268 research outputs found

    Design and Implementation of an Interactive System for Teaching the Islamic Prayer

    Get PDF
    Background: The Islamic Prayer is central to the Islam religion and is a requirement for all Muslims to learn and perform properly. Teaching the Islamic Prayer had traditionally been through the use of textbooks. Aims: This paper describes the design and implementation of the IIP (interactive Islamic Prayer) system to teach the Islamic prayer using Virtual Environments and interactive technologies. Method: The approach taken was to first define the various elements that make up the Islamic Prayer (positions, verbal statements and units). This is then captured in software that uses the Microsoft Windows Kinect system. Results: The Islamic Prayer sequences were successfully captured and implemented in the iIP system. Conclusions: The iIP system design and implementation using Microsoft Windows Kinect system was described. This was based on the definition of the different elements of the Islamic Prayer

    Evaluating a Cloud Service using Scheduling Security Model (SSM)

    Get PDF
    The development in technology makes cloud com-puting widely used in different sectors such as academic and business or for a private purposes. Also, it can provide a convenient services via the Internet allowing stakeholders get all the benefits that the cloud can facilitate. With all the benefits of cloud computing still there are some risks such as security. This brings into consideration the need to improve the Quality of Service (QoS). A Scheduling Security Model (SSM) for Cloud Computing has been developed to address these issues. This paper will discuss the evaluation of the SSM model on some examples with different scenarios to investigate the cost and the effect on the service requested by customers

    Virtual Reality Uterine Resectoscopic Simulator: Face and Construct Validation and Comparative Evaluation in an Educational Environment

    Get PDF
    This pilot study suggests that virtual reality resectoscopic systems have the potential to measure and improve the technical skills of novices before they operate on human patients

    Violence and state response in the reigns of Augustus and Tiberius

    Get PDF
    Bibliography: pages 197-202.This thesis examines the concept of violence during the transition from Republic to Principate. Many of the provisions against violence which evolved during the course of the reigns of Augustus and Tiberius were a direct response to the violence of the Late Republic. They were to a large extent, new and revolutionary, but were not caused by the violence of the Late Republic: rather they were developed as part of the new political scenario to stabilise Roman society and secure the princeps' position. A by-product of these measures was to provide a new context in which violence (particularly institutionalised state violence) could occur, be monitored and controlled. In chapter one I attempt to define violence and to extract the contemporary Roman attitude, without which any conclusions drawn would be inaccurate and unrealistic. I have used Roman legislation - especially the lex Julia de vi (c 18 BC) and have examined the works of Cicero for the frequency and function of vis, the Latin word which most closely corresponds to the English word "violence." I conclude that the Romans had a sophisticated understanding of the concept: i) anything that was not conducted through the due process of law was considered vis, ii) violence was tolerated only in exceptional circumstances, when state security was threatened. In chapter two I explore in greater detail the attempts by goverment to legislate against violence in particular the lex Julia de vi and the lex maiestatis. Although the latter was not employed initially to remove political rivals from the scene, its abuse during the reign of Tiberius became one of the great themes of the historians to illustrate the decline and moral bankruptcy of the Principate and to look nostalgically at the Republic. Chapter three examines how the structure of the Roman criminal system changed, the gradual disintegration of the legal principle of self-help, and the growth and exploitation of the cognitio procedure in Roman courts. The state intruded more into the lives of citizens and therefore exerted more control. The role of three new jurisdictions, imperial, senatorial and that of the urban prefect, in the context of the minimisation and control of violence, is also discussed. The fourth chapter deals with punishment and considers the theory that there was a trend to greater severity in this form of state violence. It examines, against the background of Roman penal aims, the evolution of the symbols and rituals which accompanied different types of punishment. Chapters five and six discuss collective violence, its manifestations and explain the absence of revolution by the plebs. The introduction of new forces into the city (something which was anathema in the Republic) is discussed in the context of policing and law and order. They had a significant impact in the limitation of violence. In the Early Principate violence manifested itself in new contexts and was controlled more effectively than in the Late Republic

    Historical Perspectives and Evolution of Menstrual Terminology

    Get PDF
    Abnormal uterine bleeding (AUB) in the reproductive years in non-pregnant women comprises a group of symptoms that include abnormal frequency and the irregular onset of flow as well as prolonged and heavy menstrual bleeding. It is a common, chronic, and debilitating condition affecting women worldwide with an adverse impact on their quality of life. Until the last decade, the “menstrual” terminology used to describe both normal and abnormal uterine bleeding and its underlying causes was inconsistent, creating considerable confusion. Using standardized terminology may potentially improve clinical management as well as help designing and interpreting basic, translational, epidemiological, and clinical research in women with menstrual problems. In this article, we explore the history and evolution of menstrual terminology and discuss the two International Federation of Gynecology and Obstetrics (FIGO) systems on i.e., (A) menstrual terminology and definitions (B) and the causes of AUB, achieved through international consensus of relevant stakeholders through a long multistage journey

    Introduction to the AIS Code of Research Conduct

    Get PDF
    In this paper, we discuss the AIS Code of Research Conduct approved by AIS Council at its December 2003 meeting. . We explain the purpose of the Code, its focus, who developed the code, and indicate the participation of many leading scholars in our community. We discuss how the Code may be used as an instrument to assist in maintaining the integrity of our journals and conference proceedings. We identify processes by which scholars who were victimized may seek redress. The adoption of this code of research conduct is as an important step in the maturing of our IS community

    Regression test selection model: a comparison between ReTSE and pythia

    Get PDF
    As software systems change and evolve over time regression tests have to be run to validate these changes. Regression testing is an expensive but essential activity in software maintenance. The purpose of this paper is to compare a new regression test selection model called ReTSE with Pythia. The ReTSE model uses decomposition slicing in order to identify the relevant regression tests. Decomposition slicing provides a technique that is capable of identifying the unchanged parts of a system. Pythia is a regression test selection technique based on textual differencing. Both techniques are compare using a Power program taken from Vokolos and Frankl’s paper. The analysis of this comparison has shown promising results in reducing the number of tests to be run after changes are introduced

    Improving visual representations of code

    Get PDF
    This work was done in 1997 at the Centre for Software Maintenance at the University of DurhamThe contents of this paper describe the work carried out by the Visual Research Group in the Centre for Software Maintenance at the University of Durham.Publisher PD
    • …
    corecore