Abstract: The goal of this work is to improve the efficiency and the reliability of the automatic artifact rejection, in particular from the Electroencephalographic (EEG) recordings. Artifact rejection is a key topic in signal processing. The artifacts are unwelcome signals that may occur during the signal acquisition and that may alter the analysis of the signals themselves. A technique for the automatic artifact rejection, based on the Independent Component Analysis (ICA) for the artifact extraction and on some high order statistics such as kurtosis and Shannon-s entropy, was proposed some years ago in literature. In this paper we enhance this technique introducing the Renyi-s entropy. The performance of our method was tested exploiting the Independent Component scalp maps and it was compared to the performance of the method in literature and it showed to outperform it.
Abstract: Never has a revolution affected all aspects of
humanity as the communication revolution during the past two
decades. This revolution, with all its advances and utilities, swept the
world thus becoming an integral part of our lives, hence giving way
to emerging applications at the social, economic, political, and
educational levels. More specifically, such applications have changed
the delivery system through which learning is acquired by students.
Interaction with educators, accessibility to content, and creative
delivery options are but a few facets of the new learning experience
now being offered through the use of technology in the educational
field. With different success rates, third world countries have tried to
pace themselves with use of educational technology in advanced
parts of the world. One such country is the small rich-oil state of
Kuwait which has tried to adopt the e-educational model, however,
an evaluation of such trial is yet to be done. This study aimed to fill
the void of research conducted around that topic. The study explored
students' acceptance of incorporating communication technologies in
higher education in Kuwait. Students' responses to survey questions
presented an overview of the e-learning experience in this country,
and drew a framework through which implications and suggestions
for future research were discussed to better serve the advancement of
e-education in developing countries.
Abstract: To realize the vision of ubiquitous computing, it is
important to develop a context-aware infrastructure which can help
ubiquitous agents, services, and devices become aware of their
contexts because such computational entities need to adapt themselves
to changing situations. A context-aware infrastructure manages the
context model representing contextual information and provides
appropriate information. In this paper, we introduce Context-Aware
Middleware for URC System (hereafter CAMUS) as a context-aware
infrastructure for a network-based intelligent robot system and discuss
the ontology-based context modeling and reasoning approach which is
used in that infrastructure.
Abstract: Salinity is a measure of the amount of salts in the
water. Total Dissolved Solids (TDS) as salinity parameter are often
determined using laborious and time consuming laboratory tests, but
it may be more appropriate and economical to develop a method
which uses a more simple soil salinity index. Because dissolved ions
increase salinity as well as conductivity, the two measures are
related. The aim of this research was determine of constant
coefficients for predicting of Total Dissolved Solids (TDS) based on
Electrical Conductivity (EC) with Statistics of Correlation
coefficient, Root mean square error, Maximum error, Mean Bias
error, Mean absolute error, Relative error and Coefficient of residual
mass. For this purpose, two experimental areas (S1, S2) of Khuzestan
province-IRAN were selected and four treatments with three
replications by series of double rings were applied. The treatments
were included 25cm, 50cm, 75cm and 100cm water application. The
results showed the values 16.3 & 12.4 were the best constant
coefficients for predicting of Total Dissolved Solids (TDS) based on
EC in Pilot S1 and S2 with correlation coefficient 0.977 & 0.997 and
191.1 & 106.1 Root mean square errors (RMSE) respectively.
Abstract: Several methods have been proposed for color image
compression but the reconstructed image had very low signal to noise
ratio which made it inefficient. This paper describes a lossy
compression technique for color images which overcomes the
drawbacks. The technique works on spatial domain where the pixel
values of RGB planes of the input color image is mapped onto two
dimensional planes. The proposed technique produced better results
than JPEG2000, 2DPCA and a comparative study is reported based
on the image quality measures such as PSNR and MSE.Experiments
on real time images are shown that compare this methodology with
previous ones and demonstrate its advantages.
Abstract: In this paper a novel method for multiple one dimensional real valued sinusoidal signal frequency estimation in the presence of additive Gaussian noise is postulated. A computationally simple frequency estimation method with efficient statistical performance is attractive in many array signal processing applications. The prime focus of this paper is to combine the subspace-based technique and a simple peak search approach. This paper presents a variant of the Propagator Method (PM), where a collaborative approach of SUMWE and Propagator method is applied in order to estimate the multiple real valued sine wave frequencies. A new data model is proposed, which gives the dimension of the signal subspace is equal to the number of frequencies present in the observation. But, the signal subspace dimension is twice the number of frequencies in the conventional MUSIC method for estimating frequencies of real-valued sinusoidal signal. The statistical analysis of the proposed method is studied, and the explicit expression of asymptotic (large-sample) mean-squared-error (MSE) or variance of the estimation error is derived. The performance of the method is demonstrated, and the theoretical analysis is substantiated through numerical examples. The proposed method can achieve sustainable high estimation accuracy and frequency resolution at a lower SNR, which is verified by simulation by comparing with conventional MUSIC, ESPRIT and Propagator Method.
Abstract: Echocardiography imaging is one of the most common diagnostic tests that are widely used for assessing the abnormalities of the regional heart ventricle function. The main goal of the image enhancement task in 2D-echocardiography (2DE) is to solve two major anatomical structure problems; speckle noise and low quality. Therefore, speckle noise reduction is one of the important steps that used as a pre-processing to reduce the distortion effects in 2DE image segmentation. In this paper, we present the common filters that based on some form of low-pass spatial smoothing filters such as Mean, Gaussian, and Median. The Laplacian filter was used as a high-pass sharpening filter. A comparative analysis was presented to test the effectiveness of these filters after being applied to original 2DE images of 4-chamber and 2-chamber views. Three statistical quantity measures: root mean square error (RMSE), peak signal-to-ratio (PSNR) and signal-tonoise ratio (SNR) are used to evaluate the filter performance quantitatively on the output enhanced image.
Abstract: In this paper, subtractive clustering based fuzzy inference system approach is used for early detection of faults in the function oriented software systems. This approach has been tested with real time defect datasets of NASA software projects named as PC1 and CM1. Both the code based model and joined model (combination of the requirement and code based metrics) of the datasets are used for training and testing of the proposed approach. The performance of the models is recorded in terms of Accuracy, MAE and RMSE values. The performance of the proposed approach is better in case of Joined Model. As evidenced from the results obtained it can be concluded that Clustering and fuzzy logic together provide a simple yet powerful means to model the earlier detection of faults in the function oriented software systems.
Abstract: The wireless adhoc network is comprised of wireless
node which can move freely and are connected among themselves
without central infrastructure. Due to the limited transmission range
of wireless interfaces, in most cases communication has to be relayed
over intermediate nodes. Thus, in such multihop network each node
(also called router) is independent, self-reliant and capable to route
the messages over the dynamic network topology. Various protocols
are reported in this field and it is very difficult to decide the best one.
A key issue in deciding which type of routing protocol is best for
adhoc networks is the communication overhead incurred by the
protocol. In this paper STAR a table driven and DSR on demand
protocols based on IEEE 802.11 are analyzed for their performance
on different performance measuring metrics versus varying traffic
CBR load using QualNet 5.0.2 network simulator.
Abstract: An artificial neural network (ANN) model is
presented for the prediction of kinematic viscosity of binary mixtures
of poly (ethylene glycol) (PEG) in water as a function of temperature,
number-average molecular weight and mass fraction. Kinematic
viscosities data of aqueous solutions for PEG (0.55419×10-6 –
9.875×10-6 m2/s) were obtained from the literature for a wide range
of temperatures (277.15 - 338.15 K), number-average molecular
weight (200 -10000), and mass fraction (0.0 – 1.0). A three layer
feed-forward artificial neural network was employed. This model
predicts the kinematic viscosity with a mean square error (MSE) of
0.281 and the coefficient of determination (R2) of 0.983. The results
show that the kinematic viscosity of binary mixture of PEG in water
could be successfully predicted using an artificial neural network
model.
Abstract: The advancement of smartphones, wireless
networking and Near Field Communication (NFC) technology have
opened up a new approach to indoor navigation. Although NFC
technology has been used to support electronic commerce, access
control, and ticketing, there is a lack of research work on building
NFC-based indoor navigation system for smartphone users. This
paper presents an indoor interactive navigation system (named
I2Navi) based on NFC technology for users to navigate within a
building with ease using their smartphones. The I2Navi system has
been implemented at the Faculty of Engineering (FOE), Multimedia
University (MMU) to enable students, parents, visitors who own
NFC-enabled Android smartphones to navigate themselves within the
faculty. An evaluation is carried out and the results show positive
response to the proposed indoor navigation system using NFC and
smartphone technologies.
Abstract: Nowadays, several techniques such as; Fuzzy
Inference System (FIS) and Neural Network (NN) are employed for
developing of the predictive models to estimate parameters of water
quality. The main objective of this study is to compare between the
predictive ability of the Adaptive Neuro-Fuzzy Inference System
(ANFIS) model and Artificial Neural Network (ANN) model to
estimate the Biochemical Oxygen Demand (BOD) on data from 11
sampling sites of Saen Saep canal in Bangkok, Thailand. The data is
obtained from the Department of Drainage and Sewerage, Bangkok
Metropolitan Administration, during 2004-2011. The five parameters
of water quality namely Dissolved Oxygen (DO), Chemical Oxygen
Demand (COD), Ammonia Nitrogen (NH3N), Nitrate Nitrogen
(NO3N), and Total Coliform bacteria (T-coliform) are used as the
input of the models. These water quality indices affect the
biochemical oxygen demand. The experimental results indicate that
the ANN model provides a higher correlation coefficient (R=0.73)
and a lower root mean square error (RMSE=4.53) than the
corresponding ANFIS model.
Abstract: We consider optimal channel equalization for MIMO
(multi-input/multi-output) time-varying channels in the sense of
MMSE (minimum mean-squared-error), where the observation noise
can be non-stationary. We show that all ZF (zero-forcing) receivers
can be parameterized in an affine form which eliminates completely
the ISI (inter-symbol-interference), and optimal channel equalizers
can be designed through minimization of the MSE (mean-squarederror)
between the detected signals and the transmitted signals,
among all ZF receivers. We demonstrate that the optimal channel
equalizer is a modified Kalman filter, and show that under the AWGN
(additive white Gaussian noise) assumption, the proposed optimal
channel equalizer minimizes the BER (bit error rate) among all
possible ZF receivers. Our results are applicable to optimal channel
equalization for DWMT (discrete wavelet multitone), multirate transmultiplexers,
OFDM (orthogonal frequency division multiplexing),
and DS (direct sequence) CDMA (code division multiple access)
wireless data communication systems. A design algorithm for optimal
channel equalization is developed, and several simulation examples
are worked out to illustrate the proposed design algorithm.
Abstract: Drying characteristics of rough rice (variety of lenjan) with an initial moisture content of 25% dry basis (db) was studied in a hot air dryer assisted by infrared heating. Three arrival air temperatures (30, 40 and 500C) and four infrared radiation intensities (0, 0.2 , 0.4 and 0.6 W/cm2) and three arrival air speeds (0.1, 0.15 and 0.2 m.s-1) were studied. Bending strength of brown rice kernel, percentage of cracked kernels and time of drying were measured and evaluated. The results showed that increasing the drying arrival air temperature and radiation intensity of infrared resulted decrease in drying time. High bending strength and low percentage of cracked kernel was obtained when paddy was dried by hot air assisted infrared dryer. Between this factors and their interactive effect were a significant difference (p
Abstract: As the majority of faults are found in a few of its modules so there is a need to investigate the modules that are affected severely as compared to other modules and proper maintenance need to be done on time especially for the critical applications. In this paper, we have explored the different predictor models to NASA-s public domain defect dataset coded in Perl programming language. Different machine learning algorithms belonging to the different learner categories of the WEKA project including Mamdani Based Fuzzy Inference System and Neuro-fuzzy based system have been evaluated for the modeling of maintenance severity or impact of fault severity. The results are recorded in terms of Accuracy, Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). The results show that Neuro-fuzzy based model provides relatively better prediction accuracy as compared to other models and hence, can be used for the maintenance severity prediction of the software.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: It is not a secret that, IT management has become
more and more and integrated part of almost all organizations. IT
managers posses an enormous amount of knowledge within both
organizational knowledge and general IT knowledge. This article
investigates how IT managers keep themselves updated on IT
knowledge in general and looks into how much time IT managers
spend on weekly basis searching the net for new or problem solving
IT knowledge. The theory used in this paper is used to investigate the
current role of IT managers and what issues they are facing.
Furthermore a research is conducted where 7 IT managers in medium
sized and large Danish companies are interviewed to add further
focus on the role of the IT manager and to focus on how they keep
themselves updated. Beside finding substantial need for more
research, IT managers – generalists or specialists – only have limited
knowledge resources at hand in updating their own knowledge –
leaving much initiative to vendors.
Abstract:
Innovation is becoming more and more important in
modern society. There are a lot of researches on different kinds of
innovation but marketing innovation is one kind of innovation that
has not been studied frequently before. Marketing innovation is
defined as a new way in which companies can market themselves to
potential or existing customers.
The study shows some key elements for marketing innovation that
are worth paying attention to when implementing marketing
innovation projects. Examples of such key elements are: paying
attention to the neglected market, suitable market segmentatio
reliable market information, public relationship, increased customer
value, combination of market factors, explore different marketing
channels and the use of technology in combination with what? Beside
the key elements for marketing innovation, we also present some
risks that may occur, such as cost, market uncertainty, information
leakage, imitation and overdependence on experience.
By proposing a set of indicators to measure marketing innovation,
the article offers solutions for marketing innovation implementation
so that any organization can achieve optimal results.
Abstract: In present article the model of Blended Learning, its advantage at foreign language teaching, and also some problems that can arise during its use are considered. The Blended Learning is a special organization of learning, which allows to combine classroom work and modern technologies in electronic distance teaching environment. Nowadays a lot of European educational institutions and companies use such technology. Through this method: student gets the opportunity to learn in a group (classroom) with a teacher and additionally at home at a convenient time; student himself sets the optimal speed and intensity of the learning process; this method helps student to discipline himself and learn to work independently.
Abstract: Background: Widespread use of chemotherapeutic
drugs in the treatment of cancer has lead to higher health hazards
among employee who handle and administer such drugs, so nurses
should know how to protect themselves, their patients and their work
environment against toxic effects of chemotherapy. Aim of this study
was carried out to examine the effect of chemotherapy safety protocol
for oncology nurses on their protective measure practices. Design: A
quasi experimental research design was utilized. Setting: The study
was carried out in oncology department of Menoufia university
hospital and Tanta oncology treatment center. Sample: A
convenience sample of forty five nurses in Tanta oncology treatment
center and eighteen nurses in Menoufiya oncology department.
Tools: 1. an interviewing questionnaire that covering sociodemographic
data, assessment of unit and nurses' knowledge about
chemotherapy. II: Obeservational check list to assess nurses' actual
practices of handling and adminestration of chemotherapy. A base
line data were assessed before implementing Chemotherapy Safety
protocol, then Chemotherapy Safety protocol was implemented, and
after 2 monthes they were assessed again. Results: reveled that 88.9%
of study group I and 55.6% of study group II improved to good total
knowledge scores after educating on the safety protocol, also 95.6%
of study group I and 88.9% of study group II had good total practice
score after educating on the safety protocol. Moreover less than half
of group I (44.4%) reported that heavy workload is the most barriers
for them, while the majority of group II (94.4%) had many barriers
for adhering to the safety protocol such as they didn’t know the
protocol, the heavy work load and inadequate equipment.
Conclusions: Safety protocol for Oncology Nurses seemed to have
positive effect on improving nurses' knowledge and practice.
Recommendation: chemotherapy safety protocol should be instituted
for all oncology nurses who are working in any oncology unit and/ or
center to enhance compliance, and this protocol should be done at
frequent intervals.