Volume 8, Issue 10, October 2017 Edition
Publication for Volume 8, Issue 10, October 2017.
Register for IJSER Research Forum
IJSER Xplore Research Paper Database
Pages
[1]
[2]
[3]
[4]
[5]
[6]
Face Recognition Based On PCA Using Different Daubechies Wavelet Transforms[Full-Text ] Chandolu Prasanthi, Jayesh GangradeSecurity and authentication of a person is a crucial part of any industry, there are many techniques used for this purpose, one of them is face recognition. Face recognition is an effective means of authenticating a person. In this paper we present different wavelets on PCA (Principal Components Analysis) which are most popular appearance-based approaches in face recognition. PCA is recognized as an optimal method to perform face recognition, dimension reduction. Yet still, PCA has its limitations such as poor discriminatory power and large computational load. The proposed algorithm uses the concept of Daubechies to improve the performance of PCA by compression and PCA for the feature extraction and identification method. By comparing DB6 with DB8 and DB10, it concludes that DB6 having fast response on PCA performance. The Euclidean Distance Measures system is used to find the nearest matching features in the whole database.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Study of the Radio Frequency Radiation Power Density of Mobile Base Station[Full-Text ] Layla Mahdi SalihSince 2003 the number of mobile phone subscribers extraordinary increased in Iraq. All over the world there is a tremendously growing in cellular communication systems resulted in increasing the number of mobile phones and mobile base stations. This distribution of mobile base stations in dense populated areas, near schools and hospitals has raised the public concern about possible health hazards. The ministry of environment/ Iraq in 2010 has set guidelines to perform measurements of the electromagnetic fields radiated from base stations used in mobile phone networks.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Application of Markov Chain Model in the Stock Market Trend Analysis of Nepal[Full-Text ] Madhav Kumar BhusalThis paper attempts to apply a Markov chain model to forecast the behavior of Nepal Stock Exchange (NEPSE) index. The Nepal Stock Exchange is a sole trading organization of shares in Nepal. The prediction of stock market behavior is very important for investors who are seekers for capital appreciation. The application of Markov chain model for forecasting the future states is based on the strong feature of randomness of NEPSE index. This study aims to explore the long run behavior of NEPSE index, the expected number of visits to a particular state and to determine the expected first return time of various states. For the study, the NEPSE index of 2741 trading days from August 15, 2007 to June 18, 2017 was taken as a secondary data from the NEPSE office. The NEPSE index shows three different states- increase (U), remains same (S) and decrease (D). The initial state vector and transition probability matrix, which are used to predict the behavior of index has been obtained from the close inspection of numbers of transitions from one state to another. The higher order transition probability matrices were obtained by using Microsoft excel. The study explore that regardless of the present status of NEPSE index, in the long run the index will increase with probability 0.3855, remains in the same state with probability 0.1707 and decrease with probability 0.4436. It is also observed that the index will remain in increasing state after three days when it starts to move from the increasing state.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Linear attenuation coefficient Methanol solution of oxalic acid by varying concentration at 0.511 MeVgamma energy[Full-Text ] U. V. Biradar, S.M.DongargeLinear attenuation of 0.511 MeV gamma radiations from methanol by solution of oxalic acidstudied for different concentrations. Mixture rule for theoretical calculation of attenuation coefficient is developed for the solution. Our study explores the validity of the expected exponential absorption law for γ-rays radiations in solution which directly determination of linear attenuation coefficients of soluble compound in methanol. The liquids now a days transparent liquid are playing important role in radiation shield materials for the safety of MHC.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis of Virtual Machine Migration Security Architectures in Cloud Computing[Full-Text ] Sam Njuki, Jianbiao Zhang and Edna TooMigration in cloud computing allows the transfer of resources, such as Virtual Machine (VM) and data items from one cloud server to another cloud server. VM migration provides workload balancing and system maintenance features in the Cloud. Cloud service providers store VM disk images in encrypted form while at rest to prevent attacks. However, there is still the unresolved issue on how to ensure that data is moved securely to the cloud (VMs) and/or between clouds (VMs).The concern of this paper is to explore the security challenges that occur during cloud migration and come up with a better architecture to mitigate the security challenges posed during migration.In this paper, we analyze different cloud migration security models that have been proposed in relation to the security requirements during migration and report the strengths and weaknesses of each. To overcome the security challenges during cloud migration we report a better architectural model.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Samuel Method of Multiplication by Dividing Digits[Full-Text ] Samuel BelayMultiplication is one of four main elementary arithmetic operations. Most people learn basic multiplication algorithms in elementary school and itis used in all education levels.Among various techniques, long multiplication is the method of multiplication that is commonly taught to elementary school students globally.It can be used on two numbers of arbitrarily large size or number of decimal digits.Long multiplication of two n-digit numbers take approximately n^2multiplication operations.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effects of Heating and Treatment Time on Some Characteristics of Terminalia catappa Seeds Oils Harvested in Côte d’Ivoire[Full-Text ] MONNET Thierry Yapo, YAPI Assoi Désiré, BINATE Siaka, KONAN Kouassi Hubert, KOUADIO N’guessan Eugène Jean Parfait, KOUAME Lucien PatriceEffects of heating on some quality characteristics of Terminalia catappa seeds oils from unripe and ripe mature fruits has been investigated using standard analytical methods system. Peroxide (PV), acid (AV), iodine (IV) and saponification (SP) value, absorptivity at 232 and 270 nm, and refractive index (RI) seed oil were less changed. The two studied Terminalia catappa seed oils presented high oxidation stability. They were resistant to thermal treatment (150 - 275 °C) during a long period (~480-120 min.) regarding the high stability of some of their quality parameters. This may indicate that they could bear thermal treatments that could be applied in refining procedures or in culinary treatments such as frying and cooking conditions. We could also expect that they may have a good shelf life.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Planning and Design of Water Supply Network for Pabna University of Science and Technology Campus in Bangladesh[Full-Text ] Md. Ashrafuzzaman Pramanik, Md. Ponir HossainPabna University of Science and Technology (PUST) is one of the new universities in Bangladesh. At present there is no water supply network at PUST Campus. It is necessary to have an understanding the water distribution network in order to make right decision on maintenance and expansion of existing network. In this study two phases of water supply networks have been considered. One is Phase-I (Existing Buildings Construction) and another is Phase-II (Future Extension Buildings). The study provides necessary information on planning as well as design of proposed water supply network for PUST Campus in Pabna. The water demand in the campus during completion of Phase-I is 3, 31,814.5 litres/day and Phase-II is 13, 62,884 litres/day. The study team proposes two water pumps with Water Horse Power (W.H.P) 40 Hz. In planning for the development of water supply system both surface and ground water problems should be undertaken. The research paper concludes with various strategies such as cost effective network, surface and ground water management, and conservation practices which can be implemented to achieve a sustainable water supply for PUST Campus at Pabna in Bangladesh.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
MPR MAC Protocol for Distributed WLANs: A Review[Full-Text ] Parth I. PatelWireless LANs are facing increasing demands for higher data rates and greater spectral efficiency. Asynchronous MPR (Multi-Packet Reception) refers to the capability of networking nodes for decoding signals from a number of source nodes concurrently. MAC (Medium Access Control) protocols incorporated acknowledgements in it which acts as a reference model. Enhanced protocol with changes on the back off timer control to reduce the acknowledgement delays and increase system throughput. An accurate analysis includes expressions for the saturation throughput, packet dropping probability average head-of-line packet delay. The problem of acknowledgment delays arises when multiple nodes transmit without the channel becoming idle in asynchronous MPR. Nodes independently access the channel so long as the number of ongoing transmissions. In this paper, we analyze protocols for distributed wireless LANs.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
VITAL PARAMETER MONITORING FOR HEALTH THROUGH IoT USING BIOSENSORS AND MEDICINE BOX[Full-Text ] Ruchi D. Vyawahare, Prof. Mrs. S.P.Tondare, Prof. Dr. Mrs. S.P. GaikwadAmong the variety of uses empowered by the net of Things (IoT), sensible and associated human services is notably necessary. Network sensors, either worn on the body or installed in our living setting; modify the social event of wealthy info demonstrative of our physical and mental state. Caught consistently, amassed, and viably strip-mined, such info will create a positive transformation amendment within the health care landscape. The stage includes 1) Associate in nursing open-stage based insightful drugs box (iMedBox) with expanded property and interchange ability for the combination of gadgets and administrations, 2) wise pharmaceutical bundling (iMedPack). The planned stage consistently melds IoT gadgets (e.g., wearable sensors, wise drugs bundles, and so on.) with in-home care benefits A fascinating system ought to be equipped for dealing with the patients from all angles, covering customized prescription, very important signs observance, on-the-scene diagnosing and communication with remote doctors. The planned system provides Associate in nursing experimental plan of patient’s health condition.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Roles of family doctors in antibiotic resistance, causes and management[Full-Text ] Zainab Ali Alhassan, Intithar Hussain Alherz, Rehab Jamil Almajed, Nour Jamil Al Majed, Hanin Sami Bumozah, Redha Ali Alsaleh, Abdullah JameelAlmajed, Ibrahim AbdulmonemAlmajedThe main goal of this current review was to discuss the antibiotics resistance in primary care, and the roles of family physicians in the management of this conditions, also the causes that may lead to antibiotic resistance that sometimes are caused by overused of antibiotics of an appropriate way.We searched the MEDLINE, EMBASE, and Cochrane databases to identify relevant studies published up to September, 2017.There is growing evidence that primary care recommended prescription antibiotics lead to antibiotic resistance in bacteria creating minor infections or being carried by asymptomatic adults, however, little research to date has examined web links between primary care prescribed prescription antibiotics and resistance amongst much more major infections calling for medical facility care.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AN INVENT TO IMPROVE BULLETPROOF VESTS CAPABILITIES [Full-Text ] Asst.Prof.Ehsan Sabah Al-Ameen, Asst.Prof.Dr. Nathim M. Faleh, Salam Abdulrazzaq HussienWoven laminated Epoxy reinforced with Kevlar and Glass fiber vest plates are subjected to three types of projectiles with three different masses and impact velocities. An invented phenomenon is adopted by using an air gap between two composite plates. The effect of the air gap gave about 20% modification in the total absorbed energy and momentum which made a good decrease in the bullet speed after hitting the target.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Maternal age as a risk factor of preterm labor in Al Hassa , Saudi Arabia[Full-Text ] Aisha W. Almethen, Anjoud A. Albohair, Nada H. Alsairafi, Zahraa A. Alshibeb, Zainab A. Alturaiki, Sayed Ibrahim Ali, Suha Jafar Al Bahrani, GihanYousef AliPurpose: Preterm is the primary predictor of infant morbidity and mortality. Because of increased rate of preterm labor in our society, our study's aim is to investigate the maternal age as a risk factor of preterm labor. Subjects & Methods: This retrospective study is carried on Maternity and Child Hospital Alhasa, KSA. The data was obtained from the hospital records which included preterm labor that occurs in a period from 2011 to 2013. Results: 101 preterm labors occurred during this period. The mean maternal age was 27.4.±sd while the mean gestational age was 32± SD. The mean parity of included mothers was 2.3±SD. The maternal age was grouped into 3 groups and the most affected group to have preterm labor was the middle age group (25 – 35); where the percentage of extremely preterm births was 70.6% and the preterm births was 53.7%. In general there was significant negative correlation between maternal age and gestational age. In Conclusion: Maternal age is independent risk factor of preterm birth in Alhasa. The group to be at risk was the middle age group.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pages
[1]
[2]
[3]
[4]
[5]
[6]
|