25 research outputs found

    Wireless Printer Fastener using Raspberry Pi

    Get PDF
    In computing, a printer is a peripheral device which makes a persistent human-readable representation of graphics or text on paper or similar physical media. The wired printer have to be tethered to your computer, you cannot move it anywhere in your home or office, even up or down a floor or two. It does not have the ability to be located farther away from the computer. Technology development helps people to do their work easily and make them comfortable. The idea of Wireless Printer is using handheld device like Mobile phone through Wi-Fi we print the data. The common data printing procedure for wireless printer has to use notebook or desktop computer as a relay medium, first receiving the data from mobile and then sending it to printer using an appropriate printing method. This paper proposes a design of a device which directly prints the data stored inside the Mobile without the assistance of a notebook or desktop computer and can convert a traditional wired printer into a wireless one with minimal requirements. The design compromises Raspberry pi having Noobs as operating system. The configured Wi-Fi dongle accept file from Mobile and gives to Raspberry Pi. The Printer driver is a program to control a printer that is connected to your system. The CUPs installed on Raspberry Pi do the print job

    A Review of Resume Analysis and Job Description Matching Using Machine Learning

    Get PDF
    In the contemporary job market, the effective matching of resumes to job descriptions is a critical facet of talent acquisition. This research paper provides a comprehensive review of the advancements, methodologies, and challenges associated with leveraging machine learning (ML) and natural language processing (NLP) techniques for resume analysis and job description matching. The study surveys the existing literature, synthesizes key findings, and presents a taxonomy of approaches employed in the field. The paper begins by elucidating the significance of efficient resume-job description matching in enhancing the recruitment process. It then delves into the foundational principles of machine learning as applied to human resource management, emphasizing the role of natural language processing, pattern recognition, and semantic analysis in extracting relevant information from resumes and job descriptions. The review encompasses an in-depth analysis of various machine learning algorithms and models utilized in resume parsing, including but not limited to neural networks, support vector machines (SVM), and ensemble methods. Moreover, the paper investigates the incorporation of deep learning architectures, such as convolutional neural networks and recurrent neural networks, for more nuanced feature extraction and representation. Key challenges and limitations associated with current methodologies are thoroughly examined, addressing issues such as the need for large, diverse datasets for robust training. The paper concludes with a discussion on future research directions and emerging trends in the realm of resume analysis and job description matching. This research contributes to the existing body of knowledge by offering a comprehensive synthesis of the current state of machine learning applications in resume analysis and job description matching, providing valuable insights for researchers, practitioners, and industry professionals seeking to optimize talent acquisition processe

    Multiple Sector Identification Using Unique Referance Key

    Get PDF
    Using NoSQL storage like Mongodb, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. The Unique ID system provides unique identification numbers to Indian residents. Unique key which would not just help the government to track down individuals, but would make life far easier for citizens as they would not have to submit multiple documents each time they want to avail a new public, private and government service. This system will contain personal details like name, address, marital status, photo, identification mark and fingerprint biometric. The unique key will be in the formed of 6 digit alphanumeric number to provide more security. This system helps to manage persons needs in his/her life span by using a unique reference key i.e. the number is used as valid key and it will fetch only the required details from the central database. This system will create government jobs for computer sector in the development, implementation and maintenance of the UID system. A single unique key is used therefore decreasing manual labour and increasing efficiency as every detail is available on the single click and reducing the efforts in maintaining different databases

    Sentimental Analysis of Social Media Using R language and Hadoop

    Get PDF
    The way of expressing people’s views, opinions and Sentiments about others has been changed due to the growth of Technology of World Wide Web. Mostly people use blogs, Social sites, online discussions etc. for expressing their views. Massive amount of data is generated because of this. Companies face many problems in storing this massive data. This paper helps in analysis of sentiments of the data fetched from twitter using R language which either collects the information in the form of positive, negative or neutral score. After this the fetched data is pre-processed i.e. all the slang words, misspelled words etc. are removed. Using R language and Hadoop Connector we perform the analysis of twitter data which has size of TB’s also known as big data. R language and Hadoop tool are the two different platforms on which the performance estimation will be based on

    Cost benefit analysis of intralesional injections in keloids using Luer lock and non-locking syringes

    Get PDF
    Background: For keloid scarring, intralesional corticosteroid injections continue to be the most often utilised first therapeutic option. This is a common procedure done on an outpatient basis by surgeons and orthopaedists. Luer lock syringes which lock the needle with syringe prevent any leakage or spillage of drug while pushing it near the keloid compared to normal syringes. Methods: We intend to do a cost benefit analysis based on the retrospective data of intralesional steroid injections done by the authors (AP and SK) in their private practice. Results: The time between 2021 to 2022, 200 injection data was retrieved, 100 each using non locking syringes and Luer lock syringes. The spillage rate with non-Luer lock syringes was 14%. Conclusions: We found that luer lock syringes prove to be cost effective after giving more than 200 injections in keloids than non-locking syringes.

    Simultaneous estimation of simvastatin and labetalol in bulk and solid dosage form

    Get PDF
    A simple, accurate, precise, sensitive, and highly selective ultra violet spectrometer method has been developed for the simultaneous estimation of simvastatin and labetalol in bulk and solid dosage form. The estimation of simvastatin was carried out at 239 nm while labetalol was estimated at 222.4 nm. The developed method was validated for linearity range, precision, recovery studies and interference study for mixture, all these parameter showed the adaptability of the method for the method quality analysis of the drug in bulk and combination formulation. Keywords: Simvastatin, Labetalol, UV Spectrophotometric, Dosage form

    Ratio versus difference optimization in human behavior

    No full text

    Pattern of deliberate self-harm seen at a tertiary teaching hospital in Meghalaya, India

    No full text
    Background: The purpose of the study was to explore the deliberate self-harm (DSH) in the North-Eastern part of India and to understand the pattern of occurrence to help improve early intervention strategies. Methods: This is a cross-sectional study conducted at a tertiary care hospital in Shillong, Meghalaya, India. After informed consent, 50 individuals admitted in the emergency department with DSH were assessed for psychological profile by a trained psychiatrist and pattern of DSH was recorded using a semi-structured proforma. Results: Nearly 65% of the individuals were in the age group of 15-25 years and females were predominant compared to males (0.6 males/female). The maximum DSH attempts took place from 6:00 PM-6:00 AM. Chemical ingestion (44%) and medication overdose (24%) were the two most common modes of DSH. Nearly 20% of the individuals were intoxicated during the DSH attempt. Conclusion: The results inform the pattern of DSH in the North-Eastern part of India and further research is needed to explore the pattern in detail for designing effective intervention strategies
    corecore