Asha Ali - Academia.edu (original) (raw)

Papers by Asha Ali

Research paper thumbnail of Impact of Online Banking on Financial Performance of Commercial Banks: A Case Study of Barclays Bank of Kenya

The purpose of this study was to investigate the impact of online banking on the financial perfor... more The purpose of this study was to investigate the impact of online banking on the financial performance of commercial banks in Kenya. The study specifically focused on Barclays Bank of Kenya. To what extent does accessibility of Online Banking impact financial performance of Commercial banks in Kenya? To what extent does Online Banking Risk vii DEDICATION Special thanks to my family for their constant support. May Allah bless you abundantly. viii

Research paper thumbnail of Multi-Level Security for ATM Transaction

International Conference on Advanced Computing, Sep 2, 2015

Automated Teller Machines (ATM) have become a part of prestige of the banks all over the world. A... more Automated Teller Machines (ATM) have become a part of prestige of the banks all over the world. As the banks compete by opening more and more ATM's every year, research is going on of several aspects of ATM especially security. In real time ATM, user is authenticated only by a four digit Personal Identification Number (PIN) which can be compromised easily. Since this single level is vulnerable to attack, this paper proposes multiple security levels that can minimize the first financial risk to customers. The multiple security levels comprises of an extra user authentication and location aware transaction verification mechanisms Since possessing a smartphone has become a trend in current scenario, to use this functionality user is assumed to have a smartphone with good GPS functionality. Unlike prior research, this concept is a cost effective way that can be easily integrated into the current ATM functionality. Moreover, there is a provision for the user to directly block his card in context of misuse rather than dialing or contacting a third party.

Research paper thumbnail of A randomised trial to assess the educational benefit of a smartphone otoscope in undergraduate medical training

European Archives of Oto-rhino-laryngology, Sep 22, 2020

Purpose Competent otoscopy is a key otolaryngology skill for a broad range of medical careers, ye... more Purpose Competent otoscopy is a key otolaryngology skill for a broad range of medical careers, yet undergraduate's confidence to perform otoscopy is reported as low. Smartphone otoscopes have been suggested to improve undergraduates learning of normal eardrum anatomy because unlike the traditional otoscope, the learner and educator share the same image. This study aimed to evaluate whether a smartphone otoscope could enhance medical undergraduates recognition of common ear pathology. Methods 52 medical students were randomised into a standard group that used a traditional otoscope and an intervention group that used a smartphone otoscope. Both groups received a short didactic presentation on the recognition of common ear pathologies and were asked to diagnose four simulated pathologies. Both groups received feedback and guidance on how to better visualise the tympanic membrane. Force response items and 5-point Likert scales loaded on an electronic platform recorded their diagnosis and their perceptions towards the otoscope. Results The smartphone-group (n = 20) had higher overall rates of correct diagnosis compared to control (n = 22) (84% vs. 39%, p = < 0.001). Only the grommet station did not show a significant improvement between the two groups (100% vs. 91%, p = 0.49). 90% (n = 20) of participants felt the smartphone otoscope was preferential for their learning. The same number expressed that they want to use it in future learning. The remainder were indifferent. Conclusions The smartphone otoscope enabled learners to better observe and recognise middle ear pathology. This popular learning tool has the potential to accelerate the learning curve of otoscopy and therefore improve the proficiency of future doctors at recognising middle ear diseases.

Research paper thumbnail of Hudsjukdomen psoriasis påverkan på det dagliga livet : -Utifrån patientens upplevelser

Bakgrund: Psoriasis ar en kronisk hudsjukdom med omkring 300 000personer i Sverige. Psoriasis for... more Bakgrund: Psoriasis ar en kronisk hudsjukdom med omkring 300 000personer i Sverige. Psoriasis forekommer i olika former och plaque psoriasis arden vanligaste formen. Manga ganger kan psoriasis leda ...

Research paper thumbnail of RC5 encryption using key derived from fingerprint image

Page 1. Abstract - This paper presents a method for encrypting user's data using RC5 algorit... more Page 1. Abstract - This paper presents a method for encrypting user's data using RC5 algorithm with a secret key, which is embedded in a biometric fingerprint image using LSB based image steganography techniques and stored in the database. ...

Research paper thumbnail of Anatomy of the infratemporal crest: Implications for cross-facial nerve grafting in temporal myoplasty

Journal of Plastic Reconstructive and Aesthetic Surgery, Mar 1, 2012

Temporalis transfers for reanimation in facial palsy have been criticised for the lack of neural ... more Temporalis transfers for reanimation in facial palsy have been criticised for the lack of neural input from a functioning facial nerve. Cross-facial nerve grafting to the deep temporal nerves may provide a solution. An anatomical study was performed to further elucidate the deep temporal nerves (DTN) and arteries, examining anatomical variation and infratemporal distribution. Seventeen temporalis muscles were dissected from 13 cadavers as part of a BSc project. The number, branching pattern, length and diameter of DTN were recorded. Arteries supplying the deep surface of temporalis and their relation to DTN were noted. Six specimens were processed using Sihler&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;s staining technique. Arteries were injected with Iodixanol X-ray contrast medium and radiographs taken. All specimens displayed a single DTN originating from the anterior branch of V(3). A mean of 3 branches was observed. The nerve length was 14.22±3.95 mm. The point of entry of DTN into temporalis showed great consistency. Upon exiting the infratemporal fossa, the posterior deep temporal artery was deep and posterior to DTN in 65% of specimens. The branching pattern of DTN can be classified into three types. The deep arterial supply to temporalis was constant in all specimens. This study provides an anatomical basis for the planning and execution of cross-facial nerve grafting to temporalis, and for protection of vital structures. Furthermore, it helps to clarify inconsistencies in the literature regarding nomenclature of the nerve branching pattern of the deep temporal nerves.

Research paper thumbnail of An overview of cryptographic solutions to web security

Page 1. Abstract - The Internet is huge and largely unregulated place. There are a lot of dangers... more Page 1. Abstract - The Internet is huge and largely unregulated place. There are a lot of dangers in putting up a web page on Internet. These vary from invasions of privacy to hackers cracking our system. One of the most important ...

Research paper thumbnail of Re-engineering of ICT engineering education

From the unique `Gurukula' style of teaching prevailed during the Vedic period, education as ... more From the unique `Gurukula' style of teaching prevailed during the Vedic period, education as on date has evolved to the most modern concept of e-learning. The method of imparting knowledge through coexistence of teacher and students in ancient times has been transformed to such an extent where the direct physical interaction between students and teacher is not at all required. However, it is a fact that we are still accustomed to the traditional way of classroom teaching, memory checking tests, compulsory attendance etc. even in our post graduate level of technical education. Teaching pattern followed in high school level is followed in the same intensity even at engineering colleges. It is well known that science and mathematics are important tools of engineering programme but they are not themselves sufficient for one's success as an engineer. As world's dependence on technology is increasing tremendously, the need of the hour is to mould engineering graduates with adequate skills and will power required to explore and exploit the new opportunities of the world and thereby to contribute successfully towards the social and economic prosperity of our country. This paper makes a humble attempt to uncover the limitations of current engineering education and also tries to put forward some proactive measures to attain the desired results.

Research paper thumbnail of Deep Learning Networks for Short Term Load Forecasting

2023 International Conference on Control, Communication and Computing (ICCC)

Research paper thumbnail of Impact of Online Banking on Financial Performance of Commercial Banks: A Case Study of Barclays Bank of Kenya

A Research Project Report Submitted to Chandaria School of Business in Partial Fulfilment of the ... more A Research Project Report Submitted to Chandaria School of Business in Partial Fulfilment of the Requirements for the Degree of Masters of Business Administration (MBA)

Research paper thumbnail of Evaluation of the effect of a mentoring and extra support programme on the achievement of English as an additional language (EAL) pupils at GCSE

Research paper thumbnail of A randomised trial to assess the educational benefit of a smartphone otoscope in undergraduate medical training

European Archives of Oto-Rhino-Laryngology, 2020

Purpose Competent otoscopy is a key otolaryngology skill for a broad range of medical careers, ye... more Purpose Competent otoscopy is a key otolaryngology skill for a broad range of medical careers, yet undergraduate's confidence to perform otoscopy is reported as low. Smartphone otoscopes have been suggested to improve undergraduates learning of normal eardrum anatomy because unlike the traditional otoscope, the learner and educator share the same image. This study aimed to evaluate whether a smartphone otoscope could enhance medical undergraduates recognition of common ear pathology. Methods 52 medical students were randomised into a standard group that used a traditional otoscope and an intervention group that used a smartphone otoscope. Both groups received a short didactic presentation on the recognition of common ear pathologies and were asked to diagnose four simulated pathologies. Both groups received feedback and guidance on how to better visualise the tympanic membrane. Force response items and 5-point Likert scales loaded on an electronic platform recorded their diagnosis and their perceptions towards the otoscope. Results The smartphone-group (n = 20) had higher overall rates of correct diagnosis compared to control (n = 22) (84% vs. 39%, p = < 0.001). Only the grommet station did not show a significant improvement between the two groups (100% vs. 91%, p = 0.49). 90% (n = 20) of participants felt the smartphone otoscope was preferential for their learning. The same number expressed that they want to use it in future learning. The remainder were indifferent. Conclusions The smartphone otoscope enabled learners to better observe and recognise middle ear pathology. This popular learning tool has the potential to accelerate the learning curve of otoscopy and therefore improve the proficiency of future doctors at recognising middle ear diseases.

Research paper thumbnail of Multi-Level Security for ATM Transaction

Ijca Proceedings on International Conference on Advanced Computing and Communication Techniques For High Performance Applications, Sep 2, 2015

Automated Teller Machines (ATM) have become a part of prestige of the banks all over the world. A... more Automated Teller Machines (ATM) have become a part of prestige of the banks all over the world. As the banks compete by opening more and more ATM's every year, research is going on of several aspects of ATM especially security. In real time ATM, user is authenticated only by a four digit Personal Identification Number (PIN) which can be compromised easily. Since this single level is vulnerable to attack, this paper proposes multiple security levels that can minimize the first financial risk to customers. The multiple security levels comprises of an extra user authentication and location aware transaction verification mechanisms Since possessing a smartphone has become a trend in current scenario, to use this functionality user is assumed to have a smartphone with good GPS functionality. Unlike prior research, this concept is a cost effective way that can be easily integrated into the current ATM functionality. Moreover, there is a provision for the user to directly block his card in context of misuse rather than dialing or contacting a third party.

Research paper thumbnail of EMG signals detection technique in voluntary muscle movement

2012 6th International Conference on New Trends in Information Science Service Science and Data Mining, Oct 1, 2012

The signals can be analyzed to detect medical abnormalities, activation level, and recruitment or... more The signals can be analyzed to detect medical abnormalities, activation level, and recruitment order or to analyze the biomechanics of human or animal movement. Electromyography signal carries valuable information regarding the nerve system. So the aim of this paper is to give brief information about EMG signal detection techniques in voluntary muscle movement of human being. In this paper, various methodologies are applied to analyze different techniques for EMG signal detection, decomposition, process and classification. Also this study clearly points up the various types of EMG signal analysis techniques so that the right methods can be applied during any clinical diagnosis, biomedical research, hardware implementations and end user applications.

Research paper thumbnail of Re-engineering of ICT engineering education

2012 IEEE International Conference on Engineering Education: Innovative Practices and Future Trends (AICERA), 2012

From the unique `Gurukula' style of teaching prevailed during the Vedic period, education as ... more From the unique `Gurukula' style of teaching prevailed during the Vedic period, education as on date has evolved to the most modern concept of e-learning. The method of imparting knowledge through coexistence of teacher and students in ancient times has been transformed to such an extent where the direct physical interaction between students and teacher is not at all required. However, it is a fact that we are still accustomed to the traditional way of classroom teaching, memory checking tests, compulsory attendance etc. even in our post graduate level of technical education. Teaching pattern followed in high school level is followed in the same intensity even at engineering colleges. It is well known that science and mathematics are important tools of engineering programme but they are not themselves sufficient for one's success as an engineer. As world's dependence on technology is increasing tremendously, the need of the hour is to mould engineering graduates with adequate skills and will power required to explore and exploit the new opportunities of the world and thereby to contribute successfully towards the social and economic prosperity of our country. This paper makes a humble attempt to uncover the limitations of current engineering education and also tries to put forward some proactive measures to attain the desired results.

Research paper thumbnail of An overview of cryptographic solutions to web security

2010 IEEE International Conference on Computational Intelligence and Computing Research, 2010

Page 1. Abstract - The Internet is huge and largely unregulated place. There are a lot of dangers... more Page 1. Abstract - The Internet is huge and largely unregulated place. There are a lot of dangers in putting up a web page on Internet. These vary from invasions of privacy to hackers cracking our system. One of the most important ...

Research paper thumbnail of RC5 encryption using key derived from fingerprint image

2010 IEEE International Conference on Computational Intelligence and Computing Research, 2010

Page 1. Abstract - This paper presents a method for encrypting user's data using RC5 algorit... more Page 1. Abstract - This paper presents a method for encrypting user's data using RC5 algorithm with a secret key, which is embedded in a biometric fingerprint image using LSB based image steganography techniques and stored in the database. ...

Research paper thumbnail of Anatomy of the infratemporal crest: Implications for cross-facial nerve grafting in temporal myoplasty

Journal of Plastic, Reconstructive & Aesthetic Surgery, 2012

Temporalis transfers for reanimation in facial palsy have been criticised for the lack of neural ... more Temporalis transfers for reanimation in facial palsy have been criticised for the lack of neural input from a functioning facial nerve. Cross-facial nerve grafting to the deep temporal nerves may provide a solution. An anatomical study was performed to further elucidate the deep temporal nerves (DTN) and arteries, examining anatomical variation and infratemporal distribution. Seventeen temporalis muscles were dissected from 13 cadavers as part of a BSc project. The number, branching pattern, length and diameter of DTN were recorded. Arteries supplying the deep surface of temporalis and their relation to DTN were noted. Six specimens were processed using Sihler&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;s staining technique. Arteries were injected with Iodixanol X-ray contrast medium and radiographs taken. All specimens displayed a single DTN originating from the anterior branch of V(3). A mean of 3 branches was observed. The nerve length was 14.22±3.95 mm. The point of entry of DTN into temporalis showed great consistency. Upon exiting the infratemporal fossa, the posterior deep temporal artery was deep and posterior to DTN in 65% of specimens. The branching pattern of DTN can be classified into three types. The deep arterial supply to temporalis was constant in all specimens. This study provides an anatomical basis for the planning and execution of cross-facial nerve grafting to temporalis, and for protection of vital structures. Furthermore, it helps to clarify inconsistencies in the literature regarding nomenclature of the nerve branching pattern of the deep temporal nerves.

Research paper thumbnail of An Improved Encryption Scheme with Fingerprint Image using Hashing Technique and Linear Congruential Method

Abstract — This paper proposes an encryption method which can be used for multipurpose applicatio... more Abstract — This paper proposes an encryption method which can be used for multipurpose applications such as ATM, online transactions and other security measures. The method consists of four phases. The first phase consists of obtaining the fingerprint image and constructing an initial code block for that. The second phase is hashing the initial code block and generating a secure code block. Linear congruential method is applied to this code to generate a substitution array in the third phase. The encryption is done in the last phase where cipher text is obtained based on the substitution array and plain text.

Research paper thumbnail of A Novel Method for Recognition of Carotid Artery in Carotid Ultrasound Images

The aim of this paper is to develop a multiresolution recognition system for high-performance int... more The aim of this paper is to develop a multiresolution recognition system for high-performance intima-media thickness(IMT) measurement in longitudinal ultrasound carotid imaging. Atherosclerosis is the thickening and narrowing of the arteries due to formation of plaque on the walls of the artery. Intima-media thickness (IMT) is an early indicator of atherosclerosis. Recognition of carotid artery is the primary step to the measurement technique. It comprises edge estimation for the far adventitia (AD F) borders along the carotid artery(CA). The longitudinal ultrasound image of the carotid artery consists of a near and a far wall of the carotid artery and are displayed as two bright white lines. The outer layer of far wall is the far adventitia. AD F border is estimated using the derivative of Gaussian kernel. The estimated border is traced by a heuristic approach.

Research paper thumbnail of Impact of Online Banking on Financial Performance of Commercial Banks: A Case Study of Barclays Bank of Kenya

The purpose of this study was to investigate the impact of online banking on the financial perfor... more The purpose of this study was to investigate the impact of online banking on the financial performance of commercial banks in Kenya. The study specifically focused on Barclays Bank of Kenya. To what extent does accessibility of Online Banking impact financial performance of Commercial banks in Kenya? To what extent does Online Banking Risk vii DEDICATION Special thanks to my family for their constant support. May Allah bless you abundantly. viii

Research paper thumbnail of Multi-Level Security for ATM Transaction

International Conference on Advanced Computing, Sep 2, 2015

Automated Teller Machines (ATM) have become a part of prestige of the banks all over the world. A... more Automated Teller Machines (ATM) have become a part of prestige of the banks all over the world. As the banks compete by opening more and more ATM's every year, research is going on of several aspects of ATM especially security. In real time ATM, user is authenticated only by a four digit Personal Identification Number (PIN) which can be compromised easily. Since this single level is vulnerable to attack, this paper proposes multiple security levels that can minimize the first financial risk to customers. The multiple security levels comprises of an extra user authentication and location aware transaction verification mechanisms Since possessing a smartphone has become a trend in current scenario, to use this functionality user is assumed to have a smartphone with good GPS functionality. Unlike prior research, this concept is a cost effective way that can be easily integrated into the current ATM functionality. Moreover, there is a provision for the user to directly block his card in context of misuse rather than dialing or contacting a third party.

Research paper thumbnail of A randomised trial to assess the educational benefit of a smartphone otoscope in undergraduate medical training

European Archives of Oto-rhino-laryngology, Sep 22, 2020

Purpose Competent otoscopy is a key otolaryngology skill for a broad range of medical careers, ye... more Purpose Competent otoscopy is a key otolaryngology skill for a broad range of medical careers, yet undergraduate's confidence to perform otoscopy is reported as low. Smartphone otoscopes have been suggested to improve undergraduates learning of normal eardrum anatomy because unlike the traditional otoscope, the learner and educator share the same image. This study aimed to evaluate whether a smartphone otoscope could enhance medical undergraduates recognition of common ear pathology. Methods 52 medical students were randomised into a standard group that used a traditional otoscope and an intervention group that used a smartphone otoscope. Both groups received a short didactic presentation on the recognition of common ear pathologies and were asked to diagnose four simulated pathologies. Both groups received feedback and guidance on how to better visualise the tympanic membrane. Force response items and 5-point Likert scales loaded on an electronic platform recorded their diagnosis and their perceptions towards the otoscope. Results The smartphone-group (n = 20) had higher overall rates of correct diagnosis compared to control (n = 22) (84% vs. 39%, p = < 0.001). Only the grommet station did not show a significant improvement between the two groups (100% vs. 91%, p = 0.49). 90% (n = 20) of participants felt the smartphone otoscope was preferential for their learning. The same number expressed that they want to use it in future learning. The remainder were indifferent. Conclusions The smartphone otoscope enabled learners to better observe and recognise middle ear pathology. This popular learning tool has the potential to accelerate the learning curve of otoscopy and therefore improve the proficiency of future doctors at recognising middle ear diseases.

Research paper thumbnail of Hudsjukdomen psoriasis påverkan på det dagliga livet : -Utifrån patientens upplevelser

Bakgrund: Psoriasis ar en kronisk hudsjukdom med omkring 300 000personer i Sverige. Psoriasis for... more Bakgrund: Psoriasis ar en kronisk hudsjukdom med omkring 300 000personer i Sverige. Psoriasis forekommer i olika former och plaque psoriasis arden vanligaste formen. Manga ganger kan psoriasis leda ...

Research paper thumbnail of RC5 encryption using key derived from fingerprint image

Page 1. Abstract - This paper presents a method for encrypting user's data using RC5 algorit... more Page 1. Abstract - This paper presents a method for encrypting user's data using RC5 algorithm with a secret key, which is embedded in a biometric fingerprint image using LSB based image steganography techniques and stored in the database. ...

Research paper thumbnail of Anatomy of the infratemporal crest: Implications for cross-facial nerve grafting in temporal myoplasty

Journal of Plastic Reconstructive and Aesthetic Surgery, Mar 1, 2012

Temporalis transfers for reanimation in facial palsy have been criticised for the lack of neural ... more Temporalis transfers for reanimation in facial palsy have been criticised for the lack of neural input from a functioning facial nerve. Cross-facial nerve grafting to the deep temporal nerves may provide a solution. An anatomical study was performed to further elucidate the deep temporal nerves (DTN) and arteries, examining anatomical variation and infratemporal distribution. Seventeen temporalis muscles were dissected from 13 cadavers as part of a BSc project. The number, branching pattern, length and diameter of DTN were recorded. Arteries supplying the deep surface of temporalis and their relation to DTN were noted. Six specimens were processed using Sihler&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;s staining technique. Arteries were injected with Iodixanol X-ray contrast medium and radiographs taken. All specimens displayed a single DTN originating from the anterior branch of V(3). A mean of 3 branches was observed. The nerve length was 14.22±3.95 mm. The point of entry of DTN into temporalis showed great consistency. Upon exiting the infratemporal fossa, the posterior deep temporal artery was deep and posterior to DTN in 65% of specimens. The branching pattern of DTN can be classified into three types. The deep arterial supply to temporalis was constant in all specimens. This study provides an anatomical basis for the planning and execution of cross-facial nerve grafting to temporalis, and for protection of vital structures. Furthermore, it helps to clarify inconsistencies in the literature regarding nomenclature of the nerve branching pattern of the deep temporal nerves.

Research paper thumbnail of An overview of cryptographic solutions to web security

Page 1. Abstract - The Internet is huge and largely unregulated place. There are a lot of dangers... more Page 1. Abstract - The Internet is huge and largely unregulated place. There are a lot of dangers in putting up a web page on Internet. These vary from invasions of privacy to hackers cracking our system. One of the most important ...

Research paper thumbnail of Re-engineering of ICT engineering education

From the unique `Gurukula' style of teaching prevailed during the Vedic period, education as ... more From the unique `Gurukula' style of teaching prevailed during the Vedic period, education as on date has evolved to the most modern concept of e-learning. The method of imparting knowledge through coexistence of teacher and students in ancient times has been transformed to such an extent where the direct physical interaction between students and teacher is not at all required. However, it is a fact that we are still accustomed to the traditional way of classroom teaching, memory checking tests, compulsory attendance etc. even in our post graduate level of technical education. Teaching pattern followed in high school level is followed in the same intensity even at engineering colleges. It is well known that science and mathematics are important tools of engineering programme but they are not themselves sufficient for one's success as an engineer. As world's dependence on technology is increasing tremendously, the need of the hour is to mould engineering graduates with adequate skills and will power required to explore and exploit the new opportunities of the world and thereby to contribute successfully towards the social and economic prosperity of our country. This paper makes a humble attempt to uncover the limitations of current engineering education and also tries to put forward some proactive measures to attain the desired results.

Research paper thumbnail of Deep Learning Networks for Short Term Load Forecasting

2023 International Conference on Control, Communication and Computing (ICCC)

Research paper thumbnail of Impact of Online Banking on Financial Performance of Commercial Banks: A Case Study of Barclays Bank of Kenya

A Research Project Report Submitted to Chandaria School of Business in Partial Fulfilment of the ... more A Research Project Report Submitted to Chandaria School of Business in Partial Fulfilment of the Requirements for the Degree of Masters of Business Administration (MBA)

Research paper thumbnail of Evaluation of the effect of a mentoring and extra support programme on the achievement of English as an additional language (EAL) pupils at GCSE

Research paper thumbnail of A randomised trial to assess the educational benefit of a smartphone otoscope in undergraduate medical training

European Archives of Oto-Rhino-Laryngology, 2020

Purpose Competent otoscopy is a key otolaryngology skill for a broad range of medical careers, ye... more Purpose Competent otoscopy is a key otolaryngology skill for a broad range of medical careers, yet undergraduate's confidence to perform otoscopy is reported as low. Smartphone otoscopes have been suggested to improve undergraduates learning of normal eardrum anatomy because unlike the traditional otoscope, the learner and educator share the same image. This study aimed to evaluate whether a smartphone otoscope could enhance medical undergraduates recognition of common ear pathology. Methods 52 medical students were randomised into a standard group that used a traditional otoscope and an intervention group that used a smartphone otoscope. Both groups received a short didactic presentation on the recognition of common ear pathologies and were asked to diagnose four simulated pathologies. Both groups received feedback and guidance on how to better visualise the tympanic membrane. Force response items and 5-point Likert scales loaded on an electronic platform recorded their diagnosis and their perceptions towards the otoscope. Results The smartphone-group (n = 20) had higher overall rates of correct diagnosis compared to control (n = 22) (84% vs. 39%, p = < 0.001). Only the grommet station did not show a significant improvement between the two groups (100% vs. 91%, p = 0.49). 90% (n = 20) of participants felt the smartphone otoscope was preferential for their learning. The same number expressed that they want to use it in future learning. The remainder were indifferent. Conclusions The smartphone otoscope enabled learners to better observe and recognise middle ear pathology. This popular learning tool has the potential to accelerate the learning curve of otoscopy and therefore improve the proficiency of future doctors at recognising middle ear diseases.

Research paper thumbnail of Multi-Level Security for ATM Transaction

Ijca Proceedings on International Conference on Advanced Computing and Communication Techniques For High Performance Applications, Sep 2, 2015

Automated Teller Machines (ATM) have become a part of prestige of the banks all over the world. A... more Automated Teller Machines (ATM) have become a part of prestige of the banks all over the world. As the banks compete by opening more and more ATM's every year, research is going on of several aspects of ATM especially security. In real time ATM, user is authenticated only by a four digit Personal Identification Number (PIN) which can be compromised easily. Since this single level is vulnerable to attack, this paper proposes multiple security levels that can minimize the first financial risk to customers. The multiple security levels comprises of an extra user authentication and location aware transaction verification mechanisms Since possessing a smartphone has become a trend in current scenario, to use this functionality user is assumed to have a smartphone with good GPS functionality. Unlike prior research, this concept is a cost effective way that can be easily integrated into the current ATM functionality. Moreover, there is a provision for the user to directly block his card in context of misuse rather than dialing or contacting a third party.

Research paper thumbnail of EMG signals detection technique in voluntary muscle movement

2012 6th International Conference on New Trends in Information Science Service Science and Data Mining, Oct 1, 2012

The signals can be analyzed to detect medical abnormalities, activation level, and recruitment or... more The signals can be analyzed to detect medical abnormalities, activation level, and recruitment order or to analyze the biomechanics of human or animal movement. Electromyography signal carries valuable information regarding the nerve system. So the aim of this paper is to give brief information about EMG signal detection techniques in voluntary muscle movement of human being. In this paper, various methodologies are applied to analyze different techniques for EMG signal detection, decomposition, process and classification. Also this study clearly points up the various types of EMG signal analysis techniques so that the right methods can be applied during any clinical diagnosis, biomedical research, hardware implementations and end user applications.

Research paper thumbnail of Re-engineering of ICT engineering education

2012 IEEE International Conference on Engineering Education: Innovative Practices and Future Trends (AICERA), 2012

From the unique `Gurukula' style of teaching prevailed during the Vedic period, education as ... more From the unique `Gurukula' style of teaching prevailed during the Vedic period, education as on date has evolved to the most modern concept of e-learning. The method of imparting knowledge through coexistence of teacher and students in ancient times has been transformed to such an extent where the direct physical interaction between students and teacher is not at all required. However, it is a fact that we are still accustomed to the traditional way of classroom teaching, memory checking tests, compulsory attendance etc. even in our post graduate level of technical education. Teaching pattern followed in high school level is followed in the same intensity even at engineering colleges. It is well known that science and mathematics are important tools of engineering programme but they are not themselves sufficient for one's success as an engineer. As world's dependence on technology is increasing tremendously, the need of the hour is to mould engineering graduates with adequate skills and will power required to explore and exploit the new opportunities of the world and thereby to contribute successfully towards the social and economic prosperity of our country. This paper makes a humble attempt to uncover the limitations of current engineering education and also tries to put forward some proactive measures to attain the desired results.

Research paper thumbnail of An overview of cryptographic solutions to web security

2010 IEEE International Conference on Computational Intelligence and Computing Research, 2010

Page 1. Abstract - The Internet is huge and largely unregulated place. There are a lot of dangers... more Page 1. Abstract - The Internet is huge and largely unregulated place. There are a lot of dangers in putting up a web page on Internet. These vary from invasions of privacy to hackers cracking our system. One of the most important ...

Research paper thumbnail of RC5 encryption using key derived from fingerprint image

2010 IEEE International Conference on Computational Intelligence and Computing Research, 2010

Page 1. Abstract - This paper presents a method for encrypting user's data using RC5 algorit... more Page 1. Abstract - This paper presents a method for encrypting user's data using RC5 algorithm with a secret key, which is embedded in a biometric fingerprint image using LSB based image steganography techniques and stored in the database. ...

Research paper thumbnail of Anatomy of the infratemporal crest: Implications for cross-facial nerve grafting in temporal myoplasty

Journal of Plastic, Reconstructive & Aesthetic Surgery, 2012

Temporalis transfers for reanimation in facial palsy have been criticised for the lack of neural ... more Temporalis transfers for reanimation in facial palsy have been criticised for the lack of neural input from a functioning facial nerve. Cross-facial nerve grafting to the deep temporal nerves may provide a solution. An anatomical study was performed to further elucidate the deep temporal nerves (DTN) and arteries, examining anatomical variation and infratemporal distribution. Seventeen temporalis muscles were dissected from 13 cadavers as part of a BSc project. The number, branching pattern, length and diameter of DTN were recorded. Arteries supplying the deep surface of temporalis and their relation to DTN were noted. Six specimens were processed using Sihler&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;s staining technique. Arteries were injected with Iodixanol X-ray contrast medium and radiographs taken. All specimens displayed a single DTN originating from the anterior branch of V(3). A mean of 3 branches was observed. The nerve length was 14.22±3.95 mm. The point of entry of DTN into temporalis showed great consistency. Upon exiting the infratemporal fossa, the posterior deep temporal artery was deep and posterior to DTN in 65% of specimens. The branching pattern of DTN can be classified into three types. The deep arterial supply to temporalis was constant in all specimens. This study provides an anatomical basis for the planning and execution of cross-facial nerve grafting to temporalis, and for protection of vital structures. Furthermore, it helps to clarify inconsistencies in the literature regarding nomenclature of the nerve branching pattern of the deep temporal nerves.

Research paper thumbnail of An Improved Encryption Scheme with Fingerprint Image using Hashing Technique and Linear Congruential Method

Abstract — This paper proposes an encryption method which can be used for multipurpose applicatio... more Abstract — This paper proposes an encryption method which can be used for multipurpose applications such as ATM, online transactions and other security measures. The method consists of four phases. The first phase consists of obtaining the fingerprint image and constructing an initial code block for that. The second phase is hashing the initial code block and generating a secure code block. Linear congruential method is applied to this code to generate a substitution array in the third phase. The encryption is done in the last phase where cipher text is obtained based on the substitution array and plain text.

Research paper thumbnail of A Novel Method for Recognition of Carotid Artery in Carotid Ultrasound Images

The aim of this paper is to develop a multiresolution recognition system for high-performance int... more The aim of this paper is to develop a multiresolution recognition system for high-performance intima-media thickness(IMT) measurement in longitudinal ultrasound carotid imaging. Atherosclerosis is the thickening and narrowing of the arteries due to formation of plaque on the walls of the artery. Intima-media thickness (IMT) is an early indicator of atherosclerosis. Recognition of carotid artery is the primary step to the measurement technique. It comprises edge estimation for the far adventitia (AD F) borders along the carotid artery(CA). The longitudinal ultrasound image of the carotid artery consists of a near and a far wall of the carotid artery and are displayed as two bright white lines. The outer layer of far wall is the far adventitia. AD F border is estimated using the derivative of Gaussian kernel. The estimated border is traced by a heuristic approach.