12,687 research outputs found

    Reliability of the Model for Clustering of Longitudinal datasets of Infant Mortality Rate in India

    Get PDF
    Because of the natural tendency of human beings and heavenly bodies to form groups, the technique of cluster analysis or segmentation analysis find its importance and applications in many fields of study. A model for clustering of time trends was proposed by authors whose beauty is that 2-way dimensions that is the horizontal flow of the trend and vertical distance of the trend from a common base are considered to obtain the natural clusters. In the present paper, the reliability of this model is studied in two steps namely (i) by repeating the analysis but using different interval distance measures and (ii) by repeating the analysis but using different hierarchical clustering techniques. Dissimilarity coefficients were calculated for the time trends of infant mortality rates in India using this model. In SPSSv17.0, four different clustering methods were applied using generalized power function. Agglomeration schedules were obtained and elbow criterion diagrams were made for each trend. Five stable clusters were suggested by these methods. K-means clustering technique was applied to obtain the actual members of these five clusters

    A novel Analysis of Image Forgery Detection Using SVM

    Full text link
    This paper deals with basic information regarding the face recognition and whole parameters that effects the face structure and face shape. For the calculation of age, clients utilize age function combined with aging way. Face recognition is most difficult field of pattern recognition, however research in this field almost attains constancy with new difficulties emerges with time, and the research again towards the problem encounters due to aging, an automatic age technique utilized for strong face recognition is given briefly. Then user use age, commonly vector generating function or feature vector of real image to create synthesized feature vectors at target age. User uses a structure and texture vectors to show a facial image by projecting it in Eigen space of shape or texture. Images in courtrooms for evidence, graphics in newspapers and magazines, and digital graphics used by doctors are few instances that needs for pictures and not using a manipulation. Earlier, SVM algorithm failed in many instances in detection of forged picture. For the reason that single characteristic extraction algorithm, just isn#39t capable to include the certain function of the pictures. So you can overcome drawbacks of existing algorithm. We can use meta-fusion technique of HOG and Sasi elements classifier also to beat the drawback of SVM classifier.nbs

    Voltage modulated electro-luminescence spectroscopy and negative capacitance - the role of sub-bandgap states in light emitting devices

    Full text link
    Voltage modulated electroluminescence spectra and low frequency ({\leq} 100 kHz) impedance characteristics of electroluminescent diodes are studied. Voltage modulated light emission tracks the onset of observed negative capacitance at a forward bias level for each modulation frequency. Active participation of sub-bandgap defect states in minority carrier recombination dynamics is sought to explain the results. Negative capacitance is understood as a necessary dielectric response to compensate any irreversible transient changes in the minority carrier reservoir due to radiative recombinations mediated by slowly responding sub-bandgap defects. Experimentally measured variations of the in-phase component of modulated electroluminescence spectra with forward bias levels and modulation frequencies support the dynamic influence of these states in the radiative recombination process. Predominant negative sign of the in-phase component of voltage modulated electroluminescence signal further confirms the bi-molecular nature of light emission. We also discuss how these states can actually affect the net density of minority carriers available for radiative recombination. Results indicate that these sub-bandgap states can suppress external quantum efficiency of such devices under high frequency operation commonly used in optical communication.Comment: 21 pages, 4 sets of figure

    Lack of benefit of preoperative antimicrobial prophylaxis in children with acute appendicitis: a prospective cohort study

    Get PDF
    Background: Preoperative antimicrobial prophylaxis is widely used in pediatric patients undergoing appendectomy, but evidence showing a reduction of postoperative infectious complications is lacking. Methods: A prospective consecutive cohort study on changing from preoperative antimicrobial prophylaxis to no prophylaxis in children undergoing urgent appendectomy was undertaken. The impact of this change in management on postoperative infectious complications was evaluated by comparing the outcome in 100 patients receiving (group A) and a subsequent 100 patients not receiving prophylaxis (group B), which consisted of a preoperative single dose of intravenous metronidazole (10mg/kg body weight). Results: Histology confirmed acute appendicitis in 92 patients of group A and 95 patients of group B. In patients with histological simple appendicitis, postoperative infectious complications were noted in 2 (3.0%) of 69 patients from group A and in none of 70 patients from group B, and in patients with histological perforated appendicitis in 5 (22%) of 23 and 4 (16%) of 25 patients from groups A and B, respectively. Postoperative infectious complications were more frequent (p<0.05) in perforated than in simple appendicitis. These infectious complications included in simple appendicitis two wound infections in group A, and in perforated appendicitis four intraabdominal abscesses and one wound infection in group A and two intraabdominal abscesses and two wound infections in group B. Conclusion: Postoperative infectious complications were seen more often in patients with perforated appendicitis than in those with simple appendicitis. Preoperative antimicrobial prophylaxis with metronidazole did not reduce the rates of postoperative infectious complication

    UTILIZATION OF UNSERVICEABLE STRAWBERRIES FOR PRODUCTION OF ELLAGIC ACID AND ITS ENHANCEMENT BY ASPERGILLUS NIGER

    Get PDF
    Objective: Use of Aspergillus Niger (616) for the fabrication of ellagic acid from unserviceable strawberry as a substrate which is readily and chiefly available from Agro-industries and farm waste.Methods: The ellagic acid content was determined by HPLC method which shows a higher concentration of ellagic acid (143.085+1.669 ppm) after fermentation of 96 h at 35 °C. DPPH assay was carried out for antioxidant activity of ellagic acid.Results: Results designated that ellagic acid has higher antioxidant activity as compared with ascorbic acid.Conclusion: Existing study exposes that this agro waste and farm waste can be used at commercially for the production of ellagic acid which has enormous medicinal properties.Keywords: Ellagic acid, Raw strawberry, DPPH assay, Aspergillus Niger, Fermentation, and HPL

    Special Theory of Relativity through the Doppler Effect

    Full text link
    We present the special theory of relativity taking the Doppler effect as the starting point, and derive several of its main effects, such as time dilation, length contraction, addition of velocities, and the mass-energy relation, and assuming energy and momentum conservation, we discuss how to introduce the 4-momentum in a natural way. We also use the Doppler effect to explain the "twin paradox", and its version on a cylinder. As a by-product we discuss Bell's spaceship paradox, and the Lorentz transformation for arbitrary velocities in one dimension.Comment: 20 pages, 1 figur

    CARET analysis of multithreaded programs

    Full text link
    Dynamic Pushdown Networks (DPNs) are a natural model for multithreaded programs with (recursive) procedure calls and thread creation. On the other hand, CARET is a temporal logic that allows to write linear temporal formulas while taking into account the matching between calls and returns. We consider in this paper the model-checking problem of DPNs against CARET formulas. We show that this problem can be effectively solved by a reduction to the emptiness problem of B\"uchi Dynamic Pushdown Systems. We then show that CARET model checking is also decidable for DPNs communicating with locks. Our results can, in particular, be used for the detection of concurrent malware.Comment: Pre-proceedings paper presented at the 27th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2017), Namur, Belgium, 10-12 October 2017 (arXiv:1708.07854
    • …
    corecore