Found 5432 related files. Current in page 1
Once you are at Global Health Resources recovery is never out of reach, no matter how hopeless your situation may seem. Ranked among the top residential recovery centers, this place gives you or your loved one the best chance of achieving and maintaining sobriety. You can also call our helpline number and discuss your local drug and alcohol recovery program options and have get answers to question that you might have about substance abuse insurance coverage.
Well-organized big data get together in the densely distributed sensor networks is, therefore, a challenging research area. One of the most effective solutions to address this challenge is to utilize the sink node’s mobility to facilitate the data gathering. While this technique can reduce energy consumption of the sensor nodes, the use of mobile sink presents additional Challenges such as determining the sink node’s trajectory and cluster formation prior to data collection. In this paper, we propose a new mobile sink routing and data gathering method through network clustering based on modified ExpectationMaximization (EM) technique. In addition, we derive an optimal number of clusters to minimize the energy consumption. The effectiveness of our proposal is verified through numerical results.
The researchers sought to determine the effect of mine tailings on the growth ornamental plants. The study aimed to evaluate the effects of mine tailings o n the numbers of seed germinated, number of leaves, length of seedlings and length of primary roots; assess the effects of the various percentages of mine tailings; determine the interaction effect of the various percentages of mine tailings with fertile soil and organic fertilizers; and establish the best kind of percentages of mine tailings on the germination of seeds and growth of seedlings. Experiments were performed to determine the germination and growth of petunia seeds. Selections of plant candidate from varieties of seeds were considered. The ideal candidate is petunia seeds since it can sprout at a minimum period of seven days. Generally, there is significant effect of mine tailing concentration in primary root growth .
- In this paper, we will enlist the process of extracting template from heterogeneous Web Pages. Extracting structured information from semi-structured machine readable web pages automatically plays a major role these days, so some websites are using common templates with contents to populate the data for good productivity, Where WWW is the major resource for extracting the information. The problem here is for machines, the templates in the web pages are considered to be harmful since they degrade the performance of web applications due to irrelevant terms in the Template. As a result, the performance of the entire system degrades. Template Detection technique can be used to improve the performance of search engine as well as for classification of web documents. In this paper, we present algorithms to extract templates from a very large number of web pages that are getting generated from heterogeneous templates. Using the similarity of template structures in the documen
The field investigation during 2013-14 at Talwandi sabo, Punjab revealed that there are 19 insect pests identified from kharif crops whereas 13 insect pests were recorded from rabi crops. The 5 bio control agents and 2 ant species were recorded from agriculture field. In these Hemiptera and Lepidoptera are having maximum number of insect pests causing major damage to both kharif and rabi crops. Hence the present studies provide good information about different insect pests and its associated insects in agriculture fields.
Let G(V,E) be a connected graph. The sets of vertices and edges of G are denoted by V=V (G) and E=E (G) respectively. In such a molecular graph, vertices represent atoms and edges represent bonds. The number of edges incident on a vi is called the degree d(vi) of vertex vi . The sum of degrees of all vertices in G is twice the number of edges in G . In molecular graph we have many topological indices. In this research, we computing Randic index, Molecular topological index ,Augmented Zagreb index ,Geometric-Arithmetic index ,Atom– bond connectivity index, Harmonic index ,Sum-connectivity index of n-decane ,3,4,4-Trimethyl heptane and 2,4-dimethyl-4- ethyl hexane.
This study was conducted with the aim of investigating how access control would secure customer information in Kenya. This study was guided by the set out objectives: first to determine how data control mechanisms enhance security access, secondly to investigate the security issues on access of customer information and thirdly to develop Secure Data Access Control (SEDAC) model. In achieving these objectives a self administered questionnaire was developed and distributed to randomly selected respondents. The findings of the study were analyzed using SPSS. The Security Data Access Control (SEDAC) model was developed for and recommended for adoption by the end users as a guide to enlighten the novice worker who constitutes a large number of the work force.
This quantitative descriptive cross sectional study explored factors influencing sexual risk behaviours among youths in senior secondary schools in Ethiopia. Data were collected using structured questionnaires. Religious attachment, living with friends, living alone, parental control, level of parental education, peer pressure and number of friends who had experienced sex were some of the factors noted to influence youths to engage in sexual risk behaviours. The findings of this study have implications for both practice and policy development. They will enable healthcare workers to identify youths at risk of engaging in sexual risk behaviours and subsequently motivate them using health promotion strategies to engage in safe sexual practices. Adopting such an approach will prevent or at least minimise risk of youths being infected with sexually transmitted diseases, such as HIV/AIDS.
Do you know the number of visitors coming to your website every day, week or month? Are you aware of the sources through which your website visitors have been visiting your website? If your answer is No, then this blog is definitely for you.
Even a small transition delays and little faults create major concern in digital circuits. It Produce greater impact on not only for simple memory but also for most of the memory applications. This paper presents an error-detection method for difference-set cyclic codes with majority logic decoding. Majority logic decodable codes are suitable for memory applications due to their capability to correct a large number of errors. However, they require a large decoding time that impacts memory performance. The proposed fault-detection method significantly reduces memory access time when there is no error in the data read. The technique uses the majority logic decoder itself to detect failures, which makes the area overhead minimal and keeps the extra power consumption low. The proposed method detects the occurrences of single error, double error ,triple error in the received code words obtained from the memory system.