77 research outputs found
PUBLISHING SEARCH LOGS PRIVACY GUARANTEE FOR USER SENSITIVE INFORMATION
Search Engine companies maintain the search log to store the histories of their users search queries. These search logs are gold mines for researchers. However, Search engine companies take care of publishing search log in order to provide privacy for user’s sensitive information. In this paper we analyze algorithm for publishing frequent keywords, Queries, and Clicks of a search log. Before Zealous algorithm, we discuss how different variants of anonymity failed to provide good utility (publishing frequent items) and strong privacy for the search logs. And also this paper includes how zealous algorithm provides good utility and strong privacy for publishing search logs
Evaluating the rationality and efficacy of Snigdha and Ruksha Pinda Sweda in managing Musculoskeletal Disorders - A Conceptual Review
Swedana, derived from "Sweda" with the suffixes 'Nich' and 'Lyut,' refers to a therapeutic practice inducing sweat. Swedana alleviates conditions like heaviness and coldness by promoting perspiration. Swedana is classified into three types based on properties: Snigdha (oleation), Ruksha (dryness), and Snigdha Ruksha. It can also be categorized by the involvement of Agni into Saagni and Niragni forms. Particularly, Sankara Sweda, a historical therapy, utilizes herbal boluses for sudation. Snigdha Sweda is effective for Vata disorders, promoting nourishment and relieving pain, while Ruksha Sweda facilitates detoxification and reduces Vata Kapha-related symptoms. Effective for musculoskeletal disorders, Swedana acts as both a primary and supplementary treatment, detoxifying the body, enhancing blood circulation, and relieving stiffness. Different techniques like Patra Pottali and Kukkutanda Pinda Sweda target specific ailments. The therapeutic advantages are achieved from the balanced use of Snigdha and Ruksha qualities, which target Vata and Kapha imbalances, enhancing overall health by improving muscle flexibility and joint mobility
Studies on Tensile Characteristics of Kevlar/Jute/ Syntactic Foam Hybrid Sandwich Composites
In this study, a structured approach combining Taguchi experimental design and analysis of variance (ANOVA) is used to investigate the effects of skin material choice, material density, and percentage of reinforcement on the tensile properties of Kelvar/jute/synthetic foam hybrid sandwich composites. By deliberately changing these variables and examining how they affect tensile strength, modulus, and other important qualities, the goal is to maximize the mechanical performance of these composites. This work gives helpful insights into the interaction of these variables and their contribution to the overall tensile behavior of the composites through a series of carefully planned experiments and statistical studies. While ANOVA aids in quantifying the importance of individual components and interactions, the Taguchi approach makes it easier to identify the ideal parameter values. Making a substantial addition to the field of materials science and engineering, this combined method provides a solid framework for improving the design and engineering of lightweight, high-strength sandwich composites with customized features
Changes in Insulin Secretion and Insulin Sensitivity in Relation to the Glycemic Outcomes in Subjects With Impaired Glucose Tolerance in the Indian Diabetes Prevention Programme-1 (IDPP-1)
Lead-DBS v3.0: Mapping Deep Brain Stimulation Effects to Local Anatomy and Global Networks.
Following its introduction in 2014 and with support of a broad international community, the open-source toolbox Lead-DBS has evolved into a comprehensive neuroimaging platform dedicated to localizing, reconstructing, and visualizing electrodes implanted in the human brain, in the context of deep brain stimulation (DBS) and epilepsy monitoring. Expanding clinical indications for DBS, increasing availability of related research tools, and a growing community of clinician-scientist researchers, however, have led to an ongoing need to maintain, update, and standardize the codebase of Lead-DBS. Major development efforts of the platform in recent years have now yielded an end-to-end solution for DBS-based neuroimaging analysis allowing comprehensive image preprocessing, lead localization, stimulation volume modeling, and statistical analysis within a single tool. The aim of the present manuscript is to introduce fundamental additions to the Lead-DBS pipeline including a deformation warpfield editor and novel algorithms for electrode localization. Furthermore, we introduce a total of three comprehensive tools to map DBS effects to local, tract- and brain network-levels. These updates are demonstrated using a single patient example (for subject-level analysis), as well as a retrospective cohort of 51 Parkinson's disease patients who underwent DBS of the subthalamic nucleus (for group-level analysis). Their applicability is further demonstrated by comparing the various methodological choices and the amount of explained variance in clinical outcomes across analysis streams. Finally, based on an increasing need to standardize folder and file naming specifications across research groups in neuroscience, we introduce the brain imaging data structure (BIDS) derivative standard for Lead-DBS. Thus, this multi-institutional collaborative effort represents an important stage in the evolution of a comprehensive, open-source pipeline for DBS imaging and connectomics
PUBLISHING SEARCH LOGS PRIVACY GUARANTEE FOR USER SENSITIVE INFORMATION
Search Engine companies maintain the search log to store the histories of their users search queries. These search logs are gold mines for researchers. However, Search engine companies take care of publishing search log in order to provide privacy for user’s sensitive information. In this paper we analyze algorithm for publishing frequent keywords, Queries, and Clicks of a search log. Before Zealous algorithm, we discuss how different variants of anonymity failed to provide good utility (publishing frequent items) and strong privacy for the search logs. And also this paper includes how zealous algorithm provides good utility and strong privacy for publishing search logs.</jats:p
Minimum Number of Neighbour Nodes and Transmission Range Based Overhearing Controlled Protocol for Mobile Ad-Hoc Networks
Ad-hoc networks are communications less wireless networks; the most critical problem in mobile ad-hoc networks is energy utilization. Energy could be a restricted resource. All nodes eavesdrops the data transference in its locality and uses energy without need. Nevertheless various existing routing procedures collect route information via eavesdropping. The important reason for more energy utilization is unnecessary eavesdropping and rebroadcasting of RREQ to nodes. We propose a new mechanism to decrease energy consumption called Minimum Number of Neighbor Nodes and Transmission Range Based Overhearing Controlled Protocol. In which node has a choice of whether to send a packet or not by transmit effective info in Announcement Traffic Indication Message (ATIM) window and node selection on the basis of Transmission range and RES. The Proposed protocol is high energy-efficient compared to Conventional 802.11 PSM-established projects.</jats:p
- …
