559 research outputs found

    A Novel Technique to Pre-Process Web Log Data Using SQL Server Management Studio

    Full text link
    Web log data available at server side helps in identifying user access pattern. Analysis of Web log data poses challenges as it consists of plentiful information of a Web page. Log file contains information about User name, IP address, Access Request, Number of Bytes Transferred, Result Status, Uniform Resource Locator (URL), User Agent and Time stamp. Analysing the log file gives clear idea about the user. Data Pre-Processing is an important step in mining process. Web log data contains irrelevant data so it has to be Pre-Processed. If the collected Web log data is Pre-Processed, then it becomes easy to find the desire information about visitors and also retrieve other information from Web log data. This paper proposes a novel technique to Pre-Process the Web log data and given detailed discussion about the content of Web log data. Each Uniform Resource Locator (URL) in the Web log data is parsed into tokens based on the Web structure and then it is implemented using SQL server management studio

    Relevance Of Ancient Indian Methods Of Environmental Protection In The Present Day Scenario

    Get PDF
    “The greatest shortcoming of human race is our inability to understand the exponential function” -Albert.A.Bartlett In a bid to achieve the twin goals of boosting economic growth and ending extreme poverty, nations have exploited the existing resources without understanding the true cost of its depletion. They are confronted with a resource scarcity crisis as they are unable to satisfy the unlimited wants of human beings with the limited resources. Resources have been used, abused and misused over and above their rate of replenishment. At this juncture, it becomes imperative for nations to understand the concept of “Sustainable Development”. Sustainable development refers to development that meets the needs of the present generation without compromising the ability of future generations to meet their own needs. The questions for nations is not “whether” to embrace sustainable development but “how” to embrace it. The answer lies in an older school of thought. In ancient India, the inhabitants of the river Indus(Hindus)followed certain practices that were environment friendly with or without their knowledge. They embraced nature as an integral part of their life. Hindus have long had a palpable and organic connection with nature. In this paper, “Hinduism” is considered as “a way oflife”thatwaspracticedbyourforefathersand not merely as a religion. Ancient Indian texts like Vedas, Puranas and Upanishads clearly describe the eco-friendly attitude of Hindus. Plants and trees are valued so highly in Hindu sacred texts that their destruction is connected with doomsday scenario. For the same reason, almost every temple in South India dedicated to Lord Shiva or Vishnu, or to a manifestation of the goddess, has a “sthalavriksha”, a special tree regarded as sacred to that area. The sthalavriksha symbolizes all trees and reminds pilgrims that all trees are worthy of respect. Similarly, in older days, people revered rivers, mountains, forests and animals. For example, many villages had a sacred lake, and around it a grove of trees to catch rainfall and protect the banks from erosion. The lake and its grove would store rainfall to irrigate surrounding fields and also to provide drinking water to the local community. In recent times, the neglect of these simple techniques for gathering and protecting clean water has led to serious water shortage crisis. These are just few among many traditions followed by our forefathers. The objective of this paper is to study the traditional techniques of environmental protection that were followed in ancient India and to provide suggestions to government entities, NGO’s and International organizations for embracing those techniques for a sustainable future. It is high time to seek lessons from the spiritual heritage of our country as they offer auniquesetofmoralvaluesandcustomsthat serves as a guide in nurturing the relationship between man and nature, thereby, leading to a sustainable future

    Transient behavior of M[x]/G/1 Retrial Queueing Model with Non Persistent Customers, Random break down, Delaying Repair and Bernoulli Vacation

    Get PDF
    In this paper we consider a single server batch arrival non-Markovian retrial queueing model with non persistent customers. In accordance with Poisson process, customers arrive in batches with arrival rate  and are served one by one with first come first served basis. The server is being considered as unreliable that it may encounter break down at any time. In order to resume its service the server has to be sent for repair, but the repair does not start immediately so that there is a waiting time before the repair process. The customer, who finds the server busy upon arrival, can either join the orbit with probability p or he/she can leave the system with probability 1-p. More details can be found in the full paper. Key words: Batch size, break down, delay time, transient solution, steady solution,  reliability indices

    A Fast Object Recognition Using Edge Texture Analysis for Image Retrieval

    Full text link
    A Robust Object Recognition for Content Based Image Retrieval (CBIR) based on Discriminative Robust Local Binary Pattern (DRLBP) and Local Ternary Pattern (LTP) analysis. The Robust Object Recognition using edge and texture feature extraction. The extension of Local Binary Pattern (LBP) is called DRLBP. The category recognition system will be developed for application to image retrieval. The category recognition is to classify an object into one of several predefined categories. LBP is defined as an ordered set of binary comparisons of pixel intensities between the center pixel and its eight surrounding pixels .DRLBP features identifying the contrast information of image patterns. The proposed features preserve the contrast information of image patterns. The DRLBP discriminates an object like the object surface texture and the object shape formed by its boundary

    A DWT-BCH code based Video Steganography by employing Variable bit length Algorithm

    Full text link
    Due to the high speed of Internet we can easily transfer video data over the Internet, but people are worried about their data being hacked by unauthorized users. Inside the host medium (text, audio, image and video) we can embed the secret message in Steganography. Video Steganography is a significant method for data hiding. In this work, a variable bit length Video Steganography algorithm is proposed. To immune the secret data, it is first encoded using BCH codes, where the message bits of length k will be converted to a codeword of length n. Depending on the wavelet coefficient values of DWT(Discrete wavelet transform), secret data are embedded into the middle and high frequencies. The results demonstrate better results than in [1]

    Innate Immunity of Airway Epithelium and COPD

    Get PDF

    Adaptive Learning Based Whale Optimization and Convolutional Neural Network Algorithm for Distributed Denial of Service Attack Detection in Software Defined Network Environment

    Get PDF
    SDNs (Software Defined Networks) have emerged as a game-changing network concept. It can fulfill the ever-increasing needs of future networks and is increasingly being employed in data centres and operator networks. It does, however, confront certain fundamental security concerns, such as DDoS (Distributed Denial of Service) assaults. To address the aforementioned concerns, the ALWO+CNN method, which combines ALWOs (Adaptive Learning based Whale Optimizations) with CNNs (Convolution Neural Networks), is suggested in this paper. Initially, preprocessing is performed using the KMC (K-Means Clustering) algorithm, which is used to significantly reduce noise data. The preprocessed data is then used in the feature selection process, which is carried out by ALWOs. Its purpose is to pick out important and superfluous characteristics from the dataset. It enhances DDoS classification accuracy by using the best algorithms.  The selected characteristics are then used in the classification step, where CNNs are used to identify and categorize DDoS assaults efficiently. Finally, the ALWO+CNN algorithm is used to leverage the rate and asymmetry properties of the flows in order to detect suspicious flows specified by the detection trigger mechanism. The controller will next take the necessary steps to defend against DDoS assaults. The ALWO+CNN algorithm greatly improves detection accuracy and efficiency, as well as preventing DDoS assaults on SDNs. Based on the experimental results, it was determined that the suggested ALWO+CNN method outperforms current algorithms in terms of better accuracies, precisions, recalls, f-measures, and computational complexities

    Image processing techniques for Lung Cancer Detection

    Get PDF
    Lung cancer is one of the dangerous disease which causes cancer deaths in the world. A cancer is an abnormal growth of cells that can be typically derived from a single abnormal cell. Cancerous cells can increase and affect whole part of the lungs. So, it is important to find cancerous cells at the earlier stage and take necessary steps to cure. Now-a-days Magnetic Resonance Imaging and computed tomography (CT) are finding the application computer aided diagnosis and treatment planning. In this paper we use CT scan images. A Computed Tomography(CT) scan of the lung nodule is one of the sensitive method for detecting lung cancer. In this paper proposed different automated nodule recognition systems using image segmentation, feature extraction and processing

    Analysis of Verb Expressions in the Conversational Speech of Kannada-English Speaking Bilingual Persons with Mild Dementia

    Get PDF
    Dementia is characterized by the breakdown of intellectual and communicative functioning accompanied by personality change (DSM IV, American Psychiatric Association, 1994). Persons with dementia often experience difficulty in naming skills which can be attributed to semantic memory deficits. This can further influence various linguistic expressions such as lexical and morphological structures. The present study aimed to quantitatively and qualitatively analyze the presence of different types of verb inflections in bilingual (Kannada-English) persons with mild dementia. Considered for the study were 10 healthy elderly and 10 persons with mild dementia who were Kannada-English bilinguals. Spontaneous, conversational speech in all the participants was transcribed from which different types of verb inflexions in Kannada were extracted and analyzed. They included infinite verb, imperative verbs, negative imperatives, optative, and participle verbs. These were quantitatively and qualitatively analyzed for mean number of verbs and their nature including code mixing and switching identifying the significant differences between the two groups of participants. Results suggest that these measures offer a sensitive method for differentiating persons with mild dementia from healthy elderly. The study further helps in delineating prognostic indicator and planning rehabilitative measures which can be helpful tool for management

    Major Ion Chemistry and Groundwater Quality Evaluation for Irrigation

    Get PDF
    Hydrogeochemical characteristics of Groundwater analyzed in the study area of Coimbatore district by collecting 60 samples from agricultural belt. Groundwater quality for irrigation is determined by several key factors like pH, Electrical conductivity (EC), Total suspended solids (TDS). The cations such as Sodium (Na+), Potassium (K+), Calcium (Ca2+), Magnesium (Mg2+ ) and anions are Hydrocarbon (HCO3), Carbonate (CO3 -), Chlorides (Cl-)and Sulphates (SO4 2-) are tested. The irrigation water quality parameters such as Residual Sodium Carbonate (RSC), Sodium Absorption Ratio (SAR), Chloro Alkali Indices (CA I & CAII), Kelley’s Ratio (KR), Magnesium Hazard (MH), Percent sodium (%Na) and Permeability Index (PI), Soluble sodium Percent (SSP) are computed from the key factors, anions and cations. From the USSL Diagram the samples fall in C2S1, C3S1, C4S1 range. Salinity hazard is too elevated in the study area, all the samples are categorized under high to very high with the values greater than 750 μS/cm. Total dissolved solid in the study area indicated that only 2 locations are unfit for irrigation. SAR and % Na shows that there is no hazard related to irrigation watering. Magnesium hazard in the groundwater is high and indicates 51 sample out of 60 is unsuitable for irrigation. From the study it indicates the groundwater is contaminated with salt content and in most of the area it can be used for irrigation. Keywords: Groundwater, Irrigation water quality, Salinity hazard, Kelley’s ratio, Magnesium hazar
    • …
    corecore