A Literature Survey on Ranking Tagged Web Documents in Social Bookmarking Sys...IOSR Journals
This document provides a literature survey of approaches for ranking tagged web documents in social bookmarking systems. It begins with background on social information systems, folksonomy, and social bookmarking systems. The main body of the document reviews six categories of approaches for ranking documents: personomy based techniques, frequency and similarity based techniques, structure-based techniques, semantics-based techniques, cluster based techniques, and probability based techniques. Each category discusses several specific approaches that have been proposed, outlining the techniques and algorithms used. The document concludes by stating that while many techniques have been proposed, open questions still remain around improving search effectiveness in social bookmarking systems.
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
This document proposes a distributed trusted agent-based approach (DTADA) to detect and defend against cloning attacks and sinkhole attacks in wireless sensor networks. DTADA uses mobile agents that can move between nodes to detect attacks in a distributed manner without relying on a centralized authority. The mobile agents are programmed to identify inconsistencies that would indicate a cloning or sinkhole attack has occurred. The document reviews related work on centralized and local detection methods and their limitations. It then describes how DTADA uses mobile agents to efficiently detect attacks in a distributed way without high communication or energy costs.
Classification By Clustering Based On Adjusted ClusterIOSR Journals
This document summarizes a research paper that proposes a new technique called "Classification by Clustering" (CbC) to define decision trees based on cluster analysis. The technique is tested on two large HR datasets. CbC involves running a clustering algorithm on the dataset without using the target variable, calculating the target variable distribution in each cluster, setting a threshold to classify entities, fine-tuning the results by weighting important attributes, and testing the results on new data. The paper finds that CbC can provide meaningful decision rules even when conventional decision trees fail to do so, and in some cases CbC performs better. A new evaluation measure called Weighted Group Score is also introduced to assess models when conventional measures cannot be used
The document analyzes how effective the combination of a film trailer, poster, and magazine were at promoting a fictional film called "Graduhate." Key elements like costumes, makeup, colors, fonts, and main characters were kept consistent across all three products to clearly link them together. Analyses of the poster and magazine cover show how elements like title, images, taglines, and credits were used to attract audiences. Maintaining consistency of visuals and story elements made the trailer, poster, and magazine work together as a cohesive promotional package.
This study evaluated the impact of diabetes mellitus and obesity on male infertility in Iraqi patients. It found that:
1) Serum levels of HbA1C, a marker of long-term blood sugar control, were higher in diabetic patients regardless of BMI compared to healthy controls. HbA1C was also higher in normo-BMI diabetic patients compared to obese diabetic patients.
2) Serum free testosterone levels, important for male fertility, were significantly lower in obese diabetic patients compared to overweight diabetic and healthy patients.
3) There was a significant negative correlation between serum free testosterone levels and HbA1C in obese diabetic patients, suggesting poorer blood sugar control is associated with lower testosterone.
Fuzzy Logic Controller Based ZVT-ZCT PWM Boost Converter Using Renewable Ener...IOSR Journals
The document describes a novel ZVT-ZCT-PWM boost converter that uses an active snubber cell to achieve soft switching of the main switch. Key features include:
1) The main switch turns on with zero voltage transition (ZVT) and turns off with zero current transition (ZCT), achieving soft switching.
2) All semiconductor devices operate with soft switching, reducing switching losses.
3) The converter has a simple structure with minimum components and is easy to control.
4) Simulation results for a 2.3kW, 100kHz boost converter show the output voltage can reach 400V with an overall efficiency of 97.8% at nominal power.
Application of Comparators in Modern Power System Protection and ControlIOSR Journals
This document discusses the use of comparators in power system protection and control. It describes two comparison techniques - amplitude comparison and phase comparison. Amplitude comparison produces an output proportional to the amplitude difference of input quantities, while phase comparison produces pulses proportional to the phase difference. The document shows how amplitude comparison can be modified to perform phase comparison. It provides equations to model impedance, Mho, and offset Mho relay characteristics using phase comparison. Examples of applications include over/under voltage protection using a voltage comparator circuit. In conclusion, comparators are widely used in power system protection applications.
A Literature Survey on Ranking Tagged Web Documents in Social Bookmarking Sys...IOSR Journals
This document provides a literature survey of approaches for ranking tagged web documents in social bookmarking systems. It begins with background on social information systems, folksonomy, and social bookmarking systems. The main body of the document reviews six categories of approaches for ranking documents: personomy based techniques, frequency and similarity based techniques, structure-based techniques, semantics-based techniques, cluster based techniques, and probability based techniques. Each category discusses several specific approaches that have been proposed, outlining the techniques and algorithms used. The document concludes by stating that while many techniques have been proposed, open questions still remain around improving search effectiveness in social bookmarking systems.
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
This document proposes a distributed trusted agent-based approach (DTADA) to detect and defend against cloning attacks and sinkhole attacks in wireless sensor networks. DTADA uses mobile agents that can move between nodes to detect attacks in a distributed manner without relying on a centralized authority. The mobile agents are programmed to identify inconsistencies that would indicate a cloning or sinkhole attack has occurred. The document reviews related work on centralized and local detection methods and their limitations. It then describes how DTADA uses mobile agents to efficiently detect attacks in a distributed way without high communication or energy costs.
Classification By Clustering Based On Adjusted ClusterIOSR Journals
This document summarizes a research paper that proposes a new technique called "Classification by Clustering" (CbC) to define decision trees based on cluster analysis. The technique is tested on two large HR datasets. CbC involves running a clustering algorithm on the dataset without using the target variable, calculating the target variable distribution in each cluster, setting a threshold to classify entities, fine-tuning the results by weighting important attributes, and testing the results on new data. The paper finds that CbC can provide meaningful decision rules even when conventional decision trees fail to do so, and in some cases CbC performs better. A new evaluation measure called Weighted Group Score is also introduced to assess models when conventional measures cannot be used
The document analyzes how effective the combination of a film trailer, poster, and magazine were at promoting a fictional film called "Graduhate." Key elements like costumes, makeup, colors, fonts, and main characters were kept consistent across all three products to clearly link them together. Analyses of the poster and magazine cover show how elements like title, images, taglines, and credits were used to attract audiences. Maintaining consistency of visuals and story elements made the trailer, poster, and magazine work together as a cohesive promotional package.
This study evaluated the impact of diabetes mellitus and obesity on male infertility in Iraqi patients. It found that:
1) Serum levels of HbA1C, a marker of long-term blood sugar control, were higher in diabetic patients regardless of BMI compared to healthy controls. HbA1C was also higher in normo-BMI diabetic patients compared to obese diabetic patients.
2) Serum free testosterone levels, important for male fertility, were significantly lower in obese diabetic patients compared to overweight diabetic and healthy patients.
3) There was a significant negative correlation between serum free testosterone levels and HbA1C in obese diabetic patients, suggesting poorer blood sugar control is associated with lower testosterone.
Fuzzy Logic Controller Based ZVT-ZCT PWM Boost Converter Using Renewable Ener...IOSR Journals
The document describes a novel ZVT-ZCT-PWM boost converter that uses an active snubber cell to achieve soft switching of the main switch. Key features include:
1) The main switch turns on with zero voltage transition (ZVT) and turns off with zero current transition (ZCT), achieving soft switching.
2) All semiconductor devices operate with soft switching, reducing switching losses.
3) The converter has a simple structure with minimum components and is easy to control.
4) Simulation results for a 2.3kW, 100kHz boost converter show the output voltage can reach 400V with an overall efficiency of 97.8% at nominal power.
Application of Comparators in Modern Power System Protection and ControlIOSR Journals
This document discusses the use of comparators in power system protection and control. It describes two comparison techniques - amplitude comparison and phase comparison. Amplitude comparison produces an output proportional to the amplitude difference of input quantities, while phase comparison produces pulses proportional to the phase difference. The document shows how amplitude comparison can be modified to perform phase comparison. It provides equations to model impedance, Mho, and offset Mho relay characteristics using phase comparison. Examples of applications include over/under voltage protection using a voltage comparator circuit. In conclusion, comparators are widely used in power system protection applications.
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...Thomas Gottron
This document summarizes a workshop on aligning entities in knowledge bases with representations on the public web. It presents an experimental evaluation of using label search, exploiting link structure, and type filtering to map 100 entities from knowledge bases to URLs on the public web. The best performing methods were found to be label search and focused HITS, and adding type filtering improved results for all methods. Next steps include further investigating domain-dependent performance.
Tiga kalimat ringkasan dokumen tersebut adalah:
Dokumen tersebut membahas tentang bagaimana mengelola hubungan industrial tanpa kehadiran serikat pekerja dengan melibatkan karyawan secara partisipatif dan menjaga komunikasi yang baik serta supervisor yang efektif.
Adapting Software Components Dynamically for the GridIOSR Journals
This document summarizes a research paper on dynamically adapting software components for grid computing. It presents a framework for dynamic adaptation that incorporates a layered architecture with concepts of dynamicity. The framework separates adaptation mechanisms from component content. It defines four steps for adaptation: observe the execution environment, decide if adaptation is needed, plan adaptation actions, and execute planned actions. The framework uses three levels - a functional level for component services, a component-independent level for adaptation mechanisms, and a component-specific level for developer customization. It evaluates using this framework to design dynamically adaptable scientific application components.
Data Allocation Strategies for Leakage DetectionIOSR Journals
This document summarizes data allocation strategies for detecting data leakage when sensitive data is distributed through trusted agents. It proposes injecting "fake but genuine-looking" data along with real data to improve the ability to detect if leakage occurs and identify the agent responsible. Various allocation algorithms are presented, including random selection and maximizing the difference between agents' probabilities of guilt. Empirical results show the average detection metric is improved when fake data is used compared to no fake data. The strategies aim to detect leakage without modifying the original data, unlike traditional watermarking techniques.
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
This document summarizes various techniques for anonymizing data to protect privacy and security when data is stored in the cloud. It discusses how anonymization removes identifying attributes from data to prevent individuals from being identified. The document reviews existing anonymization models like k-anonymity, l-diversity and t-closeness. It then describes different anonymization techniques like hashing, hiding, permutation, shifting, truncation, prefix-preserving and enumeration that were implemented to anonymize data fields. The goal is to anonymize data in a way that balances privacy, security, and the ability to still use the data for appropriate purposes.
IOSR Journal of Mathematics(IOSR-JM) is an open access international journal that provides rapid publication (within a month) of articles in all areas of mathemetics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mathematics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...IOSR Journals
This document discusses techniques for detecting session hijacking and IP spoofing attacks in wireless networks. It proposes using sensor nodes to detect fake access points, which are used to perform session hijacking. It also describes adding protection against IP spoofing through public-private key cryptography during key exchange. The document provides background on session hijacking, IP spoofing, and related work on detecting these attacks. It then describes the proposed mechanism in more detail.
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
The document describes a proposed method for generating an encryption key from biometric cryptosystems to securely transfer data over a network. It involves extracting minutiae points from a fingerprint scan, generating a cryptographic key from the biometric template, and using an RSA encryption algorithm with the biometric-derived private key. A public key is also calculated based on ridge and furrow patterns in the fingerprint scan. The goal is to uniquely generate encryption keys for each individual using their biometric fingerprint information to add an extra layer of security beyond traditional encryption techniques.
Remedyto the Shading Effect on Photovoltaic CellIOSR Journals
This document discusses remedies for the shading effect on photovoltaic cells. It proposes connecting bypass diodes parallel to solar cells such that when shading occurs, the reverse voltage enables the bypass diode to conduct current from the unshaded cells. This results in the current from the unshaded cells flowing through the bypass diode, showing a second local maximum on the power/voltage characteristics. The shaded cell is only loaded with power from the unshaded cells in that section. The document then provides details on sizing the components of a photovoltaic system based on load assessment, including selecting a 1.5 kVA inverter, a 24V 400Ah battery bank, and determining the required solar panel size
This document describes a study that aimed to develop and characterize an adsorbent from rice husk ash to bleach vegetable oils such as palm, palm kernel, and groundnut oils. Rice husk samples were pretreated with different concentrations of HCl and then calcined at 600°C for 3 hours. The optimum conditions were determined to be pretreatment with 2.5M HCl and calcination at 600°C for 3 hours. Under these conditions, the rice husk ash showed the best bleaching potential for palm kernel and palm oils with 2.5M HCl and for groundnut oil with 2M HCl. Characterization of the rice husk ash samples found that acid pretreatment improved the bleaching
This document discusses technology trends and questions for a tech industry professional. It asks about the technology ecosystem they work in, how mobile their work is, hot technologies to consider, how they keep up with changes, how they decide to buy devices, the importance of browsers, their internet presence, whether they are paperless, and their technology plan.
Overview of State Estimation Technique for Power System ControlIOSR Journals
This document provides an overview of state estimation techniques for power system control. It discusses static, tracking, and dynamic state estimation approaches and how they differ based on whether measurements and system models are time-variant or invariant. The document also describes how state estimation processes redundant measurements to filter noise and estimate true system states like voltage magnitudes and angles at each bus. It further discusses weighted least squares estimation, the use of Jacobian matrices to iteratively estimate states, and how state estimation provides critical real-time data for power system monitoring and control functions.
This document provides guidance on how to create an informational product (info product) to sell online. It discusses that info products include ebooks, reports, software, videos, websites, newsletters and more. It then offers several strategies for creating an info product, including co-authoring with an expert if you have writing skills or hiring a ghost writer if you have expertise. It also suggests compiling a directory or becoming an affiliate to sell other companies' info products. The document concludes by emphasizing that the info product must solve a problem and provide significantly more value than its price.
The document describes a Bearcat armored vehicle used by the Prince George County Police Department in Maryland. It contains photos showing the Liberator Extended Tactical Support system in different positions, including stowed, deployed from the front and side, and a folded evacuation stairway. Another photo depicts the vehicle's SWAT team taking possession and an operator using a fast rope for roof access.
The document provides status updates for various equipment on an emergency vehicle, including that the front stairway is stowed, the passenger side rear ramps are semi-raised, and the passenger side front emergency evacuation stairway is deployed. It also notes that an existing BEAR vehicle belongs to the Ohio Highway Patrol while another BEAR was manufactured for the Washington Metro Police Department.
O Simpósio Internacional de Emergências com Produtos Perigosos e Mostra Tecnológica irá ocorrer de 10 a 12 de dezembro na Academia de Bombeiro Militar do Distrito Federal, com inscrições gratuitas pelo e-mail gpram.rh@cbm.df.gov.br ou pelos telefones listados, para debater emergências envolvendo produtos perigosos e apresentar novas tecnologias.
O documento anuncia o I Simpósio Internacional de Emergências com Produtos Perigosos e Mostra Tecnológica a ser realizado de 10 a 12 de dezembro de 2012 na Academia de Bombeiro Militar do Distrito Federal em Brasília. O evento abordará emergências envolvendo produtos perigosos e contará com patrocínio.
O documento descreve o 1o Simpósio Internacional de Emergências com Produtos Perigosos e Mostra Tecnológica, ocorrendo de 10 a 12 de dezembro na Academia de Bombeiro Militar do Distrito Federal. O evento contará com palestras e demonstrações sobre gestão de emergências com produtos perigosos, equipamentos, tecnologias de detecção química e biológica.
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...Thomas Gottron
This document summarizes a workshop on aligning entities in knowledge bases with representations on the public web. It presents an experimental evaluation of using label search, exploiting link structure, and type filtering to map 100 entities from knowledge bases to URLs on the public web. The best performing methods were found to be label search and focused HITS, and adding type filtering improved results for all methods. Next steps include further investigating domain-dependent performance.
Tiga kalimat ringkasan dokumen tersebut adalah:
Dokumen tersebut membahas tentang bagaimana mengelola hubungan industrial tanpa kehadiran serikat pekerja dengan melibatkan karyawan secara partisipatif dan menjaga komunikasi yang baik serta supervisor yang efektif.
Adapting Software Components Dynamically for the GridIOSR Journals
This document summarizes a research paper on dynamically adapting software components for grid computing. It presents a framework for dynamic adaptation that incorporates a layered architecture with concepts of dynamicity. The framework separates adaptation mechanisms from component content. It defines four steps for adaptation: observe the execution environment, decide if adaptation is needed, plan adaptation actions, and execute planned actions. The framework uses three levels - a functional level for component services, a component-independent level for adaptation mechanisms, and a component-specific level for developer customization. It evaluates using this framework to design dynamically adaptable scientific application components.
Data Allocation Strategies for Leakage DetectionIOSR Journals
This document summarizes data allocation strategies for detecting data leakage when sensitive data is distributed through trusted agents. It proposes injecting "fake but genuine-looking" data along with real data to improve the ability to detect if leakage occurs and identify the agent responsible. Various allocation algorithms are presented, including random selection and maximizing the difference between agents' probabilities of guilt. Empirical results show the average detection metric is improved when fake data is used compared to no fake data. The strategies aim to detect leakage without modifying the original data, unlike traditional watermarking techniques.
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
This document summarizes various techniques for anonymizing data to protect privacy and security when data is stored in the cloud. It discusses how anonymization removes identifying attributes from data to prevent individuals from being identified. The document reviews existing anonymization models like k-anonymity, l-diversity and t-closeness. It then describes different anonymization techniques like hashing, hiding, permutation, shifting, truncation, prefix-preserving and enumeration that were implemented to anonymize data fields. The goal is to anonymize data in a way that balances privacy, security, and the ability to still use the data for appropriate purposes.
IOSR Journal of Mathematics(IOSR-JM) is an open access international journal that provides rapid publication (within a month) of articles in all areas of mathemetics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mathematics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...IOSR Journals
This document discusses techniques for detecting session hijacking and IP spoofing attacks in wireless networks. It proposes using sensor nodes to detect fake access points, which are used to perform session hijacking. It also describes adding protection against IP spoofing through public-private key cryptography during key exchange. The document provides background on session hijacking, IP spoofing, and related work on detecting these attacks. It then describes the proposed mechanism in more detail.
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
The document describes a proposed method for generating an encryption key from biometric cryptosystems to securely transfer data over a network. It involves extracting minutiae points from a fingerprint scan, generating a cryptographic key from the biometric template, and using an RSA encryption algorithm with the biometric-derived private key. A public key is also calculated based on ridge and furrow patterns in the fingerprint scan. The goal is to uniquely generate encryption keys for each individual using their biometric fingerprint information to add an extra layer of security beyond traditional encryption techniques.
Remedyto the Shading Effect on Photovoltaic CellIOSR Journals
This document discusses remedies for the shading effect on photovoltaic cells. It proposes connecting bypass diodes parallel to solar cells such that when shading occurs, the reverse voltage enables the bypass diode to conduct current from the unshaded cells. This results in the current from the unshaded cells flowing through the bypass diode, showing a second local maximum on the power/voltage characteristics. The shaded cell is only loaded with power from the unshaded cells in that section. The document then provides details on sizing the components of a photovoltaic system based on load assessment, including selecting a 1.5 kVA inverter, a 24V 400Ah battery bank, and determining the required solar panel size
This document describes a study that aimed to develop and characterize an adsorbent from rice husk ash to bleach vegetable oils such as palm, palm kernel, and groundnut oils. Rice husk samples were pretreated with different concentrations of HCl and then calcined at 600°C for 3 hours. The optimum conditions were determined to be pretreatment with 2.5M HCl and calcination at 600°C for 3 hours. Under these conditions, the rice husk ash showed the best bleaching potential for palm kernel and palm oils with 2.5M HCl and for groundnut oil with 2M HCl. Characterization of the rice husk ash samples found that acid pretreatment improved the bleaching
This document discusses technology trends and questions for a tech industry professional. It asks about the technology ecosystem they work in, how mobile their work is, hot technologies to consider, how they keep up with changes, how they decide to buy devices, the importance of browsers, their internet presence, whether they are paperless, and their technology plan.
Overview of State Estimation Technique for Power System ControlIOSR Journals
This document provides an overview of state estimation techniques for power system control. It discusses static, tracking, and dynamic state estimation approaches and how they differ based on whether measurements and system models are time-variant or invariant. The document also describes how state estimation processes redundant measurements to filter noise and estimate true system states like voltage magnitudes and angles at each bus. It further discusses weighted least squares estimation, the use of Jacobian matrices to iteratively estimate states, and how state estimation provides critical real-time data for power system monitoring and control functions.
This document provides guidance on how to create an informational product (info product) to sell online. It discusses that info products include ebooks, reports, software, videos, websites, newsletters and more. It then offers several strategies for creating an info product, including co-authoring with an expert if you have writing skills or hiring a ghost writer if you have expertise. It also suggests compiling a directory or becoming an affiliate to sell other companies' info products. The document concludes by emphasizing that the info product must solve a problem and provide significantly more value than its price.
The document describes a Bearcat armored vehicle used by the Prince George County Police Department in Maryland. It contains photos showing the Liberator Extended Tactical Support system in different positions, including stowed, deployed from the front and side, and a folded evacuation stairway. Another photo depicts the vehicle's SWAT team taking possession and an operator using a fast rope for roof access.
The document provides status updates for various equipment on an emergency vehicle, including that the front stairway is stowed, the passenger side rear ramps are semi-raised, and the passenger side front emergency evacuation stairway is deployed. It also notes that an existing BEAR vehicle belongs to the Ohio Highway Patrol while another BEAR was manufactured for the Washington Metro Police Department.
O Simpósio Internacional de Emergências com Produtos Perigosos e Mostra Tecnológica irá ocorrer de 10 a 12 de dezembro na Academia de Bombeiro Militar do Distrito Federal, com inscrições gratuitas pelo e-mail gpram.rh@cbm.df.gov.br ou pelos telefones listados, para debater emergências envolvendo produtos perigosos e apresentar novas tecnologias.
O documento anuncia o I Simpósio Internacional de Emergências com Produtos Perigosos e Mostra Tecnológica a ser realizado de 10 a 12 de dezembro de 2012 na Academia de Bombeiro Militar do Distrito Federal em Brasília. O evento abordará emergências envolvendo produtos perigosos e contará com patrocínio.
O documento descreve o 1o Simpósio Internacional de Emergências com Produtos Perigosos e Mostra Tecnológica, ocorrendo de 10 a 12 de dezembro na Academia de Bombeiro Militar do Distrito Federal. O evento contará com palestras e demonstrações sobre gestão de emergências com produtos perigosos, equipamentos, tecnologias de detecção química e biológica.