博電競菠菜平臺 www.rrkuhedt.buzz B.O. Ojeme1 and Akazue Maureen2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Background: The world is at a crucial point in its development of effective strategies on the prevention, care and control of HIV/AIDS at the national and provincial levels. Given the necessary resources and expertise, it may be possible to keep the epidemic at bay in most parts of the World, and to considerably reduce the negative impacts of the disease on individuals and society. Early detection of HIV has the potential to reduce mortality and morbidity. There are many diagnostic technologies and tests to diagnose HIV. However many of these tests are extremely complex and subjective and depend heavily on the experience of the clinician. Aims:This paper made significant contribution to the ongoing worldwide research on the lasting solution to this enemy of man-HIV. Methods: It uses a synergistic combination of neural network (NN) and fuzzy inference systems (Neuro-Fuzzy) to generate a model for the detection of the risk level of patients with HIV. Results: The user friendliness and accuracy rate of HIV diagnosis using neuro-fuzzy system makes its output an interesting one. Conclusion: using neuro-fuzzy system is one of the best ways to deal with the vagueness and imprecision of data in the health care sector, and no doubt will exploit tolerance for imprecision, uncertainty and partial truth to achieve tractability, robustness, low solution cost and better report with reality in medical diagnosis.

Hide Abstract

Views 
  



S. P. Sajjan1, Ravi kumar Roogi1, Vijay kumar Badiger1, Sharanu Amaragatti2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This paper introduces a well known NP- Complete problem called the Knapsack Problem, presents several algorithms for solving it, and compares their performance. The reason is that it appears in many real domains with practical importance. Although it’s NP-Completeness, many algorithms have been proposed that exhibit impressive behaviour in the average case. This paper introduce A New approach to solve a Knapsack Problem. An overview of the previous research and the most known algorithms for solving it are presented. The paper concludes with a practical situation where the problem arises.?

Hide Abstract

Views 
  



Sahar A. Kadhom*,? Majid J. Jawad

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links, the union of which forms an arbitrary graph. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may be changed change rapidly and unpredictably. The changing state of the topology makes MANET ideal for emergency and rescue situation.

?Wireless ad-hoc networks will enable emergency services to continuously overview and act upon the actual status of the situation by retrieving and exchanging up-to-date detailed information between the rescue parties. Deployment of high-bandwidth, robust, self-organizing ad-hoc networks will enable quicker response to typical what/where/when questions, than the more vulnerable low-bandwidth communication networks currently in use. This paper addresses two proposal studies for constructing a net emergency system using ad hoc, with perspective, these studies take in consider to minimize the control overhead for route/location discovery by doing selective forwarding where only a few selected nodes in the network do the broadcasting, it is assumed that the mobile nodes can discern their relative positions with respect to other nodes in the range of communication. Using a real urban area being set for the emergency state, NS2 simulator has been used.?

Hide Abstract

Views 
  



Dr. Shobha.D

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Organization are increasingly tuning to data warehouses for decision making.why is it that certain projects fail, while others succed? The aim of this article is to identify the key success factors for data warehouse implimentation, few studies have assessed data warehousing practices in general and critical success factors for implimentation . some have proved guidelines for implimentation but no framework exists which are used to find the success factors. This article provide key success factors for data warehouse implimentation and how best to utilize their limited resource to choose critical succes factors.

Hide Abstract

Views 
  



Akazue Maureen,?Ojeme Blessing,?Daniel Anidibia

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Computers are changing our language, our habits, our environment and generally our world. Solving mathematics is more interesting when it is carried out via a computer. So also is statistics which can be broadly classified into descriptive and inferential classes. Statistical inference varies when a sample data that is a subject of the population is well used to make statements about a population. This research is focused on the development of a software program to solve problems on hypothesis testing of population mean and population variance. It showed that solving statistical inference is easier, interactive and interesting when it’s carried out in a computerized system.

Hide Abstract

Views 
  



Amir S. Almallah?and Jalal H. Awad

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Automatic real time video monitoring and object detection is indeed a challenge since there are many criteria that should be taken In mind in designing and implementing algorithms for this sake. The criteria that should be considered for example are processing speed, scene illumination variation and dynamic outdoor environment. In this study we propose a fast, flexible and immune against illumination variation approach for moving object detection based on the combination of edge segment based background modeling and background subtraction techniques. The first technique is used for building robust and flexible statistical background model, while the other technique is used for the prime detection of moving object to be compared later withthe flexible background. Thus this combination leads to computational reduction due to the second technique, and then flexible matching and precise detection due to the first technique.

Hide Abstract

Views 
  



Avani Patel, Prof. Vikram Agrawal, Prof. Vatsal H. Shah

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Fingerprint recognition is one of the biometric techniques that are used for identification purpose. A number of recognition methods have been used to perform fingerprint matching. The Straightforward matching between the fingerprint pattern to be identified and many already known patterns would not serve well due to its high sensitivity to errors. This paper presents a combination of pattern based and minutiae based method. Here first core point, delta points and minutiae features are found and based on that matching is to be done. Here poor quality of fingerprint images are also enhanced using wiener low pass filter.

Hide Abstract

Views 
  



Dinesh Agrawal1,?Mahendra Kumar Malviya2,?Vibha Agrawal3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Thehydro cyclone is an important and popular industrial apparatus to separate by centrifugal action disperse solid particles from a liquid suspension fed to it. It has been widely used in industry, particularly in the mineral and chemical processing industry because of its simplicity in design and operation, high capacity, low maintenance and operating cost as well as its small physical size. In general how a hydro cyclone works is included, providing a background to discuss a process and hydro cyclone geometry variables. The CFD technique popularly in process design and predicting equipment performance of hydro cyclone under a wide range of geometric and operating condition by using ANSYS.CFX; it also offers an effective way of design and modeling of hydro cyclone.

Hide Abstract

Views 
  



Amir S. Almallah1,? Wael Hussein Zayer2 and Nora Omran Alkaam3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

A variety of researches Dealt with the iris identification in different ways and Showed different results. A new system for personal identification based on iris patterns is presented in this paper .We propose to use two activation function wavelet neural network for feature extraction and identification? process after segments the image into 32 blocks with (128*128) dimension. The proposed? method in this paper involves three steps. First reduced? image size using wavelet packet 1-level decomposition , second? feature extraction using two activation ?function wavelet neural network and finally identification using trained data and correlation .

Hide Abstract

Views 
  



Ojeme Blessing Onuwa

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Malaria remains one of the world’s most deadly infectious diseases and arguably, the greatest menace to modern society in terms of morbidity and mortality. To choose the right treatment and to ensure a quality of life suitable for a specific patient condition, early and accurate diagnosis of malaria is essential. It reduces disease and prevents deaths. It also contributes to reducing malaria transmission. In recent times, Information Technology (IT) has played a significant role in the task of medical diagnosis. This paper work focused on Fuzzy Expert System for malaria diagnosis. It is simple to use, portable, low cost and makes malaria diagnosis more rapid and accurate. It supports medical practitioners and assists malaria researchers to deal with the vagueness, imprecision and time-consuming found in traditional laboratory diagnosis of malaria, and provide accurate output based on the input data.

Hide Abstract

Views 
  



Prof. Vikram M. Agrawal

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

There are many applications like military or public emergency have main concern with secure communication. All this applications use ad hoc environments, so secure key management and message distribution is necessary. The best solution to provide the reliable security to these services is the stipulation of a key management protocol. This paper shows the specific challenges towards key management protocols and different approaches for key management. It also shows the multicast communication with OMCT and its limitations. A new approach, called combination of OMCT with DSDV, can be good. It is not required geographical location information for true connection. It provide high packet ratio with less energy consumption and delay.

Hide Abstract

Views 
  



Sana Khan, Soumya Gupta, Digvijay Singh

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Graphene, a sheet of carbon atoms arrayed in a honeycomb pattern, could be a better semiconductor than silicon.Due to many such properties graphene has been under study as a alternative substance used, rather then graphite and silicon in transistors.But the main function of a transistor is to perform the operation of switching, i:e on and off.The problem that arises here is that graphene has no energy band gap and therefore in this paper i review the various possibilities with which a band gap can be induced in graphene and with all the possible alternatives of use of graphene in LSIs.

Hide Abstract

Views 
  



Syed Minhaj Ali, Zuber Farooqui*

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Cloud computing is an up-and-coming architecture with strengths and room for improvement. Cloud computing is an extension of grid computing and distributed computing, which is a software concept indeed, it works through variety of technologies such as software technologies, integration, management, and the use of various hardware resources. The progress of cloud computing for information processing creates significant technological opportunities and economic benefits. Many organizations and individuals will use cloud platform as data storage and in the mean times as their publishing environment, i.e. public and private clouds can be combined into a hybrid cloud. Cloud storage is an important part of cloud computing, which is used to achieve the target of storing data in the cloud. In our this research work researcher tries to deal with problem of security of store data in a Cloud Computing provider which would be handle by ensemble cryptography methods.

Hide Abstract

Views 
  



Manohar Koli1, S. Balaji2, Ravi kumar H. Roogi3, Deepak .Marigoudar4, Priya Nayak5

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Intensive research has been carried out and is still taking place in the field of detection of counterfeit money. This area of research plays a vital role in the maintenance of consistency in economy and also crime -free society by detecting counterfeit money.

In this paper we have proposed a system for automatic detection of counterfeit notes.? This paper is based on the fact that all notes are printed with unique serial number. Every person who is currently using the note for transaction has to register the serial number of the note in his account along with his unique identity number. This serial number is used for validating the notes and data base transactions.

Hide Abstract

Views