253 research outputs found

    Analisis Willingness To Pay untuk Pemenuhan Kebutuhan Air Bersih Masyarakat Sebagian Desa Sitimulyo dan Bawuran

    Full text link
    Penilaian sumberdaya air di Desa Sitimulyo dan Bawuran dapat dilakukan dengan analisis kesediaan membayar atau WTP. Nilai WTP dipengaruhi oleh faktor potensi sumberdaya air dan faktor sosial ekonomi masyarakat. Penelitian ini dilakukan untuk mengetahui jumlah kebutuhan air untuk domestik, nilai WTP rumah tangga, dan pengaruh variabel WTP rumah tangga. Metode kuantitatif digunakan dalam analisis hasil wawancara. Wawancara ditentukan dengan metode sistematik sampling. Jumlah kebutuhan air rumah tangga dihitung menggunakan rumus perhitungan konsumsi air, sedangkan nilai WTP dan variabel pengaruh dianalisis menggunakan regresi linear berganda. Hasil penelitian menunjukan bahwa (1) rata-rata kebutuhan air domestik di sebagian Desa Sitimulyo sebanyak 63 liter/orang/hari dan Bawuran sebanyak 74 liter/orang/hari. Jumlah tersebut lebih besar dari nilai Standar Nasional Indonesia (SNI) sebanyak 60 liter/orang/hari. (2) Nilai WTP manfaat air sebesar Rp Rp 4.100/m3 untuk Sitimulyo dan sebesar Rp 4.300/m3 untuk Bawuran. Nilai WTP untuk keberlanjutan sumberdaya air yaitu sebesar Rp 4.100/m3 untuk Sitimulyo dan sebesar Rp 4.400/m3 untuk Bawuran. Nilai tersebut lebih besar dari WTP standar yaitu Rp 3.900/m3 dan harga air PDAM Rp 2.500/m3. (3) Variabel yang berpengaruh signifikan terhadap nilai WTP rumah tangga ialah jumlah anggota rumah tangga dan sumber air

    A Hybrid Technique for Enhancing Data Security

    Get PDF
    The worldwide information and technology has an astounding dependency o n data s e c u r i t y . The r i s k fabricated by the interloper has been a maelstrom for forthcoming specialists. Security pl ay s an essential role in governing the data transfer. The primary objective of this paper is to propose a black box approach which generates a modified plain text from the original message. For this purpose, we have used techniques like Perturbation, Swapping and Shifting which will modify the original plain text. Before giving the plain text directly into encryption process, the m o d i f i e d plain text obtained f r o m above techniques will be given as an input. The complexity of breaking the plain text is increased by applying the above techniques. For experimental purpose, w e use AES algorithm for encryption and d e c r y p t i o n and Java is used for implementing t h e proposed a p p r o a c h . © 2018 Academic Press. All Rights Reserved

    Impact of Carbohydrate and Amino Acid Enriched Diet on The Heat Tolerance of Drosophila Ananassae and Drosophila Bipectinata

    Get PDF
      Elevated temperatures promote the accumulation of damages, which can be countered by improving diet. So, it is critical to comprehend how environmental temperature influences the survival of an organism. Providing a diet with additional nutrient regimens accelerates the physiological and metabolic processes in organisms, which results in better survival. Present study aimed to understand the impact of carbohydrate and amino acid-enriched diet on the heat tolerance of Drosophila ananassae and D. bipectinata. Adult flies were transferred to the media composition enriched with carbohydrate and amino acid in three replicates and maintained at 22oC. 20 flies of a particular stage in three replicates were exposed to 24oC, 28oC, and 32oC for 5 days. The impact of thermal stress on their survival was noted for 5 following days. The results of this study show different stages of Drosophila ananassae and D. bipectinata can handle heat stress in a better manner when fed with a carbohydrate and amino acid-rich diet. D. bipectinata survival rates were higher than D. ananassae when compared at each temperature at different diet regimens. This study provided convincing evidence of the positive influence of the tryptophan (100mg) diet compared to the sucrose diet on the survival, quality of life, and stress tolerance of both species

    A Hybrid Technique for Enhancing Data Security

    Get PDF
    The worldwide information and technology has an astounding dependency o n data s e c u r i t y . The r i s k fabricated by the interloper has been a maelstrom for forthcoming specialists. Security pl ay s an essential role in governing the data transfer. The primary objective of this paper is to propose a black box approach which generates a modified plain text from the original message. For this purpose, we have used techniques like Perturbation, Swapping and Shifting which will modify the original plain text. Before giving the plain text directly into encryption process, the m o d i f i e d plain text obtained f r o m above techniques will be given as an input. The complexity of breaking the plain text is increased by applying the above techniques. For experimental purpose, w e use AES algorithm for encryption and d e c r y p t i o n and Java is used for implementing t h e proposed a p p r o a c h . © 2018 Academic Press. All Rights Reserved

    Biological Control of Aspergillus flavus Invasion in Groundnut

    Get PDF
    In the present study to identify potential bio-control agents against A. flavus and aflatoxin contamination we have screened eighty bacteria, 40 actinomycetes and 40 fungi which were isolated from rice straw compost prepared at ICRISAT.. All bacteria and actinomycetes were studied for their antagonism against A. flavus by double layer method on GCY medium. Among them eight bacteria (CDB 15, CDB 16, CDB 30, CDB 31, CDB 35, CDB 41, and CDB 48) and three actinomycetes (CDA 16, CDA 19 and CDA 26) species significantly inhibited A. flavus. Among them CDB 35 (50 mm) and actinomycete CDA 19 (35 mm) showed significant zone of inhibition when compared to the rest of the isolates. To further evaluate and characterize the properties of strains all eight bacteria and three actinomycetes were screened against A. flavus by dual culture method on PDA, KB and GCY media to have the precise percent inhibition...

    Increasing Education of Family Support for Decreasing Depression Level Towards Elderly

    Full text link
    The elderly was a natural process that can not be avoided. The many changing occurred due to biological aspects, psychological, social, economic, and health. The brain aging process was a part of the degeneration process caused neuropsychological disorder varieties. The present study aimed at analyzing the family support depression level of the elderly before and after being given an education. It used a randomized pre-experimental design with pretest and posttest One Group Only Design (in form of the community trial). The research was conducted in Selemadeg village for 4 months i.e. July to October 2016. The study population was all elderly in Selemadeg village. The sampling techniques with total sampling, which meets the criteria for inclusion and exclusion amounted to 400 people. Based on the data analysis showed that there was the very significant positive difference between family support with the depression level in the elderly before being given education as indicated by the value t < p-value (t = -39.001) and p = 0:01)

    Third Eye for Blind using Ultrasonic Sensor

    Get PDF
    People with visual disabilities are often dependent on external assistance which can be provided by humans, trained dogs, or special electronic devices as support systems for decision making. The main problem with blind people is how to navigate their way to wherever they want to go. Such people need assistance from others with good eyesight. As described by WHO, 10% of the visually impaired have no functional eyesight at all to help them move around without assistance and safely. This project is designed to help the blind to overcome the lack of visual sense, by using other senses like sound and touch. The system uses Atmega-328 microcontroller, which is a high performance 8-bit AVR RISC-based microcontroller. For sensing the distance the system uses a HC-SR04, an Ultrasonic Range Finder Distance Sensor Module. The sensor module is designed to measure the distance using the principle of SONAR or RADAR, using ultrasonic wave to determine the distance of an object. The system also consists of a buzzer to generate an alarm sound and a motor to generate vibration signals. The system uses audio and vibration signals to notify the user about upcoming hurdle. As the distance between glove and obstacle decreases, frequency of both audio and vibration signals increases. Thus the system helps to ease the navigation process for the needy. This system offers a low-cost, reliable, portable, low power consumption and robust solution for navigation with obvious short response time

    Prevalence of Pulpectomy In Mandibular First Primary Molar with Occlusal Caries

    Get PDF
     The aim of this present study was to evaluate the pulpectomy procedure in mandibular first primary molars with occlusal caries in the Chennai population visiting the Outpatient Department of Saveetha Dental College and Hospital, Chennai based on their gender and age. A total of 199 patients details aged between 4 and 11 years old obtained from patients records to assess pulpectomy treatment done with occlusal caries involved, with their gender and age. Data analysis was done with the Statistical Package for Social Sciences (SPSS) for Windows (version 20). Chi-square test was used to determine the association of occurrence pulpectomy with occlusal caries involvement in a mandibular first primary molar, gender, and age. In this present study, the prevalence of male patients was 55.78% and for females was 44.22% Males patients more prevalent for pulpectomy due to occlusal caries. Patients in the age group between 4 to 5 years old have a higher prevalence (54.77%). The most prominent teeth number affected by occlusal caries was right mandibular first primary molar-84, with 52.76% prevalence. Association between the tooth number and age of the patient. P-value=0.917, (P>0.05), association between the tooth number and the gender of the patients, P-value=0.942, (P>0.05), both of which are statistically not significant. There is no significant association between gender , age and the tooth number that was treated with pulpectomy. Within this limit of this study, this study showed that the prevalence of pulpectomy in mandibular first primary molars due to occlusal caries was more in males than females, and higher incidence for age between 4 and 5 years old, with the most affected tooth was on the right sid

    PROTECTED CLOUD RECORDS UNDER KEY COVERAGE

    Get PDF
    Expanding the outsourcing of data can be used to study meaningful stack software. On young occasions, efforts previously made in the centre of attention have been on a decrease in intelligence needs. Within the current techniques of the Morse alphabet, an elemental disorder is associated with the use of understanding confidence to manage cryptographic functions on many occasions. We provide a survey that shows the most compelling mass key by allowing the teaching of rare cryptographic texts, away from the enhanced size. We began encrypting a thin public key file supported as a clustering key encryption system. Basic encryption technologies reduce storage costs as well as the predominance of isolated keys to use a completely different encryption. We have scanned public key cryptographic systems that contain cryptographic texts of a continuous size for a skilled prize for the loose freedom of verifiable encryption texts. Our planning is approachable when it comes to a hierarchical primary duty that provides space when unified key holders issue a great deal of freedom in a single religion

    ELEGANT BUS SEAT VACANCY OBSERVING SYSTEM BY USING IOT MODULE

    Get PDF
    Internet of Things (IoT) refers to uniquely identifiable gadgets and their representation in an Internet-like shape. New utility and agencies are created continuously with the help of generation via the internet. IoT can help within the integration of communication, manage and records processing during various transportation structures. In public transportation, there may be a loss of actual-time information. The public transit utilization can be stepped forward if actual-time facts of the automobile together with the seating availability, modern-day location and time took to attain the vacation spot are provided with much less tough get proper of entry to. It may additionally be beneficial for the passengers to discover exchange choices depending on their conditions. As excessive long prepared often discourage the tourists and makes them reluctant to take buses. A clever records device has been proposed in which the vacationers get earlier statistics approximately contemporary location having a number of seats on the bus. By the use of IoT generation quantity of seat, emptiness records will be transmitted to subsequent bus stop authority peoples
    • …
    corecore