Learn More
BACKGROUND The published literature on the prevalence and severity of dental caries and dental fluorosis among school going children in Nalgonda district - An Endemic Fluoride belt was lacking . OBJECTIVES To assess the prevalence and severity of dental fluorosis and dental caries among 12 and 15 years old children in relation to fluoride concentration in(More)
PURPOSE To directly compare in 1 population: (1) the performance of Optical Coherence Tomograph (OCT) and GDx-Variable Corneal Compensator (VCC) when using Wavelet-Fourier Analysis (WFA) and Fast-Fourier Analysis (FFA), (2) the performance of these shape-based and standard metrics, and (3) the shape of the retinal nerve fiber layer (RNFL) temporal,(More)
Bacteremia caused by gram-negative bacteria occasionally causes soft tissue infections, including cellulitis and septic arthritis. We describe 1 patient each with Campylobacter fetus cellulitis and septic arthritis and review the world literature with regard to C. fetus and C. jejuni infections at these sites. Altogether, 14 patients with cellulitis (12 due(More)
BACKGROUND The potential drawbacks of the existing antiplaque agents call for innovative strategies that are safe, effective, and easily available. OBJECTIVE The objective was to assess and compare antimicrobial efficacy of four plant extracts derived using hot and cold extraction methods against Streptococcus mutans, Streptococcus sanguis, and(More)
This paper presents a method of applying text mining techniques and data mining tools for pharmaceutical spam detection from Twitter data. A simple method based on a manually selected list of 65 pharmaceutical discriminating words is used for labeling spam training tweets. Preliminary experimental results show that J48 decision tree classifier has better(More)
New wireless technologies such as WiMAX, NFC and ZigBee are rapidly being adopted, along with existing wireless standards such as Bluetooth, Wi-Fi, GSM and other cellular technologies. Bluetooth and Wi-Fi have already become notorious for severe security shortcomings during their relatively brief existence. New vulnerabilities and exploits are reported and(More)
Text messages express the state of minds from a large population on earth. From the perspective of decision makers, this collection of messages provides a precious source of information. In this paper, we present the use of Weka data mining tools to extract useful information for classifying sentiment of tweets collected from Twitter. The results of tweet(More)
Many small and medium-sized companies that develop software experience the same problems repeatedly, and have few systems in place to learn from their own mistakes as well as their own successes. Here, we propose a lightweight method to collect experience from completed software projects, and compare the results of this method to more widely applied(More)
High quality digital video transmission requires efficient and reliable data communication over broadcasting channels as there is a risk of data corruption associated during transmission. The near channel performance of Low Density Parity Check Codes (LDPC) has motivated its use in second generation Digital Video Broadcasting (DVB) standards for mobile,(More)