3 research outputs found

    Knowledge of children regarding oral hygiene: A school based descriptive study

    Get PDF
    Abstract Oral health is an integral component of general health. Therefore, the mouth has to be kept clean and healthy. School age is a period of overall development. During this period the child learns to become productive members of the peer group. If proper oral hygiene habits are cultivated during this period, habits will go a long way in maintaining the oral health of a child throughout the life. The present study conducted to assess the knowledge regarding oral hygiene among the school children in selected schools in Mangalore. The sample size was 100 school children. The samples were selected by non-probability convenience sampling technique. The tool used was demographic pro forma and structured knowledge questionnaire. The result showed that the mean and standard deviation of pre-test knowledge score of school children were (69.62% ±3.070). The study found that there was no significant association between the levels of knowledge with selected demographic variables. Hence the null hypothesis were accepted

    Detection of Spammer Based On the User Recommendation Report in Web Mining

    Get PDF
    ABSTRACT: Online video sharing systems, out of that YouTube is that the most well-liked, offer options that permit users to post a video as a response to a discussion topic. These options open opportunities for users to introduce impure content, or just pollution, into the system. Therefore we discover for example, spammers could post associate unrelated video as response to a well-liked one, aiming at increasing the chance of the response being viewed by a bigger range of users. We have a tendency to propose the users Video Recommendation (UVR) system in cloud computing atmosphere. Video attributes capture specific properties of the videos uploaded by the supplier We employing a novel rule to as ALAC (active lazy associative classifier).Content pollution could jeopardize the trust of users on the system we offer a characterization of content, individual, and social attributes that facilitate distinguish every user category. Classification approach succeeds at separating spammers and promoters video search systems is fooled by malicious attacks that depends on a good selective sampling strategy to traumatize the foremost favorite Videos. This work provides a high flexibility, high reliability, low-level transparency, security features. Proposed tag cloud recommendation approaches

    A Survey on Administrative Policies in Rule- Based Access Control

    No full text
    Abstract: Administrative controls contains the official written policies, rules, events and standards. It form the outline for running the organization and handling people. The Rule-Based access control defines detailed circumstances for access to a demanded object. It uses an elementary user-naming syntax, thus can interoperate with maximum certification methods. In the previous work tabling is used to compute the atoms derivable from the transformed policy which leads to abductive atom-reachability problem, there is no easing on use of wildcard and negation, there is only accumulation and removal of facts, not rules. Our projected work uses penetrating, talented state-space exploration, which covers over all static and dynamic information in all states. In this paper we compare the existing administrative polices in rule based access control methodologies with the proposed methodology. Keywords: Rule-Based Access Control, State-Space, Abductive, State-Space, Tabling I.INTRODUCTION The complex security policies needed by applications in large organizations are more brief and easier to administer when stated in higher-level policy languages. Recently, frameworks with rule-based policy languages, which deliver stretchy support for high level attribute-based policies, have attracted considerable attention. Rules based Access control is a strategy for managing user access to one or more systems, somewhere professional changes prompt the application rules, which specify access changes. In large administrations, access control policies are managed by numerous users (administrators). An administrative framework is used to express policies that require how each user may change the access control policy. For example, several administrative frameworks have been projected for role-based access control (RBAC) [1], starting with the classic ABAC97 model Administrative policy study supports by responding questions such as user-permission reachability, which asks whether identified users can together change the policy in a way that attains a stated goal, namely, granting a detailed permission to a specified user. Numerous analysis algorithms for user-permission reachability for ARBAC97 and alternatives thereof have been developed. There is work on administrative frameworks for rulebased access control and analysis algorithms for such frameworks [3], [4]
    corecore