1,167 research outputs found

    Six Sigma based Risk Identification and Mitigation Framework for Projects Execution

    Get PDF
    Six Sigma being a project management methodology is used in the industries and corporate sectors to substantiate goal of near perfection in process implementation and execution. It is based on the impetus of Plan-Do-Check-Act and has myriads of applications in numerous organizational and business processes to attain significant performance improvement in different industrial and corporate sectors including the IT sector. Despite realization of profuse maturity in many business processes, Six Sigma still lacks across-theboard framework for effective risk management because root cause analysis (RCA) is still the primary and principal technique used for handling risks in this methodology. In this paper, we have attempted to put forward a risk identification framework in order to improve quality and productivity of Six Sigma projects, particularly the IT development projects. The study also encompasses an abridged overview of the current methods being practiced for risk identification in Six Sigma. Our proposed model enlist a number of hypotheses for validation purposes and is duly evaluated and analyzed viz-à-viz DMAIC and DMADV approaches to make it compatible with QFD, FMEA and PMBOK requirements

    An Insight into Risk Identification, Quality and Productivity Enhancement using Six Sigma

    Get PDF
    Six Sigma, with a myriad of its applications in numerous organizational and business processes, offers a project management methodology that supports achieving a goal of near perfection in process performance. Six Sigma is based on the impetus of Plan-Do-Check-Act can help industries, businesses and organizations to achieve significant performance improvement as most of the Fortune 500 companies have adopted Six Sigma (DeFeo & William, 2004). Six Sigma initiatives primarily entail DMAIC and DMADV methods for attaining a high standard of quality. In this paper we provide a critical analysis of the various Six Sigma applications, techniques and tools that can be used for improving quality and productivity of the organizations. The study also provides an insight into the methods used for risk identification in Six Sigma. The proposed techniques are evaluated and analyzed viz-a-viz DMAIC and DMADV approaches. The objective of this research is to summarize the existing level of research in the field of Six Sigma and highlighting the need for intensive academic research in this area. The study comparatively analyzes Six Sigma with Lean, QFD, PSP/TSP, FMEA, TPRM, AHP/ISS and PMBOK requirements. The study also highlights the prospective areas of future/further research in this discipline. The critical analysis of various techniques studied as part of this research reveals that Six Sigma is primarily beneficial for process improvement, risk identification and management etc. The critical analysis of this study is reported herein

    Analysis of Multiple-Bit Shift-Left Operations on Complex Numbers in (−1+j)-Base Binary Format

    Get PDF
    Complex numbers find various applications in the field of engineering. To avoid excessive delays in production of results obtained by implementing divide-and-conquer technique in dealing with arithmetic operations involving this type of numbers in today’s computer systems, Complex Binary Number System with base(−1+j) has been proposed in scientific literature. In this paper, we have investigated the effects of bit-wise shift left operations (from 1-8 bits) on the complex binary representation of complex numbers and analyzed these results using mathematical equations.DOI:http://dx.doi.org/10.11591/ijece.v4i2.528

    Personal Identification Using Ear Recognition

    Get PDF
     Biometric authentication for personal identification is very popular now a days. Human ear recognition system is a new technology in this field. The change of appearance with the expression was a major problem in face biometrics but in case of ear biometrics the shape and appearance is fixed. That is why it is advantageous to use it for personal identification. In this paper, we have proposed a new approach for an automated system for human ear identification. Our proposed method consists of three stages. In the first stage, preprocessing of ear image is done for its contrast enhancement and size normalization. In the second stage, features are extracted through Haar wavelets followed by ear identification using fast normalized cross correlation in the third stage. The proposed method is applied on USTB ear image database and IIT Delhi. Experimental results show that our proposed system achieves an average accuracy of 97.2% and 95.2% on these databases respectively

    Parallel Sampling-Pipeline for Indefinite Stream of Heterogeneous Graphs using OpenCL for FPGAs

    Get PDF
    In the field of data science, a huge amount of data, generally represented as graphs, needs to be processed and analyzed. It is of utmost importance that this data be processed swiftly and efficiently to save time and energy. The volume and velocity of data, along with irregular access patterns in graph data structures, pose challenges in terms of analysis and processing. Further, a big chunk of time and energy is spent on analyzing these graphs on large compute clusters and/or data-centers. Filtering and refining of data using graph sampling techniques are one of the most effective ways to speed up the analysis. Efficient accelerators, such as FPGAs, have proven to significantly lower the energy cost of running an algorithm. To this end, we present the design and implementation of a parallel graph sampling technique, for a large number of input graphs streaming into a FPGA. A parallel approach using OpenCL for FPGAs was adopted to come up with a solution that is both time- and energyefficient. We introduce a novel graph data structure, suitable for streaming graphs on FPGAs, that allows time- and memory-efficient representation of graphs. Our experiments show that our proposed technique is 3x faster and 2x more energy efficient as compared to serial CPU version of the algorithm

    Lung Nodule Detection in CT Images using Neuro Fuzzy Classifier

    Get PDF
    Automated lung cancer detection using computer aided diagnosis (CAD) is an important area in clinical applications. As the manual nodule detection is very time consuming and costly so computerized systems can be helpful for this purpose. In this paper, we propose a computerized system for lung nodule detection in CT scan images. The automated system consists of two stages i.e. lung segmentation and enhancement, feature extraction and classification. The segmentation process will result in separating lung tissue from rest of the image, and only the lung tissues under examination are considered as candidate regions for detecting malignant nodules in lung portion. A feature vector for possible abnormal regions is calculated and regions are classified using neuro fuzzy classifier. It is a fully automatic system that does not require any manual intervention and experimental results show the validity of our system

    A Pervasive Computational Intelligence based Cognitive Security Co-design Framework for Hype-connected Embedded Industrial IoT

    Get PDF
    The amplified connectivity of routine IoT entities can expose various security trajectories for cybercriminals to execute malevolent attacks. These dangers are even amplified by the source limitations and heterogeneity of low-budget IoT/IIoT nodes, which create existing multitude-centered and fixed perimeter-oriented security tools inappropriate for vibrant IoT settings. The offered emulation assessment exemplifies the remunerations of implementing context aware co-design oriented cognitive security method in assimilated IIoT settings and delivers exciting understandings in the strategy execution to drive forthcoming study. The innovative features of our system is in its capability to get by with irregular system connectivity as well as node limitations in terms of scares computational ability, limited buffer (at edge node), and finite energy. Based on real-time analytical data, projected scheme select the paramount probable end-to-end security system possibility that ties with an agreed set of node constraints. The paper achieves its goals by recognizing some gaps in the security explicit to node subclass that is vital to our system’s operations

    Pleural effusion as a manifestation of multiple myeloma

    Get PDF
    Multiple myeloma is a clonal B-cell malignancy, characterised by proliferation of plasma cells and secretion of paraproteins. These plasma cells accumulate predominantly in the bone marrow; rarely, they invade other areas, especially the thorax. Myeloma presenting with a pleural effusion is rare and reported in only 6% of patients with myeloma. Such patients generally present late and have a poor prognosis. Here, we describe a patient presenting with a lung mass, renal failure and a massive unilateral pleural effusion due to multiple myeloma who was treated successfully

    A Novel Color Image Encryption Scheme Based on Arnold’s Cat Map and 16-Byte S-box

    Get PDF
    The presented work sets out to subsidize to the general body of knowledge in the field of cryptography application by evolving color image encryption and decryption scheme based on the amalgamation of pixel shuffling and efficient substitution. Arnold’s cat map is applied to snap off the correlation in pixels of image and the shuffled image is encrypted by 16-byte S-box substitution. Computer simulations with a standard test image and the outcome is presented to scrutinize the competence of the projected system. Several image-quality measures and security analyses have been made out for the encrypted image to estimate the statistical and differential strength of the scheme. A comparison is presented by following out the scheme with 256-byte S-box and 16-nibble S-box to support for sturdiness of the idea. It is concluded from the results of analyses that the proposed scheme with 16-byte S-box can resist exhaustive attacks and is apt for practical applications

    Acute Extradural Hematoma in Pediatric Age Group: Factors Affecting The Outcome

    Get PDF
    Objective:  To identify the factors affecting the outcome of acute extradural haematoma in pediatric age group. Subjects and Methods:  This was a descriptive study carried out at the Department of neurosurgery, PGMI Lady Reading Hospital Peshawar from January 2007 to December 2007 on 50 consecutive patients of acute extradural hematoma operated and post-operative outcome including good recovery, moderate disability, severe disability, persistent vegetative state, and death recorded. Results:  Out of 50 cases, 80% were males and 20% females. Majority (48%) cases were in the age range of 6-10 years, 36% in age group of 11-15 years, 16% in the age range of 1-5 years. In 60% patients fall, in 26% road traffic accident (RTA) and in 14% physical assault was the mode of injury. Interval between injury and surgery of > 8 hours recorded in 78% cases, 4-8 hours in 20% patients, < 4 hour in 2% cases. On CT scan, parietal site was commonest in 40% cases, frontal site in 26% cases. In 80% cases craniotomy and in 20% cases craniectomy performed. Post-operative outcome, good recovery noted in 80% cases, moderate disability in 10% cases, death in 6% cases, and severe disability recorded in 4% cases. Conclusion:  Extradural hematoma is a common manifestation of head injury, affecting male children age range of 6-10 years and early surgical intervention is life saving
    • …
    corecore