Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

24,092 Article Results

Measuring Efficiency of Hospitals by DEA: An Empirical Evidence from Pakistan

10.11591/ijphs.v3i2.4684
Syed Aziz Rasool , Abdul Saboor , Muhammad Raashid
ABSTRACT There has been increasing focus on efficiency measurement in health sector around the world. This empirical study aims at measuring efficiency level of non-profit private organization by using Data Envelopment Analysis (DEA) in the health sector of Pakistan. DEA is non-parametric linear programming based approach for homogeneous decision making units. Layton Rehmatullah Benevolent Trust (non-profit private organization) will be subject matter for investigational analysis constituting over 16 sub-units spreading across the country. Secondary data of number of patient beds, specialists and nurses in all the 16 branches of LRBT hospitals will be used applying quantitative specification tool, both scale and technical efficiency levels in an environment where multiple of inputs and outputs are in place, will be used for final evaluation. The outcomes so expected will help policy makers to formulate effective plans and programs in order to enhance the efficiency of health measures conducted by non- profit private organizations. 
Volume: 3
Issue: 2
Page: 129-136
Publish at: 2014-06-01

Improved Multi-secret Sharing Scheme Based on One-Way Function

10.11591/ijeecs.v12.i6.pp4463-4467
Geng Yong-Jun , Guo Li-Zheng , Zheng Ming-Hui
The weakness He-Dawson’s threshold multi-secret sharing scheme is presented and analyzed. By using the one-way function thought in the He-Dawson scheme, a new multi-use and multi-secret sharing scheme is proposed. The improved scheme is multi-time-use of once secret shares distribution and can resist conspiring attack. Furthermore, the new scheme is multi-secret sharing, group secrets can be reconstructed in free order and different group secret is corresponding to different threshold value which can meet with different practical application. At last, the security and efficiency of the new proposed multi-secret sharing scheme are analyzed. DOI:  http://dx.doi.org/10.11591/telkomnika.v12i6.5483 
Volume: 12
Issue: 6
Page: 4463-4467
Publish at: 2014-06-01

X-Band 5-bit MMIC Digital Attenuator With Low Phase Shift

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3490
Chengpeng Liu , Xin Xu , Zhengrong He
This paper presents the x-band 5-bit MMIC digital attenuator with low phase shift. Phase compensation techniques were used in the MMIC design to reduce the phase shift. This attenuator is fabricated with 0.2µm GaAs PHEMT process. Measurement results of the developed MMIC chips in the x-band show that the 5-bit MMIC digital attenuator has 0.5dB resolution and 15.5dB dynamic attenuation range, input return losses was less than 10dB and output return losses was less than 13dB for all attenuation states, RMS is less than 0.2dB; insertion loss is less than 3.8dB; phase shift error is less than 5°for 35 attenuation states; The MMIC chip size is 1.58 mm×2.95 mm×0.1mm. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.4742
Volume: 12
Issue: 6
Page: 4184-4189
Publish at: 2014-06-01

Energy Harvesting Device Based on Spatial Electric Field in Substations

10.11591/ijeecs.v12.i6.pp4771-4777
Hongwei Li , Ganrong Peng
It is rich in electric field energy in high voltage substations while it is hardly collected and utilized. A novel energy harvesting device based on spatial electric field is presented in this paper, which is composed of capacitive energy collector and conditioning circuit. A simulation model of the energy collector is established to study the relationship between output voltage and its structural parameters and is verified by no-load tests. There are some restraining factors such as output voltage unstable in the traditional conditioning circuit. A new conditioning circuit is designed to overcome the problems and this new circuit is more effectively. This paper designs a new device to harvest the electric field energy within substations and it can provide broad potential use in the future.
Volume: 12
Issue: 6
Page: 4771-4777
Publish at: 2014-06-01

ICDS Scheme to the Growth Development in Preschoolers: A Systematic Review of Literature

10.11591/ijphs.v3i2.4679
Jemy Elizabeth Joseph
The health scenario in our country is rapidly changing, both in terms of the public health challenges that we face as well as our response to these challenges. As India becomes more and more developed and we have greater means at our disposal, our response to our health challenges must reflect our changing health and socio-economic status. India faces enormous challenges in the area of women’s and children’s health. These findings point to the importance of investing in various growth factors and sanitation, and educating the public about hygiene to promote health knowledge and better child outcomes. As importantly, such investments have the potential of making the feeding program more effective. ICDS therefore takes holistic view of the development of the child and attempts to improve both his/her prenatal and postnatal environment. Accordingly, besides children in their formative years (0-6 years), women between 15 to 45 years are also covered by the programme as these are child bearing years in the life of a women and her nutrition and health status has a bearing on the development of the child.
Volume: 3
Issue: 2
Page: 87-94
Publish at: 2014-06-01

Impact of Missing Data on EM Algorithm under Rayleigh Distribution

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3560
Zhendong Li , Mengmeng Li
Is EM algorithm parameter estimation under Rayleigh distribution sensitive to missing data and if it is, what extent is it? By designing computer simulation methods, contrast and analyze the results of maximum likelihood estimation with complete data and EM algorithm estimation under different missing rate in small sample. It shows that the results were almost identical when the missing rate is below 0.30, but the efficiency of EM parameter estimation gradually deteriorates as the missing rate increases. Meanwhile the results also show that the EM algorithm is sensitive to sample size and the selection of initial value. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5491
Volume: 12
Issue: 6
Page: 4717-4723
Publish at: 2014-06-01

Two Novel Retinal Blood Vessel Segmentation Algorithms

https://ijece.iaescore.com/index.php/IJECE/article/view/5590
Razieh Akhavan , Karim Faez
Assessment of blood vessels in retinal images is an important factor for many medical disorders. The changes in the retinal vessels due to the pathologies can be easily identified by segmenting the retinal vessels. Segmentation of retinal vessels is done to identify the early diagnosis of the disease like glaucoma, diabetic retinopathy, macular degeneration, hypertensive retinopathy and arteriosclerosis. In this paper, we propose two automatic blood vessel segmentation methods. The first proposed algorithm starts with the extraction of blood vessel centerline pixels. The final segmentation is obtained using an iterative region growing method that merges the contents of several binary images resulting from vessel width dependent modified morphological filters on normalized retinal images. In the second proposed algorithm the blood vessel is segmented using normalized modified morphological operations and neuro fuzzy classifier. Normalized morphological operations are used to enhance the vessels and neuro fuzzy classifier is used to segment retinal blood vessels. These methods are applied on the publicly available DRIVE database and the experimental results obtained by using green channel images have been presented and their results are compared with recently published methods. The results demonstrate that our algorithms are very effective methods to detect retinal blood vessels.DOI:http://dx.doi.org/10.11591/ijece.v4i3.5829
Volume: 4
Issue: 3
Page: 398-410
Publish at: 2014-06-01

Cardiovascular Health Behaviors and Risk Factors Among Argentine and American University Students

10.11591/ijphs.v3i2.4683
Gabriella Lynne Smith , Gina Fitzgerald , Don Thompson
Cardiovascular disease is the leading cause of death in adults in both theUnited States and Argentina. Scientific literature has consistently shown the effects of behaviors and risk factors on cardiovascular health; however, few have investigated cardiovascular behaviors and risk factors in early adulthood. We assessed the associations between main cardiovascular behaviors and cardiovascular risk factors among 594 young adults in a crosscultural analysis between the United States and Argentina through a webbased survey and vital statistics measurements. We tested our data through principle component analysis, bivariate correlations, and independent sample T-tests.After thorough analysis we saw that, cross culturally, correlations exist between cardiovascular risk factors and behaviors that are consistent in both populations. Health habit, health knowledge, health history and BMI are all significantly correlated with mean arterial pressure. T-tests showed that population groups with a higher risk factor mean also had lower behavior means, indicating that populations with poor cardiovascular behaviors correlate with an accumulation of cardiovascular risk factors. In conclusion, young adults with low prevalence of cardiovascular health behaviors have low prevalence of cardiovascular health risk factors.
Volume: 3
Issue: 2
Page: 117-128
Publish at: 2014-06-01

The Recognition of Stored Grain Pests Based on The Gabor Wavelet and Sparse Representation

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3496
Liang Hong Fu , Jing Lu
In order to improve the recognition rate and accuracy of stored grain pests classification, saving classification time, a new recognition method based on the Gabor wavelet and sparse representation is proposed in this paper. In this paper, nine typical pests in the stored grain are regarded as the research object, Gabor energy features and morphological features are extracted, principal component analysis is used to reduction dimension and sparse representation is used to achieve the classification of stored grain pests. Simulation results show that, Gabor energy feature is a better choose for grain pests classification, and the overall performance of Gabor features and sparse representation is better than the traditional classification methods. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.4860
Volume: 12
Issue: 6
Page: 4230-4236
Publish at: 2014-06-01

Immunomodulatory Effects of Papain in Patients with Cervical Ectopies

10.11591/ijphs.v3i2.4678
Dilorom Abdullaevna Musakhodjeva , Marufjon Abidovich Yuldashev , Neqqadam Abdullaevich Nuraliev , Rano Turdievna Sabitova , Gulnara Yangieva , Nigora Yakhayevna Fayzullaeva
The study detected that in patients with cervical ectopia production of cytokines (TNFα, IL-4 и IL-10) was significantly altered. The degree of changedepended on the presence or absence of infection. Conducted therapy withherbal enzyme - papain contributed to the cupping of inflammation andnormalization of the concentration of the studied cytokines.
Volume: 3
Issue: 2
Page: 81-86
Publish at: 2014-06-01

Software Vulnerability Analysis Method Based on Adaptive-K Sequence Clustering

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3509
Di Wu , Jiadong Ren
Software vulnerability analysis has become a hot topic recently. However, the traditional methods for analyzing software vulnerability have higher false positive rate. In this paper, adaptive K function is defined, and SVAAKSC (Software vulnerability analysis method based on adaptive-K sequence clustering) is presented. The collected objects in software vulnerability sequence database SVSD are pretreated to equal length vectors. Moreover, according to adaptive-K based sequence clustering algorithm, all software vulnerabilities in SVSD are clustered into K clustering. Afterwards, by matching the similarities between detected vulnerability from software and each clustering center, whether the detected vulnerability is a real software vulnerability can be judged. Finally, the corresponding analysis report is obtained. The experimental results and analysis show that SVAAKSC has lower false positive rate and better analysis time. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.4610
Volume: 12
Issue: 6
Page: 4330-4336
Publish at: 2014-06-01

The Design of Fine-grained Network QoS Controller and Performance Research with Network Calculus

10.11591/ijeecs.v12.i6.pp4468-4474
Hu Jia , Zhou Jinhe
In this paper a network QoS controller is designed. We use the controller to quantification ally control QoS under the random network traffic. The controller is built by min-plus algebra based on network calculus. The controller includes two parts, the lossless fractal regulator and the finite variable storage shaper (FVSS). We can get the arrival curve with the lossless fractal regulator. Then the FVSS control network traffic to realize the fine-gained QoS controller. At last, we analyze the performance of the network QoS controller. Research results show that the relationship between packet losses, packet delays and the buffer storage. We clearly observe the change of the packet loss and the packet delay with the storage of buffer. The results can be applied to evaluate the congestion and flow control strategies, as well as these are references to design network control device parameters. DOI: http://dx.doi.org/10.11591/telkomnika.v12i6.5484
Volume: 12
Issue: 6
Page: 4468-4474
Publish at: 2014-06-01

Development of Video On Demand Server Based on LiveMedia and Improved Cycle Patch Algorithm

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3507
Guimei Bai
The disadvantage of patching algorithm is that the generating multicast flow disorder and cycle patch algorithm solved the above problems. Improved Batch processing cycle patch algorithm has better treatment effect for large scale emergency request, and has a good effect in demand on demand for hot programs or prime time, can effectively increase the number of users. The main function of the LiveMedia library is implemented on a variety of media types and coding format support. The paper presents development of video on demand server based on LiveMedia and improved cycle patch algorithm. The test curve showed that patch cycle algorithm can provide service for more users in the same bandwidth, can effectively increase the number of concurrent users. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5015
Volume: 12
Issue: 6
Page: 4314-4321
Publish at: 2014-06-01

The Case for Microcredit: Does It Improve Maternal and Child Health and Wellbeing?

10.11591/ijphs.v3i2.4682
Madhurima Sarkar , Muhiuddin Haider
It is possible to achieve the above development goals, if disposable income, especially of the poor, is increased. A joint research project in Bangladesh was initiated by BRAC and ICDDR,B to evaluate the extent to which socioeconomic development engineered through microcredit might enhance maternal and child health programs and to determine the impact of rural community development programs on community well-being. We conducted a systematic review on BRAC-ICDDR,B Joint Research Project Working Paper Series. The series contained 32 working papers out of which we only selected papers that examined or had references to maternal and child health (n=13). We developed a checklist based on the Transparent Report of Evaluations with Nonrandomized Designs (TREND) criteria. The BRAC papers show promising positive linkages between implementation of microcredit programs in rural areas and (1) increase in income, (2) increase in health status and (3) improvement in women’s health. The assumption that increasing women’s empowerment through income and education leads to improvements health and survival is referred a number of times in the BRAC studies, however, this assumption has not been tested in well controlled intervention studies and further independent research needs to be conducted in order to test the hypotheses set out by the BRAC papers. The data from BRAC is a unique opportunity to examine pre and post intervention of the impact of microcredit and such data sets can provides researchers with the prospect of conducting continuous rigorous research in the country.
Volume: 3
Issue: 2
Page: 107-116
Publish at: 2014-06-01

Wireless network Risk Assessment Model and Application

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3551
JianGang Tang
Wireless network makes up the wired network shortcomings. With the popularity of the WiFi terminal, the security threats are constantly upgrading, and the security issues have been plaguing the legitimate user. In this paper we had analyzed the risks mechanism of WLAN for network resources, and designed an assessment model of security risk. When the incidents of network security which caused for vulnerability factors had been occurred, the model can be used to assess the consequences and impact on WLAN. The model achieves the network security early warning and control by scientific measurement and evaluation of the WLAN security risks. Wireless network security is not only with authentication, encryption, integrity testing and other technology-related, but also need intrusion detection systems, firewalls and other technology cooperation, so it’s a multi-layered problem. DOI: http://dx.doi.org/10.11591/telkomnika.v12i6.5446 
Volume: 12
Issue: 6
Page: 4639-4647
Publish at: 2014-06-01
Show 1427 of 1607

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration