Series-5 (May-June 2019)May-June 2019 Issue Statistics
Series-1 Series-2 Series-3 Series-4 Series-5 Series-6
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | MahmoodTarzi the Founder of Modern Dari Persian Poetry |
Country | : | Afghanistan |
Authors | : | Dr. Dina Mohseni |
: | 10.9790/0661-2103050104 |
Abstract: Having its old and rich tradition, Dari literature has been affected by Western world literature which has had a great effect on enrichment of Dari literature. The Enlightenment's period poems in second decade of the first 20th century in term of content and sometimes selection of format were new.Mahmood Tarzi was the first one who introduced the content poem in Afghanistan and by doing a variety of tasks in political, cultural, social, civil, legal and militaries that resulted in people's awareness in Afghan society. It formed literature creativity, new theories and established modern poem that very soon drew Iran and Tajikistan's attention. In 1921, the first contemporary poem was written........
Keywords:poem, contemporary poem, Tarzi
[1]. Habib, A. (1366). Dari literature in the first half of 20th century. Kabul. Kabul University.
[2]. Qavem, A. (1382). Literal life of Alama Mahmood Tarzi.Khurasan magazin.Fourth volume.
[3]. Saeedi, N. (1360). New poem in Afghanistan.Zhwandon magazine. Volume 24.
[4]. Saham. N, (1367). Mahmood Tarzi. Kabul. Government Press.
[5]. Sakhawarz, B. (1386). Tarzi and Sarajulakhbar.Tehran: Erfan
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Acupuncture Treatment for Postpartum Lactation |
Country | : | |
Authors | : | Wei Lijiao || Zhang Qi || Zhao Shan |
: | 10.9790/0661-2103050509 |
Abstract: Due to the influence of high work pressure, fast pace of life and the age tendency of puerpera after the implementation of the two-child policy in China, more than 80% of modern puerpera suffer from lactation difficulties, such as lack of milk, and even up to 90% in first-tier cities. Acupuncture, as a traditional Chinese medicine nursing technique, has the advantages of quick onset, few side effects and simple operation in the treatment of postpartum lactation. In order to provide scientific guidance for the diagnosis and treatment of postpartum lactation, this paper reviews the literature on the treatment of postpartum lactation with acupuncture.
Keywords:Acupuncture; Postpartum lactation; review.
[1]. Fu Xiuxia. Effect observation of rapid acupuncture combined with massage on postpartum lactation[J]. Chinese general practice, 2011, 9(06): 923+937.
[2]. An Dong, Zhou Chen, Dong Yuan-kui, et al. Research progress of traditional Chinese medicine in the treatment of postpartum lactation[J]. Journal of acupuncture and moxification, 2017, 33(05): 81-84.
[3]. Zheng Guizhen. Clinical research on acupuncture treatment of postpartum lactation[D]. Guang zhou university of traditional Chinese medicine, 2015.
[4]. Wang Na. Clinical comparative study on the treatment of lactation deficiency after cesarean section with acupuncture Tan zhong, milk root and zu san li[D]. Xinjiang medical university, 2015.
[5]. Zhang Shanshan. Correlation between postpartum lactation and physical fitness and other factors[D]. Henan university of traditional Chinese medicine, 2016.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Research Progress of Harmonious Doctor-Patient Relationship |
Country | : | |
Authors | : | Wei Lijiao || Zhang Qi || Zhao Shan |
: | 10.9790/0661-2103051014 |
Abstract: With Chinese medical and health services continue to develop and the national health level continues to improve, the doctor-patient relationship has been eased, but incidents of humiliation and injury have occurred from time to time. As a special social relationship, the doctor-patient relationship shows different development status in different social and historical stages. After long-term development, the developed countries in foreign have formed the doctor-patient relationship suitable to the market economy. Due to China is in the period of social and economic transformation, the doctor-patient relationship is strained compared with developed countries. Based on the definition, current situation and influencing factors of harmonious doctor-patient relationship, this paper describes the research progress of harmonious doctor-patient relationship.
Keywords: Harmonious; Doctor-patient relationship; Systemic review
[1]. Zhou Hongzhen, Zhu Minfang, Yang Lei, et al. Research on harmonious doctor-patient relationship from the perspective of harmonious management and organization theory [J]. Chinese medical ethics, 2017, 29(12): 1488-1491.
[2]. Huang Yusheng. Discussion on building harmonious doctor-patient relationship [J]. Chinese journal of hospital management, 2005, 21(6): 418-420.
[3]. Gao Jianqun, Li Ruo, Chen Qing. Exploration of some historical backgrounds of doctor-patient relationship in China [J]. Medicine and philosophy, 1987, 8(7): 31-33.
[4]. Yin Xiuyun. The crux of the deterioration of doctor-patient relationship from the perspective of historical evolution[J]. Chinese medical ethics, 2007, 20(4): 54-59.
[5]. Bo Ning, Yue Changhong, Li Zhonghua. Analysis of non-technical factors of medical prescriptions leading to the tension between doctors and patients[J]. Chinese medical ethics, 2009, 22(01): 47-48.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Military in National Development: An Appraisal of the Nigerian Armed Forces |
Country | : | Nigeria |
Authors | : | ES BUBA |
: | 10.9790/0661-2103051519 |
Abstract: The main argument of thispaper is that military roles in the state goes beyond deployment for internal security operations (ISOs). The paper argued for involvement of the military in development activities. It drew appropriate examples from some countries where it is practiced. It appraised the roles of the Nigeria military and argued that the Nigerian military have continually maintained the traditional roles being deployed for internal security operations. The paper argued that these operations often results in collateral damage and violation of human rights which creates public resent and distrust of the Nigeria military. It therefore suggested that such narrative could be changed when the Nigeria military is equally assigned development roles.
Keywords: Military and National Development
............
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Android Application Memory and Energy Performance: Systematic Literature Review |
Country | : | Ethiopia |
Authors | : | Abebaw Degu |
: | 10.9790/0661-2103052032 |
Abstract: Android application is becoming critical in our daily lives by helping and enabling us to compute service intensive applications easily. These android applications run on smartphone mobile device which is relatively short of resources than computers. Android mobile applications require different approach for applications quality and efficient programming, analysis approach for better resource utilization such as memory and energy or battery, and for preventing and resolving resource leak behavior of apps. I have performed systematic literature review to categorize and to structure the research findings that has been published in the area of android application memory and energy performance, resource leaks, and performance testing techniques and challenges...........
Keywords: Android, Performance, Resource leak, Energy, Memory
[1]. A. Lewerentz and J. Lindvall, Performance and Energy Optimization for the Android Platform, 2012.
[2]. D. Li and W. G. J. Halfond, "An investigation into energy-saving programming practices for android smartphone app development," in Proceedings of the 3rd International Workshop on Green and Sustainable Software, 2014.
[3]. M. Nagappan and E. Shihab, "Future trends in software engineering research for mobile apps," in Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on, 2016.
[4]. M. Linares-V{\'a}squez, C. Vendome, Q. Luo and D. Poshyvanyk, "How developers detect and fix performance bottlenecks in android apps," in Software Maintenance and Evolution (ICSME), 2015 IEEE International Conference on, 2015.
[5]. S. Keele and others, "Guidelines for performing systematic literature reviews in software engineering," in Technical report, Ver. 2.3 EBSE Technical Report. EBSE, sn, 2007..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Segmentation and Classification of MRI Segment in Medical Automated Learning System |
Country | : | India |
Authors | : | V. Vinay Kumar |
: | 10.9790/0661-2103053339 |
Abstract: In the process of region localization, images are processed in multiple orders to finalize the segmentation region. In progress to region segmentation, the evolved regions are majorly been discarded due to loss of intermediate information's. These information losses are generated due to trace pixel enlargement or natural discontinuity. The second observing factor in region segmentation is the marking of small region patterns which are derived due to misclassification of actual and detected regions. the complexity of detection logic, due to recurrent coding is an additional factor to observe. In this paper, a new recurrent coding approach of region segmentation is proposed, overcoming the issue of region marking, discontinuity issue and small region miss-classification. The suggested approach is a simpler and robust to region detection, test over different MRI samples.
Keywords: Region marking, recurrent morphology, image segmentation, MRI samples
[1]. Cline HE, Lorensen E, Kikinis R, Jolesz F.Three-dimensional segmentation of MR images of the head using probability and connectivity. J Comput Assist Tomography 1990; 14:1037–1045.
[2]. Vannier MW, Butterfield RL, Rickman DL, Jordan DM, Murphy WA, Biondetti PR. Multispectral magnetic resonance image analysis. Radiology 1985; 154:221–224.
[3]. Just M, Thelen M. Tissue characterization with T1, T2, and proton-density values: results in 160 patients with brain tumors. Radiology 1988; 169:779–785.
[4]. Just M, Higer HP, Schwarz M, et al. Tissue characterization of benign tumors: use of NMR-tissue parameters. Magn Reson Imaging 1988; 6:463–472.
[5]. Gibbs P, Buckley DL, Blackband SJ, Horsman A. tumor volume determination from MR images by morphological segmentation. Phys Med Biol 1996; 41:2437–2446...
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Review on Phishing |
Country | : | |
Authors | : | Trupti V. Kantale || Mr. Lovely. S. Mutneja || Pooja W. Pawar || Mr. Shoeb A. Khan |
: | 10.9790/0661-2103054044 |
Abstract: The word PHISHING was discovered around 1996 by the hackers of America stealing online accounts and passwords which was the origin of phishing. Phishing is well known example of Social Engineering. Accessing personal information as well as financial credential by using malware or any social engineering platforms and which may then use by the 'phishers' for their personal gain is the primary goal of phishing technique. Email Spoofing and Instant Messaging are the two most relevant techniques used for phishing. In Email Spoofing and Instant Messaging techniques, unknowingly user enter their personal information and financial credential at a fake website which may look like real websites. This paper presents an overview about phishing origin in the first section and various techniques to avoid phishing in second section.
Keywords: Malware, Phishing, Anti-Phishing, Security Email Spoofing, Instant Messaging.
[1]. Anti-phishing Working Group (APWG) Trends Report 2018, https://www.antiphishing.org /resources/apwg-reports / 2018.
[2]. Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies published at IEEE explorer 176 - 181. 10.1109/ITNG.2010.117.
[3]. AntiPhishing_Phil_The_design_and_evaluation_of_a_game_that_teaches_people_not_to_fall_for_phish https://www.researchgate.net/publication/221166422_
[4]. Gartner Inc. (2014). Gartner study finds significant increase in e-mail phishing attacks. [www.gartner.com/5 about/press.
[5]. Venkata Prasad Reddy, V. Radha, Manik Jindal 2011," Client Side protection from Phishing attack" International Journal of Advanced Engineering Sciences and Technologies Vol No. 3, Issue No. 1, 039 – 045.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Due to rapid growth in cashless transaction, the chances of number of fraudulent transactions can also increasing. A Fraud transaction can be identified by analyzing various behaviors of credit card customers from previous transaction history datasets. If any deviation is noticed in spending behavior from available patterns, it is possibly of fraudulent transaction. Data mining and machine learning techniques are widely used in credit card fraud detection.In this paper is introduced best data mining algorithm called "machine learning algorithm", which is used to detect the...........
Keywords: AdaBoost, classification, machine learning, hybrid method, credit card, fraud detection, predictive modeling, voting.
[1]. Leite R. A., Gschwandtner T., Miksch S., Kriglstein S., Pohl M., Gstrein E., Kuntner J.: EVA: Visual Analytics to Identify Fraudulent Events. IEEE Transactions on Visualization and Computer Graphics Vol. 24, Issue: 1, (2018).
[2]. Randhawa K., Loo1 C. K., Seera M., Lim C. P., Nandi A. K.: Credit Card Fraud Detection Using AdaBoost and Majority Voting. IEEE Access, (2018).
[3]. Lin H., Gao S., Gotz D., Du F., He J., Cao N.: RCLens: Interactive Rare Category Exploration and Identification, IEEE Transactions on Visualization and Computer Graphics, (2017).
[4]. Chen Y., Wu C.: Big Data-Based Fraud Detection Method for Financial Statements of Business Groups, 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI), (2017).
[5]. Zeager M. F., Sridhar A., Fogal N., Adams S., Brown D. E., Beling P. A.: Adversarial Learning in Credit Card Fraud Detection, International Conference on Systems and Information Engineering Design Symposium (SIEDS), (2017).
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Peripheral areas are mainly characterized by inadequate access to basic services, infrastructure and social amenities. This study assessed the quality of houses and environment in Nagoyi urban fringe of Zaria, Kaduna State, Nigeria.The data used for the study are information on housing and environment such as types of buildings, number of occupants, nature of ownership, sources of water, sources of electricity, type of toilet, nature of road, etc. Both primary and secondary sources were explored in the study. On primary data, questionnaire was administered to 150..........
Keywords: Environment, Housing, Nagoyi fringe, Peripheral, Quality, Zaria
[1]. Abaje, I.B. S. Ishaya and M. Abashiya (2016). Evidence of Global warming on Statistical.
[2]. Analysis of temperature Data in Kaduna State.Nigeria Geographical Journal 11 (1): 125-140.
[3]. Abdulkadir, M.Y. (2014). Creating Geospatial Database for Secondary Schools in Zaria.
[4]. Education Zone.An Unpublished MSc. Department of Geography, Ahmadu Bello University, Zaria.
[5]. Adesina, A. (2007). Socio-spatial transformations and the urban fringe landscape in developing countries, United Nation University Institute for Environment and Human Security (UNU-UHS) Summer Academy on Social Vulnerability and Resilience Building in Mega city, Munich, Germany.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Reviews are the most important part that people look upon while purchasing a product online. The problem in the existing system is sometimes the user review and the rating mismatch each other. This happens when the user forgets to update either review or rating when the user updates the review or while providing a new rating for the product, the user might randomly put some wrong rating or undesired rating. The main aim of this project is to tell the user whether a product is good or bad based on the reviews provided by other users and to provide.........
Keywords: review, rating, classification, stemming, probability, KNN, Naïve Bayesian.
[1] Pang-Nin Tan, Michael Steinbach and Vipin Kumar "Introduction to Data Mining by Pearson Education" ISBN:9780321321367, Indian Edition 2014
[2] Jiawei Han, Micheline Kamber and Jian Pei "Data Mining Concepts and Techniques", by Moran Kaufmann Publishers, ISBN978-1-12-381479-1, Third Edition 2012
[3]. Lopamudra Dey, Sanjay Chakraborty, Anuraag Biswas, Beepa Bose, and Sweta Tiwari "Sentiment Analysis of Review Datasets using Naïve Bayes‟ and K-NN Classifier", Mon, 31 Oct 2016
[4]. Aashutosh Bhatt, Ankit Patel, Harsh Chheda, and Kiran Gawande "Amazon Review Classification and Sentiment Analysis", 2015 [5] Bayes theorem
en.wikipedia.org/wiki/Bayes%27_theorem.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Data mining is the system of expelling critical data from this overwhelmed Data, which bolsters in settling on valuable top tier choices in these fields. Visit thing set mining is a key advancement in discovering association rules. Association Rule Mining (ARM) is the fundamental scrap of Data mining, which predicts the relationship among various Data things. In this paper, the weight judgment slipping end property for weighted reliable itemsets and the proximity property of weighted dynamic subsets are presented and displayed first. The Fuzzy-based WARM fulfills the slipping end property and prunes the inconsequential gauges by entrusting the weight to the itemset. This decreases..........
Keywords: Frequent itemset mining, Weight judgment, Downward closure property, Smart system, Association Rule Mining (ARM),Data mining .
[1]. Xuejian Zhao, Xihui Zhang, Pan Wang, Songle Chen and Zhixin Sun " A weighted frequent itemset mining algorithm,"2016
[2]. C. K.-S. Leung, M. A. F. Mateo, and D. A. Brajczuk, "A tree-based approach for frequent pattern mining from uncertain data," in Proc.PAKDD, 2008, pp. 653 6621
[3]. L. Wang, L. Feng, and M. Wu, "AT-Mine: An effcient algorithm of frequent itemset mining on uncertain dataset," J. Comput., vol. 8, no. 6, 1417 1427, Jun. 2013.
[4]. G. Lee, U. Yun, and K. H. Ryu, "Sliding window based weighted maximal frequent pattern mining over data streams," Expert Syst. Appl., vol. 41, no. 2, pp. 694 708, Feb. 2014.
[5]. L. Yue, "Review of algorithm for mining frequent patterns from uncer-tain data," Int. J. Comput. Sci. Netw. Secur., vol. 15, no. 6, pp. 17 21, Jun. 2015.