The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Equipping classrooms with inexpensive sensors can provide students and teachers with the opportunity to interact with the classroom in a smart way. In this paper an approach to acquiring contextual data from a classroom environment, using inexpensive sensors, is presented. We present our approach to formalising the usage data. Further we demonstrate how the data was used to model specific room usage...
The purpose of this study is to investigate barriers that would hinder collection development in Scientific and Research Institute (SRI) libraries in Iran. The populations of this study are the research scholars, faculty members and experts belonging to five disciplines from ten institutes in Iran. For the purpose of data collection, a well-structured questionnaire was designed and administrated randomly...
Many researches have been addressed on design approach for speech enhancement. They are mainly focus on speech quality and intelligibility to produce high performance level of speech signal. Wiener filter is one of the adaptive filter algorithms to adjust filter coefficients and produce an output signal that satisfies some statistical criterion. The objective measures will optimize using informal...
Human Gait Recognition is typically alluded to imply the human ID by the style/way individuals stroll in picture sequences. Our point is to execute the customary gait recognition calculation and to demonstrate the variety in recognition when subject is watched parallel to camera under three conditions-walking slow, at typical speed and walking quickly. For this situation, the work devises a novel...
Introduction. Previously, we demonstrated that certain patterns of abnormal rapid beats, notably “short-long-short-short” (SLSS) patterns, tend to produce action potential block in computer models, and tend to initiate VF in in vivo canine experiments, consistent with our theory based on electrical restitution. Here we present evidence that these same patterns often precede VF in human ECG recordings...
K-modes is a typical categorical clustering algorithm. Firstly, we improve the process of K-modes: when allocating categorical objects to clusters, the number of each attribute item in clusters is updated, so that the new modes of clusters can be computed after reading the whole dataset once. In order to make K-modes capable for large-scale categorical data, we then implement K-modes on Hadoop using...
The department of Electrical and Computer Engineering (ECE) is one of four departments in the College of Engineering at Sultan Qaboos University (SQU), Sultanate of Oman. The department admits around 25% to 30% of engineering students every semester. Specialization selection is based on students' discretion and academic acation selection is its inception, ECE accommodated the largest share of students...
Opinion these days is considered vital to attract probable customers; hence e-commerce websites are facilitating the existing customers to share their experiences about the products they have used. The dawn of e-commerce business has resulted into some firms, which post reviews that are carefully designed to influence the opinion of prospective customers. Review sites provide an open platform for...
In this paper, the design and implementation of a systematic process for students outcomes (SO) assessment in the Electrical and Computer Engineering (ECE) program at Sultan Qaboos University (SQU) in Oman is described. Unlike most programs aiming for ABET accreditation, the process is based on a collective and acquiescent approach that involves most of the program faculty members: All Faculty members...
In this paper, we present a method of acquiring / utilizing the study records using smartphone for improving the students learning motivation for learning. During the lecture, the students use the smartphone for learning. The results showed that the proposed study record system has a good effect for improving students' motivation for learning. For the professors of the university, it is difficult...
Cloud-based outsourced storage alleviates the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. Nevertheless, the new conception does triggers lots of security issues. A major concern is how to ensure the integrity of the outsourced data. To deal with the problem, Chen et al. Recently proposed a remote data possession...
Source code plagiarism has been a concern for many teachers in computer science field, given to the ease of availability of content in this era of internet. We developed a tool for detecting plagiarism in source codes of students learning programming languages, to cater to the needs of teachers and help them monitor students source codes. Currently our tool supports six programming languages namely,...
Sequential Pattern Mining (SPM) is an important subject to focuses on the current purchase scenario. Current research of SPM mostly emphasis on items or itemset which are frequently purchase in certain order but not focused on the purchase which will be potentially strong for future. In this paper, we have tried to focus on Emerging Patterns (EPs) based on significant change of its support values...
Data Mining is the extraction of hidden predictive information from large databases. The process of discovering interesting, useful, nontrivial patterns from large spatial datasets is called spatial data mining. When time gets associated it becomes spatio temporal data mining. The study of spatio temporal data mining is of great concern for the study of mobile phone sensed data. Reality Mining is...
Biometric identification verifies user identity by comparing an encoded value with a stored value of the concerned biometric characteristic. Multimodal person authentication system is more effective and more challenging. The fusion of multiple biometric traits helps to minimize the system error rate. The benefit of energy compaction of transforms in higher coefficients is taken here to reduce the...
Easy and open development environments of Android make itself not only as the most famous platform in the world but also as the most preferred platform for malicious users. In this paper, we propose a new approach to protect the private phone number data in smartphones from leaking and stealing through malicious applications. Our approach differently deals with trusted and suspicious applications...
Online signature recognition is one of the important behavioral biometric trait. This signature has information of x, y, z variations, pressure, azimuth of pen tip, altitude of pen tip. This makes online handwritten signature based biometric system more accurate than the static ones. In this paper new set of features are proposed for online or dynamic signature recognition. Geometric centers, Grid...
The game of Cricket is one which is followed and loved by a large proportion of the population across the world. The liking goes to such an extent that people even end up having games of cricket on their computers. In this paper we discuss about the development of a cricket game, Cricket Strategy Game. This is a special game, different from others, as it is one focusing on the strategizing, managing,...
Semantic Web facilitated e-learning, where Computer-Assisted Assessment-CAA has vitally contributed for effective use of computers to evaluate Open-ended questions for free-text response. Domain Ontology as an aid to CAA, plays a very pivotal role by preserving domain-specific conceptual knowledge that not only endorse the semantic capability of Information Retrieval as Question Answering, but is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.