Papers by Nooria Sukmaningtyas
There are 40% (3 billion) of the world's population at risk of suffering from malaria with th... more There are 40% (3 billion) of the world's population at risk of suffering from malaria with the addition of some 300-500 million cases and 1.5 to 1.7 million people died from suffering from malaria. In Indonesia to date, infectious disease, especially diseases that are transmitted by animals, especially insects, are still a public health problem. This study aimed to determine the role of the community in the prevention, control and eradication of malaria. This research was a qualitative study. Subjects of the study were public, community leaders, and health care providers. Data were analyzed by using content analysis and theory validation source. Community participation in malaria vector control through several ways to eradicate mosquito breeding, usage of mosquito nets, use of insect repellent, avoiding a night out and a survey of patients who return from leave. The community plays an active role in malaria vector control efforts by closing puddles, community service every week,...
There are 40 % (3 billion) of the world's population at risk of suffering from malaria with ... more There are 40 % (3 billion) of the world's population at risk of suffering from malaria with the addition of some 300-500 million cases and 1.5 to 1.7 million people died from suffering from malaria. In Indonesia to date, infectious disease, especially diseases that are transmitted by animals, especially insects, are still a public health problem. This study aimed to determine the role of the community in the prevention, control and eradication of malaria. This research was a qualitative study. Subjects of the study were public, community leaders, and health care providers. Data were analyzed by using content analysis and theory validation source. Community participation in malaria vector control through several ways to eradicate mosquito breeding, usage of mosquito nets, use of insect repellent, avoiding a night out and a survey of patients who return from leave. The community plays an active role in malaria vector control efforts by closing puddles, community service every wee...
T here are 40% (3 billion) of the world's population at risk of suffering from malaria with t... more T here are 40% (3 billion) of the world's population at risk of suffering from malaria with the addition of some 300-500 million cases and 1.5 to 1.7 million people died from suffering from malaria. In Indonesia to date, infectious disease, especially diseases that are transmitted by animals, especially insects, are still a public health problem. This study aimed to determine the role of the community in the prevention, control and eradication of malaria. This research was a qualitative study. Subjects of the study were public, community leaders, and health care providers. Data were analyzed by using content analysis and theory validation source. Community participation in malaria vector control through several ways to eradicate mosquito breeding, usage of mosquito nets, use of insect repellent, avoiding a night out and a survey of patients who return from leave. The community plays an active role in malaria vector control efforts by closing puddles, community service every week...
Berita Kedokteran Masyarakat
Predictors of tuberculosis recurrence in the district of Bantul PurposeThe purpose of this resear... more Predictors of tuberculosis recurrence in the district of Bantul PurposeThe purpose of this research was to identify associated factors of TB recurrence. MethodsThe study design was a retrospective cohort. We used TB cases registered in Bantul regency data in 2003-2014 that consisted of 3418 patients. Sampling was conducted by non-random methods with purposive sampling based on inclusion criteria of 904 samples. The variables measured were: age, sex, drug swallowing supervisor, health service facility, socioeconomic and sputum conversion. We used the Cox proportional hazard model for data analysis to determine the rate of occurrence and timing of the occurrence of an event. ResultsMale sex (HR = 0.91; p-value = 0.17) age> 40 years (HR = 1.03; p-value = 0.59), low income (HR = 0.89; p-value = 0.11) were not predictors of TB recurrence, while hospital treatment (HR = 0.81; p-value = 0.00), no sputum conversion (HR = 0.58; p-value = 0.00), treatment failure (HR = 0.49; 95% CI: 0.37-...
This paper presents the algorithms developed to detect and locate the faults at a hybrid circuit.... more This paper presents the algorithms developed to detect and locate the faults at a hybrid circuit. First, the fault detection algorithm was developed using the comparison of total positive-sequence fault current between pre-fault and fault times to detect the occurrence of a fault. Then, the voltage check method was used to decide whether the fault occurred at overhead line (OHL) or cable section. Finally, the fault location algorithm using the impedance-based method and negative-sequence measurements from both terminals of the circuit were used to estimate the fault point from local terminal. From the tests of various fault conditions including different fault types, fault resistance and fault locations, the proposed method successfully detected all fault cases at around 1 cycle from fault initiation and with correct faulted section identification. Besides that, the fault location algorithm also has very accurate results of fault estimation with average error less than 1 km and 1%.
This paper reviews the position/force control approach for governs an efficient knee joint in an ... more This paper reviews the position/force control approach for governs an efficient knee joint in an active lower limb prosthesis, and the interfacing current control algorithm with human gate parameter is inserted. Two techniques are used to collect gait cycle data of leg: first, the foot ground force is obtained by the force platform device based on its position (x, y), then data of knee joint angles is recorded by using a video-camera device. The collected information is sent and used in the proposed intelligent controller. This intelligent control system used an adaptive neuro-fuzzy inference system (ANFIS) circuit in addition to the proportional integral derivative (PID) controller. This hybrid ANFIS-PID control system simulates and provides the ground force values. The experimental results show an excellent response and lower root mean square error (RMSE) compared with each of PID and ANFIS controller that implemented for a similar purpose. In summary, the results showed acceptably stable performance of the proposed position/force controller based on hybrid ANFIS-PID system. It can be concluded that the finest performance of the controlled force, as quantified by the RMSE criteria, is perceived by the proposed hybrid scheme depending on the controller intelligent decision circuit.
One of the best flexible AC transmission system (FACTS) is unified power flow controller (UPFC). ... more One of the best flexible AC transmission system (FACTS) is unified power flow controller (UPFC). As it gets more benefit from both real and reactive power transfer, it is used in power system for controlling the transmitted power. The UPFC controls the power on the transmission side of the power system. When the real as well as reactive power is set the UPFC tries to follow the command by using the proportional and integral (PI) controller. But in some power systems the PI controllers cannot produce the proper power due to the power oscillations. These oscillations are created due to PI controller properties. In this paper the PI controller is replaced with the particle swarm optimization tuned PI controller (PSO-PI). It minimizes the power oscillations by using the objective function. The MATLAB 2017b is used to demonstrate the power transfer curves and the voltages. The IEEE 9 bus system is being used as a reference system.
The aim of this project was to detect and locate the single ground failure lines that occurs in m... more The aim of this project was to detect and locate the single ground failure lines that occurs in medium voltage (MV) networks on the transmission lines (TL). Compared with anther faults, single line-to-ground (SLG) is the most frequent. The neural network (NN) algorithm was advanced in order to discover and locate SLG faults. The network is simulated through simulated numerous defects at various locations, as well as changing earth resistance from (or 100 Ω) to TL to gather all of the data. In the electromagnetic transients' program (EMTP) program software, the existing fault have been measured. In addition, the waves were evaluated by utilize MATLAP's fastfourier-transform to calculate the waves of top three of them, On the MV network are fifty hundred faults are simulated all data in the neural network at MATLAB were trained and examined to improve the NN algorithm according to this data. Comparing all the simulated location faults that have been applied with those all locations detected in the NN algorithm, the overall error between them has been found to be very low and not to exceed 0.7. The Simulink circuit was created from this algorithm and checked in order to predict each failure could occur in the future in the MV network.
The aim of this project was to detect and locate the single ground failure lines that occurs in m... more The aim of this project was to detect and locate the single ground failure lines that occurs in medium voltage (MV) networks on the transmission lines (TL). Compared with anther faults, single line-to-ground (SLG) is the most frequent. The neural network (NN) algorithm was advanced in order to discover and locate SLG faults. The network is simulated through simulated numerous defects at various locations, as well as changing earth resistance from (or 100 Ω) to TL to gather all of the data. In the electromagnetic transients' program (EMTP) program software, the existing fault have been measured. In addition, the waves were evaluated by utilize MATLAP's fastfourier-transform to calculate the waves of top three of them, On the MV network are fifty hundred faults are simulated all data in the neural network at MATLAB were trained and examined to improve the NN algorithm according to this data. Comparing all the simulated location faults that have been applied with those all locations detected in the NN algorithm, the overall error between them has been found to be very low and not to exceed 0.7. The Simulink circuit was created from this algorithm and checked in order to predict each failure could occur in the future in the MV network.
Many users of smartphones have secret data they want to save it on their devices. The probability... more Many users of smartphones have secret data they want to save it on their devices. The probability of a device damage or stolen prevents them from saving data. Therefore, data driven applications used to save user's data on a remote server. Protection of the data during its transmission considered as one of the success aspect for these applications. In this paper, an enhanced method for data encryption proposed which guarantees data secrecy during its transmission over network. User's data encrypted before transmission using Base64 class. Data encryption and decryption implemented to halt reverse encryption process. In this way, data is transmitting in a secure and efficient manner accomplishing the main goal of Cryptography.
Nowadays, the advancement of medical technology has given birth into many innovative machines and... more Nowadays, the advancement of medical technology has given birth into many innovative machines and devices to improve our health life, especially to those who are disabled or gifted. On some people with severe disabilities such as quadriplegia, the human eye-ball does not only serve as a vision system, but also a means of conveying information and intention to other people. This is because although quadriplegic patients suffer the loss of motor sensory functions from the neck and below, upper neck functions such as the vision system is normally spared. This enables the patient to control the movement of his/her eyeballs to convey desired information. Although many similar researches have been done, this paper proposes the use of image processing on image captured using webcam with its Infra-Red (IR) filter removed (a.k.a night vision) to achieve robustness. This allows the algorithm to properly track the location of the iris despite of its and the pupil color variations. Two image processing algorithms are then used, each with owns tradeoff between speed and accuracy. Analysis on both algorithms shows good tracking performance despite of the mentioned tradeoff
This paper proposes a new approach to ensure the torque decoupled to the rotor flux of an inducti... more This paper proposes a new approach to ensure the torque decoupled to the rotor flux of an induction machine based on the Field Oriented Control (FOC). The suggested method consists of inserting into the conventional d-q synchronous current controller, coupling terms of motor and multi-level inverter models. Making, the dynamic response of stator current components decoupled as well as the rotor flux and torque. In this paper, the mathematic model of an induction motor and multi-level inverter are first derived. Then, the synchronous current controller and modulation strategy for high power inverters are investigated. Finally, the validation through implementation and simulation of a 4.16 kV electric drive with MATLAB/Simulink and SimPowerSystems is performed. The model simulated in this paper includes an induction motor, nine-level cascaded H-bridge inverter and a carrier based space vector pulse-width-modulation. The results of the simulations of each method has been recorded and the comparison results reveal that the proposed method effectively maintains the rotor flux decoupled to the torque.
The use of Business Intelligence for Small-Mid Enterprise (SME) no longer impeded by the size of ... more The use of Business Intelligence for Small-Mid Enterprise (SME) no longer impeded by the size of the resources required. The study in this paper provides an overview of how the use of proposed software can be used as an effective and efficient alternative solution in building BI Tools combined with table virtualization utilization in SQL. To know the level of usability and suitability of the developed BI Tool, the researcher conducted evaluation and analyzation using 2 (two) tools (Heuristics Evaluation and UMUX-Lite). The result found the comparison between the output (Business Intelligence Tool) produced by PHP Report Maker has a better level of usability and suitability than its competitors. Although both are in a decent median, the output needs preferences and customizations to achieve maximum functionality like well-known other development software
Fiber optic has an imperative part in the improvement of media communications framework in Indone... more Fiber optic has an imperative part in the improvement of media communications framework in Indonesia. Better system execution and nature of the speed that offered by fiber optic can bolster the information prerequisite which keeps on expanding each year. In Indonesia, Fiber Optics is utilized as the essential system foundation Backbone and Access and still keep on developing the fiber optic system in Indonesia. Therefore, the process of reporting, controlling and monitoring are imperative for network deployment of fiber optic network by using an application system to be more efficient and accelerate the decision making process. In this study FOMApps is made, an android based application that facilitates the requirements of monitoring, controlling and reporting the fiber optic project between the Government and fiber optic deployment provider. Specifically, FOMApps incorporate distinctive announcing positions for each sort of employment. The test aftereffects of detailing framework Optical Fiber Cable (Outside Plant) has a speed in conveying the report added up to 257.516 seconds. So from the outcomes that are acquired, the application is plausible for use in detailing the arrangement of Outside Plant Fiber Optic. With the presence of this application, we expect the way toward controlling and checking between the Government and fiber optic organizations suppliers are accomplished.
This paper presents a visual detection of fingertips by using a classification technique based on... more This paper presents a visual detection of fingertips by using a classification technique based on the bag-of-words method. In this work, the fingertips are specifically of people who are holding a therapy ball, as it is intended to be used in a hand rehabilitation project. Speeded Up Robust Features (SURF) descriptors are used to generate feature vectors and then the bag-of-feature model is constructed by K-mean clustering which reduces the number of features. Finally, a Support Vector Machine (SVM) is trained to produce a classifier that distinguishes whether the feature vector belongs to a fingertip or not. A total of 4200 images, 2100 fingertip images and 2100 non-fingertip images, were used in the experiment. Our results show that the success rates for the fingertip detection are higher than 94% which demonstrates that the proposed method produces a promising result for fingertip detection for therapy-ball-holding hands.
In this competitive scenario of the educational system, the higher education institutes use data ... more In this competitive scenario of the educational system, the higher education institutes use data mining tools and techniques for academic improvement of the student performance and to prevent drop out. The authors collected data from three colleges of Assam, India. The data consists of socio-economic, demographic as well as academic information of three hundred students with twenty-four attributes. Four classification methods, the J48, PART, Random Forest and Bayes Network Classifiers were used. The data mining tool used was WEKA. The high influential attributes were selected using the tool. The internal assessment attribute in the continuous evaluation process makes the highest impact in the final semester results of the students in our dataset. The results showed that random forest outperforms the other classifiers based on accuracy and classifier errors. Apriori algorithm was also used to find the association rule mining among all the attributes and the best rules were also displayed.
In this work, annual energy output of a variable speed wind turbine is analyzed using annual Weib... more In this work, annual energy output of a variable speed wind turbine is analyzed using annual Weibull wind speed probability distribution function. The power coefficient variety with tip speed proportion in torque control district and pitch point variety for most extreme power yield from wind turbine are examined for distinguishing control framework parameters. The wind turbine power output and variation of power coefficient with tip speed ratio as well as pitch angle are examined / reported using annual Wei bull distribution function. Finally the variation of the estimated annual energy output of the given wind turbine with the mean wind speed is presented.
Uploads
Papers by Nooria Sukmaningtyas