Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

The Use of Sterile Razors as an Efforts to HIV Transmission Prevention

10.11591/ijphs.v6i4.10780
Yuniar Wardani , Liena Sofiana , Suci Musvita Ayu , Erni Gustiina , Marsiana Wibowo , Fardhiasih Dwi Astuti , Septian Emma Dwi Jatmika
HIV Transmission can also occur as a result of the employment relationship.In addition to health workers there are other workers who are in close contact with his client was a barber, hairdresser, masseur, tattoo, ear piercer and acupuncturist. The purpose of this study was to determine the behavior of a barber in the prevention of transmission of HIV/AIDS with the use of a sterile razor blade. The study design was cross-sectional survey and data analysis is performed simultaneously with quantitative descriptive approach. This study was conducted in the district of Yogyakarta Special Region of Yogyakarta. Subjects of the study were all traditional barber in the study area. The sampling technique used purposive sampling with certain criteria under the terms set by the researchers. The data analysis used Spearman. The average age of respondents was 30.91, the number of consumers 31.28. Mean knowledge is 34.09, attitudes and behavior amounting to 31.06. Based on the rate most people are able to reach a price set by a razor because the tariff ranges between IDR 6,000-10,000 and an average tariff of IDR 8,230. On average shaver have 32 customers each month. There was a correlation between knowledge, attitude with behavior of a barber in the prevention of transmission of HIV/AIDS. There was a correlation between knowledge, attitude and behavior to conduct barber in the prevention of transmission of HIV/AIDS.
Volume: 6
Issue: 4
Page: 337-342
Publish at: 2017-12-01

Data Innovation Resource, Information Administration Capacity, and Aggressive Benefit: The Judicious Part of Reserve Assurance

10.11591/ijeecs.v8.i3.pp690-694
Archenaa J , E. A. Mary Anitha
The part of data innovation in information administration has dependably been a begging to be proven wrong subject in writing and practice. In spite of existing documentation with respect to the connection between IT asset what's more, information administration, restricted data is accessible on the diverse sorts of IT assets portraying this relationship. We coordinate two research streams rising in information administration what's more, broaden the writing on IT knowledge administration linkage by examining the directing part of asset sense of duty regarding conjure an unexpected asset point of view. Information from 168 associations in China give exact proof that three sorts of IT assets emphatically influence information administration capacity (IAC), which is decidedly related to upper hand. Moreover, this examination distinguishes two positive semi directing impacts of asset responsibility on the IT resource–IAC relationship. In particular, asset duty straightforwardly what's more, emphatically upgrades IAC, and reinforces the impacts of IT human and IT relationship assets on IAC. We talk about the hypothetical and viable ramifications of the outcomes.
Volume: 8
Issue: 3
Page: 690-694
Publish at: 2017-12-01

Safety Talk and Check to Prevent Pesticide Toxicity among Farmer

10.11591/ijphs.v6i4.9113
Eka Lestari Mahyuni , Ida Yustina , Etty Sudaryati
The problem at informal sector in particular for farmer when used the pesticides. In Sumber Mufakat village the farmers always use the pesticides without using the safety equipment and have direct contact with the pesticides exposure. The purpose of this research was to apply the safety talk and check method as prevention method to solve the pesticides toxicity that asses from safety and health of pesticide use behaviour. This preventive intervention research was using Participatory Action Research (PAR) design.The data collected by observation, quetionaire, and health check list. The population was all holticultura farmers in Sumber Mufakat village that divide in nine farmer's group. The sample collected by using proportional random sampling. The data will analyze by using qualitative descriptive. The result showed that the implication of safety talk and check method could prevent of pesticide exposure that present from safety and health of pesticides use behaviour. To support the action of safety talk method needed to develop one community that care about the farmers with government endorsement. The check method was very helpful the farmers to identify and predict their health. Both of it could be to cultivate the farmer in safety of pesticide used and early discovery of health symptom cause pesticide used.
Volume: 6
Issue: 4
Page: 293-298
Publish at: 2017-12-01

New Technique Based Peasant Multiplication for Effcient Signal Processing Applications

10.11591/ijeecs.v8.i3.pp726-729
Mahendra Sharma , Santhosh Kumar Singh
The Direct Form FIR channel is utilized for DSP application where the channel request is settled. For the most part this channel devours more range and power. To defeat this issue Multiplier Control Signal Decision window (MCSD) plans is joined into Direct Form FIR channel to powerfully change the channel arrange. MCSD structures comprise of Control flag Generator (CG) and Amplitude Detection (AD) rationale circuits. Advertisement rationale is utilized to disavow the correct duplication process and screen the amplitudes of information tests. CG is utilized to control the channel operation through inside counter. Traditional reconfigurable FIR channel is planned utilizing Vedic Multiplier that devours more territory and deferral. In this paper, changed reconfigurable FIR filer is intended to additionally decrease the APT (Area, Power and Timing) item. The proposed Reconfigurable FIR filer, Vedic Multiplier is supplanted by Russian Peasant Multiplication procedure. Subsequently adjusted Reconfigurable FIR channel with Russian Peasant Multiplier expends less region, postponement and power than all analyzed techniques.
Volume: 8
Issue: 3
Page: 726-729
Publish at: 2017-12-01

Review of Rabies Preventions and Control

10.11591/ijphs.v6i4.10781
Chernet Balcha , Nejash Abdela
Rabies is an acute viral infection of the central nervous system, caused by a lyssavirus in the family Rhabdoviridae. It is zoonotic viral disease that can affect all mammals, including humans, cats, dogs, and wildlife and farm animals. The virus is present in the saliva of affected animals, and the most frequent method of transmission to humans is by bites, scratches or licks to broken skin or mucous membranes. The disease has a long incubation period (six months) and symptoms may take several weeks to appear after infection. The first clinical symptom is neuropathic pain at the site of infection or wound due to viral replication. Diagnosis can only be confirmed by laboratory tests preferably conducted post mortem on central nervous system tissue removed from cranium. This paper reviews the possible prevention and control of rabies. Essential components of rabies prevention and control include ongoing public education, responsible pet ownership, routine veterinary care and vaccination, and professional continuing education. Control strategies include quarantine, confirmation of diagnosis, determining the origin and spread of an outbreak. Since rabies is invariably fatal and deadly viral disease that can only be prevented the collaborative effort between Veterinarians and human health care professionals are needed in the prevention and control of rabies.
Volume: 6
Issue: 4
Page: 343-350
Publish at: 2017-12-01

Quantization Encoding Algorithm Based Satellite Image Compression

10.11591/ijeecs.v8.i3.pp740-742
Anand M , V. Mathivananr
In the field of digital data there is a demand in bandwidth for the transmission of the videos and images all over the worlds. So in order to reduce the storage space in the field of image applications there is need for the image compression process with lesser transmission bandwidth. So in this paper we are proposing a new image compression technique for the compression of the satellite images by using the Region of Interest (ROI) based on the lossy image technique called the Quantization encoding algorithm for the compression. The performance of our method can be evaluated and analyzing the PSNR values of the output images.
Volume: 8
Issue: 3
Page: 740-742
Publish at: 2017-12-01

STM Observation of the Si(111) - (7×7) Reconstructed Surface Modified by Excess Phosphorus Doping

10.11591/ijece.v7i6.pp2993-3001
Hirulak D. Siriwardena , Toru Yamashita , Masaru Shimomura
The electronic properties of semiconductor surfaces change readily upon changing the carrier densities by controlling the dopant concentration. Additionally, excess dopant atoms can exert electric field which would affect the molecular adsorption process and could be used to manipulate the dynamic movement of confined molecules. A mechanism can be developed to control the molecular dynamic movement on modified semiconductor surface by dopants thus changing the effect of the electric field on the active molecules.  In this study, the Si(111) surface was doped with phosphorus excessively using thermal diffusion process. The surface was then reconstructed to the 7 × 7 configuration via heating under UHV conditions and then studied through STM and STS techniques. The protrusions due to surface and subsurface P atoms appear brighter due to the lone electron pair. The 7 × 7 reconstruction would be destabilized after a critical P substitution of Si-adatom concentration due to high surface strain result in P-terminated (6√3 × 6√3)R30º reconstruction.
Volume: 7
Issue: 6
Page: 2993-3001
Publish at: 2017-12-01

PDC Analysis of LLDPE-NR Nanocomposite for Effect of Moisture Absorption

10.11591/ijece.v7i6.pp3133-3139
N. A. M. Jamail , M. A. M. Piah , N. A. Muhammad , Q. E. Kamarudin
The properties of insulation have been improved by many research and the ability of nanocomposite material that composes the characteristic of improving electrical performance due to the addition of nanofiller into the based material gets serious attention. Polarization and Depolarization Current (PDC) measurement that has the ability to assess the condition of HV insulations with the initial periods after a DC step voltage application was favoured compared to other non-destructive monitoring techniques. This paper presents the works on moisture absorption in LLDPE-NR nanocomposite with different amount and percentage of nanofillers. The study of PDC level of the LLDPE-NR compound, filled with different amount of SiO2, TiO2 and MMT nanofiller using Polarization and Depolarization Current (PDC) measurement technique is the main objective of this research. These results show that sample A1 has the lowest polarization current value and sample B5 has the lowest depolarization current value.
Volume: 7
Issue: 6
Page: 3133-3139
Publish at: 2017-12-01

S-Bend Silicon-On-Insulator (SOI) Large Cross-Section Rib Waveguide for Directional Coupler

10.11591/ijece.v7i6.pp3299-3305
Nurdiani Zamhari , Abang Annuar Ehsan , Mohd Syuhaimi Abdul Rahman
S-bend contributes the high losses in the silicon-on-insulator (SOI) large cross-section rib waveguide (LCRW). The objective of this work is to investigate S-bend SOI LCRW with two different single-mode dimensions named symmetrical and asymmetrical. The S-bend SOI LCRW has been simulating using beam propagation method in OptiBPM software. The asymmetrical waveguide with two different dimension arc given the best performance if compared to others dimension with 3 µm of waveguide spacing. It achieved 92.24% and 91.10% of normalized output power (NOP) for 1550 nm and 1480 nm wavelength respectively. Moreover, the minimum of S-bend spacing between the two cores is 0.9 µm for both 1550 nm and 1480 nm. Therefore, asymmetrical waveguide with two different dimension arc and 0.9 µm of S-bend spacing are chosen. This analysis is important to determine the right parameter in order to design the SOI passive devices. However, future work should be done to see the performance by designing the coupler and implement in the real system.
Volume: 7
Issue: 6
Page: 3299-3305
Publish at: 2017-12-01

A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model

10.11591/ijece.v7i6.pp3515-3520
Vimal S. , Srivatsa S K.
In order to evaluate the trustworthiness of participating peers in unstructured peer-to-peer networks, Reputation aggregation methods are used in this method. Each and every peer of the network will collect the local scores of each transaction and will compute global scores by aggregating all the local scores with the help of global scores, each individual peer can interact with its suitable peers. But the existing method will not consider the score of the new peer. In this condition, requests are handled by existing peers who leads to failure in downloading process. To rectify this, NP-TRUST model is used to distribute the request to all peers including the newly joined peers. The proposed method is compared with gossip and DFR-TRUST model in Transaction Success rate and variation in file request.
Volume: 7
Issue: 6
Page: 3515-3520
Publish at: 2017-12-01

Fog Computing: Issues, Challenges and Future Directions

10.11591/ijece.v7i6.pp3669-3673
Prakash P , Darshaun K. G. , Yaazhlene. P , Medidhi Venkata Ganesh , Vasudha B
In Cloud Computing, all the processing of the data collected by the node is done in the central server. This involves a lot of time as data has to be transferred from the node to central server before the processing of data can be done in the server. Also it is not practical to stream terabytes of data from the node to the cloud and back. To overcome these disadvantages, an extension of cloud computing, known as fog computing, is introduced. In this, the processing of data is done completely in the node if the data does not require higher computing power and is done partially if the data requires high computing power, after which the data is transferred to the central server for the remaining computations. This greatly reduces the time involved in the process and is more efficient as the central server is not overloaded. Fog is quite useful in geographically dispersed areas where connectivity can be irregular. The ideal use case requires intelligence near the edge where ultra-low latency is critical, and is promised by fog computing. The concepts of cloud computing and fog computing will be explored and their features will be contrasted to understand which is more efficient and better suited for real-time application.
Volume: 7
Issue: 6
Page: 3669-3673
Publish at: 2017-12-01

An Agent Architecture for Qos-Based Web Service Composition Using the Skyline Algorithm

10.11591/ijict.v6i3.pp179-188
El-Alami Ayoub , Hair Abdellatif
Web service composition is a concept based on the built of an abstract process, by combining multiple existing class instances, where during the execution, each service class is replaced by a concrete service, selected from several web service candidates. This approach has as an advantage generating flexible and low coupling applications, based on its conception on many elementary modules available on the web. The process of service selection during the composition is based on several axes, one of these axes is the QoS-based web service selection. The Qos or Quality of Service represent a set of parameters that characterize the non-functional web service aspect (execution time, cost, etc...). The composition of web services based on Qos, is the process which allows the selection of the web services that fulfill the user need, based on its qualities. Selected services should optimize the global QoS of the composed process, while satisfying all the constraints specified by the client in all QoS parameters. In this paper, we propose an approach based on the concept of agent system and Skyline approach to effectively select services for composition, and reducing the number of candidate services to be generated and considered in treatment. To evaluate our approach experimentally, we use a several random datasets of services with random values of qualities.
Volume: 6
Issue: 3
Page: 179-188
Publish at: 2017-12-01

Pedestrian Detection using Triple Laser Range Finders

10.11591/ijece.v7i6.pp3037-3045
Abdul Hadi Abd Rahman , Khairul Akram Zainol Ariffinv , Nor Samsiah Sani , Hairi Zamzuri
Pedestrian detection is one of the important features in autonomous ground vehicle (AGV). It ensures the capability for safety navigation in urban environment. Therefore, the detection accuracy became a crucial part which leads to implementation using Laser Range Finder (LRF) for better data representation. In this study, an improved laser configuration and fusion technique is introduced by implementation of triple LRFs in two layers with Pedestrian Data Analysis (PDA) to recognize multiple pedestrians. The PDA integrates various features from feature extraction process for all clusters and fusion of multiple layers for better recognition. The experiments were conducted in various occlusion scenarios such as intersection, closed-pedestrian and combine scenarios. The analysis of the laser fusion and PDA for all scenarios showed an improvement of detection where the pedestrians were represented by various detection categories which solve occlusion issues when low numberof laser data were obtained.
Volume: 7
Issue: 6
Page: 3037-3045
Publish at: 2017-12-01

Multi-Machine Stability Using Dynamic Inversion Technique

10.11591/ijece.v7i6.pp3176-3189
Abha Tripathi , K. Uma Rao , L. Venkatesha
Stability studies of multi machine system are a major concern to power system engineers due to the increasing complexity involved. This paper deals with the application of a nonlinear technique called Dynamic Inversion, to TCSC for the improvement of stability of multi-machine system. The transient stability studies for various cases: without any controller, with 75% line compensation and with Dynamic Inversion technique, are compared. The critical clearing time as well as the maximum loading ability is also discussed. The result for the nonlinear controller is found to be better than all the other cases.
Volume: 7
Issue: 6
Page: 3176-3189
Publish at: 2017-12-01

Power Consumption Modeling and Analysis of Integrated Optical-Wireless Access Network

10.11591/ijece.v7i6.pp3475-3483
A. Ramli , N. Zulkifli , S. M. Idrus
The integration of optical and wireless technologies at access networks are considered as a future solution which provide both high bandwidth and high mobility in an efficient way. GPON is a suitable candidate for optical backhaul due to the combination of higher data rates, greater split ratio and support for triple play services hence it offers maximum flexibility and cost advantages. On the other hand, recent developments of new radio access technologies and introduction of femtocell base stations provide the potential of offering broadband services and applications to everyone and everywhere. However, the power consumption of this network demands a particular attention because access networks are the largest contributor the network related electricity consumption. Therefore, in this paper we evaluate the power consumption of integrated optical-wireless access network which is based on independent ONU-BS architecture. We proposed a power consumption model for such network and the assessment has been done under different simulation scenarios. The constructed model will provide insight of the energy performance of the integrated access network so that in the network design process, focus can be done to the most energy saving strategies.
Volume: 7
Issue: 6
Page: 3475-3483
Publish at: 2017-12-01
Show 1415 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration