This paper will present the method to categorize the footprint images using fuzzy logic for different security aspects faced by the entire world. Biometric footprint authentication has increasing attention because footprint is unique, permanent, measurable characteristics having voluminous of the line features. This paper also discusses a method for feature extraction, identification techniques of footprints based on fuzzy logic technique and some publically available databases. This method use sub image based principle line feature extraction technique in low resolution footprint images. Image is divided into sub images and feature obtained from these subimages are combined to generate a single feature vector for the footprint image. This vector is providing to fuzzy inference system as input. The testing for system has been performed on images collected at RUNGTA COLLEGE BHILAI. This approach tries to meet almost all trade-offs between biometric systems. Error rate is also being expected to reduce to level ±1 %.This paper will present the method to categorize the footprint images using fuzzy logic for different security aspects faced by the entire world. Biometric footprint authentication has increasing attention because footprint is unique, permanent, measurable characteristics having voluminous of the line features. This paper also discusses a method for feature extraction, identification techniques of footprints based on fuzzy logic technique and some publically available databases. This method use sub image based principle line feature extraction technique in low resolution footprint images. Image is divided into sub images and feature obtained from these subimages are combined to generate a single feature vector for the footprint image. This vector is providing to fuzzy inference system as input. The testing for system has been performed on images collected at RUNGTA COLLEGE BHILAI. This approach tries to meet almost all trade-offs between biometric systems. Error rate is also being expected to reduce to level ±1 %.
Millions of patients worldwide are taking anticoagulants like acenocumarol and warfarin for prevention of serious thrombotic complications as stroke or heart attack. The coumarins or vitamin K antagonists (VKAs) have been the mainstay of oral anticoagulant therapy for more than 50 years. In clinical practice VKAs are challenging to use, because they reveal considerable variability in dose response among different patients, resulting from genetic mutation and drug and diet interactions. Because of this they require frequent laboratory monitoring which is time consuming and discomfort for the patients. \nThe development of point-of-care (POC) devices enables International normalized ratio (INR) to be obtained in outpatient as well as at home setting at the moment. Some earlier studies have shown statistically significant differences between values from clinical laboratory and POC meters, because of which the accuracy of these meters remain still controversial. The aim of this study was to evaluate the results of INR on the CoaguChek XS meter relative to chronometric assay on laboratory coagulometer Sysmex S 2000i.
Background: Food insecurity as \"limited or uncertain availability of nutritionally adequate and safe foods or limited or uncertain ability to acquire acceptable foods in socially acceptable ways\" is expressed. Today, more than one billion people in the world are very poor and suffer from food insecurity. This study aimed to determine the prevalence of household food insecurity and related factors in Zahedan, in South-East of Iran.\nMethods: This cross-sectional study was conducted on 2,160 households in Zahedan. Demographic and socio-economic data were collected through interview with mother or person responsible for preparing food for the family. Food insecurity of the household was assessed through USDA 18- items questionnaire. Using χ2 test and One-way ANOVA the data were analyzed. Logistic regression model was used to identify the association between selected variables and food insecurity.\nResults: 58.8% of participants experienced food insecurity (31.7%, food insecurity without hunger, 19.7% with moderate hunger and 7.4%, severe hunger). Education status, employment status, age and ethnicity of household head, as well as education, age, and employment status of mother household showed a significant association (P<0.001) with household food insecurity status.\nConclusion: The results showed that more than half of the households in overcrowded situation of food insecurity that brings more attention to these households. Interventions or dietary supplement income families are not eradicate food insecurity because of insecurity simply out of poverty not economical. Interventions to improve the eating habits of low-income people should be trained to improve their knowledge, skills and attitudes related to healthy eating, food prepration, as well as improve access and availability to healthy foods, and how to healthy food selection, especially with a limited budget, focused.
. This article is concerned about client side issues of web resources load process related to user agents (browsers) behavior. A lot of modern problems with current load algorithms are investigated and all known solutions with their area or efficiency are compared. Also a simple way to make decision about every aspect of client side productivity of web resources is offered with detailed explanations.
The differential transformation method (DTM) is applied to solve the second ordered random differential equations. Several examples are represented to demonstrate the effectiveness of the proposed method. The results show that DTM is an efficient and accurate technique for finding exact and approximate solutions.
In this paper, we introduce more general extreme value distribution under\npower normalization (GEVP). Box-Cox transformation is used for generalized\npareto distribution under power normalization (GPDP) and generalized ex-\ntreme value distribution under power normalization (GEVP). likelihood ratio\ntest is used for comparison between them, there are strongly rejected in favor\nof the newly proposed Box-Cox-GEVP distribution.
Dendritic cell (DC) culture offers a cornerstone for immunological studies; however, its detailed procedures are not very well standardized. This situation has resulted in puzzling ambiguities in attempting to understand the findings resulting from the usage of cultured DCs. This work is designed to optimize the procedure for DC generation, including the initial seeding density of bone marrow-derived mononuclear cells, the application of IL-4 and lipopolysaccharide (LPS), and the methods of cultural medium changing and suspended cell discarding. Furthermore, we discriminate the cultured DCs as subsets of non-adherent, adherent and mixed cells to evaluate their immunological characteristics. The culture system has been proven promising by the DC yield, morphology, purity, viability, and maturation. Remarkably, the cultured DCs’ heterogenic features are identified by cytokine secretion, maturation status and capability to activate allogeneic T cells according to the different subsets; this should be particularly emphasized in immunological investigations when using cultured DCs.