博電競菠菜平臺 www.rrkuhedt.buzz Bolanle A. Ojokoh*, Olumide S. Adewale and Samuel O. Falaki

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Hidden Markov Models (HMMs) have been shown to achieve good performance when applied to information extraction tasks. This paper describes the training aspect of exploring HMMs for the task of metadata extraction from tagged bibliographic references. The main contribution of this work is the improvement of the technique proposed by earlier researchers for smoothing emission probabilities in order to avoid the occurrence of zero values. The results show the effectiveness of the proposed method.

Hide Abstract

Views 
   PDF Download PDF Downloads: 539



Iran Sheikhshoaie* and Ahmad Kamali

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Disulphide derivatives of imine compounds have the subject of intensive investigation over the past years, reflecting that they are excellent ligands for coordination to the metal ions. The disulphide group is well recognized as a potential binding site for metal ions in biological systems. In our present works we prepared two symmetrical Schiff base compounds N,N/-bis (2-hydroxy-3-methoxybenzylidene)-2,2/-(aminophenylthio) ethane [L1] and N,N/-bis (2-hydroxybenzylidene)-2,2/-(aminophenylthio) ethane [L2] by condensation of bis-(2-aminophenyl) disulphide with salen derivatives in absolute ethanol at room temperature. The structures of prepared compounds were checked by several spectroscopic methods. In the other part of this work the structure of these compounds have been optimized in gas phase and all quantum chemical parameters of the optimized L1 and L2 compounds have been discussed by some semi-empirical methods.

Hide Abstract

Views 
   PDF Download PDF Downloads: 401



B. A. Ojokoh1*, O. S. Adeola1 and D. M. Okewole2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The benefits accrued from the advent of the Internet especially in developing countries can not be overemphasized. At the click of a button on a desktop, Internet users can have access to vast information that covers almost all areas of human endeavors. This has made Internet the greatest achievement of the century. Research in the past for all levels of Nigerian researchers used to be tedious and done under stress. Most times, there used to be inadequate information that is required to produce qualitative and timely output. This could result in substandard research output. Additionally, oftentimes research persons failed to meet up with set deadlines. These days, researchers have experienced tremendous improvement in access to vast amount of data and information required to produce competitive research result. There is the need to evaluate the depth of the impact of Internet on research, hence a kind of research like this. The research was carried out with the use of questionnaires administered to some higher institutions in Nigeria and the views of various levels of researchers were analyzed based on a number of factors. From the study, confirmation was made of the positive impact of Internet on research and recommendations were made based on the factors identified to be hindering the maximal utilization of the Internet for research in the Nigerian situation.

Hide Abstract

Views 
   PDF Download PDF Downloads: 405



Ali Akbar Mottahedi

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Rolling is an important process in metal forming because of high productivity and production tonnage of wrought metals. Hence, any interruption in rolling line or wastage has large costs. So, technological research or any change in rolling process is difficult along with a high risk of cost in industrial scale. Thus, rolling simulation by computer and using of software could make rolling research easy. Analysis of pressure profile on rolls and maximum rolling pressure in flat rolling process is very important in metal forming investigations. It is also significant in controlling of force, power, rolls, rolling process and so on. The author of this paper had a project in the field of computer simulation of flat rolling by making software. This paper is about to show the simulation of flat rolling process by using of that software and experimental industrial experience. Analysis of the rolling pressure profile and maximum rolling pressure is also shown for an Aluminum alloy in this software.

Hide Abstract

Views 
   PDF Download PDF Downloads: 433



B. Vijaya Babu1, M. Surendra Prasad Babu2 and Y. Chetan Prasad.3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Broad web search engines as well as many more specialized search tools rely on web crawlers to acquire large collections of pages for indexing and analysis. Such a web crawler may interact with millions of hosts over a period of weeks or months, and thus issues of robustness, flexibility, and manageability are of major importance. In addition, I/O performance, network resources, and OS limits must be taken into account in order to achieve high performance at a reasonable cost. Current-day crawlers retrieve content only from the publicly indexable Web, i.e., the set of web pages reachable purely by following hypertext links, ignoring search forms and pages that require authorization or prior registration. In particular, they ignore the tremendous amount of high quality content “hidden” behind search forms, in large searchable electronic databases. Also even if there is good data collection that has been indexed we would be able to look at those sites having these info only if we are connected to the internet and may be the days where hourly based nets used to be major providers of internet are gone, these days the broadband facilities, high speed net connections are available to the common man. But, the growth in the usage of laptops is even growing at same pace, in that case one may not be able to access the net where ever he moves and if any important pages on the net in a particular web site would be of no use even he has good configuration, as still it takes time for the wi-fi networks to come in to full swing, until then saving every page of a particular website may be a hectic task. In this paper, would provide a framework for addressing the problem of browsing the web even when offline.

?

Hide Abstract

Views 
   PDF Download PDF Downloads: 634



G. Vijay Kumar and M. Sreedevi

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The paper presents the data warehousing architecture and practices used at a major. Retailing company. Many considerations were assessed when deciding which data warehousing architecture to adopt. The paper discusses the two pre-dominant styles in data warehousing, namely the “Bill Inmon Style” or the top-down approach and the “Ralph Kimball Style” or the bottom-up approach. The com-pany chose the Inman style due to a unique combination of circumstances in their business and technical environments, which are being discussed in detail. Much of the information presented in this paper is based upon the direct experiences of the lead data architect assigned to the projects under which this retailing company’s customer data warehouse evolved. The architecture has evolved over time and currently has been accepted at the company as a best practice. It is interesting to mention that both the hardware platform (CPU and disk drives) and Relational Database Management System (RDBMS) soft-ware employed today at this company for data ware-housing is not the same as was selected for the first instantiation. The implication was that the best plan or practice was a flexible one. There were many challenges, like organizational, technical, data sourcing and data naming, needed to be solved during the pre-project, initial stages, and throughout the project and beyond. The initial data warehouse, implemented in 1996, was termed an overall success and approved for expansion. The current data warehouse data are being used by over six hundred registered users to fine-tune customer marketing and leverage and share data in an enterprise manner. The data warehouse has allowed the company to strengthen customer relation-ship management (CRM) core capabilities and business partnerships. Today, there are many departments benefiting from queries and requests for data warehouse data, many anticipated, some not.

?

Hide Abstract

Views 
   PDF Download PDF Downloads: 423



B. Vijaya Babu1, M. Surendra Prasad Babu and P. Sunitha

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Revolutionary changes took place in the modern communication world. Mobiles and internet have changed the way people communicate with each other. Nowadays every busy person has many devices for communicating with others such as a mobile phone, a telephone and a PC at his home, a telephone and a PC at his office etc. People call using a telephone or PC to communicate with that particular user according to their convenience (using the device which is along with them). But the user may not be present at that particular device. Hence the user may have to loose some calls. Those calls may be very important or urgent calls. This paper ICR aims to solve the above problem. In order to avoid this problem we should route the call to the current user location irrespective of the device used by the other user. We check the current location of the user and route the call to that location. For this we maintain a schedule for every user in the database provided in the server of the service provider. Whenever call comes to a particular user it checks the schedule of that user, finds his location and routes the call to that location. Hence this application can also be called as Schedule Based Calling. For implementation of this application we require a protocol which works for all the devices in order to create a session between any two different devices. Hence we use Session Initiation Protocol (SIP). Session Initiation Protocol is an application layer control signaling protocol used to create (initiate), modify and terminate sessions. Session represents the type of data transfer between two devices such as audio, video etc. SIP only initiates, modifies and terminates sessions. It does not provide any information about data transfer. Data transfer is done using other protocols such as RTP, RTSP etc. type of session is defined by Session Description Protocol (SDP).

Hide Abstract

Views 
   PDF Download PDF Downloads: 386



Vaishali Mishra1, Suhas Patil2 and Ashutosh Mishra3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The introduction of personal computing and wireless communication technology provides an option for on site device software updating and data retrieving. This is especially true for any devices sitting in a remote site where computing network is not accessible. In many advanced computing systems, frequent software updating and configuration profiles refreshing are required. This is clumsy and error prone procedures when users are not familiar with the operating systems. Suppose all the necessary files and programs are predefined in a mobile phone. All necessary files and software can be transferred to the corresponding computing devices and PCs at remote sites through wireless communication links such as Bluetooth/infrared. This idea helps to solve the initial installation cost of a communication network to a remote site. Index Terms - Bluetooth, mobile communication.

?

Hide Abstract

Views 
   PDF Download PDF Downloads: 398



S. Djodilatchoumy1, N. Rama2 and S. Gunasekaran3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Elevated lipid level is supposed to be one of the main risk factors for cardiovascular diseases. Therefore lipid lowering is one of the major target in cardiovascular treatment and prevention. Hence hyperlipidemic blood has to be identified and lipid level has to be lowered. Atorvastatin and simvastatin are the lipid lowering agents, they lower the low density cholesterol. For the characterization of hyperlipidemic blood, the FTIR spectra of blood sera of 20 healthy people and 20 hyperlipidemic patients of the same age group were recorded and fed as input to our system.To study the efficacy of statins, the FTIR spectral data of blood sera of the 20 hyperlipidemic patients of the same age group and blood group were recorded and fed as input to our system. Our system is trained to distinguish between the healthy and hyperlipidemic blood. Some remarkable differences are identified by our system. Both the statins were well tolerated and it is concluded from the results that Atorvastatin is more efficacious than simvastatin in modifying lipids in patients with hyperlipidemia and a high coronary heart disease risk. FTIR spectroscopy allows accurate lipids concentration determination. The results obtained from our System are well supported by both spectroscopic data and clinical data. Since our system is trained to distinguish the hyperlipidemic blood with the fine details of FTIR spectra, it can improve the diagnostic accuracy and rate of cardiovascular treatment and also it can analyze the efficacy of statins at a faster rate with more accuracy.

Hide Abstract

Views 
   PDF Download PDF Downloads: 363



B. Vijaya Babu1, M. Surendra Prasad Babu2 and P. Sunitha3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Ambient Intelligence devices are developed from Ubiquitous computing and communications and Intelligent User –friendly Interfaces. Ambient Intelligence refers to electronic environments that are sensitive and responsive to the presence of people. These devices provide vocal interaction with users but serve only a single-user Environment. H. 323 is a standard that specify many components, protocols and procedures that serve establishing multi-user communication. In our research, we embedded supportive H. 323 components to those of ambient device architecture and proposed a new architecture that supports multi-user communication environment through Ambient Intelligent devices. We threw light on advantages of using H.323 over other protocols.

Hide Abstract

Views 
   PDF Download PDF Downloads: 368



Mandava V. Basaveswara Rao and Ch. Naga Manisha

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Main aim of network securities is to maintain confidentiality for the user sensitive data. For this purpose, there are lot many Network Security utilities are available in the market for securing the user data. But no utility is proved perfect for securing the system. Because threats are either by wrongly motivated human activities or highly powerful threats introduced at any moment. Every moment threats greatly challenges the systems.

Hide Abstract

Views 
   PDF Download PDF Downloads: 377