CSE

Welcome To Computer Science & Engineering. This Site Contains Complete Information of Computer Engineering, Computer Science & Engineering, Computer Information System, Software Engineering, Computer Science Course Schedule, Course Tutorial, Suggestions, University Tuition Fees, Study Guideline & More.

Aiub tuition fee

American International University of Bangladesh (AIUB) CSE Tuition Fees and Credit :

Aiub tuition fees cse (Americal International University cse tuition fees) : AIUB is one of the good university in Bangladesh. After North South University AIUB is the top lebel university in Dhaka. AIUB has 148 credit of Computer Science and Engineering (CSE) departments.
Admission fees of CSE is 20000 BDT. Per credit price is BDT 5000 and Total cost if CSE course is 851000 BDT  If someone choose Computer Information System (CIS) then the amount of course fee may increase or decrease. 

American International University of Bangladesh (AIUB) CSE Tuition Fees and Credit 
At a Glance :


University Name : American International University of Bangladesh (AIUB) 

Department : Computer Science and Engineering
Total Credit : 148 Credits
Duration :  4 Year 
Admission Fees : 20000 BDT 
Per Credit : 5000 BDT 
Total Fees :  851000 BDT

The Science Wars: a way out

When the May 1996 issue of the journal Social Text appeared, an issue devoted to the understanding of ‘‘Science Wars,’’ the editors became targets in these ‘‘wars’’ in ways they had not imagined. The issue included a bogus article by New York University mathematical physicist Alan Skoal, who feigned an earnest resection on the political and philosophical implications of recent physics research for cultural studies. Asoka re-leaved the hoax himself, and it immediately became a hotly debated issue in academic and popular media around the world. The appearance of the article was not only taken as a sign of shoddy scholarship by the Social Text editors but as an expose´ of cultural studies and social science in general. For instance, Nobel prize-winning physicist Steven Weinberg used the hoax to identify what he calls a fundamental ‘‘opposition’’ between natural and social scientists, especially regarding what Weinberg sees as dangerous anti-rationalism and relativism in social science and cultural studies. 

Those on the other side of the ‘‘wars’’ countered by criticizing Skoal and calling Weinberg and like-minded natural scientists ‘‘per-Kantian shaman[s]’’ repeating the ‘‘mantras of particle physicists,’’with their ‘‘reductionist view of science’’ .The year before Skoal's hoax, the ‘‘wars’’ had raged over the scientist status of a high-prole US National Opinion Research Center study,
which had been launched as a ‘‘deWnitive survey’’ of sexual practices in the United States
.Here, too, doubts were raised not only about the status of scholarship of the study in question, but of sociology and social science as such. The study had received the doubtful honor of becoming
the topic of an editorial in The Economist under the heading ‘‘74.6% of Sociology is Bunk.’’6 In The New York Review of Books, Harvard biologist and statistician R. C. Continent criticized the researchers behind the

What is Computer Science

The study of information, protocols and algorithms for idealized and real automate. I automaton: “self moving” – in our context, self “deciding” or autonomous mechanism with bounded resources (time and space) I information: knowledge represented in a form suitable for transmission, manipulation, etc. I protocol: rules for exchanging information without problems I algorithm: an unambiguous, finite description in simple steps or actions Computer Science is not the study of computers, nor is it the practice of their use. The study of information, protocols and algorithms for idealized and real automate. 

I automaton: “self moving” – in our context, self “deciding” or autonomous mechanism with bounded resources (time and space) I information: knowledge represented in a form suitable for transmission, manipulation, etc. I protocol: rules for exchanging information without problems I algorithm: an unambiguous, finite description in simple steps or actions Computer Science is not the study of computers, nor is it the practice of their use. The study of information, protocols and algorithms for idealized and real automate. I automaton: “self moving” – in our context, self “deciding” or autonomous mechanism with bounded resources (time and space) I information: knowledge represented in a form suitable for transmission, manipulation, etc. I protocol: rules for exchanging information without problems I algorithm: an unambiguous, finite description in simple steps or actions Computer Science is not the study of computers, nor is it the practice of their use. The study of information, protocols and algorithms for idealized and real automate. I automaton: “self moving” – in our context, self “deciding” or autonomous mechanism with bounded resources (time and space) 

Information: knowledge represented in a form suitable for transmission, manipulation, etc. I protocol: rules for exchanging information without problems I algorithm: an unambiguous, finite description in simple steps or actions Computer Science is not the study of computers, nor is it the practice of their use. The study of information, protocols and algorithms for idealized and real automate. I automaton: “self moving” – in our context, self “deciding” or autonomous mechanism with bounded resources (time and space) I information: knowledge represented in a form suitable for transmission, manipulation, etc. I protocol: rules for exchanging information without problems I algorithm: an unambiguous, finite description in simple steps or actions Computer Science is not the study of computers, nor is it the practice of their use. The study of information, protocols and algorithms for idealized and real automate. I automaton: “self moving” – in our context, self “deciding” or autonomous mechanism with bounded resources (time and space) I information: knowledge represented in a form suitable for transmission, manipulation, etc.

Algorithms and Data Structures

We agree with decades of common wisdom that familiarity with common algorithms and data structures is one of the most empowering aspects of a computer science education
. This is also a great place to train one’s general problem-solving abilities, which will pay off in every other area of study
.There are hundreds of books available, but our favorite is The Algorithm Design Manual by Steven Skiena
. He clearly loves this stuff and can’t wait to help you understand it
. This is a refreshing change, in our opinion, from the more commonly recommended Cormen, Leiserson, Rivest & Stein, or Sedgewick books
. These last two texts tend to be too proof-heavy for those learning the material primarily to help them solve problems
.For those who prefer video lectures, Skiena generously provides his online
. We also really like Tim Roughgarden’s course, available from Stanford’s MOOC platform Lagunita, or on Coursera
. Whether you prefer Skiena’s or Roughgarden’s lecture style will be a matter of personal preference
.For practice, our preferred approach is for students to solve problems on Leetcode
. These tend to be interesting problems with decent accompanying solutions and discussions
. They also help you test progress against questions that are commonly used in technical interviews at the more competitive software companies
. We suggest solving around 100 random leetcode problems as part of your studies.



Finally, we strongly recommend How to Solve It as an excellent and unique guide to general problem solving; it’s as applicable to computer science as it is to mathematics.

Computer Architecture

Computer Architecture—sometimes called “computer systems” or “computer organization”—is an important first look at computing below the surface of software. In our experience, it’s the most neglected area among self-taught software engineers. The Elements of Computing Systems, also known as “Nand2Tetris” is an ambitious book attempting to give you a cohesive understanding of how everything in a computer works. Each chapter involves building a small piece of the overall system, from writing elementary logic gates in HDL, through a CPU and assembler, all the way to an application the size of a Tetris game. We recommend reading through the first six chapters of the book and completing the associated projects. 

This will develop your understanding of the relationship between the architecture of the machine and the software that runs on it. The first half of the book (and all of its projects), are available for free from the Nand2Tetris website. It’s also available as a Coursera course with accompanying videos.In seeking simplicity and cohesiveness, Nand2Tetris trades off depth. In particular, two very important concepts in modern computer architectures are pipelining and memory hierarchy, but both are mostly absent from the text. Once you feel comfortable with the content of Nand2Tetris, our next suggestion is Patterson and Hennessy’s Computer Organization and Design, an excellent and now classic text. Not every section in the book is essential; we suggest following Berkeley’s CS61C course “Great Ideas in Computer Architecture” for specific readings. The lecture notes and labs are available online, and past lectures are on the Internet Archive.

Subject guides Programming

Most undergraduate CS programs start with an “introduction” to computer programming. The best versions of these courses cater not just to novices, but also to those who missed beneficial concepts and programming models while first learning to code.

Our standard recommendation for this content is the classic Structure and Interpretation of Computer Programs, which is available online for free both as a book, and as a set of MIT video lectures. While those lectures are great, our video suggestion is actually Brian Harvey’s SICP lectures (for the 61A course at Berkeley) instead. These are more refined and better targeted at new students than are the MIT lectures

We recommend working through at least the first three chapters of SICP and doing the exercises

For additional practice, work through a set of small programming problems like those on exercise.

For those who find SICP too challenging, we recommend How to Design Programs

For those who find it too easy, we recommend Concepts, Techniques, and Models of Computer Programming.

Why learn computer science

Type 1 engineers find ways to learn computer science in depth, whether through conventional means or by relentlessly learning throughout their careers.  Type 2 engineers typically stay at the surface, learning specific tools and technologies rather than their underlying foundations, only picking up new skills when the winds of technical fashion change. Currently, the number of people entering the industry is rapidly increasing, while the number of CS grads is essentially static. 

This oversupply of Type 2 engineers is starting to reduce their employment opportunities and keep them out of the industry’s more fulfilling work. Whether you’re striving to become a Type 1 engineer or simply looking for more job security, learning computer science is the only reliable path.

Why learn computer science.


There are 2 types of software engineer: those who understand computer science well enough to do challenging, innovative work, and those who just get by because they’re familiar with a few high level tools
.
Both call themselves software engineers, and both tend to earn similar salaries in their early careers
. But Type 1 engineers grow in to more fulfilling and well-remunerated work over time, whether that’s valuable commercial work or breakthrough open-source projects, technical leadership or high-quality individual contributions
.
Type 1 engineers find ways to learn computer science in depth, whether through conventional means or by relentlessly learning throughout their careers
. Type 2 engineers typically stay at the surface, learning specific tools and technologies rather than their underlying foundations, only picking up new skills when the winds of technical fashion change
.
Currently, the number of people entering the industry is rapidly increasing, while the number of CS grads is essentially static
. This oversupply of Type 2 engineers is starting to reduce their employment opportunities and keep them out of the industry’s more fulfilling work
. Whether you’re striving to become a Type 1 engineer or simply looking for more job security, learning computer science is the only reliable path.

Data Communication Fundamentals

In this module we shall discuss various aspects of data link control has been considered
. Lesson  deals with framing and synchronization along with how one can interface the machine to the media
. Error detection and error correction techniques are presented in Lesson 
. Lesson  introduces various protocols used for flow control and error control
. Finally, lesson  provides an overview of HDD, the most popular data link control protocol
. Module Switched Communication Networks In this module switched communication networks has been considered
. First, various switching techniques have been presented in Lesson . In this lesson various aspects of circuit switching and the operation of Public Switched Telephone Network (PST), which is based on circuit switching, have been discussed
. Various aspects of message switching, packet switching and virtual circuit switching have been addressed in Lesson Lesson  presents the Synchronous Optical Network (TONES) that defines a technology for carrying many signals of different capacities through a synchronous, flexible, optical hierarchy
. It utilizes the enormous bandwidth of optical fiber to achieve date transfer at a very high rate
. X.25 is a packet-switched network developed by ITS-T in 1976
. It defines how a packet-mode terminal can be interfaced to a packet network for data communication
. However, X.25 does not satisfy the present day requirements of higher data rate
. To overcome these limitations, a new standard, known as frame relay was introduced
. Lesson introduces these two packet switching networks
. In the last section of this module, ATM (Asynchronous transfer mode), which can be used both as a LAN or WAN standard has been introduced
. Various network devices used in ATM, concept of cell transfer and cell format have been discussed. 

Data Communication Fundamentals

Lesson  deals with various multiplexing techniques such as Frequency division multiplexing (FEM), time division multiplexing (TAM), Statistical TAM, Wave Division multiplexing (WPM) and Orthogonal Frequency Division Multiplexing (OFFEND)
. So, this module provides necessary background to the students for understanding the topics to be covered in the subsequent lessons dealing with different aspects of computer networks.

Data Communication Fundamentals

Module  Data Communication Fundamentals This module is concerned with some of the important issues of the physical layer, which provides services to the layer above it, namely the data link layer
. In the data link layer, the data consists of es and 1st, which are organized into frames to be sent through some transmission media
. It is necessary to convert this data into another entity called signal
. After introducing the fundamental model of communication, Lesson introduces the basic elements of communication such as data, signal and channel characteristics
. Different data types, concept of time domain and frequency domain representation of signal, various channel characteristics such as bandwidth, bit interval and bit rate of a digital signal are considered in this section
. Lesson  introduces different transmission media, which are broadly divided into two categories, namely guided and unguided media
. Typical characteristics and uses of each type of media starting from twisted-pair cables, coaxial cable, and optical fiber to line-of-sight and satellite communication have been covered in this lesson
. Lesson  will introduce various sources of impairments, such as attenuation, distortion and noise, that a signal suffers as it passes through a communication media
. This lesson also will introduce the concept of channel capacity, which specifies the amount of information that can be sent through a medium
. Lesson deals with the transmission of digital signals, which involves encoding of data
. Encoding of digital data involves two types of coding namely line coding and block coding
. Various line coding techniques such as uni polar, polar, and bipolar and block coding techniques are presented in this lesson
. Encoding of analog data involves conversion to digital form by using techniques like pulse code modulation and delta modulation, which are also discussed in this lesson
. Transmission of analog signals is discussed in Lesson 
. It is necessary to perform modulation to convert analog data to analog signal
. Various aspects of the three possible modulation techniques, namely amplitude, phase and frequency have been discussed in this lesson
. Similarly, to convert digital data to analog signal, possible approaches such as amplitude, phase and frequency shift keying have been covered in lesson  

Scientific and Technical Computing

In this module some of the basic aspects of computer networks are presented in two lessons
. In lesson  the historical background of computer networks is presented
. Then different type of networks and their classification on the basis of transmission technology and scale are considered
. In the next section important applications of computer networks, which spans over different areas in a common man life are discussed
. Lesson  presents the important concepts of layering
. The basic terminologies in the context of layered architecture are also covered in this section
. Then this lesson provides an introduction of PSI layered architecture - Open System Interconnection Reference Model
. Basic functionalities of different layers of PSI and concept of service access points and information exchange will also be dealt in this lesson.  

Scientific and Technical Computing

Scientific and Technical Computing – Client Server Model, Distributed Processing Parallel Processing, Communication Media Commercial – Advertisement, Telemarketing, Teleconferencing – Worldwide Financial Services – Network for the People (this is the most widely used application nowadays) – Medicine, Distance Education, Access to Remote Information, Person-to Person Communication, Interactive Entertainment Course Outline Over the years the subject of computer networks has grown with advancement of technology and the emergence of new technologies and new applications
. In this course, this massive subject has been divided into comprehensible parts and arranged in a structured and logical manner
. It is organized in the following eight modules:
• Introduction
 • Data Communication Fundamentals
 • Data Link Control 
• Switched Communication Networks 
• Broadcast Communication Networks
 • Internet working
 • Routing and Congestion Control
 • Network Security

Communication network based on point-to-point communication

Manufacturing: Computer networks are used in many aspects of manufacturing including manufacturing process itself
. Two of them that use network to provide essential services are computer-aided design (CAD) and computer-assisted manufacturing (CAM), both of which allow multiple users to work on a project simultaneously
. Directory services: Directory services allow list of files to be stored in central location to speed worldwide search operations
. Information services: A Network information service includes bulletin boards and data banks
. A World Wide Web site offering technical specification for a new product is an information service
. Electronic data interchange (EDIT): DIE allows business information, including documents such as purchase orders and invoices, to be transferred without using paper
. Electronic mail: probably it's the most widely used computer network application
. Teleconferencing: Teleconferencing allows conference to occur without the participants being in the same place
. Applications include simple text conferencing (where participants communicate through their normal keyboards and monitor) and video conferencing where participants can even see as well as talk to other fellow participants
. Different types of equipment's are used for video conferencing depending on what quality of the motion you want to capture (whether you want just to see the face of other fellow participants or do you want to see the exact facial expression)
. Voice over IP: Computer networks are also used to provide voice communication
. This kind of voice communication is pretty cheap as compared to the normal telephonic conversation
. Video on demand: Future services provided by the cable television networks may include video on request where a person can request for a particular movie or any clip at anytime he wish to see
. Summary: The main area of applications can be broadly classified into following categories:  

Communication network based on point-to-point communication

includes telescoping, which uses order-entry computers or telephones connected to order processing network, and online-reservation services for hotels, airlines and so on. 

Communication network based on point-to-point communication

In a short period of time computer networks have become an indispensable part of business, industry, entertainment as well as a common-man's life
. These applications have changed tremendously from time and the motivation for building these networks are all essentially economic and technological
. Initially, computer network was developed for defense purpose, to have a secure communication network that can even withstand a nuclear attack
. After a decade or so, companies, in various fields, started using computer networks for keeping track of inventories, monitor productivity, communication between their different branch offices located at different locations
. For example, Railways started using computer networks by connecting their nationwide reservation counters to provide the facility of reservation and inquiry from any where across the country
. And now after almost two decades, computer networks have entered a new dimension; they are now an integral part of the society and people
. In 1990,s computer network started delivering services to private individuals at home
. These services and motivation for using them are quite different
. Some of the services are access to remote information, person-person communication, and interactive entertainment
. So, some of the applications of computer networks that we can see around us today are as follows: Marketing and sales: Computer networks are used extensively in both marketing and sales organizations
. Marketing professionals use them to collect, exchange, and analyze data related to customer needs and product development cycles
. Sales application 

Communication network based on point-to-point communication

Internet is a collection of networks or network of networks
. Various networks such as LAN and WAN connected through suitable hardware and software to work in a seamless manner
. Schematic diagram of the Internet is shown in Fig
.  It allows various applications such as e-mail, file transfer, remote log-in, World Wide Web, Multimedia, etc run across the internet
. The basic difference between WAN and Internet is that WAN is owned by a single organization while internet is not so
. But with the time the line between WAN and Internet is shrinking, and these terms are sometimes used interchangeably. 

Communication network based on point-to-point communication

WAN provides long-distance transmission of data, voice, image and information over large geographical areas that may comprise a country, continent or even the whole world
. In contrast to LAN's, Awns may utilize public, leased or private communication devices, usually in combinations, and can therefore span an unlimited number of miles as shown  

Communication network based on point-to-point communication

MAN is designed to extend over the entire city
. It may be a single network as a cable TV network or it may be means of connecting a number of LAN's into a larger network so that resources may be shared as shown in Fig
 For example, a company can use a MAN to connect the LAN's in all its offices in a city 
. MAN is wholly owned and operated by a private company or may be a service provided by a public company
. Figure  Metropolitan Area Networks (MAN) The main reason for distinguishing Mans as a special category is that a standard has been adopted for them. It is DB (Distributed Queue Dual Bus) or IEEE 

Communication network based on point-to-point communication

LAN typically used transmission technology consisting of single cable to which all machines are connected
. Traditional LAN's run at speeds of 10 to 100 Mbps (but now much higher speeds can be achieved)
. The most common LAN typologies are bus, ring and star
. A typical LAN is shown in Fig

Communication network based on point-to-point communication

Figure  Communication network based on point-to-point communication As a general rule (although there are many exceptions), smaller, geographically localized networks tend to use broadcasting, whereas larger networks normally use are point-to point communication
. Classification based on Scale Alternative criteria for classifying networks are their scale
. They are divided into Local Area (LAN), Metropolitan Area Network (MAN) and Wide Area Networks (WAN)
. Local Area Network (LAN) LAN is usually privately owned and links the devices in a single office, building or campus of up to few kilometers in size
. These are used to share resources (may be hardware or software resources) and to exchange information
. LAN's are distinguished from other kinds of networks by three categories: their size, transmission technology and topology
. LAN's are restricted in size, which means that their worst-case transmission time is bounded and known in advance
. Hence this is more reliable as compared to MAN and WAN
. Knowing this bound makes it possible to use certain kinds of design that would not otherwise be possible
. It also simplifies network management.  

Network Technologies

This system generally also allows possibility of addressing the packet to all destinations (all nodes on the network)
. When such a packet is transmitted and received by all the machines on the network
. This mode of operation is known as Broadcast Mode
. Some Broadcast systems also supports transmission to a sub-set of machines, something known as Multi casting
 Point-to-Point Networks A network based on point-to-point communication is shown in Fig
. The end devices that wish to communicate are called stations
. The switching devices are called nodes
. Some Nodes connect to other nodes and some to attached stations
. It uses FEM or TAM for node-to-node communication
. There may exist multiple paths between a source-destination pair for better network reliability
. The switching nodes are not concerned with the contents of data
. Their purpose is to provide a switching facility that will move data from node to node until they reach the destination. 

Network Technologies

 Network Technologies There is no generally accepted taxonomy into which all computer networks fit, but two dimensions stand out as important: Transmission Technology and Scale
. The classifications based on these two basic approaches are considered in this section
.Classification Based on Transmission Technology Computer networks can be broadly categorized into two types based on transmission technologies: • Broadcast networks • Point-to-point networks Broadcast Networks Broadcast network have a single communication channel that is shared by all the machines on the network as shown in Fig sand  All the machines on the network receive short messages, called packets in certain contexts, sent by any machine
. An address field within the packet specifies the intended recipient
. Upon receiving a packet, machine checks the address field
. If packet is intended for itself, it processes the packet; if packet is not intended for itself it is simply ignored. 

Computer Science and Engineering

The bandwidth was clearly a problem, and in the late 1970,s and early,another new communication technique known as Local Area Networks (LAN,s) evolved, which helped computers to communicate at high speed over a small geographical area
. In the later years use of optical fiber and satellite communication allowed high-speed data communications over long distances.  

Historical Background of Computer Science and Engineering

With the advancement of VLASIC technology, and particularly, after the invention of microprocessors in the early 1970,s the computers became smaller in size and less expensive, but with significant increase in processing power
. New breed of low-cost computers known as mini and personal computers were introduced
. Instead of having a single central computer, an organization could now afford to own a number of computers located in different departments and sections
. Side-by-side, riding on the same VLASIC technology the communication technology also advanced leading to the worldwide deployment of telephone network, developed primarily for voice communication
. An organization having computers located geographically dispersed locations wanted to have data communications for diverse applications
. Communication was required among the machines of the same kind for collaboration, for the use of common software or data or for sharing of some costly resources
. This led to the development of computer networks by successful integration and cross-fertilization of communications and geographically dispersed computing facilities
. One significant development was the APPARENT (Advanced Research Projects Agency Network)
. Starting with four-node experimental network in 1969, it has subsequently grown into a network several thousand computers spanning half of the globe, from Hawaii to Sweden
. Most of the present-day concepts such as packet switching evolved from the PLANETARY project
. The low bandwidth (kHz on a voice grade line) telephone network was the only generally available communication system available for this type of network. 

Historical Background

 Historical Background The history of electronic computers is not very old
. It came into existence in the early 1950,s and during the first two decades of its existence it remained as a centralized system housed in a single large room
. In those days the computers were large in size and were operated by trained personnel
. To the users it was a remote and mysterious object having no direct communication with the users
. Jobs were submitted in the form of punched cards or paper tape and outputs were collected in the form of computer printouts
. The submitted jobs were executed by the computer one after the other, which is referred to as batch mode of data processing
. In this scenario, there was long delay between the submission of jobs and receipt of the results
. In the 1960,s computer systems were still centralize, but users provided with direct access through interactive terminals connected by point-to-point low-speed data links with the computer
. In this situation, a large number of users, some of them located in remote locations could simultaneously access the centralized computer in time-division multiplexed mode
. The users could now get immediate interactive feedback from the computer and correct errors immediately
. Following the introduction of on-line terminals and time-sharing operating systems, remote terminals were used to use the central computer. 

Specific Instructional Objective

On Completion of this lesson, the students will be able to: 
• Define Computer Networks
 • State the evolution of Computer Networks
 • Categorize different types of Computer Networks 
• Specify some of the application of Computer Networks Introduction The concept of Network is not new
. In simple terms it means an interconnected set of some objects
. For decades we are familiar with the Radio, Television, railway, Highway, Bank and other types of networks
. In recent years, the network that is making significant impact in our day-to-day life is the Computer network
. By computer network we mean an interconnected set of autonomous computers
. The term autonomous implies that the computers can function independent of others
. However, these computers can exchange information with each other through the communication network system
. Computer networks have emerged as a result of the convergence of two technologies of this century- Computer and Communication as shown in Fig
. The consequence of this revolutionary merger is the emergence of a integrated system that transmit all types of data and information
. There is no fundamental difference between data communications and data processing and there are no fundamental differences among data, voice and video communications
. After a brief historical background in Section , Section 
introduces different network categories
. A brief overview of the applications of computer networks is presented in Section 
. Finally an outline of the entire course is given in

American Journal of Computer Science and Information Technology

Recently, TQWT is one of the decomposition processes widely using in medical sciences as biomedical signal processing and vibration signals like seismic signals pro
. According to [19], by comparing with other discrete-time wavelet transforms, TQWT is very easy and efficient method in terms of tuning the parameters
. TQWT uses very efficient radix-2 FFT’s and filters having non-rational transfer functions like used in Fractional Spline Wavelet Transform (FSWT)
. In this study, TQWT decomposes the EMG signal into several high pass and low pass sub-bands
. In this paper, we are using two-channel filter banks in 7-stages to decompose EMG signal
. Each filter bank contains a low pass and a high pass filter with their respective scaling factors α and β
. The first level filter bank takes EMG signal as input whose sampling frequency is fs which will give two outputs comprises of a low pass and a high pass subband whose sampling frequencies are αfs and βfs respectively
. The low pass sub-band obtained from first stage filter bank will be the input for second level filter bank and it continues further upto 7 stages. 

American Journal of Computer Science and Information Technology

In this paper, tunable-Q factor wavelet transform (TQWT) based features are extracted for the classification of ALS and healthy EMG signals
. TQWT decomposes EMG signal into subbands and features such as mean absolute deviation (MAD), interquartile range (IQR), kurtosis, mode, and entropy are extracted from the sub-bands
. The obtained statistical features are fed as inputs to k-NN and LS-SVM classifiers to classify ALS and healthy EMG signals
. The organization of the remaining paper is as follows: Section
. 2 contain, ALS and healthy EMG signals dataset, the proposed methodology- TQWT, and features extraction will present
. The results and discussions of classifying ALS and healthy EMG signals are in Section 3 and Section 4 conclude the paper
.The dataset comprises of 89 ALS and 133 healthy EMG signals which have been taken from, dataset R002 at http:// www.emglab.net [17]
. It consists of two groups namely ALS and healthy
. The healthy EMG dataset has been taken from 10 people of 21-37 years age, among them, females are 4 and males are 6, they didn’t have any kind of neuromuscular disorders
. ALS dataset has been taken from 8 patients among them 4 are females and 4 are males whose age is between 35-67 years
. Among the 8 patients taken, 5 have died within a few years
. A standard needle electrode has been used for accession
. Audio and Visual feedback has been used for monitoring the signal quality [18]
. The EMG signal has been amplified at a frequency range of 5 Hz-5 kHz filter settings and sampled at a frequency of 10 kHz
. Figure 1 shows the block diagram of proposed method explaining the whole method stepwise. Figure 2 shows the example of each of the ALS and healthy EMG signals.

American Journal of Computer Science and Information Technology

Discrete cosine transform (DCT) is used to extract the features from one of the MUAPs having a dynamic range, and the obtained feature set has been given as input to the k-Nearest Neighbor classifier (k-NN) to classify EMG signals [15]
. The coefficients obtained from autoregressive analysis have been given as input to neuro-fuzzy system for classifying EMG signals [16].
In this paper, tunable-Q factor wavelet transform (TQWT) based features are extracted for the classification of ALS and healthy EMG signals
. TQWT decomposes EMG signal into subbands and features such as mean absolute deviation (MAD), interquartile range (IQR), kurtosis, mode, and entropy are extracted from the sub-bands
. The obtained statistical features are fed as inputs to k-NN and LS-SVM classifiers to classify ALS and healthy EMG signals
. The organization of the remaining paper is as follows: Section
. 2 contain, ALS and healthy EMG signals dataset, the proposed methodology- TQWT, and features extraction will present
. The results and discussions of classifying ALS and healthy EMG signals are in Section 3 and Section 4 conclude the paper.

American Journal of Computer Science and Information Technology

The feature extraction process plays an important role for analysis and classification of EMG signals
. The various time, frequency, and time-frequency domain features have been used for classifying EMG signals
. Time domain features like autocorrelation, square integral, mean absolute value, variance and integrated EMG have been used for classification of ALS and healthy EMG signal [3,4]
. Frequency domain features like total power, peak frequency, median frequency, and mean power have been explored for classification of ALS and healthy EMG signals [5
]. Time-frequency domain features like root mean square (RMS), turns ratio, autoregressive coefficients have been used for classification of EMG signals [6]
. The classification of ALS and healthy EMG signals has also been done through short time Fourier transform (STFT) [7]
.Motor Unit Action Potentials (MUAPs) analysis and feature extraction was used with binary-support vector machine (SVM) classifier for the discrimination of ALS and healthy EMG signals [8]
. Time-domain based features like autoregression (AR), waveform length, and mean absolute value were given as inputs to multilayer perceptron (MLP) and artificial neural network (ANN) classifiers for classifying ALS and healthy EMG signals [9]
. The ensemble empirical mode decomposition (EEMD) decomposes EMG signal into set of intrinsic mode functions (IMFs), where the noisy IMFs separated using fast independent component analysis (ICA) algorithm and time domain features set used as input to linear discriminant analysis classifier for classification of EMG signals [10]
. Mel-frequency cepstral coefficients (MFCCs) based methods were used for the extraction of features from higher order MUAPs of an EMG signal, the obtained feature set have been applied to the knearest neighbour (k-NN) classifier for classifying ALS and healthy EMG signals [11]
. Spectral features like power spectral density, amplitude modulated bandwidth, and frequency modulated bandwidth were extracted by using improved empirical mode decomposition (IEMD) for classifying EMG signals [12]
. A new hybridization of SVM with particle swarm optimisation (PSO) as PSO-SVM used for classifying EMG signals [13]
. Multiscale principal component analysis (MSPCA) and discrete wavelet transform (DWT) have been used to extract the features and de-noising the EMG signal. The obtained features are applied to decision tree algorithms for classifying EMG signals [14].

American Journal of Computer Science and Information Technology

Electromyography is recording and evaluating the electrical activities during contraction and relaxation of striated muscles
. The obtained electrical signal is called as electromyogram (EMG)
. EMG is being used in many fields such as exercise physiology
, human factors, etc., [1]
. In medical sciences, EMG is used for diagnosis of neuromuscular diseases based on the motor unit
. Motor unit is a combination of muscle fibers and motor neurons
. A motor neuron is a nerve cell originated in the spinal cord
. Upper motor neurons are situated at brain which sends signals to lower motor neurons at spinal cord to control the muscular activities
. Muscles present in eyes
, tongue, and the whole face are under the control of lower motor neurons
. The disorder of these motor neurons will create many diseases
, mostly amyotrophic lateral sclerosis (ALS) [1]
. It was first brought into international attention in 1939 because of Lou Gehrig’s speech at Yankee stadium
, and so this disease is also called with his name
. It results in the gradual degeneration and damage of nerve cells in the brain and spinal cord that controls the individual action of striated muscles
. It results in twitching
, cramping of muscles, slurred
, nasal speech
, and difficulty in chewing or swallowing
. ALS generally affects people around the age group of 65 years and 50 years in case of inherited patients [2]
. The manual analysis of ALS signals is a very monotonous task which requires professionals to diagnose
. An automatic, accurate, and fast method is required to diagnose the ALS EMG signals.

American Journal of Computer Science and Information Technology

Amyotrophic lateral sclerosis (ALS) is a disease, affects the nerve cells in brain and spinal cord that controls the voluntary action of muscles, which identification can be possible by processing electromyogram (EMG) signals
. This study focuses on the extraction of features based on tunable-Q factor wavelet transform (TQWT) for classifying ALS and healthy EMG signals
. TQWT decomposes EMG signal into sub-bands and these sub-bands are used for extraction of statistical features namely mean absolute deviation (MAD), interquartile range (IQR), kurtosis, mode, and entropy
. The obtained features are tested on k-Nearest Neighbour and least squares support vector machines classifiers for the classification of ALS and healthy EMG signals
. The proposed method obtained better classification results as compared to other existing methods.




CS Fundamentals Curriculum Guide

CS Fundamentals Curriculum Guide As always, it is thanks to our generous donors that we were able to develop and offer this curriculum at no cost to schools, teachers, or students
: Microsoft, Infosys Foundation USA, Facebook, Omidyar Network, Google, Ballmer Family Giving, Ali and Hadi Partovi, Bill Gates, The Bill and Melinda Gates Foundation, BlackRock, Jeff Bezos, John and Ann Doerr, Mark Zuckerberg and Priscilla Chan, Quadrivium Foundation, Amazon Web Services, The Marie-Josee and Henry R
. Kravis Foundation, Reid Hoffman, Drew Houston, Salesforce, Sean N
. Parker Foundation, Smang Family Foundation, Verizon
. Who is This For?  Computer Science Fundamentals was built with elementary school educators in mind
. Courses A-F have been specifically tailored to students in Kindergarten through 5th grade, and no prior experience is assumed
. The lessons in CS Fundamentals are presented with the understanding that many teachers will not have any previous computer science training, and educators are therefore encouraged to learn along with their students.  

American JoCuteompr urnal of Science and Information Technogylo

Abmore related article ss attract

Intuitionistic fuzzy (IFuzzy) have remarkable applications in complex real world problems
. Fuzzy set is the superset of IFuzzy, many applications have been successfully implemented in the field of computer science
. Soft computing is related to the system finds solution for the vague problems, introduced in early 90’s and became popular by its approach to the real world problem
. The development of IFuzzy leads to improvement in softcomputing method to analyze the complex system with complex inputs
. It is possible to build a hybrid intelligent system using IFuzzy methods
. The proposed study has derived IFuzzy methods for reliability problems in the soft computing and some definitions for the complex problems.

About American Journal of Computer Science and Information Technology

About American Journal of Computer Science and Information Technology

American Journal of Computer Science and Information Technology (AJCSIT) is an intercontinental free access, peer reviewed journal
. AJCSIT focuses on allocating a platform and persuading transpire intellectuals and academicians worldwide to share their academic and professional knowledge in the subjects of Computer Science, Engineering, and Technology
. AJCSIT also targets to outstretch to a huge number of audiences across the world with authentic and cutting-edge research findings accomplished on the requisite issues of the above salient disciplines
. Besides only research discussions, book reviews, best quality technical points, review articles, and surveys from professionals in the field to encourage instinctive understanding of the state-of-the-art and trends-in-technology are also highly encouraged
. It is an avenue for scientists and operational engineers indulged in all facets of Computer Science and Information Technology to publish quality research papers.
Articles for final confirmation in the journal are heedfully chosen and then encounter initial editorial screen through meticulous peer review, to safeguard the original novelty, relevance, timeliness and readability. Topics of interest include Computer Architecture and Systems, Algorithms and Bioinformatics, Database and Data Mining, Computer Networks and Distributed Computing, Computer Graphics and Multimedia, Game and Software Engineering Systems, Scalable Computing, Simulation and Modeling, Networking and Communications, Soft and Internet Computing , etc.
American Journal of Computer Science and Information Technology invites the authors to submit their article as an e-mail attachment via editor.ajcsit@eclinicaljournals.comcomputersci@imedpub.org (or) as an online submission athttp://www.editorialmanager.com/imedpub/

Design of Athlete Information Provision System Using Object Recognition

Keywords:
Object Recognition, Information Provision, Provision System
. 1 Introduction A paradigm shift caused by information communication development allows us to move closer to the ubiquitous and smart phone life
. As the standard of living has been raised, and entertainment and sports became more and more popular in these days, the desire to review every sorts of information of interested athletes using augmented reality application of smart phone, is driven in the stadiums
. The internet which enables interaction with various information while connecting computer network of the world, is recognized as an important media resource in education as well as a major informant of knowledge-information-based society
. Especially, World Wide Web (herein after referred to as the Web), one of the internet services, is very useful for education information, as it implements various multimedia information in a hypermedia format, free from any constraints of time and space [1]
. Recently, many people are willing to use services wherever they want, carrying at least one mobile device, which is U-environment or mobile environment
. Besides, a lot of companies are providing products or services suitable for the mobile environment, and it is generally referred to as U-Biz [2,3]
. The features of the mobile environment comparing to the common wired environment are as follows [3]
.[4]; First, the mobile environment has no limitation in time and space
. Users desire to find information whenever and wherever they want, while carrying mobile devices. Second, the mobile environment is quite individual
. Most of the mobile devices is 

Design of Athlete Information Provision System Using Object Recognition

Design of Athlete Information Provision System Using Object Recognition Seoksoo Kim Dept
. of Multimedia, Hannam Univ., 133 Ojeong-dong, Daedeok-gu, Daejeon-city, Korea sskim0123@naver.com Abstract
. The suggested athlete information provision system obtains the image of an athlete who is playing a game, through the broadcast cameras installed at several places of the stadium
. The server extracts the uniform information using uniform information extraction/recognition module, out of the athlete image transmitted from the broadcast cameras
. The extracted information is used to identify athlete information and league information stored in the database
. the identified athlete information is transmitted to the smart phone by which the user is watching a live broadcast of the game, so that the user watches the broadcast relayed more easily
. This is the athlete information provision service system using the uniform information as an object.

Watch Thousands New Movie

Search This Blog

free counters