175 research outputs found

    An Approach to Recommend Pages to User after Path Completion

    Full text link
    With the huge amount of data available on the web, the effective and timely search is most important aspects. Because of tremendous USAge of web the size of the log files are becoming huge day by day. Web Mining which is an application of data mining can be used to improve web performance by generating patterns in the log files. Web Pre-fetching based on recommendation can be used to improve web performance. This paper proposes an architecture that recommends pages to the user based on studying the browsing activity of the user and other user of same USAge profile and completing it in every aspects and then recommending the pages which can be pre-fetched to improve web performance. This paper proposes about the path completion which shows users interest and then recommending pages to the user which will result in effective recommendation

    Review Paper On: Accident Detection Using VANET

    Get PDF
    Vehicular ad hoc networks (VANETs) are collecting enlarge recognition from techno based and deployment based sections of industry, due to the various applications and probable immense welfare they offer for future VANET users. Safety information exchange enables life-critical application, such as the alerting functionality during crossing traversing and lane merging, and thus, plays a key role in VANET application. In a VANET, vehicles will depend on the integrity of received data for deciding when to send lerting triggers to drivers. The interaction between car to car, car to roadside unit is done using wireless communication interfaces. That is why sefty is an salient concern area for vehicular grid application. For authentication purpose so many bandwidths is consumed and the production becomes low. In VANET some serious networks attacks such as man in middle attack, impersonation is possible. In this paper we are going to through some light on the previous researches done in this area and will compare the various drawbacks of these researches. After that we are giving different issues on VANET and finally conclude with proposed algorithms. DOI: 10.17762/ijritcc2321-8169.15031

    Data Aggregation Based Proactive Data Reporting Protocol for Wireless Sensor Network

    Get PDF
    Wireless sensor networks are the grouping of tiny sensor nodes that gathers the information by sensing activeness from the surroundings similar lands, forests, hills, sea. Power saving is a critical issue in wireless sensor networks since sensor nodes are battery-powered. To achieve optimized network performance at collecting a small portion of sensed data in network is in current researches. There are many protocols available for the successful communication. Sink trail and sink trail-s are the two energy efficient proactive data reporting protocols for mobile sink based on data collection with low complexity and reduced control overhead. In wireless sensor networks, using mobile sinks mobility rather than static sink for data collection is the new trend. Recently the researches are giving the concentration on moving patterns of the mobile sink to achieve optimized network performance, collecting a small area of sensed data in the network and also reducing energy consumption is main motto of the recent searches. Sink trail and sink trail-S protocols aim to conserve energy by turning off unnecessary sensors while simultaneously preserving a constant level of routing fidelity. In the proposed system we proposed the system that provides solution over mobility problems in wireless sensor network with energy saving methodology using aggregation technique. DOI: 10.17762/ijritcc2321-8169.150616

    Face Recognition in the Scrambled Domain Using MK-RDA

    Get PDF
    Facial look identity is a vital mission by means of human-interacting structures that goal to be aware of versions within the human’s emotional state. the principle challenge or the crucial part in surveillance society is the privacy-shielding era. because the rapid improvement in the internet international it turns into very essential to scramble the pics in the video or files for the duration of transmission. in this the biometric identity of photographs or faces from scrambled pictures plays a completely tough mission. Numbers of various technology are carried out to provide privateness for the duration of surveillance or during transmission of video however they're lack of essential traits, like reversibility or visible fine maintenance. in lots of scrambling methods the faces are covered by a few animation which may additionally or may not cover all faces or it receives hard to recover pics from this technique. Many guide method also are us used by which we will unscramble an photo but they are no longer powerful that a good deal. to overcome all this matters we proposed a novel approach- Many-Kernel Random Discriminate analysis (MK-RDA) to find out discriminative patterns from chaotic indicators. structures get better accuracy bring about best photos. To PIE and ORL datasets has getting above ninety% accuracy

    Detection and Localization of Wireless Jammer

    Get PDF
    In recent years, wireless technology has become more advanced, popular and affordable. Because of this broad class of new applications such as traffic monitoring, patient tracking, patient monitoring, video conferencing, video surveillance cameras monitoring of places like public buildings, banks, malls, railway stations etc. has increased which utilizes wireless networks. These applications are totally depends on wireless communication for their successful deployment. Security is most important issue to avoid nuisance in both routine and critical communications services. One threat for the security of wireless network is jamming attack. Jamming attacks can severely affect the performance of Wireless Networks due to their broadcast nature. The most reliable solution to reduce the impact of such attacks is to detect and localize the source of the attack. This will help to take further security actions. This project aims to find the location of wireless jammer by simulation method using MATLAB software

    Wide-Beamwidth Broadband Antenna Using S-Shaped Dipole And Microstrip Antenna

    Get PDF
    Bandwidth of compact S-shaped Microstrip antenna has been increased by cutting S-shaped slot inside the patch. This paper presents a novel circularly polarized (CP) printed antenna with wide bandwidth and wide axial ratio (AR) beam width and the study of broadband response in slot cut S-shape Microstrip antenna. The wide beam width antenna is realized by bending a linearly polarized dipole into “S” shape with variable line width, which achieves circularly polarized radiation. It is found that this “S” antenna has some similar features to the linear polarized dipole, such as the feeding method, the radiation pattern in some main planes and nearly omnidirectional radiation in one main plane. The S-shaped slot modifies the surface current distribution at TM20 mode that gives broadside radiation pattern over complete bandwidth with peak broadside antenna gain of nearly 7.5 dBi

    Object Detection for Image Captioning

    Get PDF
    Generation of description of pictures victimization tongue sentences is gaining a lot of quality of late. It's a difficult task, because it needs not solely understanding a picture, however to translate that visual data into sentence description. So as to caption a picture, we tend to 1st have to be compelled to discover the objects within the image. Object detection has become one amongst the international widespread analysis fields. 1st the paper introduced the distinction between deep learning and machine learning for object detection. Second the techniques for object detection are surveyed. Third it mentioned techniques for object classification

    Annual consultation prevalence of regional musculoskeletal problems in primary care: an observational study

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Regional musculoskeletal pain such as back or shoulder pain are commonly reported symptoms in the community. The extent of consultation to primary care with such problems is unknown as a variety of labels may be used to record such consultations. The objective was to classify musculoskeletal morbidity codes used in routine primary care by body region, and to determine the annual consultation prevalence of regional musculoskeletal problems.</p> <p>Methods</p> <p>Musculoskeletal codes within the Read morbidity Code system were identified and grouped by relevant body region by four GPs. Consultations with these codes were then extracted from the recorded consultations at twelve general practices contributing to a general practice consultation database (CiPCA). Annual consultation prevalence per 10,000 registered persons for the year 2006 was determined, stratified by age and gender, for problems in individual regions and for problems affecting multiple regions.</p> <p>Results</p> <p>5,908 musculoskeletal codes were grouped into regions. One in seven of all recorded consultations were for a musculoskeletal problem. The back was the most common individual region recorded (591 people consulting per 10,000 registered persons), followed by the knee (324/10,000). In children, the foot was the most common region. Different age and gender trends were apparent across body regions although women generally had higher consultation rates. The annual consultation-based prevalence for problems encompassing more than one region was 556 people consulting per 10,000 registered persons and increased in older people and in females.</p> <p>Conclusions</p> <p>There is an extensive and varied regional musculoskeletal workload in primary care. Musculoskeletal problems are a major constituent of general practice. The output from this study can be used as a resource for planning future studies.</p

    Valorization, comparison and characterization of coconuts waste and cactus in a biorefinery context using NaClO2-C2H4O2 and sequential NaClO2-C2H4O2/autohydrolysis pretreatment

    Get PDF
    The search for new sources of lignocellulosic raw materials for the generation of energy and new compounds encourages the search for locations not well known and with a high potential for biomass availability as is the case of the Northeast Region of Brazil. Thus, the cactus (CAC), green coconut shell (GCS), mature coconut fibre and mature coconut shell were pretreated by NaClO2C2H4O2 and sequential NaClO2C2H4O2/autohydrolysis aiming at the obtention of high added-value compounds in the liquid fraction and solid phase. The yield of the solid phase was between 61.42 and 90.97% and the reduction up to 91.63% of lignin in the materials pretreated by NaClO2C2H4O2. After NaClO2C2H4O2/autohydrolysis pretreatment the obtained solids yield was between 43.57 and 52.08%, with a solubilization of the hemicellulose content up to 81.42%. For both pretreatments the cellulosic content remained almost unchanged. The pretreated solids were characterized by SEM, X-ray and crystallinity indexes showing significant modifications when submitted to pretreatments. These results were further confirmed by the enzymatic conversion yields of 81.6890.03 and 86.9790.36% of the LCMs pretreated by NaClO2C2H4O2 and pretreated by NaClO2C2H4O2/autohydrolysis, respectively. The resulting liquors had a total phenolic compounds content between 0.20 and 3.05 g/L, lignin recovered up to 7.40 g/L (absence of sulphur) and xylooligosaccharides between 16.13 and 20.37 g/L. Thus, these pretreatments showed an efficient fractionation of LCMs, especially in the GCS, being an important requirement for the generation of products and byproducts in the context of the biorefinery.The authors gratefully acknowledge the Brazilian research funding agencies CNPq and CAPES for financial support. Financial support from the Energy Sustainability Fund 2014-05 (CONACYT-SENER), Mexican Centre for Innovation in Bioenergy (CemieBio), Cluster of Bioalcohols (Ref. 249564) is gratefully acknowledged. We also gratefully acknowledge support for this research by the Mexican Science and Technology Council (CONACYT, Mexico) for the infrastructure project - INFR201601 (Ref. 269461) and CB-2015-01 (Ref. 254808).info:eu-repo/semantics/publishedVersio
    • …
    corecore