Abstract: One of the essential topics in the information systems is the registration management. The objective of this project is to create a web portal designed to help new students on the first access to the Sultan Moulay Slimane University SMSU (Practical Information, Pre-Registration, Placement Test, Terms of use ... etc.) while creating a secure space protecting both data from the institutions of the University and student information. This portal is accessible from any computer connected to the Internet inside and outside the campus. In this work, we present a platform on the first access to the SMSU which is essential for authentication in the digital work space of the university. This platform allows university to make better decisions for students clustering, to avoid traditional manual method, and to reduce the cost in human and material resources.
Abstract: In this paper, we consider a non-identically independently distributed (non-i.i.d.) Hoyt fading single-input multiple-out put (SIMO) channel, where the transmitter sends some confidential information to the legitimate receiver in presence of an eavesdropper. We formulated the probability of non-zero secrecy mutual information; secure outage probability and average secrecy mutual information (SMI) for the SIMO wireless communication system. The calculation has been carried out using small limit argument approximation (SLAA) on zeroth-order modified Bessel function of first kind. In our proposed model, an eavesdropper observes transmissions of information through another Hoyt fading channel. First, we derived the analytical expression for non-zero secrecy mutual information. Then, we find the secure outage probability to investigate the outage behavior of the proposed model. Finally, we find the average secrecy mutual information. We consider that the channel state information (CSI) is known to legitimate receiver.
Abstract: Handwriting is essential to academic success; however, the current literature is limited in the identification of pre-handwriting skills. The purpose of this study was to identify the pre-handwriting skills, which occupational therapy practitioners deem important to handwriting success, as well as those which aid in intervention planning. The online survey instrument consisted of 33 questions that assessed various skills related to the development of handwriting, as well as captured demographic information. Both occupational therapists and occupational therapy assistants were included in the survey study. The survey found that the respondents were in agreement that purposeful scribbling, the ability of a child to copy (vertical/horizontal lines, circle, squares, and triangles), imitating an oblique cross, cognitive skills (attention, praxis, self-regulation, sequencing), grasp patterns, hand dominance, in hand manipulation skills (shift, translation, rotation), bilateral integration, stabilization of paper, crossing midline, and visual perception were important indicators of handwriting readiness. The results of the survey support existing research regarding the skills necessary for the successful development of handwriting in children.
Abstract: Access to advanced medical services has been one of the medical challenges faced by our present society especially in distant geographical locations which may be inaccessible. Then the need for telemedicine arises through which live videos of a doctor can be streamed to a patient located anywhere in the world at any time. Patients’ medical records contain very sensitive information which should not be made accessible to unauthorized people in order to protect privacy, integrity and confidentiality. This research work focuses on a more robust security measure which is biometric (fingerprint) as a form of access control to data of patients by the medical specialist/practitioner.
Abstract: In this paper, we present a novel 2.5D face recognition method based on Gabor Discrete Cosine Transform (GDCT). In the proposed method, the Gabor filter is applied to extract feature vectors from the texture and the depth information. Then, Discrete Cosine Transform (DCT) is used for dimensionality and redundancy reduction to improve computational efficiency. The system is combined texture and depth information in the decision level, which presents higher performance compared to methods, which use texture and depth information, separately. The proposed algorithm is examined on publically available Bosphorus database including models with pose variation. The experimental results show that the proposed method has a higher performance compared to the benchmark.
Abstract: Control system for hi-tech industries could be realized generally and deeply by a special document. Vast heavy industries such as power plants with a large number of I/O signals are controlled by a distributed control system (DCS). This system comprises of so many parts from field level to high control level, and junior instrument engineers may be confused by this enormous information. The key document which can solve this problem is “control configuration system diagram” for each type of DCS. This is a road map that covers all of activities respect to control system in each industrial plant and inevitable to be studied by whom corresponded. It plays an important role from designing control system start point until the end; deliver the system to operate. This should be inserted in bid documents, contracts, purchasing specification and used in different periods of project EPC (engineering, procurement, and construction). Separate parts of DCS are categorized here in order of importance and a brief description and some practical plan is offered. This article could be useful for all instrument and control engineers who worked is EPC projects.
Abstract: This study aims to investigate the impact of data leak of M&S customers on digital communities. Modern businesses are using digital communities as an important public relations tool for marketing purposes. This form of communication helps companies to build better relationship with their customers which also act as another source of information. The communication between the customers and the organizations is not regulated so users may post positive and negative comments. There are new platforms being developed on a daily basis and it is very crucial for the businesses to not only get themselves familiar with those but also know how to reach their existing and perspective consumers. The driving force of marketing and communication in modern businesses is the digital communities and these are continuously increasing and developing. This phenomenon is changing the way marketing is conducted. The current research has discussed the implications on M&S business performance since the data was exploited on digital communities; users contacted M&S and raised the security concerns. M&S closed down its website for few hours to try to resolve the issue. The next day M&S made a public apology about this incidence. This information was proliferated on various digital communities and it has impacted negatively on M&S brand name, sales and customers. The content analysis approach is being used to collect qualitative data from 100 digital bloggers including social media communities such as Facebook and Twitter. The results and finding provide useful new insights into the nature and form of security concerns of digital users. Findings have theoretical and practical implications. This research will showcase a large corporation utilizing various digital community platforms and can serve as a model for future organizations.
Abstract: Introduction: To update ourselves and understand the
concept of latest electronic formats available for Health care
providers and how it could be used and developed as per standards.
The idea is to correlate between the patients Manual Medical Records
keeping and maintaining patients Electronic Information in a Health
care setup in this world. Furthermore, this stands with adapting to the
right technology depending upon the organization and improve our
quality and quantity of Healthcare providing skills. Objective: The
concept and theory is to explain the terms of Electronic Medical
Record (EMR), Electronic Health Record (EHR) and Personal Health
Record (PHR) and selecting the best technical among the available
Electronic sources and software before implementing. It is to guide
and make sure the technology used by the end users without any
doubts and difficulties. The idea is to evaluate is to admire the uses
and barriers of EMR-EHR-PHR. Aim and Scope: The target is to
achieve the health care providers like Physicians, Nurses, Therapists,
Medical Bill reimbursements, Insurances and Government to assess
the patient’s information on easy and systematic manner without
diluting the confidentiality of patient’s information. Method: Health
Information Technology can be implemented with the help of
Organisations providing with legal guidelines and help to stand by
the health care provider. The main objective is to select the correct
embedded and affordable database management software and
generating large-scale data. The parallel need is to know how the
latest software available in the market. Conclusion: The question lies
here is implementing the Electronic information system with
healthcare providers and organization. The clinicians are the main
users of the technology and manage us to “go paperless”. The fact is
that day today changing technologically is very sound and up to date.
Basically, the idea is to tell how to store the data electronically safe
and secure. All three exemplifies the fact that an electronic format
has its own benefit as well as barriers.
Abstract: E-government has been adopted and used by many governments/countries around the world including Ghana to provide citizens and businesses with more accurate, real-time, and high quality services and information. The objective of this paper is to present an overview of the Government of Ghana’s (GoG) adoption and implement of e-government and its usage by the Ministries, Departments and its agencies (MDAs) as well as other public sector institutions to deliver efficient public service to the general public i.e. citizens, business etc. Government implementation of e-government focused on facilitating effective delivery of government service to the public and ultimately to provide efficient government-wide electronic means of sharing information and knowledge through a network infrastructure developed to connect all major towns and cities, Ministries, Departments and Agencies and other public sector organizations in Ghana. One aim for the Government of Ghana use of ICT in public administration is to improve productivity in government administration and service by facilitating exchange of information to enable better interaction and coordination of work among MDAs, citizens and private businesses. The study was prepared using secondary sources of data from government policy documents, national and international published reports, journal articles, and web sources. This study indicates that through the e-government initiative, currently citizens and businesses can access and pay for services such as renewal of driving license, business registration, payment of taxes, acquisition of marriage and birth certificates as well as application for passport through the GoG electronic service (eservice) and electronic payment (epay) portal. Further, this study shows that there is enormous commitment from GoG to adopt and implement e-government as a tool not only to transform the business of government but also to bring efficiency in public services delivered by the MDAs. To ascertain this, a further study need to be carried out to determine if the use of e-government has brought about the anticipated improvements and efficiency in service delivery of MDAs and other state institutions in Ghana.
Abstract: Objective: Acute coronary syndrome is a clinical
condition encompassing ST segments elevation myocardial
infraction, Non ST segment is elevation myocardial infraction and un
stable angina is characterized by ruptured coronary plaque, stress and
myocardial injury. Angina pectoris is a pressure like pain in the chest
that is induced by exertion or stress and relived with in the minute
after cessation of effort or using sublingual nitroglycerin. The present
research was undertaken to study the drug utilization pattern of
antiplatelet drugs for the ischemic heart disease in a tertiary care
hospital. Method: The present study is retrospective drug utilization
study and study period is 6months. The data is collected from the
discharge case sheet of general medicine department from medical
department Rajiv Gandhi institute of medical sciences, Kadapa. The
tentative sample size fixed was 250 patients. Out of 250 cases 19
cases was excluded because of unrelated data. Results: A total of 250
prescriptions were collected for the study according to the inclusion
criteria 233 prescriptions were diagnosed with ischemic heart disease
17 prescriptions were excluded due to unrelated information. out of
233 prescriptions 128 are male (54.9%) and 105 patients are were
female (45%). According to the gender distribution, the prevalence of
ischemic heart disease in males are 90 (70.31%) and females are 39
(37.1%). In the same way the prevalence of ischemic heart disease
along with cerebrovascular disease in males are 39 (29.6%) and
females are 66 (62.6%). Conclusion: We found that 94.8% of drug
utilization of antiplatelet drugs was achieved in the Rajiv Gandhi
institute of medical sciences, Kadapa from 2011-2012.
Abstract: Recently, Job Recommender Systems have gained
much attention in industries since they solve the problem of
information overload on the recruiting website. Therefore, we
proposed Extended Personalized Job System that has the capability of
providing the appropriate jobs for job seeker and recommending
some suitable information for them using Data Mining Techniques
and Dynamic User Profile. On the other hands, company can also
interact to the system for publishing and updating job information.
This system have emerged and supported various platforms such as
web application and android mobile application. In this paper, User
profiles, Implicit User Action, User Feedback, and Clustering
Techniques in WEKA libraries were applied and implemented. In
additions, open source tools like Yii Web Application Framework,
Bootstrap Front End Framework and Android Mobile Technology
were also applied.
Abstract: This paper presents the development of a mobile
application for students at the Faculty of Information Technology,
Rangsit University (RSU), Thailand. RSU upgrades an enrollment
process by improving its information systems. Students can
download the RSU APP easily in order to access the RSU substantial
information. The reason of having a mobile application is to help
students to access the system regardless of time and place. The objectives of this paper include: 1. To develop an application
on iOS platform for those students at the Faculty of Information
Technology, Rangsit University, Thailand. 2. To obtain the students’
perception towards the new mobile app. The target group is those
from the freshman year till the senior year of the faculty of
Information Technology, Rangsit University. The new mobile application, called as RSU APP, is developed by
the department of Information Technology, Rangsit University. It
contains useful features and various functionalities particularly on
those that can give support to students. The core contents of the app
consist of RSU’s announcement, calendar, events, activities, and ebook.
The mobile app is developed on the iOS platform. The user
satisfaction is analyzed from the interview data from 81 interviewees
as well as a Google application like a Google form which 122
interviewees are involved. The result shows that users are satisfied
with the application as they score it the most satisfaction level at 4.67
SD 0.52. The score for the question if users can learn and use the
application quickly is high which is 4.82 SD 0.71. On the other hand,
the lowest satisfaction rating is in the app’s form, apps lists, with the
satisfaction level as 4.01 SD 0.45.
Abstract: Highly developed technology and highly competitive
global market highlight the important role of competitive advantages
and operation performances in sustainable company operation.
Activity-Based Costing (ABC) provides accurate operation cost and
operation performance information. Rich literatures provide relevant
research with cases study on Activity-Based Costing application, but
the research on cause relationship between key success factors and its
specific outcome, such as profitability or share market are few. These
relationships provide the ways to handle the key success factors to
achieve the specific outcomes for ensuring to promote the competitive
advantages and operation performances. The main purposes of this
research are exploring the key success paths by Key Success Paths
approach which will lead the ways to apply Activity-Base Costing.
The Key Success Paths is the innovative method which is exploring
the cause relationships and explaining what are the effects of key
success factors to specific outcomes of Activity-Based Costing
implementation. The cause relationships between key success factors
and successful specific outcomes are Key Success Paths (KSPs). KSPs
are the guidelines to lead the cost management strategies to achieve the
goals of competitive advantages and operation performances. The
research findings indicate that good management system design may
affect the well outcomes of Activity-Based Costing application and
achieve to outstanding competitive advantage, operating performance
and profitability as well by KSPs exploration.
Abstract: This paper discusses the thematic structure of Yoruba
popular music of Southwest Nigeria. It examines the use of themes
and variations in early and contemporary Juju music. The work is an
outcome of a research developed by the author in his doctoral studies
at the University of Lagos, Nigeria, with the aim of analyzing the
thematic and motivic developments in Yoruba popular genres.
Observations, interviews, live recordings and CDs were used as
methods for eliciting information. Field recordings and CDs of
selected musical samples were also transcribed and notated. The
research established the prevalent use of string of themes by Juju
musicians as a compositional technique in moving from one musical
section to another, as they communicate the verbal messages in their
song. These themes consist of the popular ‘call and response’ form
found in most African music, analogous to the western ‘subject and
answer’ style of the fugue or sonata form, although without the tonic–
dominant relations. Due to the short and repetitive form of African
melodies and rhythms, a theme is restated as a variation, where its
rhythmic and melodic motifs are stylistically developed and repeated,
but still retaining its recognizable core musical structure. The
findings of this study showed that Juju musicians generally often
employ a thematic plan where new themes are used to arrange the
songs into sections, and each theme is developed into variations in
order to further expand the music, eliminate monotony, and create
musical aesthetics, serving as hallmark of its musical identity. The
study established the musical and extra-musical attributes of the
genre, while recommending further research towards analyzing the
various compositional techniques employed in African popular
genres.
Abstract: Cloud Computing refers to applications delivered as
services over the internet, and the datacenters that provide those
services with hardware and systems software. These were earlier
referred to as Software as a Service (SaaS). Scheduling is justified by
job components (called tasks), lack of information. In fact, in a large
fraction of jobs from machine learning, bio-computing, and image
processing domains, it is possible to estimate the maximum time
required for a task in the job. This study focuses on Trust based
scheduling to improve cloud security by modifying Heterogeneous
Earliest Finish Time (HEFT) algorithm. It also proposes TR-HEFT
(Trust Reputation HEFT) which is then compared to Dynamic Load
Scheduling.
Abstract: The availability to deploy mobile applications for
health care is increasing daily thru different mobile app stores. But
within these capabilities the number of hacking attacks has also
increased, in particular into medical mobile applications. The security
vulnerabilities in medical mobile apps can be triggered by errors in
code, incorrect logic, poor design, among other parameters. This is
usually used by malicious attackers to steal or modify the users’
information. The aim of this research is to analyze the vulnerabilities
detected in mobile medical apps according to risk factor standards
defined by OWASP in 2014.
Abstract: At the present time, awareness, education, computer
simulation and information systems protection are very serious and
relevant topics. The article deals with perspectives and possibilities of
implementation of emergence or natural hazard threats into the
system which is developed for communication among members of
crisis management staffs. The Czech Hydro-Meteorological Institute
with its System of Integrated Warning Service resents the largest
usable base of information. National information systems are connected to foreign systems,
especially to flooding emergency systems of neighboring countries,
systems of European Union and international organizations where the
Czech Republic is a member. Use of outputs of particular information
systems and computer simulations on a single communication
interface of information system for communication among members
of crisis management staff and setting the site interoperability in the
net will lead to time savings in decision-making processes in solving
extraordinary events and crisis situations. Faster managing of an
extraordinary event or a crisis situation will bring positive effects and
minimize the impact of negative effects on the environment.
Abstract: Web mining is to discover and extract useful
Information. Different users may have different search goals when
they search by giving queries and submitting it to a search engine.
The inference and analysis of user search goals can be very useful for
providing an experience result for a user search query. In this project,
we propose a novel approach to infer user search goals by analyzing
search web logs. First, we propose a novel approach to infer user
search goals by analyzing search engine query logs, the feedback
sessions are constructed from user click-through logs and it
efficiently reflect the information needed for users. Second we
propose a preprocessing technique to clean the unnecessary data’s
from web log file (feedback session). Third we propose a technique
to generate pseudo-documents to representation of feedback sessions
for clustering. Finally we implement k-medoids clustering algorithm
to discover different user search goals and to provide a more optimal
result for a search query based on feedback sessions for the user.
Abstract: One of the most critical decision points in the design of a
face recognition system is the choice of an appropriate face representation.
Effective feature descriptors are expected to convey sufficient, invariant
and non-redundant facial information. In this work we propose a set of
Hahn moments as a new approach for feature description. Hahn moments
have been widely used in image analysis due to their invariance, nonredundancy
and the ability to extract features either globally and locally.
To assess the applicability of Hahn moments to Face Recognition we
conduct two experiments on the Olivetti Research Laboratory (ORL)
database and University of Notre-Dame (UND) X1 biometric collection.
Fusion of the global features along with the features from local facial
regions are used as an input for the conventional k-NN classifier. The
method reaches an accuracy of 93% of correctly recognized subjects for
the ORL database and 94% for the UND database.
Abstract: Geographical routing protocol requires node physical
location information to make forwarding decision. Geographical
routing uses location service or position service to obtain the position
of a node. The geographical information is a geographic coordinates
or can be obtained through reference points on some fixed coordinate
system. Link can be formed between two nodes. Link lifetime plays a
crucial role in MANET. Link lifetime represent how long the link is
stable without any failure between the nodes. Link failure may occur
due to mobility and because of link failure energy of nodes can be
drained. Thus this paper proposes survey about link lifetime
prediction using geographical information.