925 research outputs found
Architecture and Design of Medical Processor Units for Medical Networks
This paper introduces analogical and deductive methodologies for the design
medical processor units (MPUs). From the study of evolution of numerous earlier
processors, we derive the basis for the architecture of MPUs. These specialized
processors perform unique medical functions encoded as medical operational
codes (mopcs). From a pragmatic perspective, MPUs function very close to CPUs.
Both processors have unique operation codes that command the hardware to
perform a distinct chain of subprocesses upon operands and generate a specific
result unique to the opcode and the operand(s). In medical environments, MPU
decodes the mopcs and executes a series of medical sub-processes and sends out
secondary commands to the medical machine. Whereas operands in a typical
computer system are numerical and logical entities, the operands in medical
machine are objects such as such as patients, blood samples, tissues, operating
rooms, medical staff, medical bills, patient payments, etc. We follow the
functional overlap between the two processes and evolve the design of medical
computer systems and networks.Comment: 17 page
Information Security Synthesis in Online Universities
Information assurance is at the core of every initiative that an organization
executes. For online universities, a common and complex initiative is
maintaining user lifecycle and providing seamless access using one identity in
a large virtual infrastructure. To achieve information assurance the management
of user privileges affected by events in the user's identity lifecycle needs to
be the determining factor for access control. While the implementation of
identity and access management systems makes this initiative feasible, it is
the construction and maintenance of the infrastructure that makes it complex
and challenging. The objective of this paper1 is to describe the complexities,
propose a practical approach to building a foundation for consistent user
experience and realizing security synthesis in online universities.Comment: 20 page
Information Security Plan for Flight Simulator Applications
The Department of Defense has a need for an identity management system that
uses two factor authentications to ensure that only the correct individuals get
access to their top secret flight simulator program. Currently the Department
of Defense does not have a web interface sign in system. We will be creating a
system that will allow them to access their programs, back office and
administrator functions remotely. A security plan outlining our security
architecture will be delivered prior to the final code roll out. The plan will
include responses to encryption used and the security architecture applied in
the final documentation. The code will be delivered in phases to work out any
issues that may occur during the implementationComment: 15 pages; International Journal of Computer Science & Information
Technology (IJCSIT), Vol. 3, No 3, June 201
EXAMINING THE IMPACT OF SOCIAL MEDIA ON THE ACADEMIC PERFORMANCES OF SAUDI STUDENTS - CASE STUDY: PRINCE SATTAM BIN ABDUL AZIZ UNIVERSITY
undergraduate students’ academic performances and their social interpersonal skills in the Prince Sattam bin Abdulaziz University.
Design/methodology/approach: 64 samples were collected from full-time undergraduate students studying in Prince Sattam bin Abdulaziz University from different colleges including Community college, College of Business Administration, College of Education, College of Engineering and College of Pharmacy. The descriptive statistics analysis was used to analyze the demographic data while inferential statistics were used in testing the research hypotheses. The results obtained from the analyses were used to interpret the outcomes.
Findings: The empirical results reveal that the students enjoy meeting new friends online using social media rather than meeting in person and for this reason they spend a lot of time – addicted. It is also confirmed that the bad comments are passed easily through social media affecting other's sentiments and most of them strongly believe that all the information in social media is true and reliable and the rumors were spread easily in social media. Further, it is also confirmed that social media does not support the Learning of the students.
Practical Implications: The study confirms that the students exchange learning materials through social media and it helps them to update the developments in their college/university. The students believe that through Social media they have improved their communication skills and they can communicate with anyone at any time. It is also found that some of their teachers communicate with them and encourage them to use social media but for studying only.
Originality/value: The research work is of its first kind as it focuses on the impact of social media on the academic performances of the students studying in Prince Sattam bin Abdulaziz University, Saudi Arabia, which has suggested effective means for effective implementation of social media strategy
Object's shadow removal with removal validation
We introduce in this paper, a shadow detection and removal method for moving objects especially for humans and vehicles. An effective method is presented for detecting and removing shadows from foreground figures. We assume that the foreground figures have been extracted from the input image by some background subtraction method. A figure may contain only one moving object with or without shadow. The homogeneity property of shadows is explored in a novel way for shadow detection and image division technique is used. The process is followed by filtering, removal, boundary removal and removal validation
Evaluation of Transportation Demand Management (TDM) Strategies and Its Prospect in Saudi Arabia
Nowadays it is reiterated in the literature to put more emphasis on Transportation Demand Management (TDM) strategies rather than the traditional transportation strategies which are based on “supply-side” tactic specifically in rapidly growing developing countries. The experiences of many cities reveal that as capacity is increased, demand increases at a similar rate, and subsequently in the long-term, drivers experience no net travel time advantages and the society suffers from the impacts of costly road bills and environmental degradation. This paper suggests emphasizing on TDM strategies to ensure sustainable transportation. The increasing trend of passenger cars in Saudi Arabia makes it more important to concentrate on TDM strategies as a tool for curbing vehicular pollution and congestion. This paper investigated the concept of TDM strategies focusing on the effect of TDM strategies on vehicular emissions and congestion. The analysis of limited scale interviews with experts revealed that tele-working, E-government, electronic shopping, congestion and parking pricing, increased fuel pricing, preferential treatment of HOV, Light Rail Transit (LRT) might be the potential TDM measures. The concerned authorities should think of an innovative mode of public transit services and continuously improve the services to encourage people to switch to public transit. Finally, this paper recommends adopting a public participatory approach in developing TDM strategies which will significantly contribute in reducing vehicular emissions and congestion and ultimately ensure sustainable transportation
Exact parallel plurality voting algorithm for totally ordered object space fault-tolerant systems
Plurality voter is one of the commonest voting methods for decision making in highly-reliable applications in which the reliability and safety of the system is critical. To resolve the problem associated with sequential plurality voter in dealing with large number of inputs, this paper introduces a new generation of plurality voter based on parallel algorithms. Since parallel algorithms normally have high processing speed and are especially appropriate for large scale systems, they are therefore used to achieve a new parallel plurality voting algorithm by using (n/log n) processors on EREW shared-memory PRAM. The asymptotic analysis of the new proposed algorithm has demonstrated that it has a time complexity of O (log n) which is less than time complexity of sequential plurality algorithm, i.e. Ω (n log n)
Trends, prospects and utilizations of sea cucumber fisheries in Malaysia
The holothurian or sea cucumber is one of the marine resources, which has been used not only as luxury food
for certain countries but also as medicines. Because of its’ higher nutraceutical and pharmaceutical values, sea cucumber has become one of the most important products and it has high price in international market and thus provide an important employment and income source to the coastal communities in many Pacific island countries including Malaysia. They have been harvested for hundreds of years for trade with Asia and were probably one of the worthy exports from the Indo-Pacific islands. Unfortunately, the increase in demand and price, combined with the development of cash economies and growing coastal populations in many islands, has led to widespread overfishing of the resource across much of this region. There is a high level of interest in adoption of aquaculture and stock enhancement techniques to restore production phases,but different capacity levels require implementation of different techniques.Some Pacific island countries and territories have completed successful research trials of hatchery, nursery and release techniques,and now have capacity to scale up this activity but such types of research are still in the initial stage in Malaysia. Factors that work in favor of successful aquaculture include pristine marine environments,long familiarity with sea cucumbers as a commodity,and traditional marine tenure systems that in some
places can provide a basis for management of released sea
cucumbers.Currently,the exploitation of sea cucumber turns
out to be excessive and disrupts its sustainability. Aquaculture is the best way to prevent this severe problem. The success of sea cucumber culture is very depending on broodstock management,seed availability and suitable food for larvae as well as juvenile along with appropriate grow-out culture techniques under controlled rearing protocols
- …