Abstract: With the rapid growth in business size, today-s businesses orient Throughout thirty years local, national and international experience in medicine as a medical student, junior doctor and eventually Consultant and Professor in Anaesthesia, Intensive Care and Pain Management, I note significant generalised dissatisfaction among medical students and doctors regarding their medical education and practice. We repeatedly hear complaints from patients about the dysfunctional health care system they are dealing with and subsequently the poor medical service that they are receiving. Medical students are bombarded with lectures, tutorials, clinical rounds and various exams. Clinicians are weighed down with a never-ending array of competing duties. Patients are extremely unhappy about the long waiting lists, loss of their records and the continuous deterioration of the health care service. This problem has been reported in different countries by several authors [1,2,3]. In a trial to solve this dilemma, a genuine idea has been suggested implementing computer technology in medicine [2,3]. Computers in medicine are a medium of international communication of the revolutionary advances being made in the application of the computer to the fields of bioscience and medicine [4,5]. The awareness about using computers in medicine has recently increased all over the world. In Misr University for Science & Technology (MUST), Egypt, medical students are now given hand-held computers (Laptop) with Internet facility making their medical education accessible, convenient and up to date. However, this trial still needs to be validated. Helping the readers to catch up with the on going fast development in this interesting field, the author has decided to continue reviewing the literature, exploring the state-of-art in computer based medicine and up dating the medical professionals especially the local trainee Doctors in Egypt. In part I of this review article we will give a general background discussing the potential use of computer technology in the various aspects of the medical field including education, research, clinical practice and the health care service given to patients. Hope this will help starting changing the culture, promoting the awareness about the importance of implementing information technology (IT) in medicine, which is a field in which such help is needed. An international collaboration is recommended supporting the emerging countries achieving this target.
Abstract: Understanding driving behavior is a complicated
researching topic. To describe accurate speed, flow and density of a
multiclass users traffic flow, an adequate model is needed. In this
study, we propose the concept of standard passenger car equivalent
(SPCE) instead of passenger car equivalent (PCE) to estimate the
influence of heavy vehicles and slow cars. Traffic cellular automata
model is employed to calibrate and validate the results. According to
the simulated results, the SPCE transformations present good
accuracy.
Abstract: From a long time age, human beings have chosen their
place of residence and comfort so that those places would have
relatively ideal natural and climatic conditions. For this reason, from
the beginning, the civilizations have been formed in the susceptible
natural regions such as Mesopotamia in Iran and Nile coasts in
Egypt. Also, the core of human density has been made in the form of
an oasis in the deserts.
Regarding the formation and combination of the native
architecture in different regions of Iran, we find that different
properties of these climates have affected frequently the formation of
cities and the architectural combinations of these regions. Thus, the
precise determinations of climatic areas and attaining the climatic
properties of different regions have a great deal of importance in
presenting appropriate and compatible-with-climate designs.
Abstract: Gurus of the Classical Management School (like
Taylor, Fayol and Ford) had an opinion that work must be delegated
to the individual and the individual has to be instructed, his work
assessed and paid based on individual performance. The theories of
the Human Relations School have changed this mentality regarding
the concept of groups. They came to the conclusion that the influence
of groups greatly affects the behaviour and performance of its
members.
Group theories today are characterized by problem-solving teams
and self-managing groups authorized to make decisions and execute;
professional communities also play an important role during the
operation of knowledge management systems.
In this theoretical research we try to find answers to a question:
what kind of characteristics (professional competencies, personal
features, etc.) a successful team needs to manage a change to operate
a knowledge management system step by step.
Abstract: The Cluster Dimension of a network is defined as, which is the minimum cardinality of a subset S of the set of nodes having the property that for any two distinct nodes x and y, there exist the node Si, s2 (need not be distinct) in S such that ld(x,s1) — d(y, s1)1 > 1 and d(x,s2) < d(x,$) for all s E S — {s2}. In this paper, strictly non overlap¬ping clusters are constructed. The concept of LandMarks for Unique Addressing and Clustering (LMUAC) routing scheme is developed. With the help of LMUAC routing scheme, It is shown that path length (upper bound)PLN,d < PLD, Maximum memory space requirement for the networkMSLmuAc(Az) < MSEmuAc < MSH3L < MSric and Maximum Link utilization factor MLLMUAC(i=3) < MLLMUAC(z03) < M Lc
Abstract: Due to their high power-to-weight ratio and low cost, pneumatic actuators are attractive for robotics and automation applications; however, achieving fast and accurate control of their position have been known as a complex control problem. The paper presents a methodology for obtaining controllers that achieve high position accuracy and preserve the closed-loop characteristics over a broad operating range. Experimentation with a number of conventional (or "classical") three-term controllers shows that, as repeated operations accumulate, the characteristics of the pneumatic actuator change requiring frequent re-tuning of the controller parameters (PID gains). Furthermore, three-term controllers are found to perform poorly in recovering the closed-loop system after the application of load or other external disturbances. The key reason for these problems lies in the non-linear exchange of energy inside the cylinder relating, in particular, to the complex friction forces that develop on the piston-wall interface. In order to overcome this problem but still remain within the boundaries of classical control methods, we designed an auto selective classicaql controller so that the system performance would benefit from all three control gains (KP, Kd, Ki) according to system requirements and the characteristics of each type of controller. This challenging experimentation took place for consistent performance in the face of modelling imprecision and disturbances. In the work presented, a selective PID controller is presented for an experimental rig comprising an air cylinder driven by a variable-opening pneumatic valve and equipped with position and pressure sensors. The paper reports on tests carried out to investigate the capability of this specific controller to achieve consistent control performance under, repeated operations and other changes in operating conditions.
Abstract: In this paper, we propose a method to reduce the
various kinds of noise while gathering and recording the
electrocardiogram (ECG) signal. Because of the defects of former
method in the noise elimination of ECG signal, we use translation
invariant (TI) multiwavelet denoising method to the noise elimination.
The advantage of the proposed method is that it may not only remain
the geometrical characteristics of the original ECG signal and keep the
amplitudes of various ECG waveforms efficiently, but also suppress
impulsive noise to some extent. The simulation results indicate that the
proposed method are better than former removing noise method in
aspects of remaining geometrical characteristics of ECG signal and the
signal-to-noise ratio (SNR).
Abstract: One of the important steps in a safety and risk management system is the economical evaluation of occupational accident and diseases costs in order to decrease accidents from reoccurring in the workplace. This study proposed a plausible method for calculating occupational accident costs and illnesses in work place. This method design for cost estimation takes into account both the personnel, organizational level as well as the community level especially intended for an Iranian work place. The research indicates that a using systematic method for calculating costs which also provides risk evaluation can help managers to plan correctly the investment in health and safety measures. Using this method is that not only is it comprehensive, easy and practical and could be applied in practice by a manager within a short period of time but it also shows the importance of accident costs as well as calculates the real cost of an accident and illnesses.
Abstract: Hospitals in southern Hualien teamed with the
Hypertension Joint Care Network. Working with the network, the
team provided a special designed health education to the individual
who had been identified as a hypertension patient in the outpatient
department. Some metabolism improvements achieved. This is a
retrospective study by purposively taking 106 patients from a hospital
between 2008 and 2010. Records of before and after education
intervention of the objects was collected and analyzed to see the how
the intervention affected the patients- hypertension control via clinical
parameter monitoring. The results showed that the clinical indicators,
the LDL-C, the cholesterol and the systolic blood pressure were
significantly improved. The study provides evidence for the
effectiveness of the network in controlling hypertension.
Abstract: In this paper we present an extension to Vision Based
LRTA* (VLRTA*) known as Vision Based Moving Target Search
(VMTS) for capturing unknown moving target in unknown territory
with randomly generated obstacles. Target position is unknown to the
agents and they cannot predict its position using any probability
method. Agents have omni directional vision but can see in one
direction at some point in time. Agent-s vision will be blocked by the
obstacles in the search space so agent can not see through the
obstacles. Proposed algorithm is evaluated on large number of
scenarios. Scenarios include grids of sizes from 10x10 to 100x100.
Grids had obstacles randomly placed, occupying 0% to 50%, in
increments of 10%, of the search space. Experiments used 2 to 9
agents for each randomly generated maze with same obstacle ratio.
Observed results suggests that VMTS is effective in locate target
time, solution quality and virtual target. In addition, VMTS becomes
more efficient if the number of agents is increased with proportion to
obstacle ratio.
Abstract: Computer worm detection is commonly performed by
antivirus software tools that rely on prior explicit knowledge of the
worm-s code (detection based on code signatures). We present an
approach for detection of the presence of computer worms based on
Artificial Neural Networks (ANN) using the computer's behavioral
measures. Identification of significant features, which describe the
activity of a worm within a host, is commonly acquired from security
experts. We suggest acquiring these features by applying feature
selection methods. We compare three different feature selection
techniques for the dimensionality reduction and identification of the
most prominent features to capture efficiently the computer behavior
in the context of worm activity. Additionally, we explore three
different temporal representation techniques for the most prominent
features. In order to evaluate the different techniques, several
computers were infected with five different worms and 323 different
features of the infected computers were measured. We evaluated
each technique by preprocessing the dataset according to each one
and training the ANN model with the preprocessed data. We then
evaluated the ability of the model to detect the presence of a new
computer worm, in particular, during heavy user activity on the
infected computers.
Abstract: This paper is to present context-aware sensor grid
framework for agriculture and its design challenges. Use of sensor
networks in the domain of agriculture is not new. However, due to
the unavailability of any common framework, solutions that are
developed in this domain are location, environment and problem
dependent. Keeping the need of common framework for agriculture,
Context-Aware Sensor Grid Framework is proposed. It will be
helpful in developing solutions for majority of the problems related
to irrigation, pesticides spray, use of fertilizers, regular monitoring of
plot and yield etc. due to the capability of adjusting according to
location and environment. The proposed framework is composed of
three layer architecture including context-aware application layer,
grid middleware layer and sensor network layer.
Abstract: Sensors possess several properties of physical
measures. Whether devices that convert a sensed signal into an
electrical signal, chemical sensors and biosensors, thus all these
sensors can be considered as an interface between the physical and
electrical equipment. The problem is the analysis of the multitudes of
saved settings as input variables. However, they do not all have the
same level of influence on the outputs. In order to identify the most
sensitive parameters, those that can guide users in gathering
information on the ground and in the process of model calibration
and sensitivity analysis for the effect of each change made.
Mathematical models used for processing become very complex.
In this paper a fuzzy rule-based system is proposed as a solution
for this problem. The system collects the available signals
information from sensors. Moreover, the system allows the study of
the influence of the various factors that take part in the decision
system. Since its inception fuzzy set theory has been regarded as a
formalism suitable to deal with the imprecision intrinsic to many
problems. At the same time, fuzzy sets allow to use symbolic models.
In this study an example was applied for resolving variety of
physiological parameters that define human health state. The
application system was done for medical diagnosis help. The inputs
are the signals expressed the cardiovascular system parameters, blood
pressure, Respiratory system paramsystem was done, it will be able
to predict the state of patient according any input values.
Abstract: International literature emphasizes on the concern regarding the phenomenon of aggression in hospital. This paper focuses on the reality of aggressive interactions reigning within an emergency triage involving three chaps of protagonists: the professionals, the patients and their carers. The data collection was made from a grid of observation, in which the various variables exposed in the literature were integrated. They observations took place around the clock, for three weeks, at the rate of one week a month. In this research 331 aggressive interactions have been listed and analyzed by means of the software SPSS. This research is one of the very few continuous observation surveys in the literature. It shows the various human factors at play in the emergence of aggressive interaction. The data may be used both for taking steps in primary prevention, thanks to the analysis of interaction modes, and in secondary prevention by integrating the useful results in situational prevention.
Abstract: In this paper, the typical exponential method, diamond difference and modified time discrete scheme is researched for self adaptive time step. The second-order time evolution scheme is applied to time-dependent spherical neutron transport equation by discrete ordinates method. The numerical results show that second-order time evolution scheme associated exponential method has some good properties. The time differential curve about neutron current is more smooth than that of exponential method and diamond difference and modified time discrete scheme.
Abstract: The aim of this paper is to study the oblique
stagnation point flow on vertical plate with uniform surface heat flux
in presence of magnetic field. Using Stream function, partial
differential equations corresponding to the momentum and energy
equations are converted into non-linear ordinary differential
equations. Numerical solutions of these equations are obtained using
Runge-Kutta Fehlberg method with the help of shooting technique.
In the present work the effects of striking angle, magnetic field
parameter, Grashoff number, the Prandtl number on velocity and heat
transfer characteristics have been discussed. Effect of above
mentioned parameter on the position of stagnation point are also
studied.
Abstract: In this paper, a Smart Home Service Robot, McBot II,
which performs mess-cleanup function etc. in house, is designed much
more optimally than other service robots. It is newly developed in
much more practical system than McBot I which we had developed
two years ago. One characteristic attribute of mobile platforms
equipped with a set of dependent wheels is their omni- directionality
and the ability to realize complex translational and rotational
trajectories for agile navigation in door. An accurate coordination of
steering angle and spinning rate of each wheel is necessary for a
consistent motion. This paper develops trajectory controller of
3-wheels omni-directional mobile robot using fuzzy azimuth estimator.
A specialized anthropomorphic robot manipulator which can be
attached to the housemaid robot McBot II, is developed in this paper.
This built-in type manipulator consists of both arms with 3 DOF
(Degree of Freedom) each and both hands with 3 DOF each. The
robotic arm is optimally designed to satisfy both the minimum
mechanical size and the maximum workspace. Minimum mass and
length are required for the built-in cooperated-arms system. But that
makes the workspace so small. This paper proposes optimal design
method to overcome the problem by using neck joint to move the arms
horizontally forward/backward and waist joint to move them
vertically up/down. The robotic hand, which has two fingers and a
thumb, is also optimally designed in task-based concept. Finally, the
good performance of the developed McBot II is confirmed through
live tests of the mess-cleanup task.
Abstract: In this paper we used data mining techniques to
identify outlier patients who are using large amount of drugs over a
long period of time. Any healthcare or health insurance system
should deal with the quantities of drugs utilized by chronic diseases
patients. In Kingdom of Bahrain, about 20% of health budget is spent
on medications. For the managers of healthcare systems, there is no
enough information about the ways of drug utilization by chronic
diseases patients, is there any misuse or is there outliers patients. In
this work, which has been done in cooperation with information
department in the Bahrain Defence Force hospital; we select the data
for Cardiac patients in the period starting from 1/1/2008 to
December 31/12/2008 to be the data for the model in this paper. We
used three techniques for finding the drug utilization for cardiac
patients. First we applied a clustering technique, followed by
measuring of clustering validity, and finally we applied a decision
tree as classification algorithm. The clustering results is divided into
three clusters according to the drug utilization, for 1603 patients, who
received 15,806 prescriptions during this period can be partitioned
into three groups, where 23 patients (2.59%) who received 1316
prescriptions (8.32%) are classified to be outliers. The classification
algorithm shows that the use of average drug utilization and the age,
and the gender of the patient can be considered to be the main
predictive factors in the induced model.
Abstract: In recent years with the rapid development of Internet and the Web, more and more web applications have been deployed in many fields and organizations such as finance, military, and government. Together with that, hackers have found more subtle ways to attack web applications. According to international statistics, SQL Injection is one of the most popular vulnerabilities of web applications. The consequences of this type of attacks are quite dangerous, such as sensitive information could be stolen or authentication systems might be by-passed. To mitigate the situation, several techniques have been adopted. In this research, a security solution is proposed using Artificial Neural Network to protect web applications against this type of attacks. The solution has been experimented on sample datasets and has given promising result. The solution has also been developed in a prototypic web application firewall called ANNbWAF.
Abstract: In this paper we present a new method for over-height
vehicle detection in low headroom streets and highways using digital
video possessing. The accuracy and the lower price comparing to
present detectors like laser radars and the capability of providing
extra information like speed and height measurement make this
method more reliable and efficient. In this algorithm the features are
selected and tracked using KLT algorithm. A blob extraction
algorithm is also applied using background estimation and
subtraction. Then the world coordinates of features that are inside the
blobs are estimated using a noble calibration method. As, the heights
of the features are calculated, we apply a threshold to select overheight
features and eliminate others. The over-height features are
segmented using some association criteria and grouped using an
undirected graph. Then they are tracked through sequential frames.
The obtained groups refer to over-height vehicles in a scene.