Daily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset ijtsrd
Human activity recognition is an important area of machine learning research as it has much utilization in different areas such as sports training, security, entertainment, ambient assisted living, and health monitoring and management. Studying human activity recognition shows that researchers are interested mostly in the daily activities of the human. Nowadays mobile phone is well […]
Sentiment Analysis on Twitter Dataset using R Language ijtsrd
Sentiment Analysis involves determining the evaluative nature of a piece of text. A product review can express a positive, negative, or neutral sentiment or polarity . Automatically identifying sentiment expressed in text has a number of applications, including tracking sentiment towards Movie reviews and Automobile reviews improving customer relation models, detecting happiness and well being, […]
Effect of Grafted Silane on Fly Ash Pha Lai – Vietnam to Properties of Polymer Composite Materials Based on Bisphenol A Type Epoxy Resin ijtsrd
Recently, there has been much research on fly ash and its use as a filler in polymer composite materials. However, interfacial adhesion of fly ash with polymer matrix is weak. So, fly ash must be treated to improve interfacial adhesion. This paper reports effect of surface treatments of fly ash particles to mechanical, thermal properties […]
A Theoretical Study on Green Concrete Construction ijtsrd
Concrete which are taken from the demolished structures or from concrete waste which are considered to be eco friendly and using it for the purpose of another building construction is called as green concrete construction. This helps to make the future construction eco friendly and also reduce the emission of CO2. Now a days global […]
Security and Challenges using Clouds Computing in Healthcare Management System ijtsrd
Today’s IT world is progressively used in healthcare with the goal to improve and develop the medical services and to reduce costs. Records are very delicate that should not be made available to unauthorized people for protecting patients information security. In this context cloud computing became trend of information technology which allows more efficient computing […]