Search results for: Ratna Balgis
6 Preparation of Porous Carbon Particles using a Spray-Drying Method with Colloidal Template
Authors: Yutaka Kisakibaru, AsepBayu Dani Nandiyanto, Ratna Balgis, Takashi Ogi, Kikuo Okuyama
Abstract:
spherical porous carbon particles with controllable porosity with a mean size of 2.5m have been prepared using a spray drying method with organic particle colloidal template. As a precursor, a mixing solution of carbon nanopowder and polystyrene (PS) particles as a template was used. The result showed that the particles with a good porous structure could be obtained. The pore size and shape (spherical) were identical to the initial template, giving a potential way for further developments. The control of particle porosity was also possible and reported in this paper, in which this control could be achieved by means of PS concentration.Keywords: Porous structure particle; Carbon nanoparticles; Catalyst; Spray-drying method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21045 Histogram Slicing to Better Reveal Special Thermal Objects
Authors: S. Ratna Sulistiyanti, Adhi Susanto, Thomas Sri Widodo, Gede Bayu Suparta
Abstract:
In this paper, an experimentation to enhance the visibility of hot objects in a thermal image acquired with ordinary digital camera is reported, after the applications of lowpass and median filters to suppress the distracting granular noises. The common thresholding and slicing techniques were used on the histogram at different gray levels, followed by a subjective comparative evaluation. The best result came out with the threshold level 115 and the number of slices 3.Keywords: enhance, thermal image, thresholding and slicingtechniques, granular noise, hot objects.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17344 Survey on Jamming Wireless Networks: Attacks and Prevention Strategies
Authors: S. Raja Ratna, R. Ravi
Abstract:
Wireless networks are built upon the open shared medium which makes easy for attackers to conduct malicious activities. Jamming is one of the most serious security threats to information economy and it must be dealt efficiently. Jammer prevents legitimate data to reach the receiver side and also it seriously degrades the network performance. The objective of this paper is to provide a general overview of jamming in wireless network. It covers relevant works, different jamming techniques, various types of jammers and typical prevention techniques. Challenges associated with comparing several anti-jamming techniques are also highlighted.Keywords: Channel, Cryptography, Frequency, Jamming, Legitimate, Security, Wavelength.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 31613 Application of Boost Converter for Ride-through Capability of Adjustable Speed Drives during Sag and Swell Conditions
Authors: S. S. Deswal, Ratna Dahiya, D. K. Jain
Abstract:
Process control and energy conservation are the two primary reasons for using an adjustable speed drive. However, voltage sags are the most important power quality problems facing many commercial and industrial customers. The development of boost converters has raised much excitement and speculation throughout the electric industry. Now utilities are looking to these devices for performance improvement and reliability in a variety of areas. Examples of these include sags, spikes, or transients in supply voltage as well as unbalanced voltages, poor electrical system grounding, and harmonics. In this paper, simulations results are presented for the verification of the proposed boost converter topology. Boost converter provides ride through capability during sag and swell. Further, input currents are near sinusoidal. This eliminates the need of braking resistor also.Keywords: Adjustable speed drive, power quality, boost converter, ride through capabilities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16952 The Effects of Rumah Panggung Environment, Social Culture, and Behavior on Malaria Incidence in Kori Village, Indonesia
Authors: Sri Ratna Rahayu, Oktia Woro Kasmini Handayani, Lourensiana Y. S. Ngaga, Imade Sudana, Irwan Budiono
Abstract:
Malaria is an infectious disease that still cannot be solved in Kori village, West Nusa Tenggara, Indonesia, where the most of people live in rumah panggung (Stilts House). The purpose of this study was to know whether there were the effects of rumah panggung environment, social culture, and behavior on malaria incidence in the Kori village. A cross-sectional study was performed to explore the effects of rumah panggung environment, social culture and behavior on malaria incidence. This study recruited 280 respondents, who live in the rumah panggung, permanent residents in Kori village, were age above 17 years old, and suffered from malaria in the past year. The collected data were analyzed with path analysis. The results of this study showed that the environment of rumah panggung and behavior have a direct effect on the incidence of malaria (p < 0.05). It could be concluded that improvement of environmental conditions of rumah panggung, sociocultural, and behavioral changes to maintain a healthy environment are needed to reduce the malaria incidence.
Keywords: Rumah panggung, socio cultural, behavior, malaria.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7021 Malicious Route Defending Reliable-Data Transmission Scheme for Multi Path Routing in Wireless Network
Authors: S. Raja Ratna, R. Ravi
Abstract:
Securing the confidential data transferred via wireless network remains a challenging problem. It is paramount to ensure that data are accessible only by the legitimate users rather than by the attackers. One of the most serious threats to organization is jamming, which disrupts the communication between any two pairs of nodes. Therefore, designing an attack-defending scheme without any packet loss in data transmission is an important challenge. In this paper, Dependence based Malicious Route Defending DMRD Scheme has been proposed in multi path routing environment to prevent jamming attack. The key idea is to defend the malicious route to ensure perspicuous transmission. This scheme develops a two layered architecture and it operates in two different steps. In the first step, possible routes are captured and their agent dependence values are marked using triple agents. In the second step, the dependence values are compared by performing comparator filtering to detect malicious route as well as to identify a reliable route for secured data transmission. By simulation studies, it is observed that the proposed scheme significantly identifies malicious route by attaining lower delay time and route discovery time; it also achieves higher throughput.
Keywords: Attacker, Dependence, Jamming, Malicious.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1752