Search results for: researchers.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 750

Search results for: researchers.

600 A Systematic Approach for Design a Low-Cost Mobility Assistive Device for Elderly People

Authors: Omar Salah, Ahmed A. Ramadan, Salvatore Sessa, Ahmed A. Abo-Ismail

Abstract:

Walking and sit to stand are activities carried out by all the people many times during the day, but physical disabilities due to age and diseases create needs of assistive devices to help elderly people during their daily life. This study aims to study the different types and mechanisms of the assistive devices. We will analyze the limitations and the challenges faced by the researchers in this field. We will introduce the Assistive Device developed at the Egypt-Japan University of Science and Technology, named E-JUST Assistive Device (EJAD). EJAD will be a low cost intelligent assistive device to help elders in walking and sit-to-stand activities.

Keywords: Active walker, Assistive robotics, Standing Assistance, Walking Assistance

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2839
599 A New Similarity Measure on Intuitionistic Fuzzy Sets

Authors: Binyamin Yusoff, Imran Taib, Lazim Abdullah, Abd Fatah Wahab

Abstract:

Intuitionistic fuzzy sets as proposed by Atanassov, have gained much attention from past and latter researchers for applications in various fields. Similarity measures between intuitionistic fuzzy sets were developed afterwards. However, it does not cater the conflicting behavior of each element evaluated. We therefore made some modification to the similarity measure of IFS by considering conflicting concept to the model. In this paper, we concentrate on Zhang and Fu-s similarity measures for IFSs and some examples are given to validate these similarity measures. A simple modification to Zhang and Fu-s similarity measures of IFSs was proposed to find the best result according to the use of degree of indeterminacy. Finally, we mark up with the application to real decision making problems.

Keywords: Intuitionistic fuzzy sets, similarity measures, multicriteriadecision making.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2777
598 The Libyc Writing

Authors: S. Ait Ali Yahia

Abstract:

One of the main features of the Maghreb is its linguistic richness. The multilingualism is a fact which always marked the Maghreb since the beginning of the history up to know. Since the arrival of the Phoenicians, followed by the Carthaginians, Romans, and Arabs, etc, there was a social group in the Maghreb which controlled two kinds of idioms. The libyc one remained, despite everything, the local language used by the major part of the population. This language had a support of written transmission attested by many inscriptions. Among all the forms of the Maghreb writing, this alphabet, however, continues to cause a certain number of questions about the origin and the date of its appearance. The archaeological, linguistic and historical data remain insufficient to answer these questions. This did not prevent the researchers from giving an opinion. In order to answer these questions we will expose here the various assumptions adopted by various authors who are founded on more or less explicit arguments. We will also speak about the various forms taken by the libyc writing during antiquity.

Keywords: The alphabet libyc, Eastern libyc, Western libyc.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2581
597 Sustained Competitive Advantage: Strategic HRM Initiatives and Consequences in Indian Context

Authors: S. Velmurugan, K. B. Akhilesh

Abstract:

In the past few decades, researchers have witnessed a paradigm shift in Human Resource Management-from individual performance to organizational outcomes with the role of Human resource (HR) managers becoming increasingly significant to the organization. In such a context, it is important to examine HR practices from a strategic perspective on the sustained competitive advantage (SCA) of the organizations. The present study explores how Indian organisations look at their human resources strategically when faced with competitive environment. Also, it explores strategic initiatives being taken to manage human resources within the organisations and how these initiatives promote SCA in terms of enhancing the overall customer-centric delivery of goods and services.

Keywords: Strategic HRM, Strategic HRM Initiatives, Consequences, and Sustained Competitive Advantage.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4565
596 Supplier Sift – A Strategic Need of Modern Entrepreneurship

Authors: Rizwan Moeen, Riaz Ahmad, Tanweer Ul Islam, Shahid Ikramullah, Muhammad Umer

Abstract:

Supplier appraisal fosters energy in Supply Chain Management and helps in best optimization of viable business partners for a company. Many Decision Making techniques have already been proposed by researchers for supplier-s appraisal. However, Analytic Hierarchy Process (AHP) is assumed to be the most structured technique to attain near-best solution of the problem. This paper focuses at implementation of AHP in the procurement processes. It also suggests that on what factors a Public Sector Enterprises must focus while dealing with their suppliers and what should the suppliers do to synchronize their activities with the strategic objectives of Organization. It also highlights the weak areas in supplier appraisal process with a view to suggest viable recommendations.

Keywords: AHP, MCDM techniques, Supply Chain Management (SCM), Supplier appraisal.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2226
595 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al Amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: Computer viruses, virus detection, signature-based, behaviour-based, heuristic-based.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4545
594 Investigation of Stability of Functionally Graded Material when Encountering Periodic Loading

Authors: M. Amiri

Abstract:

In this work, functionally graded materials (FGMs), subjected to loading, which varies with time has been studied. The material properties of FGM are changing through the thickness of material as power law distribution. The conical shells have been chosen for this study so in the first step capability equations for FGM have been obtained. With Galerkin method, these equations have been replaced with time dependant differential equations with variable coefficient. These equations have solved for different initial conditions with variation methods. Important parameters in loading conditions are semi-vertex angle, external pressure and material properties. Results validation has been done by comparison between with those in previous studies of other researchers.

Keywords: Impulsive semi-vertex angle, loading, functionally graded materials, composite material.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1163
593 Performance Boundaries for Interactive Finite Element Applications

Authors: Jaewon Jang, Gregory R. Miller

Abstract:

This paper presents work characterizing finite element performance boundaries within which live, interactive finite element modeling is feasible on current and emerging systems. These results are based on wide-ranging tests performed using a prototype finite element program implemented specifically for this study, thereby enabling the unified investigation of numerous direct and iterative solver strategies and implementations in a variety of modeling contexts. The results are intended to be useful for researchers interested in interactive analysis by providing baseline performance estimates, to give guidance in matching solution strategies to problem domains, and to spur further work addressing the challenge of extending the present boundaries.

Keywords: Finite Elements, Interactive Modeling, NumericalAnalysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1308
592 Dynamic Action Induced By Walking Pedestrian

Authors: J. Kala, V. Salajka, P. Hradil

Abstract:

The main focus of this paper is on the human induced forces. Almost all existing force models for this type of load (defined either in the time or frequency domain) are developed from the assumption of perfect periodicity of the force and are based on force measurements conducted on rigid (i.e. high frequency) surfaces. To verify the different authors conclusions the vertical pressure measurements invoked during the walking was performed, using pressure gauges in various configurations. The obtained forces are analyzed using Fourier transformation. This load is often decisive in the design of footbridges. Design criteria and load models proposed by widely used standards and other researchers were introduced and a comparison was made.

Keywords: Pedestrian action, Experimental analysis, Fourier series, serviceability, cycle loading.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2401
591 Assessment of Collapse Potential of Degrading SDOF Systems

Authors: Muzaffer Borekci, Murat S. Kirçil

Abstract:

Predicting the collapse potential of a structure during earthquakes is an important issue in earthquake engineering. Many researchers proposed different methods to assess the collapse potential of structures under the effect of strong ground motions. However most of them did not consider degradation and softening effect in hysteretic behavior. In this study, collapse potential of SDOF systems caused by dynamic instability with stiffness and strength degradation has been investigated. An equation was proposed for the estimation of collapse period of SDOF system which is a limit value of period for dynamic instability. If period of the considered SDOF system is shorter than the collapse period then the relevant system exhibits dynamic instability and collapse occurs.

Keywords: Collapse, degradation, dynamic instability, seismic response.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2049
590 An Approach for the Prediction of Cardiovascular Diseases

Authors: Nebi Gedik

Abstract:

Regardless of age or gender, cardiovascular illnesses are a serious health concern because of things like poor eating habits, stress, a sedentary lifestyle, hard work schedules, alcohol use, and weight. It tends to happen suddenly and has a high rate of recurrence. Machine learning models can be implemented to assist healthcare systems in the accurate detection and diagnosis of cardiovascular disease (CVD) in patients. Improved heart failure prediction is one of the primary goals of researchers using the heart disease dataset. The purpose of this study is to identify the feature or features that offer the best classification prediction for CVD detection. The support vector machine classifier is used to compare each feature's performance. It has been determined which feature produces the best results.

Keywords: Cardiovascular disease, feature extraction, supervised learning, support vector machine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 58
589 Overview of Adaptive Spline Interpolation

Authors: Rongli Gai, Zhiyuan Chang, Xiaohong Wang, Jingyu Liu

Abstract:

In view of various situations in the interpolation process, most researchers use self-adaptation to adjust the interpolation process, which is also one of the current and future research hotspots in the field of CNC (Computerized Numerical Control) machining. In the interpolation process, according to the overview of the spline curve interpolation algorithm, the adaptive analysis is carried out from the factors affecting the interpolation process. The adaptive operation is reflected in various aspects, such as speed, parameters, errors, nodes, feed rates, random period, sensitive point, step size, curvature, adaptive segmentation, adaptive optimization, etc. This paper will analyze and summarize the research of adaptive imputation in the direction of the above factors affecting imputation.

Keywords: Adaptive algorithm, CNC machining, interpolation constraints, spline curve interpolation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 477
588 Sensitive Analysis of the ZF Model for ABC Multi Criteria Inventory Classification

Authors: Makram Ben Jeddou

Abstract:

ABC classification is widely used by managers for inventory control. The classical ABC classification is based on Pareto principle and according to the criterion of the annual use value only. Single criterion classification is often insufficient for a closely inventory control. Multi-criteria inventory classification models have been proposed by researchers in order to consider other important criteria. From these models, we will consider a specific model in order to make a sensitive analysis on the composite score calculated for each item. In fact, this score, based on a normalized average between a good and a bad optimized index, can affect the ABC-item classification. We will focus on items differently assigned to classes and then propose a classification compromise.

Keywords: ABC classification, Multi criteria inventory classification models, ZF-model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2466
587 Zero Truncated Strict Arcsine Model

Authors: Y. N. Phang, E. F. Loh

Abstract:

The zero truncated model is usually used in modeling count data without zero. It is the opposite of zero inflated model. Zero truncated Poisson and zero truncated negative binomial models are discussed and used by some researchers in analyzing the abundance of rare species and hospital stay. Zero truncated models are used as the base in developing hurdle models. In this study, we developed a new model, the zero truncated strict arcsine model, which can be used as an alternative model in modeling count data without zero and with extra variation. Two simulated and one real life data sets are used and fitted into this developed model. The results show that the model provides a good fit to the data. Maximum likelihood estimation method is used in estimating the parameters.

Keywords: Hurdle models, maximum likelihood estimation method, positive count data.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1816
586 Tourist Satisfaction and Repeat Visitation; Toward a New Comprehensive Model

Authors: Ahmad Puad Mat Som, Mohammad Bader Badarneh

Abstract:

Tourism researchers have recently focused on repeat visitation as a part of destination loyalty. Different models have also considered satisfaction as the main determinant of revisit intention, while findings in many studies show it as a continuous issue. This conceptual paper attempts at evaluating recent empirical studies on satisfaction and revisit intention. Based on limitations and gaps in recent studies, the current paper suggests a new model that would be more comprehensive than those in previous studies. The new model offers new relationships between antecedents (destination image, perceived value, specific novelty seeking, and distance to destination) and both of satisfaction and revisit intention. Revisit intention in turn is suggested to be measured in a temporal approach.

Keywords: Satisfaction, revisit intention, a new model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7029
585 Danger Theory and Intelligent Data Processing

Authors: Anjum Iqbal, Mohd Aizaini Maarof

Abstract:

Artificial Immune System (AIS) is relatively naive paradigm for intelligent computations. The inspiration for AIS is derived from natural Immune System (IS). Classically it is believed that IS strives to discriminate between self and non-self. Most of the existing AIS research is based on this approach. Danger Theory (DT) argues this approach and proposes that IS fights against danger producing elements and tolerates others. We, the computational researchers, are not concerned with the arguments among immunologists but try to extract from it novel abstractions for intelligent computation. This paper aims to follow DT inspiration for intelligent data processing. The approach may introduce new avenue in intelligent processing. The data used is system calls data that is potentially significant in intrusion detection applications.

Keywords: artificial immune system, danger theory, intelligent processing, system calls

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1839
584 Power Quality Evaluation of Electrical Distribution Networks

Authors: Mohamed Idris S. Abozaed, Suliman Mohamed Elrajoubi

Abstract:

Researches and concerns in power quality gained significant momentum in the field of power electronics systems over the last two decades globally. This sudden increase in the number of concerns over power quality problems is a result of the huge increase in the use of non-linear loads. In this paper, power quality evaluation of some distribution networks at Misurata - Libya has been done using a power quality and energy analyzer (Fluke 437 Series II). The results of this evaluation are used to minimize the problems of power quality. The analysis shows the main power quality problems that exist and the level of awareness of power quality issues with the aim of generating a start point which can be used as guidelines for researchers and end users in the field of power systems.

Keywords: Power Quality Disturbances, Power Quality Evaluation, Statistical Analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3154
583 Experimental Study of Subsurface Erosion in River Banks

Authors: F. Imanshoar, M. R. M. Tabatabai, Y. Hassanzadeh, M. Rostamipoor

Abstract:

Subsurface erosion in river banks and its details, in spite of its occurrence in various parts of the world has rarely been paid attention by researchers. In this paper, quantitative concept of the subsurface bank erosion has been investigated for vertical banks. Vertical banks were simulated experimentally by considering a sandy erodible layer overlaid by clayey one under uniformly distributed constant overhead pressure. Results of the experiments are indicated that rate of sandy layer erosion is decreased by an increase in overburden; likewise, substituting 20% of coarse (3.5 mm) sand layer bed material by fine material (1.4 mm) may lead to a decrease in erosion rate by one-third. This signifies the importance of the bed material composition effect on sandy layers erosion due to subsurface erosion in river banks.

Keywords: Subsurface Erosion, Vertical Banks, Bed Material Size

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2027
582 The Impact of Training Method on Programming Learning Performance

Authors: Chechen Liao, Chin Yi Yang

Abstract:

Although several factors that affect learning to program have been identified over the years, there continues to be no indication of any consensus in understanding why some students learn to program easily and quickly while others have difficulty. Seldom have researchers considered the problem of how to help the students enhance the programming learning outcome. The research had been conducted at a high school in Taiwan. Students participating in the study consist of 330 tenth grade students enrolled in the Basic Computer Concepts course with the same instructor. Two types of training methods-instruction-oriented and exploration-oriented were conducted. The result of this research shows that the instruction-oriented training method has better learning performance than exploration-oriented training method.

Keywords: Learning performance, programming learning, TDD, training method.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1906
581 A Fast Block-based Evolutional Algorithm for Combinatorial Problems

Authors: Huang, Wei-Hsiu Chang, Pei-Chann, Wang, Lien-Chun

Abstract:

The problems with high complexity had been the challenge in combinatorial problems. Due to the none-determined and polynomial characteristics, these problems usually face to unreasonable searching budget. Hence combinatorial optimizations attracted numerous researchers to develop better algorithms. In recent academic researches, most focus on developing to enhance the conventional evolutional algorithms and facilitate the local heuristics, such as VNS, 2-opt and 3-opt. Despite the performances of the introduction of the local strategies are significant, however, these improvement cannot improve the performance for solving the different problems. Therefore, this research proposes a meta-heuristic evolutional algorithm which can be applied to solve several types of problems. The performance validates BBEA has the ability to solve the problems even without the design of local strategies.

Keywords: Combinatorial problems, Artificial Chromosomes, Blocks Mining, Block Recombination

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1379
580 The Role of Private Equity during Global Crises

Authors: Libena Cernohorska, Veronika Linhartova, Michal Sinka, Petr Teply

Abstract:

The term private equity usually refers to any type of equity investment in an asset in which the equity is not freely tradable on a public stock market. Some researchers believe that private equity contributed to the extent of the crisis and increased the pace of its spread over the world. We do not agree with this. On the other hand, we argue that during the economic recession private equity might become an important source of funds for firms with special needs (e.g. for firms seeking buyout financing, venture capital, expansion capital or distress debt financing). However, over-regulation of private equity in both the European Union and the US can slow down this specific funding channel to the economy and deepen credit crunch during global crises.

Keywords: scredit lunch, distress debt, global crisis, private equity, regulation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1810
579 Convergence and Divergence in Telephone Conversations: A Case of Persian

Authors: Anna Mirzaiyan, Vahid Parvaresh, Mahmoud Hashemian, Masoud Saeedi

Abstract:

People usually have a telephone voice, which means they adjust their speech to fit particular situations and to blend in with other interlocutors. The question is: Do we speak differently to different people? This possibility has been suggested by social psychologists within Accommodation Theory [1]. Converging toward the speech of another person can be regarded as a polite speech strategy while choosing a language not used by the other interlocutor can be considered as the clearest example of speech divergence [2]. The present study sets out to investigate such processes in the course of everyday telephone conversations. Using Joos-s [3] model of formality in spoken English, the researchers try to explore convergence to or divergence from the addressee. The results propound the actuality that lexical choice, and subsequently, patterns of style vary intriguingly in concordance with the person being addressed.

Keywords: Convergence, divergence, lexical formality, speechaccommodation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3474
578 Cantor Interpolating Spline to Design Electronic Mail Boxes

Authors: Adil Al-Rammahi

Abstract:

Electronic mail is very important in present time. Many researchers work for designing, improving, securing, fasting, goodness and others fields in electronic mail. This paper introduced new algorithm to use Cantor sets and cubic spline interpolating function in the electronic mail design. Cantor sets used as the area (or domain) of the mail, while spline function used for designing formula. The roots of spline function versus Cantor sets used as the controller admin. The roots calculated by the numerical Newton – Raphson's method. The result of this algorithm was promised.

Keywords: Cantor sets, spline, electronic mail design, Newton – Raphson's method.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1553
577 Analysis of Classifications of Unsolicited Bulk Emails

Authors: Jatinderkumar R. Saini, Apurva A. Desai

Abstract:

In recent times, the problem of Unsolicited Bulk Email (UBE) or commonly known as Spam Email, has increased at a tremendous growth rate. We present an analysis of survey based on classifications of UBE in various research works. There are many research instances for classification between spam and non-spam emails but very few research instances are available for classification of spam emails, per se. This paper does not intend to assert some UBE classification to be better than the others nor does it propose any new classification but it bemoans the lack of harmony on number and definition of categories proposed by different researchers. The paper also elaborates on factors like intent of spammer, content of UBE and ambiguity in different categories as proposed in related research works of classifications of UBE.

Keywords: E-mail, Scams, Spam Email, Unsolicited Bulk Email(UBE)

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1675
576 Challenges to Enable Quick Start of an Environmental Monitoring with Wireless Sensor Network Technology

Authors: Masaki Ito, Hideyuki Tokuda, Takao Kawamura, Kazunori Sugahara

Abstract:

With the advancement of wireless sensor network technology, its practical utilization is becoming an important challange. This paper overviews my past environmental monitoring project, and discusses the process of starting the monitoring by classifying it into four steps. The steps to start environmental monitoring can be complicated, but not well discussed by researchers of wireless sensor network technology. This paper demonstrates our activity and challenges in each of the four steps to ease the process, and argues future challenges to enable quick start of environmental monitoring.

Keywords: Environmental Monitoring, Wireless Sensor Network, Field Experiment and Research Challenges.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1908
575 Learning and Teaching in the Panopticon:Ethical and Social Issues in Creating a Virtual Educational Environment

Authors: K. Sheehy, R. Ferguson, G. Clough

Abstract:

This paper examines ethical and social issues which have proved important when initiating and creating educational spaces within a virtual environment. It focuses on one project, identifying the key decisions made, the barriers to new practice encountered and the impact these had on the project. It demonstrates the importance of the 'backstage' ethical and social issues involved in the creation of a virtual education community and offers conclusions, and questions, which will inform future research and practice in this area. These ethical issues are considered using Knobel-s framework of front-end, in-process and back-end concerns, and include establishing social practices for the islands, allocating access rights, considering personal safety and supporting researchers appropriately within this context.

Keywords: distance education, ethics, virtual environments.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1452
574 Categories of Botnet: A Survey

Authors: D. Seenivasan, K. Shanthi

Abstract:

Botnets are one of the most serious and widespread cyber threats. Today botnets have been facilitating many cybercrimes, especially financial, top secret thefts. Botnets can be available for lease in the market and are utilized by the cybercriminals to launch massive attacks like DDoS, click fraud, phishing attacks etc., Several large institutions, hospitals, banks, government organizations and many social networks such as twitter, facebook etc., became the target of the botmasters. Recently, noteworthy researches have been carried out to detect bot, C&C channels, botnet and botmasters. Using many sophisticated technologies, botmasters made botnet a titan of the cyber world. Innumerable challenges have been put forth by the botmasters to the researchers in the detection of botnet. In this paper we present a survey of different types of botnet C&C channels and also provide a comparison of various botnet categories. Finally we hope that our survey will create awareness for forthcoming botnet research endeavors.

Keywords: Bot, Botmaster, Botnet, Botnet cloud, Mobile Botnet.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4072
573 Soft Computing based Retrieval System for Medical Applications

Authors: Pardeep Singh, Sanjay Sharma

Abstract:

With increasing data in medical databases, medical data retrieval is growing in popularity. Some of this analysis including inducing propositional rules from databases using many soft techniques, and then using these rules in an expert system. Diagnostic rules and information on features are extracted from clinical databases on diseases of congenital anomaly. This paper explain the latest soft computing techniques and some of the adaptive techniques encompasses an extensive group of methods that have been applied in the medical domain and that are used for the discovery of data dependencies, importance of features, patterns in sample data, and feature space dimensionality reduction. These approaches pave the way for new and interesting avenues of research in medical imaging and represent an important challenge for researchers.

Keywords: CBIR, GA, Rough sets, CBMIR, SVM.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1690
572 A Review of Survey Methodology Employedin IT Outsourcing

Authors: B. Terzioglu, E.S.K. Chan

Abstract:

The purpose of this paper is to provide an overview on methodological aspects of the information technology outsourcing (ITO) surveys, in an attempt to improve the data quality and reporting in survey research. It is based on a review of thirty articles on ITO surveys and focuses on two commonly explored dimensions of ITO, namely what are outsourced and why should there be ITO. This study highlights weaknesses in ITO surveys including lack of a clear definition of population, lack of information regarding the sampling method used, not citing the response rate, no information pertaining to pilot testing of survey instrument and absence of information on internal validity in the use or reporting of surveys. This study represents an attempt with a limited scope to point to shortfalls in the use survey methodology in ITO, and thus raise awareness among researchers in enhancing the reliability of survey findings.

Keywords: ITO, information technology outsourcing, survey methodology

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1807
571 Deficiencies of Lung Segmentation Techniques using CT Scan Images for CAD

Authors: Nisar Ahmed Memon, Anwar Majid Mirza, S.A.M. Gilani

Abstract:

Segmentation is an important step in medical image analysis and classification for radiological evaluation or computer aided diagnosis. This paper presents the problem of inaccurate lung segmentation as observed in algorithms presented by researchers working in the area of medical image analysis. The different lung segmentation techniques have been tested using the dataset of 19 patients consisting of a total of 917 images. We obtained datasets of 11 patients from Ackron University, USA and of 8 patients from AGA Khan Medical University, Pakistan. After testing the algorithms against datasets, the deficiencies of each algorithm have been highlighted.

Keywords: Computer Aided Diagnosis (CAD), MathematicalMorphology, Medical Image Analysis, Region Growing, Segmentation, Thresholding,

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2298