Abstract: This paper reviews a number of theoretical aspects
for implementing an explicit spatial perspective in econometrics
for modelling non-continuous data, in general, and count data, in
particular. It provides an overview of the several spatial econometric
approaches that are available to model data that are collected with
reference to location in space, from the classical spatial econometrics
approaches to the recent developments on spatial econometrics to
model count data, in a Bayesian hierarchical setting. Considerable
attention is paid to the inferential framework, necessary for
structural consistent spatial econometric count models, incorporating
spatial lag autocorrelation, to the corresponding estimation and
testing procedures for different assumptions, to the constrains and
implications embedded in the various specifications in the literature. This review combines insights from the classical spatial
econometrics literature as well as from hierarchical modeling and
analysis of spatial data, in order to look for new possible directions
on the processing of count data, in a spatial hierarchical Bayesian
econometric context.
Abstract: Information security plays a major role in uplifting the standard of secured communications via global media. In this paper, we have suggested a technique of encryption followed by insertion before transmission. Here, we have implemented two different concepts to carry out the above-specified tasks. We have used a two-point crossover technique of the genetic algorithm to facilitate the encryption process. For each of the uniquely identified rows of pixels, different mathematical methodologies are applied for several conditions checking, in order to figure out all the parent pixels on which we perform the crossover operation. This is done by selecting two crossover points within the pixels thereby producing the newly encrypted child pixels, and hence the encrypted cover image. In the next lap, the first and second order derivative operators are evaluated to increase the security and robustness. The last lap further ensures reapplication of the crossover procedure to form the final stego-image. The complexity of this system as a whole is huge, thereby dissuading the third party interferences. Also, the embedding capacity is very high. Therefore, a larger amount of secret image information can be hidden. The imperceptible vision of the obtained stego-image clearly proves the proficiency of this approach.
Abstract: College students are expected to engage in an on-the-job training or internship for completion of a course requirement prior to graduation. In this scenario, they are exposed to the real world of work outside their training institution. To find out their readiness both emotionally and academically, this study has been conducted. A descriptive-correlational research design was employed and random sampling technique method was utilized among 265 randomly selected third year college students of PIT, SY 2014-15. A questionnaire on Emotional Intelligence (bearing the four components namely; emotional literacy, emotional quotient competence, values and beliefs and emotional quotient outcomes) was fielded to the respondents and GWA was extracted from the school automate. Data collected were statistically treated using percentage, weighted mean and Pearson-r for correlation.
Results revealed that respondents’ emotional intelligence level is moderately high while their academic performance is good. A high significant relationship was found between the EI component; Emotional Literacy and their academic performance while only significant relationship was found between Emotional Quotient Outcomes and their academic performance. Therefore, if EI influences academic performance significantly when correlated, a possibility that their OJT performance can also be affected either positively or negatively. Thus, EI can be considered predictor of their academic and academic-related performance. Based on the result, it is then recommended that the institution would try to look deeply into the consideration of embedding emotional intelligence as part of the (especially on Emotional Literacy and Emotional Quotient Outcomes of the students) college curriculum. It can be done if the school shall have an effective Emotional Intelligence framework or program manned by qualified and competent teachers, guidance counselors in different colleges in its implementation.
Abstract: This paper compares the findings of two studies conducted to determine the effectiveness of simulation-based, hands-on and feedback mechanism on students learning by answering the following questions: 1). Does the use of simulation improve students’ learning outcomes? 2). How do students perceive the instructional design features embedded in the simulation program such as exploration and scaffolding support in learning new concepts? 3.) What is the effect of feedback mechanisms on students’ learning in the use of simulation-based labs? The paper also discusses the other aspects of findings which reveal that simulation by itself is not very effective in promoting student learning. Simulation becomes effective when it is followed by hands-on activity and feedback mechanisms. Furthermore, the paper presents recommendations for improving student learning through the use of simulation-based, hands-on, and feedback-based teaching methodologies.
Abstract: In this work, we propose an algorithm developed under Python language for the modeling of ordinary scalar Bessel beams and their discrete superpositions and subsequent calculation of optical forces exerted over dielectric spherical particles. The mathematical formalism, based on the generalized Lorenz-Mie theory, is implemented in Python for its large number of free mathematical (as SciPy and NumPy), data visualization (Matplotlib and PyJamas) and multiprocessing libraries. We also propose an approach, provided by a synchronized Software as Service (SaaS) in cloud computing, to develop a user interface embedded on a mobile application, thus providing users with the necessary means to easily introduce desired unknowns and parameters and see the graphical outcomes of the simulations right at their mobile devices. Initially proposed as a free Android-based application, such an App enables data post-processing in cloud-based architectures and visualization of results, figures and numerical tables.
Abstract: AmI proposes a new way of thinking about computers, which follows the ideas of the Ubiquitous Computing vision of Mark Weiser. In these, there is what is known as a Disappearing Computer Initiative, with users immersed in intelligent environments. Hence, technologies need to be adapted so that they are capable of replacing the traditional inputs to the system by embedding these in every-day artifacts. In this work, we present an approach, which uses Radiofrequency Identification (RFID) and Near Field Communication (NFC) technologies. In the latter, a new form of interaction appears by contact. We compare both technologies by analyzing their requirements and advantages. In addition, we propose using a combination of RFID and NFC.
Abstract: This project aims at building an efficient and
automatic power monitoring SCADA system, which is capable of
monitoring the electrical parameters of high voltage powered devices
in real time for example RMS voltage and current, frequency, energy
consumed, power factor etc. The system uses RS-485 serial
communication interface to transfer data over longer distances.
Embedded C programming is the platform used to develop two
hardware modules namely: RTU and Master Station modules, which
both use the CC2540 BLE 4.0 microcontroller configured in slave /
master mode. The Si8900 galvanic ally isolated microchip is used to
perform ADC externally. The hardware communicates via UART
port and sends data to the user PC using the USB port. Labview
software is used to design a user interface to display current state of
the power loads being monitored as well as logs data to excel
spreadsheet file. An understanding of the Si8900’s auto baud rate
process is key to successful implementation of this project.
Abstract: The aim of this article is to identify the measures
companies undertake in order to adapt to the environment as well as
discussing their diversity and effectiveness. The research methods
used in the study include an in-depth analysis of the literature and a
case study, which helps to illustrate the issue in question. Referring to
the concept of agility, which is firmly embedded in the theory of
strategic management and has been developed with the aim of
adapting to the environment and its changes, the paper first examines
different types of adaptation measures for companies. Then the issue
under discussion is illustrated with the example of the company
Hortimex. This company is an eminent representative of the world’s
leading manufacturers of food additives and ingredients. The
company was established in 1988 and is a family business, which in
practice means that it conducts business in a responsible manner,
observing the law and respecting the interests of society and the
environment. The company’s mission is to develop a market in
Poland for the products and solutions offered by their partners and to
share their knowledge of additives in food production and
consumption.
Abstract: The cumulative costs for O&M may represent as
much as 65%-90% of the turbine's investment cost. Nowadays the
cost effectiveness concept becomes a decision-making and
technology evaluation metric. The cost of energy metric accounts for
the effect replacement cost and unscheduled maintenance cost
parameters. One key of the proposed approach is the idea of
maintaining the WTs which can be captured via use of a finite state
Markov chain. Such a model can be embedded within a probabilistic
operation and maintenance simulation reflecting the action to be
done. In this paper, an approach of estimating the cost of O&M is
presented. The finite state Markov model is used for decision
problems with number of determined periods (life cycle) to predict
the cost according to various options of maintenance.
Abstract: The very well-known stacked sets of numbers referred
to as Pascal’s triangle present the coefficients of the binomial
expansion of the form (x+y)n. This paper presents an approach (the
Staircase Horizontal Vertical, SHV-method) to the generalization of
planar Pascal’s triangle for polynomial expansion of the form
(x+y+z+w+r+⋯)n. The presented generalization of Pascal’s triangle
is different from other generalizations of Pascal’s triangles given in
the literature. The coefficients of the generalized Pascal’s triangles,
presented in this work, are generated by inspection, using embedded
Pascal’s triangles. The coefficients of I-variables expansion are
generated by horizontally laying out the Pascal’s elements of (I-1)
variables expansion, in a staircase manner, and multiplying them with
the relevant columns of vertically laid out classical Pascal’s elements,
hence avoiding factorial calculations for generating the coefficients
of the polynomial expansion. Furthermore, the classical Pascal’s
triangle has some pattern built into it regarding its odd and even
numbers. Such pattern is known as the Sierpinski’s triangle. In this
study, a presentation of Sierpinski-like patterns of the generalized
Pascal’s triangles is given. Applications related to those coefficients
of the binomial expansion (Pascal’s triangle), or polynomial
expansion (generalized Pascal’s triangles) can be in areas of
combinatorics, and probabilities.
Abstract: This paper presents the design and analysis of Liquid Crystal (LC) based tunable reflectarray antenna with slot embedded patch element configurations within X-band frequency range. The slots are shown to modify the surface current distribution on the patch element of reflectarray which causes the resonant patch element to provide different resonant frequencies depending on the slot dimensions. The simulated results are supported and verified by waveguide scattering parameter measurements of different reflectarray unit cells. Different rectangular slots on patch element have been fabricated and a change in resonant frequency from 10.46GHz to 8.78GHz has been demonstrated as the width of the rectangular slot is varied from 0.2W to 0.6W. The rectangular slot in the center of the patch element has also been utilized for the frequency tunable reflectarray antenna design based on K-15 Nematic LC. For the active reflectarray antenna design, a frequency tunability of 1.2% from 10GHz to 9.88GHz has been demonstrated with a dynamic phase range of 103° provided by the measured scattering parameter results. Time consumed by liquid crystals for reconfiguration, which is one of the drawback of LC based design, has also been disused in this paper.
Abstract: This paper looks at healing performances as
ethnographic expressions of local knowledge and culture embedded
within the Malay psyche and gemeinschaft. As society develops and
progresses, these healing performances are caught within conflicting
trajectories which become compounded by the contestations of
tradition, religious concerns, locality and modernity. As
exemplifications of the Malay ethos, these performances practice
common rituals, cater to the innate needs of the practitioners and
serve the targeted, closed, local community. This paper traces the
ethnographic methods in documenting these practices as rituals of
healing in a post-modern world. It delineates the ethnographic
concepts used to analyze these rituals, and to semiotically read the
varied binarial oppositions and juxtapositions. The paper concludes
by highlighting the reconciliatory processes involved in maintaining
these ritual performances as exemplifications of the Malay ethos
playing an important role in the re-aligning, re-balancing and healing
of the Malay community’s psyche.
Abstract: This paper presents the heat and mass driven natural
convection succession in a Darcy thermally stratified porous medium
that embeds a vertical semi-infinite impermeable wall of constant
heat flux and concentration. The scale analysis of the system
determines the two possible maps of the heat and mass driven natural
convection sequence along the wall as a function of the process
parameters. These results are verified using the finite differences
method applied to the conservation equations.
Abstract: Introduction: To update ourselves and understand the
concept of latest electronic formats available for Health care
providers and how it could be used and developed as per standards.
The idea is to correlate between the patients Manual Medical Records
keeping and maintaining patients Electronic Information in a Health
care setup in this world. Furthermore, this stands with adapting to the
right technology depending upon the organization and improve our
quality and quantity of Healthcare providing skills. Objective: The
concept and theory is to explain the terms of Electronic Medical
Record (EMR), Electronic Health Record (EHR) and Personal Health
Record (PHR) and selecting the best technical among the available
Electronic sources and software before implementing. It is to guide
and make sure the technology used by the end users without any
doubts and difficulties. The idea is to evaluate is to admire the uses
and barriers of EMR-EHR-PHR. Aim and Scope: The target is to
achieve the health care providers like Physicians, Nurses, Therapists,
Medical Bill reimbursements, Insurances and Government to assess
the patient’s information on easy and systematic manner without
diluting the confidentiality of patient’s information. Method: Health
Information Technology can be implemented with the help of
Organisations providing with legal guidelines and help to stand by
the health care provider. The main objective is to select the correct
embedded and affordable database management software and
generating large-scale data. The parallel need is to know how the
latest software available in the market. Conclusion: The question lies
here is implementing the Electronic information system with
healthcare providers and organization. The clinicians are the main
users of the technology and manage us to “go paperless”. The fact is
that day today changing technologically is very sound and up to date.
Basically, the idea is to tell how to store the data electronically safe
and secure. All three exemplifies the fact that an electronic format
has its own benefit as well as barriers.
Abstract: In order to retrieve images efficiently from a large
database, a unique method integrating color and texture features
using genetic programming has been proposed. Opponent color
histogram which gives shadow, shade, and light intensity invariant
property is employed in the proposed framework for extracting color
features. For texture feature extraction, fast discrete curvelet
transform which captures more orientation information at different
scales is incorporated to represent curved like edges. The recent
scenario in the issues of image retrieval is to reduce the semantic gap
between user’s preference and low level features. To address this
concern, genetic algorithm combined with relevance feedback is
embedded to reduce semantic gap and retrieve user’s preference
images. Extensive and comparative experiments have been conducted
to evaluate proposed framework for content based image retrieval on
two databases, i.e., COIL-100 and Corel-1000. Experimental results
clearly show that the proposed system surpassed other existing
systems in terms of precision and recall. The proposed work achieves
highest performance with average precision of 88.2% on COIL-100
and 76.3% on Corel, the average recall of 69.9% on COIL and 76.3%
on Corel. Thus, the experimental results confirm that the proposed
content based image retrieval system architecture attains better
solution for image retrieval.
Abstract: In this paper, an attempt has been made for the design
of a robotic library using an intelligent system. The robot works on
the ARM microprocessor, motor driver circuit with 5 degrees of
freedom with Wi-Fi and GPS based communication protocol. The
authenticity of the library books is controlled by RFID. The proposed
robotic library system is facilitated with embedded system and ARM.
In this library issuance system, the previous potential readers’
authentic review reports have been taken into consideration for
recommending suitable books to the deserving new users and the
issuance of books or periodicals is based on the users’ decision. We
have conjectured that the Wi-Fi based robotic library management
system would allow fast transaction of books issuance and it also
produces quality readers.
Abstract: Test automation allows performing difficult and time
consuming manual software testing tasks efficiently, quickly and
repeatedly. However, development and maintenance of automated
tests is expensive, so it needs a proper prioritization what to automate
first. This paper describes a simple yet efficient approach for such
prioritization of test cases based on the effort needed for both manual
execution and software test automation. The suggested approach is
very flexible because it allows working with a variety of assessment
methods, and adding or removing new candidates at any time. The
theoretical ideas presented in this article have been successfully
applied in real world situations in several software companies by the
authors and their colleagues including testing of real estate websites,
cryptographic and authentication solutions, OSGi-based middleware
framework that has been applied in various systems for smart homes,
connected cars, production plants, sensors, home appliances, car head
units and engine control units (ECU), vending machines, medical
devices, industry equipment and other devices that either contain or
are connected to an embedded service gateway.
Abstract: Cochlear Implantation (CI) which became a routine
procedure for the last decades is an electronic device that provides a
sense of sound for patients who are severely and profoundly deaf.
The optimal success of this implantation depends on the electrode
technology and deep insertion techniques. However, this manual
insertion procedure may cause mechanical trauma which can lead to
severe destruction of the delicate intracochlear structure.
Accordingly, future improvement of the cochlear electrode implant
insertion needs reduction of the excessive force application during
the cochlear implantation which causes tissue damage and trauma.
This study is examined tool-tissue interaction of large prototype scale
digit embedded with distributive tactile sensor based upon cochlear
electrode and large prototype scale cochlea phantom for simulating
the human cochlear which could lead to small scale digit
requirements. The digit, distributive tactile sensors embedded with
silicon-substrate was inserted into the cochlea phantom to measure
any digit/phantom interaction and position of the digit in order to
minimize tissue and trauma damage during the electrode cochlear
insertion. The digit have provided tactile information from the digitphantom
insertion interaction such as contact status, tip penetration,
obstacles, relative shape and location, contact orientation and
multiple contacts. The tests demonstrated that even devices of such a
relative simple design with low cost have potential to improve
cochlear implant surgery and other lumen mapping applications by
providing tactile sensory feedback information and thus controlling
the insertion through sensing and control of the tip of the implant
during the insertion. In that approach, the surgeon could minimize the
tissue damage and potential damage to the delicate structures within
the cochlear caused by current manual electrode insertion of the
cochlear implantation. This approach also can be applied to other
minimally invasive surgery applications as well as diagnosis and path
navigation procedures.
Abstract: Since the advances in digital imaging technologies have led to
development of high quality digital devices, there are a lot of illegal copies
of copyrighted video content on the Internet. Also, unauthorized editing is
occurred frequently. Thus, we propose an editing prevention technique for
high-quality (HQ) video that can prevent these illegally edited copies from
spreading out. The proposed technique is applied spatial and temporal gradient
methods to improve the fidelity and detection performance. Also, the scheme
duplicates the embedding signal temporally to alleviate the signal reduction
caused by geometric and signal-processing distortions. Experimental results
show that the proposed scheme achieves better performance than previously
proposed schemes and it has high fidelity. The proposed scheme can be used
in unauthorized access prevention method of visual communication or traitor
tracking applications which need fast detection process to prevent illegally
edited video content from spreading out.
Abstract: Much of the literature on research design has focused
on research conducted in developed, uni-cultural or primarily English
speaking countries. Studies of qualitative case study research, the
challenges, and prospects have been embedded in Western/Eurocentric
society and social theories. Although there have been some
theoretical studies, few empirical studies have been conducted to
explore the nature of the challenges of qualitative case study in
developing countries. These challenges include accessibility to
organizations, conducting interviews in developing countries,
accessing documents and observing official meetings, language and
cultural challenges, the use of consent forms, issues affecting access
to companies, respondent issues, and data analysis. The author, while
conducting qualitative case study research in Libya, faced all these
issues. The discussion in this paper examines these issues in order to
make a contribution toward the literature in this area.