Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

25,002 Article Results

New Generation Solar PV Powered Sailing Boat using Boost Chopper

10.11591/ijeecs.v12.i12.pp8077-8084
Soumya Das , Pradip Kumar Sadhu , Suprava Chakraborty , Nitai Pal , Gourav Majumdar
The objective of this paper is to establish technical and economical aspects of the application of stand-alone photovoltaic (PV) system in sailing boat using boost chopper in order to simplify the power system and minimize the cost. Performance and control of dc-dc converter, suitable for photovoltaic (PV) applications, is presented here. This converter is mainly boost converter feeding a dc load. However, for integration purpose only one inductor is sufficient for power conversion in the converter. Here, the boost converter extracts complete power from the PV source and feeds into the load. Furthermore, the PV panel provides the essential protection to the passengers of boat from the straight sunshine and also from the rainwater.
Volume: 12
Issue: 12
Page: 8077-8084
Publish at: 2014-12-01

Multi Facial Blurring using Improved Henon Map

10.12928/telkomnika.v12i4.359
Saparudin; Sriwijaya University Saparudin , Ghazali; Universiti Teknologi Malaysia Sulong , Muhammed; Universiti Teknologi Malaysia Ahmed Saleh
Generally, full encryption is applied on the entire image to obscure the faces. However, it suffers in overhead, speed and time. Alternatively, selective encryption can be used to encrypt only the sensitive part of the image such as human faces. This paper proposes a new encryption algorithm using enhanced Henon chaotic map to conceal the faces. This technique involves three steps: face detection, encryption and decryption. Experiments have been performed to evaluate security such as histogram, sensitivity and statistical analysis, and results reveal that the proposed method provides high security with entropy and correlation close to ideal values.
Volume: 12
Issue: 4
Page: 883-889
Publish at: 2014-12-01

Fortifying Big Data infrastructures to Face Security and Privacy Issues

10.12928/telkomnika.v12i4.957
Tole; Universitas Ahmad Dahlan Sutikno , Deris; Universitas Sriwijaya Stiawan , Imam Much; Universitas Islam Sultan Agung Ibnu Subroto
The explosion of data available on the internet is very increasing in recent years. One of the most challenging issues is how to effectively manage such a large amount of data and identify new ways to analyze large amounts of data and unlock information. Organizations must find a way to manage their data in accordance with all relevant privacy regulations without making the data inaccessible and unusable. Cloud Security Alliance (CSA) has released that the top 10 challenges, which are as follows: 1) secure computations in distributed programming frameworks, 2) security best practices for non-relational data stores, 3) secure data storage and transactions logs, 4) end-point input validation/filtering, 5) real-time security monitoring, 6) scalable and composable privacy-preserving data mining and analytics, 7) cryptographically enforced data centric security, 8) granular access control, 9) granular audits, 10) data Provenance. The challenges themselves can be organized into four distinct aspects of the Big Data ecosystem.
Volume: 12
Issue: 4
Page: 751-752
Publish at: 2014-12-01

Performance Comparison of Host Identity Protocol and TCP/IP with Firewall against Denial of Services

10.11591/ijeecs.v12.i12.pp8335-8343
Alfan Presekal , Riri Fitri Sari
Host Identity Protocol (HIP) is a new kind of Internet protocol which has been developed to resolve the existing problems of Internet protocol TCP/IP. As a new protocol HIP provides many advantages compared to TCP/IP such as in the aspect of security and mobility. Unfortunately, the deployability rate of HIP was still low. One of the reason is because particular solution for currently Internet problems already popular and deployed worldwide. In this work we compare the performance of HIP and TCP/IP using several scenarios. Simulations result show that TCP response time in normal condition (zero attack condition) 98,627 ms, while HIP has the response time of 99,711 ms. We also compare the performance of the HIP, TCP/IP, and SSL against the low to medium Denial of Services attack (DoS). In the condition of low to medium DoS attack, the order from best performance are TCP/IP, HIP, and then the worst one is SSL. In the condition of high DoS attack three of them TCP/IP, SSL, and HIP cannot work. Only HIP that implement HIP Firewall with authorization scenarios that are still available for service.
Volume: 12
Issue: 12
Page: 8335-8343
Publish at: 2014-12-01

Effect of Storage Containers on Quality of Household Drinking Water in Urban Communities in Ibadan, Nigeria

10.11591/ijphs.v3i4.4700
Olanrewaju Onigbogi , Oluwatoyin Ogunyemi
The method of storage is essential in maintaining water purity and safety for drinking purposes. This study assessed the effect of various storage containers on household drinking water quality in a resource-limited setting. A quasi-experimental design was adopted. Four communities using protected springs as household drinking water sources were purposively selected. Forty-four households were selected and randomly assigned to four treatment groups; namely Covered Buckets with Taps (CBT), Covered Buckets without Tap (CB), Covered Kegs with Taps (CKT) and Covered Kegs without Tap (CK).  Physicochemical analysis and bacteriological analysis were carried out on the water samples before and after they were put in the containers. Data was analyzed using SPSS version 12. At baseline, mean pH values of water samples from the springs and RSC were 6.4±0.6 and 7.1±0.7 respectively which were above the recommended. Mean chloride concentration of springs (14.3±7.4mg/l) and RSC (19.3±10.0 mg/l) samples were below recommended. Mean Total Coliform Count (TCC) of the springs in the four communities was 18.0±4.0 and mean TCC of RSC was 12.7±4.9. Five percent of water samples from RSC had mean E.coli count of 100/100ml. The mean TCC after introducing CB, CBT, CK and CKT in all the communities were 10.0±4.0, 8.5±4.2, 6.9±2.8 and 7.3±3.7 respectively (p<0.05). The use of covered kegs without tap was best in reducing contaminants in drinking water. Education on appropriate household drinking water storage and handling practices is recommended.
Volume: 3
Issue: 4
Page: 253-258
Publish at: 2014-12-01

Factors Influencing Utilization of Health Services in Kenya: The Case of Homa Bay County

10.11591/ijphs.v3i4.4695
Stephen Odiwuor Otieno , David Macharia
In order to improve efficiency in health service delivery in Kenya, the Ministry of Health has developed structures through inter-sectoral collaboration at various levels. Despite efforts by the government and key stakeholders to improve health sector, utilization of health services still remains a major challenge. The purpose of the study was to investigate factors that influence utilization of health services in Homa Bay County, Kenya. The study employed survey design and focused on health beneficiaries, District Health Management Team and other key health stakeholders, and used both quantitative and qualitative data. Quantitative data was collected through household interviews of 384 respondents and qualitative data was generated through Key Informant Interviews of 16 respondents. The study reveals that health financing, service delivery, quality, accessibility and equity influence utilization of health services in Homa Bay County. It is for these reasons that the study recommends that the government should allocate adequate budget towards health services, avail adequate trained health workers, and improve infrastructure in health facilities as well as drugs and other supplies. There is also need for further research on cultural factors influencing utilization of health services.
Volume: 3
Issue: 4
Page: 213-223
Publish at: 2014-12-01

Biosecurity of Poultry Worker Related to Avian Influenza in Bangladesh

10.11591/ijphs.v3i4.4702
Swapan Kumar Roy , Quazi Zahangir Hossain
Research on biosecurity of poultry workers of Live Bird Market (LBM) in urban and rural areas related to highly pathogenic avian influenza (AI) was undertaken during March-June, 2014 at Keshabpur upazila (22°48´-22°57´N latitude and 89°06´-89°22´E longitude), Jessore, Bangladesh. A non-randomized (purposive) sampling method was applied and a descriptive type of cross sectional study was performed among 72 workers, dividing them into two groups as 36 urban and 36 rural poultry workers of LBM through split-halves variation technique. They were interviewed confidentially in their work place using a structured pretested questionnaire. Among respondents 53%, 75%, 45%, 81%, and 56% of urban and 50%, 42%, 50%, 89%, and 36% of rural residence had attended up to primary school, knowledge about AI through media like TV and radio, used proper personal protective equipment as mask and gloves, washed their hands and equipment after finishing work and cleaned stalls/cages daily and mostly they used water as a cleaning material, respectively. In urban (14%) and rural (36%) workers used the same vehicle to transport poultry and humans. A combined effort is required to enhance knowledge and change behavior among those most at risk in low-income countries and precautions necessary to avoid spreading the virus among poultry and humans.
Volume: 3
Issue: 4
Page: 267-275
Publish at: 2014-12-01

Using Data Mining to Predict Possible Future Depression Cases

10.11591/ijphs.v3i4.4697
Kevin Daimi , Shadi Banitaan
Depression is a disorder characterized by misery and gloominess felt over a period of time. Some symptoms of depression overlap with somatic illnesses implying considerable difficulty in diagnosing it. This paper contributes to its diagnosis through the application of data mining, namely classification, to predict patients who will most likely develop depression or are currently suffering from depression. Synthetic data is used for this study. To acquire the results, the popular suite of machine learning software, WEKA, is used.
Volume: 3
Issue: 4
Page: 231-240
Publish at: 2014-12-01

Prediction the AC Breakdown Voltage in Point/Plane Air Gaps with Barrier Using Design of Experiments

10.11591/ijeecs.v12.i12.pp8033-8041
Abdelghani Rouini , Djillali Mahi , Tahar Seghier
Breakdown voltage characteristics of air gaps considered a random process we have investigated how to find relevant statistical different leading to breakdown or with standing during an impulse voltage test under the same condition for a plane high voltage electrode and a grounded electrode configuration.In the present paper methods of the modelling and prediction of the AC breakdown voltage  in point-plane air gaps are investigated. An analysis based on experiments design method has been developed with indicates that.Measurements to contain some relevant information test at early stages in reduced time frame investigation were done on a point-plane with barrier varying in position and size. The barrier used was mounted vertically between the electrodes.The use of methodology of experiments design is one of this methods and present an original idea in high voltage prediction problems several factors were considered,namely the distance between electrodes and different parameters of the barrier such us is dimension and his holes.The experimental results are compared with results from numerical simulations.We firstly present the principals of this model then we apply it to the study of barrier effect. A good agreement has been found between the computed and experimental results.
Volume: 12
Issue: 12
Page: 8033-8041
Publish at: 2014-12-01

Pitch detection base on EMD and the second spectrum

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3937
Jingfang Wang
A new method for pitch detection of secondary spectrum is designed in the paper, the noisy speech oval (Elliptic Filter, EF) band-pass filter is designed first in this method, and then  the experience mode Decomposition(EMD)of Hilbert-Huang transform (HHT) is used to decompose the signal into a finite number of intrinsic mode functions (IMF), and IMF components of different scales are associated with the decomposition of the signal before calculation, the maximum of two modes associated (IMF) synthetic pitch signal detection is taken. Experimental results show that the method could be better than the traditional autocorrelation method, and cepstrum method has better results, especially with voicing obvious segment features, there is better performance of pitch detection in noisy speech, signal to noise ratio(SNR) also has good robustness in the lower sound environment. http://dx.doi.org/10.11591/telkomnika.v12i12.6482 
Volume: 12
Issue: 12
Page: 8205-8211
Publish at: 2014-12-01

An Approach of Power Factor Correction in BLDC Motor Drives Using Cuk Derived Converters

10.11591/ijeecs.v12.i12.pp8092-8097
R. Balamurugan , J. Pearly Catherine
This paper deals with a comparative analysis of various converter topologies for Power Factor Correction (PFC) in BLDC motor drives. A power factor corrected converter is required for improving power quality at the AC mains of an inverter fed BLDC motor drive. Conventionally, the BLDC motor is fed by a diode bridge rectifier (DBR) which results in highly distorted supply current and a poor power factor.  A new bridgeless single-phase ac–dc Cuk derived topology has been introduced for power factor correction. This bridgeless topology uses minimum number of switches and thus reduces the less conduction losses compared with the conventional PFC rectifier. There are three cuk derived configurations for power factor correction. In this paper, all the cuk derived topologies are investigated and compared. The best topology is identified and recommended for PFC in BLDC motor drive.
Volume: 12
Issue: 12
Page: 8092-8097
Publish at: 2014-12-01

Effect of Indirect Advertising and Promotion Activities of Tobacco Products in Khulna

10.11591/ijphs.v3i4.4701
Qazi Azad-uz-zaman , Quazi Zahangir Hossain
Different forms of tobacco advertisement and promotional activities are the burden of tobacco epidemic in Bangladesh. A descriptive type of cross-sectional study was carried out on a total of 404 adults, randomly selected from urban and rural areas. Data were collected implementing both qualitative and quantitative methods from July to September 2013 and found 52% of the respondents were smoking cigarette or bidi, within them only 30% of the male adults were never user of tobacco of any kind. The respondents mainly noticed packet wall (52%), posters (65%), and big size packets (38%) as indirect advertisement as well as free sample (51%) and free gifts (43%) as promotional activities. A significant effect was identified of the activities on increasing consumption which tobacco control advocates and practitioners always argue. Existing laws do not allow giving free samples and free gift to persons, it should be enforced adequately as well as all tobacco control activists should be vigilant on unlawful activities of tobacco traders.
Volume: 3
Issue: 4
Page: 259-266
Publish at: 2014-12-01

Pose Error Analysis Model Based on Binocular Vision for Rigid-Body

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3948
Fenglian Niu
In order to satisfy the orientationmeasuring requirements of rigid-body such as work piece, cutting tool inindustry and medical instrumentsfor invasive surgery, this paper presents a binocularvision detection technique based on spatial position information of markers toextract rigid-body pose information and analyzes the pose accuracy of rigid-bodyusing the principalcomponent analysis(PCA) and the least square method(LSM) when spatial position error of markers exist. The simulation experiment demonstrates themaximum angle error of orientation is about 0.59 degree when the position error ofmarkers satisfy the Gaussian distribution with the meanis zero and thestandard deviation is 0~3mm. The experimental results verify this method canrobustly solve the orientation of rigid body using the position information ofmarkers with position errors, and it provides a theoretical and experimentalbasis for orientation measurement of rigid body. http://dx.doi.org/10.11591/telkomnika.v12i12.6136 
Volume: 12
Issue: 12
Page: 8292-8302
Publish at: 2014-12-01

Factors associated with Institutional delivery in Boricha district of Sidama zone, southern Ethiopia

10.11591/ijphs.v3i4.4696
Tafese Tadele Gudura , Alemu Tamiso Debiso , Tariku Tadele Gudura
Every year, 40 million women give birth at home without the help of askilled birth attendant. In 2011, 287,000 women died during pregnancy or childbirth. Almost all these deaths occur in developing countries where mothers and children lack access to basic health care. Reports showed the low utilization of health facility for delivery service in Ethiopia. This study aimed to determine the utilization and factors influencing institutional delivery. Community based cross sectional study was conducted from January to February 2013/14 in Boricha District of Southern Ethiopia among mothers who gave birth in the last 1 year. Multistage sampling techniques were used to collect data from 546 mothers. Taking in to account place of birth for the last child, only 4.9% women gave birth in a health facility. Women’s education level (AOR=4.4 (95% CI=1.36-14.33)), timing of firstANC visit (AOR= .03 (95% CI=0.004 - 0.205)), women’s advice to deliver in a health facility during ANC (AOR = 31.15 (95% CI=2.02-479.52)), women’s knowledge of birth related complications (AOR= 12.4 (95% CI=2.67-57.16)) and decision making power (AOR=0.2 (95% CI=0.060.82)) showed significant association with institutionional delivery. Institutional delivery in the study area was found to be very low. Raising awareness on institutional delivery to maximize delivery service utilization and strengthening provision of education and counseling to deliver in health facility during antenatal care visits at individual and community level should be given due emphasis.
Volume: 3
Issue: 4
Page: 224-230
Publish at: 2014-12-01

Anxiety and Family Support on Infected TORCH Patients

10.11591/ijphs.v3i4.4699
Eirene Shinta Valevi , Lina Handayani
TORCH is an acronym of Toxoplasmosis, Rubella, Cytomegalovirus, and Herpes simplex diseases. These diseases can cause abnormalities in the brain, impaired psychomotor and cognitive function, fertility, miscarriage, birth defects, etc. Infected TORCH patient tend to experience anxiety and worry after discovering he/she was diagnosed infected TORCH. For infected TORCH patient, family support is external factors that influence the treatment TORCH process. The purpose of this study was to describe the anxiety and family support on infected TORC patients in Klinik Utama Thursina Husada,Yogyakarta, Indonesia. The design of this study was descriptive qualitative with case study approach. All subjects in this study had worries on costly medical expenses TORCH. TORCH symptoms that asymptomatic made informants and family ever thought that it was a non-medical disease. Each informant can overcome the anxiety that they face because of emotional support, esteem support, instrumental support, and informational support from family. Infected TORCH caused the patient had anxiety and worries. Family support was very helpful in the process of TORCH treatment.
Volume: 3
Issue: 4
Page: 246-252
Publish at: 2014-12-01
Show 1439 of 1667

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration