925 research outputs found

    Architecture and Design of Medical Processor Units for Medical Networks

    Full text link
    This paper introduces analogical and deductive methodologies for the design medical processor units (MPUs). From the study of evolution of numerous earlier processors, we derive the basis for the architecture of MPUs. These specialized processors perform unique medical functions encoded as medical operational codes (mopcs). From a pragmatic perspective, MPUs function very close to CPUs. Both processors have unique operation codes that command the hardware to perform a distinct chain of subprocesses upon operands and generate a specific result unique to the opcode and the operand(s). In medical environments, MPU decodes the mopcs and executes a series of medical sub-processes and sends out secondary commands to the medical machine. Whereas operands in a typical computer system are numerical and logical entities, the operands in medical machine are objects such as such as patients, blood samples, tissues, operating rooms, medical staff, medical bills, patient payments, etc. We follow the functional overlap between the two processes and evolve the design of medical computer systems and networks.Comment: 17 page

    Information Security Synthesis in Online Universities

    Full text link
    Information assurance is at the core of every initiative that an organization executes. For online universities, a common and complex initiative is maintaining user lifecycle and providing seamless access using one identity in a large virtual infrastructure. To achieve information assurance the management of user privileges affected by events in the user's identity lifecycle needs to be the determining factor for access control. While the implementation of identity and access management systems makes this initiative feasible, it is the construction and maintenance of the infrastructure that makes it complex and challenging. The objective of this paper1 is to describe the complexities, propose a practical approach to building a foundation for consistent user experience and realizing security synthesis in online universities.Comment: 20 page

    Information Security Plan for Flight Simulator Applications

    Full text link
    The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. We will be creating a system that will allow them to access their programs, back office and administrator functions remotely. A security plan outlining our security architecture will be delivered prior to the final code roll out. The plan will include responses to encryption used and the security architecture applied in the final documentation. The code will be delivered in phases to work out any issues that may occur during the implementationComment: 15 pages; International Journal of Computer Science & Information Technology (IJCSIT), Vol. 3, No 3, June 201

    EXAMINING THE IMPACT OF SOCIAL MEDIA ON THE ACADEMIC PERFORMANCES OF SAUDI STUDENTS - CASE STUDY: PRINCE SATTAM BIN ABDUL AZIZ UNIVERSITY

    Get PDF
    undergraduate students’ academic performances and their social interpersonal skills in the Prince Sattam bin Abdulaziz University. Design/methodology/approach: 64 samples were collected from full-time undergraduate students studying in Prince Sattam bin Abdulaziz University from different colleges including Community college, College of Business Administration, College of Education, College of Engineering and College of Pharmacy. The descriptive statistics analysis was used to analyze the demographic data while inferential statistics were used in testing the research hypotheses. The results obtained from the analyses were used to interpret the outcomes. Findings: The empirical results reveal that the students enjoy meeting new friends online using social media rather than meeting in person and for this reason they spend a lot of time – addicted. It is also confirmed that the bad comments are passed easily through social media affecting other's sentiments and most of them strongly believe that all the information in social media is true and reliable and the rumors were spread easily in social media. Further, it is also confirmed that social media does not support the Learning of the students. Practical Implications: The study confirms that the students exchange learning materials through social media and it helps them to update the developments in their college/university. The students believe that through Social media they have improved their communication skills and they can communicate with anyone at any time. It is also found that some of their teachers communicate with them and encourage them to use social media but for studying only.    Originality/value: The research work is of its first kind as it focuses on the impact of social media on the academic performances of the students studying in Prince Sattam bin Abdulaziz University, Saudi Arabia, which has suggested effective means for effective implementation of social media strategy

    Object's shadow removal with removal validation

    Get PDF
    We introduce in this paper, a shadow detection and removal method for moving objects especially for humans and vehicles. An effective method is presented for detecting and removing shadows from foreground figures. We assume that the foreground figures have been extracted from the input image by some background subtraction method. A figure may contain only one moving object with or without shadow. The homogeneity property of shadows is explored in a novel way for shadow detection and image division technique is used. The process is followed by filtering, removal, boundary removal and removal validation

    Evaluation of Transportation Demand Management (TDM) Strategies and Its Prospect in Saudi Arabia

    Get PDF
    Nowadays it is reiterated in the literature to put more emphasis on Transportation Demand Management (TDM) strategies rather than the traditional transportation strategies which are based on “supply-side” tactic specifically in rapidly growing developing countries. The experiences of many cities reveal that as capacity is increased, demand increases at a similar rate, and subsequently in the long-term, drivers experience no net travel time advantages and the society suffers from the impacts of costly road bills and environmental degradation. This paper suggests emphasizing on TDM strategies to ensure sustainable transportation. The increasing trend of passenger cars in Saudi Arabia makes it more important to concentrate on TDM strategies as a tool for curbing vehicular pollution and congestion. This paper investigated the concept of TDM strategies focusing on the effect of TDM strategies on vehicular emissions and congestion. The analysis of limited scale interviews with experts revealed that tele-working, E-government, electronic shopping, congestion and parking pricing, increased fuel pricing, preferential treatment of HOV, Light Rail Transit (LRT) might be the potential TDM measures. The concerned authorities should think of an innovative mode of public transit services and continuously improve the services to encourage people to switch to public transit. Finally, this paper recommends adopting a public participatory approach in developing TDM strategies which will significantly contribute in reducing vehicular emissions and congestion and ultimately ensure sustainable transportation

    Exact parallel plurality voting algorithm for totally ordered object space fault-tolerant systems

    Get PDF
    Plurality voter is one of the commonest voting methods for decision making in highly-reliable applications in which the reliability and safety of the system is critical. To resolve the problem associated with sequential plurality voter in dealing with large number of inputs, this paper introduces a new generation of plurality voter based on parallel algorithms. Since parallel algorithms normally have high processing speed and are especially appropriate for large scale systems, they are therefore used to achieve a new parallel plurality voting algorithm by using (n/log n) processors on EREW shared-memory PRAM. The asymptotic analysis of the new proposed algorithm has demonstrated that it has a time complexity of O (log n) which is less than time complexity of sequential plurality algorithm, i.e. Ω (n log n)

    Trends, prospects and utilizations of sea cucumber fisheries in Malaysia

    Get PDF
    The holothurian or sea cucumber is one of the marine resources, which has been used not only as luxury food for certain countries but also as medicines. Because of its’ higher nutraceutical and pharmaceutical values, sea cucumber has become one of the most important products and it has high price in international market and thus provide an important employment and income source to the coastal communities in many Pacific island countries including Malaysia. They have been harvested for hundreds of years for trade with Asia and were probably one of the worthy exports from the Indo-Pacific islands. Unfortunately, the increase in demand and price, combined with the development of cash economies and growing coastal populations in many islands, has led to widespread overfishing of the resource across much of this region. There is a high level of interest in adoption of aquaculture and stock enhancement techniques to restore production phases,but different capacity levels require implementation of different techniques.Some Pacific island countries and territories have completed successful research trials of hatchery, nursery and release techniques,and now have capacity to scale up this activity but such types of research are still in the initial stage in Malaysia. Factors that work in favor of successful aquaculture include pristine marine environments,long familiarity with sea cucumbers as a commodity,and traditional marine tenure systems that in some places can provide a basis for management of released sea cucumbers.Currently,the exploitation of sea cucumber turns out to be excessive and disrupts its sustainability. Aquaculture is the best way to prevent this severe problem. The success of sea cucumber culture is very depending on broodstock management,seed availability and suitable food for larvae as well as juvenile along with appropriate grow-out culture techniques under controlled rearing protocols
    corecore