41 research outputs found

    Fuzzy Clustering in Web Mining

    Get PDF
    Web mining is the use of data mining techniques to automatically discover and extract information from web. Clustering is one of the possible techniques to improve the efficiency in information finding process. Conventional clustering classifies the given data objects into exclusive clusters. However such a partition is insufficient to represent many real situations. Hence a fuzzy clustering method is offered to construct clusters with uncertain boundaries and allows the object to belong to multiple clusters with degree of membership. Web data has fuzzy characteristics, so fuzzy clustering is better suitable for web mining in comparison with conventional clustering. In this paper, we have proposed two algorithms that are Fuzzy c-Means (FCM) and Clustering based on Fuzzy Equivalence Relations which can be used for web page mining and web usage mining. The results obtained from the proposed algorithm are more convincing. The experimental results are carried out on different algorithmic parameters on real data. The analysis is being done by comparing the proposed algorithm with conventional clustering algorithms

    Implementation of Congestion Awareness and Adaptivity in Mobile Ad Hoc Networks

    Get PDF
    Congestion in mobile ad hoc networks leads to transmission delays and packet losses and causes wastage of time and energy on recovery. In the current designs, routing is not congestion adaptive. Routing may let a congestion happen which is detected by congestion control, but dealing with congestion in this reactive manner results in longer delay and unnecessary packet loss and requires significant overhead if a new route is needed. This problem becomes more visible especially in large-scale transmission of heavy traffic such as multimedia data, where congestion is more probable and the negative impact of packet loss on the service quality is of more significance. Routing should not only be aware of, but also be adaptive to, network congestion. Routing protocols which are adaptive to the congestion status of a mobile ad hoc network can greatly improve the network performance. Many protocols which are congestion aware and congestion adaptive have been proposed. In this paper, we present a survey of congestion adaptive routing protocols for mobile ad hoc networks. Ad hoc networks consist of independent self-structured nodes. Nodes utilize a wireless medium for exchange their message or data, as a result two nodes can converse in a straight one to one connection if and only if they are within every other?s transmit range

    Treatment of Infected Hip Arthroplasty

    Get PDF
    The clinical outcomes of a consecutive series of deep total joint infections treated with a prosthesis retaining protocol were reviewed. The treatment of deep periprosthetic joint infections is challenging. In recent years, two-stage exchange arthroplasty has emerged as the gold standard for successful elimination of infection. With success rates averaging 82% to 96%, this treatment method has both the highest and most consistent rate of infection eradication. Another alternative in the treatment of the deep periprosthetic infection is the single-stage exchange arthroplasty. Successful eradication of infection after single-stage exchange arthroplasty has been reported to average from 60% to 83% after total hip infections. While both the single and two-stage exchange arthroplasty are viable treatment options, they are associated with negative factors such as they are time consuming, expensive, and may entail a 6- to 12-week period with a minimally functioning extremity after prosthesis removal. This paper reports the general principles of management, the treatment of acute infection occurring in the postoperative period or later, and the treatment of chronic infection by exchange arthroplasty or resection arthroplasty
    corecore