1,031 research outputs found

    Influence of built form in urban ventilation assessment of tropical cities with weak wind conditions

    Get PDF
    Urban ventilation is recognized as effective countermeasure on air pollution and urban heat island, yet most tropical urban areas receive low annual mean wind velocity thus lessening potential for urban ventilation. Effect of built form on resulting mean wind velocity at pedestrian-level was analyzed through computational fluid dynamics (CFD) to assess effectiveness in urban ventilation of tropical cities with weak wind conditions based on three heterogeneous built form of Kampung Baru, Taman Keramat and Pantai Dalam which located in the city of Kuala Lumpur for wind direction from south and west. The urban density for the built form was characterized by using urban packing density parameter of frontal area ratio, ?f and the urban ventilation was assessed based on availability of pedestrian wind which described using wind velocity ratio, VR. Influence of built form in urban ventilation was found to be significant in affecting the mean wind velocity, where magnitude of VR at pedestrian-level was decreasing as the value of ?f of the built form increases. Suggestions to improve urban ventilation design in major development project are provided based on these findings

    Two secure non-symmetric role Key-Agreement protocols

    Get PDF
    Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through eliminating the need to using Bilinear Pairings. In this paper, we proposed two novel Identity-Based Authenticated Key Agreement protocols over non-symmetric role participants without using Bilinear Pairings. The results show that our proposed schemes beside of supporting security requirements of Key Agreement protocols, require a subset of operations with low complexity in compare with related protocols in this scientific area

    Studi Keandalan Geolistrik Dalam Identifikasi Kebocoran Embung: Studi Kasus Embung Wolo, Sulawesi Tenggara

    Get PDF
    Small dams are vital for supporting water resource conservation. The reservoir stores water from several water sources, especially in the rainy season, so that it remains available in the dry season. Some reservoir infrastructures were built using earthen fill materials located around it. This condition is very vulnerable to disasters, ranging from seepage to collapse. It is important to evaluate the safety of all potential dangers to minimize the risk of disasters. One method that can be used is the geoelectric method, which allows us to analyze the resistivity properties of the soil, but the reliability of this method needs to be further evaluated. This research aims to determine the reliability of geoelectric in identifying potential leaks in reservoirs. Geoelectric measurements were carried out at Wolo Small Dam using the Wenner-Schlumberger configuration with 32 electrodes at 2.5 m. Data collection was carried out at the top of the small dam so that it could provide the condition of the soil layer of the embankment material in the longitudinal direction. Validate the measurement using the results of previous research. The results of the analysis show that there are differences in lithology in the body of the reservoir, which indicates differences in the quality of work during construction. The interface between these two surfaces can lead to leaks. Apart from that, the analysis results also show the potential for piping in the reservoir. The location of the potential piping area is not far from the results obtained in previous research at the same location. This shows that geoelectric is quite capable of being a tool that can be used to identify leaks in reservoirs or other water structures. Of course, the combination of geoelectric and other soil testing will provide better results in anticipating disasters caused by small dam leak

    Determinan Kinerja Petugas Imunisasi di Puskesmas Kabupaten Sigi Provinsi Sulawesi Tengah

    Full text link
    This study aimed to analyze the effect of knowledge, attitudes, motivation, leadership, compensation to the performance of immunization workers and the factors that most influence the performance of immunization workers. This research is in the health center as much as 15 health centers Sigi. This type of research is analytic survey with cross sectional sample study.Pengambilan Sampling is done in total immunization clinic staff by 45 people. Data were analyzed using statistical analysis Chi-Square test and multiple logistic regression at α <5% Influence. The results of the analysis indicate that there is influence between knowledge (p = 0.000), attitude (p = 0.004), motivation (p = 0.000), leadership (p = 0.015), and compensation (p = 0:08) to the immunization clinic kenerja officer Sigi . Results of logistic regression analysis showed that knowledge (p = 0.004, Exp (B) = 14.038), is the most influential factor on the performance of immunization workers Sigi with the influence of 14.038. Conclusion: No effect of knowledge, attitudes, motivation, leadership, compensation on performance and enormous influence on the performance of knowledge of the magnitude of the effect is 14.038.Keywords: Determinant Factors, Performance Officer, Immunization Coverag

    Eksistensi Tokoh dalam Novel Kubah Karya Ahmad Tohari

    Full text link
    This study discusses the existence of each character in the novel Kubah by Ahmad Tohari. In this study, there is a problem formulation that examines how the existence of a character in the novel Kubah by Ahmad Tohari and aims to describe the existence of a character in the novel Dome by Ahmad Tohari. The source of data that became the object of this research is the novel Dome by Ahmad Tohari. The research data that writers look for in the form of sentences and quotations of dialogue related to the existence of characters who experienced three stages of existence, namely the aesthetic stage, ethical stage and religious stage. The research method used is a qualitative method that describes the description data. Technique of collecting data in this research is literature study. While the analysis technique used is reducing data, presenting the data and drawing the final conclusion. The data of this study amounted to 53 consisting of 13 characters, each character experienced three stages of existence that is the existence of the aesthetic stage, the existence of the ethical stage and the existence of the religious stage. The details of 53 data are as follows, at the aesthetic stage found 13 data, the existence of the ethical stage found 22 data, and the existence of the religious stage found 18 data

    Data anonymization using pseudonym system to preserve data privacy

    Get PDF
    Data collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools. With the use of such services, less time is needed to attain the required output, and also managing the jobs will be simpler for users. General services employ a unique identifier for the aim of storing data in a digital database. However, it may be associated with some limitations and challenges. There is a link between the unique identifier and the data holder, e.g., name, address, Identity card number, etc. Attackers can manipulate a unique identifier for stealing the whole data. To get the data needed, attackers may even eavesdrop or guess. It results in lack of data privacy protection. As a result, it is necessary to take into consideration the data privacy issues in any data digital data storage. With the use of current services, there is a high possibility of exposure and leak of data/information to an unauthorized party during their transfer process. In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. To address such risks, this paper suggests the use of a biometric authentication method by means of a palm vein during the authentication process. Furthermore, a pseudonym creation technique is adopted to make the database record anonymous, which can make sure the data is properly protected. This way, any unauthorized party cannot gain access to data/information. The proposed system can resolve the information leaked, the user true identity is never revealed to others

    Temperature influence on total volatile compounds (TVOCs) inside the car cabin of visible light transmittance

    Get PDF
    In the automotive industry indoor air quality or Vehicle Indoor Air Quality (VIAQ) are caused by various substances emitted from interior materials inside a vehicle. The volatile organic compounds (VOCs) are an example of emitted substances from the interior materials which is harmful to the human body. As stated by previous researches, there is a strong correlation between the total VOCs emission and interior temperature. This occurs due to the solar radiation through the back window glasses, windscreen and side window glasses. This trapped heat can accelerate the melting process of trim materials such as hard plastic and rubber, thus causing the emission of total VOCs (TVOCs). Therefore, reducing the percentage of visible light transmittance (VLT) will help to reduce radiation process. The aim of this study is to investigate the effect of VLT level on TVOCs emission in the vehicle cabin under static condition (parked and unventilated) and operating condition (driving and air-conditioned). For static condition the result shows that the TVOCs concentration linearly decreases whenever the percentage of VLT level decreases. However, for operating condition the percentage of VLT have less significance after 50 minutes driving time. In conclusion, the VLT levels have a strong relationship to the TVOCs concentration despite after a long driving time

    Sensory processing in autism spectrum disorders and Fragile X syndrome-From the clinic to animal models.

    Get PDF
    Brains are constantly flooded with sensory information that needs to be filtered at the pre-attentional level and integrated into endogenous activity in order to allow for detection of salient information and an appropriate behavioral response. People with Autism Spectrum Disorder (ASD) or Fragile X Syndrome (FXS) are often over- or under-reactive to stimulation, leading to a wide range of behavioral symptoms. This altered sensitivity may be caused by disrupted sensory processing, signal integration and/or gating, and is often being neglected. Here, we review translational experimental approaches that are used to investigate sensory processing in humans with ASD and FXS, and in relevant rodent models. This includes electroencephalographic measurement of event related potentials, neural oscillations and mismatch negativity, as well as habituation and pre-pulse inhibition of startle. We outline robust evidence of disrupted sensory processing in individuals with ASD and FXS, and in respective animal models, focusing on the auditory sensory domain. Animal models provide an excellent opportunity to examine common mechanisms of sensory pathophysiology in order to develop therapeutics
    corecore