403 research outputs found

    Diagnosis and Prognosis of Breast Cancer Using Multi Classification Algorithm

    Get PDF
    Data mining is the process of analysing data from different views points and condensing it into useful information. There are several types of algorithms in data mining such as Classification algorithms, Regression,Segmentation algorithms, Association algorithms, Sequence analysis algorithms, etc.,. The classification algorithm can be usedto bifurcate the data set from the given data set and foretell one or more discrete variables, based on the other attributes in the dataset. The ID3 (Iterative Dichotomiser 3) algorithm is an original data set S as the root node. An unutilised attribute of the data set S calculates the entropy H(S) (or Information gain IG (A)) of the attribute. Upon its selection, the attribute should have the smallest entropy (or largest information gain) value. A genetic algorithm (GA) is aheuristic quest that imitates the process of natural selection. Genetic algorithm can easily select cancer data set, from the given data set using GA operators, such as mutation, selection, and crossover. A method existed earlier (KNN+GA) was not successful for breast cancer and primary tumor. Our method of creating new algorithm GA+ID3 easily identifies breast cancer data set from the given data set. The multi classification algorithm diagnosis and prognosis of breast cancer data set is identified by this paper

    The Intrinsic Structure of Nuclear Chemistry: A Scientometric Study

    Get PDF
    : In the last two decades, the research in nuclear chemistry has experienced a regular as well as voluminous structural changes and has grown notably with interaction from other fields in terms of theory building, methodology, and applications. This study focus a quantitative assessment of the scientific literature for mapping the intellectual structure of nuclear chemistry research and its scientific development over a 11-year period from 2008 till 2018. A total of 109281 publications were subjected to examination in order to draw statistics and depict dynamic changes to shed new light upon the growth, dispersion and structure of the studied domain. In general this work characterizes the papers, in terms of growth, institution, document type, prominent authors and institutions, and geographical distributio

    Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring

    Get PDF
    This paper introduces the Structural health monitoring (SHM) using Mobile Access Coordinated Wireless Sensor Network (MA-WSN) energy - efficient scheme for time sensitive applications. In Sensor Networks with Mobile Access points (SENMA), the mobile access points (MAs) traverse the network to collect information directly from each sensor. To organize disjoint nodes forming into small groups in high energy level, sensors are used in clustering methods, where each cluster has a coordinator referred as Cluster Head (CH). Early detection of failure CHs will reduce the data loss and provide possible minimal recovery efforts. Failure CHs are unable to connect to automatically organized another cluster head of access node and this access node collect and transfer data directly. So a new technique has been proposed in this paper which improves the life time of sensor nodes or it minimizes the maximum energy used by the sensor for transmitting data to the base station and also ensures monitoring quality. The performance of the proposed placement method has been tested by NS2 simulations and the result is compared with the sensor placement using effective independence method. This method obtains almost the same placement quality as that provided by using effective independence method, but with improvement in system life time

    A DWT-BCH code based Video Steganography by employing Variable bit length Algorithm

    Full text link
    Due to the high speed of Internet we can easily transfer video data over the Internet, but people are worried about their data being hacked by unauthorized users. Inside the host medium (text, audio, image and video) we can embed the secret message in Steganography. Video Steganography is a significant method for data hiding. In this work, a variable bit length Video Steganography algorithm is proposed. To immune the secret data, it is first encoded using BCH codes, where the message bits of length k will be converted to a codeword of length n. Depending on the wavelet coefficient values of DWT(Discrete wavelet transform), secret data are embedded into the middle and high frequencies. The results demonstrate better results than in [1]

    A CROSS-SECTIONAL STUDY EVALUATING THE KNOWLEDGE, ATTITUDE OF UNDERGRADUATE MEDICAL STUDENTS ABOUT PHARMACOVIGILANCE AND ADVERSE DRUG REACTION REPORTING AT A MEDICAL COLLEGE IN HYDERABAD

    Get PDF
    Objectives: Objectives of the study were (1) to evaluate the knowledge about pharmacovigilance and (2) to assess the attitude toward adverse drug reaction (ADR) reporting among undergraduate medical students.Methods: It is a cross-sectional, questionnaire-based study conducted in the Department of Pharmacology, Malla Reddy Medical College for Women, Hyderabad, Telangana, among fifth term Bachelor of Medicine, Bachelor of Surgery students (136). The questionnaire consisted of 16 questions dealing with knowledge, awareness, attitude about pharmacovigilance and ADR reporting. Data were analyzed and presented as percentage among respondents.Results: About 58.8% of students could not identify the proper definition of pharmacovigilance and 84.5% of undergraduates have not seen ADR form. It was agreed among 42.6% of students that ADR reporting is a professional obligation to them and 47.7% agreed that establishing ADR monitoring center in every hospital is compulsory.Conclusions: Our study revealed that though the attitude toward pharmacovigilance was appreciable among the medical students; there lies an insufficient knowledge and awareness about pharmacovigilance. Continued medical education programs and workshops may be helpful in the future to increase awareness and consequently to improve the rate of spontaneous ADR reporting among these upcoming doctors

    Knowledge and attitude among students towards HIV/AIDS patients at a dental college, Suraram, India

    Get PDF
    Background: Clinical training is a part of curriculum for the dental students. They are trained in dental procedures, where there is a chance of exposure to HIV infection. Hence this study was conducted with an objective to assess their knowledge, attitude to treat these patients.Methods: An institutional based study was carried out among 145 dental students at Malla Reddy Dental College for Women. A questionnaire with 29 questions on knowledge, attitude and willing to treat the HIV/AIDS patients which was already used in other study was adapted. Primary outcome- knowledge and attitude was measured in percentages, proportions using SPSS version 20 and Chi-square.Results: Total subjects who had good knowledge were 71 (48.9%) and 137(94.5%) viewed needle stick injury can transmit HIV virus. 138 (98.1%) agreed that it is their moral responsibility to treat HIV/AIDS patients and risk of HIV transmission is high, hence special precautions have to be followed to treat them. Positive attitude towards HIV/AIDS patients was reported among 129(89%) of students. Chi square test showed an association between knowledge and attitude among study subjects which was statistically significant at p <0.05 level.Conclusions: Active student’s collaboration for treatment compliance of HIV/AIDS patients should be directed towards comprehensive training in the dental colleges which forms a basis for provision of appropriate, optimal dental care improving oral health related quality of life in people living with HIV

    Intelligent Inter and Intra Network Traffic Estimation Technique for DDoS Attack Detection using Fuzzy Rule Sets for QoS Improvement

    Get PDF
    The quality of service of any network has higher dependency at throughput, latency and service completion strategies. In modern communication systems, there are many loopholes, which could be used by some malicious users to perform various network attacks so that the performance of the network is degraded. There are many denial of service when an approach has been discussed towards the problem of network threats, but still suffers the quality of denial of service attack detection. Propose a service-constrained approach learns the network traffic in various ways like the traffic incurred within the network and that comes from external network. The method uses various features like hop count, hop details, payload, TTl, time and so on. To maintain a rule set with fuzzy value where each rule specifies the feature of genuine packet being received. The incoming packet has to meet any of the rules and the attribute of the packet has to lie between the ranges of values in the rule. The proposed method estimates the inter traffic and intra traffic through the routes of the packet being transferred to identify the genuine nature of the packet being received. In addition, the method maintains set of logs where the packet features are stored to compute the legitimate weight of each packet being received. Based on compute inter and intra traffic values the received packets trustworthy is computed to allow or deny the packet. The proposed method increases the accuracy of DDOS attack detection and helps to improve the performance of the network. DOI: 10.17762/ijritcc2321-8169.15085

    Management of cervical heterotopic pregnancy with inevitable miscarriage

    Get PDF
    The objective is to report a case of successful treatment of heterotopic cervical pregnancy resulting from IVF–ICSI conception. Case report from Amrita Institute of Medical sciences: a tertiary care referral hospital. A 47-year-old Primigravida, diagnosed with heterotopic cervical pregnancy at 6 weeks of gestation, presented with significant first trimester vaginal bleeding. Under IV sedation, Transvaginal ligation of descending cervical branches of the uterine arteries arrested the bleeding. The cervical pregnancy was successfully aborted with minimal bleeding and the intrauterine pregnancy was successfully maintained till 32 weeks, after which she required emergency preterm LSCS in view of Severe preeclampsia superimposed on chronic hypertension a non-reassuring non-stress test (NST). The intervention applied maybe used in treatment of heterotopic cervical pregnancy in a low resource setting to control the bleeding

    Effect of Acupressure and Changes in Heart Rate Variability in Dysmenorrhoea

    Get PDF
    Dysmenorrhoea is a common distressing disorder in women that manifests during menstrual phase especially in young females. The subjects suffering from pain during mensuration are considered to be dysmenorrhoeic. In our studies we have used heart rate variability (HRV) as a sensitive marker of autonomic activity.Autonomic nervous system activity was assessed by means of heart-rate variability (HRV) power spectral analysis during supine rest. The purpose of this study was to assess the changes in heart rate variability in dysmenorrhoea by assessing sympathetic activity and parasympathetic activity and to find out the effect of acupressure therapy whether it is beneficial or not in alleviating the symptoms of dysmenorrhoea. HRV and intensity of pain was assessed before and after acupressure therapy in dysmenorrhoea. Pain intensity was graded using Visual analogue scale. We have noted a significant alteration in autonomic function which may be an important component of premenstrual syndrome (PMS). Acupressure therapy has been effective in regulating the autonomic alterations. Acupressure therapy is an ancient Oriental healing method that applies pressure through a blunt probe to specific points on the skin surface which helps to prevent and treat illness. Acupressure therapy has also significantly reduced the dysmenorrhoeic pain as observed from our visual analogue scores. Our study has clearly revealed the beneficial effect acupressure on dysmenorrhea. It is a very simple procedure that can easily be taught to be self practiced by the dsymenorrhoeic females to relieve the pain during mensuration. It will be a simple drugless inexpensive method to relieve the pain without any side effects

    A Comparison of Corrosion Behavior of Copper and Its Alloy in Pongamia pinnata Oil at Different Conditions

    Get PDF
    Vegetable oils are promising substitutes for petrodiesel as they can be produced from numerous oil seed crops that can be cultivated anywhere and have high energy contents, exhibiting clean combustion behavior with zero CO2 emission and negligible SO2 generation. The impact of biofuel on the corrosion of various industrial metals is a challenge for using biofuel as automotive fuel. Fuel comes in contact with a wide variety of metallic materials under different temperatures, velocities, and loads thereby causing corrosion during storage and flow of fuel. Hence, the present investigation compares the corrosion rates of copper and brass in Pongamia pinnata oil (O100), 3% NaCl, and oil blend with NaCl (O99) obtained by static immersion test and using rotating cage. The corrosivity and conductivity of the test media are positively correlated. This study suggested that the corrosivity of copper is higher than brass in Pongamia pinnata oil (PO)
    • …
    corecore