1,715 research outputs found

    Accurate estimations of circumstellar and interstellar lines of quadruply ionized vanadium using the coupled cluster approach

    Full text link
    Accurate {\it ab initio} calculations have been carried out to study the valence electron removal energies and oscillator strengths of astrophysically important electromagnetic transitions of quadruply ionized vanadium, V4+V^{4+}. Many important electron correlations are considered to all-orders using the relativistic coupled-cluster theory. Calculated ionization potentials and fine structure splittings are compared with the experimental values, wherever available. To our knowledge, oscillator strengths of electric dipole transitions are predicted for the first time for most of the transitions. The transitions span in the range of ultraviolet, visible and near infrared regions and are important for astrophysical observations.Comment: Submitted in Astrophysical

    Knowledge, attitude, and practice of ‘P-drug concept’ among postgraduate residents and interns in a tertiary care teaching hospital in Maharashtra

    Get PDF
    Background: A P-drug is a clinician’s personal or preferred or priority choice drug. The study aims to evaluate the knowledge, awareness, and practice of P-drug, which helps postgraduates to prescribe medicines rationally. The objective of this study is to assess the knowledge, attitude, and practice of the P-drug concept among postgraduate students at a tertiary care teaching hospital. Methods: The study is a prospective, cross-sectional pre-validated questionnaire-based study conducted in the tertiary care teaching hospital. A total of 300 postgraduates, interns and consultants from Tertiary care teaching hospital from Maharashtra were enrolled and instructed to fill the questionnaire. These filled forms were collected, and data was analyzed. Results: Out of 300 members, 233 filled the questionnaire, and these forms are evaluated. About 49.7% among them are aware of P-drug, 43.4% are aware of P-treatment, 28.4% are not including fixed-dose combinations in their P-drug list, 42% are aware of the advantages of prescribing P-drug, and 48.4% felt that teaching programs are needed for preparing P-drug list. Conclusions: The P-drug concept is requisite for improving the quality of health care and practicing rational use of medicine. As only a few studies have been conducted on the P-drug idea in this institute, the institutional teaching review board should run teaching programs regarding the P-drug concept

    Ensuring the Data Integrity and Confidentiality in Cloud Storage Using Hash Function and TPA

    Get PDF
    Main call for Cloud computing is that users only utilize what they required and only pay for whatever they are using. Mobile Cloud Computing refers to an infrastructure where data processing and storage can happen away from mobile device. Research estimates that mobile subscribers worldwide will reach 15 billion by the end of 2014 and 18 billion by at the ending of 2016. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which evolves Mobile Cloud Computing. Mobile devices require large storage capacity and maximum CPU speed. As we are storing data on cloud there is an issue of data security. As there is risk associated with data storage many IT professionals are not showing their interest towards Mobile Cloud Computing. To ensure the users' data correctness in the cloud, here we are proposing an effective mechanism with salient feature of data integrity and confidentiality. This paper proposed a solution which uses the RSA algorithm and mechanism of hash function along with various cryptography tools to provide better security to the data stored on the cloud. This model can not only solve the problem of storage of massive data, but also make sure that it will give data access control mechanisms and ensure sharing data files with confidentiality and integrity. DOI: 10.17762/ijritcc2321-8169.15055

    A Distributed Control Law for Load Balancing in Content Delivery Networks

    Get PDF
    Large Internet-scale distributed systems deploy hundreds of thousands of servers in thousands of data centers around the world. Internet-scale distributed system to have emerged in the past decade is the content delivery network (CDN, for short) that delivers web content, web and IP-based applications, downloads, and streaming media to end-users (i.e., clients) around the world. This paper focuses on the main research areas in the field of CDN, pointing out the motivations, and analyzing the existing strategies for replica placement and management, server measurement, best fit replica selection and request redirection. In this paper, I face the challenging issue of defining and implementing an effective law for load balancing in Content Delivery Networks. A formal study of a CDN system, carried out through the exploitation of a fluid flow model characterization of the network of servers. This result is then leveraged in order to devise a novel distributed and time-continuous algorithm for load balancing

    A Review on Data Storage Security in Cloud Computing Environment for Mobile devices

    Get PDF
    Cloud computing is a platform which provides different capabilities which are not just limited to storage, networking and computing capability as a service to users through Internet. Users can automatically request and release these resources on demand, by paying charges for the quantity and quality of service they use. Cloud computing for Mobile which is also referred as Mobile Cloud Computing is combination of mobile with cloud computing that provides user with unlimited access to the pool of different resources from cloud without affecting mobilization of user with his Mobile. As with its advantages it comes with the risk of data read by the cloud service provider or been grabbed by someone else using man-in-middle attack, thus affecting user privacy and integrity and losing users trust further over the service. These issues can be solved by implementing different techniques like encryption, avoiding unauthorized access to user to have access to stored data. Any algorithm or technique used for securing data should consider few important points like Mobile devices are battery powered and have less processing capability and have less storage space. In this paper we reviewed different techniques for secure storage of user’s data in the cloud, their advantages and disadvantages for mobile cloud computing environment. DOI: 10.17762/ijritcc2321-8169.150514

    Deducing and Ordering Most-influencing Product Features through Well-established Sentiments using NLP

    Get PDF
    The quickly extending e-commerce has encouraged shoppers to buy items on the web. Different brands and a huge number of items have been offered on the web. Mixtures of clients' reviews are accessible now days on web. These free audits cum reviews are imperative for the buyers and additionally the shippers/merchants. The greater parts of the reviews are disorganized leading to ambiguity in helpfulness of data. In this paper we are proposing a product feature ranking framework, which will distinguish important features cum aspects of products from online customer reviews, and aim to enhance usability of the these reviews. The important aspects or features of product can be usually distinguished using two interpretations 1) the critical aspects are generally remarked by larger audience 2) customers reviews on the key aspects- significantly influence on the overall reviews on the product. Firstly we distinguish product aspects by shallow dependency parser and conclude client's surveys on these elements by means of a sentiment classifier. Then we suggest probabilistic feature detection and ordering them by their rank algorithm to finish up the significance of features by considering recurrence and the impact of customers opinions given to every feature over their entire reviews. DOI: 10.17762/ijritcc2321-8169.150711

    A Survey on Classification Techniques for Feature-Sentiment Analysis

    Get PDF
    As use of internet and its application are growing exponentially; the e-commerce business i.e. online purchase is proportionately swelling in the world. The e-commerce websites and similar service providing websites are providing a rich variety of product and service to be sold. As the quality of service and product/goods has much effect on its sell, the websites nowadays tends to have public opinion on the product in the form of feedback; we can name it as reviews. These reviews provide much information about the service/product as the customers are encouraged to write their reviews cum assessments about the product, more precisely saying, customer writes their view about product’s specifications or product’s features. These unrestricted or restricted opinions from public can then be considered by the customers and vendor to make the required design/engineering/production changes to the product to upsurge its quality. The Feature Mining along with Sentiment Analysis techniques can be applied to achieve product’s feature and public opinion on these features. Here in this paper we are interestingly motivated by the scenario as discussed above. We had a survey on the different methods cum techniques that can be usually used to extract products/service features and categorizing those feature along with the sentiment classification on the determined features which is part of Machine learning. The public opinions can be classified as positive, negative and neutral sentimentalities. Research area ‘Data Mining’ has proven its importance with its rich set of Machine Learning Algorithms which in turn can be used as Sentiment or Opinion Classifier. After evaluating feature-sentiment techniques, we then studied the feature classification/categorizing by using its overall sentiment and influence on the product/service sell. DOI: 10.17762/ijritcc2321-8169.15079
    corecore