Using Kernel Density Estimation to Target Customer Complaint Handling Service

Online Road Complaints Registration System

Using Kernel Density Estimation to Target Customer Complaint Handling Service

Nowadays customer experience is the most important factor affects the customer loyalty, especially in a mature market. Thus, a Complaint Process Platform (CPP) plays an important role in dealing with customer complaints; most of them are poor mobile coverage, frequent call drops and low speed on 4G. Usually, subscribes call service center directly and report issues to the agent. Many complaints can be resolved at this stage and no need to dispatch cases to the next level, a secondary agency that helps resolve complaints about telecom services. This paper introduces a method of kernel density estimation based on the locations of customer complaint by using kernel density function.

This method targets hot zones with poor mobile coverage automatically and precisely and generates handling strategies, in order to improve the success rate of customer complaint handling at the service center. The process of designing the CPP metrics for telecommunication services is also given.

Online Road Complaints Registration System

A.Architecture Overview The architecture of complaint process platform providing the execution environment of kernel density estimation is showed in Figure 1. The platform is composed of multiple components including complaint handling, map API, kernel density estimation and OSS. The function of complaint handling includes complaint reporting, complaint diagnosis and complaint analysis. The complaint reporting module offers complaint summarization and reporting. When agents accept the customer complaint, this function could get the newest complaint case from each service center. The complaint diagnosis includes specific area diagnosis, reply recommendation and important dates listed for each improvement. When agents start to handle the trouble issues by the complaint diagnosis, a proper recommendation will be displayed on the screen after keying all complaint attribute and keyword. In addition, all neighbor hotspots may appear in the search list based on the location of the customer. The agents could easily read these hotspots to decide how to explain and apology to the customer. Complaint analyses reveal the quality of service center and generate statistic report monthly. The module of kernel density estimation is responsible for data classified and hotspots management. The data of configuration management (CM) and performance management (PM) are received from OSS. Based on primitive event log of the customer complaint, a new hotspot suggestion is generated by an analytic program using kernel density estimation. Code Shoppy

B.Hotspot Management Fig. 2 is the flow chart of hotspot management. In proposed solution, the QoE collectors collect data from OSS and filter out inconsistent data. Then, the platform retrieves the data of customer complaint and obtain coordinate by using APIs of the map application. Next, the extracted data will deal with kernel density function algorithm. If the process finds a new hotspot, the comparison information and recommendation could be automatically generated by each complaint classification. Based on the information of hotspot management, the service center can improve the success rate of customer complaint handling. However, the configuration of mobile network elements is usually deployed and updated very quickly. Thus, the hotspot management provides an integrated console to managing the data related to hotspots.

In [5], some of different kernel functions have been used in applications, such as normal distribution, quartic distribution, triangular distribution, uniform distribution and negative exponential. In proposed method, normal distribution is adopted and can be defined as [6] =−=NihdiijehKWjg122]21[)(22π (1) where )(jgis the density of grid cell j,ijdis the distance between grid cell jand event location i. The constant Kis initially set to 1 and his the standard deviation of the normal distribution (bandwidth). iW is a weight at the point location.

This function extends to infinity in all directions and can be applied to any location in the specific area. The kernel function can be expanded to two or three dimensional. Figure 3 shows a 2-dimensional normal distribution and is particularly appropriate for geographical data, such as customer complaint locations. The normal distribution produces estimation over the entire area and is good for suburban area whereas the distribution of customer complaint point is spared. According to the description in previous section, a method for specific area estimation is proposed and shows in figure 4. The first step is to generate square grids which are a small-sized geometrical shape. The event logs of customer complaint about each square grid are to be extracted from OSS. The summation of all events in each square grid is a weighting variable for the kernel density estimation. Next, the bandwidth of kernel function is to be defined. The bandwidth of the normal kernel function is the standard deviation of the normal distribution. In general, a narrower bandwidth interval leads to a higher resolution, which means picture shows lots of peaks and valleys. On the other hand, a larger bandwidth interval leads to a smoother distribution. Typically, the choice of bandwidth is depended on expert experience and extensive experimental results. In density calculation stage, absolute density estimate is used to generate the output surface. All occurred event logs in each square grid can obtain the estimation result. A two-dimensional normal distribution places over each of customer complaint point with the resulting density surface being a sum of all customer complaint individual surfaces. Next, a threshold can be defined to filter out some noise in the surface. The density surface can reveal the distribution of customer complaint events against the natural geography of the specific area, including the QoS of indoor coverage and high floor area. The result of estimation shows the real customer experience of the network over a period of time. Therefore, the hotspot management module integrates all CM and PM information to find out all possible hotspots. Based on analytic results of the proposed method, the best strategies for improving customer complaint handling process are generated.

When new base station installed to improve signal coverage nearby a hotspot, hotspot management module observes the number of customer complaints in next 12 weeks and updates the attribute of hotspot from High to Medium or Low. On the other hand, continuous monitoring and continuous auditing can enable management to achieve operational control objectives while removing or adjusting the configuration of a base station.

A Novel Mobile Telemedicine System for Ambulance Transport. Design and Evaluation

Ambulance Mobile App

A Novel Mobile Telemedicine System for Ambulance Transport. Design and Evaluation

Ambulance Mobile App

Many published studies [1] have shown that early and specialized pre-hospital management of emergency casescontributes to the patient’s survival. Especially in cases of serious head injuries, spinal cord or internal organs trauma, the way that injured persons are treated and transported is crucial. Most emergency cases are due to car crash accidents and to coronary artery diseases. Statistics for car accidents in USA and Europe prove that many thousands of people loose their lives and many more drivers or passengers are severely injured. Studies performed in Greece, a country with a very high death rate due to car crashes, proved that most of the fatalinjuries in accidents were injured far away from anycompetent healthcare institution, thus resulting in long response times.

https://codeshoppy.com/shop/product/ambulance-app/

Furthermore, in the London, UK, area half of the casualties require at least 2 hours to reach adequate hospital care, 79% of victims of accidents in rural roads dieon the scene, another 11% during transportation [2]. Some of these cases had a 50% chance of survival, if adequate pre-hospital care existed. Heart disease is another common example of high death rates in emergency cases, since two thirds of all patients die before reaching the central hospital. In a study performed in the UK [3] it is shown that among patients above 55 years old, who die from cardiac arrest, 91% do so outside a hospital unit, due to a lack of immediate treatment. Thecomponents of delay in administering the appropriate therapy [4] are: The patient’s failure to recognize the seriousness of his symptoms and seek emergency care, •Pre-hospital evaluation and transport time, •Time required for diagnosis and initiation of treatment in the hospital Also, many studies have proven that a rapid response time in pre-hospital actions concerning emergency heart deceases, decreases mortality and improves patient outcome[5] – [13]. This paper presents a new telemedicine system enabling ambulance staff, rescue people, emergency paramedics, or general practitioners, to collaborate in order to face pre-hospital patient treatment. It is known that, usually, the ambulance staff has not the required advanced theoretical knowledge and experience to handle emergency situations. Moreover, it is not certified to provide medical care without a medical expert advice. On the other hand, expert physicians such as cardiologists, neurosurgeons, orthopedics cannot participate in ambulance staff for financial or practical reasons Using this system, the above restrictions are coming through by means of an electronic collaboration scheme that is established between the ambulance staff and the experts of a medical unit. This scheme provides the appropriate tolls for the acquisition, transfer, demonstration and evaluation of diverse patient vital signs, such as electrocardiogram (ECG), blood oxygen saturation (SPO2), temperature, blood pressure etc. as well as patient pictures. Moreover, by means of wireless communications tools the experts can advise the ambulance staff to perform theappropriate actions in order to face any emergency case. Hence, the valuable pre-hospital transport time is turned to advantage to diagnose and evaluate the patient’s situation en route, and the pre-hospital phase of transport is transformed into a pre-hospital phase of treatment. In the cases of accidents, the introduced system facilitates the collaboration of the trauma center with the police and the fire brigade since all involved vehicles employs the common electronic collaboration scheme. The proposed system resulted by a project tuned by the European Union under the INNACT-RWG R&D programAction 3.1. Its implementation based on the integration of many technologies such as Geographical Information Systems (GIS), Global Positioning Systems (GPS), wireless LAN (IEEE 802.11), and GSM telephony.

During a two-month pilot period of system operation wetried to find out the system reliability. Of the 55 patients, only 20 cases were marked to have pre-hospital notification. The system utilization results –data of only 36,4% of the patients were recorded by the telemedicine system and transmitted to the reception center- was not the expected. This may be due to the small number of ambulancesequipped with the telemedicine health care system. Another possible reason is that not all patients had health problems serious enough to require the use of the telemedicine systems’ resources. Respecting the time for the vital sign acquisition, transmission and interpretation, Figure 5 shows the average time. Depending on the patient’s state, patient’s cooperation, and vehicle speed, a paramedic needs about 3 min to connect all the needed sensors for 12-lead ECG, SPO2, Temp, and NiBP acquisition. A mean time of 40 sec was required for the mobile connection establishment and the vital sign transmission to the reception center. The average time for transportation was 20 min. Therefore, the ambulance was arrived to the hospital 16 min and 20 sec after the vital sign transmission. Doctors need approximately 12 min to make the ECG interpretation and the other vital sign evaluation. Thus, the diagnosis for the transported cases could have been made 4 min and 20 sec before the patient’s arrival to the hospital. During the above time a preparation could proceed. Thinking of the connection and transmission through the GSM network, tables 1 and 2 shows the results. In Table 1,we can find out how successful the mobile connection was. 16 of 20 cases were successful on the first attempt. A second or third attempt was required in 4 and 2 cases respectively. Table 2 shows how successful the transmission was. In atotal of 20 cases, 17 cases were transmitted on the first attempt, 2 were interrupted and retransmitted one time and 1 was interrupted more then one times. The most common reason for the transmission failure was the low signal levelin some geographical areas, the overloaded mobile service network around the referring area, and in some cases, thebad topological situations. The devices’ advantage was that in both cases (no connection with the first trial or interruption during the data transmission), we had no data loss, because all of the collected data from the system startup till the transmission is stored locally in the mobile unit, in order for a complete medical report to be available every time. The directions to the paramedics were provided with bi-directional voice communication using a separate GSM connection. This solution was selected for two major reasons. With the separate voice communication, the maximum bandwidth was available for medical data transmission, allowing faster interpretation and reply from the control center. Also, for additional reasons such as security, freedom of movement in high risk rescues, e.t.c. vocal communication must be always available. Click here

Herbe – Herb Database Management System

Online Herbs Shopping Project

Herbe – Herb Database Management System

Learning about herb is important for daily medical treatment. People should know how to use herb around them to cure simple diseases in daily life. This reason inspires us to create the herb database application to be used as standard for research and study in the future. We hope that this application will provide knowledge and benefit to every group of people such as instructors, students, doctors, patients, ordinary people, etc. Our work emphasizes on the thorough analysis of the herb database and the mobile application has functions to search enough details for users what are the benefits of that herb, its characteristics, how to use it, therapy, etc. If there is a new herb, we provide a back office website to update and maintain the herb information. Code Shoppy Finally, this project will improve the database perspective of the herb and increase the accessibility of herb data for a better daily health usage.

Online Herbs Shopping Project

Herbs are products of nature that comes from plants, animals, and minerals. It can be transformed into medicine or mixed with other ingredients to cure diseases, improve body health, or used in a poisonous way. If people mix herbs of more than two types, it is called medicine. Herbs that came from plants, animals and minerals are called drugs of biological origin. Every part of a plant can be used as the herb; such as leaf, root, flower, fruit, seed, core, etc. This information should be spread to everyone. It provides benefits and advice people on how to use herbs.

Herbs are natural products that were used as a benefit for the treatment of diseases since antiquity. Nowadays, it has been accepted globally that herbs are better than scientific synthetic medicines. There are ten thousand plants that can be used as herbs. Moreover, herbs are used in the manufacturing of foods, beverages, and cosmetics. The only disadvantage of herbs is that users do not have enough information to verify it. It is difficult choosing the proper herbs to use, estimate ratio and volume, know about side effects, and so on. A. Herb Knowledge In Thailand, herb means the natural products from plant, animal, or mineral as the medicine to cure diseases, nourish body, or use in cooking. In general, herb means the medical plant used for curing diseases. Because most of the herbs are plants, this project will focus on plant part of the herb. Plants can be categorized into four main types; herbaceous plants, shrubs, climbers, and trees. Plant consists of five main parts; root, stem, leaf, flower, and fruit [1], [2]. ƒROOT is divided into two parts. The first part is the taproot system, which consists of Primary Root (taproot) and Secondary Root (a group of lateral roots). Another part is Adventitious Root or the root that is created to do some special duty. The types of adventitious root consist of many types according to its shape and duty [3]. ƒSTEM can be categorized into two main types; aerial stems and underground stems. Aerial Stem are stems that we can see above the ground. Underground Stem is the stem that does not rise to the surface [4]. ƒLEAF can be classified into two types; simple leaf and compound leaf. Phyllotaxy is one of the factors that will tell about the arrangement of leaves. Leaf consists of three main parts; stipule, petiole, and leaf blade. Leaf blade consists of seven more details; leaf shape, leaf apex, leaf base, leaf margin, leaf surface, leaf texture, and leaf venation. The shape of leaf blade can be categorized into two types; normal shape and object-liked shape [5], [6]. ƒFLOWER consists of four main parts; sepal, petal, stamen, and pistil. Flower can be categorized in three ways. The first one is about the component of the flower. The second one is about the gender of the flower. The last one is about the amount of flower in one group [7], [8]. ƒFRUIT consists of two main parts; pericarp and seed. Fruit can be categorized in three ways. The first one is about the birth of the fruit from ovary of the flower. The second one is about the fresh inside the fruit [9], [10]. B. Herb DatabaseThere are some examples, which one of them is shown as Fig.1, of herb information from the herb book of Siriraj Hospital [1].

https://codeshoppy.com/shop/product/online-herbs-shopping/

In this section, the HERBE system analysis and design are describe. Herbe is designed using three tiers architecture and the system application is developed into the mobile application as a front-end service and the web application as the back-end service for database management functions. A. System Architecture For the design, there are two parts of platforms; which are android part and website part as shown in Fig.3. The user can be divided into 3 classes: Guest, Member, and Admin. Users will provide searching keyword into their mobile or the website about herbs that they need to know. Both platforms will send the information to interact with our web server that is looked after by admin. The result from the database will be sent back to the user. If the information is new, admin group will update the information in the database. B. Structure Chart The structure chart of Herbe system consists of four main functions: modification, search, comment, and annotation. C. Database 1)Account – The group of account tables focuses on the information and statistic of each account in this system. 2)Herb – The group of herb database tables focuses on the information and statistic of each herb. 3)Part – The group of herb database tables focuses on the detail information of each part (root, stem, leaf, flower, and fruit) of the herb. 4)Usage – The table focuses on the benefits of each herb in the database. 5)Image – The table focuses on the image path of each image about the herb. 6)Annotation – The group of database tables focuses on the annotation record about new herb information. 7)History – The table focuses on the record about each view on each herb data by each user. 8)Record – The group of record tables focuses on the record about the modification that has been made by Admin to each herb data. D. Interface The interface design of Herbe application has two parts: back-end (Website), and front-end (Mobile phone). The first part of this project is in Website, which is the part for administrator to edit information about herb in the database. The examples of website interface are shown in Fig.6. Another part of this project is in Mobile, which is the part for user to find some herb information from the database.

In conclusion, HERBE application is designed and developed based on the thorough analysis of the nature of herb data. HERBE-database consists of more than 50 data tables containing all parts of the herb information. As a results, the evaluation reflects the high score on both the contents and performance of HERBE system. The search engine is designed to support easy usage for any user. Therefore, HERBE is quite a useful application for helping people to gain knowledge about the herb from both Website and Mobile, but it still needs to be improved. In future work, we plan to make the application more stable and improve some function to be more useful.

Automatic Billing System using Li-Fi Module

Supermarket Billing System App

Automatic Billing System using Li-Fi Module

Supermarket Billing System App

WITH the cumulative demands for the interior broadband hypermedia wireless spread amenities, the current radio frequency (RF) based keys, such as Wi-Fi, digital television terrestrial broadcasting (DTTB), etc., have to indenture with the serious supernatural overcapacity issues, especially in the massive shopping mall or opaque inhabited buildings. In this framework, visible light communications (VLC), which apply the revealing light-emitting diode (LED)[1] for broadband broadcast, offers a huge and unrestricted bandwidth to handle with crowded radio spectrum for highly-localized communication systems.

https://codeshoppy.com/shop/product/supermarket-billing-system-mobile-application/

Besides, the VLC technology has many other attractive features, such as worldwide availability, contamination free, high-capacity, and etc., and hence is deliberated as an appealing alternate of RF expertise for indoor multimedia coverage. However, VLC must entrance the support system in case of being the alleged ―data remote keyǁ to grasp the memo initiative. The imaginable and spontaneous system charge solution for VLC is relating the LED lamps tothe modem via system chains, which involves great modification of the interior design and is not economical. The Incorporation of VLC and power line communications (PLC) comes from the observation that all the LED lamps are associated to the power line and the power line can logically act as the support for VLC while driving the LED lamp. In this way, it will save the added cables and be tranquil to be connected. The first PLC and VLC integration model was projected in 2003, using only carrier binary phase shift keying (SC-BPSK) accent to provide a low rate transmission. Then orthogonal frequency division multiplexing (OFDM) is realistic in the mixture PLC and VLC system to combat the declining channel and accomplish higher spectral efficiency. However, in the field of PLC and VLC unified systems for interior spreading, there are still some challenges, such as the channel of the whole announcement link can be modeled as How to design the erection of the incorporation grid to diminish the layout modification as well as the linkage decorum complexity; 2) All the samples still endure in the point-to-point and off-line message structure and there are no employment reports of a realistic indoor diffusion system based on PLC and VLC with OFDM methods; 3) Some technical details comprising the channel displaying, coded variety, frequency band slice, network protocol and so on, are needed to be choice and verified. In this paper, we direct a novel and money-making indoor broadband dispersion system based on the deep mixture of PLC and VLC to mainly address those issues listed above, a two-lamp system demo is executed and the routine estimation is carried out in the workshop. The assistances of this paper can be specified as follows. 1) A extremely united PLC and VLC system is probable in this paper for efficient indoor broadband diffusion, where the signal in the power line is amplified and promoted to the LED without translating and all the LED lamps in one group handover the same signal. In this way, the diffusion network could be homogeneous and characterized as a single rate network (SFN), which avoids intricate web switching for the devices roaming concerning different LED lamps. 2) A prototype joined PLC and VLC system thru two LED spots with accretion load data rate over 48 Mbps data rate within 8 MHz bandwidth is caused in the enquiry plant. The length of the power line part is 200 meters and the statement distance of visible light part is 3 meters with the control of the white LED being 1W (in our point-to-point system, the life-threatening communication coldness of evident light part is 8 meters with the same power), of which the act is the best ever in the reported operations. 3) Investigations are accepted out on the demo to evaluate the concert of the proposed system. It can be found that in the future system, multi-path and thus good Recital can be reached over full-grown channel assessment and equalization systems. The rest of the paper is planned as follows, in Section II we have described the system model of the individual placement design of this module, Academic investigation in Section III, March and Implementation in Section IV and Geographies of the recommended system. Section V concludes the paper. Code Shoppy

Effects of e-Marketing and Consumer Lifestyle towards the Style of Decision Making in Online Purchase of Movie Ticket

Online Movie Ticket Booking Project App

Effects of e-Marketing and Consumer Lifestyle towards the Style of Decision Making in Online Purchase of Movie Ticket

A.e-Marketing The effective e-marketing strategy is an important element for the success of any type of business [4]. The uniqueness of e-marketing is created using a series of specific function and relational combined with 4P (Price, Product, Place, and Promotion) to form a mix element of e-marketing, which contains a mixed tool e-marketing that provided on the business website to facilitate sales transactions. According to [5], thing that gives uniqueness to e-marketing is the merging of the traditional marketing concept with a series of relational functions with a new formula 2P + 2C + 3S (Personalization, Privacy, Customer Service, Community, Site, Security and Sales Promotion).

https://codeshoppy.com/shop/product/theatre-ticket-booking/

Online Movie Ticket Booking Project App

B.Consumers Lifestyle The concept of lifestyle patterns and their relationship to the marketing was introduced in 1963 by William Lazer [6]. The lifestyle patterns were defined as a system concept that has broad meaning [6]. The approach that most widely used for measuring lifestyle has AIO (Activities, Interests, and Opinions). Lifestyle as used in lifestyle segmentation research can measure some things. First, community activities, in terms of how they spend their time. Second, their interests, what they overlooked in their surrounding environment. Third, their opinion, in terms of their views about themselves and the world around them. Fourth, some basic characteristics like the stage of their life cycle, income, education, and where they live. The lifestyle classification can be defined as an integrated pattern of three things [7]. First, the activity consists of hobbies, sports, likes and dislikes for shopping, social activities. Second, the interest consists of food, fashion, family, and leisure. Third, the opinion consists of social problems, business, and government. The lifestyle characteristics have a major impact on buying behavior [8]. In a consumer environment, one chooses a product or brand, which seems to elaborate his lifestyle. Consumers can make a choice in the consumption environment in order to determine or actualize their lifestyle, identify through the selected product, or brand. Consumers select, purchase, and consume the intended goods and services, so that they can define, or extend their identity and lifestyle. The result of the research concluded that there is a casual effect on the individual’s lifestyle consumption behavior. Lifestyles affected the purchase decision [9]. The study found that consumers of lifestyles will affect the purchase decision. For example, consumers who like outdoor activities concerned with things that are fashionable, and they have a willingness to pay with a greater attention to experience the brand image, product quality, and notoriety of product brand. Based on the description above, the formulation of the problems in the research on e-marketing, consumer lifestyle and purchasing decision making style focus were limited to issues with the subject as follows : •How does the influence of e-marketing towards the movie tickets purchasing decision making style through the website? •How does the influence of consumer life style towards the tickets purchasing decision making style through the website? •How does the influence of e-marketing and consumer life style simultaneously towards the movie tickets purchasing decision making style through the website? Code Shoppy

C.Consumer Decision Making Style Modern marketers showed a growing interest in research of the consumer purchasing decision making style to understand how an individual makes a buying decision in a competitive environment [10]. This concept is important because it determines the pattern of consumer behaviour and relevant for market segmentation. Most of the previous researchers have adapted to the Consumer Style Inventory (CSI) introduced by Sproles and Kendall in 1986 as a general tool to assess the customer’s decision making style. Reference [11] showed that the product quality, product brand, fashion, recreation, product price, impulsiveness, overchoice confusion, and brand loyalty influence purchasing decisions. It can not be ignored that many young consumer demand in purchasing online, especially the consumer is influenced by the quality of products, brands, and fashion.

Consumers think that online shopping is a leisure experience and recreational values. Consumers also defend their favourite brand. They are critically influenced by peers and friends in shopping online. Other studies [12] indicates that there is a significant relationship between online consumer decision-making styles and comparison shopping proneness. Consumers with perfectionism style need to compare what is being spent in order to get to their “perfect” choices. Consumers also think that the comparison shopping tool will help them. Similarly, consumers searching for the best value in shopping at websites to find appropriate choices. There are seven styles of consumer purchasing decision making, which are Brand Consciousness, Perfectionist, High Quality Consciousness, Recreational, Hedonistic Consumer, Impulsiveness, Price-Value Consciousness, Confused by Over Choice, Novelty-Fashion Conscious Customer [10]. With the identification of problems that have been described previously, the objectives that could be addressed through this study are as follows : •To determine the influence of e-marketing towards the movie tickets purchase decision making style through website. •To determine the influence of consumers’ life style influence towards the movie tickets purchase decision making style through website. •To determine the influence of e-marketing and consumers life style simultaneously towards the movie tickets purchase decision making style through website.

Design Imperatives for E-voting as a Sociotechnical System

Online Voting System Project Application

Design Imperatives for E-voting as a Sociotechnical System

Online Voting System Project Application

There are a number of past and ongoing research efforts on the development of e-voting systems. These works largely focus on requirements, technical specification and implementation technologies to support different aspects of the elections from registration and verification through balloting to counting and result. A major shortcoming of these studies is their sole focus on technical aspect of e-voting solution wit/lOut significant attention paid to human and environment factors that arguably determine the successful adoption of such e-voting solutions. This paper addresses this design gap in three steps. First, it provides a conceptualization of e-voting system as a socio-technical system. Second, it elaborates a set of principles to guide a socioteclmical design for e-voting. Third, it provides concrete implications of these principles. The paper concludes on the pragmatics of this approach to e-voting adoption particularly in environment such as Nigeria.

https://codeshoppy.com/shop/product/evoting-app/

E-voting constitutes a very important aspect of ICT­enabled democratic governance [1]. E-Voting solutions generally aim at increasing participation, improving the outcomes elections by addressing challenges associated with traditional voting practices. The notion of e-voting in this paper refers to the use of technology to support one or more of the major phases of the electoral process – from registration stage in the pre-voting phase to voting/balloting and verification to counting or tallying after voting [2], [3]. Although, the term is often associated with the use of electronic channels like the Electronic Voting machines or the internet for casting votes, its use for ICT-enabled voter enrollment or registration is gaining popularity particularly in the developing world. Generally, there are mixed sentiments regarding e-voting adoption, particularly in the aspects of vote casting. For example a number of countries like Netherlands, Germany and Ireland moved away from the use of e-voting for balloting after initial adoption [1]. E-Voting using Electronic Voting Machines (EVM) have also remained controversial in the United States. While e-voting is generally perceived as generally risky [4], there is some consensus that the benefits of e-voting outweigh the actual risks. In this light, developing countries have shown significant interest towards the adoption of e-voting. Given that elections in developing countries attract significant controversies and are fraught with several challenges, the idea of trying any credible alternative is a plausible strategy. While not completely oblivious of the risks involved in e­voting, research contributions on e-voting in Africa such as [5] and [6] have largely focused on technological design of e­voting systems. However, designs espoused in these works largely ignore: the social context in which the e-voting systems will enacted, peculiar needs of different users (e.g. voters) and the organizational context of the Electoral Authority. Direct experiences of the authors based on adoption and implementation of e-voting solution in Nigeria show that these shortcomings significantly impact the effectiveness of the solution and could potentially compromise the outcome of the elections. A way to address this problem is to adopt a Socio­technical System (STS) design framework for e-Voting systems. Socio-technical systems approaches advocates a human-centric analysis which considers the impact of the technical or computing sub-system on people and how technology can be designed more effectively for people [7]. The goal of an STS system is to collectively optimize the technical, social and environment subsystems [8]. We consider in this paper the design of e-Voting systems as a socio-technical system. Our goal is to augment existing knowledge about requirements and design of e-Voting systems by the specific design principles that must underpin any e-voting solution when considered more holistically as a socio-technical system. For illustration, we highlight implications of these principles for e-Voting solution in the Nigerian context.

The notion of e-Voting as an STS makes its inherent complexity more apparent. For instance, the need to operate e­voting system across different boundaries such as geographical, cultural and temporal boundaries, characteristic of complex systems [8] are not discussed in technical designs of e-voting. These principles make them explicit, for instance see principle #2 in Table 1 above. Omission in this respect creates potential source of failure for e-voting system. Congruent with the principles elaborated here, Chevallier et al [15] identified three core success factors for the Geneva’s e­voting project – the role of politics, organization of trials involving voters and other stakeholders and having an interdisciplinary team comprising Legal experts, security CERN, sociologist and political scientists. However, along the clear benefits for the adoption of a STS approach to e-voting design, we must point out some inherent challenges in operationalizing such approach, particularly in the developing country context. For instance, the classical STS approach requires iteration between design implementation and operation to enable continuous improvement and shaping of solution. The practicality of this in terms of participation of stakeholders and resource implication may be limited. Thus, there will be the need to carefully identify principles that could be supported in different context and under the prevailing temporal constraints for the overall election process. View More

Several Issues on Establishment of Computer Application Management System for College Physical Education

College Management System Project

Several Issues on Establishment of Computer Application Management System for College Physical Education

This article illustrates college sports management system and its characteristics, and also put forward some issues on implementation of college sports computer application management system. Meanwhile, the paper presents the ideas on the application of computer management according to the trend of development in colleges’ managements.

College Management System Project

FEATURES OF COMPUTER APPLICATION MANAGEMENT SYSTEM FOR COLLEGE SPORTS

A more complete college sports computer application system should include the following sections (sub-system) as figure 1. Computer application management system for college sports has the following characteristics. A. Be OverallComputer application management system for college sports includes the college physical education, training, scientific research and logistics management and other aspects, and various sub-systems are constructed by a number of modules, such as physical education management system constituted by student attendance, physical fitness, and performance of “National health standards for physical fitness of students,” and etc, with a function of statistical analysis, which makes sports management computer so that scientific and systematic.

https://codeshoppy.com/shop/product/college-management-system-2/

B. Be Recurring The data processing and analysis of college sports daily work, teaching and the group work should be recurring and continual. In a sense, computer could provide faster, more comprehensive, more accurate and timely services which could save us a great deal of manual work on searching, aggregation, tabulation, printing, inquiry, editing, and storage and so on. For example, if anyone wants to inquire his P.E. results, he could simply enter his school ID or faculty, classes and his name and the computer will print out the results of his, physical performance and physical health achievements.

C. Be Cyclical Various college sports work have cyclical characteristics, such as track meet, basketball, volleyball, football and other sports activities are generally once a year. It could be time-consuming, money-consuming and a waste of human resources if these works are done by human-being only. However, if using a computer, the college could simply print and use the üüüüüüüüüüüüüüüüüü978-1-4244-3531-9/08/$25.00©2008 IEEE date through a little modification of the date, the organizing committee, referees and other small sections. D. Be Marginal Computer application management system for college sports should be the result of the marriage of computer science and physical education. Carrying this application is the process of combining the two technologies together. Hence, it would be extremely difficult to do well in computer-based applications if we ignore the cultivation of the “marginal talent” and the combination of these two technologies

The develosoci ty. We have already entered the informatione completion of the information superhighway anblishment of e-education network, which will certainly influence our traditional education in all over the last hundreds of years. This article illustrates college sports management system and its characteristics, and also put forward some issues on implementation of college sports computer application management system. Meanwhile, the author presents his ideas on the application of computer management according to the trend of development in colleges’ managements. We must fully understand the drawbacks of the traditional education and management and then use modern information and computer technology to change them in an educational revolution. Click Here

The Determinants of Online Shopping Behavior

Online Shopping E-Commerce Android App Project

The Determinants of Online Shopping Behavior

The rapid development of the Internet has increased the number of users shopping online. Many sellers thus focus on the shopping behavior on online environment. In this competitive environment, managers must understand factors that affect the online purchase behavior of customers to increase and maintain their competitive advantage. Therefore, this study aims to explore antecedents of online shopping behavior. Based on the social cognitive theory, this study proposes a research model of online shopping behavior. Code Shoppy This study argues that trust positively affects online shopping behavior; perceived website complexity negatively and directly affects online shopping behavior, and indirectly affects trust online shopping behavior via trust. These research results can be seen as references by future scholars and practical suggestions for platform managers to improve their businesses.

Online Shopping E-Commerce Android App Project

The number of online shoppers has increased in recent years. Reference [1] indicated that more than 60% of American consumers shop online at least once a month; only 1% has never shopped online. Reference [2] showed that in the past 12 months, more than 70% German and Finnish users have used the Internet to shop, and over 80% English users shop online. Reference [3] indicated the Internet enables companies and consumers to interact with each other through electronic commerce. In the wake of the enormously profitable online market, the competition among shopping websites is keen. Understanding the issue about online shopping is important for online sellers.

https://codeshoppy.com/shop/product/e-commerce-project-report-android-app/

Thus, this study focuses on the determinants of online shopping behavior. Purchasing is the main method of obtaining actual products, regardless of product type (physical or digital) [4]. A variety of explanatory models have been developed and aimed at predicting and explaining online purchasing behavior based on user acceptance theories such as the technology acceptance model (TAM) and the theory of planned behavior (TPB). Such studies have improved understanding of why individuals purchase products/services online [5]. Recent studies have demonstrated that the environmental factors are important for fostering shopping behavior [6]. For example, store environment may influence product evaluation and store choice. However, previous studies, such as TAM and TPB, less concern the influence of environmental factors on online shopping behavior. In social cognitive theory, there is a triadic mechanism among personal characteristics, such as cognitive states, psychical features, such as external environment factors, and behavior [7]. Social cognitive theory is a strong theory that accounting for the human behavior argued by [7]. There are many studies adopting social cognitive theory to explain the online customer behavior. Reference [8] used social cognitive theory to assess the determinants of internet banking adoption. The results shown that websites’ social feature, trust, compatibility with lifestyle and online customer services have a significant effect on customers’ intentions to adopt Internet banking. Reference [9] adopted social cognitive theory to consider the role of personal factors and environmental influences in individual behavior. The results of these studies are shown that social cognitive theory is a powerful theory for validating individual behavior. Reference [10] indicated that using the social cognitive theory proposed by [11, 12] is a novel and useful starting point to guide future research in sustainable consumption. However, few studies have employed social cognitive theory to explain the antecedents of online shopping behavior. Social cognitive theory, which is developed in social psychology, has received little attention within in online purchase field. Most of prior researches which employed social cognitive theory as a theoretical framework focus on the specific aspect of social cognitive theory, such as the self-efficacy and outcome expectancy [9]. The core concepts within the social cognitive theory, in particular environmental and personal dimensions are less concerned. For further understanding the issue about online shopping behavior, this study adopts social cognitive theory to explore the antecedents of online shopping behavior by considering personal factors and environmental factors. In social cognitive theory, regarding on personal factors, [7] expressed that cognitive state is a kind of personal characteristics. On a shopping website, trust is a key factor influencing consumer decision [13]. Trust can be defined as the trustor perceives that the trustee has the ability, integrity, and benevolence features to bring benefit to the trustor [14]. That is, in this study, trust can be regarded as a cognitive state of social cognitive theory. Reference [8] indicated that website features are essential in determining the usage of a website. The layout, design, features, and characteristics of websites are considered as website design. Thus, this study adopts perceived website complexity which is proposed by [15] as an environmental factor of social cognitive theory. This study explores the determinants including trust and perceived website complexity of online shopping behavior. The results can be seen as practical suggestions for platform managers to improve their business.

Based on social cognitive theory, this study proposes a research model to explore the relationships among trust, perceived website complexity, and online shopping behavior. Besides, previous studies have indicated that online store environment is a key factor influencing online purchase [23]. However, perceived website complexity is less considered. Thus, this study regards perceived website complexity as an environmental factor and explores the relationship between perceived website complexity and online shopping behavior. Understanding this issue will contribute to online shopping research agenda and will help online shopping managers to obtain advantages in the face of environmental stresses. Future works can collect and analyze empirical data to verify this research model.

AUTOMATIC TOLL E-TICKETING SYSTEM FOR TRANSPORTATION SYSTEMS

Online Tollgate Payment Android App

AUTOMATIC TOLL E-TICKETING SYSTEM FOR TRANSPORTATION SYSTEMS

Nowadays almost all highways toll plazas are manually operated, where an operator collects cash from the driver and provides a receipt. Since this procedure can be slow, we often encounter traffic jams at the toll plazas on busy highways. Automatic process of toll collection will save time, effort, and man power. In this work propose a low cost and efficient technique called Electronic Toll Collection using RFID modules that automatically collects the toll from moving vehicles when they cross the toll plaza. We also assume that an owner maintains a prepaid account, so that toll tax is deducted automatically from the driver’s account at toll plaza. If the balance in the owner’s account is low or if the vehicle is not equipped with an RF system, the toll gate remains close. In such a case vehicle owner will have to pay the toll tax in cash and collect the receipt. The owner receives an SMS message on his/she mobile about the details of the payment and there is no need for him to stop the vehicle. How many vehicles passing through the toll gate stored in a database. We can also find out a vehicle how many times passing through the toll gate in a day. Through this process of toll collection will save time, effort and man power.

https://codeshoppy.com/shop/product/toll-gate-app/

Online Tollgate Payment Android App

The automatic toll e-ticketing system is the approach used for the vehicle when it reaches the toll plaza, this is detected by using Infrared Proximity Sensor. RFID tags are used to read each vehicle with the help of RFID reader. An IR receiver is used to receive these pulses and sends it to a controller (MSP 430 Launch pad), which then transmits the vehicle number through the RF transmitter located in vehicle. We assume that vehicles have 16-bit identification numbers. The RFID [3] tags to readers read the signal and information about vehicles owners. These RF signals are received by an RF receiver at the toll plaza, which send data to a computer’s parallel port. A software program running on the computer retrieves vehicle details from its vehicle database. Depending on this information, appropriate toll tax is deducted from the pre-paid account of the vehicle’s owners [8]. The owner receives an SMS message on his/her mobile about the details of the payment [1]. If the balance in the owner’s account is low or if the vehicle is not equipped with an RF system, the toll gate remains close. Next method proposes a very simple method for enhancing the performance of infrared electronic-toll-collection systems, in such a case, the vehicle owner will have to pay the toll tax in case and collect the receipt, Figure 2 explains the concept in the form of a block diagram. We need a system for handling violation and acknowledgement when a vehicle does not have an RFID module installed, a vehicle’s ID number is not found in the database, or a driver has insufficient funds to pay toll [9]. If an acknowledgement is not received in a predefined time from the database, the toll plaza gate remains closed. Existing automatic toll collection techniques incur power loss since the receiver is continuously turned on, even when no vehicle arrived at a toll plaza [2].In our technique, only the IR sensor is turned on to detect the arrival of vehicles. Only when a vehicle is detected, RFID Tag to RFID reader reads the data.

SOFTWAREIMPLEMENTATION A.MICROSOFT ACCESS For secure and easy access of the database, we used Microsoft Access which is relational database management system from Microsoft Corporation.Microsoftaccess is supported by Visual Basic for Applications, an object-based programming language that can reference a variety of objects including DAO (Data Access Object). B.VISUAL BASIC Visual Basic 6.0 was used to interface the microcontroller with the personal computer in the e-toll plaza. The inputs from the microcontroller are given to the PC’s parallel port and this Data is retrieved by VB 6.0 software program, which manages the database. On receiving the input from the MSP430G2553 microcontroller, the program deducts the toll amount from account balance, returns success or failure acknowledgement to the controller and runs an executable file to send the transaction statement as SMS to the owner’s mobile number from the database. See figure8 which show the GUI. C. SENDING SMSWe made use of SMS send, Message to be sent are register in “SEND_SMS”. The transmission is activated by setting the START_SMS parameter once an open source software which helps connect the mobile phone as a GSM modem to the computer via a data cable. The software uses the SIM card in the mobile phone to send the SMS. The mobile is connected to the computer via COM. The operations of the software are automated using a Message Loop (default). It is wise to call this function many times per second in a loop; otherwise, you will have a slow or unresponsive GUI. COM extensions provide a common interface for working with software applications in a Microsoft environment. Applications have defined COM objects that can be used in AutoIt (and other programming languages) to manipulate the applications and perform tasks within them. To use COM objects, you must know the object name and its properties and methods. C.IAR Workbench IAR Workbench Kick start version provided by Texas Instruments was used to develop the microcontroller programs as it was user friendly and has both simulation and debugger mode. This also makes the process of loading the programs to the controller faster and easier.

The security at the toll booth will improve in this system and it will become possible to detect stolen vehicles. Since cars do not have to stop at the toll booth, savings on fuel from repeated stops for vehicles, and reduction in accidents. There are several limitations of the proposed system. It requires a user to have a dedicated prepaid account. Since the infrared proximity sensor is used in detecting the arrival of vehicles, there can be interface from external source of light. Since highways are operated in two directions, If computer of the toll plaza are connected in a network, then a vehicle from one state can use the automated facility of a toll booth in another state. The unique identification number of vehicle can be increased to larger number. Vehicle theft can be prevented by anti-theft alarm along with this kit.

In this Paper, the concept of Automated toll e-ticketing using MSP430 Launch pad. We have used an innovative approach where a traveler will be able to pay the toll while in motion using RFID communication technology. Through this process of toll collection will save time, effort, and man power. How many vehicles passing through the toll gate stored in a database. We can also find out a vehicle how many times passing through the toll gate in a day. The improvement can be done to develop a multi vehicle amount deducted and send a SMS at a time multi vehicle. View More

Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

Women Safety And Security App

Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

This paper studies the problem of secure transmis-sion in dual-hop cooperative networks with untrusted relays,where each relay acts as both a potential helper and an eavesdrop-per. A security-aware relaying scheme is proposed, which employsthe alternate jamming and secrecy-enhanced relay selection toprevent the confidential message from being eavesdropped by theuntrusted relays. To evaluate the performance of the proposedstrategies, we derive the lower bound of the achievable ergodic se-crecy rate (ESR), and conduct the asymptotic analysis to examinehow the ESR scales as the number of relays increases

https://codeshoppy.com/shop/product/women-security-app/

Women Safety And Security App

Recently the applications of Physical-Layer Security(PLS) techniques in cooperative networks have attractedconsiderable attention. Among the candidate PLS solutions,cooperative jamming (CJ), which exploits the cooperating usersto transmit the artificial noise, is a promising tool to combateavesdropping [1], [2]. To harvest the diversity gain whileguaranteeing the security requirement, great efforts have alsobeen devoted to combine CJ and relay selection [3]–[5].Common to [1]–[5] is that all of them assume the relays aretrusted, and the eavesdroppers are external entities in additionto legitimate parties. However, in some applications, the relaysthemselves areuntrusted, from which the transmitted messagesmust be kept secret. For example, in heterogeneous networks,the relays may have a lower security clearance (and thus alower level of information access) than the source-destinationpair. The research on untrusted relay systems was pioneeredby He and Yener in [6], where the non-zero secrecy rate isproven to be achievable by enlisting the help of the destinationwho performs jamming. In [7], the joint beamforming designat the source and the relay was proposed for MIMO untrusted relay systems. In [8], the secrecy outage probabilities of severalrelaying schemes were analyzed. Code Shoppy In [9], the power allocationpolicy was developed for amplify-and-forward (AF) untrustedrelay systems.Although diverse results on untrusted relay systems havebeen reported, the majority of existing works deal with the sim-ple model with only one relay node. For multi-relay networks,[10] analyzed the relationship between the system secrecycapacity and the number of untrusted relays. Reference [11]proposed to use relay assignment and link adaptation to realizeboth secure and spectral-efficient communications. However,[10] and [11] only considered the information leakage prob-lem during the first phase of any two-hop transmission. Thissimplifies the protocol design, but may not hold in practice.Unlike [10] and [11], we in this paper try to secure thetransmissions of both the first and the second phases, and ourcontributions are threefold: First, an alternate jamming methodis introduced to prevent information leakage. Second, both opti-mal and sub-optimal secrecy-enhanced relay selection policiesare proposed. Third, the lower bound of the achievable ergodicsecrecy rate (ESR) is derived, and the asymptotic analysis ofthe ESR is given as well.

E-Exam Cell

Exam Hall Ticket Management System

E-Exam Cell

AIM AND OBJECTIVE

A.AIM:Currently Exam cell activity mostly includes a lot of manualcalculations and is mostly paper based. The project aims tobring a centralized system that will help both the students andexam cell staff members to manage exam cell related activitiesin a very easy and efficient way by using an automated systemfor exam cell i.e.” E – Exam Cell”. B.OBJECTIVE:As we already know that our traditional system dependsmostly on paper work, so our main purpose is to replace theactivities easily. It will allow the students to register and enrol themselves into our system by sharing all the details with thesystem. Code Shoppy It will allow only registered students to login which willprevent unauthorized access. It aims to provide an easy way tofill any exam related forms, KT forms and traditional manualsystem of colleges to an automated system that will handle theentire exam cell related also to generate hall ticket and marksheets by remotely accessing the system without wasting anytime.

Exam Hall Ticket Management System

As discussed earlier there are lot of problems in the existingsystem of our college as it requires a lot of manual paper workand manual calculations. Due to this manual process the examcell activities are very slow and requires a lot of time of bothstudents and exam cell staff and it is also very difficult forrecord keeping purpose of students. The current system requiresmanual entry of each student’s personal details, subjects to beappeared, also K.T has to specify if students have one. Also, asper the new examination pattern the marks has to calculatedbased on CGPI/SGPI of each student which is also very tediousjob and requires a lot of time. The exam cell staffs have to fillall this details personally in their system for maintaining thestudent’s information. Also, processing of all this details is verydifficult and requires a lot of precious time. The students alsohave to fill the exam form, K.T form, Revaluation form etc. andalso for hall ticket the students have to fill the hall ticket formwith photo and later have to verify in each semester. This is alsoa very hectic job for students as they have to collect the formpersonally by standing in a long queue and then fill the formmanually. After verification of form(s), it has to be submittedin office. Hence there is a need of a better system which willhandle this entire problem remotely and which will ease theprocess of filling forms, submission of forms, collecting halltickets and mark sheets.

Current exam cell activities are mostly done manually andit requires of lot of paper work and also to maintain studentsrecord is very tedious and hectic job to do with our college’sexisting system. So, to overcome all this issue there is a need ofan automated examination cell system which will solve all thisproblem. Hence by keeping in mind all the problems addressedin previous system we have introduced an automated system forexam cell i.e. “E – Exam cell”. Students have to register for thefirst time with our system to enrol themselves by providingpersonal details, uploading photo and sign etc. which willgenerate a unique id for each student. The students can alsomodify/edit their details in future if required. Once registeredstudents can login to our website through their registered id andpassword and can fill various forms like Exam form, K.T form,Revaluation form without have to stand in a long queue. Aftersuccessfully filling and submitting the form the students canview or take print out of the form and can come later to examcell for verification and also our system will notify the registered students about any notices regarding Exam relatedactivities. The E – Exam cell admin can verify students formthrough his/her login id and can modify the students form ifstudents have made any mistake during filling the form and bychance submitted it. The hall ticket is also generated by oursystem and the exam cell admin can generate various marksheets of each student. Record keeping and maintenance with E – Exam cell is very reliable, secure, effective, scalable and easethe work of Exam cell staff. Thus, E-Exam cell is very usefulsystem for both students and Exam cell staff members.

https://codeshoppy.com/shop/product/exam-hall-ticket/

A.WORKING OF THE SYSTEME-Exam Cell have database regarding students and theirresults and also other examination related information. Thereare Two main characters in this system which are as follows: 1.Students2.Exam Cell Department Staff(Admins)1.STUDENTSAll the students have to register themselves which formsregarding examination like Exam Form, creates a studentdatabase. Once all the students are done with the registrationprocess information is verified and username and password isassigned to each student which they can change it later on asper their convenience. Students have access to fill all theRevaluation Form, KT Form and so on. Role of student in thissystem is to enter information related to their semester. Studentcan also choose the elective subjects from here. In case of anyimproper information is uploaded by student then the studentcan contact the admin to resolve the problems. 2.EXAM CELL DEPARTMENTExam cell Department has the authority over all thedatabases which they can check and update according to theresults of the student. Main job of exam cell department is togenerate results and verify the student’s information. Studentsfrom all the branches need to get their documents, Exam forms,etc. verified by the admin. Admins are responsible for HallTicket generation, Results generation keeping track of numberof KT heads upon students if no of KT heads exceeds the limitthen the student is declared Drop. Students once getting Dropsare allowed to appear of the course if they clear their KT’s andbecome eligible for admission. Results of the examination willbe displayed by the admins either on the website or on thenoticeboard. Students will be getting notification regarding theRevaluation results which will save the time of students bywhich they did not need to rigorously read the notice board.

Management of Medical Technology – Case Study of a Major Acute Hospital

Hospital Management System Project

Management of Medical Technology – Case Study of a Major Acute Hospital

A.Existing Equipment 1)Major Items Of the total of A$104.6M existing major items, items with a value of A$64.3M required replacement within the 5 year planning period and were subject to prioritisation, while items with a value of A$6.5M did not require replacement as they were either backup units or redundant, were likely to be funded by leasing, or were funded by research grants. Aside from replacement, a further A$6.0M would be required for anticipated upgrades to existing equipment within the 5 year period.

2)Minor Items Using the BME inventory as a complete record of all equipment, each major item was identified in this inventory and removed. This process included identification of all system components and aggregates. The remaining list of equipment therefore consisted of Minor items. The replacement value of this stock of Minor items was determined to be A$26.2M. Assuming an average 10 year life expectancy for this equipment, approximately A$2.62M would be required to allow for ongoing replacement of minor items throughout the hospital each year. https://codeshoppy.com/shop/product/hospital-management-mobile-app/

B.Additional Major Items During interviews with departments, details of equipment required for normal service expansion and growth over the 5 year planning period was collected and prioritised. These results are summarised in Table 3. A number of strategic projects were also underway or anticipated within the 5 year period. These projects were redevelopment of the ICU, the opening of a dedicated day surgery and short stay treatment unit, a proposal for a dedicated neurosurgery operating theatre, a proposal for the introduction of a Tomotherapy unit for Radiotherapy, and the transfer of some currently outsourced medical imaging services to in-house operation. Additional equipment required for these projects was documented but not prioritised since equipment for each project was to be funded from separate budgets.

C.Discussion Many “views” of this data were prepared for the project’s final report. The more significant and revealing views are presented here. Figure 1 shows a pie chart of the existing equipment stock, and illustrates that Major items covered 80% of the total equipment stock by value. The method of dividing the equipment stock at the A$50,000 threshold in this case resulted in detailed planning information being collated for a very large proportion of the equipment stock. Figure 2 shows a histogram of replacement years for the existing major equipment. Items to the left of the current year (2007) were deemed overdue for replacement, and termed “backlog”. To the right of the current year it can be seen that expenditure requirements vary significantly from year to year. Figure 3 shows the breakdown of the existing major equipment stock by equipment category. It can be seen that medical equipment clearly dominates the equipment stock, with approximately 83% of the total value of equipment. However, other categories of equipment are also held in significant amounts. Code Shoppy

Figure 4 shows the existing major equipment stock holdings for each department. Standardised department names have been used to allow grouping of certain department with smaller equipment stocks. For example, the departments of Renal Dialysis, Vascular Laboratory, and Respiratory Medicine, (and others) are all grouped into Specialist Medical Departments. The main equipment stakeholders in the hospital are, not surprisingly, Medical Imaging, Radiotherapy, Operating Theatres, and Pathology. By combining the requirements for a) Routine Replacement of Existing Major Items, b) Planned Upgrades for Existing Major Items, c) Routine Replacement of Existing Minor Items, and d) Acquisition of Additional Major Items, the total expenditure requirements for the hospital for all equipment types for the 5 year planning period amounts to A$112.5M. This excludes additional equipment required for strategic projects, and assumes all equipment will be replaced or acquired as scheduled, and that the existing major equipment backlog is eliminated over this period. An overall equipment budget of approximately A$22.5M per year would therefore be required.

The deliverables for this project consist of the detailed final project report which provides a number of views of the existing major equipment data collated. Such management information provides an understanding of the existing equipment stock and the future outlook when current funding levels are continued. The prioritised equipment lists provide an invaluable starting point for consideration of possible equipment replacement options when funding opportunities arise. The prioritisation process provides an open and transparent method of measuring an item’s importance using a predefined set of criteria. As the data for the report is based on survey work involving identification and documentation of actual equipment items, it provides a convincing argument for the levels of funding required to adequately maintain the equipment stock and allow for normal growth. Such a view is absolutely necessary for the appreciation of the extent of reliance on technology has grown in modern health care facilities.

Hospital Management System Project

Ground Moving Target Detection and Imaging Usinga Virtual Multichannel Scheme in HRWS Mode

Garbage Management System Project

Ground Moving Target Detection and Imaging Usinga Virtual Multichannel Scheme in HRWS Mode

Along-track multichannel synthetic aperture radaris usually used to achieve ground moving target detection andimaging. Nevertheless, there is a design dilemma between azimuthhigh resolution and wide swath (HRWS). To solve this problemin HRWS mode, we introduce a virtual multichannel (VMC)scheme. For each virtual channel, the low real pulse repetitionfrequency (PRF) improves the ability of resolving range ambiguityfor wide-swath, and the high virtual PRF improves the capabilityof resolving Doppler ambiguity for azimuth high resolution. Formultiple virtual channels, strong ground clutter is eliminated bythe joint VMC processing. Furthermore, a detailed signal modelof a moving target in the virtual channel is given, and the specialfalse-peak effect in the azimuthal image is analyzed. Moreover, wepropose a novel ground moving target processing method basedon the VMC scheme and the clutter suppression interferometry(CSI) technique, which is called VMC-CSI. https://codeshoppy.com/shop/product/location-based-garbage-management-system-for-smart-city/ The integration ofdetection, location, velocity estimation, and imaging for groundmoving targets can be achieved. Accounting for the unresolvedmain peak and false peak for a moving target, in the VMC-CSImethod, we adopt a two-step scheme to estimate the radial velocityand along-track velocity, namely, rough estimation and precise es-timation. Meanwhile, considering the same interferometric phasesof the main peak and the false peak, we use false peaks first for therobustness of initial azimuth location estimation and remove falsepeaks afterward. Numerical simulations are provided for testingthe effect of the false peak and the effectiveness of VMC-CSI

Garbage Management System Project

Concept of VMCFig. 1(a) shows an along-track three-element SAR array,used for ground moving target indication (GMTI), where PRFdenotes the real PRF of the SAR system. The middle ele-ment indicates a multiplexing element used for transmittingand receiving. In a T/R snapshot, three spatial samples areformed, in which the numbering of “11,” “12,” and “13” denoteround-trip signification from the first transmitting element tothe first receiving element, the second receiving element, andthe third receiving element, respectively. Note that the loca-tion of the spatial sample can be approximately taken as anequivalent phase center that is positioned midway between theseparate transmitting and receiving elements [27], [39], andit is defined as the location of the virtual element. Hence,we can obtain three data channels in multiple T/R snapshots.Fig. 1(b) shows an MPC-SAR array for the purpose of HRWSstatic-scene imaging. Similarly, in a T/R snapshot, it receivesthree spatial samples. However, they are jointly processed, anda virtual channel is reconstructed for the MPC-SAR system.To simultaneously achieve GMTI and static-scene imaging in HRWS mode, VMC can be divided in a manner shown inFig. 1(c). The numbering of “21,” “22,” and “23” denotesround-trip signification from the second transmitting elementto the first receiving element,the second receiving element,and the third receiving element, respectively. The low realPRF ensures no range ambiguity in wide swath. Moreover, ineach virtual channel, temporal sampling is replaced with spatial sampling, and this overcomes the contradiction between wideswath and high azimuthal resolution. In addition, the unitedprocessing among the VMCs can realize detection and imagingfor the ground moving target in HRWS mode. It is noticed thatalthough a MIMO-SAR array in Fig. 1(c) is used to illustratethe VMC concept, the VMC can also be reconstructed by theexisting along-track multichannel SAR array at the price ofmore receiving elements.

First, the three virtual channels are gen-erated as shown in Fig. 1(c). Then, the strong ground clutteris suppressed by the displaced phase center antenna (DPCA)technique. Second, the interferometric phase information of thetwo cancelation channels after clutter suppression is extractedand used to estimate the initial location of the moving target. Code Shoppy In theory, the real main peak and the false peaks have thesame interferometric phase. Therefore, the mean of multipleinterferometric phases can be used to improve the locationprecision. Third, Doppler centroids corresponding to the realmain peak and false peaks are taken as candidates to betested. Together with the initial location information, a set ofradial velocity is obtained. Then, the phase error compensationfunction is constructed. The image entropy or image contrastis taken as the criterion, and the 2-D real velocity is unitedestimated. Finally, the multiple estimated parameters of thetarget are used to compensate for the error signal and constructthe azimuthal matched filter of the moving target. Eventually,this accomplishes the focused image.

A Food Wastage Reduction Mobile Application

Food Wastage Reduction Management Android App

A Food Wastage Reduction Mobile Application

Food Wastage Reduction Management Android App

According to [5], food waste is a significant issue around the world. It is predicted through a survey that more than 58 percent of food that people produce for consumption is wasted every day. Whereas, more than 60 percent of people in the third world countries are dying in malnutrition without proper food for a living. Therefore, the technologically developed countries are emphasizing more on this issue.

https://codeshoppy.com/shop/product/a-food-wastage-reduction-mobile-application/

Therefore, that less food can be wasted and can be distributed to the needy people. According to [6] in the age of modern era, where we are developed through artificial intelligence, people are more dependent on the smartphone. There are various applications, which are developed to control the huge wastage of food, and it provides the opportunity to send that extra food to the people who need it. There are multiple applications, which control food waste. The most useful food waste application for android and apple are discussed below:

A.Food waste application of Singapore (11th Hour) Tan Jun Yuan who is a food stall hawker from Singapore felt very bad noticing that people waste so much food in every year. He saw many vendors with leftover foods in a day. The quantity was 10 to 15 bowl of pork ribs served including other foods that he served the customers per day. He also saw that more than 35 percent of food he made every day was left as extra. Therefore, he created the application named 11Th Hour. This application provides the left and unused foods at the half of their original price before the restaurants are closed. After the creation of this application, there were almost 20000 downloads of this application [7].

B.Food waste reduction application from Netherlands (NoFoodWasted) August de Vocht, a citizen of Netherlands developed this application to reduce the amount of food waste. This application makes collaboration with the supermarket so that people can be aware of the foods that will be expired very soon. According to [8], it helps the users to upload their grocery items, which will expire soon so that people who are in need of food can buy them at a reduced price and use them. It helps to stop the wastage of excessive foods. More than 20000 people have found this application useful, and it has reduced the amount of food wastage in the Netherlands.

C.An application to control food waste by UK and Ireland (FoodCloud) This application has been declared as one of the useful food wastage application in the United Kingdom as well as Ireland. This application notifies the supermarkets about their surplus food so that the charitable societies can collect them and reduce the chances of food wastage. This application works as an intermediate that provides the type of foods and arranges the pick-up for the charities. It also collects and stores the food so that the charitable societies can collect the food according to their requirements. According to [9] more than 1200 business hubs and 3000 charitable societies work under this application to provide excess foods to the homeless people.

D.Food wastage Reduction Application from Africa (Cheetah) Some researchers from the University of Twente have developed this application to reduce the number of food wastages in Africa. It is seen that various fruits and vegetables lose their ability to be consumed due to poor road circumstances, less refrigeration in Africa. This application is created to gather those food items before they get rotten and distribute it to the needy malnutrition people of Africa. Dutch Ministry of Foreign Affairs helped the researchers in the development of this application. Mostly, farmers, the food transporters use this application, and it also helped them to reduce the chances of food bribing in Africa. It is expected that the public version of this application will be released within May, next year [10].

E.Indian Food Wastage Reduction Application (No Food Waste) No Food waste is an application from India that allows the restaurants, food stalls and parties to inform about their excessive leftover foods so that needy people can collect them for their usage. This application collects those foods and distributes those among the homeless people, slum dwellers and orphanages as well as nursing homes. Code Shoppy According to [11], the users can also notify them by showing hunger points, and they will distribute the foods to there. The only requirement is they take foods only if it is prepared two hours before. These applications have changed the use of artificial intelligence by providing food to the needy people. It is considered one of the best uses of software development. However, food wastage is still a bad habit. According to [12], people need to be more careful while preparing or ordering food because many people around the world do not get to eat. Food wastage reduction has decreased a lot due to the usage of this application, but people need to be more sensitive and careful so that a better world can be created where no food is wasted.

REAL-TIME VEHICLE DETECTION AND TRACKING USING DEEP NEURAL NETWORKS

On Road Vehicle Breakdown Assistance Finder Project

REAL-TIME VEHICLE DETECTION AND TRACKING USING DEEP NEURAL NETWORKS

Dynamic vehicle detection and tracking can provide essential data to solve the problem of road planning and traffic management. A method for real-time vehicle detection and tracking using deep neural networks is proposed in this paper and a complete network architecture is presented. Using our model, you can obtain vehicle candidates, vehicle probabilities, and their coordinates in real-time. The proposed model is trained on the PASCAL VOC 2007 and 2012 image set and tested on ImageNet dataset. By a carefully design, the detection speed of our model is fast enough to process streaming video. Experimental results show that proposed model is a real-time, accurate vehicle detector, making it ideal for computer vision application.

Introduction                                   

In today’s society, more and more vehicles are taking to the highways every year, which makes a push to monitor and control the traffic more efficiently. The real-time vehicle detection and tracing is essential for intelligent road routing, road traffic control, road planning and so on. Therefore, it is important to know the road traffic density real time, especially in mega cities for signal control and effective traffic management. For a long time, several approaches[1,2] in the literature have been proposed to resolve the problem of various moving vehicles; Nevertheless, the aim of real-time fully-automatic detection of vehicle is far from being attained as it needs improvement in detection and tracking for accurate prediction with faster processing speed. Zheng et al. use brake lights detection through color segmentation method to generate vehicle candidates and verify them through a rule-based clustering approach. A tracking-by-detection scheme based on Harris-SIFT feature matching is then used to learn the template of the detected vehicle on line, localize and track the corresponding vehicle in live video [2]. It is a good measure to extract vehicle areas, however, it needs a relatively ideal background. Wei Wang et al. have presented a method of multi-vehicle tracking and counting using a fisheye camera based on simple feature points tracking, grouping and association. They integrates low level feature-point based tracking and higher level “identity appearance” and motion based real-time association [1]. However, the average processing time of it is around 750ms, which is not fast enough to achieve the real-time processing. System based Convolutional Neural Networks (CNN) can provide the solution of many contemporary problems in vehicle detection and tracing. CNN currently outperform other techniques by a large margin in computer vision problems such as classification [3] and detection [4]. The training procedure of CNN automatically learn the weights of the filters, so that they are able to extract visual concepts from raw image content. Using the knowledge obtained through the analysis of the training set containing labelled vehicle and non-vehicle examples, vehicle can be identified in given images. In general, Convolutional Neural Networks show more promising results. In this paper, we propose a method of real-time vehicles detection and tracking using Convolutional Neural Networks. We present a network architecture, which create multiple vehicle candidates and predict vehicle probabilities in one evaluation. Our architecture uses features from the entire image to create vehicle candidates. Firstly, we use convolutional layers of the system to extract features from the raw image. Secondly, we use four kinds of inception modules. Thirdly, we add Spatial Pyramid Pooling (SPP) layer between convolutional layers and fully connected layers, which is able to resize any images into fixed size. Lastly, the fully connected layers predict the probability and coordinates of vehicles.

https://codeshoppy.com/shop/product/on-road-vehicle-breakdown-assistance-app/