Search results for: code division multiple access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9095

Search results for: code division multiple access

8915 Analysis of Strategies to Reduce Patients’ Disposition Holding Time from Emergency Department to Ward

Authors: Kamonwat Suksumek, Seeronk Prichanont

Abstract:

Access block refers to the situation where Emergency Department (ED) patients requiring hospital admission spend an unreasonable holding time in an ED because their access to a ward is blocked by the full utilization of the ward’s beds. Not only it delays the proper treatments required by the patients, but access block is also the cause of ED’s overcrowding. Clearly, access block is an inter-departmental problem that needs to be brought to management’s attention. This paper focuses on the analysis of strategies to address the access block problem, both in the operational and intermediate levels. These strategies were analyzed through a simulation model with a real data set from a university hospital in Thailand. The paper suggests suitable variable levels for each strategy so that the management will make the final decisions.

Keywords: access block, emergency department, health system analysis, simulation

Procedia PDF Downloads 377
8914 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 4
8913 Simulation of 140 Kv X– Ray Tube by MCNP4C Code

Authors: Amin Sahebnasagh, Karim Adinehvand, Bakhtiar Azadbakht

Abstract:

In this study, we used Monte Carlo code (MCNP4C) that is a general method, for simulation, electron source and electric field, a disc source with 0.05 cm radius in direct of anode are used, radius of disc source show focal spot of x-ray tube that here is 0.05 cm. In this simulation, anode is from tungsten with 18.9 g/cm3 density and angle of anode is 180. we simulated x-ray tube for 140 kv. For increasing of speed data acquisition we use F5 tally. With determination the exact position of F5 tally in program, outputs are acquired. In this spectrum the start point is about 0.02 Mev, the absorption edges are about 0.06 Mev and 0.07 Mev and average energy is about 0.05 Mev.

Keywords: x-spectrum, simulation, Monte Carlo, MCNP4C code

Procedia PDF Downloads 614
8912 Four Phase Methodology for Developing Secure Software

Authors: Carlos Gonzalez-Flores, Ernesto Liñan-García

Abstract:

A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder.

Keywords: secure software, four phases methodology, software engineering, code breakers, intrusion analysis

Procedia PDF Downloads 370
8911 Influence of Error Correction Codes on the Quality of Optical Broadband Connections

Authors: Mouna Hemdi, Jamel bel Hadj Tahar

Abstract:

The increasing development of multimedia applications requiring the simultaneous transport of several different services contributes to the evolution of the need for very high-speed network. In this paper, we propose an effective solution to achieve the very high speed while retaining elements of the optical transmission channel. So our study focuses on error correcting codes that aim for quality improvement on duty. We present a comparison of the quality of service for single channels and integrating the code BCH, RS and LDPC in order to find the best code in the different conditions of the transmission.

Keywords: code error correction, high speed broadband, optical transmission, information systems security

Procedia PDF Downloads 360
8910 Influence of Javascript Programming on the Developement of Web and Mobile Application

Authors: Abdul Basit Kiani

Abstract:

Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.

Keywords: java script, react, nodejs, htmlcsss

Procedia PDF Downloads 77
8909 Multiple Intelligence Theory with a View to Designing a Classroom for the Future

Authors: Phalaunnaphat Siriwongs

Abstract:

The classroom of the 21st century is an ever-changing forum for new and innovative thoughts and ideas. With increasing technology and opportunity, students have rapid access to information that only decades ago would have taken weeks to obtain. Unfortunately, new techniques and technology are not a cure for the fundamental problems that have plagued the classroom ever since education was established. Class size has been an issue long debated in academia. While it is difficult to pinpoint an exact number, it is clear that in this case, more does not mean better. By looking into the success and pitfalls of classroom size, the true advantages of smaller classes becomes clear. Previously, one class was comprised of 50 students. Since they were seventeen- and eighteen-year-old students, it was sometimes quite difficult for them to stay focused. To help students understand and gain much knowledge, a researcher introduced “The Theory of Multiple Intelligence” and this, in fact, enabled students to learn according to their own learning preferences no matter how they were being taught. In this lesson, the researcher designed a cycle of learning activities involving all intelligences so that everyone had equal opportunities to learn.

Keywords: multiple intelligences, role play, performance assessment, formative assessment

Procedia PDF Downloads 259
8908 A New Scheme for Chain Code Normalization in Arabic and Farsi Scripts

Authors: Reza Shakoori

Abstract:

This paper presents a structural correction of Arabic and Persian strokes using manipulation of their chain codes in order to improve the rate and performance of Persian and Arabic handwritten word recognition systems. It collects pure and effective features to represent a character with one consolidated feature vector and reduces variations in order to decrease the number of training samples and increase the chance of successful classification. Our results also show that how the proposed approaches can simplify classification and consequently recognition by reducing variations and possible noises on the chain code by keeping orientation of characters and their backbone structures.

Keywords: Arabic, chain code normalization, OCR systems, image processing

Procedia PDF Downloads 371
8907 The Application of Article 111 of the Constitution of Bangladesh in the Criminal Justice System as a Sentencing Guideline

Authors: Sadiya S. Silvee

Abstract:

Generally, the decision of the higher court is binding on its subordinate courts. As provided in Article 111 of the Constitution, 'the law declared by the Appellate Division (AD) shall be binding on the High Court Division (HCD) and the law declared by either division of the Supreme Court shall be binding on all courts subordinate to it.' This means the judicial discipline requires the HCD to follow the decision of the AD and that it is necessary for the lower tiers of courts to accept the decision of the higher tiers as a binding precedent. Analyzing the application of Article 111 of the Constitution in the criminal justice system as a sentencing guideline, the paper, by examining whether there is any consistency in decision between one HC Bench and another HC Bench, explores whether HCD can per incuriam its previous decision. In doing so, the Death Reference (DR) Cases are contemplated. Furthermore, the paper shall examine whether the Court of Session follows the decision of the HCD while using their discretion to make the choice between death and imprisonment for life under section 302 of PC. The paper argues due to the absence of any specific direction for sentencing and inconsistency in jurisprudence among the HCD; the subordinate courts are in a dilemma.

Keywords: death reference, sentencing factor, sentencing guideline, criminal justice system and constitution

Procedia PDF Downloads 138
8906 The Impact of COVID-19 Health Measures on Adults with Multiple Chemical Sensitivity

Authors: Riina I. Bray, Yifan Wang, Nikolas Argiropoulos, Stephanie Robins, John Molot, Kelly Tragash, Lynn M. Marshall, Margaret E. Sears, Marie-Andrée Pigeon, Michel Gaudet, Pierre Auger, Emily Bélanger, Rohini Peris

Abstract:

Multiple chemical sensitivity (MCS) is a chronic medical condition characterized by intolerances to chemical substances. Since the arrival of the COVID-19 pandemic and associated health measures, people experiencing MCS (PEMCS) are at a heightened risk of environmental exposures associated with cleaners, disinfectants, and sanitizers. Little attention has been paid to the well-being of PEMCS in the context of the COVID-19 pandemic. Objective: This study assesses the lived experiences of Canadian adults with MCS in relation to their living environment, access to healthcare, and levels of perceived social support before and during the pandemic. Methods: A total of 119 PEMCS completed an online questionnaire. McNemar Chi-Squared and Wilcoxon Signed Rank tests were used to evaluate if there were statistically significant changes in participants’ perception of their living environment, access to healthcare, and levels of social support before and after March 11, 2020. Results: Both positive and negative outcomes were noted. Participants reported an increase in exposure to disinfectants/sanitizers that entered their living environment (p<.001). There was a reported decrease in access to a family doctor during the pandemic (p<0.001). Although PEMCS experienced increased social isolation (p<0.001), they also reported an increase in understanding from family (p<0.029) and a decrease in stigma for wearing personal protective equipment (p<0.001). Conclusion: PEMCS reported experiencing: increased exposure to disinfectants or sanitizers, a loss of social support, and barriers in accessing healthcare during the pandemic. However, COVID-19 provided an opportunity to normalize the living conditions of PEMCS, such as wearing masks and social isolation. These findings can guide decision-makers on the importance of implementing nontoxic alternatives for cleaning and disinfection, as well as improving accommodation measures for PEMCS.

Keywords: covid-19, multiple chemical sensitivity, MCS, quality of life, social isolation, physical environment, healthcare

Procedia PDF Downloads 62
8905 Flying Women in Chinese Folklore – Male Narrator’s Rejection of Gender Role Division in Patriarchal Societies

Authors: Emma H. Zhang

Abstract:

In Women Who Fly (2018), Serinity Young connects tales and legends of flying women in Greco-Roman, Indo-European, Mesopotamian, and Asian cultures with ancient matriarchal bird goddesses and argues that tales of flying women are reminiscent of the rituals and rites related to the worship of goddesses in pre-patriarchal times and that flying women, including swan maidens, harpies, fairies, and witches are “abnormal women” because they reject patriarchal order, defy, and desert their domestic roles. Tales of flying women in Chinese folklore, exemplified by the story of The Cowherd and the Weaver Girl, replicated in countless tales that depicts the courtship between a mortal man and a divine or magical woman suggest otherwise. In these tales, the divine woman exhibits idealized Confucian femininity and fulfills the needs of the male protagonist by providing him with marriage, children, social status, and financial affluence. This paper argues that the flying women in Chinese folklores are not a symbol of defiance but are exemplars that embodyideal Confucian femininity. These tales are instead a reflection of male rejection of gender division in patriarchal societies. The male protagonists, like the male storytellers, reject the necessity to pursue and provide for women in courtship and marriage. Though these tales show their authors’ and readers’ discontent with gender role division, they do not subvert the patriarchal social order but rather offers an escape through fantasy.

Keywords: bird goddess, folklore, gender role division, patriarchy

Procedia PDF Downloads 140
8904 Trends of Code-Mixing in a Bilingual Nigerian Child: An Investigation of a Three-Year-Old Child

Authors: Salamatu Sani

Abstract:

This study is an investigation of how code-mixing manifests in the language development of a Nigerian child, especially in the Hausa speaking environment. It is hinged on the fact that the environment influences the first language acquired by a child regardless of the cultural and/or linguistic background of the parents. The child under investigation has been subjected to close monitoring on her speech hitherto. It is a longitudinal study covering a period of twelve months (January 2018 to December 2018); that was when the subject was between twenty-four and thirty months of age. The speeches have been recorded by means of a tape recorder, video, and a diary. The study employs as a theoretical framework, emergentism, which is an eclectic of the behaviourist and the mentalist theories to the study of language development, for analysis. This is in agreement with the positions of Skinner and Watson. Sequel to this investigation, it was discovered the environment is a major factor that influences the exposure of a child to a language more than the other factors and that, if a child is exposed to more than one language, there is a great tendency for such a child to code-mix and code-switch in her speech production. The child under investigation, in spite of the linguistic background of her parents, speaks the Hausa Language much better than the other languages around her though with remarkable code-mixing with other languages around her such as English and Ebira languages. The study concludes that although a child is born with the innate ability to acquire a particular language, the environment plays a key role to trigger the innate ability and consequently, the child is exposed to the acquisition of the dominant language around her at a particular given time.

Keywords: bilingual, code-mixing, emergentism, environment, Hausa

Procedia PDF Downloads 129
8903 BodeACD: Buffer Overflow Vulnerabilities Detecting Based on Abstract Syntax Tree, Control Flow Graph, and Data Dependency Graph

Authors: Xinghang Lv, Tao Peng, Jia Chen, Junping Liu, Xinrong Hu, Ruhan He, Minghua Jiang, Wenli Cao

Abstract:

As one of the most dangerous vulnerabilities, effective detection of buffer overflow vulnerabilities is extremely necessary. Traditional detection methods are not accurate enough and consume more resources to meet complex and enormous code environment at present. In order to resolve the above problems, we propose the method for Buffer overflow detection based on Abstract syntax tree, Control flow graph, and Data dependency graph (BodeACD) in C/C++ programs with source code. Firstly, BodeACD constructs the function samples of buffer overflow that are available on Github, then represents them as code representation sequences, which fuse control flow, data dependency, and syntax structure of source code to reduce information loss during code representation. Finally, BodeACD learns vulnerability patterns for vulnerability detection through deep learning. The results of the experiments show that BodeACD has increased the precision and recall by 6.3% and 8.5% respectively compared with the latest methods, which can effectively improve vulnerability detection and reduce False-positive rate and False-negative rate.

Keywords: vulnerability detection, abstract syntax tree, control flow graph, data dependency graph, code representation, deep learning

Procedia PDF Downloads 140
8902 Using IoT on Single Input Multiple Outputs (SIMO) DC–DC Converter to Control Smart-home

Authors: Auwal Mustapha Imam

Abstract:

The aim of the energy management system is to monitor and control utilization, access, optimize and manage energy availability. This can be realized through real-time analyses and energy sources and loads data control in a predictive way. Smart-home monitoring and control provide convenience and cost savings by controlling appliances, lights, thermostats and other loads. There may be different categories of loads in the various homes, and the homeowner may wish to control access to solar-generated energy to protect the storage from draining completely. Controlling the power system operation by managing the converter output power and controlling how it feeds the appliances will satisfy the residential load demand. The Internet of Things (IoT) provides an attractive technological platform to connect the two and make home automation and domestic energy utilization easier and more attractive. This paper presents the use of IoT-based control topology to monitor and control power distribution and consumption by DC loads connected to single-input multiple outputs (SIMO) DC-DC converter, thereby reducing leakages, enhancing performance and reducing human efforts. A SIMO converter was first developed and integrated with the IoT/Raspberry Pi control topology, which enables the user to monitor and control power scheduling and load forecasting via an Android app.

Keywords: flyback, converter, DC-DC, photovoltaic, SIMO

Procedia PDF Downloads 13
8901 Access of Refugees in Rural Areas to Regular Medication during COVID-19 Era: International Organization for Migration, Jordan Experience

Authors: Rasha Shoumar

Abstract:

Background: Since the onset of the Syria crisis in 2011, Jordan has hosted many Syrian refugees, many of which are residing in urban and rural areas. Vulnerability of refugees has increased due to the COVID-19 pandemic, adding to their already existing challenge in access to medical services, rendering them vulnerable to the complications of untreated medical conditions and amplifying their risk for severe COVID-19 disease. To improve health outcomes and access to health care services in a COVID-19 context, IOM (The International Organization for Migration) provided health services including awareness raising, direct primary health care through mobile teams and referrals to secondary services were extended to the vulnerable populations of refugees. Method: 6 community health volunteers were trained and deployed to different governorates to provide COVID-19 and non-communicable disease awareness and collect data rated to non-communicable disease and access to medical health services. Primary health care services were extended to 7 governorates through a mobile medical team, providing medical management. The collected Data was reviewed and analyzed. Results: 2150 refugees in rural areas were reached out by community health volunteers, out of which 78 received their medications through the Ministry of Health, 121 received their medications through different non-governmental organizations, 665 patients couldn’t afford buying any medications, 1286 patients were occasionally buying their medications when they were able to afford it. 853 patients received medications and follow up through IOM mobile clinics, the most common conditions were hypertension, diabetes, hyperlipidemia, anemia, heart disease, thyroid disease, asthma, seizures, and psychiatric conditions. 709 of these patients had more than 3 of the comorbidities. Multiple cases were referred for secondary and tertiary lifesaving interventions. Conclusion: Non communicable diseases are highly prevalent among refugee population in Jordan, access to medical services have proven to be a challenge in rural areas especially during the COVID-19 era, many of the patients have multiple uncontrolled medical conditions placing them at risk for complications and risk for severe COVID-19 disease. Deployment of mobile clinics to rural areas plays an essential role in managing such medical conditions, thus improving the continuum of health care approach, physical and mental wellbeing of refugees and reducing the risk for severe COVID-19 disease among this group, taking us one step forward toward universal health access.

Keywords: COVID-19, refugees, mobile clinics, primary health care

Procedia PDF Downloads 111
8900 Functional Variants Detection by RNAseq

Authors: Raffaele A. Calogero

Abstract:

RNAseq represents an attractive methodology for the detection of functional genomic variants. RNAseq results obtained from polyA+ RNA selection protocol (POLYA) and from exonic regions capturing protocol (ACCESS) indicate that ACCESS detects 10% more coding SNV/INDELs with respect to POLYA. ACCESS requires less reads for coding SNV detection with respect to POLYA. However, if the analysis aims at identifying SNV/INDELs also in the 5’ and 3’ UTRs, POLYA is definitively the preferred method. No particular advantage comes from ACCESS or POLYA in the detection of fusion transcripts.

Keywords: fusion transcripts, INDEL, RNA-seq, WES, SNV

Procedia PDF Downloads 262
8899 Cooperative Diversity Scheme Based on MIMO-OFDM in Small Cell Network

Authors: Dong-Hyun Ha, Young-Min Ko, Chang-Bin Ha, Hyoung-Kyu Song

Abstract:

In Heterogeneous network (HetNet) can provide high quality of a service in a wireless communication system by composition of small cell networks. The composition of small cell networks improves cell coverage and capacity to the mobile users.Recently, various techniques using small cell networks have been researched in the wireless communication system. In this paper, the cooperative scheme obtaining high reliability is proposed in the small cell networks. The proposed scheme suggests a cooperative small cell system and the new signal transmission technique in the proposed system model. The new signal transmission technique applies a cyclic delay diversity (CDD) scheme based on the multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) system to obtain improved performance. The improved performance of the proposed scheme is confirmed by the simulation results.

Keywords: adaptive transmission, cooperative communication, diversity gain, OFDM

Procedia PDF Downloads 466
8898 Bayesian Structural Identification with Systematic Uncertainty Using Multiple Responses

Authors: André Jesus, Yanjie Zhu, Irwanda Laory

Abstract:

Structural health monitoring is one of the most promising technologies concerning aversion of structural risk and economic savings. Analysts often have to deal with a considerable variety of uncertainties that arise during a monitoring process. Namely the widespread application of numerical models (model-based) is accompanied by a widespread concern about quantifying the uncertainties prevailing in their use. Some of these uncertainties are related with the deterministic nature of the model (code uncertainty) others with the variability of its inputs (parameter uncertainty) and the discrepancy between a model/experiment (systematic uncertainty). The actual process always exhibits a random behaviour (observation error) even when conditions are set identically (residual variation). Bayesian inference assumes that parameters of a model are random variables with an associated PDF, which can be inferred from experimental data. However in many Bayesian methods the determination of systematic uncertainty can be problematic. In this work systematic uncertainty is associated with a discrepancy function. The numerical model and discrepancy function are approximated by Gaussian processes (surrogate model). Finally, to avoid the computational burden of a fully Bayesian approach the parameters that characterise the Gaussian processes were estimated in a four stage process (modular Bayesian approach). The proposed methodology has been successfully applied on fields such as geoscience, biomedics, particle physics but never on the SHM context. This approach considerably reduces the computational burden; although the extent of the considered uncertainties is lower (second order effects are neglected). To successfully identify the considered uncertainties this formulation was extended to consider multiple responses. The efficiency of the algorithm has been tested on a small scale aluminium bridge structure, subjected to a thermal expansion due to infrared heaters. Comparison of its performance with responses measured at different points of the structure and associated degrees of identifiability is also carried out. A numerical FEM model of the structure was developed and the stiffness from its supports is considered as a parameter to calibrate. Results show that the modular Bayesian approach performed best when responses of the same type had the lowest spatial correlation. Based on previous literature, using different types of responses (strain, acceleration, and displacement) should also improve the identifiability problem. Uncertainties due to parametric variability, observation error, residual variability, code variability and systematic uncertainty were all recovered. For this example the algorithm performance was stable and considerably quicker than Bayesian methods that account for the full extent of uncertainties. Future research with real-life examples is required to fully access the advantages and limitations of the proposed methodology.

Keywords: bayesian, calibration, numerical model, system identification, systematic uncertainty, Gaussian process

Procedia PDF Downloads 301
8897 Design Channel Non Persistent CSMA MAC Protocol Model for Complex Wireless Systems Based on SoC

Authors: Ibrahim A. Aref, Tarek El-Mihoub, Khadiga Ben Musa

Abstract:

This paper presents Carrier Sense Multiple Access (CSMA) communication model based on SoC design methodology. Such model can be used to support the modelling of the complex wireless communication systems, therefore use of such communication model is an important technique in the construction of high performance communication. SystemC has been chosen because it provides a homogeneous design flow for complex designs (i.e. SoC and IP based design). We use a swarm system to validate CSMA designed model and to show how advantages of incorporating communication early in the design process. The wireless communication created through the modeling of CSMA protocol that can be used to achieve communication between all the agents and to coordinate access to the shared medium (channel).

Keywords: systemC, modelling, simulation, CSMA

Procedia PDF Downloads 392
8896 Efficient Semi-Systolic Finite Field Multiplier Using Redundant Basis

Authors: Hyun-Ho Lee, Kee-Won Kim

Abstract:

The arithmetic operations over GF(2m) have been extensively used in error correcting codes and public-key cryptography schemes. Finite field arithmetic includes addition, multiplication, division and inversion operations. Addition is very simple and can be implemented with an extremely simple circuit. The other operations are much more complex. The multiplication is the most important for cryptosystems, such as the elliptic curve cryptosystem, since computing exponentiation, division, and computing multiplicative inverse can be performed by computing multiplication iteratively. In this paper, we present a parallel computation algorithm that operates Montgomery multiplication over finite field using redundant basis. Also, based on the multiplication algorithm, we present an efficient semi-systolic multiplier over finite field. The multiplier has less space and time complexities compared to related multipliers. As compared to the corresponding existing structures, the multiplier saves at least 5% area, 50% time, and 53% area-time (AT) complexity. Accordingly, it is well suited for VLSI implementation and can be easily applied as a basic component for computing complex operations over finite field, such as inversion and division operation.

Keywords: finite field, Montgomery multiplication, systolic array, cryptography

Procedia PDF Downloads 254
8895 The Evaluation Model for the Quality of Software Based on Open Source Code

Authors: Li Donghong, Peng Fuyang, Yang Guanghua, Su Xiaoyan

Abstract:

Using open source code is a popular method of software development. How to evaluate the quality of software becomes more important. This paper introduces an evaluation model. The model evaluates the quality from four dimensions: technology, production, management, and development. Each dimension includes many indicators. The weight of indicator can be modified according to the purpose of evaluation. The paper also introduces a method of using the model. The evaluating result can provide good advice for evaluating or purchasing the software.

Keywords: evaluation model, software quality, open source code, evaluation indicator

Procedia PDF Downloads 355
8894 The Effect of Visual Fluency and Cognitive Fluency on Access Rates of Web Pages

Authors: Xiaoying Guo, Xiangyun Wang

Abstract:

Access rates is a key indicator of reflecting the popularity of web pages. Having high access rates are very important for web pages, especially for news web pages, online shopping sites and searching engines. In this paper, we analyzed the influences of visual fluency and cognitive fluency on access rates of Chinese web pages. Firstly, we conducted an experiment of scoring the web pages. Twenty-five subjects were invited to view top 50 web pages of China, and they were asked to give a score in a 5-point Likert-scale from four aspects, including complexity, comfortability, familiarity and usability. Secondly, the obtained results was analyzed by correlation analysis and factor analysis in R. By factor analysis; we analyzed the contributions of visual fluency and cognitive fluency to the access rates. The results showed that both visual fluency and cognitive fluency affect the access rate of web pages. Compared to cognitive fluency, visual fluency play a more important role in user’s accessing of web pages.

Keywords: visual fluency, cognitive fluency, visual complexity, usability

Procedia PDF Downloads 347
8893 Multi-Channel Charge-Coupled Device Sensors Real-Time Cell Growth Monitor System

Authors: Han-Wei Shih, Yao-Nan Wang, Ko-Tung Chang, Lung-Ming Fu

Abstract:

A multi-channel cell growth real-time monitor and evaluation system using charge-coupled device (CCD) sensors with 40X lens integrating a NI LabVIEW image processing program is proposed and demonstrated. The LED light source control of monitor system is utilizing 8051 microprocessor integrated with NI LabVIEW software. In this study, the same concentration RAW264.7 cells growth rate and morphology in four different culture conditions (DMEM, LPS, G1, G2) were demonstrated. The real-time cells growth image was captured and analyzed by NI Vision Assistant every 10 minutes in the incubator. The image binarization technique was applied for calculating cell doubling time and cell division index. The cells doubling time and cells division index of four group with DMEM, LPS, LPS+G1, LPS+G2 are 12.3 hr,10.8 hr,14.0 hr,15.2 hr and 74.20%, 78.63%, 69.53%, 66.49%. The image magnification of multi-channel CCDs cell real-time monitoring system is about 100X~200X which compares with the traditional microscope.

Keywords: charge-coupled device (CCD), RAW264.7, doubling time, division index

Procedia PDF Downloads 333
8892 The Effect of Program Type on Mutation Testing: Comparative Study

Authors: B. Falah, N. E. Abakouy

Abstract:

Due to its high computational cost, mutation testing has been neglected by researchers. Recently, many cost and mutants’ reduction techniques have been developed, improved, and experimented, but few of them has relied the possibility of reducing the cost of mutation testing on the program type of the application under test. This paper is a comparative study between four operators’ selection techniques (mutants sampling, class level operators, method level operators, and all operators’ selection) based on the program code type of each application under test. It aims at finding an alternative approach to reveal the effect of code type on mutation testing score. The result of our experiment shows that the program code type can affect the mutation score and that the programs using polymorphism are best suited to be tested with mutation testing.

Keywords: equivalent mutant, killed mutant, mutation score, mutation testing, program code type, software testing

Procedia PDF Downloads 524
8891 Improving Access and Quality of Patient Information Resources for Orthognathic Treatment: A Quality Improvement Project

Authors: Evelyn Marie Richmond, Andrew McBride, Chris Johnston, John Marley

Abstract:

Background: Good quality patient information resources for orthognathic treatment help to reinforce information delivered during the initial consultation and help patients make informed decisions about their care. The Consultant Orthodontists and a Dental Core Trainee noted limited patient engagement with the British Orthodontic Society (BOS) 'Your Jaw Surgery' online resources and that the existing BOS patient information leaflet (PIL) could be customised and developed to meet local requirements. Aim: The quality improvement project (QIP) aimed to improve patients' understanding of orthognathic treatment by ensuring at least 90% of patients had read the new in-house patient information leaflet (PIL) and a minimum of 50% of patients had accessed the British Orthodontic Society (BOS) 'Your Jaw Surgery' online resources before attending the joint orthognathic multidisciplinary clinic by June 2023. Methods: The QIP was undertaken in the orthodontic department of the School of Dentistry, Belfast. Data was collected prospectively during a 6-month period from January 2023 to June 2023 over 3 Plan, Do, Study, Act (PDSA) cycles. Suitable patients were identified at consultant orthodontic new patient clinics. Following initial consultation for orthognathic treatment, patients were contacted to complete a patient questionnaire. Design: The change ideas were a poster with a QR code directing patients to the BOS 'Your Jaw Surgery' website in consultation areas and a new in-house PIL with a QR code directing patients to the BOS 'Your Jaw Surgery' website. Results: In PDSA cycle 1, 86.7% of patients were verbally directed to the BOS 'Your Jaw Surgery' website, and 53.3% accessed the online resources after their initial consultation. Although 100% of patients reported reading the existing PIL, only 64.3% felt it discussed the risks of orthognathic treatment in sufficient detail. By PDSA cycle 3, 100% of patients reported being directed to the BOS 'Your Jaw Surgery' website, however, only 58.3% engaged with the website. 100% of patients who read the new PIL felt that it discussed the risks of orthognathic treatment in sufficient detail. Conclusion: The slight improvement in access to the BOS 'Your Jaw Surgery' website shows that patients do not necessarily choose to access information online despite its availability. The uptake of the new PIL was greater than reported patient engagement with the BOS 'Your Jaw Surgery' website, which indicates patients still value written information despite the availability of online resources.

Keywords: orthognathic surgery, patient information resources, quality improvement project, risks

Procedia PDF Downloads 38
8890 Using Integrative Assessment in Distance Learning: The Case of Department of Education - Navotas City

Authors: Meduranda Marco

Abstract:

This paper aimed to discuss the Integrative Assessment (IA) initiative of the Schools Division Office - Navotas City. The introduction provided a brief landscape analysis of the current state of education, the context of SDO Navotas, and the rationale for the administration of Integrative Assessment (IA) in schools. The IA methodology, procedure, and implementation activities were also shared. Feedback and reports on IA showed positive results as all schools in the Division were able to operationalize IA and consequently foster academic ease for learners and parents. Challenges met after compliance were also documented and strategies to continuously improve the Integrative Assessment process were proposed.

Keywords: distance learning assessment, integrative assessment, academic ease, learning outcomes evaluation

Procedia PDF Downloads 109
8889 Comparison of Donor Motivations in National Collegiate Athletic Association Division I vs Division II

Authors: Soojin Kim, Yongjae Kim

Abstract:

Continuous economic downturn and ongoing budget cuts poses higher education with profound challenges which has a direct impact on the collegiate athletic programs. In response to the ever-changing landscape of the fiscal environment, universities seek to boost revenues, resorting to alternative sources of funding. In particular, athletic programs have become increasingly dependent on financial support from their alumni and boosters, which is how athletic departments attempt to offset budget shortfalls and make capital improvements. Although there currently exists three major divisions within National Collegiate Athletic Association (NCAA), the majority of the sport management studies on college sport tend to focus on Division I level. Particularly within the donor motivation literature, a plethora of donor motivation studies exist, but mainly on NCAA Division I athletic programs. Since each athletic department functions differently in a number of different dimensions, while institutional difference can also have a huge impact on athletic donor motivations, the current study attempts to fill this gap that exists in the literature. As such, the purpose of this study was to (I) reexamine the factor structure of the Athletic Donor motivation scale; and (II) identify the prominent athletic donor motives in a NCAA Division II athletic program. For the purpose of this study, a total of 232 actual donors were used for analysis. A confirmatory factor analysis (CFA) was employed to test construct validity, and the reliability of the scale was assessed using Composite Reliability. To identify the prominent motivational factors, the means and standard deviations were examined. Results of this study indicated that Vicarious Achievement, Philanthropy, and Commitment are the three primary motivational factors, while Tangible Benefits, was consistently found as an important motive in prior studies was found low. Such findings highlight the key difference and suggest different salient motivations exist that are specific to the context.

Keywords: college athletics, donor, motivation, NCAA

Procedia PDF Downloads 121
8888 Constructions of Linear and Robust Codes Based on Wavelet Decompositions

Authors: Alla Levina, Sergey Taranov

Abstract:

The classical approach to the providing noise immunity and integrity of information that process in computing devices and communication channels is to use linear codes. Linear codes have fast and efficient algorithms of encoding and decoding information, but this codes concentrate their detect and correct abilities in certain error configurations. To protect against any configuration of errors at predetermined probability can robust codes. This is accomplished by the use of perfect nonlinear and almost perfect nonlinear functions to calculate the code redundancy. The paper presents the error-correcting coding scheme using biorthogonal wavelet transform. Wavelet transform applied in various fields of science. Some of the wavelet applications are cleaning of signal from noise, data compression, spectral analysis of the signal components. The article suggests methods for constructing linear codes based on wavelet decomposition. For developed constructions we build generator and check matrix that contain the scaling function coefficients of wavelet. Based on linear wavelet codes we develop robust codes that provide uniform protection against all errors. In article we propose two constructions of robust code. The first class of robust code is based on multiplicative inverse in finite field. In the second robust code construction the redundancy part is a cube of information part. Also, this paper investigates the characteristics of proposed robust and linear codes.

Keywords: robust code, linear code, wavelet decomposition, scaling function, error masking probability

Procedia PDF Downloads 463
8887 Anatomical Features of Internal Pudendal Artery

Authors: Adel Yasky, Waseem Al-Talalwah, Shorok Al Dorazi, Roger Soames

Abstract:

The internal pudendal artery is a standard branch of the anterior division of the internal iliac artery. The current study includes 41 cadavers to investigate the origin and branches of the internal pudendal artery and its clinical significances. The internal pudendal artery arose directly from the anterior division of the internal iliac artery in 48.3% while it arose indirectly in 48.5%. However, the internal pudendal artery arose from the posterior division of internal iliac artery in 1.6%. Moreover, it arose internal iliac artery bifurcation site in 1.6%. Further, the internal pudendal artery supplied the urinary bladder in 17.1%. Also, the internal pudendal artery supplied the rectum 33.5% respectively. It gave uterine and vaginal arteries in 9.4% and 7.8% respectively. Finally, it supplied the sciatic nerve via giving lateral sacral branch in 1.6%. Internists, surgeons and radiologists have to be aware of the variability to decrease iatrogenic injury. Therefore, unnecessary proximal ligation should be avoided at the site of indirect origin of the internal pudendal artery to prevent sciatic neuropathy. Further, intrapelvic bleeding as result of laceration of internal pudendal branches during hysterectomy, prostatectomy or proctectomy should be expected. Therefore, this study increases the awareness of surgeons leading to minimize iatrogenic faults,

Keywords: internal pudendal artery, inferior gluteal artery, superior gluteal artery, internal iliac artery, impotence, decreased libido

Procedia PDF Downloads 326
8886 A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance

Authors: Rupan Preet Kaur

Abstract:

This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture.

Keywords: artificial intelligence, machine learning, user access review, access approval

Procedia PDF Downloads 60