percentage as

0 510

15 20

0

5

10

15

20

0

2

4

6

8

10

12

0 2 4 6 8 10 12 14 16 18

0

5

10

15

20

-15

-10

-5

0

Page 122: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

119

(

) 00

Where Error is the value calculated in the above formula and data mean is the mean of the 8

sheets data. Error% has the value -0.0100.

Proposed Methodology

Multi-Station Assembly Model

The automotive body assembly process will be used to develop the methodology for modeling

and analyzing dimensional variation propagation in multi-station systems. However, the

developed model can be generalized into other multi-station assembly process with compliant

parts such as shipbuilding or furniture manufacturing.

An automotive body assembly process is a multi-leveled hierarchical process, in which sheet

metal parts are joined together to form a subassembly. During the assembly process, each part

or subassembly becomes an input for the subsequent stations. While parts move from one

station to another, dimensional variation of the parts and subassemblies propagates through the

system. The station-to-station interactions cause an increase or sometimes decrease of the

dimensional variation. An assembly process can be considered a discrete-time dynamical

system, where the independent variable time can represent the station location. Then, a state

space representation can be developed to illustrate the part deviation. In station k, part

deviation after assembly operations is function of the input parts deviation and major mode

designated patterns. Then, part deviation can be calculated by the state equation, if function f is

known. The objective of the model is to define the appropriate functions f.

( ) ( ( ) ( )) ( )

where X(k) represents the designated components in the assembly at station k, D(k) the

designated patterns of major mode shapes at station k and Y(k) the measurement data of sheet

metal parts variation at station k.

Problem:

How do we find the function “f” (which is the function of designated patterns)?

Following methods are used to develop “f”

1- PCA gives the designated patterns in the form of Eigen vectors.

2- DCA defines the designated patterns with known physical interpretation of the metal

sheets or from the human knowledge using previous data.

3- Define the weighted linear combination of the physical known patterns of the metal sheets

and estimate the weights using least square method.

Page 123: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

120

Methodology

Based on the concept of geometric covariance (Camelio, Hu, and Marin 2004), it can be

assumed that the deformation vector of the assembly components can be decomposed in the

contribution of different deformation patterns. Therefore, the part variation vector can be

modeled as a linear combination of patterns, , each of which may represent a

potential variation pattern of the parts, as will be explained in next section. Then, the

deformation vector for the parts can be written as

. . .

Where

[

]

whose rows are the number of input sources and columns are the number of variation patterns.

xi (i = 1, 2, …, q) are the coefficients of the linear combination and represent the weight of the

each pattern in u. The dimensions of the vectors, bi and u, are both assumed to be p × 1; x

vector dimensions are q × 1; and B dimensions are p × q. p corresponds to the number of input

sources or key control characteristics (KCC).

The assembly variation vector, .

=

=[

𝑠 𝑠 𝑠 𝑠

]

.

different from those of the parts variation vector, u and is the sensitivity matrix obtained

using finite element analysis. The value of m here corresponds to the number of measurement

points on the assembly.

Page 124: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

121

The measurement vector, y, in Figure 1 is simply modeled as the sum of the assembly variation

and noise.

Given that the matrices S and B are constant and known, Eq can be simplified as follows:

. . . .

often called the diagnostic matrix is defined as an m × q matrix. The matrix D represents the

effect of the different deformation patterns of the components on the assembly. It should be

noted from Eq. that the measurement vector, y, has the same dimension, m, as the assembly

variation vector, v. These m points of measurement must be carefully selected and thus the

sensitivity matrix, S, must be defined such that . yields v at those m selected points. The

columns of the matrix D, often called the diagnostic vectors, may be interpreted as the effect of

deformation pattern represented by each diagnostic vector, . , on the assembly

variation measurement.

The components of the vector x may accordingly be interpreted as the weights of those

components existing in the measurement y. From the problem of the present study may be

interpreted as finding the weights of diagnostic vectors x from the assembly measurement data

y given the diagnostic matrix D. In other words, the diagnostic problem is to estimate the

amount of variation in the measured data that can be explained by each designated pattern.

To construct the diagnostic matrix, , as . and to reduce its number of rows on to the

desired number of measurements, , we used the optimal sensor placement method. The

measurement data are obtained online from the measurement sensors, which

provide , for the j-th assembly and i-th station.

For each measured part, a measurement vector is obtained. The corresponding weight

vector, , is estimated using the least-squares method, as

( )−

( )

Page 125: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

122

where is the least-squares estimator of . The estimator differs from the real

contribution because the noise effect is included. This approach requires the matrix to be

invertible. In other words, must be of full rank and will be look like

The percent contribution of each pattern , , to the total variation can be calculated

individually as a proportion of the measurement data variation explained by each pattern. The

total variation of the system is defined as the sum of the variance of all patterns. The effect of

each pattern is calculated as the effect of the estimated variance of each significant pattern in

the total variation of the significant patterns. Therefore, the contribution of each pattern is

obtained as follows:

( ) (

)

The function diag is defined as the diagonal of a matrix. The trace function is defined as the

sum of the variances of all significant components. If the k-th diagnostic vector (or equivalently

the k-th assembly pattern) is found to be significant, the k-th part variation pattern, , is

regarded as a significant source for the assembly variation.

Flow Chart of the Assembly Variation for One Station:

Page 126: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

123

Results of Step 1:

The data was given according to the 2 steps of plate assembly in figure below

Page 127: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

124

Redline shows the welding line and we have to assemble 3 plates in 2 steps.

PCA Analysis:

In the figure x-axis, y-axis and z-axis are measured in mm where x and y-axiz shows the grid

points and z-axis gives mean value of the principle components of the given data in step 1.

0

5

10

15

0

5

10

15-0.1

-0.05

0

0.05

0.1

0.15

Page 128: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

125

DCA Based Fault Diagnosis:

Percentage Contribution of Each Designated Pattern Significance Level

Using DCA, after observing the significance level of each variation pattern we see that Rx is

cause of fault.

Least Square Analysis:

Using least square analysis, after observing the significance level of each variation pattern we

see that Rx is cause of fault.

Page 129: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

126

Results of Step 2:

PCA Analysis:

In the figure x-axis, y-axis and z-axis are measured in mm where x and y-axiz shows the grid

points and z-axis gives mean value of the principle components of the given data in step 1.

DCA Based Fault Diagnosis:

Percentage Contribution of Each Designated Pattern Significance Level

Using DCA, after observing the significance level of each variation pattern we see that Ry is

cause of fault.

0

5

10

15

0

5

10

15-0.1

-0.05

0

0.05

0.1

Page 130: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

127

Least Square Analysis:

Using least square analysis, after observing the significance level of each variation pattern we

see that Ry is cause of fault.

Conclusion

We defined multistage assembly model and test it with designated component analysis. Also,

the results are compared with Least square analysis. It concludes that multistage assembly can

detect the faults in assembly welding more accurately than the single stage assembly.

References

Apley, D. and Shi, J. (1998). “Diagnosis of multiple fixture faults in panel assembly.” Journal

of Mfg. Science and Engg. (v120), pp793-801.

Liu, Y.G. and Hu, S.J. (2005). “Assembly fixture fault diagnosis using Designated Component

Analysis.” ASME Journal of Mfg.Science and Engg. (v127, n2), pp358-368.

Strang, G. (1988). Linear Algebra and Its Applications, 3rd ed.Harcourt College Publishers.

Hu, S. J., and Wu, S. M., 1992, „„Identifying Sources of Variation in Automobile Body

Assembly and Using Principal Component Analysis,‟‟ Transaction of NAMRI/SME XX,

pp. 311–316

J A.Cam and Yim,H. J. (2006). “Identification of Dimensional Variation Patterns on Complaint

Assemblies.” Jounal of Manufacturing Systems. (v25,n2). pp. 65-76

Lee, W. J., and Woo, T. C., 1990, „„Tolerances: Their Analysis and Synthesis,‟‟ ASME J. Ind.,

112, pp. 113–121.

Chase, K. W., and Parkinson, 1991, „„A Survey of Research in the Application of Tolerance

Analysis to the Design of Mechanical Assemblies,‟‟ Research in Engineering Design, No.

3, pp. 23–37.

Hu, S.J. and Wu, S.M. (1992). “Identifying root causes of variation in automobile body

assembly using Principal Component Analysis.” Transactions of NAMRI/SME (v20),

pp311-316.

Liu, Y.G. and Hu, S.J. (2005). “Assembly fixture fault diagnosis using Designated Component

Analysis.” ASME Journal of Mfg. Science and Engg. (v127, n2), pp358-368.

Ceglarek, D. and Shi, J. (1996). “Fixture failure diagnosis for autobody assembly using pattern

recognition.” ASME Journal of Engg. for Industry (v118), pp55-66.

Page 131: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

128

Apley, D. and Shi, J. (1998). “Diagnosis of multiple fixture faults in panel assembly.” Journal

of Mfg. Science and Engg. (v120), pp793-801.

Camelio, J.; Hu, S.J.; and Yim, H. (2005). “Sensor placement for effective diagnosis of

multiple faults in fixturing of compliant parts.” ASME Journal of Mfg. Science and Engg.

(v127,n1),pp68-74.

Liu, S. C., Hu, S. J., and Woo, T. C., 1996, „„Tolerance Analysis for Sheet Metal Assemblies,‟‟

ASME J. Mech. Div., 118~1!, pp. 62–67.

Shiu, B., Ceglarek, D., and Shi, J., 1997, „„Flexible Beam-Based Modeling of Sheet Metal

Assembly for Dimensional Control,‟‟ Transactions of NAMRI/ SME, 25, pp. 49–54.

Huang, W., and Ceglarek, D., 2002, „„Mode-based Decomposition of Part Form Error by

Discrete-Cosine-Transform with Implementation to Assembly and Stamping System with

Compliant Parts,‟‟ CIRP Ann., 51~1!, pp. 21–26.

Lawless, J. F., Mackay, R. J., and Robinson, J. A., 1999, „„Analysis of Variation Transmission

in Manufacturing Processes-Part I,‟‟ J. Quality Technol., 31~2!, pp. 131–142.

S.Charles Liu, S.Jack Hu (1997), “Variation Simulation for deformable Sheet Metal

Assemblies Using Finite Element Methods”. J. Manuf. Sci. Eng. 119(3), 368-374.

Minho Chang, David C Gossard(1997), “Modeling the assembly of compliant, non-ideal

parts”.Computer –Aided Design. 29(10), pp 701-708.

Mantripragada, R., and Whitney, D. E., 1999, „„Modeling and Controlling Variation

Propagation in Mechanical Assemblies Using State Transition Models,”IEEE Trans. Rob.

Autom., 115~1!, pp. 124–140.

Page 132: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

129

Oral Sessions –June 28th

, 2015

Material Science & Engineering

Session Chair: Adita Evalina Fitria

SICASE-771

Interfacial Reactions of the Cu/Sn/Ni Sandwich Couples

Tzu-Ting Huang︱National Taiwan University of Science and Technology

Shin-Jung Chai︱National Taiwan University of Science and Technology

Yee-Wen Yen︱National Taiwan University of Science and Technology

SICASE-772

Dissolution Behavior of Ni Substrate and Ni3Sn4 Phase in Molten Lead-Free Solders

Yen Wei Chang︱National Taiwan University of Science and Technology

Meng Han Guo︱National Taiwan University of Science and Technology

Yee Wen Yen︱National Taiwan University of Science and Technology

SICASE-734

Development of A Method to Design An Electric Activated NiTi-Based Shape-Memory

Wire Actuator

Benjamin Fleczok︱Ruhr University Bochum

Dieter Kreimeier︱Ruhr University Bochum

SICASE-740

An Investigation Using Self-Sensing to Estimate the Lifetime of Shape Memory Actuators

Christian Rathmann︱Ruhr University Bochum

Benjamin Fleczok︱Ruhr University Bochum

Dieter Kreimeier︱Ruhr University Bochum

2015/6/28 Sunday 09:00-10:30 Room 2

Page 133: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

130

SICASE-753

Effect of Carbon Nanotube Composition to Enhance Wear Resistance and Self –

Lubrication Cylinder Liner Based on CNT – Al2O3 + 13% TiO2 Nanocomposite by Cold

Spraying Method

Adita Evalina Fitria︱Universitas Indonesia

Aulia Fitriani︱Universitas Indonesia

Desak Putu Dewi Chrisnanda Indrayuni︱Universitas Indonesia

Ernitha Yuniar Ghaisani︱Universitas Indonesia

SICASE-755

Development of Leucite Glass-Ceramics for Non-Metallic Dental Product

Siti Mazatul Azwa Bt Saiyed Mohd Nurddin︱Mineral Research Centre

Page 134: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

131

SICASE-771

Interfacial Reactions of the Cu/Sn/Ni Sandwich Couples

Tzu-Ting Huang, Shin-Jung Chai, Yee-wen Yen*

Department of Material Science and Engineering,

National Taiwan University of Science and Technology, Taiwan (R.O.C.) *[email protected]

Abstract

The 3D IC structure has replaced the traditional 2D advanced micro-electronic packaging. The

Cu/Sn/Ni sandwich structure is commonly used in the solder joint. The interfacial reactions,

including the surface morphology, intermetallic compound (IMC) formation, phase

transformation and Sn layer consumption in the Cu/Sn/Ni sandwich couple with different Sn

layer thicknesses at, 5, 10 and 15 µm, were investigated in this study. The reaction couples

were reflowed at 250oC for 1, 3 and 5 min, and then aged at 180

oC for 300 h. The results

indicated that at the same reflowing condition, the thick Sn layer comparing with the thin Sn

layer caused the longer time to consume the Sn layer. In the condition of reflowing for 3 and 5

min, the phase transformation occurred lately with the increase the Sn layer thickness. When

the reaction couple was reflowed for 1 min, the Cu3Sn phase thickness was decreased with the

increase of the Sn layer thickness. No Ni atoms in Cu3Sn were found during the aging process

for 300 h. Thus, the (Cu, Ni)6Sn5 might be the good diffusion barrier for Ni atoms to diffuse

toward the Cu3Sn phase.

Key words: 3D IC; Cu/Sn/Ni sandwich couple; interfacial reaction; diffusion barrier

1. Introduction

The 3D IC structure has replaced the traditional 2D structure in advanced micro-electronic

packaging. 3D IC packing uses solders to connect the electronic devices and substrates. After

high-temperature aging the solder will form intermetallic compounds (IMC) at the interface.

IMC formations affect interface morphology and negatively impacting the electronic products

reliability. These solder joints are microscopic in size, giving IMC formation great influence on

solder joints [1]. Electronic products containing lead components are prohibited from sale due

to environmental protection legislation. Lead-free solders, based on Sn and added with Ag and

Cu (SAC), have replaced the traditional Sn-Pb solders. SAC has good mechanical properties,

wettability and creep resistance [2-3].

The most common solder combination is Cu/solder/Ni in the flip-chip. Au on the substrate will

rapidly fuse into solder during reflowing process. On the circuit board side, organic surface

preservative (OSP) will be moved during reflowing.

Page 135: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

132

This movement causes the Ni layer and Cu layer to react directly with the solder form the

Cu/solder/Ni sandwich structure [4-7]. With respect to different thickness of Sn, from 5 to 15

µm, we discuss the sandwich structure interfacial reactions at different reflowing temperatures.

We observe IMC formation under these experimental conditions.

2. Experimental Procedures

100 µm Cu thickness was used as the substrate in this study. The substrate was grinded and

polished before electroplating. A Sn layer was electroplated onto the Cu, followed by

electroplating a Ni layer onto the Sn. This formed the Cu/Sn/Ni sandwich structure. The Sn

electroplating solution contains Deionized water 500 ml, Solderon Acid HC 233 ml, Solderon

Tin 60 ml, Solderon ST-380 antioxidant 80 ml, Solderon ST-380 primary 4 ml and Solderon

ST-380 secondary 20 ml. The Ni electroplating solution contains NiSO4.6H2O 82.5 ml, FX-510

3 ml, DI water 64.5 ml, NiCl2.6H2O 2.25 g and H3BO3 6 g. The reaction couples were prepared

by electroplating 5, 10 and 15 µm-thick Sn layers onto Cu foil. Sn electroplating was carried

out at 5 ASD (A/dm2), while 10 µm-thick Ni was performed at 60°C for 3 min

The reaction couples, without heat treatment, were mounted in epoxy and subjected to a

metallographic grinding-and-polishing process. Optical Microscopy (OM) and Scanning

Electron Microscopy (SEM, HITACHI TM-1000) were used to examine the interface. The

reaction couples, Cu/Sn(5 µm)/Ni, Cu/Sn(10 µm)/Ni and Cu/Sn(15 µm)/Ni, were first placed

in a furnace at 250°C for 1, 3 and 5 min for reflowing. The samples were cooled and then

grinded and polished again. The experimental samples were then aged at 180°C for 3, 9, 20, 80,

100, 150, 200 and 300 hours. The intermetallic compounds (IMC) were then observed using

energy energy dispersive x-ray spectrometer (EDS) mixed binary phase diagram and Dual

Beam-Focused Ion Beam (DFIB) for compositional analysis and interfacial morphology. IMC

thickness were observed using SigmaScan Pro5.0. Five data points from each aging condition

were collected to calculate the average thickness.

3. Results and Discussion

We focused on the interfacial reaction between Cu and Ni using Sn at different thicknesses.

Solder joint cross sections were observed. IMCs were formed at the interface between the

substrate, Cu, and coating layer, Ni based on Cheng [8].

3.1 Interfacial Reaction of Cu/Sn(5 µm)/Ni

Figure 1(a) presents Cu/Sn(5 µm)/Ni reflowing for 1 min at 250°C. IMC formed at interface of

Sn/Cu. The gray region composition is Cu-46.3 at.% Sn and Cu-25.7 at.% Sn in the dark gray

region. This phase is likely to be the Cu6Sn5 and Cu3Sn [9]. On the Ni/Sn side, the IMC

composition is Cu-40.7 at.%Ni-58.1 at.% Sn and is likely to be the Ni3Sn4 phase [10]. Thus the

Cu diffusion rate is faster than Ni, no Ni diffusion aoccured at Sn/Cu. Only scant Cu atoms

Page 136: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

133

diffused into Ni3Sn4. (Ni, Cu)3Sn4 is written to present the solubility.

The IMC becomes obviously thicker after aging for 3 hours, as shown in Figure 1(b). Some Ni

atoms are observed diffusing into Cu6Sn5, and we present it as (Cu, Ni)6Sn5. The Ni solubility

in Cu6Sn5 is 0.24 at.%. On the Ni/Sn side, the Ni solubility becomes 1.5 at.% with the increase

in aging time. Table 1 shows the solubility of Ni and Cu in each phase.

As the aging time increased to 50 hours, as Figure 1(c) shows, it forms (Cu, Ni)6Sn5+(Ni,

Cu)3Sn4 on the Ni/Sn side. Comparing the Cu solubility in (Ni, Cu)3Sn4 at 20 and 50 hours, the

solubility becomes less as the aging time increases, as listed in Table 1. The main reason is (Ni,

Cu)3Sn4 changes into (Cu, Ni)6Sn5+(Ni, Cu)3Sn4 after aging to 50 hours, so some Cu solubility

turns into (Cu, Ni)6Sn5.

Before aging to 100 hours, Ni atoms solute into (Cu, Ni)6Sn5 increases as the aging time

increases. But after aging to 100 hours, the solubility drops to 6.9 at.%. As shown in Figure

1(d), (Cu, Ni)6Sn5 contact each other at both ends. Therefore, Ni tends to reduce in order to

balance the concentration. Figure 1(e) presents all (Ni, Cu)3Sn4 changes into (Cu, Ni)6Sn5 and

the solubility of Ni reduces to 2.8 at.% when aging to 150 hours. When aging to 300 hours, the

Sn layer is tollay replaced by (Cu, Ni)6Sn5 and the solubility of Ni increases with the aging

time in this stage. Overall, Cu3Sn becomes thicker and the Ni solubility increases with time.

Page 137: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

134

Page 138: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

135

The two other reaction couples, reflowed at 250°C for 3 min and 5 min and then aged at 180°C

for 300 hours , exhibited similar phase transformation results s reflowing for 1 min. On the

Sn/Cu side the IMC types are (Cu, Ni)6Sn5 and Cu3Sn. On the Ni/Sn side, (Ni, Cu)3Sn4 also

turns into (Cu, Ni)6Sn5 after extended aging, as Figure 2 shows. The solubility is tabulated in

Table 1 and it shows that Ni atoms increase with time.

Figure 3 shows a cross section of Cu/Sn(5 µm)/Ni reflowed for 5 min and aged for 300 hours.

When aging to 300 hours the Sn layer is totally replaced by (Cu, Ni)6Sn5. The white dashed

line region is the Cu3Sn phase. The literature indicates that Cu3Sn should exhibit a columnar

structure, but we cannot find corresponding results from the FIB image [11]. It is speculated

that Cu3Sn formation in this study is different from that in the literature.

In summary, Cu/Sn(5 µm)/Ni forms same the IMC at different reflowing time, as Figure 4

shows. The only difference is no Ni solubility on the Cu/Sn side occurs when reflowed for 1

min. (Cu, Ni)6Sn5 is considered a diffusion barrier because no Ni solutes into Cu3Sn when aged

to 300 hours. The IMC formation under which the reflowing conditions and aging times

completely consumed the Sn layer are listed in Tables 2 and 3.

Figure 5 shows the relationship between the Cu3Sn thickness and reflowing time. When aged to

300 hours the thickest Cu3Sn was produced on the condition of reflowing for 1 min and then is

5 min. The reason is that (Cu, Ni)6Sn5 forms faster as the reflowing time increases, inhibiting

Cu3Sn growth [12].

Page 139: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

136

However, the Sn layer is consumed earlier at 5 min than 3 min, and it makes Cu3Sn grow faster

in the late. It can be expected that if we prolong the aging time, the thickness at 5 min reflow

will be greater than at 1 min.

Page 140: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

137

3.2 Interfacial Reaction of Cu/Sn(10 µm)/Ni and Cu/Sn(15 µm)/Ni

Similar results are obtained when solder is reflowed for 1, 3 and 5 min in the two reaction

couples. The IMC formation at different stages is shown in Table 2. Ni atoms solute into (Cu,

Ni)6Sn5 and also increase with aging time. (Cu, Ni)6Sn5 is also considered a diffusion barrier

because no Ni solutes into Cu3Sn when the aging is extended to 300 hours. In Cu/Sn(15

µm)/Ni, it is worth noting that the Sn layer was not completely consumed after aging to 300

hours and the Cu3Sn thickness becomes greater at reflowing for 5 min than 1 min.

3.3 The Comparison of Three Reaction Couples at Different Reflowing Times.

For the reaction couples of Cu/Sn(5 µm)/Ni and Cu/Sn(10 µm)/Ni were reflowed for 3 and 5

min, the phase transformation stage was delayed as the Sn layer became thicker. In these two

reaction couples the phase transformation occurred early with increased reflowing time.

Conversely, Cu3Sn became thinner as the Sn layer getting thicker. When Sn and Cu reacted

with each other, Cu6Sn5 grew first. Therefore, a thicker Sn layer produces a the thinner Cu3Sn

layer, as shown in Fig. 6.

Page 141: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

138

Conclusions

In Cu/Sn(5 µm)/Ni and Cu/Sn(10 µm)/Ni, the phase transformation occurred early with the

reflowing time. In the same reflowing time, Cu3Sn got thinner as Sn layer was thicker. In the

same thickness of Sn, Cu3Sn got thicker as the aging time increasing, and Cu6Sn5 is considered

as a diffusion barrier of Ni diffusing to Cu3Sn.

Acknowledgements

The authors acknowledge financial support from the Ministry of Education (MoE) Top

University Projects. The author is also thankful for the help from Mr. S. C. Laiw who works at

National Taiwan University of Science and Technology for FESEM-EDS operation and

analysis.

Reference

M. P. Tian, Y. W. Yen, Electronic Packaging Technology for Semiconductor Devices, Taipei:

Wu-Nan Book Inc, 2005, pp. 5-8.

Y. W. Liu, RoHS Green Directive: global environmental norms & lead-free soldering

technology, Taipei: Dotop Media CO., LTD., 2005.

J. W. Yoon, S. W. Kim, S. B. Jung, J. Electron. Mater, 392 (2005) 247-252.

Y. W. Yen, Y. C. Chiang, C. C. Jao, D. W. Liaw, S. C. Lo, C. Lee, Journal of Alloys and

Compounds, 509 (2011) 4595-4602

Q. P. Li. 2005, Cross-Interaction of Ni and Cu in Sn. Master dissertation, Taoyuan: Graduate

Institute of Chemical and Materials Engineering, National Central University.

S. C. Yang, 2010, Combined Effects of Cu Concentration, Solder Volume, and Temperature on

SnAgCu/Ni Interfacial Reaction, PhD dissertation, Taipei:, Graduate Institute of Materials

Science and Engineering, National Taiwan University.

A. Munding, H. Hubner, A. Kaiser, S. Penka, P. Benkart, E. Kohn, Wafer Level 3-D ICs

Process Technology, A. Munding, Springer Sci. & Bus. Media, (2008) 132

C. W. Chang, S. C. Yang, C. R. Kao, J. Electron. Mater., 36 (2007) 1455-1461

Page 142: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

139

N. Saunders, A. P. Miodownik, 11 (1990) 278-287.

K. N. Tu, R. D. Thompson, Acta metal, 30 (1982) 947-952.

J. F. Li, P. A. Agyakwa, C. M. Johnson, Acta Mater, 59 (2011) 1198-1211.

Y. W. Wang, 2010, Adding Cu and Ni to Solders on the Mechanism of Retarding Micro Voids

and Cu3Sn, Master dissertation, Taipei: Graduate Institute of Materials Science and

Engineering, National Taiwan University.

Page 143: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

140

SICASE-772

Dissolution Behavior of Ni Substrate and Ni3Sn4 Phase in Molten Lead-Free

Solders

Yen Wei Chang, Meng Han Guo, Yee Wen Yen*

Department of Material Science and Engineering,

National Taiwan University of Science and Technology, Taiwan (R.O.C.) *[email protected]

The dissolution behavior of the Ni or Ni3Sn4 phase molten lead-free solders in molten Sn,

Sn-3.0Ag-0.5Cu (SAC), Sn-0.7Cu (SC), Sn-58Bi (SB), and Sn-9Zn (SZ) at 240, 270, and 300

was investigated in this study. The experimental results show the dissolution rate of Ni in

the molten solders follows the order Sn> SAC> SC> SB> SZ. The dense and thick Ni5(Zn,

Sn)21 phase was formed at the SZ/Ni interface and could restrain the Ni atoms to dissolve into

the molten SZ. Dissolution rate of Ni3Sn4 phase in the molten solders follows the order Sn>

SAC> SC> SB at 240 , and SC> Sn> SAC> SB at 300. Massive spilling of the (Cu,

Ni)6Sn5 phase was observed in the SAC/Ni3Sn4 and SC/Ni3Sn4 interface. The SZ solder reacted

with the Ni3Sn4 phase to form the Ni5(Zn, Sn)21 phase at the interface. And then Zn atom

diffused toward the Ni3Sn4 phase to form the Ni3(Sn, Zn)4 phase.

Key words: dissolution behavior; Ni; Ni3Sn4 phase; molten lead-free solders

1. Introduction

Traditional tin-lead solder has excellent welding properties and reliability 1-2

. However, lead

solder, a very toxic metal, causes environmental pollution 3-5

. Most electronic manufacturers

have replaced traditional tin-lead solder to meet world-wide lead-free regulations (WEEE &

RoHS) 6. Many kinds of lead-free solders have been developed, such as pure Sn,

Sn-3.0Ag-0.5Cu, Sn-0.7Cu, and Sn-9.0Zn, the lead-free solder with the most potential.

Nickel is typically used in lead-free solder as a surface finish or diffusion barrier for the under

bump metallization (UBM) layer. The interface reactions between nickel and solder are slow

rate, which means it prevents the solder from having reactions with the substrate 7-8

. In the

electronic packaging industry, nickel and its intermetallic compounds have a significant issue,

in that it directly affects the solder and UBM contact reliability 9-12

.

Studies focused on lead-free solder and electroless nickel substrate dissolution exist 13-15

, but

no research exists that indicates the dissolution rate values. This study explored the morphology,

intermetallic compounds and dissolution reaction mechanism of Ni/ solder, and Ni3Sn4/ solder

Page 144: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

141

at different reaction temperatures and times. It is expected that the results of this study can

provide the industry a reference for product reliabilities.

2. Experimental

This research is divided into two parts: the Ni/ solder dissolution rate, and the Ni3Sn4/ solder

dissolution rate. Nickel wire 0.63 mm in diameter is used as the substrate. The nickel substrate

was cleaned and polished using 1 μm aluminum oxide to produce a smooth surface before

experimentation. Five grams of Sn, Sn-3.0Ag-0.5Cu (SAC), Sn-0.7Cu (SC), Sn-58Bi (SB), and

Sn-9Zn (SZ) were used as the various lead-free solders. The solder was placed into a quartz

tube and the tube placed in a vertical tubular furnace to melt the tin solder alloy. The nickel

wire with flux (W-2326) was then dipped vertically into the molten solder. The reaction

temperatures were set at 240, 270, and 300. The reaction times were set at 10, 20, 30, 40, and

50 min. After the process was completed the reaction couples were quenched and mounted

using a mounting press. The mounted reaction couples were ground with abrasive paper

starting with number 400 and advancing sequentially through 600, 800, 1200, 2400 to 4000

until the interface was revealed. The specimens were then polished using 0.3 and 0.1 μm

aluminum oxide powder. After the metallographic procedures the specimens were inspected

using an optical microscope (OM; Olympus BX51M, Japan) to observe the surface and

reaction interface. A scanning electron microscope (SEM; Hitachi TM-3000, Japan) with

backscattered electron image (BEI) was used for intermetallic compounds morphology analysis.

The reaction phase compositions formed between the solder and substrate were determined

using energy dispersive spectrometer (EDS) and electron probe micro analyzer (EPMA, JEOL

JSM-8200, Japan). Each composition report was compared with the phase diagrams to identify

the reaction phase. An image analysis system, measuring the metal substrate radius, was

utilized to observe the dissolution behavior, the average intermetallic layer thickness and the

nickel dissolution behavior in the liquid lead-free solders.

The second part of these experiments used Ni3Sn4 intermetallic compound and solder to test the

reaction interface dissolution rate. Based on the Sn-Ni binary phase diagram 16

, pure Ni3Sn4

bulk was prepared from Ni-Sn alloy at 1200 for 72 h. The samples were quenched in ice

water and placed into a 500 furnace for 720 h for annealing to reach the homogenous phase.

The alloy was then cooled and sliced into pieces 6 mm in diameter with a thickness of 1.3 mm.

The Ni3Sn4 specimen surface was sputtered with Mo film as the atomic diffusion barrier. The

Mo film was used as a reference frame to observe the Ni3Sn4 and solder dissolution behavior.

The solder was set at 0.2 grams per sample. The Ni3Sn4/ Mo/ solder sample was sealed into a

quartz glass tube and placed into a furnace with reaction temperatures of 240, 270, 300 and

reaction times of 10, 20, 30, 40, 50 min.

Page 145: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

142

3. Results and Discussion

3.1 Pure Ni and Solder

Figure 1 shows the relationship between the Ni/ tin-solder dissolving radius and reaction time

at 240, 270, 300. In the initial reaction the nickel substrate quickly dissolved into the molten

tin-solder. The nickel radius reduction with the amount of nickel dissolution was linear with

increased reaction time. As the reaction temperature increased, the greater the amount of nickel

substrate radius dissolved. The experimental solubility data was measured using the linear

equation Y = AX + B's. Wherein A represents the substrate dissolution rate slope. The nickel

and various tin-solder dissolution reaction data are shown in Table 1. These data show the

dissolution rate speed in order, as Sn> Sn-3.0Ag-0.5Cu> Sn-0.7Cu> Sn-58Bi> Sn-9Zn, which

means the temperature is proportional to the dissolution rate.

Page 146: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

143

In each reaction temperature case, the different dissolution rates between the solder and nickel

substrate can be explained using Dybkov's equation 17

:

)( CCV

Sk

dt

dCs

Eq. (1)

The amount of solder used in this experiment is quite large so that the substrate concentration

in the liquid solder C does not change. It can be seen as zero or constant (C = constant). The

tin-nickel binary phase diagram provided Cs, nickel concentration in the tin solder, as 0.07

wt.% under 240, 0.08 wt.% under 270, and 0.13 wt.% under 300. That means when the

reaction temperature is higher, the nickel solubility is larger. When (Cs-C) is increased the

gradient concentration between the substrate and solder is increased. Based on the experimental

data, Pandat was used to calculate the tin-nickel-copper ternary systems for the cross section

diagram 18

.

Page 147: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

144

Figure 2 shows a FE-SEM picture that includes (a) Sn, (b) Sn-3.0Ag- 0.5Cu (SAC), (c)

Sn-0.7Cu (SC), (d) Sn-58Bi (SB), and (e) Sn-9Zn (SZ). These five kinds of solder and nickel

substrate were reacted at 240for 40 min with the interface etched. The morphology from

Figure 4(e) shows the Ni5(Zn, Sn)21 intermetallic layer is thick and dense, which means there is

no tunnel for diffusion. It may be deduced that Ni5(Zn, Sn)21 is a good diffusion barrier layer.

Therefore, nickel substrate dissolution can be effectively inhibited using the Ni5(Zn, Sn)21

intermetallic layer.

As Table 2 shows the dissolution rates are Sn> Sn-3.0Ag-0.5Cu> Sn-58Bi> Sn-0.7Cu> Sn-9Zn

at 240, Sn> Sn-3.0Ag-0.5Cu> Sn-0.7Cu> Sn-58Bi> Sn-9Zn at 270 and 300. However, the

experimental results showed Sn-0.7Cu> Sn-58Bi at 240. The reason is different kinds of

intermetallic compounds were formed during the process. Sn-58Bi solders only formed Ni3Sn4,

but Sn-0.7Cu solder formed both (Ni, Cu)3Sn4 and (Cu, Ni)6Sn5 19-20

. Therefore, Sn-0.7Cu

solder consumed more nickel substrate to form intermetallic compounds than Sn-58Bi solder

did.

Page 148: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

145

3.2 Ni3Sn4 and Solder

The reaction temperature was set at 240 and 300. The Ni3Sn4 substrates were reacted with Sn,

Sn-3.0Ag-0.5Cu (SAC), Sn-0.7Cu (SC), Sn-58Bi (SB) and Sn-9Zn (SZ) to observe the

dissolution behavior and interfacial morphology.

Figure 3(a) is a pure Sn and Ni3Sn4 reacted at 240 for 20 min for the liquid-solid interface

reaction. Figure 3(b) is a pure Sn and Ni3Sn4 reacted at 300 for 20 min. From both of these

figures the interface does not generate any intermetallic phase during the reaction. The

experiments show that as the reaction time increases the solder becomes diffused along the

Ni3Sn4 grain boundary.

Page 149: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

146

Figure 8 shows the Sn consumption thickness from the Sn and Ni3Sn4 reaction plotted versus

time at 240 and 300. The figure shows that the Ni3Sn4 consumption thickness is enhanced

with the increase in reaction temperature. The Ni3Sn4 consumption thickness is enhanced

parabolically with the increase in reaction time. The Ni3Sn4 dissolution rate is flattened by

degrees, which means the Ni concentration on the solder side is gradually saturated.

Figure 4(a) shows Sn-3.0Ag-0.5Cu and Ni3Sn4 reacted at 240 for 20min as the liquid-solid

interface reaction. Figure 4(b) is Sn-3.0Ag-0.5Cu and Ni3Sn4 reacted at 300 for 50min.

Figure 4(a) shows some detached layers between the SAC solder and Ni3Sn4 at 240. The

layer compositions are Sn-20.5Ni- 30.9Cu using EDS analysis, which means it is the (Cu,

Ni)6Sn5 phase. However, the inter- metallic compounds or detached layers were not observed

between the solder and Ni3Sn4 at 300.

Figure 8 plots the reaction consumption thickness between Sn-3.0Ag-0.5Cu and Ni3Sn4 versus

time at 240 and 300. The figure shows that Ni3Sn4 consumption thickness is enhanced with

the increase in reaction temperature. The Ni3Sn4 dissolution rate is flattened because the Ni

concentration in Sn-3.0Ag-0.5Cu gradually reaches saturation. Because the interface generated

the (Cu, Ni)6Sn5 phase at 240 and the copper from the solder gradually dissolved into the

Ni3Sn4 as (Ni, Cu)3Sn4 phase at 300, these two features consumed the copper concentration

in the solder. Using the Pandat calculation the copper concentration lead to an increase in the

Ni Cs equilibrium concentration. Based on Dybkov's equation Eq.(1) we know that an increase

in the Cs equilibrium concentration will drive up the dissolution forces. Thus, the Ni3Sn4

phase is increased again, as Figure 8 shows.

Figure 5(a) shows Sn-0.7Cu and Ni3Sn4 reacted at 240 for 50 min. Figure 5(b) shows

Sn-0.7Cu and Ni3Sn4 reacted at 300 for 40 min. The figure shows that Cu atoms from the

solder diffused into the Ni3Sn4 and formed the (Cu, Ni)6Sn5 phase. The detached layers

between the Sn-0.7Cu solder and Ni3Sn4 were observed only at 300, was and did not occur at

240. The Cu concentration in the intermetallic compound layer was higher at 300 than at

240. This evidence shows that copper diffusion occurs faster with increased temperatures,

which may cause the (Cu, Ni)6Sn5 phase to detach easier.

Page 150: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

147

Figure 8 is plotted the consumption thickness of reaction between Sn-0.7Cu and Ni3Sn4 during

versus time at 240 and 300. The figure shows that consumption thickness of Ni3Sn4

enhanced with the reaction temperature increased. The dissolution rate of Ni3Sn4 is flatten by

degrees, which means the concentration of Ni in solder side is gradually saturated. Compared

to the line chart, the quantity of Ni3Sn4 dissolved at 300 was times than 240. That means

it is easily increased the dissolution of Sn-0.7Cu solder with temperature raised.

Figure 6 is Sn-58Bi and Ni3Sn4 reacted at 300 for 20min as the liquid-solid interface

reaction. It shows that the intermetallic phase dissolved into solder side.

Figure 8 is plotted the consumption thickness of reaction between Sn-58Bi and Ni3Sn4 during

versus time at 240 and 300. The figure shows that consumption thickness of Ni3Sn4

enhanced with the reaction temperature increased. The dissolution rate of Ni3Sn4 was not

flatten by degrees, which means the concentration of Ni in solder side was not saturated. The

main reason is the solder contained 58 wt.% of Bi, which is the element not to react with

Ni3Sn4 substrate. Thus, only Tin solder and Ni3Sn4 substrate involved the dissolution reaction.

In other words, the diffusion of Ni into the solder has not reached saturation after 50 min.

Figure 7(a) is Sn-9Zn and Ni3Sn4 reacted at 240 for 10min. Figure 7(b) Sn-9Zn and Ni3Sn4

reacted at 300 for 10min. The figure shows that there were two different intermetallic layers

Page 151: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

148

formed in 240 and 300. The layer beside the solder is composed of Sn-16.2 at.% Ni-81.3

at.% Zn, which is formed Ni5(Zn, Sn)21 intermetallic phase by EDS analysis. The other layer is

composed of Sn-35.0 at.% Ni-21.3 at.% Zn, which is formed Ni3(Sn, Zn)4 phase. In addition,

the intermetallic layer was getting thicker with time and temperature increased.

Figure 8 is plotted the consumption thickness of reaction between Sn-9Zn and Ni3Sn4 during

versus time at 240 and 300. The figure shows that consumption thickness of Ni3Sn4

enhanced with the reaction temperature increased.

Overlapped the consumption thickness of reaction between different solder and Ni3Sn4 versus

time, we can get the figure 8(a) and 8(b). The dissolution rate of Ni3Sn4 phase in the molten

solders follows the order Sn> Sn-3.0Ag-0.5Cu> Sn-0.7Cu> Sn-58Bi at 240, and Sn-0.7Cu>

Sn> Sn-3.0Ag-0.5Cu> Sn-58Bi at 300. Massive spilling of the (Cu, Ni)6Sn5 phase was

observed in the SAC/Ni3Sn4 and SC/Ni3Sn4 interface. The Sn-9Zn solder reacted with the

Ni3Sn4 phase to form the Ni5(Zn, Sn)21 phase at the interface. And then Zn atom diffused

toward the Ni3Sn4 phase to form the Ni3(Sn, Zn)4 phase.

4. Conclusions

The nickel substrate and tin solder dissolution rate increased linearly with the reaction time and

temperature. The rate order is Sn> Sn-3.0Ag-0.5Cu> Sn-0.7Cu> Sn-58Bi> Sn-9Zn. Sn-9Zn

solder shows that it can inhibit nickel substrate and solder dissolution. Dissolution rate

differences can be explained using Dybkov's equation, intermetallic compounds formation and

Page 152: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

149

grain morphology. However, the experimental results showed Sn-0.7Cu> Sn-58Bi at 240

which did not coincide with the ideal value. The reason is different kinds of intermetallic

compounds are formed during the process. Sn-58Bi solders only formed Ni3Sn4, but Sn-0.7Cu

solder formed both (Ni, Cu)3Sn4 and (Cu, Ni)6Sn5. Therefore, Sn-0.7Cu solder consumed more

nickel substrate to form intermetallic compounds than Sn-58Bi solder did. The arrangement

between the grains and grain boundaries will also affect the dissolution amount and rate. The

more densely stacked the formed grain boundary the lower the dissolution rate will be.

The next part is focused on the dissolution rate between the Ni3Sn4 substrate and various

solders with the temperature set at 240 and 300. The other solders (excluding Sn-9Zn solder)

displayed faster dissolution rate with increased reaction time and higher temperature. The

dissolution rate for the Ni3Sn4 phase in molten solders follows the order Sn> Sn-3.0Ag-0.5Cu>

Sn-0.7Cu> Sn-58Bi at 240, and Sn-0.7Cu> Sn> Sn-3.0Ag-0.5Cu> Sn-58Bi at 300.

Massive (Cu, Ni)6Sn5 phase spalling was observed in the SAC/Ni3Sn4 and SC/Ni3Sn4 interface.

The Sn-9Zn solder reacted with the Ni3Sn4 phase to form the Ni5(Zn, Sn)21 phase at the

interface, with Zn atoms diffusing toward the Ni3Sn4 phase to form the Ni3(Sn, Zn)4 phase.

Reference

D. R. Frear, P. T. Vianco, Metall. Mater. Trans. A. 25A (1994) 1509

B. Trumble, J. Brydges, IEEE Int. Symp. Electr. (1998) 112-119

D. R. Smith, Flegal, J. A. R, J. Electron Mater. 30 (2001) 1293

C. Ernhart, S. Scarr, presented at the ACYF research conference, New Directions in Child and

Family Research (1991).

A. Z. Miric, and A. Girusd, Solder Surf. Mt. Tech. 10 (1998) 19-25

P. Zarrow, Circuits Assembly, August, 18-20 (1999)

C. E. Ho, Y. W. Lin, S. C. Yang, C.R. Kao, D. S. Jiang, J. Electron Mater. 35 (2006) 1017-1024

W. H. Tao, C. Chen, C. E. Ho, W. T. Chen, C. R. Kao, Chem. Mater. 13 (2001) 1051-1056

C. M. Liu, C. E. Ho, W. T. Chen, and C.R. Kao, J. Electron Mater. 30 (2001) 1152-1156

C. E. Ho, L. C. Shiau, and C.R. Kao, J. Electron Mater. 31 (2002) 1264-1269

S. W. Chen, Y. W. Yen, J. Electron Mater. 30 (2001) 1133-1137

C. E. Ho, Y. M. Chen, C. R. Kao, J. Electron Mater. 28 (1999) 1231-1238

A. Sharif, Y. C. Chan, M. N. Islam, M. J. Rizvi, J. Alloy Compd. 388 (2005) 75-82

M. N. Islam, Y. C. Chan, A. Sharif, M. O. Alam, Microelectron Reliab. 43 (2003) 2031-2037

Y. W. Yen, W. T. Chou, Y. Tseng, C. Lee, C. L. Hsu, J. Electron Mater. 37 (2008) 73-83

T. B. Massalski, Binary Alloy Phase Diagrams-CD-ROM, Materials Park, OH: ASM

International (1996)

C. E. Ho, Y. M. Chen, C. R. Kao, J. Electron Mater. 28 (1999) 1231-1237

C. N. Chiu, S. W. Chen, Personal Communication

S. K. Kang, R. S. Rai, S. Purushothaman, J. Electron Mater. 25 (1996) 1113-1120

Page 153: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

150

W. T. Chen, C. E. Ho, C. R. Kao, J. Mater. Res. 17 (2002) 263-266

Page 154: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

151

SICASE-734

Development of A Method to Design An Electric Activated NiTi-Based

Shape-Memory Wire Actuator

Benjamin Fleczok, Dieter Kreimeier

Ruhr University Bochum, Germany

[email protected]

Abstract

The use of NiTi shape-memory alloys (SMA) in actuators generates advantages for designing

robust, simple and lightweight applications. The SMA effect is based on a phase transformation

of the atomic lattice in response to stress, strain and temperature. The resulting crystallographic

configurations lead to a complex behavior revealing different electrical and mechanical

characteristics.

Due to these complex interdependencies of the SMAs, it is very difficult to design an actuator

for defined requirements. Therefore, Konstantin Lygin has developed a comprehensive, generic

product development method (PDM) [1] that combines the V-Model [2] and the

TRIZ-methodology based on the new contradiction matrix of D. Mann [3]. Lygin extends the

method by specialized shape-memory based “development modules” to provide the basis for an

adapted PDM. He arranges and validates these SMA modules with an R-phase spring actuator

and points out the high potential for an evaluable PDM for SMAs.

Based on [1], this work presents product development modules for the V-model to design

electrical activated SMA wire actuators. In this context, the V-model is extended by new

approaches. In detail, the pre-evaluation module for the input parameters is extended by a new

tool which includes the interdependence of the complex material behavior. In addition to this, a

new impact factor has been created to rate the interdependence of the specific parameters of the

NiTi-based SMAs. Furthermore, the system conception is extended by new parameters for the

TRIZ contradiction matrix. This work will also discuss general design rules and the resulting

potentials of the design guide for SMA wire actuators. It also reflects on the challenges of the

new PDM.

Keywords: shape memory alloy, product development method, TRIZ, pre-evaluation tool,

impact factor

1. Introduction / Motivation

Today smart materials (SM) like shape memory alloys (SMA) already play an important role in

the product development. SMs have a multitude of advantages for the design of cross-industry

Page 155: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

152

technical products such as the energy saving potential of about 16TWha/a and the emission

saving potential of about 8t CO2/a [4]. Other advantages are the potential for lightweight,

miniaturization and the significant potential for reducing the complexity of technical actuator

assemblies [5, 6]. Despite these advantages, the global market forecast for smart materials [7]

show in relation to other actuation technologies that the impact of shape memory alloys is still

very low. Smart materials, in detail comparable applications for motors and actuators, have a

market value of USD25.4 billion with a compound annual growth rate (CAGR) of 15.8%

(between 2011 and 2016). [7] Electric motors (DC-, AC-, hermetic motors) for actuation have a

total market value of USD120.68 and a CAGR of 6.3% from 20013 to 2019. [8]

The advantages in comparison of the total market value demonstrate the problems of the

implementation of SMAs in technical products. This is based on the complex relationship

between stress, strain and temperature and, as a result, the electrical and mechanical

characteristics that limit the handling for engineers and scientists [9]. This is justified by the

fact that there is a lack in the knowledge of product design [10]. The SFB459 also describes the

increasing importance of a rising knowledge base [11].

Lygin is the first who designs a comprehensive and generic product development method for

ambient activated (AA) NiTi-based R-phase SMA spring-actuators (SA) [1]. Previous

approaches did not consider the comprehensive product development cycle with the system

integration or a domain specific design [12, 13]. The method from [1] based on the V-model is

a valid approach for a systematic product development for engineers as a comprehensive and

evaluable tool. With individual product development modules based on the AA R-phase, SA

engineers have the possibility to systematically develop a spring actuator in an evaluable

process. This work is an important step forward for the implementation of SMAs in technical

applications. Lygin validates his developed method successfully and claims this method to be

tested and revised for other NiTi-based SMA actuators.

Page 156: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

153

2. Method – Pre-valuation

The original model is now described before the revised and extended approaches will be

introduced.

Lygins method is based on a V-model which contains specialized and adapted method modules.

The model starts with a specification and a pre-evaluation. An abort criterion is linked from the

pre-evaluation module to the specification. If the specification is finished, the pre-evaluation

starts with the network diagram. The five corners of Lygin‟s module includes the important

temperature marks of the R-phase of SMAs. The influence of the temperature is the most

important factor that limits all SMA product developments significantly. Based on the fact that

the temperature influences a lot of characteristics of SMAs, the new approach for EA SMA

WA is also based on these parameters. The new network diagram differs in that it considers the

material-specific transformation temperatures and the resulting interdependent pre-evaluation

tool.

Page 157: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

154

These specific temperatures influence the reaction behavior of an actuator significantly. The

following temperatures are essential for the pre-evaluation network for electrically activated

SMAs:

a. Austenite start

b. Austenite finish

c. Martensite start

d. Martensite finish

e. Functional temperature array

The start and finish temperature of the austenite are important to split in the development

process. A lot of products have special temperature specifications like storage temperatures or

post paint temperatures of about 120°C [14]. Therefore, it is important to check the finish

temperatures for the actuator. If the actuator activates in a post painting process, it could lead to

a total damage of the entire product. Furthermore, the array of the martensite finish temperature

is important for the reset behavior and the potential frequency of the actuator, so it is necessary

to put these temperature on one corner. The hysteresis limits the frequency and causes a

different behavior for the bidirectional displacement and should be focused for high-precision

actuation tasks.

Page 158: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

155

A lot of applications set the functional temperature array for example at -40° to +85°C

(automotive – fuel clap actuator / central locking actuator) or -20°C to +55°C for applications

in the interior of civil aircraft. If these requirements have not been covered by the temperature

array of the SMA, one abort criterion is fulfilled. The respective industries react in a very

conservative way in that they change the requirements in the specification book due to the

product reliability so that these defined arrays are static.

Thus the network diagram for the evaluation of an electrically activated SMA WA also reacts

in a very inflexible way if one specification temperature is not in the temperature array

although a solution may be possible. The pre-evaluation network diagram has a limited

reliability because of the complex interdependencies. It should be possible to solve some of the

resulting contradictions by an intelligent mechanical product design. If, for example, the

electrically activated SMA wire is out of the functional temperature array of the network

diagram, a second wire (only ambient-activated) in an antagonistic position prevents the

operating displacement at an ambient temperature of 120°C.

To get a small barrier to enter in the complex SMA technology, the development engineers

need a simple base for decisions based on one factor. Therefore, this work has developed a

network diagram with evaluable factors. “Impact factors” (IF) are calculated by an

interdependency matrix in Table 1. These factors help to rate the five influences in the

pre-evaluation so that the network diagram could give more valid information in an early

product development phase. The chosen interdependency parameters of the matrix are the most

important factors for the product development with SMAs.

To fill out the matrix, the influences or effects from the chosen parameters of the column have

to be rated along the parameters in the line. If the column parameter has an effect to the

parameter of the line, the corresponding field is marked with an “X”.

Page 159: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

156

The sum of the “X” has to be built for the parameters in the line and column. The sum of the

line shows the influence on other parameters (A); the sum of the column shows the degree of

the affect from other parameters on the corresponding parameter (B). As a result of this, the

influence factor of a parameter is calculated as follows:

+

(∑ ( − ) )

(1)

The parameter “functional temperature array” is calculated as follows:

+

( − ) 0. (1.1)

The sum of column and line has to be built divided by the value of the interdependence

parameters (As, Af, etc.) minus 1. This matrix rates the interdependence in accordance to the

interdependence matrix of May.

Page 160: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

157

With the calculation as in (1.1), the most important factor for the network diagram is the

functional temperature array with an impact factor of 0.54. The result of the entire matrix is

that the strongest impact is caused by the electrical power on an EA SMA WA. Other

important factors are the force, the actuation frequency and, as mentioned before, the

functional temperature array.

As a result of this study, the temperature array is marked by the value of 1 in the new network

diagram. Out of the ideal temperature array (blue mark), the values decrease from 1 to 0. So if

one requirement is not in the ideal array, the value decreases.

As can be seen in Figure 3, some requirements are out of the ideal range (blue array). The

value of austenite start (AS) and martensite finish (MS) are 0.7 and 0.95. But with the impact

factor of 0.38 each, the difference to the ideal result is relatively low. The total rated value of

the example is about 1.857. This is a percentage difference of 9.285% to the ideal so that the

resulting solution should be taken into account for the product development. The range

between the values 1.65 and 2 is defined as a realistic value to continue the product

development (difference about 27% from the ideal). This expert opinion has to be validated in

following studies.

3. Method - System Concept

After these first steps to pre-evaluate the requirement in the development cycle, the “system

conception” starts. Lygin defines and analyzes two new models for the system conception with

AA R-phase SMA SA in the module box. The innovation checklist (ICL) and the contradiction

matrix are the tools from the TRIZ method which he defines and adjusts for the development

with SMA. For an electrically activated SMA WA, the corresponding modules have to be

proven and adjusted for the specific requirements.

Page 161: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

158

In the module analysis, the innovation checklist helps to define the exact present situation

systematically with all external influences on the problem. The ICL is a convenient tool for the

engineer to get an extensive view on the problem.

The “problem history” (PH) has been added to the original toolbox by B. Klein [18] and D.

Zobel [19]. The PH describes the development of the problem and “systems with comparable

problems” as well as “additional problems that need to be solved”. This point helps to get

information of an earlier state of the problem or an earlier try to solve the problem.

The object function is designed to split the problem into differentiated functions and is an

assistance for the contradiction matrix. The contradiction matrix is a powerful tool in the

product development. To build the matrix, the input parameters have to be defined. Lygin

declares 28 parameters as suitable for the AA SA. In this work, the parameters by D. Mann [3]

are described as follows:

Page 162: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

159

The numeration of the Table is taken from the list by D. Mann. The grey lines are the result of

adjusting and extending the parameters for an EA SMA WA following Lygin. The parameters

are mainly expanded for the production so that a series production is automatically in the focus

of the product development. With these input parameters, the contradiction matrix could be

built up. The 40 inventive (architecture) principles that Altschuller defines are used for

solutions in the matrix.

Page 163: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

160

Therefore, the principles have to be designed in detail for an EA SMA WA. As a result of

Orloff [20], the 40 principles are enough to solve most problems. In combination with the

contradiction matrix, the engineer has a good base to search for a possible solution. The

“system conception” includes the first steps to create an EA SMA WA with a standardized

pre-evaluation and the parameters for the TRIZ- tools to get the first concepts. After these steps,

the possible solutions have to be developed into a concrete solution with the help of a

morphological box. After substantiating, the solution has to be rated to get a concept. The first

module “system conception” in the development approach is closed by different concepts.

The domain-specific design, which is addressed in the modules of material mechanics,

mechanics, electrical engineering and information process, has to be processed to create the

subsystems and the actuator in detail. Following the “system integration”, the domain-specific

design is connected with the whole system.

4. Conclusion and Outlook

This work adjusts and expands the V-model for SMAs based on Lygin [1] for a systematical

approach to develop an SMA actuator in the module “pre-evaluation” and in the “system

conception” based on an electrically activated SMA wire actuator. The pre-evaluation includes

a new tool to get a valid input for the product development. Therefore, the complex behavior of

the material is reduced to the relevant parameters. Subsequently, an interdependence matrix has

been built up that includes a rating with defined “impact factors”.

Page 164: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

161

As a result, a network diagram which comprises the temperature as a relevant parameter helps

to rate the chance to find a solution for the problem. This new procedure helps to consider the

complex interdependencies in an early development stage. Further studies should investigate a

software tool that supports the pre-evaluation.

The system conception is based on a combination of the V-model by VDI 2206 and TRIZ-tools.

The two TRIZ-tools of the “innovation checklist” and the “contradiction matrix” are proved

and adjusted for an EA SMA WA.

Furthermore, this work expands the input parameters for the contradiction matrix. Therefore,

32 parameters are focused compared to Lygin to get a higher significance on the “production

parameters”.

Further studies should focus on the validation of the adjusted approach. Therefore, the

pre-evaluation tool has to be proven on real applications and solutions. To get a valid output of

the module “system conception”, a standardized system to rate the solutions of the

morphological box should be built up. Possible solutions for a standardized rating of the

concepts from the morphological box are identified in the method of VDI 2221 [21] or in

Pahl/Beitz [22]. A specialized or defined module for a target system could help to rate the

identified solution in a standardized approach.

5. Acknowledgement

The authors acknowledge the funding of the hyProFGA project by the EU through

Ziel2.NRW-programm Automotive+Produktion.NRW.

6. Reference

[1] Lygin, K: Eine Methodik zur Entwicklung von Umgebungsaktivierten FG-Aktoren mit

geringer thermischer Hysterese am Beispiel der Heizungs- und Klimatechnik. Dissertation,

Ruhr-Universität Bochum. Bochum 2014.

[2] Gausemeier, J., Moehringer, S.: "New Guidline VDI 2206-A flexible procedure model for

the design of mechatronic systems" DS 31: Proceedings of ICED 03, the 14th

International Conference on Engineering Design, Stockholm. 2003.

[3] Mann, D.: et al. Matrix 2003: Updating the TRIZ contradiction matrix. CREAX press,

2003.

[4] Jochen, E., Jaeger, C., et. al: Investments in climate friendly Germany. Study carried out by

the Ministry for the Environment, Agriculture and Reactor-protection. (In German:

Investitionen für ein klimafreundliches Deutschland. Studie im Auftrag des

Bundesministeriums für Umwelt, Naturschutz und Reaktroschutz.) Potsdam 2008

[5] Butera, F., Coda, A., Vergani, G.: Shape memory actuators for automotive applications. In:

Nanotec IT newsletter. Roma: AIRI/nanotec IT; 2007. p. 12–6.

Page 165: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

162

[6] Abrahamsson P., Møster E.: Demands on shape memory alloys from the application

designer‟s point of view. J Phys IV France 1997;07. C5-667-C5-72.

[7] McWilliams A.: Smart materials and their applications: technologies and global markets.

BCC Research Advanced Materials Report; 2011. p. 161.

[8] Transparency Market Research: Electric Motors Market (AC motors, DC motors, Hermetic

motors) - Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2013 - 2019

[9] Mertmann, M., Vergani, G.: "Design and application of shape memory actuators." The

European Physical Journal-Special Topics 158.1 (2008): 221-230.

[10] Welp EG, Breidert, J.: Knowledge and method base for shape memory alloys.

Materialscience and Technology. (In German: “Materialwissenschaft und

Werkstofftechnik”) 2004;35:294–9.

[11] Eggeler, G.: Final Report of CRC 459 (in German: Abschlussbericht SFB 459 in

Bearbeitung), in progress. Bochum 2014

[12] Langbein, S.: Local configuration and partial activation of the shape memory effect to

produce smart device structures (In German: Lokale Konfiguration und partielle

Aktivierung des Formgedächtniseffektes zur Erzeugung smarter Bauteilstrukturen) PhD

Thesis, Ruhr-University Bochum, Germany 2010

[13] Czechowicz, A.: Adaptive and adaptronic optimization of shape memory actuator systems

for automotive applications (In German Adaptive und adaptronische Optimierungen von

Formgedächtnisaktorsystemen für Anwendungen im Automobil). PhD Thesis,

Ruhr-University Bochum, Germany 2012.

[14] Seiffert, U.: Vieweg Book. Handbook of Automotive Engineering. (in German. Handbuch

Kraftfahrzeugtechnik.) Springer-Verlag, 2011.

[15] Datasheets of Smartflex, Dy90. Memry GmbH. Bochum 2015

[16] Stork, H.: Construction, modeling and control of Formgedächtnisaktorsystemen. Progress

Report VDI, number 8: Measurement and Control Technology, 1997 (In German: Aufbau,

Modellbildung und Regelung von Formgedächtnisaktorsystemen. Fortschritt-Berichte

VDI, Reihe 8: Mess- Steuerungs- und Regeltechnik) No. 657. Buhl

[17] May, G., Chrobok, R.: Prioritization of the entrepreneurial project portfolio, in: Magazine

- Management + Organization, (In German: Priorisierung des unternehmerischen

Projektportfolios, in: Zeitschrift Führung + Organisation)70th year, issue 2, pp 108-114.

2001

[18] Klein, N.: TRIZ/ TIPS. TRIZ / TIPS. Methodology of Inventive Problem Solving.

Oldenbourg, Munich 2002. (In German: Methodik des erfinderischen Problemlösens).

Oldenbourg „Wissenschaftsverlag“, München 2002

[19] Zobel, D.: Triz for all. The systematic way of solving problems. (In German: Triz für alle.

Der systematische Weg zur Problemlösung) 3rd edition. Expert Verlag, Renningen 2011

[20] Orloff, M: "Development of TRIZ." Inventive Thinking through TRIZ: A Practical Guide

(2006): 280-306.

Page 166: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

163

[21] VDI Guideline: Systematic Approach to the Design of technical Systems and Products -

VDI 2221, VDI Verlag 2005

[22] Feldhusen J., Grote, K.: Engineering design: a systematic approach. Vol. 157. Springer

Science & Business Media, 2007. (In German: Konstruktionslehre. Methoden der

erfolgreichen Produktentwicklung. Springer Vieweg Verlag

Page 167: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

164

SICASE-740

An Investigation Using Self-Sensing to Estimate the Lifetime of Shape

Memory Actuators

Christian Rathmann*, Benjamin Fleczok, Dieter Kreimeier

Ruhr University Bochum, Germany *[email protected]

Abstract

Today‟s industrial applications require smarter actuator systems, which can provide more

information. To achieve this, additional sensors are often necessary and thus the complexity,

cost and size of actuator systems increase. In this context, shape memory actuators are a

promising alternative due to their integrated sensing function that is able to measure the

respective positioning and environment temperature. Moreover, it is possible to predict the

fatigue of an actuator system and thus the lifetime of this system by electrical resistance.

Therefore, it is possible to establish highly integrated but simple actuator systems. Furthermore,

shape memory actuators can enable entirely new maintenance concepts.

The purpose of this paper is to investigate the electrical resistance as a parameter to predict the

fatigue of shape memory actuators. Firstly, an overview of possible applications for the

integrated sensing function will be given. Secondly, various factors which influence the

resistance of shape memory actuators will be outlined. Based on this, experiments are

performed and analyzed. The results will be discussed in terms of fatigue prediction and

suitability for maintenance.

Finally, this work presents the potential of integrated sensor function for new or hybrid

products based on shape memory alloy actuator systems. Future studies should consider further

factors influencing the resistance and improving the reliability to predict the fatigue of a shape

memory alloy based actuator system.

Keywords: shape memory alloy, sensor, self-sensing, resistance, lifetime prediction, fatigue,

experiments

1. Introduction

The attitude towards technical systems has changed dramatically in recent decades. In the past,

many companies in the field of mechanical engineering were highly integrated along the entire

value chain. However, the speed of technological progress requires companies to specialize,

which reduces the vertical integration of firms and value add. This effect is intensified by

changes in market conditions.

Page 168: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

165

Companies and consumers are no longer able and willing to deal holistically with products.

Despite this fact, the regulatory requirements regarding safety increases.

This leads to a changing product understanding. Products must now, first of all, be easy to use

but also safe. In the field of mechanical engineering, this means, for example, the

manufacturing companies want to exclusively provide the production of goods but not the

maintenance or fault diagnosis of machinery. This significantly increases the number of sensors

required and thus the complexity as well as costs.

A promising approach to face this challenge are shape memory alloy based actuator systems

(SMA-ASs). SMA-ASs can be used as an integrated sensor-actuator system with condition

monitoring capability. Thus SMA-ASs contribute to reduce system complexity. In addition,

very user-friendly and economical products can be offered that enable new business models.

Although SMAs are promising, some questions remain to be answered. One of the most

important issues for the use of SMA-ASs as an integrated actuator-sensor system is the

question of how to provide the detectable characteristics and a prognosis accuracy or reliability

of the measurements. This paper makes a contribution to answer this question.

The paper is organized as follows: Section 2 gives an overview of the SMAs, including the

shape memory effect, advantages and disadvantages as well as the application of SMA-ASs. It

presents the behavior of electrical resistance of shape memory alloys as well as important

aspects of the resistance and fatigue of SMAs. Section 3 describes the experimental design

and set up. The results are discussed in terms of fatigue prediction and maintenance potentials.

The potentials of integrated sensor functions and thus predictability of lifetime of SMAs for

innovative, new products based on the findings are highlighted. Finally, section 4 closes by

sum up the key findings and thus how the paper makes a significant contribution within the

research field.

Page 169: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

166

2. Shape Memory Alloys

Shape memory alloys (SMAs) belong to the group of active materials with direct coupling for

actuation [1]. After being deformed, SMAs have the ability to remember their previously

imprinted shape. Furthermore, they have an actuator function and show super-elastic behavior.

Figure 1 illustrates the different shape memory effects (SME) for actuation. The shape memory

effect can be distinguished into a mechanically triggered (pseudoelastic) and thermally

triggered effect. In the first case, the material retains its shape immediately after unloading [2].

In the second case, the material retains its shape by supplying energy. This is possible by the

use of the ambient temperature or resistance-based heating as part of electrical activation.

The SME is based on the phase transformation from martensite, the low temperature phase

austenite, the high temperature phase, which exhibits a temperature hysteresis (ΔTh) due to

inner friction [3]. The starting point of the phase transformation is the austenite start

temperature (As). Below As there is only martensite structure. The phase transformation starts

as soon as As is exceeded. It is completed once the austenite finish temperature (Af) is reached.

At Af there is only austenite structure. If the temperature decreases below a certain temperature

(martensite start temperature, Ms), the retransformation from austenite to martensite begins.

The retransformation is completed as soon as the martensite finish temperature (Mf) is reached.

Between As and Af or Ms and Mf both material structures coexist. The phase transformation is

illustrated in Figure 2.

Page 170: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

167

SMAs can be characterized by their high energy density, high displacement and forces, high

corrosion resistance, and good biocompatibility [1, 4, 5]. Besides this, SMAs have a high

potential for miniaturization, have no abrasion of material, are electromagnetically compatible,

are characterized by their simplicity, lightweight and noiselessness [6].

Furthermore, SMAs have the self-sensing effect, which can be used for control purposes [1, 7,

8]. However, the knowledge about these alloys is still very limited [9].

That is why industrial product development is still resource-demanding and the application

potentials of SMAs are not fully exhausted.

Depending on their specific application, the limited temperature range of SMAs reduces the

number of application fields [10].

2.1 Application of Shape Memory Alloy Based Actuator Systems

The first industrial application of SMAs was a hydraulic tube coupling used in the high

pressure hydraulic system of the F-14 Tomcat fighter aircraft of the US Navy in the year 1971

[11, 12]. Due to their unique properties, SMAs are interesting for a wide range of applications,

especially valves, locking and unlocking mechanisms or vibration damping applications [1, 13].

Therefore, SMAs are suitable for a wide range of actuator applications, which are illustrated in

Figure 3: Applications of shape memory alloy based actuator systems Figure 3. SMAs are

especially interesting within the following areas: biomedicine, electronics and robotics,

aerospace, automotive and rail, consumer and household appliance, telecommunications and

photography, heating and air conditioning as well as engineering [14].

2.2 Behavior of Electrical Resistance of Shape Memory Alloys and Implications

The electrical resistance of material is defined through electrical resistivity and conductivity

and the volume (length and cross-sectional area). The electrical resistance changes with

temperature. With increasing temperatures of SMAs, ions are excited and vibrate around their

Page 171: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

168

equilibrium position. As a result, the electron flow is disturbed and, consequently, the electrical

resistance increases.

The resistance behavior of SMAs is significantly influenced by the structural conditions. As in

all metals, the resistance increases with increasing temperatures. When reaching As, the

resistance behavior changes. Between As and Af the resistance behavior depends on structural

conditions. The crystal lattice of the austenite structure is more compact than that of martensite

structure. As the electrical conductivity of a material improves with the increasing number of

atoms per volume, the resistance decreases although the temperature increases further until Af

is reached. Beyond Af the resistance rises with an increasing temperature again, because the

phase transformation is completed. However, the resistances below As and beyond Af are not

identical.

Regarding the positioning of SMA actuators using the electrical resistance, various studies

prove this ability [8, 7, 15, 16, 17]. [17] proves that the behavior of the electrical resistance is

an indicator of the start and end of the phase transformation and thus actuator activation as well

as an indicator of the load condition. Additionally, Czechowicz [18] concludes that by

measuring the resistance of the material, the monitoring of fatigue is possible.

It can be stated that one important feature of SMAs compared to conventional materials is the

capability to monitor fatigue and to monitor the functionality by measuring the displacement.

By measuring the resistance, it is possible to draw conclusions about material conditions and

material history as well as displacement. Thus, countermeasures can be taken if the resistance

decreases below a certain value and possible breakdowns of the system may be prevented.

3. Experiments Investigating the Electrical Resistance to Predict the Lifetime of Shape

Memory Alloy based Actuators

3.1 Experimental Set Up

Figure 4 shows the experimental set up which has been used to investigate the electrical

resistance to predict the lifetime of shape memory alloy based actuators. The experimental rig

is able to run five experiments simultaneously. In total 10 samples have been used to predict

the resistance behavior of SMAs.

The samples are made from SMA wires type Smartflex90°C by memry an SAES Getters

subsidiary with an activation temperature of As 90° C, a diameter of 0.15 mm and a length of

100 mm. The SMA samples are activated by a power supply unit (EA-PS 3016-20B, EA

Elektro-Automatik GmbH & Co. KG). Constant current pulse is used because it is easy to set

up and all cycles get the same activation. The activation time is set to 1 sec. heating with a

current of 0.6 A and the cooling time is set to 8 sec.. This current has been determined by

Page 172: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

169

preliminary experiments as the optimum current for a full activation. Eyelets are crimped at the

SMA wire ends, which is necessary to fasten them in the experimental rig. The SMA wires are

fastened in a mounting, loaded on a weight, and guided through an axial plain bearing.

The SMA samples are loaded at a constant force of 400 MPa. The power supply unit is

connected with alligator clips to the SMA wire eyelets. A measuring amplifier (MGC+ system,

HBM GmbH) records the measurements, which includes voltage, current, force and

displacement. The data from the measurement amplifier is transmitted to a measurement

computer and recorded by specific software (Catman 4.0, HBM GmbH) as well as saved for a

further analysis. A sampling frequency of 5 Hz is chosen for the measurement data. This

frequency is sufficient for the future analysis. The program itself saves at every hour, because

otherwise the file size is too large. After the wires are activated, they are cyclically loaded until

they break.

3.2 Results

The chosen parameters of 1 sec. heating with 0.63A, 8 sec cooling with the force of 400 MPa

are constant until the end of the wire lifetime. The lifetime differs from wire to wire, based on

slight material differences within one batch. For a valid interpretation of the resistance

behavior to determine the lifetime, the curves do not bear references to the cycle but to the

failure of the wire. This enables a cycle-independent interpretation of the lifetime.

The shape of the ten curves reveals a reproducible behavior with the typical standard deviation,

which means a gauss distribution. For a better overview, the average of the curves has been

established and plotted in Figure 5. As shown in array 1 in Figure 5, the electrical resistance

rises linearly by about 4.5% percent. The increasing gradient of array 1 depends on the wire

temperature as a result of the heating energy and time, the mechanical stress and the actuation

Page 173: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

170

frequency. All curves have the same behavior, which means there is a critical linear increase of

the resistance before the parabolic section 2 begins.

The difference in the electrical resistance from the first value of the parabolic curve to the end

is about 15%. If array 2 is reached, the NiTi-SMA wire is in the final third of its lifetime. In

this section of its lifetime, other parameters like the displacement change, too.

Figure 6: has shown that the resistance behavior is almost identical to the behavior of the

displacement. Array 1 and array 2 are the same as in Figure 5. In the beginning the NiTi wire

has shown a linear drift of its displacement. In array 2 the shape of the curve changes to a

parabolic form. These experiments have shown the relation between the effects, causing the

Page 174: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

171

drift of the displacement and the changes in the electrical behavior. The resistance behavior

results from the phase transformation and the material defects increasing over lifetime.

As shown in Figure 7, the changes of the first and last cycle in the voltage are very high. There

is a difference about 20%. Curve “b” represents the voltage of the last cycle and shows also a

small increase in the gradient while the wire is activated. This effect is based on the

overheating process due to the rising defects in the material and the grid vibrations.

As a result of the experiments, it has to be noted that there are two sections in the lifetime of

the wire. With these defined arrays, the lifetime of the NiTi-SMA wire is predictable. These

two arrays can be mathematically described and used to limit a functional range of the NiTi

SMA wire.

4. Potential of the Integrated Sensor Effect of Shape Memory Alloys for Innovative

Products

Product innovation is important for companies to compete in today‟s business environment. In

this context, industrial product service systems (IPSS) are of particular interest for SMA-ASs,

as they combine products and services. IPSS serve to customize products in order to create new

value for customers [19] and to strengthen the market position of a company or to create a

competitive advantage. These products strengthen companies‟ positions in the market because

they are able to offer solutions to market challenges, for instance, the increasing demand for

holistical solutions due to the ongoing specialization of companies. Moreover, the result is a

win-win situation for customers and producers or suppliers [20]. In conclusion, IPSS are a way

to avoid cost pressure and are a chance to differentiate from competition.

Page 175: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

172

SMA-ASs allow companies to offer IPSS for actuator solutions due to their unique properties,

e.g. the self sensing effect or integrated sensor function. Referring to SMAs, this involves

analyzing and interpreting the electrical resistance as an indicator for the condition of an

actuator system regarding its functionality or fatigue. With SMA-Ass, simple integrated

actuator sensor systems are possible, which offer new functionalities and are connected to a

service [17]. It is possible to monitor properties like:

System errors in case the SMA-ASs (in form of a valve) are responsible for a function in a

complex system like the functionality of coolant circuit within a tooling machine

Operation errors including unpredicted factors like rising environmental temperature

Actuator displacement including uncompleted cycles

Operation conditions like loading or environmental temperature

Damage detection like the fatigue of material

Through IT support, simple programs can be developed that automate condition monitoring.

This is very convenient and efficient as well as transparent. Compared to conventional

materials, SMAs have significant potentials which are still not fully used. Expensive sensors

can be saved. As a result, system complexity decreases and cost savings can be realized.

The economical evaluation of a technical draft of a service-oriented shape memory actuator

system is discussed in [21]. In [14] maintenance processes and the resulting business models

based on condition monitoring done by SMA-ASs are presented.

5. Conclusion and Outlook

The paper has investigated the resistance behavior of SMA-AS on the example of SMA-wires.

Furthermore, the results indicate that due to rising defects in the material and the grid

vibrations over lifetime, the activation has to be modified to enhance the lifetime of SMA-ASs,

which can be done by control loops. It has been possible to show that the resistance behavior is

sufficient to predict the lifetime of an SMA-AS. This fact makes SMA-ASs interesting as

simple and cost-efficient integrated sensor-actuator systems. Additionally, this results in a large

number of potential applications of SMA-ASs for IPSS and thus can help companies to

develop new business models.

To put SMA-sensoring into practice, more research is needed. Further studies should focus on

the predictability of fatigue and the functionality of the self-sensing effect regarding the

influence of actuator geometries, actuator volume, stress, activation energy and environmental

issues. Furthermore, investigations are required to develop proper electronics. These

electronics have to consider only the requirements of SMAs and low-cost condition monitoring.

If costs are considered early, SMAs will appear in a wide range of applications. Designing

solid, automated processes is important for providing services based on SMAs. These

Page 176: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

173

processes have to be mapped by software. Finally, a long-term test of SMA-AS under real

conditions is necessary.

6. Acknowledgment

The authors acknowledge the funding of the hyProFGA project by the EU through

Ziel2.NRW-programm Automotive+Produktion.NRW.

7. Reference

[1] Lagoudus DC. 2008. Shape Memory Alloys – Modelling and Engineering Applications.

New York: Springer Science+Business Media. ISBN: 9780387476841.

[2] Lygin K. 2014: A method for developing environmental activated SMA-actuators with low

hysteresis on the example of heating and air conditioning (in German Eine Methodik zur

Entwicklung von umgebungsaktivierten FG-Aktoren mit geringer thermischer Hysterese

am Beispiel der Heizungs- und Klimatechnik. PhD Thesis, Ruhr-University Bochum,

Germany.

[3] Liu Y, Kohl M. 2003. Shape memory micro valves with high energy density (in German

Formgedächtnis-Mikroventile mit hoher Energiedichte), research centre Karlsruhe:

science reports (FZKA 6934).

[4] Jani JM, Leary M, Subic A, Gibson MA. 2014. A review of shape memory alloy research,

applications and opportunities, Materials and Design 56, pp. 1078–1113.

[5] Treppmann D. 1997. Thermo-mechanical treatment of NiTi – including solutions for

quality assurance and standardization of shape memory alloys (in German

Thermomechanische Behandlung von NiTi (mit Lösungsansätzen für Qualitätssicherung

und Normung von Formgedächtnislegierungen). Fortschrittsbericht VDI series 5 Nr. 462.

ISBN: 3183462052

[6] Mavroidis C, Pfeiffer C, Mosley M. 1999. Conventional Actuators, Shape Memory Alloys,

and Electrorheological Fluids". In: Automation, Miniature Robotics and Sensors for

Non-Destructive Testing.

[7] Musolff A. 2005. Shape memory alloys – experimental study and design of adaptive

structures (in German Formgedächtnislegierungen – Experimentelle Untersuchung und

Aufbau von adaptiven Strukturen). PhD Thesis, TU Berlin, Germany.

[8] Schiedeck F, Mojrzisch S. 2008. Improvement of SMA Actuator performance using self

sensing, Proceedings of the International Conference on New Actuators,

ACTUATOR2008-P104, pp. 891-894.

[9] Gümpel P (2004) Shape memory alloys – applications in mechanical engineering, medical

technology and actuators (in German Formgedächtnislegierungen – Einsatzmöglichkeiten

in Maschinenbau, Medizintechnik und Aktuatorik). Renningen: expert press. ISBN:

3816922937.

Page 177: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

174

[10] Kohl, M. 2002. Developing micro actuators made of shape memory alloys (in German

Entwicklung von Mikroaktoren aus Formgedächtnislegierungen). Habilitation treatise.

University Karlsruhe.

[11] Schetky L. 1979. Shape-memory alloys, Scientific American 241 (74-82).

[12] M. Wayman, J. Harrison, The origins of the shape memory effect, Journal of Minerals,

Metals, and Materials 41 (99) (1989) 26–28.

[13] Otsuka K, Wayman CM. 1998. Shape Memory Materials. Cambridge: University Press.

ISBN: 052144487.

[14] Rathmann C, Remmetz T, Kreimeier D. 2015. Maintenance of Shape Memory Actuator

Systems - Applications, Processes and Business Models, Proceedings of the 7th CIRP

Conference on Industrial Product-Service Systems, CIRP S-15-00155(accepted).

[15] Schiedeck F. 2009. Development of a model for shape memory actuators for dynamically

controlled operation (in German Entwicklung eines Modells für Formgedächtnisaktoren

im geregelten dynamischen Betrieb), PhD Thesis, Gottfried Wilhelm Leibniz University,

Hannover, Germany. ISBN: 978-3-941416-23-9.

[16] Janocha H. 2008. Adaptronics and smart structures – basics, materials, design and

application. Berlin: Springer Press. ISBN 978-3-540-71965-6

[17] Herrera GA, McKnight GP, Gao X, Johnson N, Browne AL. 2011. Use of intrinsic

electrical resistance changes in shape memory alloys as robust actuators state and fault

detection sensors., Proceedings of the ASME Conference on Smart Materials, Adaptive

Structures and Intelligent Systems, SMASIS2011-5000 , pp.1-8.

[18] Czechowicz A. 2012. Adaptive and adaptronic optimization of shape memory actuator

systems for automotive applications (in German Adaptive und adaptronische

Optimierungen von Formgedächtnisaktorsystemen für Anwendungen im Automobil). PhD

Thesis, Ruhr-University Bochum, Germany. Shaker Press. ISBN: 9783844014334.

[19] Kaluza B, Blecker T, Gemüden HG. 2006. Wertschöpfungsnetzwerke. Festschrift für

Bernd Kaluza. Berlin: Erich Schmidt.

[20] Winkelmann, P. 2012. Sales concepts and controlling – instruments of integrated customer

relationship management (in German Vertriebskonzeption und Vertriebssteuerung. Die

Instrumente des integrierten Kundenmanagements). Vertriebskonzeption und

Vertriebssteuerung.

[21] Rathmann C, Czechowicz A, Meier H. 2013. An investigation of service-oriented shape

memory actuator systems for resource efficiency, Proceedings of the ASME Conference

on Smart Materials, Adaptive Structures and Intelligent Systems, SMASIS2013-3065 ,

pp.1-8.

Page 178: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

175

SICASE-753

Effect of Carbon Nanotube Composition to Enhance Wear Resistance and

Self – Lubrication Cylinder Liner Based on CNT – Al2O3 + 13% TiO2

Nanocomposite by Cold Spraying Method

Adita Evalina Fitria Utami*

Department of Metallurgy and Materials Engineering, Universitas Indonesia

[email protected]

Aulia Fitrian

Department of Metallurgy and Materials Engineering, Universitas Indonesia

[email protected]

Desak Putu Dewi Chrisnanda Indrayuni

Department of Metallurgy and Materials Engineering, Universitas Indonesia

[email protected]

Ernitha Yuniar Ghaisani

Department of Metallurgy and Materials Engineering, Universitas Indonesia

[email protected]

Carbon nanotubes (CNTs) Alumina + 13% TiO2 nanocomposite with different volume fraction

of CNT had been to determine the effect of CNT distribution in the ceramic matrix. The

behavior of self-lubrication on the surface coating on the cylinder liner investigated. Alumina

13% TiO2 + CNT nanocomposite containing CNTs Maximum 4% which was conducted by

cold spraying on the surface of the cylinder liner coating. Nanocomposite prepared with

different compositions with a planetary ball mill mixing method. Effect of wear resistance,

friction and self-lubrication will be analyzed with a Vickers Microhardness, Surface Roughness,

Wear Tribometer Pin - on - Disc before and after lubrication, and Fourier Transform InfraRed.

The results obtained wear resistance increases with the addition of CNTs. Wear resistance and

microhardness by the addition of CNTs calculated in this study. SEM - EDX was being used to

observe the surface of the coated CNT - Alumina 13% TiO2 nanocomposite. All results show

the method of spraying cold and planetary ball mill significantly improve the distribution of

CNTs in the alumina matrix 13% TiO2 thereby increasing wear resistance and self-lubricant

effect on the nanocomposite.

Keyword: carbon nanotube, tribology, ceramic nanocomposite, self – lubrication, cold spraying

Page 179: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

176

1. Introduction

Related to the issue of global warming continue to be socialized, educational institutions

should be able to apply the principles of green technology and green industry in each

experiment, for the of modern materials components manufacture has to be able to make a

principled long life components parts or reuseable parts. To improve the performance of the

components of the material, the use of nanocomposite materials such as CNT – Alumina

coating to provide a mechanism of self-lubricant and bridging mechanism in alumina matrix

nanocomposite[1]

. Component material used in this experiment is piston, especially on cylinder

liner, generally constituent material used is cast iron, referring to the desired components have

a mild nature, and have a high wear resistance is used aluminum alloy (Al-Si) AC4B and after

specimen will be provided by coating the surface with material nanocomposite MWCNT

(Multi-Wall Carbon Nanotube) in a matrix of Al2O3, where both MWCNT and alumina in

powder form. The reason for choosing cylinder liner and piston ring to be coated with

MWCNT - Alumina because these components often fail, especially failures due to wear and

tear, a condition that often occurs when the current operational state, part piston ring and

cylinder liner experienced a blow that is high enough so that the solution of this problem is

usually with the use of lubricants or lubricant is high enough to reduce the wear failure[2]

.

However, the use of lubricants is worth noting because if the lubricant experiencing deficiency

in the second part will be mutually scrape the surface of one another resulting in leakage of

combustion gas that ultimately will fail all the components of the machine.

To form the CNT - Alumina nanocomposite there are various methods were used that method

Bulk Material (Spark Plasma Sintering, Hot Pressed Sintering, and Compression & Hot Rolling)

and methods Surface Coating (Dip Coating, Thermal Spray, Electroless Deposition, Laser

Deposition, and Cold Spray)[3]

. In this experiment, the method used is cold spray, where this

method is a kind of surface coating with spraying powder particles (CNT - Alumina) to the

surface of the specimen, the advantages of this method is to minimize the occurrence of

oxidation, grain coarsening and phase change. Before doing this process a powder mixture

previously done so that when sprayed distribution between CNT - Alumina powders evenly[4]

.

CNT powder Preparation - Alumina beginning of the process of dispersing CNT powder using

a surfactant PEG (Polyethylene Glycol) and the mixing process was conducted using a

planetary ball mill which aims to avoid the CNT forming aggregates. CNT powder preparation

process becomes very important because given the characteristics of lightweight CNTs are very

easy to form aggregates that will determine the outcome of the process of cold spraying.

2. Experimental Methodology

The first step in this experiment is to perform observations of the structure of the powder to be

used, which is also a major factor in the success of the study. Because it ensures that the

Page 180: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

177

structure of alumina powder and CNT we have good is the first step in an experiment. Alumina

and CNT material characterization using high resolution SEM and EDS.

After doing the weighing powders used in the ratio of 0% CNT = 0 grams; 100% Al2O3 = 50

grams; 2% CNT = 1gram; 100% Al2O3 = 49 grams; 4% CNT = 2 grams; 100% Al2O3 = 48

grams.

Dispersing Treatment

In this experiment, we did not do a pre-treatment to the CNT powders that we use, because the

CNT powder we use is the type of MWCNT[5]

(Multi Walled CNT). The aim of dispersing

treatment is to prevent the CNT nano veils which does not undergo agglomeration when being

used for the illustrations can be seen in the following figure.

Page 181: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

178

This experiment used surfactant in the form of PEG or Polyethylene glycol 4000 by using an

organic solvent DMF or Dhymethyl Formadide as dispersing agentnya, because PEG is not

soluble in water and can only be dissolved in DMF[6]

.

So the first stage is carried out in a dispersing treatment is to mix as much as CNT + PEG with

the composition 1: 3 + DMF as a solvent with a ratio of CNT 2% (1 gram) + PEG (3 grams) +

DMF 15 mL; CNT 4% (2 g) + PEG (6 grams) + 20 mL DMF.

Planetary Ball Mill for parameters used ball mill that is 50 grams of a mixture of as-dispersed

CNT + Alumina as-received (with composition as in Table 3) was added 25 mL ethanol by using

a rotation speed of 300 rpm (or about 5 Hz) for 4 hours, and balls used during the ball mill is

alumina ball (where the hardness of the ball must not be less than the hardness particles stirred).

Reason uses 25 mL ethanol or dry milling classified types

because there are significant differences in density between the CNT and alumina, which for

CNT density is 2.1 g / cm3 and alumina density ranges between 3.75 - 3.95 g / cm3)[7]

, wherein

the density difference The use of wet milling when the number reached about 240 mL ethanol

both the powder separately (where CNT is above and alumina at the bottom of the container / jar),

and cannot be mixed at all. Then using dry milling the powder is expected to be mixed well.

Function than the ethanol itself in the process of ball mill is to prevent sticky powder on the walls

of the jar, besides ethanol was also volatile so that post heating is needed after the mixing process

does not require high temperature and long duration. For a number of alumina balls were used I

use judgment based manual product a planetary ball mill device issued by Nuoya Machinery[8]

.

After the powder mixing process is completed, then we observed powder before dispraying,

whether the result of dispersing CNTs in a matrix of Alumina we have been successful or not.

The observation that we do is by using SEM against one Alumina powder-CNT, where the

results showed that the powder had been dispersed[9]

, although not completely dispersed. In the

figure 24 seen some of CNT that terdispers on A, B, C, and D, can be seen below:

Page 182: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

179

After doing business with a surfactant dispersing and ball mill then the next is the process of

coating specimen using cold spraying method. Temperature processes used around 250-280 ° C,

with other similar parameters for all specimens. Prior to spraying with a mixture of

CNT-alumina powder, specimens performed pre-treatment such as sand blasting and coating of

Ni-Al bond coat.

After all specimens have dispraying, the characterization can be done. Where the first

characterization done is metallography (both macrostructure and microstructure) and also has a

micro hardness testing alumina-CNT nanocomposite coating them. For both observation

macrograph and micrographic metallographic, observed part of the specimen is part of the

cross-section and made these

observations suggested the most first before damaging parts specimens in subsequent testing.

Specimens divided into two parts by using medium speed diamond saw and done very carefully

so that layers do not experience damage from a process in which the two parts of the first part to

metallographic observation, SEM, micro hardness and the second part is treated wear test and

surface roughness testing. Specimens for metallographic observation macrograph first specimen

forms to record data before any treatment was given, or in other words, still pure after spraying.

Macro observation carried 2x 8x and 20x magnification. Here are some macro photos

transversely observed can be seen in the image below.

Page 183: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

180

3. Results and Discussion

The Result of Wear Test[10]

with Lubricant and Non – Lubricant

Page 184: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

181

Result and Discussion FTIR

Based on these data, it can be analyzed that an increase in the level of violence along with the

addition of CNTs ranging from the addition of 0%, 2%, and 4% hardness tested using Vickers

Microhardness Testing tool.

C4-1

Name

Sample 011 By Administrator Date Tuesday, April 07 2015

Description

4500 4504000 3000 2000 1000

100

7374

76

78

80

82

84

86

88

90

92

94

96

98

100

cm-1

%T

2921.31cm-1, 73.78%T

2852.78cm-1, 80.73%T

1458.01cm-1, 88.27%T

1376.93cm-1, 92.74%T

721.80cm-1, 95.53%T

Page 185: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

182

Significant results shown by the degree of wear produced with increasing CNTs need to be

known as the progressive increase in violence, the wear rate will increase as well, it is known

that the material which causes the level of hardness and wear increase is Al2O3 CNT material

while giving the effect of self - lubrication, the effect of self - such lubrication known based on

results of testing using FTIR (Fourier Transform Infrared) the device to test whether or not the

levels of hydrocarbons in the material.

Conclusion

1. The addition of CNT improve the properties of hardness and wear on the surface of the

cynlinder linear

2. Al2O3 effects the increase in violence commited cold spray material

3. CNT self-lubrication effect by storing lubricant in the casing CNT

Reference

[1] M.D, Bermudez., et al. 2011. “Abrasive wear under multiscratching of Polystyrene +

SWCNT nanocomposites. Effect of sliding direction and modification by ionic liquid”.

Applied Surface Science, 257, pp. 9073-9081.

[2] Ahmad, I., et al. 2010. “Wear resistant properties of multi-walled carbon nanotubes

reinforced Al2O3 nanocomposites”. WEAR, 269, pp. 71-78.

[3] Zhang, W., et al. 2013. “Anti-Friction, Wear-Proof and Self-Lubrication Application of

Carbon Nanotubes”. Rev.Adv.Mater.Sci.36 pp. 75-88

[4] Sofyan, T.Bondan., et al. 2006. “Modification of Microstructure of Low Pressure Die

Casting AC4B Alloy by Addition of 0.015wt.% Sr”. 9th International QIR Proceeding. pp

1-5.

[5] Sarkar, Soumya., et al. 2014. “Processing and Properties of Carbon Nanotube/Alumina

Nanocomposites : A Review”. Rev.Adv.Matter.Sci.37, pp 53- 82.

[6] Ernst Geckeler, Kurt., et al. 2011. “Carbon nanotubes: are they dispersed or dissolved in

liquids?”. Geckeler and Premkumar Nanoscale Research Letters 2011, 6:136.

[7] Al-Samarai, Riyadh A., Haftirman, Khairel Rafezi Ahmad, Y. Al-Douri. 2012. “Evaluate

the Effects of Various Surface Roughness on the Tribological Characteristics under Dry

and Lubricated Conditions for Al-Si Alloy”. Journal of Surface Engineered Materials and

Advanced Technology, Scientific Research, pp. 167-173

[8] Manual Product Planetary Ball Mill : Nuoya Machinery

[9] Nam Kim, Gwi., et al. 2013. Evaluation on The Mechanical Characteristic of Fabricated

Alumina-CNT Composites. 9th International Conference on Fracture & Strength of Solids

June 9-13, 2013, Jeju, Korea

[10] CHEN, Jinfeng., et al. 2014. “Investigation on Premature Failure of the Self- Lubricated

Piston Rings in Oil-free Compressor”. 22nd International Compressor Engineering

Conference at Purdue pp.1-11.

Page 186: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

183

SICASE-755

Development of Leucite Glass-Ceramics for Non-Metallic Dental Product

Siti Mazatul Azwa Saiyed Mohd Nurddin*, Malek Selamat

Mineral Research Centre, Mineral and Geosciences Department Malaysia *[email protected]

Abstract

The objective of the study was to determine the potential of using Malaysian silica sand as the

SiO2 raw material in producing leucite (SiO2-Al2O3-K2O) glass-ceramics. The crystallization,

mechanical and biological properties of the glass-ceramic was studied. A starting glass

composition in the system of leucite was melted in an electric furnace, quenched in deionized

water and dry milled to obtain glass powder. The glass powders were ball milled and

compressed to form 13mm x 10mm pellet. The thermal analysis, phase composition,

microstructure, flexural strength and cytotoxicity of the glass-ceramics were investigated.

Thermal analysis showed that crystallization of the glass occurred at the range of 650°C and

850°C. The pellets were sintered at 650˚C, 700˚C, 750

˚C, 800

°C and 850

°C for 1.0 hour. The

crystallization depends on the temperature and time of sintering. At 700°C, leucite began to

form with minor phase of sanidine. The peak intensity increased as the temperature was

increased up to 850°C. For sintering time 3 to 12 hours, the peak intensity of leucite and

sanidine were increased but microcline was formed as a minor phase. The microstructure

analysis showed that the presence of dendritic leucite and prismatic sanidine. The leucite

glass-ceramics appeared translucent. The flexural strength values (80–175 MPa) were

comparable with commercial product (112-140 MPa). The in-vitro bioactivity results proved

that the leucite glass-ceramics sample can be classified as a bio-inert and non-cytotoxity

material and can be used for restorative dental products.

Keyword: silica, glass-ceramics, leucite, sanidine, dental, bioactivity, bio-inert, cyctotoxicity

1. Introduction

Silica sand is the main raw material for production of silicates glass. Glasses in general term

are not advanced materials but through refining in composition, heat treatment and

manufacturing, glasses can be transformed into a new class of material called glass-ceramics.

Glass-ceramics are polycrystalline materials that can be produced through controlled of

crystallization during the heat treatment process. Currently, the application of glass-ceramics

as biomaterial for dental products is growing. For example, leucite glass-ceramics are widely

used in dentistry as restorative dental material to fabricate dental inlays, crowns, bridges and

veeners prostheses. Leucite glass-ceramics can be produced by surface sintering of glass

powder.

Page 187: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

184

This processing route involves melting, quenching, milling of glass frit, and sintering in order

to promote crystallization of glass-ceramics. Glass-ceramics based on leucite system show

exceptional biocompatibility, and good physical, chemical and mechanical properties [1, 2].

Since the 1990s, efforts to develop biomaterials for restorative dentistry have been

concentrated on producing metal-free systems. An important milestone in this respect was

reached in the development of glass-ceramics containg leucite (K2O -Al2O3- SiO2)[3].

Glass-ceramics have been successfully used for many years in dentistry to construct crowns

and fixed partial bridges due to the properties of high mechanical strength, chemical inertness,

wear resistance, aesthetics and low density. Presently, leucite, mica and lithium disilicate

glass-ceramics are widely used as restorative materials [4]. This material is particularly

suitable for fabricating single units such as as dental inlays crowns and veneers because its

special optical properties [5]. The aim of this project was to investigate the effect of using

natural Malaysian silica sand as the SiO2 raw material on the phase crystallization,

microstructure, flexural strength, in-vitro bioactive and cytotoxicity of leucite glass-ceramics.

2. Materials and Methods

Natural silica sand sample was taken from Terengganu. .The sample was wet screened and a

fraction 75< to <150 µm was prepared in order to comply with the requirement of traditional

glass production technology for glass melts. Chemical composition of the silica sand sample

was determined by X-ray fluorescence analysis (Rigaku, Japan). .The composition weight

percent of the starting glass selected for the study was; 64.2% SiO2, 16.1% Al2O3, 11.9% K2O,

5.1% Na2O, 1.7% CaO, 0.5% TiO2 and 0.5% LiO2. All oxides used were with purity in the

range of 90 to 99% from Merck, Germany; Unilab, Australia and Hamburg Chemical. The

batches were placed in plastic bottles and mixed using a Heldoph Reax 2 Shaker, Germany for

8 hours in order to make sure the raw materials were homogenized. Zirconia balls were used

as the media in the mixing process. Samples were melted in alumina crucibles in a

bottom-loading high temperature furnace (Modutemp, Australia) at 10°C/min to 1450°C and

held for 3 hours, and then quenched in cool water to produce glass frit. The glass powders

were milled (Retsch PM-400, Germany) for 1 hour and sieved to the required size of less than

75 µm. The crystallization temperature of the glass powder was studied using Differential

Thermal Analysis, DTA (Linseis, Germany) with a 10oC/min heating rate at temperature from

25˚C to 1100

˚C in a dry air atmosphere. The glass powder was cold pressed using a

laboratory hydraulic hand press (Carver, USA) to obtain green compact in the form of

cylindrical pellet of 13mm x 10mm. Pellets were heat treated in electric furnace (Termo

Temp, UK) at 700˚C, 750

˚C, 800

˚C and 850

˚C at a heating rate of 2

oC/min and 1.0 hour soaking

time to study the crystallization behaviour of glass. The effect of sintering time on

crystallization was also studied through five different soaking time at 3.0, 6.0, 9.0 and 12.0

hours.

Page 188: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

185

XRD (D8 Advanced , Bruker, Germany) was used for the identification of the crystalline

phases in the glass-ceramics using Cu Kα radiation at a scan speed of 2°/min for 2θ from 10

° to

80°. Microstructure studies were done using field emission scanning electron microscopy

(FESEM) (Supra 40 VP, Germany). Before viewing with FESEM, glass-ceramics specimens

were embedded, polished and etched with 30% hydrofluoric acid for 7 seconds. The

specimens were platinum coated and viewed using the secondary electron detector. The

flexural strength of sintered glass-ceramics was measured using three points bending test with

bars of 20 mm x 5 mm x 5 mm (INSTRON, UK, 0.5 mm/min displacement).

The biocompatibility of glass-ceramics sample after heat treatment at 850oC for 9.0 hour was

examined by in-vitro bioactivity and cytotoxicity test. The in-vitro bioactivity test was

conducted in Kokubo's simulated body fluid, SBF, which contains almost the same inorganic

constituent as human body plasma. The sample was brought into contact with SBF fluid for

10 and 20 days. XRD was used to characterize the formation of apatite on the glass-ceramic

surfaces. Cytotoxicity of the leucite glass-ceramics was evaluated by testing on extracts of

leucite glass-ceramics according to ISO 10993-5:2009(E) and ISO 10993-12:2012(E).

American Type Culture Collection L-929 mouse subcutaneous connective tissue fibroblast

cells (Mus musculus, NCTC clone 929, CCL-1) was used in this test. Zinc sulphate at 240

µg/ml and complete growth medium were used as the positive and negative control,

respectively. The test material was tested in triplicate at concentration of 6.25, 12.5, 25, 50,

100 and 200 mg/ml

3. Results and Discussion

Chemical analysis result of the silica sand is presented in Table 1. The result reveals that the

natural silica sand sample is highly pure and contain very low concentrations of impurities.

The content of Fe2O3 is low. Generally, typical acceptable value of Fe2O3 in silicate glass

product is between 0.02 – 0.03% (Malaysian Standard MS 701:1981).

The XRD pattern as shown in Figure 1 identifies that the main mineralogical content of the

silica sand sample is quartz. Quenching the glass melts in water at room temperature resulted

in transparent and colourless glass frit.

Page 189: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

186

The XRD pattern of the glass sample as shown in Figure 1 indicates the present of amorphous

glass phase and did not show any evidence of crystalline phase in the glass. The DTA result of

the quenched glass powder is shown in Figure 2. The DTA was used to identify the glass

transition and crystallization temperature of the glass sample. The temperatures behaviour of

a glass can provide information of glass-ceramics fabrication. According to Sooksaen et al.,

the glass transition value of SiO2-Al2O3-K2O glass system is at about 594˚C to 638

˚C [6]. The

DTA curves show that no clear endothermic peak was observed related to glass transition.

However, an exothermic peak associated with the crystallization temperature of glass to form

glass-ceramic was in the range of 650˚C to 850

˚C. Consequently, heat treatment was

performed in this study at 700˚C, 750

˚C, 800

˚C and 850

˚C to form the glass-ceramics, assuming

phase evolution was completed at each isothermal hold of 1.0 to 12.0 hours.

7

The glass-ceramics appearance after sintering at 700°C was slightly translucent and white.

Increasing the sintering temperature up to 800°C has transformed the samples become more

white and opaque. The XRD patterns of glasses that were heat-treated at 700°C, 750

˚C, 800

˚C

and 850˚C for 1.0 hour are shown in Figure 3. The results indicated the presence of cubic

leucite (ICDD: 00-038-1423) and sanidine (ICDD: 00-019-1227). It is also proved that the

amount of leucite and sanidine phase for each heat-treated glass composition was increased

with the increasing of heat treatment temperature.

Page 190: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

187

The effect of sintering time on the crystallization is shown in Figure 4. As the sintering time

was increased, all peaks associated with cubic leucite and sanidine became stronger. However,

for sintering temperature at 700°C and 750

°C and soaked 6 hours, microcline (ICDD:

00-019-0932) started to form as a minor phase. While for 800°C and 850

ºC microcline started

to crystallize within 3.0 hours soaking time. The crystallization of microcline was previously

identified in leucite reinforced glass-ceramics in SiO2-Al2O3-K2O glass system [7].

Page 191: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

188

Figure 5 shows the FESEM micrographs of glass-ceramics sample sintered at 850oC for 1.0

hour and 9.0 hours. The formation of dendritic cubic leucite and prismatic sanidine phases is

clearly observed. A previous study by Holand, et al. on crystallization mechanisms in

glass-ceramics showed that the early stages of bulk leucite growth have been due to dendrites

growing in preferred crystallographic directions [8]. The micrographs also show there were no

obvious micro cracks and the surface developed a glassy texture.

Page 192: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

189

Figure 6 shows the graph of the flexural strength results of the glass-ceramics sintered at 700oC,

750oC, 800

oC and 850

oC and soaked at 1.0, 3.0, 6.0, 9.0 and 12.0 hours. The flexural strength

of leucite glass-ceramics was increased as the time and sintering temperature was increased.

This is probably due to the high volume of crystalline phases and the existence of prismatic

sanidine. The higher flexural strength, 175MPa was achieved for sample sintered at 850°C for

9.0 hours. However, the flexural strength decreased after soaking for 9.0 hours at all

temperatures. This is probably due to the glass-ceramics started to melt and part of crystallite

began to dissolve in the residual glass phase. The flexural strength values of glass-ceramics

samples were comparable with commercial product of which is 112-140 MPa [9].

Glass-ceramics for restorative dental applications must fulfil the standard tests for biomaterial

use, such as compatibility with the oral environment. Bioactivity on the surface of the dental

restoration must not occur. XRD patterns of sintered glass-ceramics before and after

soaking in SBF for several days are shown in Figure 8. Patterns show that there is no

presence of apatite layer on the surface of glass-ceramics sample after 20 days of immersion in

SBF that indicated the sample is inert bioactive materials.

Page 193: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

190

In this study, the MTT assay is used to evaluate the cytotoxicity characteristics of the leucite

glass-ceramics and the yellow tetrazolium salt (MTT) is reduced in metabolically active cells to

form insoluble purple formazan crystals which are solubilized by the addition of a solvent

(dimethyl sulfoxide). Cell viability is qualified by colorimetric enumeration whereby a low

OD reading corresponds to low cell viability which is associated with a loss in mitochondrial

dehydrogenase activity. The test material leucite glass-ceramics did not inhibit the viability

of L929 cells at all concentrations following 24-hour treatment as shown in Table 1 and Figure

1. Both negative and positive controls performed as anticipated. In MTT assay, the well

with the highest absorbance indicates the highest cell viability.

4. Conclusion

The highly pure natural Malaysian silica sand can be used as SiO2 source for producing leucite

glass-ceramics without any further chemical upgrading. Sintering of SiO2-Al2O3-K2O glass

powder at 700°C to 850

°C for duration of 1 to 12 hours contributed to the crystallization of

cubic leucite and sanidine with minor phases of microcline. The leucite glass-ceramics has a

flexural strength that is comparable with commercial dental products. The absence of apatite

layer on the surface indicated that it is an inert bioactive material. The leucite glass-ceramics

is ranked as a non-cytotoxic in terms of in-vitro cellular response to human cell lines under the

prevailing test conditions.

5. Acknowledgements

The authors would like to thank the Director of Mineral Research Centre, Department of

Minerals and Geoscience Malaysia and all staff of Mineral Research Centre who were

involved and had contributed in this research work.

6. References

[1] Ahmad N., 2006. Production of high purity silica from Malaysian silica sand, Phd Thesis,

University of Leeds, UK.

Page 194: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

191

[2] Cattel, M.J. Knowles, J.C. and Clarke, R.L. 2005. The crystallization of an aluminosilicate

glass in the K2O-Al2O3-SiO2 system, J. Dental Materials, 21, pp. 811-822.

[3] Rheinberger, V., 1997. Perspectives in dental ceramics. Glastech Ber. Glass Sci. Technol.,

70C:339-400.

[4] Apel, E., Hoen, C.V., Rheinberger, V. and Holand, W., 2007. Influence of ZrO2 on the

crystallization and properties of lithium disilicate glass-ceramics derived from a

multi-component system. Journal of the European Ceramic Society, 27: 1571-1577.

[5] Lee HH, K. M., Asaoka K., 1997. Influence of modification of Na2O in a glass matrix on

the strength of leucite-containing poercelains. Dental Materials, 16: 134-143.

[6] Sooksaen, P. Boonmee, J. Witpathomwong, C. Likhitlert, S. 2010. Effect of K2O/SiO2

ratio on crystallization of leucite in silicate based-glasses, J. Metals, Mater. Minerals.

20(1) pp. 11-19.

[7] Chen X, C. T., Wilson R, Hill R and Cattell M., 2010. Crystallization of high-strength

fine-sized leucite glass-ceramics. J Dent Res, 89: 1510-1516.

[8] Holand, W. and Beall, G.H. 2002. Glass-ceramic technology. American Ceramic Society,

Ohio, USA.

[9] El-Meliegy, E.M. and Noort, R. 2011.Glasses and glass-ceramics for medical applications,

Springer.

Page 195: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

192

Environmental Sciences

Session Chair: Prapat Pentamwa

SICASE-708

The Distribution of Aroids along Hau River, Vietnam

Duong Minh Truyen︱University Sains Malaysia

Mashhor Mansor︱University Sains Malaysia

Amir Shah Ruddin︱University Sains Malaysia

Duong Minh Tho︱Cantho University

Nguyen Trung Toan︱Hong Bang International University

SICASE-805

Heavy Metals Contamination of Community Water Supply in Northeastern Thailand

Prapat Pentamwa︱Suranaree University of Technology

Tanisa Wongklom︱Suranaree University of Technology

Jitlada Shimmai︱Suranaree University of Technology

SICASE-843

Preparation of Sodium Aluminate from Alumina Waste from Petrochemical Industry

Vilaiwan Teankrajang︱Chulalongkorn University

Orathai Chavalparit︱Chulalongkorn University

Rewadee Anuwattana︱Technology Thailand Institute of Scientific and Technological

Researcher

SICASE-840

Electrochemical Regeneration of Chloride Contaminated NaY Zeolite Wastes from

Petroleum Refinery

Kavidsara Homchuen︱Chulalongkorn University

Orathai Chavalparit︱Chulalongkorn University

Rewadee Anuwattana︱Ministry of Science and Technology Thailand

2015/6/28 Sunday 10:45-12:15 Room 2

Page 196: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

193

SICBENS-1326

Environmental Hazards of Radioactive Radiation from Granite Building Stones through

a Look into Burien’s Granite Mass in Isfahan

Siyamak Bagheriyan︱Islamic Azad University of Shahriyar

Page 197: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

194

SICASE-708

The Distribution of Aroids along Hau River, Vietnam

Duong Minh Truyen*

School of Biological Sciences, University Sains Malaysia, Malaysia

[email protected]

Mashhor Mansor

School of Biological Sciences, University Sains Malaysia, Malaysia

[email protected]

Amir Shah Ruddin

School of Biological Sciences, University Sains Malaysia, Malaysia

[email protected]

Duong Minh Tho

Cantho University, Vietnam

[email protected]

Nguyen Trung Toan

Hong Bang International University, Vietnam

[email protected]

Abstract

The Araceae is a monocotyledonous family group of flowering plants and is one of the largest

families in the world after the orchids, grasses and sedges. The aroids play important roles in

human life such as supplement of food sources, ornamentals and medicine. The sampling stations

were selected based on the analysis of the main groups of population zonations and land uses

of the Hau River. A total 27 species found, belonging to 23 genera in Araceae family can be

divided into three main important groups such as ornamentals, weedy and crop cultivation.

Generally, Hau River recorded 16 ornamental species, 11 weedy species and 3 crops species.

Surprisingly, no endemic species is recorded in Hau River. Among the aroid species,

Colocasia esculenta been a common species at Hau River, used as food for the local

communities along Hau River.

Keywords: “Araceae”, “Hau River”, “distribution”, “plant – use”, “aroid species”

Page 198: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

195

1. Introduction

The family Araceae is one of the common monocotyledonous flowering plants in the world and

has a total of 117 genera and more than 3790 species [1]. According Mansor, Boyce [2], Araceae

is also one of the largest families in the world after the orchids, grasses and sedges. Most of the

species are found in tropical areas. Sulaiman and Boyce [3] made the observation that the aroids

generally occur along the riverbanks, wetlands and close to humid areas where the

environmental conditions are wet, with high humidity and shaded sites.

There are several factors affecting the distribution of aroid plants. The first factor is growth of

human population on a large scale and the migration to new areas as population pressures build

up. With a high density population occupying the land, the land use changes invariably takes

place as natural ecosystems are converted or modified for agriculture and human settlements.

Secondly, aroid distribution is effected by their economic values as cultivated species. Species

with commercial values are cultivated or collected in the wild. This action changed their natural

habitats and distribution pattern. Finally, climate and topography influence aroid distribution

when the aroid species are introduced. Humid climate increases aroid growth while too dry

climate restricts species growth. Topography of flood plains and the low lands in Mekong Delta

are suitable for some species and their distribution expand for some particular species, namely

Colocasia esculenta. Nevertheless, mountains, hills and high lands are suitable for the climbing

group or special group (Amorphophallus).

Through the survey of aroids distribution in Hau Rivers for this study, the species presence and

the habitats in surveyed areas are recorded and assessed. Moreover, common species such as

Colocasia esculenta is expectedly found in all types of land-use as this species has a very

cosmopolitan distribution. This will provide a supplement to future research in Mekong Delta in

the next years.

2. Methodology

Hau River is located in Mekong Delta, a highly disturbed area, which is the lowest part of

Mekong River with an extremely high human population densities. Mekong Delta has about 18

million inhabitants (40,000 km2). The high population densities in Mekong Delta resulted in

the conversion of most of parts of the delta into agro – ecosystems. Hau River reflects a highly

modified environment. Rice fields cover almost 80% of the area.

The study has been conducted along Hau River, using land use maps and soil maps in order to

survey along riverbanks. Observation is the technique of visually assessing an area, and was

used for sampling along Hau River. This is based on an understanding of the ecology of the

area and noting the various features related to the objectives of the study. Based on the Mekong

Page 199: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

196

Delta population map, can be divided into 3 zones (lowly populated, moderately populated,

highly populated) [4] and [5] (figure 1).

Selection of the sampling sites were based on the surveyed land uses. In each land use type, the

sampling points (1km x1km) were established. In 1km2 sampling area, subplots (1mx1m) were

recorded for aroid species presence taking into account species composition and distribution.

During the survey, photos were taken on all aroid species found in every study site for further

reference.

Page 200: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

197

3. Results

3.1 Checklists of Aroids and Its Distribution in Hau River.

There are 27 species distributing along Hau River, belonging to 23 genera in Araceae family as

shown in Table 2. Generally, aroids can be divided into three main important groups such as

ornamentals, weedy and crops cultivation. Among aroid species found, three species are

identified as weedy and crops, namely Caladium bicolor, Colocasia antiquorum and Colocasia

esculenta. Hau River recorded 16 ornamental species, 11 weedy species and 3 crops species

based on endemistism and class groups. Surprisingly, no endemic species is recorded in Hau

River.

The numbers of aroids in each zone of Hau River are shown in Table 3. The highest number of

species recorded is at zone 2 Hau River with 22 species. Followed closely by zone 3 Hau River

(19 species), zone 1 Hau River (18 species).

Page 201: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

198

Based on the results, 10 species were recorded in three zones of Hau River, 12 species in two

zones and 5 species in one zone. In zone 2, only four species found, namely Aglaonema

nitidum, Philodendron erubescens, Pseudocracontium lacourii and Scindapsus officinalis.

Only Syngonium macrophyllum was recorded in zone 1 in Hau River.

3.2 Species Occurrence for Landuse Types

The numbers of aroids in each landuse of Hau River are shown in Table 4. The highest number

of aroid species have been recorded at crops landuse with 19 species, followed closely by

residential areas landuse (17 species), plantation (16 species), others landuse (6 species),

unused land (5 species) and forest (2 species).

Page 202: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

199

Based on the results, it is found out that only Dieffenbachia amoena can be found at all landuse

types as shown in Table 4. This been followed by Colocasia esculenta, recorded at 5 landuse

types along Hau River. In addition, 11 species been recorded at 3landuse types, 8 species at 2

landuse types. There were 6 species that were recorded at one landuse type. Meanwhile, out of

this number one species such as Aglaonema hybrid recorded at crops landuse, Philodendron

erubescens at residential areas, Pistia stratoides and Typhonium flagelliforme at other types of

landuse, Pseudocracontium lacourii at plantation and Spathiphyllum patinii at unused land

(Table 4).

3.3 Species Diversity Index between Different Populated Zones in Hau River

The species diversity index of the three zones in Hau River is shown in Table 5. The highest

number of Shannon index is shown in highly populated zone with 1.68, followed by lowly

populated zone with 1.46 and lastly at moderately populated zone with 0.76. In which, highly

populated zone is more diverse than lowly populated. Moderately populated zone is less

diverse than other zones.

Page 203: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

200

On the other hand, the highest Evenness index is in moderately populated zone, followed by

lowly populated and highly populated zones, with 0.91, 0.79 and 0.77 respectively.

3.4 Species Diversity Index between Landuses in Hau River

Table 6 reflects the diversity between landuse types in Hau River. The diversity indices are not

too high in Table 7. However, the indices numbers show the diversity of each landuse in Hau

River. Meanwhile, crops landuse has the highest Shannon index (1.49). The second high

Shannon index is shown in residential area, followed by plantation with 0.79 and 0.62

respectively. Unused land and river have smaller Shannon indice (0.30 and 0.32 respectively).

Nevertheless, the Evenness indices are shown in Table 6. The highest Evenness index is at

unused land (0.90), followed by three types of landuse, namely crops, plantation and residential

areas with 0.80 values. Evenness index at the forest is 0.55 while at other types of landuse is

0.35

4. Discussion

In Vietnam, researches on Araceae are limited as there are not many scientists working on this

family. Until 2012, Matthews [6] published aroid checklist with 135 aroid species of 25 genera. In

comparison, 27 aroid species were found along Hau River, having 20% of the species in Vietnam.

The number of aroid species along Hau River does not represent completely the distribution of

aroids of the Mekong Delta. However, 27 species is quite numerous in the smaller area in the Hau

River. Furthermore, in the Vietnam aroid checklist, there are no endemic species found in Hau

River even though there are 40 endemic species in Vietnam [6]. Most endemic species in Vietnam

have been recorded in natural habitats such as forests and mountainous places in the upper parts of

Page 204: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

201

Vietnam. For example, Arisaema claviforme, a new aroid species was found at the Hon Ba Nature

Reserve, Khanh Hoa province, further to the north [7]. However, in Mekong Delta, there are no

primary forests and hilly areas left. Although the forests are located in moderate populated zone in

Hau River, they were used mainly for tourisms. Many artifacts such as pagodas, stores and shops

have replaced the natural habitats in forests even in moderately populated zone. In highly

populated zones, there are no more natural places and the main landuses are agricultural fields and

residential areas. This explains why there are no endemic species recorded in the Hau River. In

addition, according to Toan, Sebesvari [8], the main feature is the people‟s activities along

riverbanks. Nowadays, the main activities in Mekong Delta are intensive farming and secondary

vegetation [8]. Because of human actions, the natural systems are replaced by agricultural

farming [9]. Cultivated crops had replaced wild plants. Native and endemic species cannot be

found in the Mekong Delta because of the loss of their wild habitats and changed environmental

conditions. In addition, Aroid species in Hau River are cultivated for humans‟ demands. Total area

of Mekong Delta is 40,548.2 km ² while the population of Mekong Delta is 17,330,900 people [10].

With high population, the demands to use and cultivate Araceae species in Vietnam are also high.

Aroids presences according to landuse types are different in Hau River. Species are widely

distributed as food crops, residential areas and plantation landuses. In Mekong Delta, most of

people activities focus on both sides of the rivers such as farming, fishing and construction [11].

Densely populated areas are close to big rivers. This is because the presence of big rivers makes

it convenient for agriculture, irrigation and drainage. Hence, people focus on changing wasteland

along riverbanks into cultivated areas. This explains why those landuses above are more diverse

than other types of landuse in Hau River. Moreover, the overall Shannon diversity index in Hau

River is 1.15. Although 27 aroid species recorded in Hau River, the environment is highly

disturbed by human population‟s increase and urbanization. Due to human disturbance, the

habitats in Hau River are no longer natural. That makes Hau River less diverse. Nevertheless,

overall Evenness index in Hau River is 0.80. Because the main landuses in Hau River are

agricultural fields, aroid species are planted in specific farming field due to the demands of human.

Between landuse types, in Hau River, the Shannon index in crops landuse type is the highest,

followed by residential areas with 1.49 and 0.79 respectively. In Hau River, people cultivate

aroid species for food crops, feeding animals, ornamentals and medicine. This explains why

cultivated places will be more diverse than other places in Hau River. In addition, ornamental

plants are often planted around housing areas. It makes the Shannon index in residential areas is

higher than other landuse types. Nevertheless, Evenness index in unused land is highest. This is

because in unused land, with little disturbance from human activities, wild species occur widely

and naturally, including weedy and cultivated plants.

Page 205: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

202

5. Conclusion

There were 27 species in the Hau River. Out of this number, 16 species recorded as

ornamentals, 11 species as weeds and 3 species as crops. No endemic species is recorded in

Hau River. The overall Shannon index of Hau River is 1.15 while overall Evenness index is

0.80. Some common species adapt to different habitats from upper to lower zones of two rivers,

such as Colocasia esculenta. Furthermore, study the ecology and the distribution of aroids in

larger areas to record more endemic species for Mekong Delta, Vietnam.

6. Acknowledgements

I would like to express my gratitude towards Universiti Sains Malaysia for funding the

publication fee under the Individual Research Grant (1001/PBiologi/816217).

7. References

[1] Nauheimer, Global history of the ancient monocot family Araceae inferred with models

accounting for past continental positions and previous ranges based on fossils. New Phytol,

2012. 195(4): p. 938-50.

[2] Mansor, M., et al., The Araceae of Peninsular Malaysia. Academic imprint series / Penerbit

USM2012, Glugor , Pulau Pinang: Penerbit Universiti Sains Malaysia : Distributors MPH

Distributors. ix, 146 p.

[3] Sulaiman, B. and P.C. Boyce, Studies on Homalomeneae (Araceae) of Peninsular Malaysia I :

Homalomena asmae, a New Species from Perak. APG : Acta phytotaxonomica et

geobotanica, 2010. 60(3): p. 163-166.

[4] Khang;, N.D., A. Kotera;, and M. Yokozawa, Influence of Climate Change on Water Regime

and Rice Production in Mekong Delta. Vietnam Academy for Water Resources 2011.

[5] Hoi, T.N., Typical Flood and Flooded Areas in Mekong Delta. Vietnam Academy for Water

Resources, 2011.

[6] Matthews, P., Bibliography of work on Araceae in Vietnam. International Aroid Conference

2012.

[7] Ho, P.H., Cay co vietnam = An illustrated flora of Vietnam1991, California: Pham Hoang Ho.

v. <1 >.

[8] Toan, P.V., et al., Pesticide management and their residues in sediments and surface and

drinking water in the Mekong Delta, Vietnam. Science of the Total Environment, 2013. 452:

p. 28-39.

[9] Duong, L.T. and K. Cho, Farm-Management and Farming Systems-Development in Vietnam.

Journal of the Faculty of Agriculture Kyushu University, 1994. 39(1-2): p. 1-8.

[10] Wilby, A., et al., Arthropod diversity and community structure in relation to land use in the

mekong delta, vietnam. Ecosystems, 2006. 9(4): p. 538-549.

[11] Wood, J.F.a.J.L., Dry-Season Flood-Recession Rice in the Mekong Delta: Two Thousand

Years of Sustainable Agriculture? Asian Perspectives, 1999. 38(1).

Page 206: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

203

SICASE-805

Heavy Metals Contamination of Community Water Supply in Northeastern

Thailand

Prapat Pentamwa *, Tanisa Wongklom, Jitlada Shimmai

School of Environmental Health, Institute of Medicine,

Suranaree University of Technology, Thailand *[email protected]

Abstract

This study aims to investigate the contamination of heavy metals from community‟s water

supply in Nakorn Ratchasima, Chaiyaphum, Buriram and Surin provinces of Northeastern

Thailand by evaluating specific substances of Cadmium (Cd), Lead (Pb), Iron (Fe), Zinc (Zn),

Manganese (Mn), Arsenic (As) and Mercury (Hg). The Cd, Cr, Pb, and Zn compounds were

quantified by Flame AAS and only As and Hg were analyzed by ICP-MS method. The human

health risk assessment for the consumer water communities was assessed according to the

USEPA (2005) by investigating non-cacinogenic risk and the cancer risk method. Most of

heavy metals (Cd Pb Fe Zn Mn) were in water quality acceptable standard except for Fe in tap

water has exceeded the standard by 6.3 percent. The most detected of ferrous (Fe)

contamination in surface water and tap water was found in Nakorn Ratchasima surface water

supplies of 1.77 and 1.66 mg/L, respectively, which is higher the Fe drinking water standard

of 0.5 mg/L. Thirty percent of Cd in ground water supply in both water source and home users

is higher than the standard. In Chaiyaphum, Burirum, and Surin provinces, Cd contaminations

in groundwater water supplies at water sources and home user was higher than the water

standard of 2 and 1.33, 2 and 2.6, and 2.3 and 1.6 times, respectively. This study showed

Pb Hg and As were not detected in any water samples. However, the hazard quotient (HQ)

average of targeted heavy metals are in the acceptable non-carcinogenic risk.

Keyword: Heavy Metals, Contamination, Water supply, Communities, Thailand

Page 207: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

204

SICASE-843

Preparation of Sodium Aluminate from Alumina Waste from Petrochemical

Industry

Vilaiwan Teankrajang*

Department of Environmental Engineering, Chulalongkorn University, Thailand

[email protected]

Orathai Chavalparit

Department of Environmental Engineering, Chulalongkorn University, Bangkok, Thailand

[email protected]

Rewadee Anuwattana

Department of Environment and Resources, Technology Thailand Institute of Scientific and

Technological Researcher, Thailand

[email protected]

Abstract

In this research, alumina waste from the petrochemical industry is used to absorb moisture

from the air in laboratories. Nowadays, alumina waste increased, especially from

petrochemical industry which occurred about 37.5 tons / year. The most entrepreneurs didn‟t

seriously intend about the alumina waste management because the desiccant alumina with low

price made the amount of alumina waste disposal increased. An alternative environmental

management method of alumina waste is used to be the starting raw material for preparation of

sodium aluminate. The aim of this research is to determine the optimum conditions for

preparation sodium aluminate from alumina waste from petrochemical industry. Sodium

aluminate was prepared by the dissolution of alumina waste in a sodium hydroxide. The

amount of alumina waste and the concentration of sodium hydroxide were adjusted to the mole

ratio of sodium oxide and alumina (Na2O: Al2O3). The results showed that the optimum

concentration of sodium hydroxide was 6M. The mole ratio of Na2O: Al2O3 as 2:0.25, 2:0.75

and 2:0.9 has the XRD spectra similar to sodium aluminate standard graph and no interruption

from alumina waste. The ratio 2:0.75 has the highest percentage of sodium aluminate crystal

(93.62%). The structure of ratio 2:0.75 mostly consisted of orthorhombic and tetrahedral

crystals. The XRF data are approximately similar to the sodium aluminate standard. Then, the

optimum condition showed that 6M of sodium hydroxide activated with the mole ratio of Na2O:

Al2O3 was 2:0.75 as the best condition for preparation of sodium aluminate from alumina waste

from petrochemical industry.

Keywords: alumina waste; sodium aluminate; sodium hydroxide; waste recycling

Page 208: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

205

1. Introduction

Activated alumina is manufactured from aluminium hydroxide by dehydroxylation that

produces a highly porous and surface area. It is used for a wide range of adsorbent and catalyst

applications. Activated alumina is used as a desiccant, it works by a process called adsorption.

The water in the air will attached to the alumina as the air passes through it [1]. Alumina is

used to absorb moisture from the air to control humidity in laboratories because the moisture

inside the building is a source of bacteria and fungi. Nowadays, alumina waste increased,

especially from petrochemical industry which occurred about 37.5 tons / year. The most

entrepreneurs didn‟t seriously intend about the alumina waste management because the

desiccant alumina with low price made the amount of alumina waste disposal increased. The

conventional disposal method is by incineration (with cement) and sanitary landfill. However,

the cost of landfills disposal and energy recovery in cement kiln are expensive. The waste

management was based on the 3Rs principles (reduce, reuse and recycle) to maximize the use

of resources which there were many options for this management. An alternative

environmental management method of alumina waste is used as raw material for preparation of

sodium aluminate.

Sodium aluminate is a white crystalline solid and prepared by reaction of sodium oxide (Na2O)

and alumina (Al2O3). Sodium aluminate is an important commercial chemical for various

applications. It is used as an adjunct to water softening systems, as a coagulant aid to improve

flocculation and a pH adjustment for wastewater treatment [2]. It was also a catalyst for

concrete hardening, a production of refractory bricks and a chemical flocculation. It can be

treated phosphate and fluoride in the wastewater [3].

The aim of this research is to determine the optimal conditions for preparation of sodium

aluminate from alumina waste from the petrochemical industry.

2. Material and Methods

2.1 Preparation of Material

The alumina waste used in the study was obtained from laboratories humidity control unit in a

petrochemical industry located in Mab Taput industrial state. The alumina waste sample was

average 5 mm in diameter. Chemical analysis of alumina waste can be achieved by X-Ray

Fluorescence (XRF), Phillip PW2400. The result showed in Table 1. It was dried at 105 oC

for 24 h using an air-circulating oven and ground using grinder and sieved to particles with a

top cut of 2 mm.

Page 209: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

206

2.2 Preparation of Sodium Aluminate

Experimentation was to find the optimum condition for preparation of sodium aluminate from

alumina waste by varies the ratio of alumina waste and sodium hydroxide concentration. The

alumina waste and the concentration of sodium hydroxide were varied from 5-40 g and 1-5

mol/L, respectively. The alumina waste and sodium hydroxide were mixed into 1000 ml beaker.

This solution was heated at 60 ° C and stirred at 200 rpm for 30 minutes. The amount of

alumina waste and the concentration of sodium hydroxide were adjusted to the mole ratio of

sodium oxide and alumina (Na2O: Al2O3). Then, the mole ratio of sodium oxide and alumina

from the sodium aluminate standard was 2:1 and the concentration of sodium hydroxide was

varied at 2M, 4M, 6M, 8M and 10M. Finally, the molar ratio of sodium oxide and alumina was

varied at 2:0.1, 2:0.25, 2:0.5, 2:0.75, 2:0.9, 2:1, 2:1.5, 2:2, 2:2.5 and 2:3 by the optimal

concentration of sodium hydroxide [4]. The crystallization, chemical compositions and

morphology of sodium aluminate were analyzed by X-Ray Diffraction (XRD) method, X-Ray

Fluorescence (XRF) method and Scanning Electron Microscopy (SEM) method respectively.

3. Result and Discussion

For the varied concentration of sodium hydroxide which the mole ratio of sodium oxide and

alumina as 2:1, the results showed that the optimum concentration of sodium hydroxide was 6M.

For crystallization of sodium aluminate, the crystal sodium aluminate obtained from the

experiments was the molar ratio of sodium oxide and alumina as examined by the XRD spectra

as shown in Fig.1. From the XRD spectra can be observed that ratio 2:0.25, 2:0.75 and 2:0.9

similar to sodium aluminate standard graph and no interruption from alumina waste. Therefore, the

sodium oxide concentration and initial alumina concentration were an important role in the

crystallization of sodium aluminate [5,6].

Page 210: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

207

The results of the percentage of crystallization were showed in Table 2. The highest percentage of

sodium aluminate crystal was 93.62 which obtained from sample with ratio 2:0.75. Moreover, it

obviously showed that the percentage of crystallization trend to decrease when the molar ratio

of sodium oxide and alumina decrease.

The chemical composition by XRF of mole ratio 2:0.75 is mostly similar to the sodium

aluminate standard which compared with other ratios.

Page 211: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

208

The chemical composition by XRF is 2:0.75 (Na2O: Al2O3), the main composition of alumina

(50.5%) and sodium oxide (34.6%) which is almost close to the sodium aluminate as shown in

Table 3.

The fig.2 showed that the morphology of the sodium aluminate with ratio 2:0.75 was

investigated by using SEM The structure of sodium aluminate mostly consisted of orthorhombic

crystals which is approximately similar to the sodium aluminate standard.

Page 212: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

209

4. Conclusion

The result of the study showed that alumina waste from laboratories control unit in a

petrochemical industry can be recycle as the raw material for preparation of sodium aluminate.

The optimum concentration of sodium hydroxide and the mole ratio of Na2O:Al2O3 was 6M

and 2:0.75 respectively. The result from physical and chemical compositions of sodium

aluminate prepared from alumina waste is similar to sodium aluminate standard.

5. Acknowledgments

This paper was financially supported by the 90th

anniversary of Chulalongkorn University fund

(Ratchadaphiseksomphot Endowment Fund), Thailand. The author was supported from TISTR

for the use of laboratory instruments.

6. References

M. Takbiri, K. J. Jozani, A. M. Rashidi, and H. R. Bozorgzadeh, Preparation of nanostructured

activate alumina and hybrid alumina-silica by chemical precipitation for natural gas

dehydration, Microporous and Mesoporous Materials, 2013, vol. 182, pp. 117-121.

V. Rayzman, I. Filipovich, L. Nisse, and Y. Vlasenko, Sodium aluminate from alumina bearing

intermediates and wastes, JOM, 1998, vol. 50, pp. 32–37.

R. J. Keller, and J. J. Len, Kirk-Othmer Encyclopedia of Chemical Technology, 2003.

W. G. Michael, and D. S. Darryl, Zeolites Synthesized from Class F Fly Ash and Sodium

Aluminate Slurry, American Ceramic Society, 1997, vol. 80, pp. 2449-2453.

Y. F. Zhang, Y. H. Li, and Y. Zhang, Phase diagram for the system Na2O–Al2O3–H2O at high

alkali concentration, Journal of Chemical and Engineering Data, 2003, vol. 48, pp. 617–

620.

Page 213: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

210

C. Shaotao, Z. Yifei, and Z. Yi, Preparation of sodium aluminate from the leach liquor of

diasporic bauxite in concentrated NaOH solution, Hydrometallurgy, 2009, vol. 98, pp.

298-303.

Page 214: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

211

SICASE-840

Electrochemical Regeneration of Chloride Contaminated NaY Zeolite

Wastes from Petroleum Refinery

Kavidsara Homchuen*

Department of Environmental Engineering, Chulalongkorn University, Bangkok, Thailand

[email protected]

Orathai Chavalparit

Department of Environmental Engineering,

Chulalongkorn University, Bangkok, Thailand

E-mail address: [email protected]

Rewadee Anuwattana

Environment and Resources Technology Department, Thailand Institute of Scientific and

Technological Research Ministry of Science and Technology Thailand, Thailand

[email protected]

Abstract

The aim of this study was to investigate the chloride desorption efficiency of NaY zeolites

waste from petrochemical factory using an electrochemical cell assembled with a Ti/Pt as

electrodes. Current density, initial pH of water and retention time periods were varied in the

range of 4 to 100 mA/cm2, 5 to 12 and 5 to 30 minutes, respectively. The results showed that

the chloride desorption efficiency could be achieved at pH 10, current density of 20 mA/cm2

and reaction time at 20 minutes. At the optimum condition, the chloride remove efficiency was

higher than 71% and chloride residual in regenerated zeolite was equal to 7.03 mg chloride/g

zeolite. The structure of regenerated NaY zeolites analyzed by XRD technique was closely to

commercial NaY zeolites. It was observed, the surface area and pore volume of the regenerated

NaY zeolites were increased compared to the NaY zeolite wastes. Therefore, it can be

concluded that NaY zeolites contaminated with chloride can be regenerated by using an

electrochemical process.

Keywords: NaY zeolite, Electrochemical Process, Hydrogen Chloride

1. Introduction

Petroleum refineries in Thailand have grown continually. Industrial wastes from this industry

are consisting of solid wastes those contained heavy most metal and oil contamination which

considered as hazardous waste; and it is difficult to manage [1, 2]. The NaY zeolite is used for

remove hydrogenchloride from hydrogen stream in gas separation unit of petroleum refineray

Page 215: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

212

process such as Dichloromethane (CH2Cl2), tetrachloroethylene (C2Cl3H) and chlorobenzene

(C6H5Cl) [4, 5]. The reaction of organochloride conversion to ethane, benzene, methane and

hydrogen chloride, produced according to the reactions:

C2Cl3H + 4H2 → C2H6 + 3HCl (1)

C6H5Cl + H2 → C6H6 + HCl (2)

CH2Cl2 + 2H2 → CH4 + 2HCl (3)

These hydrogen chloride gases must be removed by NaY zeolite before treatment to prevent

corrosion and fouling. Corrosion is caused by hydrogen chloride (HCl) and some of hydrogen

chloride gases combine with ammonia to form ammonium chloride salt (NH4Cl), which causes

fouling in the process. Thus, spent NaY zeolite is generated in refinery. Spent NaY zeolite is

generated after adsorb organochlorides and hydrogen chloride gases [3].

Generally, most of wastes generated in refinery plant can be reused and recycled; however,

some waste types still disposed of in landfill, especially, spent NaY zeolite. In Thailand, Spent

NaY Zeolite from petroleum refinery is disposed in landfill because landfill is simple and

cost-effective method. However, this method has shown some disadvantages such as loss of

land use and high risk of groundwater contamination. Normally, spent zeolite is regenerated by

ion-exchange [6], ultraviolet (UV) photolysis [7], oxidation with ozone [8], and microwave

assisted regeneration [9]

Recently, electrochemical process can be applied for desalination of various materials such as:

concrete, sandstones, granite and tile [10]. Electrodialysis for chloride removal from the

chemical recovery cycle of a Kraft pulp mill was also study. The result showed that chloride

removal efficiency was higher than 60% [11]. The electrochemical removal of chlorides from

reinforced concrete in Switzerland, it studied to obtain information on the efficiency of

electrochemical chloride removal as a restoration technique for chloride contaminated concrete

was presented. It is shown that about 50% of the initial chloride content is removed within 8

weeks [12]

The aim of this study is to investigate the using of electrochemical process to remove hydrogen

chloride from spent NaY zeolite. The operation parameters were varied to find the optimum

condition such as: initial of current density, reaction time and initial pH. The chemical structure

of regenerated NaY zeolite was determined compared to pure zeolite in order to reuse and

recycle as adsorbent.

Page 216: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

213

2. Materials and Method

2.1 NaY Zeolite Waste

The NaY zeolite was used for remove hydrogenchloride from hydrogen stream in gas

separation unit of petroleum refinery process. Spent NaY zeolite was disposal for landfill

method since it is non-hazardous. It was consistent with the result from Leachate solution by

inductively couple plasma-optical emission spectrometer (ICP-OES), It showed that heavy

metal content in zeolite waste is not more than Soluble Threshold Limit Concentration (STLC)

regulatory limits (Table I). The chemical composition of commercial zeolite and spent

contaminated zeolite using X-ray fluorescence (XRF). The result was represented in Table II.

2.2 Electrochemical Set-Up

Electrochemical batch reactor was conducted in a 50 cm3 (5 cm x 1 cm x 10 cm). A schematic

diagram of the experimental setup is shown in Fig. 1. The Ti/Pt electrodes with flat and

rectangular shapes were placed in parallel with a separation distance of 1 cm. The electrode

gap was kept constant in all experiment. The surface area of Ti/Pt electrodes was 25 cm2 (5 cm

x 5 cm). The NaY zeolite was put in space between Ti/Pt electrodes. The reactor was

connected in parallel to a digital DC power supply. A direct current was imposed by a

stabilized DC power supply (Maximum of voltage 60 V and current 5 A). All experiment was

conducted at the room temperature of 28oC.

Page 217: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

214

2.3 Methods

These researches of various parameters were the levels of current density, initial pH levels and

retention time periods. The parameters were obtained the optimal desorption conditions. The

levels of current density were varied 4 to 100 mA/cm2. The initial pH of water was varied from

5 to 12 and retention time periods were tested for 5 to 30 min. The remaining solution and

spent zeolite were analyzed to determine chloride concentration according to EPA Method

300.0(A) (Ion Chromatography: IC) [13].

2.4 Analytical Method

Chloride content was measured using a Dionex™ ion chromatograph (IC). The chemical

composition of commercial zeolite and spent contaminated zeolite were analyzed by X-ray

fluorescence (XRF), PW2400 model. The heavy metal content in leachate solution was

analyzed by inductively couple plasma-optical emission spectrometer (ICP-OES, Perkin Elmer

plasma-1000). The solids were taken for phase analysis by X-ray diffraction (XRD, D8

Discover Bruker). The morphology was analyzed by Scanning Electron Microscopy (SEM,

JEOL-5800LV). The surface area, pore size and pore volume were analyzed by BET (ASAP

2020).

3. Results

3.1 Effect of Current Density

It is known that the current density can affect the chloride desorption, which in turn affects the

desorption efficiency. Ti/Pt was selected as electrodes, for the experiments to examine the

effect of current density. It was varied from 4 to 100 mA/cm2. The initial pH of 8.06 and

reaction time of 30 minutes were maintained constant. Result shown that the chloride residual

in regenerated zeolite decrease when the electrical resistance decrease. The lowest of electrical

resistance was obtained at current density 20 mA/cm2

(as shown in Fig. 2). This result was

Page 218: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

215

consistent with the Fig.3: it had shown the variation of the chloride removal efficiency as a

function of the current density. The highest efficiency of removal was achieved by applying the

current density 20 mA/cm2. The chloride desorption was occurred to 76.2%.

3.2 Optimum Initial pH of Water

To determine the effect of initial pH on the desorption efficiency of chloride were examined

using water with initial pH values of 5 to 12. Since pH of the water was alkaline (pH 8.06), it

was adjusted to desired pH using H2SO4 and NaOH. In each batch experiment, the applied

current density and reaction time were set constant at 20 mA/cm2 and 30 minutes. Result

shown that the efficiency of chloride desorption increase when the initial pH of water decrease.

The maximum chloride desorption efficiency was 79.2% at the pH-adjusted acidic water (pH

5). The chloride residual in regenerated zeolite as pH value at 5 was 5.19 mg chloride/g zeolite

as shown in Fig. 4. Moreover, the efficiency of chloride removal as pH 8.06, 10 and 12 were

removed by 73.8%, 71.9% and 69.4%, respectively. Chloride residual in regenerated zeolite as

pH value at 8.06, 10 and 12 were occurred to 6.55, 7.03 and 7.64 mg chloride/g zeolite,

respectively.

Page 219: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

216

3.3 Effect of Retention Time

As seen in Fig. 5, the efficiency of chloride removal raised with an increase of the reaction time

period. The applied current density 20 mA/cm2 and initial pH of water value at 5 produced the

faster removal rate for chloride within 15 minutes. The efficiency of chloride desorption at the

retention time as 15 minutes was 78.6%. Furthermore, chloride residual in regenerated zeolite

was occurred to 5.58 mg chloride/mg zeolite.

3.4 Characterization of Regenerated NaY Zeolite

From the previous experimental, pH-adjusted acidic water (pH 5) was shown the best condition

for chloride desorption. However, as shown in Table II, the result of characteristics of

regenerated zeolite by XRF analysis indicated that the structure of zeolite was changed when

used sulfuric acid as pH-adjusted acidic water. The structure of zeolite was destroyed, silica

and alumina composition were reduced. Due to acidification in water and sulfide ion from

sulfuric acid solution, compositions in zeolite were leached. Moreover, after regeneration,

sulfide ion was adsorbed on zeolite reached to 2.07%.

Page 220: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

217

This result was consistent with the Table II, the area-volume-pore size of zeolite by BET

analysis pointed that the pore volume of zeolite (pH 5) had pore volume minimum because

sulfides blocked pore size of zeolite.

As shown in Fig. 6, all of electrochemical regenerated zeolites had crystalline phase, except pH

value at 5 because outer surface has destroyed whereas inner surface was still same when used

sulfuric acid as chemicals used for pH-adjusted water [14].

Page 221: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

218

The result of XRD represents in Figure 7. All condition gave the same result. The structure of

spent zeolite is crystalline phase composition. Nonetheless, the structure of spent zeolite

regenerated by electrochemical with the alkaline water as electrolyte is most likely pure zeolite

which is consistent the case of the zeolite treated with sodium hydroxide solution, the proceeds

in a more complete conformation and produces better crystallinity [15].

Because the chloride ions were transported out of the zeolite and into the electrolyte (5)

therefore, the chloride ions in the NaY zeolite are significantly reduced. Thus, the hydroxyl

ions are generated which produced a high pH in water (8). Reaction (6) and (8) showed that

bubbles from the gases will be seen near both electrodes.

Anode (oxidation):

2 Cl− → Cl2 (g) + 2 e

− (5)

2 H2O (l) → O2 (g) + 4H+

(aq) + 4 e− (6)

Cathode (reduction):

2 Na+

(l) + 2 e− → 2 Na (l) (7)

Page 222: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

219

2 H2O (g) + 2 e−

→ H2 (g) + 2 OH−

(aq) (8)

Na content in zeolite affected the absorption potential and structure of NaY zeolite (Al-ONa-Si)

because of the amounts of Na+ (NaOH) species [16]. Therefore, the mechanism is reversible

when use NaOH as chemical used for pH adjustment due to the Na was exchanged in process.

This result was made clear by Table II, the amount of Na2O and pore volume are increased

after regeneration and higher than in spent NaY zeolite [17]. It should be suggested that

alkaline water is suitable electrolyte for chloride desorption from chloride contaminated zeolite

in refinery plant, its structure was similar to the commercial grade.

4. Conclusions

Electrochemical process is an efficient method for chloride removal of NaY zeolite

regeneration. Results from testing on the three sets of electrodes show that optimum condition

can be achieved using Ti/Pt electrodes with current density of 20 mA/cm2 and the initial pH

value of 10 at retention time of 20 minutes. The efficiency of chloride desorption was 71% and

chloride residual in regenerated zeolite was 7.03 mg chloride/g zeolite. The surface area of

regenerated zeolite was 431.3 m2/g. Consequently, it can be concluded that electrochemical

process is an alternative option for regeneration of NaY zeolite wastes which can be recycle as

absorbent for polluted in gas stream or wastewater. Moreover, the regeneration process has

shown several advantages such as reduction of waste disposal by landfilling.

Acknowledgements

This paper was financially supported by the 90th

anniversary of chulalongkorn university fund

(Ratchadaphiseksomphot Endowment Fund), Thailand and the Ratchadaphiseksomphot

Endowment Fund 2015 of Chulalongkorn University (WCU-58-020-CC )

References

[1] Usapein P, Chavalparit O. “Development of sustainable waste management toward zero

landfill waste for the petrochemical industry in Thailand using a comprehensive 3R

methodology: a case study,” Waste Manag Res 32(6), 2014, pp. 509–518.

[2] Usapein P.,Chavalparit O. Evaluating the performance of 3R options to reduce landfill wastes

using the 3R indicator (3RI): case study of polyethylene factories in Thailand. J Mater Cycles

Waste Manag, 2014, DOI 10.1007/s10163-014-0336-9.

[3] Erfan M. Chloride removal in refineries: A review of catalytic removal of chlorides from

refinery streams and a critique of current analytical techniques for estimating chloride content.

Unicat Catalyst Technologies. Available at: http://www. digitalrefining.com/data/articles

/file/433058853.pdf,2014

Page 223: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

220

[4] Lo´pez E., Ordo´n˜ez S., and Dı´ez F. “Deactivation of a Pd/Al2O3 catalyst used in

hydrodechlorination reactions: Influence of the nature of organochlorinated compound and

hydrogen chloride, Applied Catalysis B: Environmental 62, 2006, pp 57–65.

[5] Pinard L., Magnoux P., AyraulP. T and Guisnet M. Oxidation of chlorinated hydrocarbons over

zeolite catalysts 2. Comparative study of dichloromethane transformation over NaX and NaY

zeolites, Journal of Catalysis, Vol 221, Issue 2, 2004, pp. 662–665.

[6] Rahmani A., Samadi M., and Ehsani H. Investigation of clinoptilolite natural zeolite

regeneration by air stripping followed by ion exchange for removal of ammonium from aqueous

solutions. Iran. J. Environ. Health. Sci. Eng. 6, 2009, pp. 167-172.

[7] Singh, S. Regenerating Spent Zeolites with UV and UV/H2O2 To Enhance Removal of

Endocrine Disrupting Compounds. Environmental & Water Resources Engineering Masters

Projects, 2010, Paper 38.

[8] Alejandro S., Valdés H., and Manéro M. Oxidative regeneration of toluene-saturated natural

zeolite by gaseous ozone: the influence of zeolite chemical surface characteristics. J

Hazard Mater, 2014, pp. 212-274

[9] Eduard S. and Călinescu I. Microwave assisted regeneration of 3å molecular sieves used for

ethanol dehydration. U.P.B. Sci. Bull. 76, 2014, pp. 96-106

[10] L.M. Ottosen, C.D. Ferreira, I.V. Christensen, Electrokinetic desalination of glazed ceramic

tiles, J. Appl. Electrochem. 40 ,2010, 1161–1171.

[11]Rapp H.and Pfromm P. Electrodialysis for chloride removal from the chemical recovery

cycle of a Kraft pulp mill, Journal of Membrane Science 146, 1998, pp. 249-261.

[12]Elsener B., Molina M., and Böhni H. The electrochemical removal of chlorides from

reinforced concrete, Advances in Corrosion and Protection 35, 1993, pp. 1563–1565.

[13]JohnD.Pfaff.1993.EPA300; Determination of inorganic anions by ion chromatography.

Environmental monitoring systems laboratory office of research and development U.S.

Environmental Protection Agency. Cincinnati., Ohio

[14] Salamatinia, Zuhairi and Kamaruddin. “Regeneration and reuse of spent NaOH-treated oil

palm frond for copper and zinc removal from wastewater,” Chemical Engineering Journal.

156, 2010, pp. 141–145.

[15] Eckehart R., Peter K., Akos K. and Frank H. 1993. Method of preparing zeolite Y. US 5223240

A.

[16] Piwgaew W., Grisdanurak N., and Kumsaen T. “Modified zeolite NaY for HCl gas trapping

from natural gas feed,” The 4 KKUU international engineering conference, 2012.

[17] Pinard L., Mijoin P., Magnoux P.,and Guisnet M. “Oxidation of chlorinated hydrocarbons over

Pt zeolite catalysts 1-mechanism of dichloromethane transformation over PtNaY catalysts,”

Journal of Catalysis 215, 2003, pp. 234–244.

Page 224: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

221

SICBENS-1326

Environmental Hazards of Radioactive Radiation from Granite Building

Stones through a Look into Burien’s Granite Mass in Isfahan

Siyamak Bagheriyan

faculty member of Islamic Azad University, Tiran Branch

Siyamak. bagheriyan@ gmail.com

Abstract

Used for main works of structures are building stones including rubble, malone and face stones

with metamorphic, sedimentary and igneous base. The mine groups of non-carbonate and hard

stones such as granite, gabbro, gneiss and hornfels often considered as igneous or metamorphic

rocks are available as granite in the market; however, lithologically they fall under other stone

types. In recent years, regardless of its hazards and environmental shortcomings supply and

demand have increased for these stone types. Because of their chemical composition and ore-

oriented texture, they send out radioactive radiations. Accordingly, WHO (World Health

Organization) is currently compiling some instructions regarding the proper use of these stones

in structural industry. On the other hand, it is possible that people develop diseases such as

silicosis due to high amount silica in these stones. This research focused on the processing and

using these stone through a look into Buien- Miyandasht`s granite mass in Isfahan province.

Key words: building stones, granite, environmental, disease, Isfahan, Buien`s mass

1. Introduction

Man`s use of building, decorative and face stones dates back to the ancient times, when they

utilized them in accordance with their needs and capabilities to process the stones. In doing so

Persians were fabulously talented. They would manage to use the stones of sedimentary,

igneous and metamorphic origin both situationally and locally. Bringing granite stones to work

in Mashhad and Hamedan enjoys an old background. Recently, particularly after Islamic

Republic Revolution, the country has explored, extracted and processed huge masses of granite

at hand. Henceforth, especially during 70s of solar calendar plenty of factories have applied

changes in the manufacturing systems and processed these decorative stones. Although the

granite stones are of greater strength and beauty when compared with other decoratives such as

carbonate rocks (travertine, porcelain), the environmental issues and hazards have

unfortunately been overlooked while processing. These stones contain the greatest amounts of

radioactive elements and heavy metals. They are much more dangerous than any other stones

particularly when used inside the buildings. On the other hand, the immense masses of

granitoid in the country offers a subtle perspective on discovering magmatic decorative stones.

As a result, environmental issues have to be taken into fine considerations.

Page 225: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

222

2. Discussion

2.1 Building, decorative and face stone types

Building and decorative stones cover a variety of igneous, metamorphic and sedimentary

stones, each of which are affluently subdivided into categories. Recently, they have been

marketed under special trademarks and the scientific titles have been put aside.

Igneous rocks: the stones of this group come from huge rocks which are themselves either

external or internal. Another ranking for these stones is their degree of acidity on the basis of

chemical composition and silica (Sio2) in particular, which are acid, moderate, alkali and

ultra alkali igneous rocks. They differ in beauty, color and texture. Table l illustrates various

types of these stones.

Table 1: Different igneous stone types used as material and face stone in construction

Major class

Minor class

Name

Site in Iran

Internal igneous

rocks

acid

Granodiorite

Hamedan

Granite, Astaneh

Granodiorite

moderate

Synite, Tonalite

West of Khomein

alkali

gabbro

Kerman,

Uroumia

ultra alkali

Dunite, pyroxenite,

Harzborgyte

Esfandiyeh of

Kerman, Birjand

External igneous

rocks

acid

Rhyolite

West Azarbaijan,

Damavand

moderate

Andesite

Yazd

alkali

Basalt

Torbat-e-Jam

Destructive

igneous

Echo, lava

Agglomerate,Echo,Lapilli

Ghazvin, North

of Karaj

Metamorphic rocks: This group includes different stones of adjacent, regional and burial

metamorphic stones with igneous, sedimentary and metamorphic origin. Used as decorative,

building and face stones, the stones of this group are classified as carbonate and non-

carbonate.

Page 226: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

223

Table2: Different metamorphic stones used as material and face stone in construction

Sedimentary rocks: These make the biggest class of decorative, building and face stones.

Compared with other types of igneous rocks, the carbonate ones are more popular in use since

they exist in great amounts, are soft and easy to process.

Sedimentary rocks are two types: destructive and chemical. Table 3 illustrates a commercial-

based classification.

Major class

Name

Description

Site in Iran

Carbonate

Pearl

They are known as

porcelain and crystal in

the market.

Azna and Aligoudarz`s

porcelain

Non- carbonate

Hornfles

They are known as

black granite in the

market.

Touiserkan of

Hamedan

Amphobolite

Dark green stones

known as green granite.

Birjand

Gneiss

The stones are so

similar to granite.

Yazd

Page 227: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

224

Table3: A commercial- based classification of sedimentary rocks

2.2. Magmatic building stones of Iran

Huge supplies of magmatic (igneous) stones in Iran has now made it possible to discover,

extract and process different types of igneous stones (often commercially called granite). The

growth of industry in the country, development of stone industries and possibility of cutting

hard stones (stones much harder than steel) in particular allows an increase in processing hard

igneous stones. Naturally, along with the demand for modern industries and simultaneous

development in building industries and other related industries, the demand for exploring these

supplies has gone up. Consequently, the number of explosion permits shows a considerable

growth from 3 in 1993 to 40 in 2012 in Lorestan province. From among explored igneous rocks

in the country, which are now being processed, we can refer to granite (granite from

Hamadan`s Ganjnameh), granodiorite (Masouleh mine), serpentine (Mashhad mine), echo

(Northen Qazvin), basalt (Torbat-e-Jam), synite (Khorramdarreh), tonalite (Eastern khomein),

gabbro (Torbat-e-Heydarriyeh, Uroumia), andesite (Yazd), pyroxenite and amphiolite

(Birjand).

Major class

Name

Commercial

name

Description

Site in Iran

Carbonate

Limestone

Pearls various

colors

They come in

beige, white, light,

green, back and

red.

Gohareh of

Khorramabad,

Deh Bid of

Shiraz

Travertine

Travertine

They are of

different colors.

Mahallat

Annix Pearl

pearl

It has borders.

Yazd and

Kerman

Destructive

Conglomera

Color granite

Rarely used as face

stone.

Shahr-e-Kord

Sandstone

Red, black

granite

Mainly used as

Malone stone.

Alborz

Mounts, esp.

North of

Tehran

Page 228: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

225

2.3. Acid igneous stones (Granite, Granodiorite)

Igneous masses situated in Sanandaj- Sirjan zone in the west of Iran are more or less seen in

intruding forms of oval and chain-like masses in a metamorphic line alongside northwest and

southeast Uroumia- Golpaygan provinces. According to Aghanabati (1993), the life span of

these intruding masses dates back to middle Jurassic, for on one hand these masses have cut

into Jurassic deposits and on the other hand lower cretaceous deposits sit over them with a

gradient of igneous- base. Sabzeh`ei(1997), clamis metamorphic zone complex around

Hamedan, Malayer, Broujerd, Aligoudarz, Bouien- Miyandasht granite masses like the

Southern Sanandaj-Sirjan zone are indicative of complexes generated during orogenisis. As a

result of laramid orogenisis some considerable intruding masses like Mahabad, Qorveh, Alvand,

Malayer, Arak, Broujerd- Aligoudarz, Golpaygan, Bouien- Miyandasht granite sites have been

started all with a main oval orientation parallel to one another and ultimately to Zagros

drift( Radfar, 1995). There are granitoid , pegmatitic veins containing granite and granodiorite

compositions.

2.4. Intruding masses of Bouien- Miyandasht

Granitoid masses of Sanandaj- Sirjan zone have intruded into southwest of Aligoudarz in

Bouien- Miyandasht region inside the Jurassic sandstones and shale. Most of these igneous

stones have been composed of middle- sized granule granite- biotite and granodiorite that get

porphyritic in some places and have been cut into by aplite veins. Tileh et al (1968) have

estimated the life span of these igneous masses, like the intruding ones of Hamedan and

Brujerd, back to late Triassic and early Cretaceous. However, regarding definite age of Alvand

mass in Hamedan, this mass possibly belongs to late Cretaceous i.e. Paleocene (Bloun & Broud,

1975). Based on studies, and dating though radiometry, Valizadeh (1978) claims) the granite

mass of Hamedan to be of about 70 million years old. Soheili et al believe that the intrusion of

granitoid masses into destructive metamorphic deposits and upper Triassic- lower Jurassic has

led into formation of adjacent metamorphic stones around itself with mineralogy including

srycite + chlorite + biotite + epidote + quartz + scapolite + calcite + feldspar + (albite- epidote

– hornfles) facies.

The main texture of granitoid stones of Bouien- Miyandasht are mainly granular and tend to be

tiny on marginal regions and coarse on center. In order of affluence, the major constructing

ores of these stones are quartz, alkaline feldspar, and minor ores of biotite, amphibole and

tourmaline, respectively. Rare ores include apatite, zircon, and decomposed ores like mica, clay,

chlorite, epidote, and eventually calcite. From mineralogical point of view these are considered

to be either granite or granodiorite. These masses have various compositions of light granite

and are poor in ores of iron, magnesium and dark granodiorite, rich in ores of hornblende and

biotite. Granules range from 2 to 6 millimeters in size and at times feldspar seems to be coarser.

Erosion, mechanical and chemical decomposition are evident especially along the fractures.

Petrological and petrographic studies show igneous rocks of granite mass of Bouien tend to sit

at the granitoid of S class zone. To firm this we can mineralogically refer to the presence of

Page 229: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

226

ilmenite and andalusite crystals, basic biotite and masscovite, the absence of hornblende. These

granodiorite messes of S class contain high degrees of radioactive.

2.5. Granite rocks of Bouien region and radioactive

Of rocks, acid igneous rocks are high in radioactive. Due to their ionic radius and high ionic

charge, uranium, thorium and strontium are condensed inside these stones. The affluence rate

of uranium is illustrated in table 4 and that of ores in 5. As such xenotime, zircon and monazite

contain maximum amount of uranium and olivine minimum amount, and they are found in acid

igneous rocks and moderate alkaline ones.

Table 4: Uranium rate in major rocks and ores (gram each tone) (Clark and others, 1966, Nash

and others 1987)

Name Average uranium

rate gram per tone

Name Average uranium

rate gram per tone

Donate

0/02

Granodiorite

2/6

Echologite

0/2

Granite

4

Pyroxenite

0/7

Organic shale

10

Gabbro

0/9

Red shale

3

Diorite

2

Sandstone

1

Carbonates

2

Evaporative

0/1

Page 230: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

227

Table 5: Uranium rate in silicate ores (Clark and others, 1966, Rogers, and Adams, 1967).

Ore

Uranium rate g/t

Ore

Uranium rate

g/t

Quartz

0/1-10

Monazite

500-3000

Feldspar

0/1-10

Titanite

10-700

Masscovite

2-8

Epidote

20-200

Biotite

1-60

Allanite

30-1000

Hornblende

0/2-6

Apatite

5-150

Pyroxene

0/01-50

Garnet

6-30

Olivine

0/05

Ilmenite

1-50

Xenotime

300-35000

magnetite

1-30

Zircon

100-6000

Biotite: About 5 to 20 percent of granitoid mass stones of Bouein- miyandasht are made up of

biotite. They turn to be brown when exposed to light and olive green at times. Also, it is

capable of making spectrum of different colors. The ore is usually shape less; however, it may

seem to have a form, sometimes. There can be seen faces along with its longitudinal cut.

Biotites have turned into curved forms due to tectonic pressures. Among heavy loads of zircon

with paleocroic trace, rutile, titanite and dark ores can be observed as well. These crystal are

strongly chlorite and retain their basic from. Chlorite is often gained from penitite

decomposition. While decomposing, biotites get filamentous.

Masscovite intrusion is occasionally observed and Piranjo (1992) relates this to a potash

metasomatism phase particularly if it accompanies plagioclases` alteration. The radioactive

Page 231: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

228

(uranium) rate of these ores was microprobically analyzed. Table6 illustrates it. (Ahmadi khalaj,

2011).

Table 6: microprobic analysis of biotite, a granodiorite sample from granodiorite masses of

Sanandaj- Sirjan zone (adapted from Ahmadi khalaj, 2011)

Grd Grd Grd Grd Grd Grd نمونو سنگ

Grt Grt Grt Bit Bit Bit کانی

Pint

Namber

#1 #2 #8 #1 #2 #8

Sio2 86/36 65/36 16/37 Sio2 25/34 55/34 61/34

Ai2o3 46/21 43/21 42/21 Ai2o3 87/18 7/18 63/18

Mgo 92/1 9/2 75/2 Mgo 88/7 45/7 48/7

Feo 32/31 84/33 94/33 Feo 65/23 2/23 23/23

Tio2 83/8 1/8 89/3 Tio2 34/2 2 92/1

Mno 39/8 72/4 84/4 Mno 18/8 23/8 21/8

Cao 24/1 14/1 17/1 Cao 8 85/8 82/8

Na2o 83/8 82/8 81/8 Na2o 19/8 22/8 15/8

K2o 8 81/8 8 K2o 57/8 49/8 49/8

Cr2o3 81/8 86/8 87/8 Cr2o3 83/8 86/8 83/8

Nio 8 8 - Nio 83/8 82/8 8

Total 27/181 88/188 44/181 Total 2/95 97/94 78/94

Si 96/2 95/2 97/2 Si 66/2 68/2 69/2

Ai 83/2 83/2 82/2 AIIV 34/1 32/1 31/1

Mg 23/8 35/8 33/8 ∑ 4 4 4

Fe 11/2 27/2 27/2 AIVI 39/8 4/8 4/8

Ti 8 81/8 81/8 Mg 82/8 86/8 87/8

Mn 57/8 32/8 33/8 Fe 54/1 51/1 51/1

Ca 11/8 1/8 1/8 Ti 14/8 12/8 11/8

Na 8 8 8 Mn 14/8 12/8 81/8

K 8 8 8 Ca 8 8 8

Cr 8 8 8 Cr 8 8 8

Ni ∑ 9/2 9/2 91/2

Total 82/8 83/8 82/8 Na 83/8 83/8 82/8

K 85/8 84/8 84/8

TOT 78/7 78/7 77/7

Page 232: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

229

Zircon: With specific crystal and optical features, like remarkability and antireflexion, this ore

exists in great loads in granitoid rocks of the zone. It is rarely found on its own but mainly in

biotites. A few of them can also be found in quartz and feldspar. This ore produces a strong

paleocroic circle around itself since it contains radioactive (including uranium, thorium). This

process is mainly evident at thin layers and it called metamictization; crystals surrounding

zircon ore. This is seen as burns in biotites of Bouien- Miyandasht. Furthermore, black and

brown spots are sometimes seen inside biotites.

Apatite: Apatite ores do not exist much in granitoid rocks of this zone. Besides, they are often

as pinnacle crystals and a little shapely in from inside the ores. Quartz and feldspar crystal are

common places where apatite often sits. Sometimes, dark spots are observed over them.

2.6. Economical investigation of granite building stones of Bouien- Miyandsht

The presence of hung granitoid masses offers a suitable perspective to explore magmatic

decorative stones all over the zone. Since physical characteristics of ores or the ore types range

in properties, using these stones is greatly limited. Their polishability totally depends on the

texture of ore type and this in turn is followed by factors such as magmatic composition,

density, cooling rate and environmental composure. In addition, the quality is unquestionably

related to dating factor. The greater age, the greater alteration and erosion and the more limited

use of ores. These stones are affected by tectonic actions and get factures. Then, masscovite,

sericite and iron oxide fill the fractures. (Ghasemi 1993). Differences in ore hardness, severe

alteration with inappropriate granulation, gaps and close fractures, low-grade color and form

and existence of xenoliths are all considered to be of remarkable factors disqualifying these

stones. They differ in quality on a scale of darkness, brightness and granule size. The west zone

of mass is of greater quality. Consequently, exploratory operations are mostly being offered for

these zones.

2.7. Building stones and their radioactive radiation effects on environment

Acid igneous rocks contain the highest amount of radioactives because of their chemical

composition and mineralogical texture. These materials that are mainly condensed into biotite

and zircon ores of these stones ore capable of high degrees of radioactive radiation. Biotite rate

of Bouien zone stones is about 5-20 percent. Sometimes, biotite in the form of xenolith makes

the stone get dark spots. Also, these radio actives may concentrate in zircon, apatite, and

ilmenite of these stones and they get high at times and visible at microscopic sections. High

rates of radioactives in granite stones has persuaded World Health Organization (WHO) to

decide on codification of instructions which encourage proper use of these stones in

construction industry (Aliyev and Zolotovitskaya, 2005). The research carried on construction

materials by Aliyev and zolotovitskaya in Azerbaijan indicates high rates of radioactives in

materials freely used in the kitchens and bedrooms. Recent studies are even indicative of

significant amounts of radium. Therefore, acidic igneous rocks (granites and granodiorites),

which contain zircon and biotite, are not proper to be used inside buildings for they send out

Page 233: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

230

and radiate radon gas. A thorough investigation needs to be done from sanitary point of view in

as much as all construction materials are composed of ores and stones; an issue which

unfortunately has not yet been regarded. Nonetheless, many people and even business owners

are not still fully aware of the dangers and since there is little epidemiological evidence, no

clear regulations on construction industry have been predicted. Some right notifications on

building contamination and in particular radioactive radiation must be supplied. However, the

construction materials with granite structure are seriously hazardous if used in public places

particularly apartments. And the society knows almost nothing of this.

2.8. Uranium in granite rocks

Human body does not need uranium and chemically it has no poisonous effects on living

creatures (especially humans). The major hazards of this element relate to its radiation and the

most important effect of uranium on human body is developing different types of cancer.

Floating particles of radioactive are taken into human body through breathing. Uranium decay

produces the hazardous and cancerous radon gas, which can evaporate from uranium inside

granite rocks and if breathed, it can be fatal. After being released, radon starts to produce other

radioisotopes which are sucked by flouting particles in the air, eventually taken into lungs

through breathing and this causes cancer or other lung- related diseases (Shahab pour, 2008).

From among other products developed under uranium decay we can refer to thorium

radioactive and plutonium, each of which can have adverse effects on human body. The

primary side effects of exposure to uranium radiation are nausea, exhaustion and depression,

serious skin burn, ague and chronic harms of these radiations can be damages to different body

organs, genetic mutations ( such as children`s retardation) and cancer. There is some thorium in

biotite and zircon which is hazardous on both living things and ernvironment. Regardless of its

radiative dangers, it has no chemical toxins. Thorium`s effects and its radioactivity is the same

as other radioactive elements like uranium. Uranium Clark within granitoid rocks is higher and

under exogenous conditions tetratomic uranium turns into hex atomic one due to its instability.

When exposed to air, U3 O8 changes into uranyl ions (UO2 +2

) which are the most mobile

uranium compositions. Radioactive radiates in the forms of alpha, beta and gamma, each of

which affects human body differently. Some elements of radioactive such as radium and

thorium act like calcium and therefore, when absorbed by human body, they immediately

aggregate in the bones and start doing a damage to body (Dabiri, 2001)

Page 234: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

231

Table 7: The results from chemical analysis of different granitoid samples in Bouien

B-M-1 B-M-2 B-M-3 B-M-4 B-M-5 B-M-6 B-M-7

Sio2 72.81 71.42 70.24 70.54 68.1 69.98 65.1

Ai2o3 13.20 11.95 14.21 13.56 15.19 16.02 17.98

Fe2O3 1.60 1.46 1.61 2.5 1.92 1.01 3.2

FeO 0.59 1.25 1.48 1.95 1.16 1.1 0.72

MgO 0.59 0.32 0.87 0.65 0.27 0.25 0.69

MnO 0.04 0.03 0.02 0.11 0.06 0.03 0.02

CaO 1.22 1.92 1.95 0.21 0.98 1.56 1.21

Na2O 2.51 3.01 3.50 2.54 3.87 3.14 3.68

K2O 4.20 3.99 4.20 3.57 4.01 4.02 3.89

P2O5 0.15 0.16 0.15 0.19 0.18 0.12 0.18

L.O.I 0.80 1.45 0.69 1.22 0.01 0.74 0.78

TOTAL 99.31 97.94 98.89 97.98 97.31 98.99 97.91

Table 8: Modal analysis of granitoid ores in Bouein

B-M-1 B-M-2 B-M-3 B-M-4 B-M-5 B-M-6 B-M-7 شماره کانیها

Q 51.1 39.8 42.9 40.1 45.3 37.1 33.2

Plg 21.2 27.1 27.9 30.4 20.8 40.2 31.9

Ort 17.5 26.1 16.7 27.9 10.9 14.2 21.9

Bio 5.9 3.1 7.9 1.1 18.9 51.1 9.2

Musc 0.5 - 0.1 - 1.3 - -

Turm - 2.1 3.0 0.2 2.1 - -

Opaq - 0.1 0.3 0.2 - 0.3 0.5

3. Conclusion

Huge masses of granite in the country like Sanandaj- Sirjan zone (e.g. Bouien- Miyandsht) has

offered opportunities to explore and process these supplies to be used as building and face

stones. These stones are granite and granodite that contain ores such as quartz, feldspar, biotite,

zircon and apatite. Radioactive rate and uranium rate in particular is high in acid igneous rocks

which is mainly located inside biotite and zircon ores. Accordingly, utilizing these granite

stones as construction materials especially inside apartments and kitchens increases the

radioactive radiation danger. From a microprobic analysis perspective on biotites and high

uranium rate, there seemingly is a great need to study radioactive contamination efficiently.

Page 235: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

232

References

[1] Aliyev, Ch. S. (2005) Variation of subsoil radon concentration during earthquais

International workshop for : Recent GAEODYNAMICS, Georisk and sustainable

Developme in the Black save sea fo Caspian sea region, 3-6 july, baku.

[2] Aliyev, Ch. S., Zolotovitskaya, T.a. (2005) Rdiation safety of building materil

Azerbaijan , p459-461.

[3] Aliyev, F. S., Mammadova, M.A., (2005) Geological problems of fresh underground waz

resources in Azervaijan Rep. in the conditions of urbanization and global climate chang

the main sources of water supply of population,JournalScience,Baku State Univers

(BSUJS), No1, pp128-136, (in Azeri)

[4] Anonymous (2005) Silicosis, Learn the fast, National institute for occupational safety are

health (NIOSH), Cincinati, Oh., 20 pp.

[5] Appleton, Donald, J. (2005) Radon in air and water, Essentials of Medical Geolog Elsevier

Academic press, Chap. 10 , p227-262.

[6] Atabey, Eshref, (2005) Medical Geology (TibbiJeoloji), TMMOB jeolojiMuhendishOdasi

Publishers, Anakara, 194pp., (in Turkish)

[7] Bennet, M.R., Doyle, P. (1997) enrironmental geology (Geology and the human

environment), John Wiley & Sons, 512pp.

[8] Derbyshire, Edward (2005) Nturalaerosolic mineral dusts and human health, Essentials of

Medical Geology, Elsevier Acadimic Press, Chap. 18, p459-480

[9] Ghazban, freydoun, (2003), Environmental Geology, 1st print, Tehran university pablitions,

p.416

[10] HajAlilou, Behzad, Vosough, Bhram (2010) Medical geology, Payam-e- Noor University

[11] Konikow, Leonaed, F. and Glyny, Piere, D. (2005) Modeling gtoundwater flow and

quality, Essentials of Medical Geology , Elsevier Acadimic Press, Chap.31, p737-766.

[12] Mahdavi, pedram (2007), Medical Geology, Mine Expoloration and Geology organization

site of Iran

[13] Mehr partou, Leili (2007), cadmimum and Medical Geology, Mine Exploration and

Geology Organization site of Iran

[14] Mine exploration and geology organization of Iran (2007), Radiation from Buildings,

Mine Exploration site

[15] Moller, Lennart (Head editor), (2000) Environmental Medicine, Falth&Hassler AB,

Stodkholm , Swedin, 325pp.

[16] Weinstein, Philip, Cook, Angus (2005) Volcanic emissions and health, Essentials of

MEDICAL Geology, Elsevier Academic Press, Chap. 9, p203-226.

[17] www.medicalgeology.org

Page 236: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

233

Table 7: The results from chemical analysis of different granitoid samples in Bouien

Page 237: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

234

Computer & Information Science II

Session Chair: Seonho Choi

SICASE-723

Decision Supporting System Applicaton in Power Generation Technology Selection

Irwanto Walgito Pawiroijan︱PLN Indonesia

Zainal Arifin︱PLN Indonesia

SICASE-703

A Pilot Study of Real-time Sport Tactic Technique Record, An Example for Badminton

APP Application

Chia-Ping Huang︱Hsing-Wu University

Pai-Feng Lee︱Hsing-Wu University

Cheng-Chung Lu︱Hsing-Wu University

SICASE-759

Optimized Design of Geo-Temporal Query Based User Authentication Scheme for

Smartphones

Seonho Choi︱Bowie State University

Kun Sun︱College of William & Mary

Edward Jung︱Kennesaw State University

2015/6/28 Sunday 13:00-14:30 Room 2

Page 238: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

235

SICASE-723

Decision Supporting System Applicaton in Power Generation Technology

Selection

Irwanto Walgito Pawiroijan

PLN Indonesia, Indonesia

Email address: [email protected]

Zainal Arifin

PLN Indonesia, Indonesia

[email protected]

Abstract

Energy planning is mostly relating to the selection of energy source and power generation

technology to produce the electricity. The focus of this paper is how to select the power

generation technology using logical, scientific, and objective method. A decision supporting

system (DSS) with intelligent algorithm is used to calculate the parameters of each technology.

The parameters are electricity price, quantity of supply, investment cost, construction period,

environmental impact, etc. By calculating these parameters, the DSS will obtain the score of

each technology and display it on a map. This map contains 4 zones which shows different

level of priority; the green zone (first priority), yellow (second priority), orange (third priority)

and red (fourth priority). With the DSS, the selection process will be rigorous and highly valid.

The company can choose the best option of power generation technology regarding to their

purposes based on scientific, logic and objective consideration.

Keyword: Decision Supporting System, DSS, Power Generation, Technology

1. Introduction

Energy planning is one of main concerns of electricity companies to maintain their electricity

supply. Energy planning is mostly relating to the selection of energy source and power

generation technology to produce the electricity. The focus of this paper is how to select the

power generation technology using logical, scientific, and objective method. A decision

supporting system (DSS) is used to calculate the parameters of power generation technologies.

The parameters are electricity price, quantity of supply, investment cost, construction period,

environmental issue, etc. By calculating these parameters, the DSS obtains the score of each

technology. The scores are displayed in a map which helps the management to select the right

technology easily.

Page 239: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

236

2. Main Contents

2.1 Computer Server

The DSS is an interactive web based program which is installed in a computer server. It uses

windows server 2003 for operating system, php for programming code, apache for web server

and mysql for database. The web based program is selected because of its multi user ability and

wide range access through local area network.

2.2 Intelligent Algorithm

An intelligent algorithm is used to calculate the power generation parameters. First, it records

the weight of each parameter according to its impact to electricity system. Second, it records

the value of each parameter. Third, it calculates the parameter score by multiplying the

parameter weight with the value. Finally, it plots the position of each technology in a map

display based on its score.

2.3 Power Generation Parameters

The parameters of power generation technology are divided into 2 axes, which are Impact and

Uncertainty. Each parameter is determined its weight and value. The total weight of the

parameters is 100 and the value of each parameter is between 0 and 10. The details are shown

in Table 1 and Table 2.

Page 240: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

237

2.4 Display Map

Display map is very important to plot the scores of each technology in a graph. It helps the

management to see and choose the best technology to be implemented in the company. The

map display consists of two maps, which are priority map and period map (figure 1 and figure

2).

3. Result

The DSS produces 2 display maps which are showing the position of each power generation

technology. The first map is a priority map which shows the priority level of power generation

technology. It is shown in figure 1. The map consists of 4 zones which shows different level of

priority; the green zone (first priority with high impact and low uncertainty), yellow zone

(second priority with high impact and high uncertainty), orange zone (third priority with low

impact and low uncertainty) and red zone (fourth priority with low impact and high

uncertainty). The management should choose the technology in the first priority because of its

highest benefit to the company.

From figure 1, it is shown that thermal and hydro power plants have big impact and low

uncertainty. The renewable energy such as wind, ocean, fuel cell, and solar cell has low impact

and high uncertainty. Based on this map, the management should choose the thermal and hydro

to produce the electricity.

Page 241: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

238

The second map display is a period map which shows the implementation period of each power

generation technology. It is shown in figure 2. This map consists of 3 period phases with 10

years intervals. The period phases are Phase I (2015-2025), Phase II (2025-2035), and Phase III

(2035-2045). Each phase also consists of different priority of level zones.

From the period map, it is shown that thermal and hydro power plants have big impact. The

renewable energy such as wind, ocean, fuel cell, and solar cell has low impact. Based on this

map, the management should choose the thermal and hydro to produce the electricity and

implement them in phase I.

Page 242: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

239

Priority map and period map have detail information. The management can access it by

clicking the icons on the map. The detail information of each technology will be displayed as

Table 3, 4, 5, 6, and 7.

Page 243: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

240

Page 244: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

241

The total score of impact parameters and uncertainty parameters are used to determine the

technology position in the priority map and period map.

The detail information also consists of a short description about definition of the technology,

how it works, classification, maturity of technology development, projects in the world,

technical analysis, economic analysis, environment impact, list of manufacturer, and reference.

Page 245: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

242

4. Conclusion

The DSS is the best solutions to choose the power generation technology. It helps the

management to make a decision based on scientific, logic and objective consideration with

valid data and information.

References

[1] http://www.dfpni.gov.uk/eag-the-weighting-and-scoring-method

[2] http://www.eia.gov/forecasts/capitalcost/

[3] https://php.net/manual/en/

[4] http://www.appservnetwork.com

Page 246: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

243

SICASE-703

A Pilot Study of Real-time Sport Tactic Technique Record, An Example for

Badminton APP Application

Chia-Ping Huang

Department of Information Management, Hsing-Wu University

[email protected]

Pai-Feng Lee

Department of Wealth Management, Hsing-Wu University

[email protected]

Cheng-Chung Lu

Department of Common Knowledge, Hsing-Wu University

[email protected]

Abstract

Due to rapid improvement and changing of the information technology, it results in the

popularity of the use of smart mobile devices with lots of relevant researches to be conducted.

Therefore much attention has been shown in sports industry to develop APP for realizing the

electronic and mobilized information platform applied for sports record analysis. The early

traditional method of record analysis was done manually which is not efficient and costs a lot

of labor and time. The currently conventional statistical information system is not able to

provide a flexible information platform with the correct and real-time data leading to a more

dominant match record analysis.

In order to compete with their rivals, the players of the Badminton have to regulate their

physical fitness and skills involved during a match. The information obtained through the

videotape record analysis is not accurate and usually cost a lot of labor and time. The main

focus of this research is to develop a real-time, flexible and lightweight badminton tactics

analyzer providing a tool platform for the coaches and players to collect lots of badminton

technical data with rapid match record analysis. A smart mobile device with an APP is aimed

to be built for analyzing the professional badminton scoring patterns, technology utilization

rate, serve and shot position through the nine rectangle-grid record mode.

The badminton tactics analyzer is aimed to provide the real-time data record involved during a

match for the coach, players and scouts. The complete recording and subsequent analysis of the

relevant badminton technical skill utilization rate such as serve, net shot, smash, passing shot,

push shot, attacking clear, kill, drive, drop shot...etc and the scoring patterns such as 'too late to

Page 247: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

244

hit the shuttlecock', out, 'touch the net during a shot', misjudgment are able to be achieved

using the mobile analyzer with a custom-made APP. The results show that different identity

(such as coaches, scouts, players, recorders) can immediately understand the real-time match

record and possible batting tactics analysis using this professional badminton tournament data

recording analyzer with a supporting database display mode. It is verified that the lightweight

mobile analyzer with the required APP has the ability of reducing the complexity of the

originally tedious manual records.

Keywords:badminton、APP、tactics analyzer

1. Introduction and Research Background

Since badminton is a kind of openness sport, in order to compete with their rivals, the players

of the Badminton have to regulate their physical fitness and skills involved during a match. The

player and coach usually analyze the batting skills and tactics through the information obtained

from the videotape record of the match. This analysis can provide the batting strategy, such as

'time-span per shot', 'time-span between two shots' and 'time-consuming per game', for the

players to apply in a match against their rivals. Some important messages of the rivals and

games can also be obtained from the analysis. Theoretically, the intensity involved during the

confrontation between the two rivals is thought to be related to the 'time-span per shot' and

'time-span between two shots'. The energy consumption of the player is assumed to be relevant

to the 'time-consuming per game'. The aforementioned analytic data can be applied directly at

the training courses of all levels of badminton terms in order to increase the training

effectiveness and enhance the player's physical fitness. However, the data obtained through the

videotape record analysis is usually not accurate and cost a lot of labor and time, therefore, this

focus of this study is trying to develop an mobile information platform with the APP to enable

the function of real-time statistical sports record analysis

The innovative objective of this research is to invent a real-time, flexible, lightweight

badminton tactics analyzer which contains a smart mobilized device and an APP used for

analyzing the professional badminton scoring patterns, technology utilization rate, serve and

shot position through the nine rectangle-grid record mode. The analyzer has the ability to

compile a lot of badminton technical information with integrated fast record of match condition

provided for the coach and player to conduct further review and analysis.

2. Literature Survey

Basically, there are different method and technology model to carry out the match record,

tactical classification and advantage-disadvantage analysis for each ball game tournament in

order to meet the professional needs of different ball game. For example, a badminton teaching

and training system developed using Flash by Dr. Wu-Zhou Chen[1].

Page 248: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

245

A visual analysis system applied for the table-tennis ball game was developed by the image

identification technique by Dr. Mao-Chun Yang[2]. A technical and tactical analysis model

applied for the first three shots involved during a table-tennis ball game was developed with the

Visual 2008 by Dr. Ming-Yue Wang[3]. A real-time technical analysis and match record for

the table-tennis ball game was developed using Visual C#.NET by Dr. Yu-Fen Chen[4]. These

research results have shown that the advanced information technology, used for the assistance

in the self-training, match records, compilation of the technical analysis data, is gradually

implemented into different types of sports ball game based on their user requirements. It is

indicated that the traditional manual ball game record mode has been gradually replaced by the

ones developed with E-tools (EXCEL/WORD), information tools (FLASH/ACCESS), web

techniques (Visual 2008/SQL) and M-tool (APP)..etc. Recent important sports ball game

record analysis system developed using adequate information tools are summarized in Table 1.

3. Issues analysis and Research Methodology

Page 249: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

246

According to the aforementioned research results, the speed of sports ball games are so fast that

the time-span between the batting stroke and the return stroke is assumed to be around

milliseconds - several seconds. Therefore, the sports ball game is referred to be a fast-paced,

rapid-response exercise and discipline. Because the flight speed of a badminton ball after being

hit by the racket is normally higher up to around 230-260 km / hr, therefore, it is necessary to

grasp the information obtained through the videotape record analysis in order to master the

rival's game tactics mode during a match. It also requires a lot of ball game records and

analysis in order for statistically analyzing the technical condition of the plays. For

immediately seeking the tactics to beat the rivals, the coach needs the real-time ball game

analysis information. However, for the coaches, players and scouts, it requires quite a lot of

time and professional competence to grasp the statistical analytic information by watching the

ball game videotape record films. Because the understanding of the technical skills and tactics

of the rivals is the tips to be ever-victorious in a match, therefore, a quick, real-time, efficient

badminton tactics analyzer with the APP having the function of ball game record analysis, to

be developed to fulfill the requirement of the coaches, players and scouts, is needed and

currently one of the new trends of the information technology applications for the sports

industry.

Based on the foregoing analysis, the SDLC information system development mode is chosen to

conduct this research for the development of the ubiquitous badminton tactics analyzer. As

soon as the system requirements analysis is determined, the design of the relevant systematic

interface of U-analyzer is then followed. The database, developed for the analyzer integrated

with a APP, is planned to be validated by way of a field testing process. The research

procedures involved during this study is subdivided as shown in Figure 1.

The goal of this system development is let the traditional manual record analysis mode to be

replaced by a ubiquitous analyzer with real-time images operation mode integrated in a

PC-Tablet. The main development tools with related hardware and software are chosen to be

operated in the Android system (due to its larger market share) platform. The testing and the

validation of the U-analyzer is focused on the screen response speed and the touch range to be

met with the required operation specifications. The data access and transfer are designed to be

adjusted in accordance with the rules of the badminton ball game and the ways of the education

and training.

4. System Design and Verification Tests

(1) The User Interface and Process Definition Applied for the APP:

According to the characteristics and the rules involved during an openness badminton rally, the

preliminary design processes for the development of the user interfaces being operated in the

APP of the U-badminton tactics analyzer are shown on Figure 2.

Page 250: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

247

2. Programming and the User Interface Design:

Page 251: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

248

3. Programming and the Screen Description:

Page 252: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

249

4. The Criterions for the Testing and Validation

(1) The basis of validation criteria:Based on the user identity, aim of the usability and

verification tasks to test the APP for badminton ball game record analysis, three evaluation

criterions are determined as 'learnability', 'efficiency' and 'effectiveness'. Two questionnaires

related to the system's ease of usability and satisfaction scale carried out in this study.

1. Learnability:It is evaluated, based on the time required to repeatedly work through the same

Page 253: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

250

procedure, using the assessment formula.

2. Efficiency:The rapidity for the tasks to be fulfilled is estimated based on the total time to

complete all tasks.

3. Effectiveness:It is evaluated, based on the task performance showing success, partial

success or failure, using the assessment formula.

(2)The testing of the validation criteria:Four functions(tactics classifications ategory,

time-span per shot, time-span between two shots and time-consuming per game)of the APP are

tested by two badminton expert users and two badminton student-level users. The results of the

testing are summarized as the Table shown below:

5. Conclusions

1. The objective of this research is to develop a badminton tactics analyzer for the coaches,

players and scouts to carry out the real-time ball game data analysis.

2. The tactics analyzer with a customized information platform is capable of executing the

complete ball game record and subsequent data analysis, for example, the badminton technical

skill utilization rate such as serve, net shot, smash, passing shot, push shot, attacking clear, kill,

drive, drop shot...etc and the scoring patterns such as 'too late to hit the shuttlecock', out, 'touch

the net during a shot', misjudgment.

3. The evaluation (tested by three different user indentity)test results showed that the

real-time professional badminton tournament data record analyzer with a customized APP and

a supporting database display mode is capable of providing real-time match record data and

possible batting tactics analysis to the coaches and players and also significantly reducing the

chattiness of the traditional manual data record analysis.

4. The Preliminary objective evaluation data on the APP's learnability, efficiency, effectiveness,

usability and satisfaction are achieved in this study. It indicated that it is learnable and

convenient to execute the badminton ball game analysis using the APP. In order to obtain a

better and quick data analysis, it needs more practice for being familiar with the analyzer and

increasing the response speed.

Page 254: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

251

The subsequent research in this study is aimed to develop a more appropriate presentation tool

platform(such as bigger touch screen mobile device with better screen resolution)in order for

achieving the optimum ball game record data analysis.

6. References

1. Jia-Jing Cai and Wu-Zhou Chen, ' a badminton teaching and training system developed

using Flash', 2009, Master Thesis of National Sport University.

2. Xuan-Jun Guo and Mao-Chun Yang, ' A visual analysis system applied for the table-tennis

ball game', 2008, Master Thesis of National Dong Hwa University.

3. Ming-Yue Wang, Ying-Jie Liu and Zhi-Quan Zheng, 'A technical and tactical analysis

model applied for the first three shots involved during a table-tennis ball game', 2012,

Journal of College sports, pp. 229-238.

4. Yu-Fen Chen and Cheng-Zhi Huang, ' A real-time technical analysis and match data record

for the table-tennis ball game player', 2008, International Symposium of Sports Pedagogy

and Sports Coaching in Taipei Physical Education College, Taipei.

5. V1Golf, 'V1Golf Victory one golf swing analysis software', 2013, http://www.v1golf.com/.

6. Valand, 'Visual swing golf digital imaging teaching software', 2013, www.wisinfo.com.tw/.

7. Ming-Chih Tsai and Ming- Guo He, 'A billiards image comparison system', 2010, Master

Thesis of Tatung University.

8. Zheng-LongYang, Jian-Ren Huang, Hong-Xiang Chen and Zhi-Hao Yu, ' Taijiquan

Competition Information Management System', 2003, Proceeding of the Taijiquan

International Symposium in 2003.

Page 255: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

252

SICASE-759

Optimized Design of Geo-Temporal Query Based User Authentication

Scheme for Smartphones

Seonho Choi

Department of Computer Science, Bowie State University

[email protected]

Kun Sun

Department of Computer Science, College of William & Mary

[email protected]

Edward Jung

Department of Computer Science, Kennesaw State University

[email protected]

Abstract

As smartphones are gaining more popularity, it is becoming more critical to protect the data

and resources from malicious access. Many user authentication schemes were proposed and

studied for mobile devices. Biometric based, pattern based, and password based techniques are

some of the examples. We proposed a new authentication idea utilizing a series of binary

geo-temporal queries based upon user‟s episodic memory [16]. With the advancement of the

smartphone technology it became more than feasible to acquire and maintain some aspects of

the user‟s episodic memory such as locations and times where and when the user has been.

This technique has several strengths compared to the other user authentication techniques. It is

resistant to most of the attack types including the shoulder surfing attack, and its usability is

high due to the high memorability of such information. This scheme may be used either as a

primary authentication tool or as one of the techniques in multi-factor authentication. However,

we need to formulate its design process in such a way that various security requirements may

be specified and several parameters may be determined. In this paper, this design process is

formulated as an optimization problem and the solution approach is derived. By using this

algorithm, design time decision may be made on such parameters such as number of maximum

queries to be given out, the minimum number of hits needed for a successful authentication. On

Android 4.3, we built a prototype App, which provides user authentication to unlock a

Samsung Galaxy S4 smartphone with low power consumption.

Keywords: User authentication, Geo-Temporal Query, Smart Phone

Page 256: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

253

1. Introduction

Mobile devices such as smart phones have been widely used for processing monetary

transactions and accessing sensitive data. The mobile device should be protected by an

authentication mechanism to prevent an unfriendly user who possesses the device even for a

short time from stealing valuable sensitive data. A number of authentication techniques have

been proposed and developed for mobile devices. Some of the most commonly used techniques

include conventional password based scheme, keystroke dynamics based technique,

pattern-based scheme, physiological biometric based techniques, etc.

As more users are utilizing mobile devices for carrying out various tasks including monetary

transactions, it is becoming more and more critical to protect them against malicious accesses.

A lot of user authentication techniques have been proposed and developed for this purpose

including physiological or behavioral biometric techniques, pattern-based scheme,

conventional password based scheme, etc.

However, most of the previously developed user authentication schemes suffer from various

limitations including the low resistance against some attack types such as shoulder surfing

attacks, low memorability of the required information to be used for authentication such as

passwords or phrases, high false negative and/or false positive rates, requirements for

cumbersome training steps needed for some biometric-based schemes, or dependence on

special hardware units such as fingerprint readers.

We proposed a new authentication idea utilizing a series of binary geo-temporal queries based

upon user‟s episodic memory [16]. With the advancement of the smartphone technology it

became very feasible to acquire and maintain some aspects of the user‟s episodic memory such

as locations and times where and when the user has been. This type of personal episodic

memory information may be stored along with their temporal information, and a series of

geo-temporal queries may be created and asked to a user. Even though various types of

geo-temporal queries may be generated we chose to focus on utilizing binary geo-temporal

queries for its simplicity and applicability. A user is given a series of binary queries and he/she

needs to choose true or false on each query.

Our geo-temporal query based scheme has the following characteristics [16]:

Usability: users can easily answer a number of true/false queries for authentication

purpose.

Attack resistance: it can protect against various attack types including the shoulder surfing

attack.

Page 257: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

254

Quantification and Regulation of security risks: it should allow us to (probabilistically)

quantify the security risks such as the authenticity probability given user‟s response, expected

false positive and false negative rates, etc.

Implementation feasibility: our technique should be implementable on most mobile

platforms without any special HW requirements.

However, personal-history based techniques have an inevitable drawback of privacy disclosure

problem. For instance, in geo-temporal query technique queries include location and temporal

information, and an adversary may obtain correct history information once the true queries –

whose answers are true – are identified out of the false queries – whose answers are false –

among the queries observed during an attempted authentication process. To minimize the

privacy disclosure level we propose two pre-termination techniques for the query process,

success pre-termination and failure pre-termination.

However, we need to formulate its design process in such a way that various security and

privacy requirements may be specified and several parameters may be determined. In this

paper, this design process is formulated as an optimization problem and the solution approach

is derived on how the optimization problem may be solved at system design time. By using our

formulation and algorithm, design time decision may be made on such parameters such as

number of maximum queries to be given out, the minimum number of hits needed for a

successful authentication, the maximum number of misses that will automatically fail the

authentication, the true (or false) query generation probability, etc. On Android 4.3, we built a

prototype App, which provides user authentication to unlock a Samsung Galaxy S4 smartphone

with low power consumption.

The remainder of the paper is structured as follows. We present the threat model and

assumptions in Section 2. Section 3 presents a geo-temporal authentication framework. In

Section 4 details of our authentication scheme is presented. Initial prototype app developed on

Android platform is introduced in Section 5 with implementation details and issues.

Discussion and future works are presented in Section 6. Section 7 discusses the related works

on user authentication for mobile devices. Section 8 concludes the paper.

2. Threat Model and Assumptions

We consider someone as an attacker who has physical access to a smart phone at least for a

limited time. Even though an attacker has physical access to a phone, he/she may get access to

the resources in the smart phone only after successful authentication. An attacker is assumed to

have knowledge on various system parameter values. We assume the mobile devices are

equipped with GPS to record the location information. Most smart phones have GPS included.

Page 258: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

255

GPS typically cannot function indoors; however, we won‟t require such fine-grained

geo-location information.

3. Geo-Temporal Authentication Framework

3.1 Overview

錯誤! 找不到參照來源。 shows the geo-temporal authentication process. User‟s location

history information is obtained by using the GPS component. The location coordinates are

periodically sampled and stored along with the sampling time information. Once the coordinate

values are obtained from the GPS, the coordinates and sampling time will be stored into the

Location History Base. When a user attempts to unlock the smart phone, the Query Generator

and Processor component will make use of the Location History Base to create a series of

geo-temporal queries to be answered by the user. Given a geo-temporal query, if the user‟s

answer is correct, then it is said that a hit occurred. Otherwise, it is said that a miss occurred.

Multiple queries may be challenged to allow for some operation mistakes or vague memory.

3.2 Geo-Temporal Data Engine

For our scheme to work we need to create and regularly update a geo-temporal database

containing the location history information sampled with time information. The necessary

entries in each record are sampling time, longitude, latitude, address (obtained by using the

Reverse Geocoding), and duration of stay.

There are tradeoffs between GPS (or other sensors) sampling period and energy consumption.

Using smaller sampling period will produce more accurate traces of user locations, while

consuming more energy. Less accuracy may be achieved with bigger sampling period, but less

power will be spent.

3.3 Authentication Query Generator and Processor

In this paper, we focus on using the binary geo-temporal query, whose answer should be either

true or false, and which contains both the location and temporal information in the query itself.

Page 259: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

256

3.3.1 Scaled Geo-Temporal Granularities

There is a correlation between human memorability and location granularity. The finer the

location granularity is, the more difficult to remember.

If a user is given an address containing street number and name, he/she would have a more

difficult time in remembering compared to the case when he/she is challenged only with city

name. For example, it would be more difficult to answer “Did you visit 1234 Main Street, New

York, NY last May?” than to answer “Did you visit New York, NY last May?”

Also, the finer the temporal granularity is, the more difficult to recall. For example, consider

the following two queries: “Did you visit New York, NY, last May?” and “Did you visit New

York, NY, between May 12 and 14?” In this case, the latter query would be more difficult to

answer.

The relationship between location and temporal granularities may be represented by different

regions in the scaled X-Y graph as is shown in Figure 2. Out of the possible regions in the

graph, we will focus on those along the correlation line. These regions will have the similar

level of location and temporal granularities. “Did you visit Canada in 2009?” is an example

query in region 5, and “Did you visit Quebec, Canada, in May 2009?” in region 4. As is noted

in the figure, more privacy will be disclosed by the low-numbered regions. But, more accurate

authentication may be provided.

However, human memory tends to fade away as time goes by. They can remember recent

events more accurately compared to the ones in remote past. For example, the places visited

yesterday may be remembered more clearly along with temporal information than the ones

visited a month ago. This implies that we may utilize the queries in the low-numbered regions

Page 260: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

257

only from the recent location history, and from the remote location history those in the

high-numbered regions may be used in the authentication process. In Figure 2 the

low-numbered regions are characterized with short memorability spans and the high-numbered

ones with long memorability spans. The temporal remoteness of the location samples needs to

be considered in generating the queries as well as the location and temporal granularities.

When queries are generated in our approach, the temporal and location granularities of queries

will be adjusted to reflect this correlation with the remoteness of the location history. We name

this technique as Scaled Geo-Temporal Granularities. The following shows the example types

of queries that are generated according to this principle:

Did you visit 1234 35-th Street, New York, NY at 3:15pm today? (Region 1 in Figure 2)

Did you visit 35-th Street, New York, NY the day before yesterday? (Region 2 in Figure

2)

Did you visit New York, NY 3 weeks ago? (Region 3 in Fgiure 2)

Did you visit NY state 3 last May? (Region 4 in Figure 2)

Did you visit Canada in 2010? (Region 5 in Figure 2)

3.3.2 False Query Generator

False queries need to be obtained and presented to a user along with the true queries. Simple

approach may be to generate totally random location and time. However, the locations used in

the false queries may not be too far from the locations that have been visited by a user. For

example, if an adversary acquired a phone in New York City and asked whether the user was in

California that morning, it would be easy to guess the answer. For this reason we adopted to

base the false query generation process upon the information stored in the Location Base, and

introduce some randomness to create false queries. The basic idea is to choose a location

sample from the Location Base as is done in generating the true query, and add/subtract

random numbers to/from the coordinates and sampling time of the chosen sample.

4. Authentication Scheme

Multiple queries may be challenged to allow for some operation mistakes or vague memory.

There is a constraint on the number of queries that can be given to a user. We will denote the

maximum number of queries that can be given as M. A series of geo-temporal queries will be

given until one of the following conditions met:

Authentication success: enough number of hits made after M queries are given.

Authentication failure: enough number of hits not made even after M queries are given.

We propose two pre-termination techniques to reduce the number of disclosed true queries:

success pre-termination and failure pre-termination. First, if the number of hits reaches a

pre-determined threshold H, then the query process terminates early even before M queries are

Page 261: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

258

given out. Second, even before all of M queries are presented to a user, the query process may

be terminated if there is no possibility that the constraints will be met even if the remaining

queries are answered correct. Figure 2 shows the basic authentication algorithm.

It is assumed that H > M-H, which must be true for the most of the practical parameter values.

This means H > M/2.

Suppose that k queries have been presented to a user, and let h denote the number of queries

answered correct (hits) by the user. The number of remaining queries is M-k, and the maximum

number of hits that may result out of M queries (k already answered and M-k to be answered) is

h+(M-k) under the assumption that all of the M-k remaining queries are answered correctly. If

h+(M-k) < H, then there is no hope that H queries will be answered correct even after the

remaining queries are given and answered. This corresponds to the failure pre-termination case.

Page 262: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

259

4.1 Security Constraints

We will design the authentication scheme in which a guarantee may be given in term of the

following security constraints:

Pauth : When an authentication is granted, a probability that a user is authentic should be

greater than or equal to this value.

PFP: The probability that a valid user is not authenticated should be less than or equal to

this.

PFN: The probability that an invalid user is authenticated should be less than or equal to

this.

Given these parameter values along with Mmax, we need to determine the values of M, H, Ptrue,

and Pfalse, that will be used in the actual query generation and challenge process.

Thus, we obtain the following optimization problem.

Optimization Problem 1: Find out values of M, H, Ptrue and Pfalse (1≤H≤M) satisfying the

given PAuth, PFP, PFN and Mmax conditions.

It is possible that there may be more than one candidate values for H. In this case the minimum

value will be chosen as H. Here, we are supposed to find minimum values for M (and H)

satisfying the security constraints. pf=P(Cc|A) is the probability that an authentic user makes a

mistake in answering a query. This probability may be experimentally obtained. This may vary

according to different factors such as different persons (with different memory capability),

Page 263: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

260

different scales for Geo-Temporal Query Granularity settings. In this paper, we start with some

initial probability (e.g., 0.1), and dynamically adjust this value based upon the user‟s responses

whenever a user authentication succeeds. We use Exponentially Weighted Moving Average

algorithm to update this probability.

P(A) is the probability that a user is authentic. It is known that 18.13% of cell phones are lost or

stolen each year. So, we set this to be P(A)=1-0.1813=0.8187. This leads to P(Ac)=0.1813.

Suppose that M queries are presented to a user, and let h denote the number of queries actually

answered correct by the user. Then, 0≤h≤M holds. The following probabilities may be

obtained.

( | ) ( | ) ( )

( | ) ( )+ ( | ) ( ) (1)

( | ) ∑ ( )( )

(2)

( | ) ∑ (

)(

) ( )

(3)

The first probability is obtained by applying the Bayes Theorem. P(A|NM≥h) represents the

probability that a user is an authentic user when the user provides h or more correct answers to

M queries. Given P(A) and pf values, this is a function of M and h.

We assume the true queries whose answer should be “true” are randomly generated with a

probability Ptrue, and false queries with a probability of Pfalse = 1-Ptrue. These probabilities can

be known to an adversary. Given a query, the probability that an adversary provides a correct

answer is (Ptrue)2+(Pfalse)

2=1-2Ptrue+2(Ptrue)

2, and the probability for providing an incorrect

answer is 1-(Ptrue)2-(Pfalse)

2=2Ptrue-2(Ptrue)

2.

The number of queries to be asked to a user varies in [0, M]. PFP is the target threshold

probability for false positives which occur when a valid user is not authenticated. If this is

0.01, then it should be guaranteed that at most 1% of the cases a valid user is rejected (e.g., by

user mistakes). PFN is the target threshold probability for false negative when an invalid user is

authenticated. If this is 0.005, then it should be guaranteed that at most 0.5% of the cases will

result in authentication even though the user is not authentic. This may happen when an

adversary launches a random guessing attack. Mmax is an upper bound on M, and it is given at a

design time. This condition will be used as one of the constraints in the optimization process.

For an authentication to be granted for the user with (M, h) values – i.e., NM≥h to be used as an

authentication criteria, the following should hold.

Page 264: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

261

P(NM≥h | Ac) PFN (4)

P(NM<h | A) = 1 - P(NM≥h | A) PFP (5)

P(A | NM≥h) ≥ PAuth (6)

We may choose the minimum value of M for which at least one integer h (1≤h≤M) exists

satisfying the above conditions. Then, we may denote them as M and H, respectively. Again,

for more than one candidate values for H we select the minimum value.

4.2 Privacy Metrics

In the authentication scheme, a series of queries are presented to a user based upon the location

history file; however, this may endanger user privacy by revealing locations frequently visited

or other location-related information. To overcome this limitation, we reformulate our

optimization problem as follows:

Optimization Problem 2: Find out values of M, H, Ptrue and Pfalse (1≤H≤M) satisfying the

given PAuth, PFP, PFN and Mmax conditions and minimizing the number of true queries exposed.

It is possible that there may be more than one candidate values for H. In this case the minimum

value will be chosen as H.

Suppose that an adversary tries to obtain as much location history information from the smart

phone as possible by launching a guess and check attack. Also, let‟s assume that k queries

have been given to the adversary so far. Then there are three possibilities:

Successful pre-termination condition: k≥H, H correct answers and k-H incorrect answers.

Failure pre-termination condition: k≥M-H+1, and there were M-H+1 incorrect answers

and k-M+H-1 correct answers. M-H represents a maximum number of queries that may be

missed before a failure pre-termination occurs.

Query continuation condition: the other cases except for the above two conditions.

We may divide the cases into the following three cases depending upon the values of k.

H ≤ k: Success pre-termination and failure pre-termination are mutually exclusive events.

That is, if both conditions hold at the same time, then we have k-H=M-H+1, which yields to

k=M+1. However, this is a contradiction.

M-H+1 ≤ k <H: Failure pre-termination condition and the query continuation are mutually

exclusive events. Again, failure pre-termination occurs when there are M-H+1 incorrect

answers and k-M+H-1 correct answers.

k ≤ M-H: Only query continuation is the possible state.

Let xi (1≤i≤k) denote a random binary variable which has a value of 0 when a user answers

wrong for the i-th query, and 1 when a user answers correctly. And, let yk=x1+x2+…+xk

denote a sum of x1 through xk, which represents the number of correctly answered queries out

of k queries. Then, we may trace the values of yk over the index values from 1 through k for

Page 265: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

262

various cases including success pre-termination, success termination, failure termination as is

shown in Figure4 Through Figure 9. In these figures, it is assumed that M=7 and H=5

In Figure 4 success pre-termination case is shown. In the graph, at each k index value there are

two possible cases, either yk jumps up by one unit or stays the same as before. In this case the

user answers correctly to the first 5 queries without any misses, and the query process

pre-terminates only after 5 queries are given. The process terminates when yk=5 is reached,

which occurs for k=5 in this example.

Figure 5 shows a success termination case where all of the M queries are given out without

pre-termination. In this scenario 5 queries are answered correctly, but with 2 misses in between.

Because of the misses, the termination occurs at k=7 where yk=5 is reached.

Page 266: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

263

Figure 6 shows a failure pre-termination case where the query process is terminated after

giving out 5 queries. 2 queries were answered correctly and 3 queries were answered

incorrectly, which yields to the condition where an authentication is impossible even if the user

answers the remaining 2 queries. Note that the failure termination occurs when the trace line

hits the Termination Line.

An example scenario for failure termination is given in Figure 7. The last query q7 must have

been answered wrong. Otherwise, a failure pre-termination should have occurred at an earlier

query response.

Different points that a trace line may end at k=5 is shown in Figure 8. In this specific scenario

there are 4 such points denoted as a, b, c, and d. The possible y5 values at a, b, c and d are 2, 3,

Page 267: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

264

4 and 5 where y5=x1+x2+x3+x4+x5. Point a corresponds to a success pre-termination, and point

d corresponds to a failure pre-termination. At points b and c the query process will continue

without termination. It is again assumed that H=5 and M=7.

In Figure 9 all the possible termination points are shown for H=5 and M=7. We may divide

the entire area into three subareas, A, B, and C. Area A corresponds to the condition (k ≤ M-H),

and no termination is possible. Area B corresponds to (M-H+1 ≤ k <H), and either

continuation or failure pre-terminations are possible. Area C satisfies the condition (H ≤ k), and

continuation, failure pre-termination, failure termination, success pre-termination or success

termination is possible.

We want to find the expected number of disclosed true queries as a privacy metrics. As is

shown in Figure 9, the termination points in the (k, yk) graph may belong to three different

regions denoted as A, B, and C. We need to find the probabilities of the query process

terminating at these points.

Probabilities in Area C (H ≤ k)

When a k-th query is given and answered where H ≤ k, the possible range of yk values are

[k-(M-H)-1, H]. For example, this corresponds to the point d in Figure 8. The minimum value

k-M+H-1 corresponds to a failure pre-termination and occurs when exactly M-H queries are

answered wrong and k-1-M+H queries are answered correct to the queries, q1, q2, … and qk-1,

and the last query qk is answered wrong. If more than M-H queries are answered wrong to the

queries q1, q2, … and qk-1, then a failure pre-termination must have occurred before the k-th

query was given. The probability of this failure pre-termination happening at k is given as:

( )

( − −

)( )

− + (

) − − +

(7)

Page 268: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

265

The probability of yk=k-(M-H) – e.g., point c in Figure 8 – may be obtained by considering the

cases where M-H queries are answered wrong and k-M+H queries are answered correct to the k

queries q1, q2, … and qk. This is given as

( ) (

− + )(

) −

( ) − +

(8)

By applying the similar argument, the probability of yk=k-(M-H)+n, where 0 ≤ n ≤ M-k, may

be obtained by considering the cases where M-H-n queries are answered wrong and k-M+H+n

queries are answered correct to the k queries q1, q2, … and qk. This is given as

( )

( − −

)( )

− − (

) − + +

(9)

When n=M-k, a success pre-termination occurs for k<M and a success termination occurs for

k=M. Hence, the probability of success termination when the k-th query is given and answered

is

( ) ( )(

) −

( )

(10)

Probabilities in Area B (M-H+1 ≤ k <H)

In this case only failure pre-terminations are possible. When a k-th query is given and answered,

the possible range of yk values are [k-(M-H)-1, k]. The minimum value k-M+H-1 corresponds

to a failure pre-termination and occurs when exactly M-H queries are answered wrong and

k-1-M+H queries are answered correct to queries, q1, q2, … and qk-1, and the last query qk is

answered wrong. If more than M-H queries are answered wrong to queries q1, q2, … and qk-1,

then a failure pre-termination must have occurred before the k-th query was given. The

probability of this happening is given as:

( )

( − −

)( )

− + (

) − − +

(11)

Probabilities in Area A (k ≤ M-H)

In this case there is no possibility of terminations. The query process will only continue in this

area.

Page 269: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

266

Privacy Metric: Expected Number of True Queries Exposed

We will use the expected number of true queries that may be exposed to an adversary when

he/she attempts to be authenticated. It is assumed that an adversary has knowledge on Ptrue and

Pfalse values and employs a random guessing strategy in answering the queries. That is, he/she

will try to answer a query with “true” with the probability of Ptrue. Then, the expected number

of true queries that are given to the adversary may be found as follows from (7), (10) and (11):

∑ ( )

∑ ( ) ∑ ( )

− +

∑ ( − −

)( )

− + (

) − − +

∑ ( )(

) −

( ) ∑

− − +

( − −

)( )

− + (

) − − +

(12)

This E represents the expected number of true queries exposed to an adversary. This formula is

used in our Optimization Problem 2 definition as a metric for privacy disclosure.

4.3 Solution Approach for the Optimization Problem

Our Optimization Problem 2 may be refined by incorporating the constraints on PFP, PFN and

Pauth, and by having an optimization objective function E – given in (12) – to be minimized.

One simple approach would be to exhaustively search for optimal solution by trying out

different combinations of (Ptrue, M, H) values. Figure 10 shows this algorithm. Ptrue is a

continuous variable and needs to be quantized with a gap of Δ. In our example Δ was chosen to

be 0.001.

Page 270: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

267

4.4 Example Optimization

Given the following parameter values, we applied an optimization algorithm to find (Ptrue, M,

H) values satisfying the probability constraints and minimizing the expected number of

exposed true queries to a potential adversary. The input parameters are Pauth= 0.9, PFP = 0.05,

PFN = 0.05, pf = 0.05.

The optimal (M,H) was found to be (11,9) when Ptrue=0.378 with an expected number of

disclosed true queries equal to 2.391. Please note that, when Ptrue=0.5, the E value would be

equal to 2.986.

The graph in Figure 11 shows the points on (M,H) plane meeting the probability constraints

and the z axis shows the expected number of true queries to be disclosed for each (M,H)

combination.

Page 271: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

268

5. Implementation

We constructed a prototype app on Android 4.3, and ran it for an hour to measure power

consumption on Samsung Galaxy S4 smartphone. As was shown in previous research [15],

invoking GPS unit and obtaining coordinates consumes a significant amount of power. Hence,

we decided to invoke the GPS unit periodically with a fixed sampling period. Table 4 was

obtained only by running the tracking component of the app, which will use most of the energy

due to GPS samplings.

Figure 12 shows an example screenshot with a geo-temporal query. User is supposed to choose

either the “true” or “false” button. This process is repeated between m and M times depending

upon the hit & miss patterns of the user responses. Note that only one query is given each time

since the termination may occur at any time and we want to minimize the number of true

queries exposed.

6. Discussion & Future Works

Through experimentations, we need to validate the correlations used in generating the

geo-temporal queries between temporal remoteness of the sample, location granularity and

temporal granularity. Or, more adequate correlation models may be found through such process.

The key issue is how we design the memorability model and validate it. Also, we may need to

elaborate and corroborate the parameter selection for the false query generation process.

Page 272: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

269

To increase the memorability, we may develop several schemes such as a pre-hinting technique

to remind users of the locations he/she is visiting or recently visited as a preparation for future

authentication queries.

As was shown in our and previous works, GPS consumes significant energy and it would be

vital to activate the unit only when necessary. To save energy for location sampling we may

invoke the unit only when the user is in move by utilizing other sensors such as accelerometer

sensor.

7. Related Works

Besides using a pre-agreed set of shared secrets, we can authenticate users by challenging them

with questions dynamically generated from a wider base of personal resources, such as

calendar [7], email [6], or twitter [8]. Nosseir et al. [7] propose to query the users based on

their personal history and develop a prototype using automatic generation of questions from

electronic Calendar information. Nishigaki and Koike [6] propose a user authentication using

user‟s email history to generate the questions. However, it has a serious problem on leaking

privacy, since the impersonators are able to read the mail content when they are trying to log

on as the legitimate user. Okamoto [8] proposes to use Twitter to collect simple, memorable

question/answer pairs. It requires the uses to manually input the knowledge base, so it is not

practical to be used on the smart phones.

Biometric authentication has been well-studied too. Biometric authentication techniques use

either physiological or behavioral features [3, 10]. Physiological biometrics utilizes static

physical features of humans that are known to be unique for each individual. These may be

based upon fingerprint [2], face patterns [11, 1], iris [4], or speech patterns [9], etc. Among

these the most common technique is to use fingerprints to authenticate users. Built-in

fingerprint readers have been integrated in iPhone 5S.

Behavioral biometrics utilizes the fact that people have distinct stable patterns on a certain

behavior, such as keystroke on a keyboard. Two of the most widely studied techniques for

personal computers are keystroke-based [12] and mouse movement based [13]. However, due

to the size limitations it is difficult to apply these techniques to smart phones. An approach was

proposed to provide authentication by capturing the finger movement patterns and comparing

them against the owner‟s patterns [5]. Also, biometric technique based upon personal gait was

proposed using accelerometer sensors [14]. The behavioral biometrics may provide usability

and attack resistance, but most of them utilize complex algorithms for learning and matching

the behavioral patterns and they are vulnerable to high rates of false positives and false

negatives. Also, if a user‟s biometric is stolen, it would be impossible to change it. Because of

Page 273: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

270

these reasons behavioral biometrics are generally used in conjunction with a password/PIN

rather than used as a sole authentication mechanism.

8. Conclusions

We introduced and developed an authentication scheme utilizing a series of binary

geo-temporal queries based upon the users‟ location history information. Two pre-termination

techniques were also proposed to minimize the privacy leakage level. We formulated a design

time optimization problem with various security constraints and an objective function to

minimize the privacy disclosure level. The iterative solution approach was presented to the

optimization problem. A prototype Android app was developed and the implementation details

and issues were presented along with future works.

We believe that the proposed approach satisfies the design objectives mentioned in the

beginning of this paper: implementation feasibility, attack resistance, quantification and

regulation of security risks, and usability.

References

[1] J. Daugman. High confidence visual recognition of personsby a test of statistical

independence. Pattern Analysis and Machine Intelligence, IEEE Transactions on,

15(11):1148–1161, 1993.

[2] A. Jain, L. Hong, S. Pankanti, and R. Bolle. An identity-authentication system using

fingerprints. Proceedings of the IEEE, 85(9), 1997.

[3] A. K. Jain, R. Bolle, and S. Pankanti, editors. Biometrics: Personal Identification in

Networked Society. Kluwer Academic Publishers, 1998.

[4] S. Kurkovsky, T. Carpenter, and C. MacDonald. Experimentswith simple iris recognition

for mobile phones. In Proceedings of the 2010 Seventh International Conference on

Information Technology: New Generations, ITNG ‟10, pages 1293–1294, 2010.

[5] L. Li, X. Zhao, and G. Xue. Unobservable re-authentication for smartphones. In ISOC

Network and Distributed System Security Symposium (NDSS), February 2013.

[6] M. Nishigaki and M. Koike. A user authentication based on personal history: A user

authentication system using e-mail history. 47(3):945–956, 2006.

[7] A. Nosseir, R. Connor, and M. Dunlop. Internet authentication based on personal history - a

feasibility test. In Proceedings of Customer Focused Mobile Services Workshop at

WWW2005, 2005.

[8] M. Okamoto. Knowledge-based authentication using twitter can we use lunch menus as

passwords? 5(5).

[9] K. N. Stevens, C. Williams, J. Carbonell, and B. Woods. Speaker authentication and

identification: a comparison of spectrographic and auditory presentations of speech

material. The Journal of the Acoustical Society of America, 44:1596, 1968.

Page 274: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

271

[10] J. Wayman, A. Jain, D. Maltoni, and D. Maio. An introduction to biometric authentication

systems. In J. ayman, A. Jain, D. Maltoni, and D. Maio, editors, Biometric Systems,

pages 1–20. Springer London, 2005.

[11] J. Zhang, Y. Yan, and M. Lades. Face recognition: eigenface, elastic matching, and neural

nets. Proceedings of the IEEE, 85(9):1423–1435, 1997.

[12] F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics.

ACM Transactions on Information and System Security (TISSEC), 5(4):367–397, 2002.

[13] N. Zheng, A. Paloski, and H. Wang. An efficient user verification system via mouse

movements. In Proceedings of ACM CCS2012, pages 139–150. ACM, 2011.

[14] D. Gafurov, K. Helkala, and T. Søndrol, Biometric Gait Authentication Using

Accelerometer Sensor. Journal of Computers, Vol. 1, No. 7, Oct./Nov. 2006.

[15] K. Lin, A. Kansal, D. Lymberopoulos, F. Zhao, Energy-accuracy trade-off for continuous

mobile device location. Proceedings of the 8th international conference on Mobile

systems, applications, and services. Pages 285-298. 2010.

[16] B. Choi, K. Sun, S. Choi, Cloud-Based User Authentication with Geo-Temporal Queries

on Smartphones. Proceedings of the 2nd

International Workshop on Security in Cloud

Computing, Kyoto, Japan, June 3, 2014.

Page 275: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

272

Mechanical Engineering

Session Chair: Yanhua Wu

SICASE-704

Flow Topologies of Energetic Turbulence Structures in the Separated Flow Over an

Airfoil at Deep Stall

Yanhua Wu︱Nanyang Technolocial University

Hui Tang︱Hong Kong Polytechnic University

SICASE-722

The Fracture Prediction of Electromagnetic Steel for Shorten Reheating Process in

Furnace

Yu-Hsi Huang︱National Taiwan University of Science and Technology

Ching-Kong Chao︱National Taiwan University of Science and Technology

Li-Wen Wu︱China Steel Corporation

Chia-Hsuan Cheng︱National Taiwan University of Science and Technology

Zhen-Yi Fan︱National Taiwan University of Science and Technology

SICASE-820

Direct Current Compressor for Vehicle Air Conditioning System in Non-Electric Vehicles

Henry Nasution︱Universiti Teknologi Malaysia

Amirah Haziqah Zulkifli︱Universiti Teknologi Malaysia

Afiq Aiman Dahlan︱Universiti Teknologi Malaysia

Azhar Abdul Aziz︱Universiti Teknologi Malaysia

SICASE-819

In-Cabin Temperature Control and Multi-Circuit Bus Air-Conditioning Systems

Henry Nasution︱Universiti Teknologi Malaysia

Azhar Abdul Aziz︱Universiti Teknologi Malaysia

Amirah Haziqah Zulkifli︱Universiti Teknologi Malaysia

Afiq Aiman Dahlan︱Universiti Teknologi Malaysia

2015/6/28 Sunday 14:45-16:15 Room 2

Page 276: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

273

SICASE-704

Flow Topologies of Energetic Turbulence Structures in the Separated Flow

over an Airfoil at Deep Stall

Yanhua Wu

Nanyang Technolocial University, Singapore

[email protected]

Hui Tang

Hong Kong Polytechnic University, China

Abstract

A special application of proper orthogonal decomposition (POD) as in Wu (2014) has been

applied to study the flow topologies of large-scale energetic turbulence structures in the

separated flow over an S805 airfoil designed for horizontal-axis wind turbine blade at deep

stall with a large angle of attack of 30. Two kinds of instantaneous turbulence structures are

observed to contribute significantly to the first POD mode. One is the complete or incomplete

large-scale vortex with stronger induced vertical upward flow. The other is the three-vortex

structure with one large-scale vortex of similar size to that existed in the first kind of energetic

flow structure and two small-scale vortices located at the leading- and trailing-edge shear

layers, respectively.

Keyword: Turbulence structure, proper orthogonal decomposition, airfoil, stall

1. Introduction

The rotating blades of engineering turbomachinery are often operated at large angles of attack

(AOAs) at off-design conditions. For example, Lee & Wu (2013a, 2013b, 2014)[1-3] found

that when a blade of a horizontal-axis wind turbine with a design tip-speed-ratio (TSR) of 6 is

operating at TSR=3, the AOA at the inboard section of the blade is as large as 30. In order to

further improve the aerodynamics of the wind turbine at off-design conditions, the improved

understanding of the airfoil at full stall conditions is needed. At very large AOAs, the boundary

layer is separated from the leading-edge of the airfoil and the flow is turbulent on the suction

surface. Although the aerodynamics loads (pressure, lift, and drag coefficients) have been

studied quite extensively in the past, the three dimensional instantaneous turbulence structures

inside the turbulent separated flow at full stall are still illusive. In this study, the state-of-the-art

tomographic PIV will be used to measure the three dimensional velocity fields within a volume

of the separated flow. The three-dimensional topologies of the instantaneous large-scale

structures which contain a significant amount of turbulent kinetic energy will be revealed using

a special application of the proper orthogonal decomposition as in Wu (2014)[4].

Page 277: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

274

2. Experiments

Experiments were conducted in a wind tunnel with a test section of 0.4m0.4m with a

freestream turbulence intensity of about 0.4%. The side walls of the wind tunnel are made of

glass and the top and bottom walls are made of acrylic for optical access in the tomographic

PIV measurements to be described below. The airfoil used here is S805 designed by NREL for

the purpose of horizontal-axis wing turbines. The airfoil which covers the whole width of the

test section was mounted at the vertical center. The chord length of the airfoil was chosen to be

30 mm so that the Reynolds number of the flow is similar to that of the blade model studied in

Lee & Wu (2013a, 2013b, 2014)[1-3] to be Re=5500. The results presented in this study were

from a large angle of attack of 30 where the airfoil was in deep stall with massively separated

flow.

Due to the intrinsic three-dimensionality of the separated flow on the suction surface of the

airfoil at large angle of attack, Tomographic PIV (Tomo-PIV) was used to measure the velocity

fields within the volume of fluids. The experimental setup is shown in Figure 1. A 8mm-thick

laser light volume illuminate the flow at the suction side of the airfoil at its spanwise center.

The images were recorded by four 16-bit CCD camers with 105mm lenses and each camera‟s

CCD chip has 24562058 pixels whose size is 3.45m. The cameras were configured in such a

way that the backward-scattering of the laser light from the particles were captured yielding

similar particle intensities in the four recordings. To reduce the laser light reflection from the

airfoil surface, the airfoil was painted with Rhodamine B and band-pass filters (53210nm with

>95% transmission) were used for each camera. FastMART algorithm was applied in LaVision

Davis software to reconstruct the three-dimensional light intensity field of the particles.

Volume self-calibration was also implemented to improve the calibration accuracy.

Three-dimensional velocity vector fields were obtained by recursive volumetric

cross-correlation method. Each resulting velocity field has 1069211 (xyz) vectors with a

vector grid spacing of 0.76mm.

Page 278: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

275

The total field of view is about 80mm70mm8mm. 500 statistically independent velocity

fields were obtained. The overall uncertainty of the current Tomo-PIV measurements is about

2% of the full-scale velocity.

3. Proper Orthogonal Decomposition

The principle and equations of POD can be found in many places in the literature and they are

only summarized below. In this study, well-established snapshot POD was used on the

three-dimensional fluctuating velocity fields measured by the current Tomo-PIV. In POD, any

instantaneous fluctuating velocity field u(x,t) can be decomposed into the form of

1

)()(),(n

nn xtatxu , where n(x) is deterministic spatial POD modes, and an(t) is random

temporal coefficients. In snapshot POD, the coefficients an(t) are obtained first by solving the

eigenvalue problem with a positive definite Hermitian kernel of the form

')'()',(),()( dttadxtxutxuta n

T

nn

, where the integrations are over the spatial domain

and a time interval T. For an ensemble of measured velocity fields, the spatial domain could be

the whole or part of the field of view and the time domain represents the ensemble or the

collection of samples of the velocity fields. The eigenvalues n are real and positive and form a

decreasing and convergent series. The POD modes can then be computed through the equation

T

n

T

nn dtadtuax 2/)()( . The turbulent kinetic energy is equal to half of the summation of the

eigenvalues. Since the POD modes are usually normalized to be orthonormal, the POD

coefficients are related to the eigenvalues by T

nn dtta 2

)( , which dictates that the instantaneous

fluctuating velocity field with a larger value of 2

na contributes more to the eigenvalue n.

Therefore, equation 5 provides a possible means to identify what are the instantaneous

fluctuating flow structures that contribute significantly to the first few dominant POD modes. It

is this equation that the current study is based on to study the topologies of the large-scale

turbulence structures contributing significantly to the first two POD modes. The turbulence

structures contributing significantly to other higher POD modes were not sought in this work,

however, since each of the rest modes accounts for a much smaller amount of kinetic energy.

Since the contribution to the eigenvalue n comes from 2

na , instantaneous velocity fields with

either positive an or negative an contain equivalently important information on the flow

structures relevant to the nth

POD mode.

Page 279: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

276

4. Results

The first POD mode was found to account for 28%, or almost a third, of the total turbulent

kinetic energy in the current flow. A vector plot of the first POD mode in the x-y plane at the

center of the measurement fluid volume is presented in figure 2. It shows a single large-scale

counter-clock-wise vortex with strong induced flow. The induced flow on the right side of the

vortex appears stronger than that on the left side. This vortex is located quite far from the

leading edge of the airfoil, but relatively much closer to the airfoil‟s trailing edge.

An instantaneous fluctuating flow field which is a significant contributor to the first POD mode

is shown in figure 3. This field has a large magnitude of positive coefficient of the first POD

mode whose a1=2.06a1, where a1 is the root-mean-square (RMS) value of the coefficients of

the first mode of the ensemble of the flow fields measured. The major flow topology in this

field is a huge vortex having the same rotational sense as the one in the first mode. Upstream of

it near the leading edge shear layer are a few small scale and much weaker vortices. The

fluctuating flow close to the airfoil‟s suction surface is very weak, corresponding to a

low-turbulence region which is typical in the separated flow at deep stall. An examination of all

the eight fluctuating fields whose a1 values are more than twice a1 reveals that a well-defined

large vortex like the one in figure 3 is not always present in every field. However, the common

feature of the flow topology is the large region of strong upward flow like that on the right side

of the vortex shown in figure 3.

Page 280: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

277

An example of the instantaneous flow field with a large magnitude of negative value of

a1=-2.05a1 is shown in figure 4. In contrast to the flow topology in figure 3, there exist three

major vortices in this field: one large-scale clockwise vortex, and two small-scale vortices

upstream. The small vortex located at the leading-edge shear layer seems in this field to couple

with another weaker vortex to form a vortex ring with induced vertical flow in between. The

small vortex in the trailing-edge shear layer is closer to the huge vortex and these two vortices

are apparently strongly interacting with each other. These three vortices are the most

commonly observed features in all the eight fields whose absolute values of the negative a1 are

larger than 2a1 .

Page 281: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

278

5. Conclusions

Flow topologies of instantaneous turbulence structures contributing significantly to the first

POD mode have been revealed in the separated turbulent flow over a static airfoil for the

horizontal axis wind turbine at deep stall of AOA=30. Two kinds of flow structures can be

observed: (1) Single complete or incomplete counter-clock-wise large-scale vortex with strong

induced upward flow on the right side of it; (2) Three-vortex structure with one large-scale

vortex of similar size to the one in the first kind of flow structure and two small vortices

located on the leading- and trailing-edge shear layers each. The small vortex at the

trailing-edge shear layer has a stronger interaction with the large-scale downstream vortex.

6. Reference

Lee H.M and Wu Y. Experimental study of rotational effect on stalling. Chinese Physics

Letters, 30, 064703, 2013.

Lee H.M and Wu Y. An experimental study of stall delay on the blade of a horizontal-axis

wind turbine using tomographic particle image velocimetry. Journal of Wind Engineering

and Industrial Aerodynamics, 123, 56-68, 2013.

Lee H.M. and Wu. Y. A Tomo-PIV study of the effects of freestream turbulence on stall delay

of the blade of a horizontal-axis wind turbine, Wing Energy, in press.

Wu. Y. A study of energetic large-scale structures in turbulent boundary layer, Physics of

Fluids, 26, 045113, 2014.

Page 282: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

279

SICASE-722

The Fracture Prediction of Electromagnetic Steel for Shorten Reheating

Process in Furnace

Yu-Hsi Huang*, Ching-Kong Chao, Chia-Hsuan Cheng, Zhen-Yi Fan

National Taiwan University of Science and Technology, Taiwan

[email protected]

Li-Wen Wu

China Steel Corporation, Taiwan

[email protected]

Abstract

Electromagnetic steel is heat to almost 1200 ˚C for soften slab before operated hot-rolling

process. To increase the production of ultra-thin electromagnetic steel sheet, the heating rates

need to increase. However, the improper increase in heating rate may induce fracture on

ultra-thin electromagnetic steel. Therefore, the proper heating rates are the important issue of

manufacturing ultra-thin electromagnetic steel. The effects of heating processes on the fracture

mechanism of ultra-thin electromagnetic steel slab are numerically studied in this study.

According to six material constants given by 100-900 ˚C, including on the Young‟s modulus,

Poisson‟s ratio, density, specific heat, thermal conductivity, and thermal expansion, the

investigation of the optimal heating rates is calculated from finite element numerical

calculation. The criterion of strain energy density is used to predict the fracture mechanism in

the paper. By means of determination of the strain energy density in the different heating rates,

the safety condition is design by the maximal strain energy density smaller than the critical

value in heating processes. In order to predict on the fracture of ultra-thin electromagnetic steel

during heating processes, the critical strain energy density is applied to determine the optimal

heating rates. The strain energy density are experimentally obtained from integral area of

stress-strain curves on various temperatures by means of ASTM E21. Hence, the results from

numerical calculation is concluded that the heating period could be shorten from 320 minutes

to 260 minutes by theory of critical strain energy density. Through this research, in addition to

be informed whether ultra-thin electromagnetic steel sheet by shortening the heating time to

improve productivity, reduce energy costs, the theoretical model also applies to other kinds of

steel for manufacturing various types of steel available and effective information.

Keyword: Electromagnetic Steel, Fracture, Optimal Heating Rates, Strain Energy Density,

Furnace

1. Introduction

Page 283: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

280

Silicon steel (also called electromagnetic steel, ES), suggests that it is the amount of

silicon-containing steel, and has a special purpose excellent electromagnetic properties used on

electronic motors, power communications, instrumentation industries. In manufacturing

process, refining molten steel by continuous casting steel is formed, then uniform heat in

furnace (reheating furnace) before cutting steel. The silicon steel in furnace will heat up to a

target temperature by segments, respectively preheat zone, heating zone and soaking zones,

finally up to roughly 1120-1200 degrees Celsius. Silicon steel slab in the furnace using heat

energy from fuel combustion of heating spend energy consumption. If the process can shorten

the silicon steel slab in the furnace of time, not only can improve production of silicon steel,

but also can save the cost of manufacturing, to achieve less energy consumption.

In actual manufacturing process, the temperature distribution of silicon steel slab within the

furnace cannot be directly measured when reheating furnace operates and controls. The

temperature of the furnace can be given and used to predict the steel temperatures, and also

using the steel temperature out of furnace to determine on the temperature distribution by

experience, numerical analysis, fuzzy method for each furnace zone. Ko et al. [1] used of

material and energy conservation to obtain a dynamic mechanism model furnace, and identify

the discrete-time control model. Ditzhuijzen et al. [2] measured on each furnace zone

temperature as the predicted value, and had been predictive controller design.

Among the manufacturing process of electromagnetic steel, silicon steel slab in the furnace

heat before hot rolling. Because the heating rate of speed may cause thermal cracking damage,

the damage criterion using strain energy density (SED), is proposed by Chao et al. [3- 5], who

also used the SED theory on zirconium hydride dry place storing spent nuclear fuel drums

surface cracks and damage in order to predict crack growth trend. Sih and Macdonald [6]

proposed the principle of SED as a failure mechanism baseline forecast, which also referred to

the stress intensity factor and fracture toughness strength. Beltrami [9] proposed the SED when

the structure of the material beyond the critical SED, the material will have to break. SED is a

function of stress and strain and the critical SED can be determined using a tensile test by the

distribution area of the tensile stress-strain material. Hence, the critical SED predicted to

fracture can be applied to any material.

2. Research Methods

This study estimated the silicon steel slab heat temperature and time in the furnace, and the

fracture of silicon steel slab is predicted on thermal cracking damage by temperature difference

between surface and center temperature. A damage factors is proposed to design protecting

thermal rupture of steel slab during heating shorten the time. The theoretical model for silicon

steel can be also predicted on what the heating rates as ambient conditions by air cooling cause

fracture. In this study, the finite element method (FEM) is used to establish prediction model of

Page 284: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

281

SED employed on thermal cracking damage accrued during the heating process for low and

high silicon steels. The FEM results is corresponding to the toughness in the temperature

gradient with the heating time. In order to design the best mode of heating temperature and

time, the fracture mechanism of silicon steel in the furnace is to understand the temperatures of

the surface and the center of difference whether steel slab causes impact on rupture of silicon

steel slab. The theoretical models can obtain the resulting optimization of process parameters to

establish the model so that all kinds of steel slabs make corresponding optimal design on

heating time. The following is the described on the theory of strain energy density theory.

Any piece of elements consists of a finite number of units and the strain energy density per unit

volume can be expressed as [6]:

0

ij

ij ij

dWd

dV

(1)

In which, ij and

ij are stress and strain tensors, respectively, and V is the volume and W is

the total energy stored in the element. In homogeneous isotropic elastic body and other terms,

the strain energy density can be expressed as:

2 2 21

2x y z x y y z z x

dW v

dV E E (2)

The Equation (2) can be separated as:

v d

dW dW dW

dV dV dV

(3)

The v

dW dV is representative to the volume change produced by the expansion of the

strain energy density (dilatational strain energy density); and the d

dW dV is representative

to the shape change of the resulting deformation strain energy density (distortional strain

energy density). Using this theoretical model studies on predicted silicon steel slab in reheating

furnace and the failure mechanism is provided.

3. Silicon steel Reheating Process in FEM Analysis

In this study, a finite element commercial software, Abaqus V6.13, is employed for silicon steel

reheating process to simulate numerical analysis. The reheating process time required 320

minutes in origin, the FEM analysis uses a larger time step in implicit integration method

Page 285: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

282

(Implicit) to solve arithmetic. The actual dimensions of the silicon steel slab is length 8.5 m ×

width 1.25 m × thickness 0.25 m. Material properties of silicon steel slab is provided on the

density, Young's modulus, Poisson's ratio, specific heat, thermal conductivity and coefficient of

thermal expansion of different temperature characteristics. Due to the heating time for high

silicon steel is 320 minutes in reheating furnace the temperature boundary conditions is set up

on the high silicon steel slab with the initial temperature at 200 ° C to final temperature. The

low silicon steel slab is 200 minutes for actual process. The simply-supported boundary

conditions and the gravity of steel itself are considered to provide on the skid conditions. When

the shorten heating period is used on the upper and lower surfaces on silicon steel slab, the

optimal heating time is results in the loop verification.

Silicon steel slab model is set of grid, while the thickness direction of the silicon steel mesh

refinement embryo, mainly to increase the accuracy of the temperature variation in the

thickness direction, and the thickness direction of the grid convergence analysis carried out, as

shown in the grid 15-30 presents the results of convergence, convergence results of this study

have access to the thickness direction of 21 grid in analysis.

4. Silicon Steel Reheating Process in Failure Mechanism Analysis

4.1 Silicon Steel Reheating Process of Analysis Results

This study analyzed the model in temperature and SED resulting data are derived from the

model of the most critical locations on the longitudinal center point of thickness. First, the

process of reheating of high silicon steel is analyzed to the results indicating on that results of

temperature and SED are, as shown in Fig. 1(a), presented on central positions and the upper

and lower surfaces. Because of the mechanical properties of the steel, the resulting SED in the

upper and lower surfaces are shown on the maximum values, when heated to about 120

minutes and the temperature reaches about 715 degrees Celsius. However, when the

temperature rises to about 800 degrees Celsius, the SED began to decline, thus corresponding

to the characteristics of high silicon steel material factor because SED may be speculate the rise

and fall due to the phase transition. When the temperature reached about 1130 degrees Celsius,

also the highest temperature of the upper and lower surfaces, the SED continues to decrease

with the center and surfaces SED values gap narrowing.

Low silicon steel in actual reheating process is 200 minutes, close to reheating process of

carbon steel. In order to compare with the high silicon steel in 320 minutes, a low silicon steel

warming strategy 200 minutes, two different results of low silicon steel heating periods were

analyzed, as shown in Fig. 1(b). The SEDs of low silicon steel showed that the SED of 200

minutes heating period is significant increasing of more than 320 minutes. At about 900

degrees Celsius, the maximum SED is performed to the two heating periods for the same low

silicon steel.

Page 286: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

283

The SED values in 200 minutes is compared to 320 minutes about four times the magnitude of

the difference. Moreover, the SED analysis of the characteristics shows that the high silicon

steel with is achieved to larger SED values than low silicon steel in the same 320-minute

heating period.

4.2 High and Low Critical Strain Energy Density of Silicon Steel

By Equation (1) of strain energy density, it shows the distribution of the area of stress and

strain of the available SED value and we want to predict the circumstances reheating process

silicon steel of the damage in this paper. Therefore, the critical SED value size silicon steel

must be determined on high temperature tensile test for high and low silicon steels. In this

study, in accordance with the temperature of the metal tensile test (ASTM E21) [8, 9], this

specification includes the definition of yield strength, tensile strength, elongation, and enhance

the metal temperature of the reduction of the area of the tensile test methods in ASTM E8. Figs.

2 were stretched 100 to 900 degrees Celsius of the level of silicon steel stress-strain

experiments graphics setting the test piece stretched to break. The tensile stress and strain

throughout the complete recording process, are draw in experiments.

Page 287: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

284

When the SED is computing by Equation (2) obtaining the critical SED under various

temperatures, the critical SEDs of the high and low silicon steel slabs were 3.951 (MJ / m3) and

5.478 (MJ / m3) about 900 Celsius degree. This result can only predict the reheating process of

silicon steel during this damage does not occur. And between 100 and 500 degrees greater

critical strain energy density, so that the silicon steel is heated at a temperature zone we can use

more rapid temperature control strategy, has high strength and toughness heat crack and failure

conditions resistant.

The maximum SED obtained by FEM for the high and low silicon steels in shorten reheating

process is divided to the critical SED. The damage factor is proposed and shown in Fig. 3.

Various heating strategies and 280 minutes from 320 minutes every 10 minutes analogy of

different strategies is used to shorten the heating thermal stress analysis. The visible trend for

reheating process as time is shortened, the maximum SED values increased gradually. The ratio

is similar to the present study therefore concluded that high silicon steel reheating process can

be reduced to shorten the time to 240 minutes, reheating process is close to five times (22%) of

safe range. When reheating process shortened to 160 minutes to assume that the critical low

silicon steel of the SED, the SED exceeds the destruction of value 3.951 MJ/m3 which can be

determined reheating process shorten as 160 minutes for high silicon steel, are not successfully

reach the heating may cause steel slab destruction.

5. Conclusion

The proper heating rates are the important factors of manufacturing ultra-thin electromagnetic

steel sheet. According to the investigation of the optimal heating rates from numerical study, an

experimental setup will be designed and developed by means of the similarity theory. Hence, a

heating furnace system will be built to simulate the heat process of ultra-thin electromagnetic

steel sheet.

Page 288: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

285

The effect of various heating rates on the fracture of ultra-thin electromagnetic steel sheet will

be verified by experimental method. However, this study forecasting model destruction

mechanism but ideal for ultra-thin electromagnetic steel sheet surface temperature under the

assumption that the establishment of optimum temperature control technology, but the furnace

device which is reachable target temperature is subject to a number of heat transfer parameters

impact. Therefore, the reliable heating processes of the heating furnaces will improve the

production of electromagnetic steel sheet and achieve energy saving requirements.

Acknowledgements

Thank the National Science Council (Ministry of Science, Project No.

NSC102-2622-E-006-032) and China Steel Corporation provide funding for research grants.

[1] H. S. Ko, J. S. Kim, and T. W. Yoon, Modeling and predictive control of a reheating

furnace, American Control Conference, 2000.

[2] V. Ditzhuijzen, D. Staalman, and A. Koom, Identification and model predictive control of

a slab reheating furnace, IEEE International Conference on Control Applications, 2002.

[3] C. K. Chao, J. Q. Chen, K. C. Yang, and C. C. Tseng, Creep crack growth on spent fuel

zircaloy cladding in interim storage, Theoretical and Applied Fracture Mechanics, 2007,

47(1), pp. 26–34.

[4] C. K. Chao, K. C. Yang, and C. C. Tseng, Rupture of spent fuel Zircaloy cladding in dry

storage due to delayed hydride cracking, Nuclear Engineering and Design, 2008, 238(1),

pp. 124–129.

[5] C. K. Chao, K. C. Yang, C. K. Chen, and C. C. Tseng, Effect of hydride embrittlement on

creep life of spent fuel cladding, Journal of the Chinese Institute of Engineers, 2011, 34(1),

pp. 107-121, .

[6] G. C. Sih , B. Macdonald ,Fracture Mechanics Applied To Engineering Problems-Strain

Energy Density Fracture Criterion, Engineering Fracture Mechanics, 1974, 6 .pp.361-386.

[7] E. Beltrami, AslleCondizioni di Resistenzadeicorpi Elastic, Rendiconto del RealeIstituto

Lombardo, Ser. II, Tomo XVIII, 1985.

[8] Instron ,2736 Series Manual Wedge Action Grips High Temperature (2736-015)

[9] Instron ,Guide to High Temperature Tensile Testing.

Page 289: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

286

SICASE-820

Direct Current Compressor for Vehicle Air Conditioning System in

Non-Electric Vehicles

Amirah Haziqah Zulkifli, Henry Nasution*,

Afiq Aiman Dahlan and Azhar Abdul Aziz

Automotive Development Center, Faculty of Mechanical Engineering,

Universiti Teknologi Malaysia, 81310 Skudai, Johor, Malaysia

*Corresponding Author: [email protected]

ABSTRACT

Vehicle air-conditioning (AC) system is the highest auxiliary load in the non-electric vehicle.

Belt-driven compressor adds a small speed-dependent parasitic load even when not in use. This

study investigates the possibility of direct current compressor to retrofit into an existing vehicle

AC system in the non-electric vehicle. Electric-powered present offer potential of low energy

consumption than their mechanical counterparts: electrically operated compressor can reduce

engine idle time and offering near zero parasitic loads when not in use. The experiment is done

using a compact hatchback car on a roller dynamometer to emulate the level road condition. An

experimental period of one hour is made at temperature setting of 25°C at 30 km/h vehicle

speed. The results indicate that the direct current compressor offers fuel saving of 8.26% at 30

km/h vehicle speed with improves cabin temperature inside the vehicle for better thermal

comfort.

Keyword: Performance, Direct Current Compressor, Vehicle Air Conditioning, Fuel

Consumption, Energy Efficiency

1. Introduction

Vehicle air conditioning (AC) system is the highest auxiliary load in a vehicle after alternator

and power steering [1]. The usage of current belt-driven compressor can increase NOx

emissions as much as 15-100% [2]. Lambert and Jones in their study found that around 12-17%

increment of vehicle fuel consumption is for AC operation [3].

Furthermore, belt-driven compressor is connected directly to the engine crankshaft, causing the

compressor speed to be dependent on engine crankshaft speed. Increment of compressor speed

would increase the compressor power consumption and thus higher energy is needed to operate

the AC system [4-5]. To increase overall energy consumption, the compressor speed must be

able to be controlled independently from the engine speed. Accordingly, the use of electric

compressor is seen as a solution to the problem.

Page 290: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

287

Direct current (DC) compressor for vehicle AC offers a benefit of decoupling the compressor

from the engine, decreasing parasitic load even when not in use. Decoupling the AC from the

engine can benefit to lower fuel consumption by downsizing the AC components as they no

longer require sizing for effective operation at low engine speed when idling [6].

In this manuscript, the feasibility study of DC compressor for vehicle AC system in the

non-electric vehicle is done. The DC is the best choice of electric compressor as it does not

need a power inverter that will be further down the energy-efficiency [4, 7]. Both the DC

compressor and belt-driven AC system performances are compared which both using the

original on/off controller inside the evaporator.

2. Coefficient of Performance

Coefficient of performance (COP) of a refrigeration cycle is defined as the ratio of the energy

removed at the evaporator to the energy supplied to the compressor. The general formula for

COP is:

com

e

W

Q

hh

hh

)(

)( COP

12

41 (1)

where h1, h2 (kJ/kg) are compressor inlet and outlet enthalpy respectively, h4 (kJ/kg) is

evaporator inlet enthalpy, Qe (kJ/kg) is refrigerating effect and Wcom is compression work.

3. Experimental Setup

Experiments are carried out on a Naza Suria, a compact hatchback vehicle with 1.2 cc gasoline

engine employing a DC compressor. Refrigerant HFC-R134a temperatures and pressures are

measured by a T-type thermocouples and pressure gauge, respectively. The temperature data

logger TC-08 from Pico Technology is used to log the temperature data into the computer.

Power input to the compressor is measured using a current transducer and logged into the

compressor. Specifications of the setup are given in Table 1.

Figure 1 shows the schematic diagram of the experimental setup. The DC compressor is

powered by the car battery which is charged by the alternator. The inverter acts as the speed

controller and placed under a front passenger‟s seat. Flow meter takes the refrigerant flow rate

so that COP can be acquired. Figure 2 shows the position of direct compressor inside engine

compartment. The DC compressor is placed behind a front bumper as there is no other place is

available because this is a compact car. Figure 3 shows the whole experimental setup of the

vehicle on the roller dynamometer.

Page 291: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

288

Table 1. Specification for Experimental Setup

Equipment Specification

Compressor Type: 12V DC, Hermetic reciprocating

Displacement: 7.5cm3

Speed range 1800-3700 rpm

Pressure meter Range 0-100 psi low side and 0-300 psi

high side

Thermocouple Type: T

Range -200 to -350C

Output signal: mV

Accuracy: ±0.4% of full scale

PicoLog temperature

data logger

Voltage mode: ±60 mV

Accuracy: ±0.5C

Fuel digital data

logger

Ono Sokki DF2420

Accuracy: ±0.1mL

Figure 1. Schematic diagram of DC compressor

Page 292: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

289

Figure 2. Compressor placed behind front bumper

Figure 3. Experimental setup of vehicle on roller dynamometer

4. Results and Discussion

Measured and calculated values were analyzed to define the performance of the DC

compressor. Performance comparisons were performed between belt-driven compressor and

DC compressor using evaporator on/off controller at vehicle speed of 30 km/h and 25C

temperature setting. Total duration for all tests was 5 hours, with a sampling frequency of 1

second. The ambient temperature is around 29-33C with relative humidity of 60-70%.

Comparison of the vehicle cabin temperature distribution is illustrated in Figure 4. The

refrigerator thermostat is set to provide 13C in the evaporator to have temperature inside

vehicle cabin of 25C. Figure 5 shows the evaporation temperature, respectively.

DC Compressor

Page 293: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

290

Figure 4. Temperature distributions for one hour cooling time

Figure 5. Evaporation temperatures for one hour cooling time

Figure 6. COP of electric compressor and belt-driven compressor

Page 294: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

291

Figure 7. Mass flow rate of electric compressor and belt-driven compressor

Figure 8. Cooling capacity of electric compressor and belt-driven compressor

Figure 9. Fuel consumption of vehicle

Figure 4-8 shows the temperature distribution, evaporation temperature, COP, mass flow rate

and cooling capacity for belt-driven compressor and various speed of direct compressor. It can

be seen that the temperature distribution of belt-driven compressor is lower by 9% because of

the higher cooling capacity of belt-driven compressor. The cooling capacity and mass flow rate

of the electric compressor increase as the compressor speed increase. Unfortunately, the COP

decrease in the compressor consumption is increasing with the increase of compressor speed.

Page 295: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

292

Fuel consumption of compressor speed at various vehicle speeds is illustrated in Figure 9. The

usage of DC compressor has a big impact on vehicle fuel consumption. The usage of electric

compressor managed to get up to 19.08 km/l for 1800 rpm compressor speed, saving 8.26% of

fuel compared to the belt-driven compressor.

4. Conclusion

In this study, performance of the compressor operation during on/off mode of the DC

compressor and belt-driven compressor has been compared. The comparisons are made in

terms of cooling capacity, COP and fuel consumption.

The fuel consumption usage of DC compressor is seen as a solution to decrease fuel

consumption and increase the temperature control, although it is using on/off control at the

expense of lower cooling capacity. Lowering cooling load inside vehicle cabin is the solution

to the problem.

According to the analysis, the DC compressor operation provides higher COP and lower fuel

consumption at all vehicle speed and internal heat load. This is because the lower power

consumption of the compressor. It is also noted that the vehicle cabin temperature reached the

set value with DC compressor earlier than the belt-driven compressor at all vehicle speed.

The DC compressor offers the potential of the intelligent controller to be implemented so that

the thermal comfort of passengers can be increased under variety of environment condition. So,

it is suggested to substitute the current on/off controller with variable-speed controller so that it

can control the compressor speed according to the cooling load inside vehicle cabin.

ACKNOWLEDGEMENTS

The research work is supported partially by the Knowledge Transfer Program (KTP), Vote No.

R.J130000.7809.4L509 and the Automotive Development Centre (ADC), Universiti Teknologi

Malaysia (UTM). The assistance of the technicians involved, their guidance and assistance are

gratefully acknowledged.

REFERENCES

[1] Khayyam, H., Nahavandi, S., Hu, E., Kouzani, A., Chonka, A., Abawajy, J., Marano, V.

and Davis, S. 2011. Intelligent Energy Management Control of Vehicle Air Conditioning

via Look-Ahead System, Applied Thermal Engineering, 31(16), 3147–3160.

[2] Welstand, J. S., Haskew, H. H., Gunst, R. F. and Bevilacqua, O. M. 2003. Evaluation of the

Effects of Air Conditioning Operation and Associated Environmental Conditions on

Vehicle Emissions and Fuel Economy, SAE Technical Paper, No. 2003-01-2247.

[3] Lambert, M. A. and Jones, B. J. 2006. Automotive Adsorption Air Conditioner Powered by

Page 296: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

293

Exhaust Heat. Part 1: Conceptual and Embodiment Design, Proceedings of the Institution

of Mechanical Engineers, Part D: Journal of Automobile Engineering, 220(7), 959-972.

[4] Nasution, H., Yamani, M. H. Z.and Sumeru, K. 2013. Performance Study of DC

Compressor for Automotive Air Conditioning System, Advanced Materials Research,

614-615, 674-677.

[5] Perang, M. R. M., Nasution, H., Latif, Z.A., Aziz, A. A. and Dahlan, A. A. 2013.

Experimental Study on the Replacement of HFC-R134a by Hydrocarbons in Automotive

Air Conditioning System, Applied Mechanics and Materials, 388, 111-115.

[6] Surampudi, B., Redfield, J., Montemayor, A., Gustavo R. and Gregory, O. 2006. Electric

Air Conditioning for Class 8 Tractors, SAE Technical Paper, No. 2006-01-01652006.

[7] Thomas, V. M., Meier, A. K., Gunda, S. G. and Wenzel, T. P. 2011. Cars are Buildings:

Building-Like Energy use in Automobiles, Transportation Research Part D: Transport and

Environment, 16(4), 341-345.

Page 297: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

294

SICASE-819

In-Cabin Temperature Control and Multi-Circuit Bus Air-Conditioning

Systems

Henry Nasution*, Azhar Abdul Azis,

Amirah Haziqah Zulkifli and Afiq Aiman Dahlan

Automotive Development Center, Faculty of Mechanical Engineering,

Universiti Teknologi Malaysia, 81310 Skudai, Johor, Malaysia

*Corresponding Author: [email protected]

ABSTRACT

In-cabin temperature control and multi-circuit bus air-conditioning systems were developed.

The system work dependent on the cooling load either one or more circuits will automatically

be switched on. One circuit of the system can have been varying speed in order to fine-tune the

cooling response time as the cooling load varies inside bus cabin. Variable-speed compressor

provides potential on the load-matching capability, energy saving and thermal comfort of the

passengers inside bus cabin. The experiments were conducted on a test rig with temperature

setting of 22°C for the conditioned space to evaluate the energy usage of the system with

thermostat and fuzzy logic (FLC) controllers. The results indicate that the proposed technique

can save energy and improve indoor comfort significantly for multi-circuit bus air-conditioning

systems compared to the existing system. The experimental results also showed that more

energy savings can be obtained through the use of FLC when compared to the thermostat

controller.

Keyword: Performance, Bus Air Conditioning, Multi Circuit, Energy Saving, Fuzzy Logic

Control

1. Introduction

Bus air conditioning (AC) system plays an important role to achieve thermal comfort for all the

passengers inside the cabin. Its operation is high transient conditions as the cooling load varies

caused by several factors such as opening a door, changing of sun load through the side glass

windows and number of passengers on board. At the same time, the system must be compact

and work efficiently to provide thermal comfort at the lowest energy usage. The high-energy

requirement for climatic control gives potential reduction of energy consumption [1].

The existing bus AC use only one AC system which worked at full speed and controlled via a

thermostat controller to get the temperature needed. This control technique is not efficient in a

high transient condition, such as in building, bus and car, caused by a relatively large

compressor capacity compared to the smaller refrigeration system. The thermostat controller

Page 298: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

295

will cause a very high inertia torque to the compressor when it is started suddenly from zero to

high speed, leading the system to behave in a prone manner and higher probability for the

compressor gets damaged quickly [2,3].

In this paper, a roof-top multi-circuit bus AC system has been proposed to overcome the

shortcomings of the existing system. This system can use more multiple AC circuits, which

shared the same evaporator surface or also knew as face-to face evaporator control. The

advantages of this system are its simple installation and maintenance at much lower energy

usage. This paper focuses on the development of the controllers for the multi-circuit bus AC

system to have better temperature control but with the lowest energy usage using fuzzy logic

control (FLC). The results will be compared to the existing system.

2. Principle of Multi-Circuit Bus Air-Conditioning

The arrangement of the current bus AC system components is shown in Figure 1. The

condenser, evaporator, receiver–drier and expansion valve is located on the roof of the bus

while the compressor is connected via belt-driven with the auxiliary engine. This system gives

full loads to one AC system, caused the temperature variation to be higher.

Figure 1. Conventional bus AC system

Page 299: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

296

Figure 2 shows schematic diagram of the proposed multiple-circuit bus AC system. The

principle is to split the circuit to smaller unit and driven by a different compressor, which one

has the compressor capacity of half of the total system and the remainder for other compressor

capacities. This study will have the same compressor capacity for both systems as if one

becomes inoperative, other system will hold the load until repair is done.

Figure 2. Multi-circuit bus AC system

3. Performance and Energy Analysis

The coefficient of performance (COP) of AC system is the ratio of the energy removed at the

evaporator to the energy supplied to the compressor. The following is the general formula of

the COP:

com

e

W

Q

hh

hh

)(

)( COP

12

41 (1)

where h1, h2 (kJ/kg) are the enthalpy at the compressor inlet and outlet respectively, h4 (kJ/kg)

is enthalpy at the evaporator inlet, Qe (kJ/kg) is the refrigerating effect, and Wcom (kJ/kg) is the

compression work.

Calculation of energy saving is expressed in terms of saving in percentage unit, based on the

difference of energy consumption using thermostat controller and FLC. The equation is:

100)/(

)()/(

energyoffon

energyFLCenergyoffonSavingEnergy (2)

Page 300: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

297

4. Controller Algorithm

FLC block diagram for controlling cabin temperature is shown in Figure 3. The block diagram

shows a two-input and one-output FLC where the input variables are temperature error (e) and

temperature rate-of-change-of-error (e). The output variable of the FLC is the frequency of

the supply current to the compressor electric motor (Z).

Figure 3. FLC algorithm block diagram

The three principal phases for FLC are fuzzification, inference mechanism and defuzzification.

Fuzzification process transforms the defined value into fuzzy value. Inference mechanism

determines the output value depending on the rules fixed to the actual process. Defuzzification,

on the other hand, transforms the fuzzy output into a defined value [4].

Table I showed the fuzzy associate map of the fuzzy controller method. The nine linguistic

variables marked with the following labels: hot (H), normal (N), cool (C), negative (NE),

normal (NO), positive (PO), slow (SL), normal (NM) and fast (FT), are used to characterize the

input and output variables. Triangular type (Figure 4) for the membership function is used

because it is the fastest [1]. (e) and (e) covered the range between -2°C and 2°C. Z is a range

between 0 to 5Vdc.

Table 1. Fuzzy associative map [1]

Z e

H N C

e

NE SL SL SL

NO SL SL SL

PO FT NM SL

(a) Input (b) Output

Figure 4. Triangular membership functions for inputs and output [1]

Defuzzification method adopted is by determination of the center of gravity or centroid.

Microsoft Visual Basic is used to build the control algorithm. This algorithm provides the

Page 301: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

298

output variable of voltage signal to continuously control the compressor speed through the

inverter.

5. Experimental Setup and Testing Procedure

The schematic diagram of the experimental setup is shown in Figure 5. The system is made up

of the original components from bus AC system and arranged to emulate the actual bus.

Electric heater is laid in the main air duct between main cabin and evaporators to simulate the

cabin cooling load from the passengers. Latent heat is then achieved through the mixing of

outside air and cooled air from the evaporator.

Figure 5. Schematic diagram of the experimental rig

The parameter needed that is temperature, pressure and mass flow rate is measured at locations

indicated in Figure 5. The temperatures of the refrigerant into the system and the air

temperatures inside the cabin are detected by thermocouples. The thermocouples to detect the

temperature of refrigerant inside the system were inserted into the copper tubes. There were

five thermocouples inside the simulated passenger cabin, and nine pressure gauges to measure

the refrigerant circuit. The mass flow rate of the refrigerant was measured using flow meter for

R134a.

A control system is installed to control the compressor speed, consisting of a thermocouple

inside cabin, thermostat and FLC subroutine installed on a computer, an inverter and an electric

motor. The thermocouples detecting the temperature inside simulated cabin and sent to the

controller and computer. The output function of the error between the value of the monitored

temperature and the required set-point temperature is then emitted by the computer to the

inverter, which varied the electrical frequency supplied to the motor such that it is linearly

Page 302: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

299

proportional to the control signal. The experiments were conducted with: variable speed,

thermostat and FLC at 22C setup temperature.

6. Result and Discussion

Steady-state cabin temperature and energy consumption at various frequencies is shown in

Figure 6. The test is done in a one-hour test period. The results indicate that the energy

consumption of the system is dependent on motor frequency. As the frequency increases, the

energy consumption increases while the temperature inside the cabin is lower.

Figure 6. Steady state cabin temperature, energy consumption, and COP for variable speed

compressor

Figure 7. Temperature responses for thermostat and FLC

Figure 7 shows the temperature response for all controllers as a function of a time interval. The

thermostat controller turns on the compressor when it reaches upper limit and turns off the

compressor when it reaches lower limit setup temperature. As the compressor turned off, the

cooling load increases and the time taken into the compressor to turn on is fast, allowing cabin

temperature to be attained at temperature setup. The FLC, on the other hand, controlled the

compressor motor speed to minimize the error between the setup temperature and current cabin

temperature. If the error is big, the compressor will be set at the highest speed to cool down the

y = 38.704x-0.171 R² = 0.9386

y = 0.0191x1.4793 R² = 0.9997

y = 9.8124x-0.181 R² = 0.796

Ener

gy (

kWh

), C

OP

Cab

in T

emp

erat

ure

(oC

)

Frequency (Hz)

Cabin Temperature (C) Energy (kWh) COP

Te

mp

era

ture

(oC

)

Time (minute)

Setpoint Thermostat FLC

Page 303: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

300

cabin faster. It can be seen from the figure that the temperature for the FLC is nearer to the

temperature setup compared to the thermostat controller throughout the one-hour test period.

Figure 8 shows the energy consumption of the system with thermostat and FLC. The energy

consumption was taken from the beginning of the start of the motor to the end of the one-hour

period time. The energy saving calculated is expressed in terms of percentage saving based on

the thermostat controller. The FLC shows the most energy saving of 61.66% compared to the

thermostat controller.

Figure 8. Energy consumption for thermostat and FLC

7. Conclusion

The results of the bus multi-circuit AC system with variable speed, thermostat and FLC

controller have been obtained. The results indicate that the speed of compressor can be changed

by varying the frequency for the inverter. The power consumption and cabin temperature is

directly dependent upon the frequency for the inverter. As the frequency increase, steady state

of cabin temperature will decrease while the energy consumption increases.

This study indicates that the cabin temperature can be controlled by the inverter driven

compressor to obtained better temperature control and energy saving through the usage of the

bus multi-circuit AC system. The study also concluded that FLC is a better energy-saving

control for the proposed system.

ACKNOWLEDGEMENTS

The research work is supported partially by the Knowledge Transfer Program (KTP), Vote No.

R.J130000.7809.4L509 and the Automotive Development Centre (ADC), Universiti Teknologi

Malaysia (UTM). The assistance of the technicians involved, their guidance and assistance are

gratefully acknowledged.

數列1,

Thermostat, 4.51

數列1, FLC,

1.73

Ener

gy C

on

sum

pti

on

(kW

h)

Controllers Mode

Page 304: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

301

REFERENCES

[1] Nasution, H., Energy analysis of an air conditioning system using PID and fuzzy logic

controllers, PhD Thesis, Universiti Teknologi Malaysia, Malaysia, 2006.

[2] Mansour, M. K. M., Development of roof-top bus air-conditioning system that responds to

cooling load variations in tropical countries, PhD Thesis, Universiti Teknologi Malaysia,

Malaysia, 2007.

[3] Kaynakli O. and Horuz, I. 2003.An Experimental Analysis of Automotive Air Conditioning

System, Int Comm Heat and Mass Trans, 30, 273-284.

[4] Aprea, C., Mastrullo, R. and Renno, C. 2004. Fuzzy Control of the Compressor Speed in a

Refrigeration Plant, International Journal of Refrigeration, 27 (6), 639-648.

Page 305: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

302

Poster Presentation

Poster Session (1)

Biomedical Engineering / Biological Engineering / Natural Science

2015/6/27 Saturday 13:30-14:30 4F Pre-Function Area

SICASE-745

Swelling Characterization of Photo-Cross-Linked Gelatin Methacrylate Spherical

Microgels for Biomedical Applications

Jinmu Jung︱Chonbuk National University

Hyojae Kim︱Chonbuk National University

Kyoungin Kang︱Chonbuk National University

Jonghyun Oh︱Chonbuk National University

SICASE-797

Effect of Titanium Content on Structural and Sensing Properties of TbTixOy Sensing

Films for Electrolyte-Insulator-Semiconductor Sensors

Tung-Ming Pan︱Chang Gung University

Bo-Rong Peng︱Chang Gung University

Chih-Wei Wang︱Chang Gung University

Wu-Shiung Feng︱Chang Gung University

Lifeng Chi︱Westfälische Wilhelms-Universität

SICBENS-1287

Development and Evaluation of ELISA for Diagnosis of Cystic Echinococcosis

Aitbay Bulashev︱Seifullin Kazakh Agrotechnical University

Orken Akibekov︱Seifullin Kazakh Agrotechnical University

Gulmira Abulgazimova︱Seifullin Kazakh Agrotechnical University

Page 306: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

303

SICBENS-1306

Application of Hydroxynitrile Lyase from Prunus Amygdalus Turcomanica in Kinetic

Resolution of Racemic Mandelonitrile

Dilek Alagöz︱University of Ç ukurova

Deniz Yildirim︱University of Ç ukurova

Seyhan Tükel︱University of Ç ukurova

SICBENS-1330

Immature Seed as a Novel Explant for Indirect Somatic Embryogenesis in a Woody Tree;

Dalbergia Sissoo Roxb

Hafiz Mamoon Rehman︱Chonnam National University

SICBENS-1334

Cross-Linked Enzyme Aggregates of Hydroxynitrile Lyase from Wild Appricot

Deniz Yildirim︱University of Cukurova

Dilek Alagöz︱University of Cukurova

Seyhan Tükel︱University of Cukurova

SICBENS-1333

A Method to Prepare Large Amount of Sg-6 Saponins from Wild Soybean Seeds

Mei Itabashi︱Chonnam National University

Ayaka Kurosaka︱Iwate University

Panneerselvam Krishnamurthy︱National Academy of Agricultural Sciences

Chigen Tsukamoto︱Iwate University

Tai-Sun Shin︱Chonnam National University

Seung Hwan Yang︱Myongji University

Gyuhwa Chung︱Chonnam National University

SICBENS-1336

The Cases Study and Species Selection(Butterfly, Plant) for the Butterfly Garden

Landscaping

Jinkwan Son︱National Academy of Agricultural Science, RDA

Siyoung Lee︱National Academy of Agricultural Science, RDA

Jongku Kim︱National Academy of Agricultural Science

Minjae Kong︱Relationship of Dankook Univ. and Rural Development Administration

Donghyeon Kang︱National Academy of Agricultural Science

Page 307: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

304

SICBENS-1303

Response of Red Blood Cell ATPase Activity in Freshwater Fish(Oreochromis Niloticus)

Exposed to Copper in Differing Ca2+ Levels

Gülüzar Atli︱Cukurova University

Esin G. Kanak︱Cukurova University

Mustafa Canli︱Cukurova University

Page 308: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

305

SICASE-745

Swelling Characterization of Photo-Cross-Linked Gelatin Methacrylate

Spherical Microgels for Biomedical Applications

Jinmu Jung, Hyojae Kim, Kyoungin Kang, Jonghyun Oh*

Division of Mechanical Design Engineering, Chonbuk National University, Korea *[email protected]

Abstract

This study reported the swelling characteristics of photo-cross-linked gelatin methacrylate

(GelMa) spherical microgels for biomedical applications. Spherical microgels were generated

in a microfluidic system consisting of a co-axial flow-focusing device and an ultraviolet (UV)

irradiation apparatus. At a low flow rate ratio (< 0.14), the 9 wt.% GelMa spherical microgels

were smaller than the 6 wt.% ones. In contrast, at a high flow rate ratio, the results were

reversed. The increased GelMa concentration improved the mechanical properties and

increased the swelling ratios. The possibility of bioencapsulation was demonstrated, with good

viability of 3T3 cells encapsulated in the spherical microgels.

Keyword: Microfluidic, hydrogel, emulsion, spherical microgel, flow focusing

1. Introduction

Polymer microspheres have been employed as a flexible platform for biological or medical

applications such as cell delivery, drug delivery, drug release, and diagnostics [1–3]. Therefore,

in this study, a flow-focusing, glass capillary-based microfluidic device was employed to

generate microdroplets made of GelMa hydrogel. Inexpensive and cell-responsive GelMa has

methacrylate groups along the gelatin backbone, which allows microdroplets to be cross-linked

under filtered ultraviolet (UV) irradiation. The proposed microfluidic system facilitated both

the generation and the polymerization of microdroplets without an additional process. GelMa

microdroplets were controlled by size with flow rates of between 50 and 300 μl/h. The swelling

behavior of cross-linked GelMa microspheres was studied by observing microspheres in oil

and phosphate-buffered saline (PBS). The possibility of bioencapsulation was investigated

through 3T3 cell encapsulation in a polymer microsphere.

2. Experiments

Figure 1 shows a schematic illustration of the co-axial flow-focusing device used to generate

droplets. The microfluidic device using circular glass capillaries could provide several benefits

for forming microdroplets, such as high chemical resistance, precise control of surface

wettability, and true three-dimensional co-axial flow-focusing geometry. The GelMa

prepolymer solution was defined as the dispersed phase, while the oil phase was the continuous

Page 309: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

306

phase. As two immiscible fluids (GelMa prepolymer solution and oil) were brought into

contact at the co-axial channel, the dispersed phase (GelMa prepolymer solution) was

compressed and broken up into monodisperse, spherical droplets.

A suitable photo-polymerization process for forming a GelMa spherical microgel was

conducted using UV irradiation. After exiting from the outlet of the microfluidic flow-focused

device, the aqueous droplets formed with the GelMa prepolymer solution flowing out via a

Tygon tubing (0.3 mm ID and 0.25 mm thick, Saint-Gobain Performance Plastics Co., Akron,

OH, USA). In the presence of a water-soluble photo-initiator (Irgacure 2959), the droplets

passing through the tubing were exposed to filtered UV light (320– 500 nm) for 5 min

(OmniCure S2000, Lumen Dynamics, Mississauga, ON, Canada).

As shown Figure 2, greater swelling ratios were observed with the greater GelMa concentration.

As shown in Figure 3, as a result of the overall swelling in PBS for 24 h (from 0 to 24 h), the

mean swelling ratio of 6 wt.% GelMa spherical microgels was 94.1 ± 27.9%, while the 9 wt.%

GelMa spherical microgels showed a greater mean swelling ratio of 182.0 ± 22.4%.

The stiffness of the GelMa spherical microgels was investigated using compressive strength

tests. In Figure 3, compressive stress-strain curves were obtained for two different GelMa

concentrations (6 and 9 wt.%). From the stress-strain curves, the elastic modulus was

calculated as 1.35 ± 0.20 and 1.94 ± 0.31 kPa for the 6 and 9 wt.% of GelMa hydrogels,

respectively (p < 0.01).

In the NIH/3T3 cell viability test results as shown in Figure 4, they demonstrated that the

microdroplet generation and polymerization processes using GelMa were non-cytotoxic and

biocompatible in the microfluidic system.

Acknowledgement

This research was supported by Basic Science Research Program through the National

Research Foundation of Korea (NRF), funded by the Ministry of Education

(NRF-2013R1A1A2058875 and 2014R1A1A1006388).

References

[1] Mathiowitz E, Jacob JS, Jong YS, et al. Biologically erodible microspheres as potential oral

drug delivery systems, Nature, Vol. 386, 1997, pp.410–414.

[2] Radovic M, Vranjes-Duric S, Nikolic N, et al. Development and evaluation of 90Y-labeled

albumin microspheres loaded with magnetite nanoparticles for possible applications in

cancer therapy, Journal of Materials Chemistry, Vol.22, 2012, pp.24017–24025.

[3] Freiberg S, Zhu XX. Polymer microspheres for controlled drug release, International

Page 310: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

307

Journal of Phamaceutics, Vol.282, 2004, pp.1–18.

Page 311: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

308

Page 312: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

309

SICASE-797

Effect of Titanium Content on Structural and Sensing Properties of

TbTixOy Sensing Films for Electrolyte-Insulator-Semiconductor Sensors

Tung-Ming Pan*, Bo-Jung Peng, Chih-Wei Wang, Wu-Shiung Feng

Chang Gung University, Taiwan *[email protected]

Lifeng Chi

Westfälische Wilhelm, Universität, Germany

Abstract

This paper describes the impact of titanium content on the structural properties and sensing

characteristics of TbTixOy sensing films deposited on Si substrates through reactive

co-sputtering. X-ray diffraction and Auger electron spectroscopy were used to study the

structural and chemical features of these films as functions of the growth conditions (Ti plasma

power from 80 to 120 W). The observed structural properties were then correlated with the

resulting pH sensing performances. The TbTixOy electrolyte-insulator-semiconductor device

prepared under a Ti plasma condition of 100 W exhibited the best sensing characteristics,

including pH sensitivity, hysteresis and drift. We attribute this behavior to the optimal titanium

content and annealing temperature in this oxide film forming a well-crystallized Tb2Ti2O7

structure and a smoother surface.

Keyword: electrolyte-insulator-semiconductor (EIS), plasma power, TbTixOy, pH sensitivity.

1. Introduction

An ion-sensitive field-effect-transistor (ISFET) device has attracted significant attention in the

field of chemical sensors because it offers advantages of very small size, rapid response time, high

input impedance, and low output impedance [1]. Besides, this device is compatible with a

standard complementary metal-oxide-semiconductor (CMOS) process [2]. The concept of ISFET

device is based on the theory of metal-oxide-semiconductor field-effect transistor (MOSFET),

where metal gate is substituted by the electrolyte and a reference electrode. To realize an ISFET,

the investigation of the insulator material is a very important part of the process, because it is

directly exposed to the buffer solution. As a result, the insulator film is responsible for the

detection of the specimens because a change in the pH concentration induces the variations in the

electrolyte–insulator surface potential, which gives rise to the alterations in the insulator–

semiconductor electric field interface, channel conductance and current modulation. To promote

the sensitivity of an ISFET device, the nanoscale ISFETs are developed [3-4]. However, the

traditional SiO2 gate oxide in most Si-based MOSFET devices has been scaled close to its

Page 313: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

310

physical thickness limit. To reduce the gate leakage current, high dielectric-constant (high-κ)

materials are being considered as a possible replacement of SiO2 as the gate insulator to provide a

physically thicker film for the same electrically equivalent oxide thickness [5-6].

In recent years, various high-κ dielectric materials (e.g., HfO2, ZrO2, Ta2O5, TiO2, Gd2O3) [7-11]

have been used as pH-sensitive membranes in electrolyte-insulator-semiconductor (EIS) devices

due to their good sensing performance. Desirable high-κ dielectric materials must have good

thermodynamic stability in direct contact with silicon. Some articles, however, have reported the

formation of an interfacial layer between the high-κ dielectric and Si [5-6]. Rare-earth (RE) oxide

thin films are one of the promising candidates to substitute the conventional SiO2 films in

nanoscale CMOS device applications due to their high-κ values, high resistivities, and large

bandgap energies [12-13]. Among them, Tb2O3 (terbium oxide) film has received a lot of

attraction as a promising high-κ gate dielectric due to its potential properties, such as a high

conduction band offset, large band gap, and good thermal stability [14-15]. Although RE oxide

film has been proposed to be one of the promising gate insulator materials for future nanometer

CMOS technology, device instabilities associated with the moisture absorption due to oxygen

vacancies or defects in the film are still the major problems [16]. To eliminate the problem, the

incorporation of Ti or TiO2 into the RE dielectric films can result in improved physical and

electrical properties because it reduces the reaction of the dielectric film with water [17].

Nevertheless, to the best of our knowledge, the properties of TiOx incorporated Tb2O3 (TbTixOy)

and their performance in resulting EIS-based pH sensors have yet to be reported.

2. Experimental

The EIS structures featuring a TbTixOy sensing membrane were fabricated on 4-in. p-type Si

(100) wafers. Before the deposition of TbTixOy films, the wafers were cleaned using a standard

RCA process and then treated with 1% HF to remove the native oxide. A TbTixOy film (~70

nm thick) was deposited on the Si substrate through cosputtering from a terbium and a titanium

target in diluted O2 environment. The terbium rf-plasma power was 100 W, while the same for

titanium was varied from 80 to 120 W. Subsequently, samples were annealed in O2 ambient for

30 s through rapid thermal annealing (RTA) at 900 °C to form Tb2Ti2O7. A 400-nm-thick Al

film was deposited on Si for good electrical backside contact. The dimensions of the sensing

film were defined through a standard photolithography process using SU8-2005 (MicroChem,

U. S.) as a photoresist. EIS devices were then assembled on a printed circuit board using a

conductive Ag gel. A handmade epoxy package was employed to encapsulate the EIS sensor

and the Cu line.

The film structure of the TbTixOy films prepared under different Ti rf-plasma power conditions

was investigated through X-ray diffraction (XRD) analysis. The compositional depth profiles

of TbTixOy films were measured using and Auger electron spectroscopy (AES).

Page 314: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

311

The pH sensitivity, hysteresis voltage, and drift rate of the TbTixOy sensing films were

determined by capacitance–voltage (C–V) curves of EIS devices. The C–V curves for different

pH buffer solutions (Merck Inc.) were measured through Ag/AgCl reference electrode

(commercial liquid-junction electrode) using a Hewlett-Packard (HP) 4284A precision LCR

meter.

3. Results and Discussion

We used XRD to explore the crystalline structures of the TbTixOy films prepared under

different Ti power conditions (Fig. 1). The significant difference in sharpness, intensity, and

orientation of the diffraction peak was observed, implying that the crystal growth and

crystallinity of the TbTixOy films are strongly affected by the content of titanium in the film.

The crystal structure of Tb2Ti2O7 film is face-centered cubic. In the 80 W power condition,

only one Tb2O3 (400) peak was found in the XRD pattern, suggesting an amorphous TbTixOy

structure with low Ti content. In particular, the film prepared under the 100 W condition

exhibited a stronger Tb2Ti2O7 2O3 (400) peak, indicating that

the Tb2Ti2O7 film had a preferred orientation along the (222) direction. We attribute this

behavior to the reaction of the Ti atom with Tb2O3 to form a better stoichiometry Tb2Ti2O7

structure. Furthermore, the intensity of the Tb2Ti2O7 (222) peak became low for the 120 W

Page 315: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

312

condition. Therefore, the content of titanium in the Tb2O3 film was an important factor for the

growth of homogeneous crystalline Tb2Ti2O7 films.

Fig. 2 displays the AES depth profiles of Tb, Ti, and O elements in the TbTixOy films for

different Ti power conditions. Under the 80 W condition, the Tb, Ti, and O concentrations

versus thin film depth stayed constant in the bulk with an O content of roughly at 30 at.% and a

Tb:Ti ratio of roughly 3:1, as shown in Fig. 2(a). It is clear that the content of Ti increases from

~15 to ~30 at.% with increasing the Ti plasma power from 80 to 120 W. In the AES profile, the

O content in the film prepared at the 100 W condition is almost the same as that of the film at

the 80 W condition, while the Tb:Ti ratio of the 100 W condition is approximately 2:1.

Furthermore, the Tb:Ti ratio of the sample prepared under the 120 W condition became 1:1,

whereas the O content of this condition increased to about 40 at.%.

The flatband voltage (VFB) of an EIS device is the most important measurable parameter; it is

defined in terms of the following equation [18]:

ox

effSisol

refFBC

Q

qEV

0

(1)

where Eref is the potential of the reference electrode (Ag/AgCl here considered), ψ0 is the

surface potential, χsol

is the electrolyte-insulator surface dipole potential, ΦSi is the silicon

workfunction, Qeff is the effective charge induced in the semiconductor by the various types of

charges that may be present in the oxide, and Cox is the gate oxide capacitance per unit area. In

this equation, all terms are constant except for ψ0, which can influence the dissociation of the

insulator surface groups, resulting in the EIS device sensitive to the electrolyte pH. The

relationship between the surface potential and the pH of the tested solution can be described

using the combination of the site-binding theory and Gouy–Chapman–Stern model [18-19],

which include properties of the gate oxide and buffer solution. The pH sensitivity of the gate

oxide surface is given as

Page 316: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

313

with,30320

q

Tk.

pH

B

s

int

difB

q

TCk.

2

30321

1

(2)

where is a dimensionless sensitivity parameter, which varies between 0 and 1, kB is

Boltzmann‟s constant, T is the absolute temperature, q is the electron charge, Cdif is the

differential capacitance, and int is the intrinsic buffer capacity. The is related to the intrinsic

buffer capacitance of the gate oxide and the ionic concentration of the buffer solution. These

two factors are determined by the sensing material, process, and electrolyte tested.

Page 317: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

314

To evaluate the sensing performance of the TbTixOy EIS device, we recorded a set of C–V

curves at pH ranging from pH 2 to pH 12. Figs. 3(a)-(c) show the pH-dependence of one group

of C–V curves for the TbTixOy EIS devices for three Ti plasma power conditions. These

normalized C–V curves were shifted as a result of the change in the number of hydrogen ion on

the sensing membrane. The TbTixOy EIS sensor exhibited distorted C–V curves, as has been

reported in the literature [20], presumably because of the existence of interfacial traps in the

oxide. Fig. 4 demonstrates the pH-dependence of the reference voltage (the voltage required to

achieve a normalized capacitance of 0.5) of the TbTixOy EIS devices fabricated under three

plasma power conditions. The TbTixOy EIS device prepared at the 100 W condition exhibited a

larger sensitivity of 69.31 mV/pH than those of the other conditions. This result could be

attributed to the optimal titanium content in the film forming a well-crystallized Tb2Ti2O7

structure, as evidenced from the results in Fig. 1.

Apart from the sensitivity detection, hysteresis and drift characteristics are two other critical

performance features affecting the success of an EIS sensor. Hysteresis phenomena can be

described through a surface-site model by assuming a portion of the sites respond slowly to pH

changes because of imperfections in the sensing film, resulting in the formation of porous

structures [9, 21]. The interior sites of these porous defects can react with ions present in the

tested solution, thus causing a hysteresis response. Another possible cause is the interaction of

the ions in the tested solution with the responding sites along the boundaries of grains on the

sensing film [9, 21]. We subjected the TbTixOy EIS sensors to pH loop of 747107

over a period of 1500 s. The hysteresis voltage is defined herein as the difference between the

initial and terminal reference voltages measured in this cycle. Fig. 5(a) indicates that the

TbTixOy EIS device prepared under the 100 W condition had a small hysteresis voltage of 3

mV in the pH loop of 747107. In contrast, the TbTixOy EIS device fabricated at the

120 W condition exhibited a hysteresis voltage of ~6 mV higher compared with other

conditions. This could be due to the high titanium content in the TbTixOy film producing a

large number of crystal defects.

Page 318: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

315

The drift characteristics of an EIS sensor can be explained by a hopping and/or trap-limited

transport mechanism [22-23] to affect the rate of hydration of the sensing film. Such an EIS pH

sensor is related to the penetration of ions from the electrolytes into the sensing film [24].

Charged electrolytes can penetrate the hydrated layer of a sensing film to cause a decrease in

the effective gate dielectric thickness [9]. The change in gate capacitance induces nonideal

effects during EIS pH sensing. On the basis of the model proposed by Jamasb et al. [25], the

REF) can be expressed as:

t

nfni

nfni

neffinvscREF etQQQ)t(V 1 (3)

where Qsc and Qinv stand for the space charge and inversion charge, respectively. ni and nf

represent the dielectric constant of the original sensing layer and the hydrated layer,

respectively. tn

associated with structural relaxation. represents the dispersion parameter whose value lies

0< <1. From equation (3), drift is related to the hydrated layer thickness of sensing film. Fig.

5(b) displays the drift characteristics of the TbTixOy EIS sensors prepared under three Ti

plasma conditions and measured in solutions of pH 7 for 12 h. The drift coefficient was

evaluated from the slope of the drift characteristics. The change in the reference voltage can be

described as VREF=VREF(t)–VREF(0). In general, a drift behavior is regarded as a superposition

effect of a chemical and an electrical change at the surface of the gate oxide [21]. The chemical

change indicates the hydration dispersive transport whose degree was determined by both the

hydration species and the material properties of the sensing film. The TbTixOy EIS device

fabricated at 100 W condition exhibited the best long-term stability (slope=0.118 mV/h); in

contrast, the EIS capacitor under 80 W condition featured a serious drift of 0.327 mV/h. The

lower drift effect of TbTixOy EIS device fabricated at the 100 W can be manifested as the lower

capacitance of hydrated layer due to the optimal titanium content in the TbTixOy film reducing

the crystal defects. Consequently, the overall capacitance of the combination of the hydrated

and unhydrated sensing layer was close to the capacitance of the original layer. The higher drift

rate of EIS device processed under 80 W condition essentially is due to the higher capacitance

value of the hydrated layer.

4. Conclusion

We fabricated high-κ TbTixOy sensing films on Si substrates through reactive rf sputtering under

three Ti plasma power conditions. The optimal condition was a Ti plasma power of 100 W; the

resulting sensing film exhibited the well-crystallized Tb2Ti2O7 structure (from XRD) and the

Tb:Ti ratio of about 2:1 (from AES) as a result of the optimal titanium content present in the

TbTixOy film.

Page 319: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

316

The EIS device using the high-κ TbTixOy sensing film exhibited a high pH sensitivity of 69.31

mV/pH, a low hysteresis voltage of 3 mV, and a small drift rate of 0.118 mV/h. The high-

TbTixOy film is a promising sensing membrane for use in future biomedical engineering

applications.

Acknowledgments

We thank the Chang Gung Memorial Hospital and the National Science Council of the Republic

of China, Taiwan, for financially supporting this research under contracts CMRPD2C0031 and

NSC 98-2221-E-182-056-MY3, respectively.

5. References

P. Bergveld, Sens. Actuators B, vol. 88, p. 20, 2003.

T. Matsuo and M. Esashi, Sens. Actuators, vol. 1, p. 77, 1981.

J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, K. Cho, and H. Dai, Science, vol.

287, p.622, 2000.

Y. Cui, Q. Wei, H. Park, and C. M. Lieber, Science, vol. 293, p. 1289, 2001.

G. D. Wilk, R. M. Wallace, and J. M. Anthony, J. Appl. Phys., vol. 89, p. 5243, 2001.

H. R. Huff, and D. C. Gilmer, High Dielectric Constant Materials: VLSI MOSFET

Applications, Springer: Berlin, 2005.

V. Jankovic, and J. P. Chang, J. Electrochem. Soc., vol. 158, p. P115, 2011.

D. Sobczynska and W. Torbicz, Sens. Actuators, vol. 6, p. 93, 1984.

L. Bousse, S. Mostarshed, B. van der Schoot,and N. F. de Rooij, Sens. Actuators B, vol. 17, p.

157, 1994.

S. P. Pogorelova, A. B. Kharitonov, I. Willner, C. N. Sukenik, H. Pizem, and T. Bayer, Anal.

Chim. Acta, vol. 504, p. 113, 2004.

J. L. Her, M. H. Wu, Y. B. Peng, T. M. Pan, W. H. Weng, S. T. Pang, and L. Chi, Int. J.

Electrochem. Sci., vol. 8, p. 606, 2013.

J. Paivasaari, M. Putkonen, and L. Niinisto, Thin Solid Films, vol. 472, p. 275, 2005.

O. Engstrom, B. Raeissi, S. Hall, O. Buiu, M. C. Lemme, H. D. B. Gottlob, P. K. Hurley, and

K. Cherkaoui, Solid-State Electron., vol. 51, p. 622, 2007.

L. Petit, A. Svane, Z. Szotek, and W. M. Temmerman, Phys. Rev. B, vol. 72, p. 205118, 2005.

M. Fanciulli and G. Scarel, Rare Earth Oxide Thin Film: Growth, Characterization, and

Applications, Springer: Berlin, 2007.

Y. Zhao, K. Kita, K. Kyuno, and A. Toriumi, Appl. Phys. Lett., vol. 89, p. 252905, 2006.

R. B. van Dover, Appl. Phys. Lett., vol. 74, p. 3041, 1999.

P. Bergveld and A. Sibbald, Comprehensive Analytical Chemistry. v. 23. Analytical and

Biomedical Applications of Ion-Selective Field-Effect Transistors, Elsevier Science

Publishing Company Inc: New York, 1988.

R. E. G. van Hal, J. C. T. Eijkel, and P. Bergveld, Sens. Actuators B, vol. 24-25, p. 201,1995.

Page 320: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

317

T. M. Pan and C. W. Lin, J. Phys. Chem. C, vol. 114, p. 17914, 2010.

L. Bousse, H. H. van den Vlekkert, and N. F. de Rooij, Sens. Actuators B, vol. 2, p. 103, 1990.

H. Scher and E.W. Montroll, Phys. Rev. B, vol. 12, p. 2455, 1975.

G. Pfister and H. Scher, Phys. Rev. B, p. 15, vol. 2062, 1977.

L. Bousse, N. F. de Rooij, and P. Bergveld, IEEE Trans. Electron Devices, vol. 30, p. 1263,

1983.

S. Jamasb, S. D. Collins, and R. L. Smith, IEEE Trans. Electron Devices, vol. 45, p.1239,

1998.

Page 321: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

318

SICBENS-1287

Development and Evaluation of ELISA for Diagnosis of Cystic

Echinococcosis

Aitbay Bulashev*, Orken Akibekov, Gulmira Abulgazimova

Seifullin Kazakh Agrotechnical University *[email protected]

Echinococcus granulosus is the causative agent of cystic hydatid disease in domestic

herbivorous animals and man. Immunological tests used in the diagnosis of echinococcosis are

based on phenomena of precipitation and agglutination. In recent years different options of

highly sensitive methods, such as Enzyme-linked immunosorbent assay (ELISA) and Lateral

Flow Test are being introduced into practice. However, accurate diagnosis of the infection

requires highly specific antigens to be used in immunoassays.

The aim of our research was to develop and evaluate ELISA-test based on monoclonal

antibodies (MAb) for the identification of animals infected with cystic echinococcosis that

would allows to monitor this invasion in the endemic areas and detect infected herds prior to

slaughter.

Antigens prepared from hydatid cyst envelope (HE), hydatid cyst fluid (HF) and

excretory-secretory products (ES) of E. granulosus were tested in order to select as an

immunogen for hybridoma technique. SDS-PAGE electrophoresis of HE, HF and ES showed

the presence of 9, 11 and 5 protein bands with the molecular weights in the range of 8-205 kD,

12-38 kD and 19-63 kD, respectively. According to the results of immunoblotting protein

fractions of ES had the most expressed antigenic properties. In this regard, it was selected for

the immunization of Balb/c mice to get immune lymphocytes for hybridization with myeloma

cells.

Mab 3B1G10 specific to the protein of E. granulosus ES with molecular weight of 21 kDa

were selected for further research. Antobodies‟ titers in the culture and in ascites fluids were

equal to 1:1024 and 1:25600, respectively. Mab belong to IgM isotype and did not react with

similar antigens of heterogeneous parasites.

The principle of detecting specific antibodies in serum by sandwich-ELISA was based on the

selective sensitization of the solid phase with specific protein from the composition of ES-Ag

with the help of Mab 3B1G10. Sera samples were obtained from 108 cows of endemic areas at

slaughterhouse and were used to determine the diagnostic value of sandwich-immunoassay in

comparison with its indirect variant. According to the results of autopsy cystic echinococcosis

Page 322: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

319

(cysts with protoscoleces in lungs and liver, calcified echinococcal foci, acephalocysts) were

found in 21 (19,4%) cows. Both variants of ELISA detected the presence of antibodies in

serum of 9 cows with hydatid cysts protoscoleces or 42,9% of the total number of infested

animals. In 2 heards with calcified foci (9,5%) and in 5 animals with acephalocysts (23,8%)

specific antibodies were not found by the compared tests. Cows with acephalocysts and

calcified foci showed positive results by indirect-immunoassay in 4 cases (19,0%), whereas

antibodies in sandwich-immunoassay were revealed only in the serum of 1 head with

acephalocysts (4,7%). Moreover, indirect-ELISA gave false-positive results in serological

testing 2 cows 1 of which had pulmonary tuberculosis and the other had no visible changes in

the internal organs. Thus, sandwich-ELISA on the basis of Mab 3B1G10 directed to E.

granulosus ES was more specific than its indirect option for diagnosis of cystic

echinococcosis.

Page 323: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

320

SICBENS-1306

Application of Hydroxynitrile Lyase from Prunus Amygdalus Turcomanica

in Kinetic Resolution of Racemic Mandelonitrile

Dilek Alagöz*

University of Cukurova , Vocational School of Imamoglu, Turkey

[email protected]

Deniz Yıldırım

University of Cukurova, Vocational School of Ceyhan, Turkey

[email protected]

Seyhan Tükel

University of Cukurova, Faculty of Science and Letters, Department of Chemistry,

Turkey

[email protected]

Abstract

The kinetic resolution is generally defined as a process where the two enantiomers of a racemic

mixture are transformed to products at different rates. Recently, enzymatic kinetic resolution

has recently become an alternative to the traditional kinetic resolution since one of the

enantiomers of the racemate is highly selectively transformed to product, whereas the other is

left behind. However, one obvious limitation of kinetic resolution is the maximum theoretical

yield is limited to 50% [1].

Hydroxynitrile lyases (HNLs) have been widely used in yielding optically pure cyanohydrins

[2,3]. In this study, we focused on the kinetic resolution of (R/S)-mandelonitrile that is one of

the recent developments in the rapidly growing field of HNL). The kinetic resolution of

(R/S)-mandelonitrile was studied using an free and immobilized HNLs from Prunus amygdalus

turcomanica (PatHNL) seeds. In most cases, the reaction proceeded with 90, 90 and 93%

enantiomeric excess and 45, 44 and 41% yield for free PatHNL, PatHNL immobilized onto

Eupergit CM and PatHNL immobilized as cross-linked enzyme aggregates (CLEA),

respectively.

In summary, we can offer a new method to obtain (S)-mandelonitrile enantiomer by using

free and immobilized PatHNLs.

Keywords: kinetic resolution, hydroxynitrile lyase, enantiomer

Page 324: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

321

Literatures

[1] Ghanem, A. and Aboul-Eneın, H.Y.,(2005). Application of lipases in kinetic resolution

of racemates, Chirality 17, 1–15.

[2] Yildirim, D., Tükel, S. S. and Alagöz, D.,(2014). Crosslinked enzyme aggregates of

hydroxynitrile lyase partially purified from Prunus dulcis seeds and its application for the

synthesis of enantiopure cyanohydrins. Biotechnology Progress, 30 (4), 818-827.

[3]Hanefeld, U., (2014). Immobilisation of hydroxynitrile lyases. Chem Soc Rev, 42 (15),

6203-6568.

Page 325: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

322

SICBENS-1330

Immature Seed as a Novel Explant for Indirect Somatic Embryogenesis in a

Woody Tree; Dalbergia Sissoo Roxb

Hafiz Mamoon Rehman

Chonnam National University

[email protected]

Abstract

A competent and trouble-free method was scientifically developed for inducing indirect

somatic embryogenesis (ISE) and plantlet regeneration from immature seeds (ISs) as a novel

explant of Dalbergia sissoo Roxb. A two-step culture system was used to stimulate somatic

embryos. Callus formation and consequent plant regeneration of D. sissoo was obtained by

culturing the ISs on Murashige and Skoog (MS) medium supplemented with different growth

regulators. For callus formation, 0.6 mg L-1

2,4-dichlorophenoxyacetic acid (2,4-D) + 0.20 mg

L-1

kinetin was found the best as compared to the other two tested treatments i.e 2 mg L-1

Benzylaminopurine (BAP) + 0.5 mg L-1

naphthalene acetic acid (NAA) and 0.6 mg L-1

2,

4-D + 0.5 mg L-1

NAA. Embryogenic calli with premier rating were subjected to shoot

formation on a medium supplemented with 0.26 mg L-1

NAA + 2 mg L-1

BAA. This treatment

achieved very high shoot rate as compared to other treatments (0.26 mg L-1

NAA + 2.13 mg L-1

Kinetin or 0.5 mg L-1

indole acetic acid (IAA) + 2 mg L-1

BAP. Best rooting was obtained on

½ MS medium with 0.75 mg L-1

Indole Butyric acid (IBA). Complete plantlets were

acclimatized and then planted in the field with 80 % survival and normal phenotype. This is a

successful pioneering report on utilizing immature seed as an explant for ISE and in vitro

plantlet regeneration in D. sissoo Roxb.

Keywords: Roxb, Dalbergia sissoo, immature seeds, Somatic Embryogenesis and two step

culture system.

Page 326: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

323

SICBENS-1334

Cross-Linked Enzyme Aggregates of Hydroxynitrile Lyase from Wild

Appricot

Deniz Yildirim*

University of Cukurova, Vocational School of Ceyhan, Turkey

[email protected]

Dilek Alagöz

University of Cukurova, Vocational School of Imamoglu, Turkey

Seyhan Tükel

University of Cukurova, Department of Chemistry, Turkey

Abstract

Hydroxynitrile lyases (HNLs) are powerful catalysts in the synthesis of enantiopure

cyanohydrins. Both alcohol and nitrile groups of cyanohydrins can be transformed to a various

range of key synthons for the preparation of pharmaceuticals, agrochemicals, and other many

biologically active compounds [1-3].

In this study, cross-linked enzyme aggregates of Prunus pseudoarmeniaca HNL

(PpaHNL-CLEAs) were prepared from wild appricot seeds and characterized in terms of lyase

activity. The optimal pH and temperature were determined as 5.5 and 25 °C, respectively for

mandelonitrile cleavage. The kinetic parameters, Km and Vmax, were 1.1 mM and 16 U/g CLEA

for mandelonitrile, respectively. PpaHNL-CLEA was also tested for enantiopure

(R)-mandelonitrile synthesis. After 72 h reaction time, (R)-mandelonitrile was obtained with

100% yield and 97% enantiopurity.

In conclusion, PpaHNL-CLEA can be an alternative biocatalyst in the preparation of

enantiopure cyanohydrins.

References

Yildirim, D., Tükel, S. S. and Alagöz, D., Crosslinked enzyme aggregates of hydroxynitrile

lyase partially purified from Prunus dulcis seeds and its application for the synthesis of

enantiopure cyanohydrins, Biotechnology Progress, 2014, pp. 818-827.

Alagöz, D., Tükel, S. S. and Yildirim, D., Purification, immobilization and characterization of

(R)-hydroxynitrile lyase from Prunus amygdalus turcomanica seeds and their applicability

for synthesis of enantiopure cyanohydrins, Journal of Molecular Catalysis B: Enzymatic,

2014, pp. 40-46.

Page 327: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

324

Hanefeld, U., Immobilisation of hydroxynitrile lyases, Chemical Society Reviews, 2013, pp.

6308-6321.

Page 328: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

325

SICBENS-1333

A Method to Prepare Large Amount of Sg-6 Saponins from Wild Soybean

Seeds

Mei Itabashi*, Panneerselvam Krishnamurthy, Tai-Sun Shin, Gyuhwa Chung

Chonnam National University *[email protected]

Ayaka Kurosaka, Chigen Tsukamoto

Iwate University

Seung Hwan Yang

Myongji University

More than 100 kinds of saponins have been reported in the seeds of soybean (Glycine max) and

wild soybean (Glycine soja). They are classified into group A, DDMP, and Sg-6 saponins by

their aglycone. Sg-6 saponins are further subclassed into group H, I, and J saponins which are

consisted of three different aglycones, soyasapogenol H, I, and J, respectively. Group A and

DDMP saponins have been reported that they show specific characteristics depending on their

chemical structures. Group A saponins show astringent taste, anti-obesity effect, while DDMP

saponins and their degraded group B and E saponins show inhibitory effect on cancer cells,

heaptoprotective and neuroprotective activities, and so on. However, there is no information on

physiological or biological activities of Sg-6 saponins, thus they may show diverse biological

activities. To evaluate the health benefits, a large amount of Sg-6 saponins is required. Since

group A and Sg-6 saponins elute very closely by HPLC with a reverse phase preparative

column, contamination of group A saponins was unavoidable. In this report, new effective

method to separate Sg-6 saponins from group A saponins is provided. A wild soybean

collection CW15419, which accumulate Sg-6 saponins in the seed, were obtained from

Chung‟s wild legume germplasm collection (CWLGC) at the Chonnam National University,

and were used as a material for this research. Saponins were extracted with 5-fold volume

(v/w) of 80% (v/v) methanol and the extracts were dried up with a rotary evaporator in

vacuum. Aliquot of the concentrated extract was weighed and mixed with 15-fold (v/w) of

1N-KOH solution to deacetylate group A saponins, and to the mixture 1/10 volume of

concentrated hydrochloric acid were added. The supernatant was removed to obtain precipitate,

which contains all saponin components. The precipitate was washed with 15-fold (v/w) of

0.1N-HCl. This process was performed three times to remove other components such as sugars,

isoflavones and anthocyanins. The obtained precipitate was dissolved with 15-fold (v/w) of

40% methanol containing 0.1% acetic acid. The supernatant was applied to a reversed phase

Page 329: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

326

C-18 open column and saponins were collected by stepwise elution of 50, 60, 70% methanol

containing 0.1% acetic acid.

Fractions were collected and concentrated with a rotary evaporator in vacuum, and were

freeze-dried. By this procedure, six components (H- - - - , I- g and I-

of Sg-6 saponins were clearly separated from the other saponins. From 450g of material wild

- -6

saponins were separated, and the Sg-6 saponin composition (w/w, %) was H- -

H- - - - = 13.7: 19.4: 10.8: 8.0: 28.3: 19.8. The recovery was 62% which is

extremely higher than conventional HPLC approach for separation of Sg-6 saponins. This

report is the first one to describe how to prepare a large amount of Sg-6 saponins from the

seeds of soybeans and wild soybeans. This method can apply to obtain the other group A, B, E,

and DDMP saponins by using other variety of soybean or wild soybean as a material.

Page 330: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

327

SICBENS-1336

The Cases Study and Species Selection (Butterfly, Plant) for the Butterfly

Garden Landscaping

Son, Jinkwan

National Academy of Agricultural Science, RDA, Republic of Korea

[email protected]

Lee Siyoung

National Academy of Agricultural Science,RDA, Republic of Korea

[email protected]

Kim, Jongku

National Academy of Agricultural Science, Republic of Korea

[email protected]

Kong, Minjae

Relationship of Dankook Univ. and Rural Development Administration, Republic of Korea

[email protected]

Kang, Donghyeon

National Academy of Agricultural Science, Republic of Korea

[email protected]

Abstract

We have been designing various types of parks in order to resolve all these different

environmental issues in urban areas. In terms of a few of those parks, they are built as spaces in

which living organisms can live, and they are named ecological parks, dragonflies parks and

others. Such organism habitats are considered places not only to improve biodiversity of the

urban areas but also to give people chances to observe living organisms. In the light of that, this

study carried out its investigation in order to present basic materials to help planning and

designing of a butterfly garden. Through literature reviews, the study categorized butterflies

into a group for breeding and another group for freeing. 21 species of butterflies were collected,

and there were 1 Order, 4 Family and 16 Gunus. As for those 21 species, Phengaris teleius,

Pseudozizeeria maha, Thecla betulae, Argynnis hyperbius, Dichorragia nesimachus, Hestina

assimilis, Polygonia c-aureum, Sasakia charonda, Vanessa cardui, Vanessa indica, Boloria

selene, Byasa alcinous, Papilio machaon, Papilio macilentus, Papilio protenor, Papilio xuthus,

Papilio bianor, Sericinus montela, Colias erate, Eurema hecabe, Pieris rapae were included.

The study extracted host plants and nectar plants of the 21 species.

Page 331: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

328

The selected plants were 76 Taxa which contained 23 Family, 57 Gunus, 66 Species, 9 Variety

and 1 Forma. 76 Taxa were analyzed into Compositae 14 Taxa(18.4%), Leguminosae 13

Taxa(17.1%), Rutaceae 8 Taxa(10.5%), Cruciferae 7 Taxa(9.2%), Umbelliferae 5 Taxa(6.6%)

and Rosaceae, Violaceae, Verbenaceae as well as others. As far as this study believes, we

should increase good understanding on life styles of the butterflies before getting into

designing the butterfly garden. In addition, we must need this patch large enough to attract and

grow the butterflies and the plants to build the garden. Add to that, since each of the species

has every different taste in their favorite plants, we must take time conducting careful

investigations on such tastes. The study does not assume that it is proper to design the butterfly

garden near agricultural lands because any species harmful to agricultural crops might be

introduced. When the butterflies are successfully attracted, moths also possibly come, and that

is why the study argues for a good solid review on how to effectively block the moths. After all,

the study suggests that we must work on prevention of ecological disruptions by cleverly

controlling the numbers of individual butterflies and individual plants.

Acknowledgements

This study was carried out with the support of the Project No. PJ009492, National Academy of

Agricultural Science, RDA, Republic of Korea

Keyword: Gardening, Insect, Restoration, Creation, Conservation

Page 332: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

329

SICBENS-1303

Response of Red Blood Cell ATPase Activity in Freshwater Fish

(Oreochromis Niloticus) Exposed to Copper in Differing Ca2+ Levels

Gülüzar Atli*

Cukurova University Vocational School of Imamoglu, Turkey

[email protected]

Esin G. Kanak, Mustafa Canli

Cukurova University Faculty of Science, Department of Biology, Turkey

Abstract

Status of the several biochemical processes may be reflected in fish blood known to be altered

by heavy metals. Ca2+

is one of the most important factors in water chemistry as it affects fish

physiology and metal toxicity. In this basis, it was attempted to investigate the Ca2+

impact on

Cu2+

toxicity in the response of red blood cell ATPase activity changes in Nile tilapia

Oreochromis niloticus after sublethal acute and chronic exposures. Each group contained six

fish exposed to different Ca2+

environments. Basal Ca2+

level of exposure water was 15 mg

Ca2+

/L and 30 and 90 mg Ca2+

/L were achieved after Ca2+

addition to this water. Control

(15-Ca, 30-Ca and 90-Ca) and Cu2+

exposed groups (15-Ca+Cu, 30-Ca+Cu and 90-Ca+Cu)

were exposed for 3 and 30 days. Metal exposed group was treated with 0.3 µM and 0.03 µM of

Cu (CuCl2.2H2O) for acute and chronic exposures, respectively and followed by ATPase

activity measurement. In acute exposure; Total-, Na+/K

+-and Mg

2+-ATPase activities decreased

at 30-Ca exposed group though Total- and Na+/K

+-ATPase activities increased at 90-Ca

exposed group in contrast to 15-Ca exposure. Cu2+

decreased the Total- and Mg2+

-ATPase

activities in both 30- and 90-Ca+Cu exposed groups when comparing to 15-Ca+Cu exposure.

Total- and Mg2+

-ATPase activities significantly increased at all Cu2+

exposed groups in

contrast to Ca2+

environment at 15, 30 and 90 mg/L concentrations. Nevertheless,

Na+/K

+-ATPase activity varied as increase and decrease at 30- and 90-Ca+Cu exposed groups

in contrast to 30- and 90-Ca exposed groups, respectively. In chronic exposure; decreased

activities of Na+/K

+-ATPase in 30- and 90-Ca exposed group and Total-ATPase in only 90-Ca

exposed group were observed in contrast to 15-Ca exposed group. When comparing to

15-Ca+Cu exposed group, Mg2+

-ATPase activity decreased though Na+/K

+-ATPase activity

increased in 30-Ca+Cu exposed group and also 90-Ca+Cu exposure increased Total- and

Mg2+

-ATPase activities. The increased activities of Na+/K

+-ATPase in 15-Ca+Cu exposed

group and also Total- and Mg2+

-ATPase in 90-Ca+Cu exposed group were recorded in contrast

to their own Ca2+

environments without Cu2+

treatment. Ca2+

and Cu2+

significantly affected

the ATPase activities separately according to increased Ca2+

conditions whereas activity

changes seemed to be different when comparing the Cu2+

effect in their own Ca2+

conditions.

Page 333: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

330

Sensitivity and variability of ATPase activities indicated the importance of these enzymes

reflecting the response of osmoregulation system as significant biological indicators to evaluate

fish health under metal stress in different natural waters.

Keywords: ATPase, Blood, Calcium, Copper, O. niloticus

Page 334: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

331

Poster Session (2)

Civil Engineering / Electrical and Electronic Engineering /

Environmental Sciences /Fundamental & Applied Sciences /

Material Science and Engineering

2015/6/27 Saturday 15:00-16:00 4F Pre-Function Area

SICASE-798

Effect of Principal Axis Orientation on Seismic Capacity of Shear Governed RC Columns

Wen-I Liao︱National Taipei University of Technology

Mustapha Jallow︱National Taipei University of Technology

Yafatou Sanneh︱National Taipei University of Technology

Martin R. Mendy︱National Taipei University of Technology

SICASE-803

Resistive Switching Characteristics of Sm2O3 and Lu2O3 Thin Films for Low-Power

Flexible Memory Applications

Tung-Ming Pan︱Chang Gung University

Han-Xuan Xie︱Chang Gung University

Somnath Mondal︱Chang Gung University

Keiichi Koyama︱Kagoshima University

SICASE-796

Structural and Electrical Properties of High-K Tm2O3 Gate Dielectrics for InGaZnO

Thin Film Transistors

Tung-Ming Pan︱Chang Gung University

Tung-Yu Wu︱Chang Gung University

Fa-Hsyang Chen︱Chang Gung University

Keiichi Koyama︱Kagoshima University

Page 335: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

332

SICASE-779

Green Bikeway Planning for Sustainable Environment in Scenic Area

Yao-Tsung Ko︱Tunghai University

Ming-Shih Chen︱Tunghai University

Pei-Ling Wu︱Tunghai University

SICASE-765

Phthalide, a New Naturally Occurring Bioactive Compound from Trichoderma

Harzianum WuHQ75 against Chilli Anthracnose

Chotika Jeerapong︱Walailak University

Worrapong Phupong︱Walailak University

Warin Intana︱Walailak University

Patoomratana Tuchinda︱Mahidol University

Sopana Wongthong︱Nakhon Si Thammarath Rajabhat University

SICASE-823

Construction and Sequencing Analysis of Scfv Antibody Fragment Derived from

Monoclonal Antibody Against Norfloxacin (Nor155)

Jirawat Mala︱Chulalongkorn University

Sarintip Sooksai︱Chulalongkorn University

Tanapat Palaga︱Chulalongkorn University

Songchan Puthong︱Chulalongkorn University

Kittinan Komolpis︱Chulalongkorn University

Yoshinobu Kaneko︱Osaka University

SICASE-743

Properties and Microstructure of Cobalt-Based Alloy Layer by Laser Cladding

Yao-Sheng Yang︱Kao Yuan University

Yin-Fang Wei︱Kao Yuan University

Bo-Yong Chen︱Kao Yuan University

Yeou-Yih Tsai︱Kao Yuan University

Page 336: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

333

SICASE-798

Effect of Principal Axis Orientation on Seismic Capacity of Shear Governed

RC Columns

Wen-I Liao*, Mustapha Jallow, Yafatou Sanneh, Martin R. Mendy

Department of Civil Engineering, National Taipei University of Technology, Taiwan *[email protected]

Abstract

This paper presents the results of shake table tests on six full-scale shear governed RC columns.

Two types of RC columns were designed for the shake table tests. One is the columns with an

effective height of 0.6 m and the other is 0.7 m. The cross section of all the experimental

columns is 0.3x0.3 m2 with 6-#6 longitudinal steel rebars. The stirrup arrangements for the

columns with a height of 0.7 m or 0.6 m are #2@10 cm or #3@10cm, respectively. To evaluate

the effect of the principal axis orientation on the seismic performance of RC short columns, in

the three specimens of each type the principal axes of cross-section are in the directions of 0, 22.5,

and 45 degrees to the excitation direction. The input ground motion for all tests is the

acceleration time history recorded in the 1999 Taiwan Chi-Chi earthquake. The response time

histories for the accelerations and displacements, as well as the force-displacement hysteretic

loops are presented in this study. Based on the experimental results, the shear strength and

ductility of columns with different principal axis orientations are further discussed and compared

with those results obtained by conventional design formula.

Keywords: RC column, Shear, Principal axis, Shake table test

1. Introduction

Obviously, the concept of the performance based design attracted the attention of many

researchers in the last decade and currently it is intended to be incorporated into the next

generation of the seismic design code for new design or retrofitted structures in some

developed countries such as U.S.A [1, 2] and Japan. The functionality of structures and

facilities housed in structures during or after an earthquake event depends greatly on the actual

seismic performance of structures. For this reason, the accurate simulated numerical hysteretic

model for the material or component behaviors plays an important role for the structural

analysis in the practical application. The numerical hysteretic models for the shear behavior or

the flexure-shear interaction of reinforced concrete members have been paid more efforts in the

past researches since it is really much more complicated compared with the pure flexure

behavior. Besides, shear failure could lead to reduction of the desired lateral strength, change

of the inelastic behavior, loss of the axial load capacity, and abrupt collapse of the building.

Page 337: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

334

Numerous models for the prediction of the shear strength (Ang et al. 1989 [3], Watanabe and

Ichinose 1991 [4], Priestley et al. 1994 [5]), as well as the response of the shear force-shear

deformation relationship (Collins 1978 [6], Vecchio and Collins 1986 [7], Hsu 1988 [8], Pang

and Hsu 1996 [9]) under monotonic loading have been developed. Various hysteretic models

for the shear behavior have also been proposed (Ma et al. 1976 [10], Maruyama and Jirsa 1979

[11], Takayanagi and Schnobrich 1979 [12], Ozcebe and Saatcioglu 1989 [13]). In 2001, Lee

and Elnashai [14] proposed a hysteretic model considering the flexure-shear interaction. In

2007, Dönmez and Sözen [15] developed a numerical model which can estimate the maximum

force and displacement responses, as well as estimate all ranges of response of biaxially loaded

reinforced concrete members.

While many studies have been conducted on RC columns under uniaxial loads, few studies

have been conducted under biaxial loads. The biaxial loads, unlike uniaxial loads, account for

the fact that earthquakes forces can act on structures in any direction. Forces in any direction

on a given plane could be considered to be equivalent to biaxial loads acting along two

perpendicular directions. Thus, columns tested under biaxial loads are subjected to a more

realistic form of earthquake loads in comparison to columns under uniaxial loads. Therefore, a

series of studies, including the experimental scheme (shake table tests and reversed cyclic

loading tests) and the prediction of the simulated numerical model, is included in this long term

research project. This paper addresses the performance of reinforced concrete columns

subjected to biaxial dynamic loads. Six full-scale shear governed reinforced concrete columns

are designed for the shake table test to evaluate the effect of the principal axis orientation on

the seismic performance. The parameters that were varied in the six specimens are the ratio of

the biaxial loads and the amount of lateral ties in the column specimens. It is believed that the

test results would be greatly beneficial for the correct prediction of the numerical hysteretic

model for the shear behavior of reinforced concrete columns. The effect of the long-sustained

load on reinforced concrete columns [16] will be considered for the prediction of the simulated

numerical model. It is worthy of noting that the seismic reactive weights are simulated by the

added precast concrete mass block to facilitate the experimental setup.

2. Test Structure and Test Program

The designed experimental configuration and practical setup are shown in Figure 1 ~ Figure 3.

In order to enhance the experimental efficiency and reduce the error due to the construction of

components, the seismic reactive weight of 143kN is simulated by the assemblage of the added

precast concrete mass block. The practical experience shows that the setup, test and removal of

each specimen only take 1.5 days approximately. The head of the column is bolted with the

steel plates embedded in the mass block to assure the close assemblage of the concrete mass

block and the reinforced concrete column. The height of the reinforced concrete foundation is

50cm.

Page 338: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

335

The foundation is designed to remain elastic when the failure of the reinforced concrete column

occurs. Two load cells are placed underneath the foundation to measure the vertical load and

base shear during the test. Furthermore, to prevent the abrupt falling of concrete mass block

due to the brittle shear failure of the reinforced concrete column, four steel columns are

equipped in the four corners of concrete mass block for supporting. The steel roller is designed

to locate between the concrete mass block and the top plate of steel column to not only reduce

the friction but also resist the overturning moment induced by the concrete mass block. In

addition, the reinforced concrete column could behave as a nearly perfect reverse curvature

model such that the following analysis is relatively simple.

Two types of reinforced concrete columns are designed for the shake table tests. The cross

section of all the tested columns is 0.3mx0.3m with 6-#6 longitudinal steel rebars. The stirrup

arrangements for the tested columns are #2@10 cm and #3@10cm. The average concrete

strength is 20502/ cmN . The average yielding stresses for #2 (stirrups of columns), #3 (stirrups

and ties of columns) and #6 (longitudinal steel rebars of columns) are 552cmkN / , 41

2cmkN /

and 532cmkN / , respectively.

Page 339: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

336

For the first type of the experimental column, the effective height is 0.7m and the stirrup

arrangement is #2@10cm within the middle length of 30cm. In order to control the shear failure

occurs in the middle portion of the column, #3@10cm for the stirrup and additional one tie is

designed for the length of 20cm in the both ends. To evaluate the effect of the principal axis

orientation on the seismic performance, the principal axes of the cross section in the directions

of 0, 22.5, and 45 degrees to the excitation direction are assigned for the three specimens, SH1,

SH2 and SH3, respectively, as illustrated in Figure 4. For the second type of the reinforced

concrete column, the effective height is 0.6m and the stirrup arrangement is #3@10cm within

the middle length of 30cm. Similarly, in order to prevent the undesired failure, #[email protected] for

the stirrup and additional one tie is designed for the length of 15cm in the both ends. The

principal axes of the cross section in the directions of 0, 22.5, and 45 degrees to the excitation

direction are assigned for the three specimens, SH4, SH5 and SH6, respectively.

Page 340: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

337

The arrangement of instrumentation for the first type of the experimental column is shown in

Figure 5. The inertia force induced by the concrete mass block is calculated based on the

measurement of the accelerometers. Since the reinforced concrete column behaves as a reverse

curvature model, the difference between the measurements of displacement transducer D1 and

D2 could reasonably represent the drift of the reinforced concrete column. The axial load and

the shear force undertaken by the reinforced concrete column could be measured by the load

cells underneath the foundation.

The input ground acceleration history for all tests is the E-W component of the TCU078 station

of the 1999 Taiwan Chi-Chi earthquake (denoted as TCU078EW). Corresponding to the input

Page 341: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

338

ground motion, the test protocol is sequentially the peak ground acceleration (PGA) of 50gal,

200gal, and with an increment of 200gal or 300gal for next test run until the failure of the

specimen occurs.

3. Test Results

The test results indicate that for all specimens there is no obvious shear crack and concrete

spalling until the PGA of the input ground motion is greater than 1000gal. Besides, the acute

failure occurs when the PGA of the input ground motion reaches 1500gal or 1800gal. The

failure statuses of specimen SH1 and SH5 after test runs with PGA equal to 1500gal and

1600gal respectively are illustrated in Figure 6 and Figure 7, and from which the obvious shear

failures are observed.

Page 342: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

339

Page 343: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

340

The shear-drift hysteretic loops of the all specimens subjected to the input ground motion are

illustrated in Figure 8 ~ Figure 13 from which it is seen that the shear strength is degraded

abruptly due to the brittle shear failure. The comparisons of the different principal axes

orientation for the shear-drift relations of two types of specimens are shown in Figure 14 and

Figure 15. The tested ultimate shear strengths for all specimens are summarized in Table 1. For

the first type of the reinforced concrete column, the tested ultimate shear strength is 270kN

approximately. It is concluded that the effect of principal axis orientation on the performance

of the shear strength is very limited. Furthermore, for the second type of the reinforced

concrete column, the tested ultimate shear strength is 300kN approximately, which is relatively

higher than the result of the first type of the reinforced concrete column due to the more

conservative design for the stirrup arrangement.

Page 344: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

341

Similarly, the shear strength is not affected significantly by the variation of the principal axis

orientation. For the first type and second type of the reinforced concrete columns, the nominal

shear strengths calculated by the design formula are equal to 224kN and 288kN, respectively.

4. Conclusions

Before the prediction of the 3-dimension constitutive model and numerical hysteretic model,

the appropriate experiment is necessary to be conducted. Therefore, a series of studies,

including the experimental scheme (shake table tests and cyclic loading tests) and the

prediction of the simulated numerical model, is included in this research program. This study is

the first stage of a research program to design and conduct the shake table test to discuss the

effect of the principal axis orientation on the seismic performance of reinforced concrete

columns such as the shear strength and hysteretic loops. The satisfactory test results are

obtained due to the deliberate design of the experimental configuration. It shows that current

design formula for estimating the shear strength is relatively conservative, and the effect of the

principal axis orientation on the shear strength is not significant. In the next stage, the cyclic

loading test will be conducted and the experimental results could be incorporated into the test

database. Based on the complete experimental data, the shear strength and hysteretic loops of

reinforced concrete columns with different principal axis orientations can be further discussed

and compared with the conventional design. As a consequence, the incredible 3-dimension

constitutive model and numerical hysteretic model of reinforced concrete columns for the

structural analysis in the practical engineering application is the final objective of this research

program.

5. Acknowledgements

Financial support by National Science Council (NSC) is acknowledged. Immense gratitude

must be conveyed to the laboratory support provided by National Center for Research on

Earthquake Engineering (NCREE).

6. References

International Building Code, International Conference of Building Officials(ICBO), Whittier,

California, 2006.

ASCE07-02, Minimum Design Loads for Buildings and Other Structures, American Society of

Civil Engineering (ASCE), Reston, V.A., 2005.

Ang, B. G., Priestley, M. J. N., and Paulay, T. (1989), „„Seismic Shear Strength of Circular

Reinforced Concrete Columns,‟‟ ACI Structural Journal, Vol. 86, No. 1, pp. 45–59.

Watanabe, F., and Ichinose, T. (1991), „„Strength and Ductility Design of RC Members

Subjected to Combined Bending and Shear,‟‟ Proceeding of Workshop on Concrete Shear

in Earthquakes, University of Houston, pp. 429–438.

Priestley, M. J. N., Verma, R., and Xiao, Y. (1994), „„Seismic Shear Strength of Reinforced

Page 345: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

342

Concrete Columns,‟‟ Journal of Structural Engineering, ASCE, Vol. 120, No. 8, pp. 2310–

2329.

Collins, M. P. (1978), „„Towards a Rational Theory for RC Members in Shear,‟‟ J. Journal of

Structural Engineering, ASCE, Vol. 104, No. 4, pp. 649–666.

Vecchio, F. J., and Collins, M. P. (1986), „„The Modified Compression Field Theory for

Reinforced Concrete Elements Subjected to Shear,‟‟ ACI Structural Journal, Vol. 83, No.

2, pp. 219–231.

Hsu, T. T. C. (1988), „„Softened Truss Model Theory for Shear and Torsion,‟‟ ACI Structural

Journal, Vol. 85, No. 6, pp. 624–635.

Pang, X. B. D., and Hsu, T. T. C. (1996), „„Fixed Angle Softened Truss Model for Reinforced

Concrete,‟‟ ACI Structural Journal, Vol. 93, No. 2, pp. 197–207.

Ma, S. H., Bertero, V. V., and Popov, E. P. (1976), „„Experimental and Analytical Studies on

the Hysteretic Behavior of Reinforced Concrete Rectangular and T-Beams,‟‟ Report No.

EERC 76-2, Earthquake Engineering Research Center, University of California, Berkeley.

Maruyama, K., and Jirsa, J. O. (1979), „„Shear Behavior of Reinforced Concrete Members

under Bidirectional Reversed Lateral Loading,‟‟ CESRL Report No. 79-1, University of

Texas at Austin.

Takayanagi, T., and Schnobrich, W. C. (1979), „„Non-Linear Analysis of Coupled Wall

Systems,‟‟ Earthquake Engineering and Structural Dynamics, Vol. 7, pp. 1–22, Takeda.

Ozcebe, G., and Saatcioglu, M. (1989), „„Hysteretic Shear Model for Reinforced Concrete

Members,‟‟ Journal of Structural Engineering, ASCE, Vol. 115, No. 1, pp. 132–148.

Lee, D. H. and Elnashai, A. S. (2004), „„Seismic Analysis of RC Bridge Columns with

Flexure-Shear Interaction,‟‟ Journal of Structural Engineering, ASCE, Vol. 130, No. 11,

pp. 1692–1703.

Dönmez, C. and Sözen., M.A. (2007), “Numerical Model for Biaxial Earthquake Response of

Reinforced Concrete,” Computer-Aided Civil and Infrastructure Engineering, Vol. 22, pp.

238-253.

Rey, L. E., Schultz ,A. E., and Welton, S. S. (2004), “Long-Term Effects on Response of

Reinforced Concrete Columns to Cyclic Loading,” Journal of Structural Engineering,

ASCE, Vol. 130, No. 9, pp. 1320-1332.

Page 346: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

343

SICASE-803

Resistive Switching Characteristics of Sm2O3 and Lu2O3 Thin Films for

Low-Power Flexible Memory Applications

Tung-Ming Pan*, Han-Xuan Xie, Somnath Mondal

Chang Gung University *[email protected]

Keiichi Koyama

Kagoshima University, Japan

Abstract

In this study, we investigated the resistive switching (RS) behavior in flexible Sm2O3 and Lu2O3

resistive random access memories (ReRAM). The structural morphologies of the Sm2O3 and

Lu2O3 thin films depend on the lattice energy of the oxides. The dominant current conduction

mechanism in the oxide layer changes from electrode control Schottky emission in Sm2O3 to

bulk controlled space-charge-limited-current in Lu2O3. The barrier height extracted from

Schottky emission model is 0.96 eV in Sm2O3 thin film, whereas the activation energy of traps

calculated from the Arrhenius plots is about 0.23 eV in Lu2O3 thin film. In addition, the

Ni/Sm2O3/ITO flexible memory device shows promising RS behavior with very low power of

operation (~30 µW). The memory reliability characteristics of switching endurance and data

retention show promising for future memory applications. The filament conduction model is

adopted to describe the RS behavior in the Sm2O3 and Lu2O3 ReRAM devices. The improved RS

performance in Sm2O3 thin film is attributed to the different physical properties of the thin films.

Keyword: resistive switching (RS), resistive random access memories (ReRAM), Lu2O3, Sm2O3.

1. Introduction

The resistance random access memory (ReRAM) in various metal oxides [1-3], organic

molecules [4, 5], and graphene oxides [6-8] has been proposed as a promising future nonvolatile

memory (NVM) device due to its simple device structures, high speed operation and

complementary metal-oxide-semiconductor (CMOS) compatible fabrication process. The

demand for flexible electronics such as flexible displays and wearable computers is revived

because of their inherit merits of low cost, light weight, excellent portability and user friendly

interfaces over conventional bulk silicon technology [9]. However, a major challenge for flexible

electronic systems is the lack of good performance NVM devices fabricated at low temperature

[10, 11]. Although organic memory and other low temperature processed oxide based memory

show good flexibility, its performance cannot match that of conventional charge trap flash

memory.

Page 347: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

344

Recently, flexible resistive memories have been reported in various amorphous oxides including

TiO2 [12], Al2O3 [13], ZnO [14], and InGaZnO [15] thin films. However, the large switching

power, deprived reliability, and poor understanding of the resistive switching (RS) behavior are

some of the fundamental issues which limit its application for high-density and low-power

flexible electronics.

Rare-earth (RE) metal oxides have shown promising characteristics as high-κ gate insulators in

advanced CMOS devices because of their high resistivity, large dielectric constants, wide

bandgaps, and good thermodynamic stability [16]. The recent studies show that RE oxide

materials, such as Yb2O3 [17], Gd2O3 [18], and CeO2 [19], are promising for RS material, though

there are very little reports on the memory performance on flexible substrate. The superior RS

behavior and room temperature deposition process allow it to be a possible functional material for

flexible electronics. Therefore, in this study we present samarium oxide (Sm2O3) and lutetium

oxide (Lu2O3) ReRAM devices on ITO coated polyethylene terephthalate (PET) substrate for

flexible memory applications. The conduction mechanisms in flexible Sm2O3 and Lu2O3 RS

films are analyzed. Different electrical conduction mechanisms of Schottky emission and space

charge limited current (SCLC) conduction were observed in Sm2O3 and Lu2O3 thin films,

respectively. The RS characteristics and the memory reliability behavior are also investigated.

Unlike other typical flexible resistive memory, better RS characteristics were found in terms of

lower switching power and good distribution of switching parameters. Filamentary conduction

model was adopted to link the RS behavior in both Sm2O3 and Lu2O3 ReRAM devices.

2. Experimental

Flexible Sm2O3 and Lu2O3 RS memory devices were fabricated on ITO coated PET substrates

(purchased from Sigma-Aldrich, Taiwan). The ITO/PET substrate was glued on a Si dummy

wafer with polyimide tape to mechanically support the flexible substrate during fabrication

process. The Sm2O3 and Lu2O3 thin films were deposited by radio frequency magnetron

sputtering system in argon-oxygen (3:1) medium at room temperature. In the sputtering process,

metal Sm and Lu targets were used for Sm2O3 (~23 nm) and Lu2O3 (~21 nm) thin films

deposition, respectively. The structural behaviors were characterized by X-ray diffraction

(XRD) method. The roughnesses of the films were measured by atomic force microscope

(AFM) and the chemical compositions of the films were examined by X-ray photoelectron

spectroscopy (XPS). Finally, a 50 nm-thick square shape (100×100 µm2) Ni metal top

electrode was deposited on the oxide films through shadow mask by thermal evaporation

technique. The electrical properties of the Sm2O3 and Lu2O3 memory devices were measured

by a semi-automated cascade measurement system equipped with Agilent E5260 high speed

semiconductor parameter analyzer.

Page 348: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

345

3. Results and Discussion

3.1 Structural Characteristics of Sm2O3 and Lu2O3 Thin Films

Fig. 1 shows the XRD spectra recorded on the Sm2O3 and Lu2O3 ※lms. No diffraction peak was

observed from the Sm2O3 and Lu2O3 films deposited at room temperature, indicates that the

films remains in amorphous phase. However, the lower intensity peak from ITO substrate in

Sm2O3/ITO sample may be due to the slight thickness variation of the film. Figs. 2(a) and (b)

show the AFM images of Sm2O3 and Lu2O3 films, respectively. A significant difference in

surface morphology was observed in both films and the surface roughness seemed to depend

on the lattice energy of the materials. The lattice energy of -13,180 kJ/mol for Sm2O3 [20] is

lower than that of Lu2O3 (-13,871 kJ/mol) [21]. It was found that the surface of Lu2O3 film

became smoother than that of Sm2O3 film. The Rrms values of surface roughness obtained by

AFM observation were 6.16 and 1.87 nm for Sm2O3 and Lu2O3 films, respectively. This is

probably caused by the difference of lattice energy of these materials [20].

Page 349: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

346

Figs. 3(a) and (b) show the core level Sm 3d and O 1s spectra with their appropriate peak

curve-fitting lines for the Sm2O3 thin film, respectively. As shown in Fig. 3(a), the Sm 3d line

suffers a shift of ∼1.5 eV to the lower binding energy, relative to the Sm2O3 reference position

(1084.3 eV) [22]. Other Sm 3d peak at lower binding energy of 1079.9 eV is attributed to the

existence of Sm ions in the oxide thin film [23]. Fig. 3(b) depicts that the O1s line at the

surface of Sm2O3 thin film consists of a low peak binding energy at 528.8 eV for Sm2O3 [24],

and a high peak binding energy at 531.4 eV, usually attributed to oxide defects or non-lattice

oxygen ions [25]. In addition, the XPS analyses on Lu2O3 thin film show less defects in the

oxide. Figs. 3(c) and (d) show the core level Lu 4d and O 1s spectra for the Lu2O3 thin film,

respectively. The Lu 4d line spectrum consist a higher peak binding energy at 196 eV for

Lu2O3 and a lower peak binding energy at 194.4 eV, usually depicted as Lu ions [26]. The O 1s

spectrum at the surface of Lu2O3 thin film consist two peaks binding energy at 529.2 eV for

Lu2O3 and the other at 531.4 eV for defect formation, as observed in Sm2O3 [25, 26].

Page 350: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

347

3.2 Conduction Mechanism in Sm2O3 and Lu2O3 Thin Films

The asymmetric behavior in current voltage (I-V) characteristics of Sm2O3 film suggests the

conduction mechanism is interface limited and can be well fitted with Schottky emission model,

as depicted in Fig. 4. The Schottky emission can be expressed as [27]

02( / 4 )

* expB ox r

B

q qV tI A T

k T

(1)

where A* is the Richardson constant, T is the absolute temperature, φB is the effective barrier

height, V is the external applied voltage, q is the electron charge, ε0 is the permittivity of free

space, εr is the dynamic dielectric, tox is the oxide thickness, and kB is the Blotzmann constant.

The ln(I/T2) plot with V

1/2 should be straight line for Schottky type conduction and the barrier

height can be calculated from the intercept of the straight line. Fig. 4 shows the strait line

behavior of ln(I/T2) - V

1/2 plot for Sm2O3 thin film and a barrier height qφB of 0.96 eV was

obtained.

Page 351: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

348

The double logarithmic plot of I-V data for Lu2O3 thin film shows two clearly distinguished

regions namely Ohmic (I∞V) and quadratic (I∞V2) in Fig. 5(a). Therefore, space charge limited

current (SCLC) is dominant in Lu2O3 thin dielectric. If a single trap level is assumed in the SCLC

conduction mechanism, the I-V relation can be described as [25]:

0I

ox

VI qn

t (2)

2

0 3

9

8II r

ox

VI

t (3)

where n0 is the effective free carrier density of traps in thermal equilibrium and µ is the electronic

mobility in Lu2O3 thin film. In region I, when the applied voltage across the oxide is small (< 0.4

V), the slope of the I-V characteristic is 1, which implies the Ohmic conduction because the

number of the injected electrons are lower compared to the thermally generated free electrons

density (n0) inside the oxide film. Thus, the current depends on the applied voltage and the

material conductivity. An electrically quasi-neutral state occurs due to weak injection of the

charge carrier at such a lower field. After a certain voltage of Vtr, a transition from Ohmic region

(I) to SCLC region (II) is observed. In region II, the injected carrier density increases rapidly

with increasing the applied voltage and exceeds the volume-generated free carrier density. These

injected carriers are partly captured by the traps in the Lu2O3 and others contribute to the total

current, namely, injected free electrons. This region is realized as the charge injection limited

and trap filling region until all the existing trapping centers in the Lu2O3 are occupied by injected

charge carriers. The transition voltage from Ohmic conduction to SCL conduction can be

expressed as [27]

2

0

0

8

9

oxtr

r

qn tV

(4)

expC t C

n t B

N E E

g N k T

(5)

where θ is the ratio of free to total carrier density, Nc is the density of state in the conduction band,

gn is the degeneracy of the energy state in the conduction band, Nt is the trap density, and Et and

Ec is the trap and conduction band energy level, respectively. Further increase in applied voltage,

more carriers will be injected from the injecting electrode and a space charge region appears near

the injecting electrode interface so that the injected excess carriers dominate the thermally

generated charge carrier and hence the current increases rapidly.

Page 352: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

349

The trapping level in the Lu2O3 thin film can be determined from the Arrhenius plot of the

current for different electric fields. The activation energy (Ea) was calculated from the slope

ln(I)-1/T plot to be about 0.23 eV, as shown in Fig. 5(b). The transition from Ohmic to trap-filled

limited conduction mechanism at different temperatures is presented in the inset of Fig. 5(a) and

(b). It can be seen that the Vtr decreases with increasing temperature, suggesting that the thermal

generation of the carrier increases with temperature. Relatively lower voltage is required to fill

all the trap levels at higher temperature and hence Vtr decreases.

3.3 RS Behavior of Sm2O3 and Lu2O3 ReRAM Devices

Figs. 6(a) and (b) show the typical I–V RS characteristics of Sm2O3 and Lu2O3 ReRAM devices

after the standard electroforming process, respectively. After the electroforming process, the

memory device remains in low resistance state (LRS). The increase in applied positive bias on

memory cell, a sudden drop of conduction current at certain voltage (reset voltage, Vreset) is

observed and the devices transform to high resistance state (HRS). In contrast, an application of

negative bias results in a transition from HRS to LRS at certain set voltage (Vset) and this effect is

reproducible over several thousand of voltage sweeping cycles. These ReRAM devices can be

switched between two distinguished resistance state (HRS to LRS and vice versa), at a very low

power of ~30 µW (~0.3 V at 100 µA set/reset current) and ~100 µW (~1.0 V at 100 µA set/reset

current) for Sm2O3 and Lu2O3 ReRAM devices, respectively. The lower switching power is

believed due to the electron hopping conduction via oxide defects [10].

Page 353: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

350

Figs. 7(a) and (b) show the endurance characteristics (write–read–erase–read cycle) of the

Sm2O3 and Lu2O3 flexible memory devices, respectively, under impulse voltages measured at

room temperature and 85 °C. Here, high switching voltage was applied since larger operation

voltage can induce larger fluctuation of the resistance state than lower voltage. The Sm2O3

memory device can be switched over 104 program/erase (P/E) cycle maintaining a memory

window of >102 at both room temperature and 85 °C. A small fluctuation in the resistance values

at both memory states is observed at elevated temperature and with increasing stress cycle, as

shown in Fig 7(b). This may be attributed to the generation and redistribution of oxide defects in

the switching material [10, 28]. Figs. 8(a) and (b) show the data retention characteristics of the

Sm2O3 and Lu2O3 flexible memory devices after cyclic measurement at both room temperature

and 85 °C. Good data retention of 105 s is obtained at room temperature, as shown in Fig. 8(a).

The retention characteristics at elevated temperature are fluctuating in both resistance states as

depicted in Fig. 8(b). The HRS value showed a continuous decay of resistance for few tenths of

second keeping a well resolved memory window of ~102 after 10

5 s of test. This can be correlated

well with the stress induced leakage current via generated defects in the oxide thin films [29].

4. Conclusion

In this work, the electrical conduction and RS behavior in the Sm2O3 and Lu2O3 thin films on

flexible PET substrate were studied for flexible NVM applications. The dominant current

conduction mechanism changes from bulk limited SCLC in Lu2O3 to interface controlled

Schottky emission in Sm2O3.

Page 354: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

351

The presence of a shallow trap level at 0.23 eV below conduction band and the barrier height of

0.83 eV were estimated in Lu2O3 and Sm2O3 thin films, respectively. The filament conduction

model was successfully described for the RS behavior in the Sm2O3 and Lu2O3 thin films on

ITO/PET substrate. Improved RS behavior of very low power of operation (~30 µW) and small

distribution of switching parameters were obtained in Sm2O3 ReRAM device. The memory

reliability characteristics of switching endurance and data retention were promising for future

memory applications. The enhanced RS performance in Sm2O3 thin film was attributed to

different physical behaviors, mainly the surface roughness and the oxide defects of the thin film.

The superior RS characteristics in Ni/Sm2O3/ITO ReRAM device have great potential for future

nonvolatile flexible memory applications.

Acknowledgments

This work was supported by the National Science Council (NSC) of Republic of China under

contract no. NSC-102-2221-E-182-072-MY3.

5. References

P. Gonon, M. Mougenot, C. Vallee, C. Jorel, V. Jousseaume, H. Grampeix and, F. E. Kamel, J.

Appl. Phys. 107, 074507 (2010).

C.-Y. Lin, C.-Y. Wu, C.-Y. Wu, T.-Y. Tseng, and C. Hu, J. Appl. Phys. 102, 094101 (2007).

B. J. Choi, D. S. Jeong, S. K. Kim, C. Rohde, S. Choi, J. H. Oh, H. J. Kim, C. S. Hwang, K.

Szot, R. Waser, B. Reichenberg, and S. Tiedke, J. Appl. Phys. 98, 033715 (2005).

B. Cho, S. Song, Y. Ji, H.-G. Choi, H. C. Ko, J.-S. Lee, G.-Y. Jung, and T. Lee, IEEE Electron

Device Lett. 34, 51 (2013).

W. Bai, R. Huang, S. Member, Y. Cai, Y. Tang, X. Zhang, and Y. Wang, IEEE Electron

Device Lett. 34, 223 (2013).

S. Pinto, R. Krishna, C. Dias, G. Pimentel, G. N. P. Oliveira, J. M. Teixeira, P. Aguiar, E. Titus,

J. Gracio, J. Ventura, and J. P. Araujo, Appl. Phys. Lett. 101, 063104 (2012).

L.-H. Wang, W. Yang, Q.-Q. Sun, P. Zhou, H.-L. Lu, S.-J. Ding, and D. W. Zhang, Appl. Phys.

Lett. 100, 063509 (2012).

J. Liu, Z. Yin, X. Cao, F. Zhao, L. Wang, W. Huang, and H. Zhang, Adv. Mater. 25, 233

(2013).

S. Kim, H. Y. Jeong, S. K. Kim, S.-Y. Choi, and K. J. Lee, Nano Lett. 11, 5438 (2011).

C. H. Cheng, F. S. Yeh, and A. Chin, Adv. Mater. 23, 902 (2011).

J. W. Seo, J.-W. Park, K. S. Lim, S. J. Kang, Y. H. Hong, J. H. Yang, L. Fang, G. Y. Sung, and

H.-Ki Kim, Appl. Phys. Lett. 95, 133508 (2009).

H. Y. Jeong, Y. I. Kim, J. Y. Lee, and S. Y. Choi, Nanotechnology 21, 115203 (2010).

S. Kim and Y. K. Choi, Appl. Phys. Lett. 92, 223508 (2008).

S. Kim, H. Moon, D. Gupta, S. Yoo, and Y. K. Choi, IEEE Trans. Electron Devices 56, 696

(2009).

Page 355: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

352

Z. Q. Wang, H. Y. Xu, X. H. Li, X. T. Zhang, Y. X. Liu, and Y. C. Liu, IEEE Electron Device

Lett. 32, 1442 (2011).

G. He and Z. Sun, High-k Gate Dielectrics for CMOS Technology (Wiley-VCH, Verlag, 2012),

p. 111.

H.-C. Tseng, T.-C. Chang, J.-J. Huang, P.-C. Yang, Y.-T. Chen, F.-Y. Jian, S. M. Sze, and

M.-J. Tsai, Appl. Phys. Lett. 99, 132104 (2011).

K. C. Liu, W. H. Tzeng, K. M. Chang, Y. C. Chan, C. C. Kuo, and C. W. Cheng,

Microelectron. Reliab. 50, 670 (2010).

C. Y. Lin, D. Y. Lee, S. Y. Wang, C. C. Lin, and T. Y. Tseng, Surf. Coat. Technol. 203, 480

(2008).

S. Ohmi, C. Kobayashi, I. Kashiwagi, C. Ohshima, H. Ishiwara, and H. Iwai, J. Electrochem.

Soc. 150, F134 (2003).

P. Darmawan, P. S. Lee, Y. Setiawan, J. C. Lai, and P. Yang, J. Vac. Sci. Technol. B 25, 1203

(2007).

Y. Uwamino, Y. Ishizuka, and H. Yamatera, J. Electron Spectrosc. Relat. Phenom. 34, 67

(1984).

G. Dufour, R. D. Karnatak, J. -M. Mariot, and C. Bonnelle, Chem. Phys. Lett. 42, 433 (1976).

B. F. Dzhurinskii, D. Gati, N. P. Sergushin, V. I. Nefedov, and Y. V. Salyn, Russ. J. Inorg.

Chem. 20, 2307 (1975).

S. Mondal, H.-Y. Chen, J.-L. Her, F.-H. Ko, and T.-M. Pan, Appl. Phys. Lett. 101, 083506

(2012).

V. I. Nefedov, D. Gati, B. F. Dzhurinskii, N. P. Sergushin, and Y. V. Salyn, Zh. Neorg. Khimii

20, 2307 (1975).

T. P. Juan, S. Chen, and J. Y. Lee, J. Appl. Phys. 95, 3120 (2004).

W. Shen, R. Dittmann, U. Breuer, and R. Waser, Appl. Phys. Lett. 93, 222102 (2008).

S. B. Chen, J. H. Lai, A. Chin, J. C. Hsieh, and J. Liu, IEEE Electron Device Lett. 23, 185

(2002).

Page 356: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

353

SICASE-796

Structural and Electrical Properties of High-K Tm2O3 Gate Dielectrics for

InGaZnO Thin Film Transistors

Tung-Ming Pan*, Tung-Yu Wu, Fa-Hsyang Chen

Chang Gung University *[email protected]

Keiichi Koyama

Kagoshima University, Japan

Abstract

In this study, we studied the structural and electrical characteristics of high-dielectric constant

(high- Tm2O3 gate dielectrics for amorphous indium–gallium–zinc–oxide (a-IGZO) thin-film

transistor (TFT) applications. We employed X-ray diffraction to examine the growth directions

and crystallinity of the Tm2O3 films, atomic force microscopy to monitor the morphological

feature of the films, and X-ray photoelectron spectroscopy to analyze the chemical structure of

the Tm2O3 films after annealing at various temperatures. The high- Tm2O3 a-IGZO TFT

annealed at 400 °C exhibited a lower threshold voltage of 1.68 V, a larger field effect mobility of

11.8 cm2/V-s, a higher Ion/Ioff ratio of 3.9×10

7, and a smaller SS of 420 mV/dec., relative to those

of the systems that had been subjected to other annealing conditions. This result suggests the

Tm2O3 film featuring a higher dielectric constant and a smoother surface due to an increase of

the amount of oxygen sites.

Keyword: high-dielectric constant (high- Tm2O3, indium–gallium–zinc–oxide (a-IGZO),

thin-film transistor (TFT).

1. Introduction

Amorphous oxide semiconductors (AOSs) represented by amorphous indium–gallium–zinc–

oxide (a-IGZO) are expected for channel materials in thin-film transistors (TFTs) for flat, flexible,

and flat-panel displays because they have large field-effect mobilities and low-temperature

process [1-3]. In comparison with their hydrogenated a-Si counterparts, a-IGZO TFTs show high

electron mobility and good uniformity for low-temperature fabrication. However, the operating

voltage of a-IGZO TFTs is too high for practical use. The development of low-voltage operating

a-IGZO TFTs has become a priority. The use of gate insulators with high capacitance can reduce

the operating voltage [4]. The high gate capacitance is achieved by the use of thin gate insulators

or high-dielectric constant (high- ) materials. Thin gate insulator will lead to a high leakage

current owing to the occurrence of direct tunneling [5], thus causing high power consumption and

reduced device reliability.

Page 357: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

354

As a result, high- gate oxide is better than thin gate oxide with a low-dielectric constant to

reduce the gate leakage current. Several high- gate dielectric materials, including Ta2O5 [6],

TiO2 [7], HfO2 [8], and HfLaO [9], have been widely investigated in a-IGZO TFT devices. It is

well-known that the performance and stability of TFT devices depends critically on the gate

dielectric and its interface with the active channel [10-11].

In recent years, rare-earth oxide materials, such as Nd2O3 [12], Gd2O3 [13], Pr2O3 [14], and La2O3

[15], have been extensively studied for applications of metal-oxide-semiconductor field-effect

transistor, resistive random-access memory, TFT, and flash memory devices due to their have

high values, large band gaps, low leakage currents, and high thermal stability [16-17]. Thin

Tm2O3 film can be considered for potential use as a high- gate dielectric material owing to its

high value, large conduction band offset and good thermal stability [18]. The structural and

electrical properties of Tm2O3 gate dielectrics have not yet been reported in the a-IGZO TFT

device. In addition, the threshold voltage (VTH) stability of TFT device under gate bias stress is

considered to be the most important issue for display application [11].

2. Experimental

The bottom-gate, top contact TFT devices were fabricated on SiO2/Si substrates at room

temperature and patterned for gate electrode by photolithography and dry etching. Sputter

deposition was carried out at a constant power of 500 W and a total pressure of 10 mtorr in

mixed atmospheres consisting of Ar and N2. Before the Tm2O3 deposition, a 50 nm-thick TaN

gate electrode was first deposited by reactive sputtering from a Ta target onto the SiO2/Si

substrate. The Tm2O3 dielectric film was then deposited with a thickness of ~55 nm by reactive

sputtering from the Tm target with diluted O2 (Ar/O2 = 20/5) at room temperature. The

deposition rate of the Tm2O3 dielectric film is ~0.2 Å /s. Prior to the deposition of the IGZO

active layer, post-deposition annealing (PDA) treatments were executed on the Tm2O3

dielectric for 10 min in O2 gas at various temperatures (200, 300 and 400 °C) to improve the

quality of dielectric film. An a-IGZO active layer with a thickness of 20 nm was deposited on

the Tm2O3 dielectric by radio-frequency (RF) sputtering from an a-IGZO target

(In2O3:Ga2O3:ZnO=1:1:1 mol %) at a RF power of 60 W in pure Ar ambient at a working

pressure of 10 mTorr. Then, the IGZO channel layer was annealed in N2 ambient for 10 min at

200 °C. Finally, an Al electrode with thickness of ~400 nm was thermally evaporated onto the

IGZO film through a shadow mask to define the source and drain electrodes. The channel

The crystalline structure of the Tm2O3 dielectric films annealed at various temperatures was

analyzed by using X-ray diffraction (XRD). The surface morphology and roughness of the

dielectric films were examined using atomic force microscopy (AFM). The composition and

chemical bonding in Tm2O3 films annealed at different temperatures were determined by X-ray

Page 358: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

355

photoelectron spectroscopic (XPS). The dielectric constant of the dielectric films was

determined from the Al/Tm2O3/TaN capacitor device. The capacitance-voltage (C−V) curves

of Al/Tm2O3/TaN capacitors was performed at the frequency of 1 MHz using a

Hewlett-Packard (HP) 4285A LCR meter. The current-voltage (I−V) curves of the Tm2O3

a-IGZO TFTs were measured using a semiconductor parameter HP 4156C.

3. Results and Discussion

The crystalline structure of the Tm2O3 dielectric films after PDA at different temperatures was

examined by XRD measurements. All diffraction peaks of Tm2O3 films are indexed in Fig. 1.

Many small peaks are appeared in the XRD pattern, which confirms the amorphous nature of

the film. The significant differences in intensity and orientation of diffraction peaks are

attributed as different growth kinetics of the film materials at various temperatures. After

annealing at 200 °C, two weak Tm2O3 (222) and (440) diffraction peaks appeared. Besides the

above, the Tm2O3 (400) peak found for the sample annealed at 300 °C and 400 °C. The

intensity of diffraction peaks for the film annealed at 400 °C exhibited stronger than that at 300

°C, presumably because of the formation of a better Tm2O3 structure.

In addition to the structural and compositional studies, we also used AFM to investigate the

impact of the thermal annealing temperature on the surface roughness of the Tm2O3 films. The

effect of the moisture absorption on surface roughness should be another concern of

hygroscopic lanthanide oxide film application [19]. Figs. 2 (a)-(c) show the AFM images of the

Tm2O3 dielectric films annealed at 200, 300 and 400 °C, respectively. The surface roughness of

Tm2O3 film annealed at 200 °C has a rough surface (5.78 nm). The rougher surface may be due

to the oxygen vacancies (or defects) in the film producing the moisture absorption of Tm2O3,

leading to the nonuniform volume expansion of the film [22]. Furthermore, the surface

roughness clearly decreased with increasing the PDA temperature.

Page 359: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

356

This result is attributed to the reduced number of oxygen vacancies or crystal defects in the

film due to the film densification, thus decreasing the surface roughness of the Tm2O3 film.

Figs. 3(a) and (b) shows the Tm 4d5/2 and O 1s spectra, respectively, for the Tm2O3 films

annealed at various temperatures. In Tm 4d5/2 and O 1s of spectra, each fitting peak is assumed

to follow the general shape of the Lorentzian-Gaussian function. We assigned the Tm 4d5/2

peak at 176.6 eV to the Tm atoms in Tm2O3 [20]. Fig. 3(a) depicts that the shift of the Tm 4d5/2

peak position to a higher binding energy increases upon increasing the PDA temperature. The

film upon thermal annealing can reduce the number of oxygen vacancies or crystal defects in

the film, thus causing the shift. The O 1s spectra of the Tm2O3 films after different annealing

treatment are shown in Fig. 3(b). These O 1s spectra are convoluted with two suitable peak

curve-fitting lines. In two sets of spectra, first peak represents the Tm–O bond (located at 529.4

eV) [21] and second peak represents the Tm–(OH) bond (located at 531.9 eV). The intensity of

the O 1s peak corresponding to Tm2O3 increased upon increasing the PDA temperature,

whereas that corresponding to Tm(OH)x decreased upon increasing the PDA temperature. This

finding suggests that the high-temperature annealing decreases the number of oxygen vacancies

or crystal defects in the film, leading to the reduction in the moisture absorption of Tm2O3 film.

Page 360: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

357

Dielectric materials should ideally exhibit larger capacitance to enhance the drain current while

necessary charge to accumulate at a lower voltage [5]. Fig. 4(a) shows the C–V curves of the

Al/Tm2O3/TaN

Tm2O3 dielectrics annealed at 200, 300, and 400 °C is evaluated to be 8.3, 8.6, and 8.8,

2O3 dielectric increases with increasing the PDA temperature.

This result suggests that high PDA treatment makes the film densification reducing the number

of oxygen vacancies or crystal defects, causing the formation of a better Tm2O3 structure, as

evidenced by XRD analysis. Fig. 4(b) depicts the I−V characteristics of the Al/Tm2O3/TaN

capacitor devices after annealing at different temperatures. The leakage current of the

Al/Tm2O3/TaN device annealed at 400 °C exhibits smaller than other annealing temperatures.

This result may be attributed to reduction in the number of crystal defects in the film. These

defects act as trap sites to influence the dielectric leakage current and transistor operation.

Therefore, the capacitor after PDA at 200 °C has a higher leakage current.

Fig. 5(a) shows the drain current versus gate voltage (IDS-VGS) curves of the Tm2O3 a-IGZO

Page 361: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

358

TFTs annealed at different temperatures. The field- FE) and threshold voltage

of the Tm2O3 TFTs with PDA treatment are calculated from the transfer characteristics. The

VTH of Tm2O3 a-IGZO TFT devices annealed at 200, 300, and 400 °C is determined to be 2.94,

2.03, and 1.68, respectively. The VTH value decreases with increasing the PDA temperature.

The annealing at a higher temperature reduces the number of oxygen vacancies or defects in

the film. The mobility is an important parameter in terms of the performance of TFTs. High

charge carrier mobility can be obtained when the drain current is high. The electron mobility of

the Tm2O3 a-IGZO TFT devices after PDA at 200, 300, and 400 °C is estimated to be 1.1, 5.6,

and 11.8 cm2/V-sec, respectively. The FE of a Tm2O3 a-IGZO TFT device increased with

increasing the annealing temperature. The high mobility is attributed to the smooth surface

between the Tm2O3 dielectric and IGZO channel, causing the low density of interface states at

the dielectric–IGZO interface and small amount of bulk traps in the dielectric. In contrast, this

low mobility is due to the scattering of electrons and surface roughness by interfaces of

dielectric–IGZO and crystal defects in the Tm2O3 film [23], respectively. The Ion/Ioff ratio of

the Tm2O3 a-IGZO TFT devices annealed at 200, 300, and 400 °C is 4.2×105, 4.5×10

6, and

3.9×107, respectively. After high-temperature processing, the Ion/Ioff ratio of such a Tm2O3 TFT

device is demonstrated to improve by decreasing the crystal defects of the film, thus enhancing

the electrical performance of a-IGZO TFT device. The subthreshold swing (SS) represents the

conducting behavior of the device when the gate voltage is smaller than the threshold voltage

and this can be determined by the following equation [24]:

ox

Bit

DS

GS

C

CqD

q

kT

Id

dVSS

3.2

)(log …………………….…..…(1)

where k is the Boltzmann‟s constant, T is the absolute temperature, q is the elementary charge,

Dit is the trap density at the dielectric/channel interface, CB is the bulk capacitance per unit area,

and Cox is the capacitance per unit area of the gate oxide. The Dit of the Tm2O3 a-IGZO TFT

devices after PDA at 200, 300, and 400 °C is extracted to be 7.88×1012

, 6.74×1012

, and

5.36×1012

cm−3

eV-1

[25], respectively. In the above equation, the effective interface trap state

density is related to the SS value. The SS value of the Tm2O3 a-IGZO TFT devices annealed at

200, 300, and 400 °C is 621, 523, and 420 mV/dec., respectively. The small value of SS may

be attributed to both the high gate capacitance density and the low interface charge density.

The low SS can be ascribed to the reduced Dit at the interface between the Tm2O3 film and

IGZO channel due to the low surface roughness. In contrast, the high SS is noticed in the lower

annealing temperature. The moisture absorption enhances the surface roughness of Tm2O3 film

to cause the degradation of SS value. Fig. 5(b) displays the drain current versus drain voltage

(IDS-VDS) output characteristics of the Tm2O3 a-IGZO TFTs with different PDA treatments,

measured at VDS varied from 0 V to 10 V and VGS-VTH varied from 0 V to 10 V in 2 V steps.

Page 362: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

359

All TFT devices exhibit the field-effect modulation of the channel conductance and typical

normally-off type n-channel behavior. The Tm2O3 a-IGZO TFT after annealing at 400

exhibited the highest output current among the annealing condition.

4. Conclusion

In this paper, we proposed a high- Tm2O3 gate dielectric films for a-IGZO TFT applications. The

structural, morphological, and compositional properties of Tm2O3 dielectric films after PDA at

different temperatures were analyzed by means of XRD, AFM, and XPS, respectively. The

Tm2O3 a-IGZO TFT device annealing at 400 °C exhibited better electrical characteristics in term

of a low threshold voltage of 1.68 V, a high field effect mobility of 11.8 cm2/V-s, a low SS of 420

mV/dec. and a large Ion/Ioff ratio of 3.9×107. This result is due to the higher dielectric constant

and the smoother surface. This Tm2O3 dielectric film appears to be a very promising gate

dielectric for use in a-IGZO TFT applications.

Acknowledgments

This work was supporting by the National Science Council (NSC) of Taiwan under contract no.

NSC-102-2221-E-182-072-MY3.

5. References

K. Nomura, H. Ohta, A. Takagi, T. Kamiya, M. Hirano, and H. Hosono, Nature, vol. 432, p.

488, 2004.

E. Fortunato, P. Barquinha, and R. Martins, Adv. Mater., vol. 24, p. 2945, 2012.

S. D. Brotherton, Introduction to Thin Film Transistors, Springer, New York, 2013.

M. Houssa, High-k Gate Dielectrics, Institute of Physics, London, 2004.

G. D. Wilk, R. M. Wallace, and J. M. Anthony, J. Appl. Phys., vol. 89, p. 5243, 2001.

C. J. Chiu, S. P. Chang, and S. J. Chang, IEEE Electron Device Lett., vol. 31, p. 1245, 2010.

H. H. Hsu, C. Y. Chang, and C. H. Cheng, IEEE Electron Device Lett., vol. 34, p. 768, 2013.

L. Yuan, X. Zou, G. Fang, J. Wan, H. Zhou, and X. Zhao, IEEE Electron Device Lett., vol. 32,

p. 42, 2011.

N. C. Su, S. J. Wang, and A. Chin, IEEE Electron Device Lett., vol. 30, p. 1317, 2008.

S. Chang, Y. W. Song, S. Lee, S. Y. Lee, and B. K. Ju, Appl. Phys. Lett., vol. 92, p. 192104,

2008.

J. M. Lee, I. T. Cho, J. H. Lee, W. S. Cheong, C. S. Hwang, and H. I. Kwon, Appl. Phys. Lett.,

vol. 94, p, 222112, 2009.

T. M. Pan, J. D. Lee, and W. W. Yeh, J. Appl. Phys., vol. 101, p. 024110, 2007.

X. Cao, X. Li, X. Gao, W. Yu, X. Liu, Y. Zhang, L. Chen, and X. Cheng, J. Appl. Phys., vol.

106, p. 073723, 2009.

T. M. Pan and T. W. Wu, IEEE Electron Device Lett., vol. 29, p. 353, 2008.

Y. H. Lin, C.H. Chien, T. Y. Yang, and T. F. Lei, J. Electrochem. Soc., vol. 154, p. H619,

Page 363: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

360

2007.

O. Engstrom, B. Raeissi, S. Hall, O. Buiu, M. C. Lemme, H. D. B. Gottlob, P. K. Hurley, and

K. Cherkaoui, Solid State Electron., vol. 51, p. 622, 2007.

M. Fanciulli and G. Scarel, Rare Earth Oxide Thin Film: Growth, Characterization, and

Applications, Springer, Berlin, 2007.

G. He and Z. Sun, High-k Gate Dielectrics for CMOS Technology, Wiley-VCH, Germany,

2012.

Y. Zhao, K. Kita, K. Kyuno, and A. Toriumi, Appl. Phys. Lett., vol. 89, p. 252905, 1984.

Y. Uwamino, Y. Ishizuka, and H. Yamatera, J. Electron Spectrosc. Relat. Phenom., vol. 34, p.

67, 1984.

Y. A. Teterin and A. Y. Teterin, Russ. Chem. Rev., vol. 71, p. 347, 2002.

Y. Zhao, M. Toyama, K. Kita, K. Kyuno, and A. Toriumi, Appl. Phys. Lett., vol. 88, p.

072904, 2006.

J. E. Dominguez, L. Fu, and X. Q. Pan, Appl. Phys. Lett., vol. 81 p. 5168, 2002.

S. M. Sze and K. K. Ng, Physics of Semiconductor Devices 3rd ed., John Wiley & Sons, 2007.

T. M. Pan, C. L. Chan, and T. W. Wu, IEEE Electron Device Lett., vol. 30, p. 39, 2009.

Page 364: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

361

SICASE-779

Green Bikeway Planning for Sustainable Environment in Scenic Area

Yao-Tsung Ko*, Ming-Shih Chen, Pei-Ling Wu

Tunghai University *[email protected]

Abstract

Under the thought of sustainable development, how to reduce the environmental impact for

creating a healthy and natural eco-tourism is an important issue for every country. In recent

years due to the rapid growth of the population and vehicles, cause the traffic congestion, noise

and air pollution problems increasingly serious, especially in scenic area. Meanwhile, the

environmental awareness rising some green environmentalists begin to advocate the concept of

green transportation and low-carbon tourism. The bike is the most non-pollution and

energy-saving for our environment among all vehicles.This paper focuses on the green bikeway

planning and building for sustainable environment in scenic area. The National Scenic Area of

Sun-Moon Lake in Taiwan is taken as a research field. The main research methods and tools

include Field, Survey, Analytic Hierarchy Process (AHP), Geographic Information Systems

(GIS) and Google Earth software. Field Survey and AHP expert questionnaire are adopted to

obtain the relevant evaluation factors and criteria weights as inputing parameters in GIS syatem.

Finally, this study creates five best planning of the green bikeway network for Sun-Moon Lake

eco-tourism by GIS system and Google Earth calculation. We hope that the results of this study

can not only provide advices to the administrator of Sun-Moon Lake scenic area for planning

eco-tourism environment and creating sustainable development in the future, but also can make

the concept of low-carbon tourism truly become a concrete contribution to our environment.

Keywords: green bikeway, sustainable environment, eco-tourism, AHP, GIS

Page 365: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

362

SICASE-765

Phthalide, a New Naturally Occurring Bioactive Compound from

Trichoderma Harzianum WuHQ75 against Chilli Anthracnose

Chotika Jeerapong, Worrapong Phupong*

School of Science, Walailak University, Thailand *[email protected]

Worrapong Phupong*

School of Science, Walailak University, Thailand

[email protected]

Warin Intana

School of Agricultural Technology, Walailak University, Thailand

[email protected]

Patoomratana Tuchinda

Department of Chemistry and Center of Excellence for Innovation in Chemistry (PERCH-CIC),

Faculty of Science, Mahidol University, Thailand

[email protected]

Sopana Wongthong

Department of Chemistry, Faculty of Science and Technology,

Nakhon Si Thammarath Rajabhat University, Thailand

[email protected]

Abstract

Phthalide (1) and tyrosol (2) were isolated from the broth culture of Trichoderma harzianum

WuHQ75. Their structures were elucidated by extensive analysis of spectroscopic data and

comparison with literature data. Phthalide (1) has been reported herein for the first time as a

new naturally occurring compound. Tyrosol displayed the growth inhibition against

Colletotrichum gloeosporioides and Colletotrichum capsici with MIC of 64 μg/mL and

phthalide showed the growth inhibition against C. gloeosporioides and C. capsici with 64 and

>256 μg/mL, respectively.

Keyword: Trichoderma harzianum, chilli anthracnose, phthalide, tyrosol

Page 366: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

363

1. Introduction

Chilli is more important to the economy, including the consumption in the country as well as

export. It is used as spices and natural health product. However, it is almost damaged by

anthracnose disease caused by C. gloeosporioides and C. capsici[1] leading to a decrease in

chilli production. In previous studies, the use of biocontrol such as Trichoderma species can

manage this disease and reduce the residues in the environment[2,3]. An antibiotic is a

mechanism[4] of Trichoderma species to protect plant pathogenic fungi.

Preliminary of our research group, the crude extract of T. harzianum WuHQ75 showed the

potent growth inhibition against C. gloeosporioides and C. capsici with MIC of 32 μg/mL.

Therefore, we interested to isolate and elucidate the structure of bioactive metabolites from this

strain.

2. Main Body

2.1 Method

T. harzianum WuHQ75 was isolated from soil collected in Nakorn Si Thammarat province,

Thailand. It was grown on potato dextrose agar (PDA) for 7 days. The discs (5 mm) of growing

colonies were cut from the margin of each plate and inoculated into Erlenmeyer flask

containing 250 mL of potato dextrose broth (PDB). The stationary cultures were incubated for

27 days at room temperature. The cultures were filtrated through filter paper (Whatman No. 1)

to obtain culture filtrate. The combine culture filtrate (20 L) was exhaustively extracted with

ethyl acetate (EtOAc) and the organic layer was dried over Na2SO4 followed by evaporation

under reduced pressure to yield the extract (6.90 g). The crude extract was separated by column

chromatography on silica gel, eluting with ethyl acetatehexane and methanolethyl acetate

gradients to afford seven separated fractions (F1-F7).

Fraction F4 (506.7 mg) was separated by column chromatography on Sephadex LH 20, eluting

with 50% methanol-dichloromethane to provide 6 subfractions (A1-A6). Subfraction A6 (24.5

mg) was further separated by column chromatography, eluting with 100% dichloromethane to

give compound 1 (5.4 mg) as a white solid.

Fraction F6 (1.592 g) was separated by column chromatography on Sephadex LH 20, eluting

with 50% methanol-dichloromethane to provide 4 subfractions (B1-B4). Subfraction B3 (227.8

mg) was further separated by column chromatography on silica gel, eluting with 40% ethyl

acetate-hexane and further purified by column chromatography on silica gel, eluting with 20%

acetone-hexane to give compound 2 (145.4 mg) as a white solid.

The microdilution method was applied to analyze antifungal activity of pure compound by

using 96-well microliter plates[5]. The 2-fold dilution of samples, spore suspension and

Page 367: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

364

RPMI-1640 medium were added into each well to give final concentration of sample as 256-2

(µg/mL) and this test was performed in quadruplicate. The mixture was incubated for 48 h at

room temperature. 0.18% Resazurin (10 µL) was added to each well and further incubated for

3-4 h. Amphotericin B (10 µg/mL) and 1% DMSO were used as a positive control and control,

respectively. A result was indicated by a color change from blue to pink. The lowest

concentration at which the unchange color, was the MIC (minimum inhibitory concentration)

2.2 Results and Discussion

The investigation of the crude extract led to the isolation of a new naturally occurring

compound, phthalide (1, 5.4 mg), and tyrosol (2, 145.4 mg) which was previously reported

from T. harzianum[6] and T. brevicompactum[7]. Their structures were elucidated by analysis

of spectroscopic data ( UV, IR, MS, 1D and 2D NMR) and comprarison with literature.

Tyrosol displayed the growth inhibition of C. gloeosporiodes and C. capsici with MIC of 64

μg/mL whereas phthalide displayed the growth inhibition of C. gloeosporiodes and C. capsici

with MIC of 64 and >256 μg/ml, respectively.

2.3 Acknowledgments and Legal Responsibility

We would like to thank the Utilization of Natural Products Research Unit and Tropical Fruit

Research Unit at Walailak University for the facilities. This work was supported by a Walailak

University Fund.

3. References

[1] P. P. Than, H. Prihastuti, S. Phoulivong, P. W. J. Taylor, and K. D. Hyde, Chilli

anthracnose disease caused by Colletotrichum species., Journal of Zhejiang University.

Science. B, Vol. 9, no. 10, 2008, pp. 764–778.

[2] A. Isolation and F. Biocontrol, Trichoderma asperellum , Identified as a Novel Fungal

Biocontrol Agent for the Control of Plant Pathogen, 2012.

[3] B. Hajieghrari, M. Torabi-giglou, and M. R. Mohammadi, Biological potantial of some

Iranian Trichoderma isolates in the control of soil borne plant pathogenic fungi, African

Journal of Biotechnology, Vol. 7, no. 8, 2008, pp. 967–972.

[4] F. Vinale, K. Sivasithamparam, E. L. Ghisalberti, R. Marra, S. L. Woo, and M. Lorito,

Trichoderma-plant-pathogen interactions, Soil Biology and Biochemistry, Vol. 40, 2008,

pp. 1–10.

[5] N. D. Anaruma, F. L. Schmidt, M. C. T. Duarte, G. M. Figueira, C. Delarmelina, E. A.

Benato, and A. Sartoratto, Control of Colletotrichum gloeosporioides (penz.) Sacc. In

Page 368: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

365

yellow passion fruit using Cymbopogon citratus essential oil, Brazilian Journal of

Microbiology, Vol. 41, no. 1, 2010, pp. 66–73.

[6] P. K. Tarus, C. C. Lang‟at-Thoruwa, A. W. Wanyonyi, and S. C. Chhabra, Bioactive

metabolites from Trichoderma harzianum and Trichoderma longibrachiatum, Bulletin of

the Chemical Society of Ethiopia, Vol. 17, no. 2, 2003, pp. 185–190.

[7] A. Tijerino, R. E. Cardoza, J. Moraga, M. G. Malmierca, F. Vicente, J. Aleu, I. G. Collado,

S. Gutiérrez, E. Monte, and R. Hermosa, Overexpression of the trichodiene synthase gene

tri5 increases trichodermin production and antimicrobial activity in Trichoderma

brevicompactum., Fungal genetics and biology, Vol. 48, no. 3, 2011, pp. 285–96.

Page 369: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

366

SICASE-823

Construction and Sequencing Analysis of scFv Antibody Fragment Derived

from Monoclonal Antibody against Norfloxacin (Nor155)

Jirawat Mala

Program in Biotechnology, Faculty of Science, Chulalongkorn University, Thailand

Tanapat Palaga

Department of Microbiology, Faculty of Science, Chulalongkorn University, Thailand

Songchan Puthong, Kittinan Komolpis, Sarintip Sooksai*

Institute of Biotechnology and Genetic Engineering, Chulalongkorn University, Thailand *[email protected]

Yoshinobu Kaneko

Yeast Genetic Resources Lab, Graduate School of Engineering, Osaka University, Japan

Abstract

Norfloxacin belong to fluoroquinolone antibiotics which have been approved for treatment in

animals. However, their residues in animal products can pose adverse side effects to consumer.

Therefore, the detection of these residues in different food matrices could be concerned. In this

study, a single chain variable fragment (scFv) that recognizes norfloxacin antibiotic was

designed and constructed. The cDNA was synthesized from total RNA of hybridoma cells

against norfloxacin (Nor155). Genes encoding VH and VL regions of monoclonal antibody

against norfloxacin (Nor155) were amplified and sequenced. DNA fragments of VH and VL

regions were approximately 402 bp and 363 bp, respectively. The scFv of Nor155 was

constructed by adding (G4S)3 as linker between VH and VL regions and subcloned into pPICZαA,

an expression vector of Pichia pastoris. The obtained recombinant expression plasmid named

pJM01. The sequence of pJM01 expression plasmid was confirmed by sequencing analysis. The

complementarity determining region (CDR) I, II, and III of VH and VL were specified in the

deduced amino acid sequence. Sequence comparison indicates that the scFv was a homolog of

the single chain antibody 12G9 with 78% of degree homology. Taken together, the results

obtained reveal a potential information of amino acid sequence that will be useful for further

modification and production of scFv antibody in methylotrophic yeast P. pastoris.

Key words: monoclonal antibody, norfloxacin, scFv, sequencing analysis, CDRs

Page 370: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

367

Introduction

Norfloxacin has been reported as an antibiotic which is used to treat urinary bacterial infection in

animal [1, 2, 3]. However, the extensive abuse of this antibiotic has caused severe food safety

problems. Meanwhile, some research indicates that low-level doses of antibiotic for long periods

could result in bacteria resistance [1, 4, 5). The concern of antibiotic residue in animal products,

which may cause antibiotic resistance in pathogens, maximum residue limits (MRLs) for several

antibiotics have been established in many countries to protect consumers [6]. In the case of

norfloxacin, the MRLs were set depending on the types of targeting tissue [7]. In order to ensure

human food safety and the entire ecosystem security, various chromatography methods have

been developed for the determination of norfloxacin in different food matrixes [1, 8-10].

However, these instrumental methods are time consuming and costly, and sample preparations

are demanding. During the last two decades, various immunoassay methods have been

developed to detect fluoroquinolone (FQs) based on polyclonal antibody (PAb) and monoclonal

antibody (MAb) [ 6, 11-13]. Compared with instrumental analysis methods, immunoassay

methods have advantages of rapid, sensitive and high throughput characteristics. It is known that,

ELISA is the most suitable method for rapid screening large members of samples due to its

simplicity rapid, sensitive and inexpensive [14]. In ELISA, the most important component is

antibody which binds specific to the desired drug residues. To produce large quantities of

antibodies, many hybridoma cell cultivation systems have been investigated. However, PAbs

sometimes experience nonspecific reactivity and MAb preparation is extremely complicated,

highly expensive and depends on expertise [14], and the preparation of high quality antibodies is

still a bottleneck issue when establishing immunoassay methods [1]. Therefore, an alternative

production system is required. A promising method is a fermentation of antibody-producing

yeast.

Single-chain fragment variable (scFv) is the smallest unit of immunoglobulin (Ig) molecule and

still remains their function in antigen-binding activities. The structure of scFv consists of

variable regions of heavy (VH) and light (VL) chain, which are jointed together by a flexible

peptide linker [ 15-17] such as (Gly4Ser)3 [18] that can be easily expressed in functional form,

allowing protein engineering to improve the properties of scFv such as increase of affinity and

alteration of specificity [19]. The order of the domains can be either VH-linker-VL or

VL-linker-VH and both orientations have been applied [19]. This structure remains the original

specificity and full monovalent binding of the intact parent Ab [20].

To date, scFv antibodies have been successfully isolated and displayed as fragments in various

expression systems such as mammalian cell, bacteria (ref), plant (ref), insect cells (ref), and also

yeast (ref). However, the production of heterologous eukaryotic proteins, yeasts is frequently

used as the best-studied host for heterologous gene expression through genetic engineering [21].

Page 371: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

368

During the last two decades, the methylotrophic yeast, Pichia pastoris has become popular and

successful host for expression of recombinant proteins [16, 22-24].

The advantage is that the target proteins can be expressed as secretory forms [25]. Moreover, the

production of target proteins can be increased by high-cell-density fermentation. As a yeast cell,

P. pastoris, can express proteins for clinic application without contamination by endotoxins [26].

Furthermore, they have the ability to perform many of the post-translational modifications

usually performed in higher eukaryotes e.g. correct folding, disulfide bond formation, O- and

N-linked glycosylation and processing of signal sequences [24, 26-29].

The Institute of Biotechnology and Genetic Engineering (IBGE), Chulalongkorn University,

Thailand was recently achieved in the production of MAb against norfloxacin [Personal contact

to Ms. Songchan Puthong]. However, the production of norfloxacin-specific recombinant

antibody and the expression of scFv fragments using yeast expression system have not been

reported. In this study, gene encoding for VH and VL of MAb against norfloxacin (Nor155) was

identified. The scFv antibody was designed and constructed for cloning and expression in the

methylotrophic yeast, P. pastoris in the future.

Materials and Methods

Strains, Plasmids, Culture Medium and Reagents

Pichia pastoris strain GS115 (Mut+), Escherichia coli strain TOP10F‟, pPICZαA expression

vector and Zeocin™ were purchased from Invitrogen (USA). E. coli TOP10F‟ was used for all

plasmid constructions. The growth medium, Luria-B ertani (LB) medium, used in shake ‼ask

experiments was consisted of 5 g/L, yeast extract, 10g/L tryptone peptone and 10 g/L NaCl and

10 mg/L ampicillin. All medium components except ampicillin were sterilized by autoclaving

together at 121°C for 15 min. Ampicillin was sterilized by 0.22 mm ※ltration and added to the

medium immediately prior to inoculation. Other molecular biological reagents were purchased

from Takara (Japan) or Invitrogen (USA).

Preparation of First-Stand cDNA

Total RNA extraction from 5×106 hybridoma cells against norfloxacin (Nor155) using a

NucleoSpin® RNA II (Macherey-Nagel) was carried out according to the manufacturer‟s

instruction. First strand cDNA coding for the variable heavy and light chains was synthesized

from the total RNA extract (approximately 1 µg RNA) by using a first-strand cDNA synthesis kit

(Fermentas).

Construction of scFv Antibody Gene

Here, the scFv antibody gene was mainly constructed by PCR amplification and

ligation-reaction (Fig. 1A) followed by:

Page 372: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

369

(i) Amplification of VH and VL. The 1st cDNA fragments encoding the variable heavy chain (VH)

were amplified by using VHFwMH1 as forward primers and VHRwIgG1 as a reverse primer

while those encoding the variable light chian (VL) were amplified by using VLFwMk as a

forward primer and VLRwKc as a reverse primer (Table 1). Each PCR reaction contains: 2 µL of

1st cDNA, 20 pmol of 5‟ and 3‟ primers, 5 µL of 2.5 mM dNTPs, 5 µL of Taq polymerse buffer,

and 0.5 µL of i-Taq DNA polymerase (Intron Biotechnology). The final volume was brought to

50 µL with nuclease-free water. Cycling conditions were: initial melt at 94OC for 3 min followed

by 30 cycles of three-step program (94 O

C, 1 min; 45OC, 1 min; and 72

OC, 2 min). The reactions

were then held at 72OC for 10 min and cooled to 4

OC [30]. Then, the amplicons were

electrophoresed through 1% low-melting point agarose gel and visualized by staining with

ethidium bromide. Each of the amplified DNA fragments corresponding to the predicted size

was excised from the gel and was purified by using QIAquick PCR Purification Kit (QIAGEN).

The purified fragments then were ligated individually into the pGEM® T-easy vector (Promega)

and subsequently introduced into competent E. coli TOP10F‟. The blue/white screening was

used to select the positive clones on LB agar plates containing 100 µg/mL ampicillin, 50 µL

X-gal (20mg/ml) and 30 µL IPTG (0.1 M) respectively.

(ii) Construction of VH and VL gene with flexible polypeptide linkers. A 15 amino acid linker

encoding (Gly4Ser)3 was introduced behind the VH domain and in front of the VL domain to

produce a full-length scFv which was oriented as VH-(Gly4Ser)3–VL (Fig. 1A) by using specific

designed primer N1-N4 based on the VH and VL gene sequences as shown in the table 1. After

PCR, the VH-linker and linker-VL amplicons were separated and purified by 1% (w/v) agarose

gel electrophoresis. Afterward, the synthesized genes were cloned separately to the pGEM®

T-easy vector and was selected as above. Plasmid of the ampicillin-positive clones were

extracted and analyzed by restriction enzyme digestions and electrophoresis. The plasmids

containing the fragments of the specified sizes were confirmed by DNA sequencing. Finally, the

transformant clones with the accurate sequence were then used to generate the expression

plasmid.

(iii) Construction of recombinant scFv antibody expression plasmid. The VH-linker and

linker-VL clones having the BamHI–BglII restriction enzyme sites and EcoRI-KpnI linearized

pPICZαA vector were assembled by ligation reaction and then introduced into E. coli TOP10F‟

to generate the pPICZαA-scFv construct named pJM01 (Fig. 1B). The pJM01 was cloned in

frame with the α-factor secretion signal sequence open reading frame of the pPICZαA vector.

Page 373: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

370

Verification of pJM01 Plasmid

To confirm the ligation-reaction of constructed pJM01 plasmid, the following three methods

were carried out.

(i) PCR analysis of positive transformants. Five zeocin-resistance transformant clones were

analyzed by using PCR with designed primers TJ01F/TJ01R, N1/N4 and PAOX1F/TJ03R,

respectively (Fig. 2A) based on the pJM01 sequences map as shown in the table1, which could

Page 374: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

371

detect the ligation of the scFv antibody gene in to the pPICZαA, while pPICZαA vector was used

as negative control to compare with the positive clones (Fig. 2B). To obtain the DNA template,

plasmid DNA was extracted. PCR components and conditions were as follows: AmpliTaq Gold®

360 Master Mix (AB Applied Biosystem), 0.5µM of each primer, 1 cycle of 95oC – 5 min, 30

cycles of three-step program (95oC, 15 sec; 55

oC, 30 sec and 72

oC, 1.30). The reactions were

then held at 72oC for 7 min and cooled until used at 4

oC.

(ii) Restriction enzyme digestion. The positive clones which shown the specified size according

to the expected map were tested with EcoRI and KpnI, respectively.

(iii) Sequencing. To consider the scFv antibody gene was cloned in frame with the α-factor

secretion signal sequence. The positive clones, which shown the expected size from (i) and (ii)

methods were sequenced with BigDye® terminal sequencing kit and ABI PRISM

® 3130xl

Genetic Analyzer (Applied Biosystems, USA) using four oligonucleotide primers, TJ03F, TJ04F,

TJ05F, and TJ06R which were designed based on pJM01 sequence as shown in the table 1.

Identification of Complementarity Determining Region (CDRs) and Framework

Sequences (FR)

The obtained sequence was aligned by searching against the Genbank database for sequence

homology analysis. The CDR and framework sequences were identified by comparison with

IgG1 and light chain sequences database form GenBANK (NCBI) or published data.

Page 375: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

372

Results and Discussion

In this study, we designed, constructed, and sequenced the pJM01 (scFv antibody) plasmid

derived from MAb against norfloxacin (Nor155) and will be transformed into methylotrophic

yeast P. pastorris for production of recombinant antibody in the future.

Monoclonal antibody against norfloxacin clone 155, a clone that showed the highest efficiency

of IC50 and lowest of %cross-reactivity, was selected. Type and subtype of heavy chain of MAb

against norfloxacin (Nor155) was performed with mouse monoclonal antibody isotyping reagent

(Sigma-Aldrich) and shown that it was IgG1 (data not shown). Type of light chain of MAb

Nor155 was performed by using rat anti-mouse kappa light chain-HRP (Serotec) and it was

identified as kappa light chain (data not shown) [Personal contact to Ms. Songchan Puthong].

Construction of scFv Antibody

Total RNA was extracted from MAb nor155, and the first chain cDNA was synthesized by

RT-PCR kit using total RNA as template. The VH and VL genes were amplified separately by

PCR using the 1st cDNA template, and the lengths of VH and VL DNA fragments were

approximately 402 bp and 363 bp, respectively (GenBank, accession no. KJ623260). These

fragments were used to construct the VH-linker and linker-VL fragments by adding the flexible

linker (Gly4Ser)3. Then, these fragments were cloned into pGEM® T-easy vector and identified

by restriction enzyme digestion, electrophoretic analysis and DNA sequencing (data not

shown).The lengths of VH-linker and linker-VL DNA fragments were approximately 426 bp and

380 bp, respectively. Afterward, the recombinant scFv (VH-(Gly4Ser)3–VL) fragment (800 bp)

was assembled with EcoRI/KpnI linearized pPICZαA to generate the recombinant plasmid

named pJM01, which expected size was 4354 bp (Fig. 1B).

Verification of pJM01 Plasmid

To improve and facilitate the expression of the antibody fragment, VH-linker and linker-VL DNA

fragments were inserted into the open reading frame of the P.pastoris expression vector

pPICZαA under the regulation of AOX1 promoter using the EcoRI (bp 1203-1213) and KpnI

(1241-1246) restriction sites. At the C-terminal, the constructs were fused to a c-myc epitope tag

and a hexahistidine-tag. Colonies were screened for insertion using PCR analysis and restriction

cleavage reactions. In Fig.3A, the plasmid of five zeocin-positive transformants was extracted.

The presence of scFv antibody in those plasmids was tested by PCR technique with N1 and N4

primers as shown in the table 1. These primers were designed for up-stream amplification of VH

and down-stream of VL gene. The result reveals the 800 bp of PCR product according to the right

size of predicted restriction map of linearized pJM01plasmid (fig. 2A). This information

indicates that all of five positive transformants have had a scFv antibody gene inserted into the

pJM01 expression plasmid. In addition, we concerned of the nucleotide sequence of scFv

Page 376: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

373

antibody gene when it was cloned in frame with α-factor secretion signal in the pPICZαA vector

and translated to amino acid should be accurate.

For this reason, the plasmid of zeocin-positive transformant No.1 was selected to digest with

several restriction enzymes. In accordance with expected map, EcoRI, KpnI, and PmeI were used.

These enzymes showed a 1 position of enzymatic digestion that mean after digestion completely

and through electrophoresis the digested plasmid could show the linearized plasmid. Fig.3B

showed the result bands corresponding to the correct size of 4354 bp plasmid (lane 2, 3, and 5),

while lane 4 represented the using of EcoRI and KpnI digest the plasmid in the same time. It was

shown the 800 bp of scFv antibody gene when compared with the DNA marker. Moreover, we

also confirmed the plasmid of clone No.1 by PCR with primers as descripted in the table 1. Fig.

3C exhibits the positive bands approximately 1461 bp of PCR product (lane 2) by using

TJ01F/TJ01R primers, approximately 800 bp of PCR product (lane 4) by using N1/N4 primers

and approximately 1350 bp by using 5‟AOX1/3‟AOX1 primers (fig. 3D). Whereas, the using

these primers with pPICZαA vector as control, it showed approximately 700 bp (fig.3C, lane 1),

589 bp (fig.3D, lane1) and cannot detect any band by using N1/N4 primers (fig.3C, lane 3),

respectively.

Sequencing Analysis

The pJM01 plasmid of zeocin-positive transformant No.1 was sequenced with specified primers

(Table 1). The result shows the nucleotide sequence of scFv antibody gene, 800 nucleotides were

reached. Predicted translation of this sequence encoding 266 amino acids with a predicted

Page 377: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

374

molecular weight of 32.67 kDa including a flexible amino acid linker of (Gly4Ser)3 as shown in

Fig. 4.

Identification of Complementarity Determining Region (CDRs) and Framework

Sequences (FR)

Complementarity determining regions (CDRs) are part of the variable chains in

immunoglobulins (antibodies), where these molecules bind to their specific antigen. As the most

variable parts of the molecules, CDRs are crucial to the diversity of antigen specificities. Within

the variable domain, CDR I, CDR II, and CDR III are found in the variable region of a

polypeptide chain, and CDR3 is the most variable [31-32].

The complementarity determining regions (CDRs) I, II, and III of the variable region of both

heavy chain (VH) and light chain (VL) were identified according to the method provided by

Kabat [33]. The predicted of CDRI, CDR II and CDR III of VH domain was located at position

29-37, 52-60, and 99-112 in the primary protein sequences, while the predicted of CDRI, CDR II

and CDR III of VL domain was specified at position 170-180, 193-200, and 235-243 as depicted

in Fig. 4, respectively.

The deduced amino acid sequence of the scFv antibody gene was aligned by searching against

GenBank database. Through the blastp program, the result showed the similarity of scFv

sequence with others which have been submitted in. Over 50 different scFv antibodies

homologous sequence were found (data not shown). The first-five of these was selected and

Page 378: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

375

demonstrated. Each NCBI GenBank accession number is a sequence identified by blastp as a

highly homologous sequence to the query putative scFv antibody sequence. Comparative

analysis of the predicted amino acid sequence with the five known scFv sequences is shown in

Fig. 5 and summarized in the Table.2 including the accession number, definition, amount of

amino acid, max score, total score, query cover, e-value and identity, respectively. As a result,

the scFv antibody was found most closely related to the single chain antibody 12G9, partial (78%

identity) followed by anti-porcine sialoadhesin scFv antibody, partial (75% identity) and both of

scFv B4 anti-pectinase antibody, partial and anti-isoketal-adduct single chain variable fragment,

partial (74% identity), and scFv antibody, partial from Mus musculus (71% identity),

respectively.

Page 379: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

376

Conclusion

We have successfully designed, constructed, and sequenced a single-chain variable fragment

(scFv) antibody derived from the monoclonal antibody against norfloxacin clone Nor155. The

CDRs of amino acids that contribute the binding activity of scFv antibody were predicted.

Various results have been supported that the pJM01 expression plasmid containing scFv

antibody gene.

Acknowledgments

This research was partly supported by the 90th

Anniversary of Chulalongkorn University Fund

(Ratchadaphiseksomphot Endowment Fund) and Overseas Research Experience Scholarship for

Graduate Student, Graduate School, Chulalongkorn University. The authors would like to thank

Prof. Harashima Satoshi, Graduate School of Engineering, Osaka University, Japan for helpful

discussion.

Page 380: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

377

References

[1] Chen M., Wen K., Tao X., Xie J, Wang L., Li Y., Ding S. and Jiang H. Cloning, expression,

purification and characterization of a bispecific single-chain diabody against

fluoroquinolones and sulfonamides in Escherichia coli, Protein Expression and Purification.

100 (2014) 19-25.

[2] Donoghue D.J. Antibiotic residues in poutry tissues and eggs: Human Health concerns?

Poultry Science, 82 (2003) 618-621.

[3] Zhang H.T., Jiang J.Q., Wang Z.L., Chang X.Y., Liu X.Y.,Wang S.H., Zhao K. and Chen J.S.

development of an indirect competitive ELISA for simultaneous detection of enrofloxacin

and ciprofloxacin, Journal of Zhejiang University Science B (Biomedicine &

Biotechnology), 12-11(2011) 884-891.

[4] D.A. Franco, J. Webb, C.E. Taylor, Antibiotic and sulfonamide residues in meat:

implications for human health, J. Food Prot. 53 (1990) 178–185

[5] K. Zhu, J. Li, Z. Wang, H. Jiang, R.C. Beier, F. Xu, J. Shen, S. Ding, Simultaneous detection

of multiple chemical residues in milk using broad-specificity antibodies in a hybrid

immunosorbent assay, Biosens. Bioelectron. 26 (2011) 2716–2719.

[6] Manaspong C., Wongphanit P., Palaga T., Puthong S., Sooksai S. and Komolpis K.

Production and characterization of a monoclonal antibody against enrofloxacin, Journal of

Microbiology and Biotechnology, 23-1 (2013) 69-75.

[7] The European Agency for the Evaluation of Medicinal Products. Enrofloxacin (extension to

all food producing species): Summary report, 2002. EMEA/MRL/820/02-Final

[8] Jiang J., Zhang H., Liu J., Li J. and Wang Z. Development and optimization of an indirect

competitive ELISA for detection of norfloxacin residue in chicken liver, 2nd

IPCBEE,

6(2011) 460-463.

[9] M.I. Lopez, J.S. Pettis, I.B. Smith, P.-S. Chu, Multiclass determination and confirmation of

antibiotic residues in honey using LC–MS/MS, J. Agric. Food Chem. 56 (2008) 1553–

1559.

[10] G. Stubbings, T. Bigwood, The development and validation of a multiclass liquid

chromatography tandem mass spectrometry (LC–MS/MS) procedure for the determination

of veterinary drug residues in animal tissue using a QuEChERS (QUick, Easy, CHeap,

Effective, Rugged and Safe) approach, Anal. Chim. Acta 637 (2009) 68–78.

[11] Jinqing J., Haitang Z., Yonghua Q., Yongyao C. and Ziliang W. Production and

characterization of monoclonal antibodies against norfloxacin, Procedia Environmental

Sciences, 8 (2011) 529- 535.

[12] A.-C. Huet, C. Charlier, S.A. Tittlemier, G. Singh, S. Benrejeb, P. Delahaut, Simultaneous

determination of (fluoro) quinolone antibiotics in kidney, marine products, eggs, and

muscle by enzyme-linked immunosorbent assay (ELISA), J. Agric. Food Chem. 54 (2006)

2822–2827.

Page 381: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

378

[13] D.G. Pinacho, F. Sanchez-Baeza, M.P. Marco, Molecular modeling assisted hapten design

to produce broad selectivity antibodies for fluoroquinolone antibiotics, Anal. Chem. 84

(2012) 4527–4534.

[14] Wang, S., Du, X., Huang, Y., Lin, D., Hart, P. and Wang, Z. Detection of deoxynivalenol

based on a single-chain fragment variable of the antideoxynivalenol antibody, Federation

of European Microbiological Societies Microbiology Letters. 272(2007) 214-219.

[15] Freya M.F., Javier E.V., Marta A., Leonardo C.H., Hanssel B., Ivonne R., Arturo G.,

Alberto C. and Jorge V. G. Very high expression of an anti-carcinoembryonic antigen

single chain Fv antibody fragment in the yeast Pichia pastoris, Journal of Biotechnology,

76(2000) 157-163.

[16] Cornelia M., Patrick S., Kurt B.H., Roman K. and Reto A.S. Production of functionalized

single-chain Fv antibody fragments binding to the ED-B domain of the B-isoform of

fibronectin in Pichia pastoris, Protein Expression and Purification, 21(2001) 156-164.

[17] Rozbeh J., Patrik H., Macro P., and Birgitta E.S. Construction of divalent anti-keratin 8

single-chian antibodies (sc(Fv)2), expression in Pichia pastoris and their reactivity with

multicellular, Journal of Immunogical Methods, 364(2011) 65-76.

[18] Louise M.E., Amanda J.T., Philip J.B. and Peter J.N. Expression of an anti-CD33

single-chain antibody by Pichia pastoris, Journal of Immunological methods, 305(2005)

135-151.

[19] Ahmad Z.A., Yeap S.K., Ali A.M., Ho W.Y., Alitheen N.B.M. and Hamid M. Review

article: scFv antibody; Principles and clinical application, Clinical and developmental

immunology, (2012) 1-15.

[20] Parker S.A., Diaz I.L., Anderson K.A. and Batt C.A. Design, production, and

characterization of a single-chain variable fragment (scFv) derived from the prostate

specific membrane antigen (PSMA) monoclonal antibody J591, Protein Expression and

Puriffication, 89 (2013) 136-145.

[21] Jing H., Li X., Hongde H., Xiaojin D. and Lingyun J. High-level expression of

Staphylococcus Protein A in Pichia pastoris and purification and characterization of the

recombinant protein, Protein Expression and purification, 90(2013) 178-185.

[22] Chong S., Xiao W.Y., Fei L. and Yan X. Impact of gene dosage on the production of lipase

from Rhizopus chinensis CCTCC M201021 in Pichia pastoris, Appl. Biochem Biotechnol,

169(2013) 1160-1172.

[23] Mehmet I., Dinesh A., Jayanta S. and Michael M.M. Enhancement of protein secretion in

Pichia pastoris by overexpression of protein disulfide isomerase, Biotechnology and

Bioengineering, 93(2006) 771-778.

[24] Cereghino J.L. and Cregg J.M. Heterologous protein expression in the methylotrophic yeast

Pichia pastoris, FEMS microbial, Rev. 24 (2000) 45- 66.

[25] Issaly N, Solsona O. and Joudrier P. Optimization of the wheat puroindoline – a

production in Pichia pastoris. Journal Appl. Microbiol, 90 (2001) 397-406.

Page 382: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

379

[26] Diego G.N., Matias N.R., Martin B., Gaston E.O. and Miguel A.G. Cloning, expression

and optimized production in a bioreactor of bovine chymosin B in Pichia (Komagataella)

pastoris under AOX1 promoter, Protein Expression and Purification, 92(2013) 235-244.

[27] Morka K., Pietruszka J. and Berstenhorst S.M. Comparative expression of lipase CAL-A

in the yeasts Saccharomyces cerevisiae, Kluyveromyces lactis and Hansenula polymorpha

to investigate a possible host influence, Journal of Biotechnology, 191(2014) 176-186.

[28] Diego G.N., Martin B., Matias R. and Miguel A.G. Bioprocess and downstream

optimization of recombinant bovine chymosin B in Pichia pastoris under

methanol-inducible AOX1 promoter, Protein Expression and purification, 104(2014)

85-91.

[29] Yang Y.L., Kai X.Z., Ai K.H., Dan N.L., Li Z.C. and Shu D.X. High-level expression and

characterization of a thermostable xylanase mutant from Trichoderma reesei in Pichia

pastoris, Protein Expression and Purification, accepted vesion xxx(2014) xx-xx.

[30] Wang, Z., Raifu, M., Howard, M., Smith, L., Hansen, D., Goldsby, R. and Ratner, D.

Universal PCR amplification of mouse immunoglobulin gene variable regions: the design

of degenerate primers and an assessment of the effect of DNA polymerase 3‟ to

5‟exonuclease activity, Journal of Immunology Methods, 233(2000) 167-177.

[31] Klaus S.L., Henrik S., Niels H.H. and Mingyue H. A novel DNAseq program for enhanced

analysis of illumine GA II data: a case study on antibody complementarity-determining

regions, New Biotechnology, 29(2012) 271-278.

[32] Jooho R., Sung J.B., Youngsil S., Minjae K., Jae H.L., Songmi K., Yuno L., Keun W.L., Jin

K.K. and Myung H.K. Generation of a chickenized catalytic anti-nucleic acid antibody by

complementarity-determining region grafting, molecular Immunology, 63(2015)

513-520.

[33] Kabat E., Wu T. and Perry H. (1991). Sequences of Proteins of Immunological Interest,

5th edn. US Department of Health and Human Services, National Institutes of Health,

Bethesda, MD

Page 383: Conference Proceedingstweb.cjcu.edu.tw/conference/2015_07_03_10_32_45.579.pdfAdita Evalina Fitria Universitas Indonesia Minnie M. Liangco Pampanga State Agricultural University Prapat

380

SICASE-743

Properties and Microstructure of Cobalt-Based Alloy Layer by Laser

Cladding

Yao-Sheng Yang*, Yin-Fang Wei, Bo-Yong Chen, Yeou-Yih Tsai

Department of Electronic Engineering, Kao Yuan University, Taiwan *[email protected]

In the study, the Stellite1 cobalt-based alloy coatings were produced by laser cladding on a JIS

S45C medium carbon steel substrate with a transversal flow CO2 laser. Microstructure and

wear properties of the cladding coatings were studied by the XRD, SEM and wear testing. The

results show that the cladding coatings have better metallurgical bonding to the substrate, the

microstructure of cladding coatings consisted of equiaxed, columnar and cellular dendrite, and

the eutectic structure was little difference in composition of arm spacing among these

microstructures. The coating of the Stellite1 cobalt-based alloy process has hypoeutectic

microstructure comprising γ-austenite and M7C3 carbide. Wear resistance of the cladding

coatings has certain corresponding with the cladding parameter; the wear resistance reaches the

maximum value when laser power is 2KW.

Key Words :carbon steel、laser cladding、wear resistance、hypoeutectic