2,467 research outputs found

    Cooperative Collection Development Requires Access: SALToC—A Low‐Tech, High‐Value Distributed Online Project for Article‐Level Discovery in Foreign‐Language Print‐Only Journals

    Get PDF
    Foreign‐language journals are an essential component of interdisciplinary area studies collections at research libraries but are, by definition, low‐use materials. Librarians who select them seek to broaden these collections, reduce duplication, and enable shared access to them. The challenge is lack of article‐level discoverability: these are print‐only journals, not covered in online indexing/abstracting services. If users cannot discover these articles, then how can cooperating libraries share them, and distribute responsibility for collecting them, which is essential to coordinated collection development? The SALToC project collaboratively address this issue by creating simple, centrally browsable tables of contents for target journals, through a low‐tech, low‐cost distributed process that benefits users at all participating libraries. For journals not available online nor included in article databases or indexes, this kind of discovery facilitates research by enabling scholars to use previously undiscoverable holdings of other libraries: they can now issue interlibrary loan, document delivery, and/or offsite retrieval requests, with full citations for desired articles. (Many libraries provide article document delivery, if the requester has a citation). Coordinated collection development (via planned reduction of duplication coupled with broader collective coverage) becomes supportable in the research library community only when shared access (and its prerequisite—discovery) is provided. The South Asian Language Journals Table of Contents (SALToC) project represents a proof‐of‐concept demonstration of the value of this approach. This paper shows how simple, grass‐roots distributed efforts can contribute significantly to discoverability of hard to discover resources, thereby making coordinated collection development cost‐effective, popular among users, and sustainable

    Exceptional Quartics are Ubiquitous

    Full text link
    For each real quadratic field we constructively show the existence of infinitely many exceptional quartic number fields containing that quadratic field. On the other hand, another infinite collection of quartic exceptional fields without any quadratic subfields is also provided. Both these families are non-Galois extensions of Q\mathbf{Q}, and their normal closu res have Galois groups D4D_4 and S4S_4 respectively. We also show that an infinite number of these exceptional quartic fields have power integral basis, i.e., monogenic. We also construct large collections of exceptional number fields in all degrees greater than 4.Comment: 13 pages. Conjecture in earlier version is prove

    Comparison of Candidate Itemset Generation and Non Candidate Itemset Generation Algorithms in Mining Frequent Patterns

    Get PDF
    Association rule mining is one of the important techniques of data mining used for exploring fruitful patterns from huge collection of data. Generally, the finding of frequent itemsets is the most significant step in association rules mining, and most of the research will be centered on it. Numerous algorithms have been discovered to find effective frequent itemsets. This paper compares the frequent pattern mining algorithms that use candidate itemset generation and the algorithms without candidate itemset generation. In order to have on field simulation for comparison, a case study algorithm from both types was chosen such as ECLAT and FP-growth algorithms. Equivalence class clustering and bottom up lattice traversal (ECLAT) algorithm accommodates ?Depth First Search? approach and requires the generation of candidate itemset. The FP-growth algorithm follows the ?Divide and Conquer? method and does not require candidate itemset generation. In this paper, the benchmark databases considered for comparison are Breast Cancer, Customer Data, and German Data etc. The performances of both the algorithms have been experimentally evaluated in terms of runtime and memory usage. From the result it is analyzed that the FP-tree algorithm is more advantageous as it does away with the need of generation of candidate patterns

    DEVELOPMENT AND VALIDATION OF RP-HPLC METHOD FOR SIMULTANEOUS ESTIMATION OF GALLIC ACID, CURCUMIN AND PIPERINE IN AN AYURVEDIC FORMULATION

    Get PDF
    Objective: The objective of the present work was to establish a simple, precise, accurate and robust method for simultaneous estimation of gallic acid, curcumin and piperine from the marketed ayurvedic formulation by liquid chromatography. Methods: The separation was carried out on Hemochrom C18 Column (250 mm × 4.6 mm ID, 5 µm pore size) with a mobile phase methanol: acetonitrile: water (pH 3.2adjusted by using orthophosphate acid) in the ratio 70:20:10v/v by isocratic elution modeat 25 °C and the flow rate was setat0.8 ml/min. The analysis was carried out atisoabsorptive wavelength of 295 nm. Results: The retention time of gallic acid, curcumin and piperine was found to be 3.3(±0.2), 4.7 (±0.2) and 5.6 (±0.2) min, respectively. The linearity range for gallic acid, curcumin and piperine was found to be 10-70 μg/ml, 20-80 µg/ml and 2-14 µg/ml, respectively with the coefficient of linear regression greater than 0.99 for all markers. Mean percent recoveries for gallic acid, curcumin, and piperine were found within the limit of acceptance (99-100%). The percent relative standard deviation (%RSD) for precision and robustness was found less than 2%, which indicates the method is precise and robust. The developed method applied for quantification of these markers from the marketed ayurvedic formulation of Dekofcyn tablet. Conclusion: The developed method was found to be simple, rapid, precise and reproducible for standardization of Dekofcyn tablet and can be useful for other formulations containing these three markers

    Lattice Energy of Some Organic Molecular Crystals

    Get PDF

    Comparison of DCT, SVD and BFOA based multimodal biometric watermarking systems

    Get PDF
    AbstractDigital image watermarking is a major domain for hiding the biometric information, in which the watermark data are made to be concealed inside a host image imposing imperceptible change in the picture. Due to the advance in digital image watermarking, the majority of research aims to make a reliable improvement in robustness to prevent the attack. The reversible invisible watermarking scheme is used for fingerprint and iris multimodal biometric system. A novel approach is used for fusing different biometric modalities. Individual unique modalities of fingerprint and iris biometric are extracted and fused using different fusion techniques. The performance of different fusion techniques is evaluated and the Discrete Wavelet Transform fusion method is identified as the best. Then the best fused biometric template is watermarked into a cover image. The various watermarking techniques such as the Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD) and Bacterial Foraging Optimization Algorithm (BFOA) are implemented to the fused biometric feature image. Performance of watermarking systems is compared using different metrics. It is found that the watermarked images are found robust over different attacks and they are able to reverse the biometric template for Bacterial Foraging Optimization Algorithm (BFOA) watermarking technique

    Business intelligence analytics using sentiment analysis-a survey

    Get PDF
    Sentiment analysis (SA) is the study and analysis of sentiments, appraisals and impressions by people about entities, person, happening, topics and services. SA uses text analysis techniques and natural language processing methods to locate and extract information from big data. As most of the people are networked themselves through social websites, they use to express their sentiments through these websites.These sentiments are proved fruitful to an individual, business, government for making decisions. The impressions posted on different available sources are being used by organization to know the market mood about the services they are providing. Analyzing huge moods expressed with different features, style have raised challenge for users. This paper focuses on understanding the fundamentals of sentiment analysis, the techniques used for sentiment extraction and analysis. These techniques are then compared for accuracy, advantages and limitations. Based on the accuracy for expexted approach, we may use the suitable technique

    Real Time Monitoring and Neuro-Fuzzy Based Fault Diagnosis of Flow Process in Hybrid System

    Get PDF
    Process variables vary with time in certain applications. Monitoring systems let us avoid severe economic losses resulting from unexpected electric system failures by improving the system reliability and maintainability The installation and maintenance of such monitoring systems is easy when it is implemented using wireless techniques. ZigBee protocol, that is a wireless technology developed as open global standard to address the low-cost, low-power wireless sensor networks. The goal is to monitor the parameters and to classify the parameters in normal and abnormal conditions to detect fault in the process as early as possible by using artificial intelligent techniques. A key issue is to prevent local faults to be developed into system failures that may cause safety hazards, stop temporarily the production and possible detrimental environment impact. Several techniques are being investigated as an extension to the traditional fault detection and diagnosis. Computational intelligence techniques are being investigated as an extension to the traditional fault detection and diagnosis methods. This paper proposes ANFIS (Adaptive Neural Fuzzy Inference System) for fault detection and diagnosis. In ANFIS, the fuzzy logic will create the rules and membership functions whereas the neural network trains the membership function to get the best output. The output of ANFIS is compared with Back Propagation Algorithm (BPN) algorithm of neural network. The training and testing data required to develop the ANFIS model were generated at different operating conditions by running the process and by creating various faults in real time in a laboratory experimental model

    A SURVEY OF PROACTIVE AND REACTIVE PROTOCOLS IN MOBILE AD HOC NETWORKS

    Get PDF
    Mobile Ad Hoc Network (MANET) is one of wireless communication with a collection of more than one device or nodes or terminals which contain network capability that communicate with each other. A Mobile ad-hoc network is set of different types of movable nodes and consists of mobile platforms which are free to move randomly. MANET can be deployed at low cost in variety of application and it contains different types of routing protocols which are classified under the category of proactive (Table driven Protocols) and reactive protocols (on-demand). Nodes can directly communicate to all other nodes within the broadcast communication. If node could not have direct communication then they can act as intermediate node to communicate with other nodes. This paper focus on the survey of proactive and reactive routing protocols namely DSDVR, CGSR, GSR, WRP and DSR, AODV, TORA respectively
    corecore