The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Echocardiography imaging is one of the most widely used diagnostic tests for cardiovascular diseases which allow direct visualization of cardiac structure and ventricles wall motion. It can provide useful information, including the size and shape of the heart. An accurate method for border detection of ventricle wall motion is still important clinical diagnosis tool. Therefore, most of common clinical...
This paper presents an initial work on the conceptual architecture of medical databases integration. The problem with current medical institutions are that most of them have variety of systems across various departments where most of the systems have existing and incompatible database management system that are tied together in a network. All these systems stored patients' information in an isolated...
Hospitals are known for having separate information systems across various departments, which are usually heterogeneous in nature. Medical experts could benefit greatly from the integration of these islands, but the heterogeneity of the sources/databases often impedes this. Most cardiothoracic units use isolated heterogeneous systems to keep patients records as well as to support the experts when...
Cardiothoracic Intensive Care Units (CICU) patients require vigilant watchful and very strict monitoring of their conditions in real time. Accurate observation is required through bedside monitoring devices which generates massive amounts of data. Such a countless of data which reflect the cardiovascular system and its physiological components pose a lot of difficulties, challenges and is time consuming...
Social network one of the most used communication media between people. Nowadays, many researches on the effect of use social network in teaching and learning, some concentrate on Islamic impacts on students. This study, focus on the effects of social network on serving, and publishing Islam. In this study, the main purposes included studies in which field students benefit from social network, making...
The purpose of this research was to evaluate the quality of Safeer portal. "Safeer" is a portal through which a student can apply for any of the 86 available academic, administrative and financial services. It was launched on Sunday 29th of January 2009; to link the Saudi ministry of higher education to Saudi cultural missions around the world. The quality was evaluated by seven experts...
In this paper, a preliminary analysis of thumbprint recognition in different bit levels is presented. A digital image consists of m x n pixels and each pixel is represented by gray level value. In an 8-bits gray level image, the gray level value range from 0 to 255 for each pixel. Each bit-plane will then be extracted as the input into the neural network to test its performance and accuracy. The performance...
Online social networks provide user relationships and increase information and resource sharing between a large amount of users. Communications by social networks overtake the emails, and it poses enormous security challenges in this platform. Numerous privacy leakages arise while unauthorized users can access information at anywhere and anytime. This paper presents Usage Decision Online Social Network...
An essential part of the diagnosis and treatment of leukemia is the visual examination of the patient's peripheral blood smear under the microscope. Morphological changes in the white blood cells are commonly used to determine the nature of the malignant cells, namely blasts. Manual techniques are labor intensive slow, subjected to error and costly. A computerized system can be used as an aiding tool...
Wireless networks are suffer from throughput limitation, one of the effective method to solve limitation of wireless throughput are network coding which is combine several packets from difference input to a single packet size length and forwards the packet in a single transmission time slot. Furthermore, network coding also reduce energy usage in wireless devices. However, while network coding improve...
Fault-based testing has been proven to be a cost effective testing technique for software logics and rules expressed in Boolean expressions. It can guarantee the elimination of common faults without exhaustive testing. However, average software testing practitioners may not have in-depth knowledge on Boolean algebra and complex logic derivations required to apply existing fault-based testing techniques...
The rapid evolution in data transmission by the wide use of the internet, as provided an urgent need to prevent penetration and maintain the confidentiality of this data through the applying of some techniques to hide data within the carrier for example, text, image, audio and Video. A variety of image watermarking techniques have been published in the last few years which attempts to develop techniques...
Nowadays, the concept of Business Intelligence (BI) is being implemented within many organizations around the globe. Organizations invest billions of US dollars aiming to improve their timeliness and quality of the input to the decision process, where BI is the targeted keyword. However, organizations are often faced with many challenges in achieving the expected outcomes of BI systems within their...
This paper presents a system that helps in automatically generating guitar tablatures and musical scores based on musical audio data. Information gathered from the audio consists of pitch, onsets and durations, chords, and beat and tempo. Major issues that were encountered during the research were harmonics for pitch detection, thresholding for onset detection, chord distinction, similar chord structures...
Heterogeneous and hybrid smart grid communication network is a network that comprises of different communication mediums and technologies. Performance evaluation is one of the main concerns in smart grid communication system. In any smart grid communication implementation, to determine the performance factor of the network, a testing of an end-to-end process flow is required. Therefore, an effective...
This paper presents a novel approach of the semantic similarity measure that support the image retrieval systems. The approach is composed of five stages: (1) data collection, (2) image annotation, (3) conceptual graph representation, (4) similarity matching, and (5) shows a semantic search result. First stage is collecting the contents into database archive. Label Me tool is used to annotate images...
The number of reported bugs in large open source projects is high and triaging these bugs is an important issue in software maintenance. As a step in the bug triaging process, assigning a new bug to the most appropriate developer to fix it, is not only a time-consuming and tedious task. The triager, the person who considers a bug and assigns it to a developer, also needs to be aware of developer activities...
Enterprise Resource Planning (ERP) system consists of different sets of software that are used to integrate the business functions in a company or organization. Given that these solutions provide an integrated solution to the needs of an organization, these systems are in high demand by all organizations. The full potential of these systems can only be realized only if they are successfully implemented...
Steganography is a form of security technique through obscurity, the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility, payload, and robustness. Different...
Web services technology provides a platform on which we can develop distributed services. The interoperability among these services is achieved by various standard protocols. In recent years, several researches suggested that process algebras provide a satisfactory assistance to the whole process of web services development. Business transactions, on the other hand, involve the coordination and interaction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.