Pub Date : 2015-11-01DOI: 10.1109/TICST.2015.7369371
H. D. Hermawan, F. Arifin
Batik is one of the Indonesian cultural heritages which contains symbol and deep philosophy of human life. But today, the young generation of Indonesia does not understand and recognize the diversity of Indonesian batik motifs. With sophisticated advance technology, it is become media for developer to create an application that can present the Indonesian batik motifs. The purpose of this research is to develop and analyse the quality of Batik Detector application as Android-based learning media for Indonesian Batik motifs at Singapore Indonesian School. Application development model used is Waterfall Model which consists of analysis, design, implementation and testing. Application development used development tools that are Unity 3D, mono-develop euphoria and markerless tracking augmented reality. The result of quality analysis for Batik Detector in performance efficiency aspect meets the Little Eye standard that was 15%. Functional suitability aspect was 100%, and met compatibility aspect. The feasibility level application based on opinions of media expert gained an average 4.31 in the category of highly proper, material expert was 100% in the category of valid, and from the users (usability) was 82.47%. It can be concluded that "Batik Detector" application is very feasible as learning media for Indonesian Batik motifs.
{"title":"The development and analysis of quality of \"Batik Detector\" as a learning media for Indonesia Batik motifs Android based in Indonesian School of Singapore","authors":"H. D. Hermawan, F. Arifin","doi":"10.1109/TICST.2015.7369371","DOIUrl":"https://doi.org/10.1109/TICST.2015.7369371","url":null,"abstract":"Batik is one of the Indonesian cultural heritages which contains symbol and deep philosophy of human life. But today, the young generation of Indonesia does not understand and recognize the diversity of Indonesian batik motifs. With sophisticated advance technology, it is become media for developer to create an application that can present the Indonesian batik motifs. The purpose of this research is to develop and analyse the quality of Batik Detector application as Android-based learning media for Indonesian Batik motifs at Singapore Indonesian School. Application development model used is Waterfall Model which consists of analysis, design, implementation and testing. Application development used development tools that are Unity 3D, mono-develop euphoria and markerless tracking augmented reality. The result of quality analysis for Batik Detector in performance efficiency aspect meets the Little Eye standard that was 15%. Functional suitability aspect was 100%, and met compatibility aspect. The feasibility level application based on opinions of media expert gained an average 4.31 in the category of highly proper, material expert was 100% in the category of valid, and from the users (usability) was 82.47%. It can be concluded that \"Batik Detector\" application is very feasible as learning media for Indonesian Batik motifs.","PeriodicalId":251893,"journal":{"name":"2015 International Conference on Science and Technology (TICST)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134327664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/TICST.2015.7369369
N. Jongsawat, Jirawin Decharoenchitpong
Anomaly detection itself may not be considered as the perfect solution to detect any new threat. In this paper, we propose to use Bayesian approach to detect relationship among variables in a network traffic dataset of the University's computer network. We apply two algorithms for learning Bayesian networks in order to form a Bayesian model. Next, p Bayesian Inference is performed in order to examine relationships among variables. The strong relationship among variables and unusually strong influences on other variables in the BN model will be used to define the rules according to our environment and needs for building an intrusion detection system. Finally, we create Snort rules based upon the relationships in the model.
{"title":"Creating behavior-based rules for snort based on Bayesian network learning algorithms","authors":"N. Jongsawat, Jirawin Decharoenchitpong","doi":"10.1109/TICST.2015.7369369","DOIUrl":"https://doi.org/10.1109/TICST.2015.7369369","url":null,"abstract":"Anomaly detection itself may not be considered as the perfect solution to detect any new threat. In this paper, we propose to use Bayesian approach to detect relationship among variables in a network traffic dataset of the University's computer network. We apply two algorithms for learning Bayesian networks in order to form a Bayesian model. Next, p Bayesian Inference is performed in order to examine relationships among variables. The strong relationship among variables and unusually strong influences on other variables in the BN model will be used to define the rules according to our environment and needs for building an intrusion detection system. Finally, we create Snort rules based upon the relationships in the model.","PeriodicalId":251893,"journal":{"name":"2015 International Conference on Science and Technology (TICST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127571720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/TICST.2015.7369401
Wasana Thongkamhaeng, N. Makate, Amaraporn Sengpanit
In this paper we present identities involving common factors of k - Jacobsthal and k - Jacobsthal - Lucas numbers. Also Binet's formula will employ to this identity.
{"title":"Some identities involving common factors of k-Jacobsthal and k-Jacobsthal - Lucas Numbers","authors":"Wasana Thongkamhaeng, N. Makate, Amaraporn Sengpanit","doi":"10.1109/TICST.2015.7369401","DOIUrl":"https://doi.org/10.1109/TICST.2015.7369401","url":null,"abstract":"In this paper we present identities involving common factors of k - Jacobsthal and k - Jacobsthal - Lucas numbers. Also Binet's formula will employ to this identity.","PeriodicalId":251893,"journal":{"name":"2015 International Conference on Science and Technology (TICST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133051953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/TICST.2015.7369390
Warinda Kiatdherarat, C. Netramai
This work focuses on the further reduction of the bandwidth usage of the Bloom Filter based SNMP by means of an additional compression scheme. The zip compression technique is used for the zip encryption and the zip decryption of the Bloom Filter. The experiment with compression ratio was done and the results show that the SNMP bandwidth that utilizes the proposed compression scheme is reduced to 10.23% and the compression time is small and negligible and SNMP information still retain its 100% correctness.
{"title":"Bandwidth reduction in SNMP monitoring system with bloom filter using lossless compression","authors":"Warinda Kiatdherarat, C. Netramai","doi":"10.1109/TICST.2015.7369390","DOIUrl":"https://doi.org/10.1109/TICST.2015.7369390","url":null,"abstract":"This work focuses on the further reduction of the bandwidth usage of the Bloom Filter based SNMP by means of an additional compression scheme. The zip compression technique is used for the zip encryption and the zip decryption of the Bloom Filter. The experiment with compression ratio was done and the results show that the SNMP bandwidth that utilizes the proposed compression scheme is reduced to 10.23% and the compression time is small and negligible and SNMP information still retain its 100% correctness.","PeriodicalId":251893,"journal":{"name":"2015 International Conference on Science and Technology (TICST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129349870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/TICST.2015.7369373
Chanifah Indah Ratnasari, S. Kusumadewi, L. Rosita
In Indonesia, patient complaints are recorded in the form of free-text data or a narrative text by the doctor when taking the medical history or conducting the medical interview. This text, although recorded in electronic medical records (EMR), is difficult to process computationally because the computer does not recognize natural language. The structure of the Indonesian language differs from that of English. Moreover, the language of patient complaints is structured differently from the Indonesian language in general. It does not consist of the S-P-O-K (Subject-Predicate-Object-Adverb) structures that are used in Indonesian sentences. Moreover, there is a wide range of local languages in Indonesia. Based on data on patient complaints obtained from physicians, this study develops production rules for mapping patient complaints. The aim of the study is to develop a parsing method that automatically maps patient complaints from an unstructured text into a structured text that can be recognized by the computer. In the parsing process developed in this research, a narrative text that has been split into words and/or separated phrases/clauses is used to conduct a suitability search of the lexicon. The lexicon that exceeded the minimum suitability value (threshold) and the highest (maximum) suitability value was selected as the candidate for the lexicon. This study was conducted with consideration for the important information in the free text of patient complaints and could be used subsequently to support a wide variety of clinical decisions.
{"title":"Natural language parsing of patient complaints in Indonesian language","authors":"Chanifah Indah Ratnasari, S. Kusumadewi, L. Rosita","doi":"10.1109/TICST.2015.7369373","DOIUrl":"https://doi.org/10.1109/TICST.2015.7369373","url":null,"abstract":"In Indonesia, patient complaints are recorded in the form of free-text data or a narrative text by the doctor when taking the medical history or conducting the medical interview. This text, although recorded in electronic medical records (EMR), is difficult to process computationally because the computer does not recognize natural language. The structure of the Indonesian language differs from that of English. Moreover, the language of patient complaints is structured differently from the Indonesian language in general. It does not consist of the S-P-O-K (Subject-Predicate-Object-Adverb) structures that are used in Indonesian sentences. Moreover, there is a wide range of local languages in Indonesia. Based on data on patient complaints obtained from physicians, this study develops production rules for mapping patient complaints. The aim of the study is to develop a parsing method that automatically maps patient complaints from an unstructured text into a structured text that can be recognized by the computer. In the parsing process developed in this research, a narrative text that has been split into words and/or separated phrases/clauses is used to conduct a suitability search of the lexicon. The lexicon that exceeded the minimum suitability value (threshold) and the highest (maximum) suitability value was selected as the candidate for the lexicon. This study was conducted with consideration for the important information in the free text of patient complaints and could be used subsequently to support a wide variety of clinical decisions.","PeriodicalId":251893,"journal":{"name":"2015 International Conference on Science and Technology (TICST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129610663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/TICST.2015.7369415
U. Pakdee, S. Chiangga, Suchat Suwannatus, Boonchai Duangsawat, C. Oopathump, P. Klumdoung
Single-walled carbon nanotubes (SWCNTs), multi-walled carbon nanotubes (MWCNTs), and carbon nanofibers (CNFs) in hybrid structures were synthesized on austenitic stainless steel substrates (Type:304). The formation of nanoparticles on substrates occurred under hydrogen gas (H2) with temperature of 720 °C. The effects of reductive heat treatment on the growth of carbon nanostructures at 15, 45, 60, 75 and 80 minutes were examined with scanning electron microscope (SEM), transmission electron microscope (TEM), X-ray diffractrometer (XRD) and thermogravimetric analysis (TGA). The samples were synthesized using thermal chemical vapor deposition (Thermal CVD) under atmospheric pressure of acetylene gas (C2H2). The combination of carbon nanotubes and carbon nanofibers in hybrid structure was synthesized on a substrate using a long time to adjust the surface by heating treatment. The hybrid structure of carbon could not be observed when used in surface treatment time was 80 minutes. Shorter (<;45 min) or longer (>75 min) substrate heat treatments did not produce hybrid carbon nanostructures at this temperature.
{"title":"Reductive heat treatment of austenitic stainless steel substrate for growth of hybrid carbon nanostructures","authors":"U. Pakdee, S. Chiangga, Suchat Suwannatus, Boonchai Duangsawat, C. Oopathump, P. Klumdoung","doi":"10.1109/TICST.2015.7369415","DOIUrl":"https://doi.org/10.1109/TICST.2015.7369415","url":null,"abstract":"Single-walled carbon nanotubes (SWCNTs), multi-walled carbon nanotubes (MWCNTs), and carbon nanofibers (CNFs) in hybrid structures were synthesized on austenitic stainless steel substrates (Type:304). The formation of nanoparticles on substrates occurred under hydrogen gas (H2) with temperature of 720 °C. The effects of reductive heat treatment on the growth of carbon nanostructures at 15, 45, 60, 75 and 80 minutes were examined with scanning electron microscope (SEM), transmission electron microscope (TEM), X-ray diffractrometer (XRD) and thermogravimetric analysis (TGA). The samples were synthesized using thermal chemical vapor deposition (Thermal CVD) under atmospheric pressure of acetylene gas (C2H2). The combination of carbon nanotubes and carbon nanofibers in hybrid structure was synthesized on a substrate using a long time to adjust the surface by heating treatment. The hybrid structure of carbon could not be observed when used in surface treatment time was 80 minutes. Shorter (<;45 min) or longer (>75 min) substrate heat treatments did not produce hybrid carbon nanostructures at this temperature.","PeriodicalId":251893,"journal":{"name":"2015 International Conference on Science and Technology (TICST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130039921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/TICST.2015.7369408
M. Bahrami, Shahriyar Eslami, M. Zandi, R. Gavagsaz-Ghoachani, A. Payman, M. Phattanasak, B. Nahid-Mobarakeh, S. Pierfederici
In this paper, the predictive based reliability analysis of an electrical hybrid distributed generation (EHDG) is presented. The effect of a battery bank, as an electrical storage system, is investigated on the reliability of a distributed generation system (DGS) which forms an EHDG with a photovoltaic system as the main source. More precisely, to solve the problem of the intermittent nature of the sun, which effects on the reliability, an interesting solution based on utilization of an electrical energy storage system (EESS) is studied. To improve results accuracy of the distributed generation (DG) reliability assessment which are usually obtained by the starting and the switching mode probability of the integrated Markov model, a simulation-based method is carried out in this paper. Therefore, all available states of renewable energy resources in DGSs are considered in this study. For this purpose, availability of the electrical energy of a simple DGS and an EHDG is simulated by TRNSYS (Transient System Simulation Tool) software and is compared. The proposed method can be used before implementation of an EHDG based system during the feasibility study phase and leads to proposing an appropriate solution to manage the electrical energy and the energy consumption in a system.
{"title":"Predictive based reliability analysis of electrical hybrid distributed generation","authors":"M. Bahrami, Shahriyar Eslami, M. Zandi, R. Gavagsaz-Ghoachani, A. Payman, M. Phattanasak, B. Nahid-Mobarakeh, S. Pierfederici","doi":"10.1109/TICST.2015.7369408","DOIUrl":"https://doi.org/10.1109/TICST.2015.7369408","url":null,"abstract":"In this paper, the predictive based reliability analysis of an electrical hybrid distributed generation (EHDG) is presented. The effect of a battery bank, as an electrical storage system, is investigated on the reliability of a distributed generation system (DGS) which forms an EHDG with a photovoltaic system as the main source. More precisely, to solve the problem of the intermittent nature of the sun, which effects on the reliability, an interesting solution based on utilization of an electrical energy storage system (EESS) is studied. To improve results accuracy of the distributed generation (DG) reliability assessment which are usually obtained by the starting and the switching mode probability of the integrated Markov model, a simulation-based method is carried out in this paper. Therefore, all available states of renewable energy resources in DGSs are considered in this study. For this purpose, availability of the electrical energy of a simple DGS and an EHDG is simulated by TRNSYS (Transient System Simulation Tool) software and is compared. The proposed method can be used before implementation of an EHDG based system during the feasibility study phase and leads to proposing an appropriate solution to manage the electrical energy and the energy consumption in a system.","PeriodicalId":251893,"journal":{"name":"2015 International Conference on Science and Technology (TICST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131315450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/TICST.2015.7369393
A. Hidayatullah
Indonesia is a wide country which has thousands of islands, hundred languages and dialects. These conditions cause many habits and behaviour to the people, including their activities in social media. Twitter and other social media have no language rules for users. Therefore, people are able to write everything very free without any regulations when they are posting their tweets. Generally, there are five types of writing that presented in the dataset such as tweet that written in the normal form of Bahasa, mixed Bahasa with local language, mixed Bahasa with foreign language, contains abbreviations, and contains slang words. Moreover, this investigation has found sixteen characteristics of Indonesian tweet where some of them are the combination of the five writing styles. By understanding the characteristics of writing style in Twitter messages, we proposed the algorithm in the pre-processing step to alter the non-standard words into standard form in Bahasa Indonesia.
{"title":"Language tweet characteristics of Indonesian citizens","authors":"A. Hidayatullah","doi":"10.1109/TICST.2015.7369393","DOIUrl":"https://doi.org/10.1109/TICST.2015.7369393","url":null,"abstract":"Indonesia is a wide country which has thousands of islands, hundred languages and dialects. These conditions cause many habits and behaviour to the people, including their activities in social media. Twitter and other social media have no language rules for users. Therefore, people are able to write everything very free without any regulations when they are posting their tweets. Generally, there are five types of writing that presented in the dataset such as tweet that written in the normal form of Bahasa, mixed Bahasa with local language, mixed Bahasa with foreign language, contains abbreviations, and contains slang words. Moreover, this investigation has found sixteen characteristics of Indonesian tweet where some of them are the combination of the five writing styles. By understanding the characteristics of writing style in Twitter messages, we proposed the algorithm in the pre-processing step to alter the non-standard words into standard form in Bahasa Indonesia.","PeriodicalId":251893,"journal":{"name":"2015 International Conference on Science and Technology (TICST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114091694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/TICST.2015.7369343
N. S. N. Anwar, M. Abdullah
Application of through-the-wall radar imaging (TWRI) in many critical scenarios requires accurate and fast target identification. The spatial distribution of a target in TWRI is a function of many variables thus making it a very complex and dynamic problem. Especially for multiple targets and in clutter rich environments, the operator faces a challenging task separating the target from noise and background clutter. In this work, a combination of a sensitive constant false alarm rate (CFAR) thresholding technique and a binary masking operation is proposed. The experimental results show that the technique provides a good trade-off between high sensitivity and low false detection rate.
{"title":"A novel technique for multiple targets detection in through-the-wall radar imaging","authors":"N. S. N. Anwar, M. Abdullah","doi":"10.1109/TICST.2015.7369343","DOIUrl":"https://doi.org/10.1109/TICST.2015.7369343","url":null,"abstract":"Application of through-the-wall radar imaging (TWRI) in many critical scenarios requires accurate and fast target identification. The spatial distribution of a target in TWRI is a function of many variables thus making it a very complex and dynamic problem. Especially for multiple targets and in clutter rich environments, the operator faces a challenging task separating the target from noise and background clutter. In this work, a combination of a sensitive constant false alarm rate (CFAR) thresholding technique and a binary masking operation is proposed. The experimental results show that the technique provides a good trade-off between high sensitivity and low false detection rate.","PeriodicalId":251893,"journal":{"name":"2015 International Conference on Science and Technology (TICST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121100587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/TICST.2015.7369350
Supapom Chunchom, Teeraporn Katisart, Sirirat Deeseenthum, C. Talubmook
Kefir is a fermented milk product comprising several lactic acid bacteria, acetic acid bacteria and yeasts. It has been reported to possess pharmacological and antioxidant activities. Recently, kefir from rice milk showed antioxidant activity higher than that from cow milk. To see whether rice and rice products such as rice kefir is safe for human applications. Therefore, the present study was designed to determine an acute toxicity of kefir powder from brown rice; KhaoDawk Mali 105 (KDMLKP), Red Hawm (RHKP) and Hawm Nil (HNKP). The study was carried out in male Wistar rats by once giving kefir powder at the doses of 1,000, 2,000 and 4,000 mg/kg to the rats orally. The results showed that the kefir powder of all the doses did not produce mortality and symptoms of toxicity. Moreover, the kefir powder did not alter relative organ weight (ROW) and feed conversion ratio (FCR) in the kefir powder treated rats compared to those in controls, but this was not a 4,000 mg/kg RHKP. Increasing KDMLKP significantly (p≤0.05) increased body weight gain and food intake, whilst increasing HNKP significantly (p≤0.05) decreased the body weight gain, but significantly (p≤0.05) increased food intake in the treated rats compared to that in controls. However, RHKP did not alter the body weight gain but increasing RHKP significantly (p≤0.05) decreased food intake in the treated rats compared to that in controls. KDMLKP and HNKP did not alter BS, BUN, CREA, UA, TP, Alb, AST, ALT, and ALP in the treated rats compared to those in controls. KDMLKP at a dose of 4,000 mg/kg significantly (p≤0.05) increased TP and Alb. Nevertheless, RHKP at a dose of 4,000 mg/kg significantly (p≤0.05) increased BUN, TP, AST, ALT, and ALP in the treated rats when compared to those in controls. KDMLKP, RHKP and HNKP did not alter WBC, Hb, Hct and Plt in the treated rats compared to those in controls but this was not at a dose of 4,000 mg/kg RHKP. Interestingly, the rats received 4,000 mg/kg KDMLKP and RHKP but not HNKP significantly (p≤0.05) reduced RBC compared to that in controls. Moreover, increasing KDMLKP, RHKP and HNKP significantly (p≤0.05) decreased Neu but increased Lym compared to those in controls. These findings indicate that the kefir powder from brown rice; KhaoDawk Mali 105 (KDMLKP), Red Hawm (RHKP) and Hawm Nil (HNKP) exhibit non acute toxicity with LD50 higher than 4,000 mg/kg. Kefir powder from this brown rice is probably a new good nutrition resource.
开菲尔是一种由乳酸菌、醋酸菌和酵母组成的发酵乳制品。据报道,它具有药理和抗氧化活性。近年来,米乳克非尔的抗氧化活性高于牛奶。看看大米和米制品,如米开菲尔,对人类是否安全。因此,本研究旨在确定糙米开菲尔粉的急性毒性;KhaoDawk Mali 105 (KDMLKP), Red Hawm (RHKP)和Hawm Nil (HNKP)。本研究以雄性Wistar大鼠为研究对象,分别口服1,000、2,000和4,000 mg/kg剂量的开菲尔粉。结果表明,所有剂量的开菲尔粉均未产生死亡和毒性症状。此外,与对照组相比,克非尔粉没有改变克非尔粉处理大鼠的相对器官重量(ROW)和饲料转化率(FCR),但这不是4000 mg/kg RHKP。增加KDMLKP显著(p≤0.05)提高了治疗组大鼠的增重和摄食量,增加HNKP显著(p≤0.05)降低了治疗组大鼠的增重,但显著(p≤0.05)增加了治疗组大鼠的摄食量。然而,RHKP对体重增加没有影响,但RHKP的增加显著(p≤0.05)降低了治疗大鼠的摄食量。与对照组相比,KDMLKP和HNKP未改变治疗大鼠的BS、BUN、CREA、UA、TP、Alb、AST、ALT和ALP。4000 mg/kg剂量的KDMLKP显著(p≤0.05)提高TP和Alb。然而,与对照组相比,4000 mg/kg剂量的RHKP显著(p≤0.05)提高了治疗大鼠的BUN、TP、AST、ALT和ALP。与对照组相比,KDMLKP、RHKP和HNKP没有改变治疗大鼠的WBC、Hb、Hct和Plt,但这不是在剂量为4000 mg/kg RHKP时发生的。有趣的是,与对照组相比,接受4000 mg/kg KDMLKP和RHKP治疗的大鼠红细胞明显减少(p≤0.05)。与对照组相比,增加KDMLKP、RHKP和HNKP显著(p≤0.05)降低了Neu,提高了Lym。结果表明:糙米开菲尔粉;红山楂105 (KDMLKP)、红山楂(RHKP)和红山楂零(HNKP)表现出非急性毒性,LD50高于4000 mg/kg。从这种糙米中提取的开菲尔粉可能是一种新的良好的营养资源。
{"title":"Acute toxicity of brown rice kefir powder","authors":"Supapom Chunchom, Teeraporn Katisart, Sirirat Deeseenthum, C. Talubmook","doi":"10.1109/TICST.2015.7369350","DOIUrl":"https://doi.org/10.1109/TICST.2015.7369350","url":null,"abstract":"Kefir is a fermented milk product comprising several lactic acid bacteria, acetic acid bacteria and yeasts. It has been reported to possess pharmacological and antioxidant activities. Recently, kefir from rice milk showed antioxidant activity higher than that from cow milk. To see whether rice and rice products such as rice kefir is safe for human applications. Therefore, the present study was designed to determine an acute toxicity of kefir powder from brown rice; KhaoDawk Mali 105 (KDMLKP), Red Hawm (RHKP) and Hawm Nil (HNKP). The study was carried out in male Wistar rats by once giving kefir powder at the doses of 1,000, 2,000 and 4,000 mg/kg to the rats orally. The results showed that the kefir powder of all the doses did not produce mortality and symptoms of toxicity. Moreover, the kefir powder did not alter relative organ weight (ROW) and feed conversion ratio (FCR) in the kefir powder treated rats compared to those in controls, but this was not a 4,000 mg/kg RHKP. Increasing KDMLKP significantly (p≤0.05) increased body weight gain and food intake, whilst increasing HNKP significantly (p≤0.05) decreased the body weight gain, but significantly (p≤0.05) increased food intake in the treated rats compared to that in controls. However, RHKP did not alter the body weight gain but increasing RHKP significantly (p≤0.05) decreased food intake in the treated rats compared to that in controls. KDMLKP and HNKP did not alter BS, BUN, CREA, UA, TP, Alb, AST, ALT, and ALP in the treated rats compared to those in controls. KDMLKP at a dose of 4,000 mg/kg significantly (p≤0.05) increased TP and Alb. Nevertheless, RHKP at a dose of 4,000 mg/kg significantly (p≤0.05) increased BUN, TP, AST, ALT, and ALP in the treated rats when compared to those in controls. KDMLKP, RHKP and HNKP did not alter WBC, Hb, Hct and Plt in the treated rats compared to those in controls but this was not at a dose of 4,000 mg/kg RHKP. Interestingly, the rats received 4,000 mg/kg KDMLKP and RHKP but not HNKP significantly (p≤0.05) reduced RBC compared to that in controls. Moreover, increasing KDMLKP, RHKP and HNKP significantly (p≤0.05) decreased Neu but increased Lym compared to those in controls. These findings indicate that the kefir powder from brown rice; KhaoDawk Mali 105 (KDMLKP), Red Hawm (RHKP) and Hawm Nil (HNKP) exhibit non acute toxicity with LD50 higher than 4,000 mg/kg. Kefir powder from this brown rice is probably a new good nutrition resource.","PeriodicalId":251893,"journal":{"name":"2015 International Conference on Science and Technology (TICST)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132540590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}