543 research outputs found

    Assessment of Metabolic Parameters For Autism Spectrum Disorders

    Get PDF
    Autism is a brain development disorder that first appears during infancy or childhood, and generally follows a steady course without remission. Impairments result from maturation-related changes in various systems of the brain. Autism is one of the five pervasive developmental disorders (PDD), which are characterized by widespread abnormalities of social interactions and communication, and severely restricted interests and highly repetitive behavior. The reported incidence of autism spectrum disorders (ASDs) has increased markedly over the past decade. The Centre for Disease Control and Prevention has recently estimated the prevalence of ASDs in the United States at approximately 5.6 per 1000 (1 of 155 to 1 of 160) children. Several metabolic defects, such as phenylketonuria, are associated with autistic symptoms. In deciding upon the appropriate evaluation scheme a clinician must consider a host of different factors. The guidelines in this article have been developed to assist the clinician in the consideration of these factors

    A Cryptographic Solution to the Predefind Bound of Ciphertext Classes in KAC

    Get PDF
    In Cloud Computingsecure data sharing is an important functionality. Cloud computing is the storing of data online which is accessible from multiple and connected resources. It is the fastest growing field in computer world which serves various services to users. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services. This paper attempts to show how data is shared among cloud users securely, efficiently, and flexibly. On cloud anyone can share data as much they want to i.e. only selected content can be shared. With cryptography users can share the data to others in safe way. So that user encrypts data and upload it on cloud server. The proposed algorithm uses a new cryptosystem that is called as Key Aggregate Cryptosystem (KAC)[1] which generates a single key for multiple files. In particular, it uses a public key encryption which releases aggregate key for set of secret keys. With this aggregate key others can decrypt ciphertext set and remaining encrypted files outside the set are remains confidential

    Analyze Different approaches for IDS using KDD 99 Data Set

    Get PDF
    the integrity, confidentiality, and availability of Network security is one of the challenging issue and so as Intrusion Detection system (IDS). IDS are an essential component of the network to be secured. Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order to detect signs of security problems. Intrusion detection includes identifying a set of malicious actions that compromise information resources. Traditional methods for in trusion detection are based on extensive knowledge of signatures of known attacks . In the last three years, the networking revolution has finally come of age. More than ever before, we see that the Internet is changing computing, as we know it. The possibilities and opportunities are limitless; unfortunately, so too are the risks and chances of malicious intrusions There are two primary methods of monitoring these are signature - based and anomaly based. In this paper is to analyze different approaches of IDS . Some approach belongs to supervised method and some approach belongs to unsupervised method

    A Review Approach on various form of Apriori with Association Rule Mining

    Get PDF
    Data mining is a computerized technology that uses complicated algorithms to find relationships in large databases Extensive growth of data gives the motivation to find meaningful patterns among the huge data. Sequential pattern provides us interesting relationships between different items in sequential database. Association Rules Mining (ARM) is a function of DM research domain and arise many researchers interest to design a high efficient algorithm to mine ass ociation rules from transaction database. Association Rule Mining plays a important role in the process of mining data for frequent pattern matching. It is a universal technique which uses to refine the mining techniques. In computer science and data min ing, Apriori is a classic algorithm for learning association rules Apriori algorithm has been vital algorithm in association rule mining. . Apriori alg orithm - a realization of frequent pattern matching based on support and confidence measures produced exc ellent results in various fields. Main idea of this algorithm is to find useful patterns between different set of data. It is a simple algorithm yet having man y drawbacks. Many researches have been done for the improvement of this algorithm. This paper sho ws a complete survey on few good improved approaches of Apriori algorithm. This will be really very helpful for the upcoming researchers to find some new ideas from these approaches. The paper below summarizes the basic methodology of association rules alo ng with the mining association algorithms. The algorithms include the most basic Apriori algorithm along with other algorithms such as AprioriTi d, AprioriHybrid

    Editorial

    Get PDF
    This special edition is devoted to Rockets and Missile Technology, a developing sector that will likely increase significantly as rocket and missile design technology progress. Modern military arsenals must contain advanced guided-weapons technology. As the need for missile and rocket technology grows, they are employed in various applications. Technological advancements additionally highlight the system\u27s capabilities, functions, and applications, improving its efficacy and use. When it comes to combat aircraft, the armaments that go with them decide the price. New technology and applications such as hypersonic weaponry, long-range rockets and missiles, and space-based military equipment produce market upheaval. Current rocket and missile technology encourage potential writers to submit their viewpoints as technical articles and review papers within the framework of this journal, which this issue does after the most current updates

    Industrial Automation on the Specification of HT Capacitor

    Get PDF
    Designing of capacitors has acquired so much attention in the development and recently different types of capacitors are also developed in the industry. Considering all the benefits such as power factor improvement, reduction of power losses, increasing efficiency so on. Capacitors are also used to raise the quality of supply and safe handling of power equipments. The main objective of this paper is focused on the design process of the power capacitor and different parameter of the capacitor. In the design process of the capacitor, parameters are considered namely microfarad rating of capacitor, Loss angle (tan delta), and temperature of capacitor. All these parameter are measured manually by the operator in the industry and this is sponsored by Sharada Electronics Pvt Ltd, MIDC Miraj. Most of the power system fails if there is any damage of capacitor so this system is designed in such a way that it measures all parameter automatically and send it to the control room to avoid the faults that are ignored by the operator. DOI: 10.17762/ijritcc2321-8169.15026

    Performance Evaluation Of Drip Irrigation System Under Onion Crop In Semi-Arid Region Of Eastern Rwanda

    Get PDF
    Efficient irrigation systems are needed not only to reduce environmental hazard but also to promote sustainable utilization of water resources. Drip irrigation is common irrigation systems that can save water and increase crop production by transferring small amounts of water frequently to the periphery of the roots of plants. So far, to establish a better irrigation system, it is necessary to improve onion growth, and yield. The present study was carried out to evaluate drip irrigation in 8 hectares for growing different crop particular onion vegetable at The Fresh Gate East Africa farm located in Rwamagana district, of Eastern province of Rwanda. A research study was conducted from January to May, 2020. The meteorological data were collected and analysed. Soil physical properties like soil texture, bulk density and infiltration rate were determined. The observations on water application through drippers and performance indicators were assessed. The results revealed that the rainfall in the study area is not sufficient in all decades of the months taken for crop period so irrigation is inevitable. The soil of the area is sandy loam and suitable for crop production. The performance indicators like Distribution efficiency (Ed), application efficiency (Ea), field emission uniformity (EUf), Absolute emission uniformity (EUa) and design emission uniformity (EUd) with the corresponding values of 91.66, 88.23%, 91.20%, 89.25% and 78.60% respectively were fitting in the standards of good to excellent performance. The value of coefficient of variance (Cv) with 0.085 falls in the category of marginal While statistical uniformity coefficient (SUC) with 91.5% presents good to perfect drip system. We conclude that drip irrigation has increased more 100% of onion production with the harvest of 12 Tons/Ha at FGEA Farm. It is therefore recommended that drip system is highly efficient irrigation system for Rwandan conditions and can easily be promoted through farmer’s sensitization and government support
    • …
    corecore