SEARCH

Found 1387 related files. Current in page 1

CUANDO SE USA UNA CARTA MULTIPLE

Dermatoglyphics and Cheiloscopy Pattern in Hypertensive Patients; A Study in Ahmadu Bello University

Essential hypertension is sustained high blood pressure not attributable to a single cause but reflecting the interaction of multiple genetic and environmental influences. Dermatoglyphic involves the study of epidermal ridges present on the surface of palms, finger, soles and toes while cheiloscopy is the study of the grooves or furrows present on the vermilion border of the human lips. Finger and lip prints are known useful genetic markers in some congenital and clinical diseases; as such this study was aimed at determining the association between fingerprint and lip print patterns in hypertensive patients. The present study was carried out with hypertensive patients attending the outpatient clinic of Ahmadu Bello University Teaching Hospital (ABUTH), Zaria and was compared with a control group with normal blood pressure.

“Spindle Cell Sarcoma of Uterine Cervix”- A Rare Case Report

A 40 year old female presented as post-operative case with diagnosed case of spindle cell sarcoma of uterine cervix with multiple liver, lung and scar recurrence. Patient was plan for palliative chemotherapy. Our case is unique is presentation because it’s from spindle cell sarcoma which is very rare only 150 case reported in literature.

Optimizing Complex Queries Using Case-Based Reasoning with Dynamicity Management

A query optimizer is a core component of any Database Management System. Multiple approaches have been suggested which were based on framework of classical query evaluation procedures that heavily dependent on metadata. There are computational environments where metadata acquisition and support is very expensive. In this paper an optimization technique for complex queries using case based reasoning (machine learning technique) in ubiquitous computing environment is deliberated. In this technique a new problem is solved by finding a similar past case, and reusing it in the new problem situation. As CBR is an approach to incremental, sustained learning, since a new experience is retained each time a problem has been solved, making it immediately available for future problems which in return may create a bulky case base. Thus we were proposing a technique of dynamic deletion of irrelevant cases from case base. Through which system can detect the inappropriate cases and replace them with

Human Activity Tracking using Star Skeleton and Activity Recognition using HMM’s and Neural Network

Human motion detection and analysis is currently an important area of research, motion analysis help us to solve many problems. An Automated Video Surveillance Model is presented in this paper. The model which I proposed is capable of detecting and monitoring people in both environments Indoor and outdoor. The Model is capable to find out the Suspicious and NonSuspicious activities. It also detects multiple peoples in video and monitoring their activities. Moving targets are detected and their boundaries extracted, we use star skeletonization technique with the adaptive centroid point to create human skeletons. In this paper we use HMM-based methodology for action recognition. In our proposed method, a series of star skeletons is generated according to action over time. Then, time-sequential images frame is converted into a feature vector sequence and the feature vector is translated into sequence of symbols after that we use Neural Network for action recognition which represents

The Logistic Multiple Regression Flow Model- A Tool for Aquatic Macrophyte Prediction and Management

- Flow reduction has been identified as the major predisposing factor that promotes the exuberation of most aquatic macrophytes in open channels. This study , therefore examines various flow variables such as Velocity (v), Cross Sectional Area (CSA), Discharge (Q) as well as Depth (D) from which a data base is generated. The least square multiple regression approach was adopted (to design a logistic flow model) to predict the spread of water hyacinth in Kolo creek in the Niger Delta. The flow variables obtained are used against percentage macrophyte area covered. Results from the model gives R2 values of 0.62 and 0.9887 for dry and wet seasons respectively. All the flow variable studied negatively correlated with the area covered by macrophyte for both seasons. Velocity (-0.6844), CSA (-0.6974, discharge (-0.6986) and depth (-0.7566) during dry season and velocity (-0.990), CSA (-0.978) and discharge (-0.980) and Depth (-0.9902). This indicates and inverse relationship between the flow

Lifetime Maximization in Heterogeneous wireless Sensor Networks using Multipath Routing Technique

In wireless sensor Networks security is one of the important problems we are facing. To provide redundancy management for heterogeneous wireless sensor networks (HWSNs) utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. In this paper use a Multipath Routing, it is the routing technique of using multiple alternative paths through the network. The objective of redundancy management of multipath routing minimizes the energy loss and gain in reliability, timeliness and security to maximize the system lifetime. Here a voting based intrusion detection algorithm used to detect and evict malicious nodes. We plan to explore more extensive malicious attacks for packet dropping and bad mouthing attacks with implications to energy reliability and security, and investigate Intrusion detection and multipath routing based acceptance protocols to react to these attacks.

Lifetime Maximization in Heterogeneous wireless Sensor Networks using Multipath Routing Technique

In wireless sensor Networks security is one of the important problems we are facing. To provide redundancy management for heterogeneous wireless sensor networks (HWSNs) utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. In this paper use a Multipath Routing, it is the routing technique of using multiple alternative paths through the network. The objective of redundancy management of multipath routing minimizes the energy loss and gain in reliability, timeliness and security to maximize the system lifetime. Here a voting based intrusion detection algorithm used to detect and evict malicious nodes. We plan to explore more extensive malicious attacks for packet dropping and bad mouthing attacks with implications to energy reliability and security, and investigate Intrusion detection and multipath routing based acceptance protocols to react to these attacks.

Tags: Education,
Resource Productivity of Maize Production in Numan Local Government Area of Adamawa State, Nigeria

This paper attempts to analyze the efficiency of maize (Zea mays L.) production in Numan Local Government of Adamawa State, Nigeria. Multistage sampling technique was employed to select Ninety seven (97) maize producing farmers for the study. Data for the study were collected using structured questionnaires. Multiple regression analysis was used to study the relationship between inputs and output. The result shows that there is a positive and significant relationship between farm sizes, quality of seed used, fertilizer, plough-cost, labour with maize output in the study area.

What is the reason behind linking a file in a host model

Well file linking is an intrinsic part of working in a Revit project. Sometimes design development team members have to link multiple files in their model. Modelers working on a Revit project often feel the necessity to link a file in their host model for gaining information. Get more information @ http://www.teslaoutsourcingservices.com/.

Tackle positioning issues favorably by sharing coordinates!

Tackling file positioning issues rationally and conveniently remains major problem for Revit users when they link additional file in their model or project. Multiple discrepancies are confronted by Revit users in terms of geometrical positioning of linked files comparative to host model. For more information, visit @ http://www.teslaoutsourcingservices.com/.

« previous  123456789