- Indian Journal of Science and Technology
- Data Mining and Knowledge Engineering
- Biometrics and Bioinformatics
- ICTACT Journal on Communication Technology
- International Journal of Innovative Research and Development
- Research Journal of Pharmacy and Technology
- International Journal of Scientific Engineering and Technology
- Indian Journal of Public Health Research & Development
- Journal of Engineering Education Transformations
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saravanan, M.
- Incidence of Methicillin Resistant Staphylococcus Aureus (MRSA) from Septicemia Suspected Children
Authors
1 Dept. of Biotechnology, Faculty of Science & Humanities, SRM University, Kattankulatthur, Chennai - 603 203, IN
2 Dept. of Biomed. Engg., Sathyabama University, Jeppiaar Nagar, Old Mamallapuram Road, Chennai– 600 119, IN
Source
Indian Journal of Science and Technology, Vol 2, No 12 (2009), Pagination: 36-39Abstract
The objective of the present study is to determine the incidence, clinical features, bacteriological pattern and antibiotic sensitivity profile of septicemia suspected children in Tamil nadu, India. This study was undertaken in SBS Hospital Pvt. Ltd., Hosur and SRM Medical College and Hospital, Chennai. All children (Age 1-5 yr) admitted with clinical features and risk factors, suspected with septicemia were selected and the blood samples were collected. The study identified 54 septicemia or bacteremia children out of 298 suspected children screened (18.12 %). The isolated organisms from the blood sample were characterized by primary, biochemical and selective media identification methods. From the identified isolates, Staphylococcus aureus was found to be prominent organism (48.14 %). Then the screening of MRSA was carried out using standard method (38.46%). The antibiotic sensitivity pattern of S. aureus differs widely between methicillin resistant and sensitive isolates. The present study reveals that in case of MRSA isolates resistant to nearly all antibiotics, they were sensitive to oxacillin and vancomycin.Keywords
Septicemia, MRSA, Antibiotic Resistance, Clinical Study, Epidemiology, Child Health, IndiaReferences
- Anupurba S, Sen MR and Nath G et al. (2003) Prevalence of methicillin resistant Staphylococcus aureus in a tertiary referral hospital in eastern Uttar Pradesh. Indian J. Med. Microbiol. 21, 49-51.
- Blot S, Vandewoude K, Hoste E and Colardyn F (2002) Outcome and attributable mortality in critically ill patients with bacteremia involving methicillin -susceptible and methicillin – resistant Staphylococcus aureus. Arch. Intern. Med. 162 (19), 2229-2235.
- Chambers HF (2001) The changing epidemiology of Staphylococcus aureus? Emerg. Infect. Dis. 7 (2), 178– 182.
- Jamal WY, El-Din K, Rotimi VO and Chugh TD (1999) An analysis of hospital acquired bactremia in intensive care unit patients in a university hospital in Kuwait. J. Hospital Infec. 43, 49-56.
- Jevons MP (1961) Celbenin-resistant staphylococci. BMJ. 1, 124–125.
- Johnson AP, Aucken HM, Cavendish S, Ganner M, Wale MC, Warner M, Livermore DM and Cookson BD (2001) Dominance of EMRSA-15 and -16 among MRSA causing nosocomial bacteraemia in the UK: analysis of isolates from the European antimicrobial resistance surveillance system (EARSS). J. Antimicrob. Chemother. 48 (1), 143–144.
- Klein E, Smith DL and Laximinarayan R (2007) Hospitalization and deaths caused by methicillin –resistant Staphylococcus aureus, United States,1999-2005. Emerg. Infect. Dis. 13 (12), 1840-1846.
- Klevens RM, Morrison MA, Nadle J, Petit S, Gershman K, Ray S et al (2007) Invasive methicillinresistant Staphylococcus aureus Infections in the United States. JAMA. 298 (15), 1763-1771.
- Kumari N, Mohapatra TM and Sing YI (2008) Prevalence of methicillin resistant Staphylococcus aureus (MRSA) in tertiary -Care hospital in eastern Nepal. J. Nepal Med. Assoc. 47 (170), 53-56.
- Liu et al. (2008) A population- based study of the incidence and molecular epidemiology of methicillinresistant Staphylococcus aureus disease in San Francisco, 2004-2005. Clin. Infect. Dis. 46 (11),1637-1646.
- Matthews KR, Roberson J, Gillespie BE, Luther DA and Oliver SP (1997) Identification and differentiation of coagulase-negative Staphylococcus aureus by polymerase chain reaction. J. Food Protect. 60 (6), 686–688.
- Mehta AP, Rodrique C and Sth K et al. (1998) Control of methicillin resistant Staphylococcus aureus in tertiary care center: a five year study. Indian J. Med. Microbiol. 16, 31-34.
- NCCLS (1997) Performance standard for antimicrobial disc susceptibility tests. Approved standard NCCLS document M2-A6 (ISBN-56238- 308-6), 6th ed. pp: 1087-1898.
- Ryan KJ and Ray CG (eds.) (2004) Sherris Medical Microbiology. 4th ed., McGraw Hill, ISBN 0-8385- 8529-9.
- Stein R (2007) Drug resistant staph germs toll is higher thought.Washington Post. 10, 19.
- Udaya SC, Harish BN, Umesh Kumar PM et al. (1997) Prevalence of methicillin resistant Staphylococcus aureus in JIPMER hospital. Indian J. Med Microbiol. 15, 137-138.
- Vidhani S, Mehndiratta PL and Mathur MD (2001) Study of MRSA isolates from high risk patients. Indian J. Med. Microbiol.19, 87-90.
- World Health Organization (1996) Recommendation for the control of methicillin resistant Staphylococcus aureus (MRSA), Geneva.
- Comparative Study on Extraction of Keywords Using Salton Buckley and Clustering of Correlation
Authors
1 Bharathiyar University, IN
2 Sri Ramakrishna Mission Vidyalaya College of Arts & Science, Coimbatore, IN
Source
Data Mining and Knowledge Engineering, Vol 5, No 2 (2013), Pagination: 62-65Abstract
Keywords are index terms that contain most important information. Keyword extraction is considered as the processing for text documents. Keyword extraction is a process by which a short list of keywords is extracted out from the documents. This brings the advantage of reaching the information sources in a quick way. In this paper, keywords are extracted from the document collections to improve the effectiveness of Information Retrieval. Keyword extraction can help people quickly find hot spots on the web, since keywords in a document provide important information about the content of the document. We develop a keyword extraction method using correlation and Salton Buckley method. Documents containing keywords are identified in correlation are better than Salton Buckley method. Experimental result carries out the performance of best way extraction of keywords.Keywords
Classification, Clustering, Correlation, Salton Buckley.- Recognition of Handwritten Tamil Characters Using Statistical Classifiers
Authors
1 Department of Computer Science and Engineering, R.M.K Engineering College, Kavaraipettai, TamilNadu, IN
Source
Biometrics and Bioinformatics, Vol 2, No 7 (2010), Pagination: 125-135Abstract
This paper describes a system to recognize handwritten Tamil characters using statistical classifier approach, for a subset of the Tamil alphabet. The process of handwriting recognition involves extraction of some defined characteristics called features to classify an unknown handwritten character into one of the known classes. A typical handwriting recognition system consists of several steps, namely: preprocessing, segmentation, feature extraction and recognition. Data input (the hand written Tamil character) were collected from different writers on A4 sized documents. They were scanned using a flat-bed scanner at a resolution of 100 dpi and stored as 256-bit color scale images. We trained the system with 500 characters belonging to 10 characters. The testing data contained a separate set of 50 characters. A training data was used to test the system, to see how well the system represents the data it has been trained on. In the test set, a recognition rate of 90% was achieved.
Keywords
Preprocessing, Segmentation, Feature Extraction, Character Recognition.- Strengthening Encryption Secrecy for Private Search Using Fully Homomorphic Encryption
Authors
1 Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, IN
2 Department of Computer Science and Engineering, Sri Ramakrishna College of Engineering, IN
Source
ICTACT Journal on Communication Technology, Vol 7, No 1 (2016), Pagination: 1255-1260Abstract
A system for private searching on streaming data, allows client to send the encrypted search query to the remote server. The server uses the encrypted query on a stream of documents and returns the matching documents to the client without revealing the features of the query. A novel technique for private searching on streaming data is proposed which is based on keyword frequency that is the number of times that a keyword appears in the document is required to be higher or lower than a given threshold. This form of query searching can help the client in locating more related documents. Using fully homomorphic encryption techniques, the server can perform search for retrieving the related documents even though the search query is in encrypted form. Our scheme provides number of vital benefits for the client. They provide provable secrecy for encryption, in the view that the untrusted server cannot gather any information about the plaintext. They also reinforce hidden queries, so that the client may ask the remote server to search for a secret word without revealing the word to the server.Keywords
Homomorphic Encryption, Private Searching on Streaming Data, Trusted Security, Query Search, Efficient Retrieval.- Implementation of Getting Similarity Images using the Concept of IWSL
Authors
1 Department of Computer Science and Engineering, Sathyabama University, Chennai - 600119, IN
2 Department of Computer Science and Engineering, Jeppiaar Engineering College, Chennai – 600119, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 22 (2016), Pagination:Abstract
Normal social media sites like flickr, amazon are continuing expanding giving the components that transferring the pictures, imparting the pictures to different sorts of annotations like gatherings and labels. This sites information bases comprises mass measure of pictures which has been transferred by different clients with different annotations. Consequently recovery of the pictures from that rich data heterogeneous systems relying on the client asked for inquiry and positioning the pictures as per the question likewise somewhat difficult assignment. In this paper, we are presenting another idea called heterogeneous picture rich data systems and answer for the current issues in the sites which are expressed previously. To accomplish the answer for existing issue we are proposing two calculations to be specific hmok-simrank calculation for likeness checking and positioning of the pictures so as to store it in the database, and iwsl calculation for incorporation which will be clarified in the paper about its utilization and its execution contrasted with existing calculations. We contrasted our outcome and the datasets of google and flickr, it demonstrates a huge execution than existing framework, this locales turn out to be as rich data systems with heterogeneous pictures. Presently the issue comes into picture while.Keywords
Images, IWSL, Implement, Module, Rich Data, Similarity.- Investigation and Scrutiny of Drilling Process Parameters for Tool wear and Material Removal Rate of SMC Composite in the Itinerary of Fuzzy Inference Give up
Authors
Source
International Journal of Innovative Research and Development, Vol 4, No 13 (2015), Pagination:Abstract
The drilling action is the majority widespread process used in construction of holes and the primary input machining parameters are highly influencing over the output parameters of material removal rate, surface finish, dimensional exactness, shape precision, tool wear. In this at hand exploration the MRR and tool wear are predicted with respect to the input parameters with the Fuzzy Logic inference with MATLAB in order to lay the path of drilling effects on the polymer composite. The outcome of the Fuzzy inference compared in the midst of the experimental values and instituted to be in close conformity.
Keywords
Polymer composite, tool wear, MRR, feed, speed, drill point angle, Fuzzy Logic, MATLAB- Online Built-In-Self Test Architecture Using SRAM Cells
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 11 (2014), Pagination:Abstract
In this brief, we present a novel input vector monitoring concurrent BIST scheme, which is based on the idea of monitoring a set (called window) of vectors reaching the circuit inputs during normal operation, and the use of a static-RAM like structure to store the relative location of the vectors that reach the circuit inputs in the examined window; the proposed scheme is shown to perform significantly better than previously proposed schemes with respect to the hardware overhead and concurrent test latency (CTL) trade off. In this paper two methods will be discussed, window monitoring concurrent bist and input vector monitoring concurrent bist using sram,
Keywords
Built-in-selftest, design for testability, testing, window monitoring bist- Detection of Breast Cancer by Ultrasonic Image using Wavelet Transforms
Authors
1 School of Advanced Sciences, VIT University, Tamil Nadu, IN
2 School of Electrical Engineering, VIT University, Tamil Nadu, IN
Source
Research Journal of Pharmacy and Technology, Vol 10, No 3 (2017), Pagination: 839-842Abstract
This paper presents the approaches which are applied to develop the wavelet transformations from the ultrasonic image or sonographic image of breast cancer. We propose a result to implement feature extraction technique using the 2D-DWT and expressed the result using histogram.Keywords
Breast Cancer, Ultrasonic Image, Wavelet Transformation.- Security Enhancement on Cloud Using Multi Cloud Concepts
Authors
1 Veltech Multitech Dr. Rr Dr. Sr Engineering College, IN
Source
International Journal of Scientific Engineering and Technology, Vol 3, No 5 (2014), Pagination: 608-611Abstract
Security challenges are still among the biggest challenges or obstacles in the field of cloud computing and services. Many research activities are done in clearing those issues. In this journal we concentrated on security issues by involving multi cloud architectures and introducing a concept called database splitting which can enable security.Keywords
Cloud, Multi Cloud, Database Splitting, Partitioning, Cryptography, Encryption.- A Low Cost Hardware Based Fall Detection and Call for Help System for Elderly Person
Authors
1 PG Scholar, Dept. of ECE, IFET College of Engineering, Villupuram, Tamil Nadu,, IN
2 Associate Professor, Dept. of ECE, IFET College of Engineering, Villupuram, Tamil Nadu, IN
Source
Indian Journal of Public Health Research & Development, Vol 11, No 2 (2020), Pagination: 399-405Abstract
Context: Aging is common for a Human being. Especially an old aged person needs attention due to weakening in their physical capability. Fall is one of the major problems faced by elderly persons during their daily day activities. Falls are caused due to accident, loss of consciousness. Fall poses a serious impact on health issues of an elderly person. Fall detection is one of the necessary actions to be taken. So the fall detection system is needed. Thereby here the development of the system includes methodology based on sensor-video integration technology. The event of fall occurrence can be detected using the sensor as well as the camera and the acquired information is sent as messages and live video feed to the user in case of emergency through making use of Wi-Fi technology.Keywords
Accelerometer Sensor, Camera, Video, Emergency, Wi-Fi, Message, Fall Detection.- Energy Efficient and Secure Data Transmission using Cooperative Routing in Networks
Authors
1 Department of Computer Science and Engineering, KPR Institute of Engineering and Technology, IN
2 Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, IN
3 Department of Computer Science Engineering, Balaji Institute of Technology and Science, IN
Source
ICTACT Journal on Communication Technology, Vol 11, No 1 (2020), Pagination: 2115-2120Abstract
Wireless Sensor Networks (WSNs) are emerging as a promising technology because of their wide range of applications in industrial, environmental monitoring, military and civilian domains. Due to economic considerations, the nodes are usually simple and low cost. They are often unattended, however, and are hence likely to suffer from different types of novel attack. WSNs are increasingly being deployed in security-critical applications. Due to their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. In this paper, using the recent advances in uncertain reasoning that has originated from the artificial intelligence community, we propose a trust management scheme named Hybrid and Efficient Intrusion Detection Systems that enhances the security in networks. Here, we have used two frameworks for Trust Calculation and Decision Making process. The trust value is derived using Bayesian Inference, and Decision Making is based on Dempster-Shafer theory, which is a mathematical theory of evidence.Keywords
WSN, Dempster-Shafer Theory, Intrusion Detection System, Artificial Intelligence.References
- S. Shakkottai, X. Liu and R. Srikant, “The Multicast Capacity of Large Multihop Wireless Networks”, IEEE/ACM Transactions on Networking, Vol. 18, No. 5, pp. 1691-1700, 2010.
- Z. Qian, X. Tian, X. Chen, W. Huang and X. Wang, “Multicast Capacity in MANET with Infrastructure Support”, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 7, pp. 1808-1818, 2014.
- Z. Li, C. Wang, C. Jiang and X. Li, “Multicast Capacity Scaling for Inhomogeneous Mobile Ad Hoc Networks”, Ad Hoc Networks, Vol. 11, No. 1, pp. 29-38, 2013.
- S. Zhou and L. Ying, “On Delay Constrained Multicast Capacity of Largescale Mobile Ad-Hoc Networks”, Proceedings of International Conference on Communications and Networks, pp. 1-7, 2010.
- J.P. Jeong, T. He and D.H.C. Du, “TMA: Trajectory-based Multicast Forwarding for Efficient Multicast Data Delivery in Vehicular Networks”, Computer Networks, Vol. 57, No. 13, pp. 662-672, 2013.
- X. Ge, J. Yang, H. Gharavi and Y. Sun, “Energy Efficiency Challenges of 5G Small Cell Networks”, IEEE Communications Magazine, Vol. 55, No. 5, pp. 184-191, 2017.
- T. Han, X. Ge, L. Wang, K.S. Kwak, Y. Han and X. Liu, “5G Converged Cell-Less Communications in Smart Cities”, IEEE Communications Magazine, Vol. 55, No. 3, pp. 44-50, 2017.
- X. Ge, S. Tu, G. Mao, C. Wang and T. Han, “5G Ultra-Dense Cellular Networks”, IEEE Wireless Communications, Vol. 23, No. 1, pp. 72-79, 2016.
- Z. Su, Q. Xu, Y. Hui, M. Wen and S. Guo, “A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, Vol. 66, No. 7, pp. 6461-6474, 2016.
- B. Yang, Y. Cai, Y. Chen and X. Jiang, “On the Exact Multicast Delay in Mobile Ad Hoc Networks with F-Cast Relay”, Ad Hoc Networks, Vol. 33, pp. 71-86, 2015.
- X. Wang, W. Huang, S. Wang, J. Zhang and C. Hu, “Delay and Capacity Tradeoff Analysis for Motioncast”, IEEE/ACM Transactions on Networking, Vol. 19, No. 5, pp. 1354-1367, 2011.
- C. Hu, X. Wang and F. Wu, “Motioncast: On the Capacity and Delay Tradeoffs”, Proceedings of 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 18-21, 2009.
- Applying PBL to a Course on Measurements & Instrumentation - Case Study of Speed Sensing
Authors
1 Dept of ECE, BEC, A.P., IN
2 Dept. of ECE, SITAMS, A.P., IN
3 Dept of EIE, VRSEC, A.P., IN
4 Dept. of EIE, SVEC, A.P., IN
Source
Journal of Engineering Education Transformations, Vol 35, No 1 (2021), Pagination: 88-101Abstract
This paper presents application of Project Based Learning – PBL using design, simulation, and construction of hardware/software modules for Speed Measurement. Speed Measurement setup had been developed for demonstration in theory, laboratories and project demos for academia in measurements & instrumentation courses. A traditional measurement setup-Stroboscope that is commonly used for demonstration in laboratories is presented to serve as a base for comparison. The proposed speed measurement for laboratory is envisioned based on counting the number of state changes of a sensing switch. Different approaches and possibilities are discussed that could be implemented in student's education. This approach is aimed at increasing knowledge, skill levels of students and help in using theoretical knowledge for application to practical & real-world problems. It also presents opportunities in instilling design thinking, skill development, integration and team work. Models based on only Software and ones that include hardware are presented for simulation & actual measurement. National Instruments – NI's software - LabVIEW, Multisim & hardware - myRIO & ELVIS ii+ are used for demonstrating different models presented here.Keywords
Measurement, Instrumentation, LabVIEW, myRIO, ELVIS, Multisim, Project Based Learning.References
- Clive L. Dym, Alice M. Agogino, Ozgur Eris, Daniel D. Frey, Larry J. Leifer, (2005), Engineering Design Thinking, Teaching and Learning, J Eng Edu, Volume 94, Issue 1, pp 103-120, https://doi.org/10.1002/j.21689830.2005.tb00832.x.
- Julio Garcia, Patricia Backer, (2007) “Assessment of LabVIEW and Multisim in the delivery of Electronics Laboratory Content”, ASEE, AC2007-235. Pp 12.286.1 – 12.286.16.
- S. J. du Preez , S. Sinha , M. Hutton, (2007), “A LabVIEW courseware customized for precollege learners”, AFRICON 2007, 10.1109/AFRCON.2007.4401571
- Professor Barry Paton, (2009), Introduction to NI ELVISII, Multisim and LabVIEW, Dalhousie University, 323777D-01.
- Ed Doering, (2014), NI myRIO Project Essentials Guide.
- NI, (2003), LabVIEW Measurements Manual, 322661B-01.
- M.Srikanth, Santosh Kumar, N.Gireesh, T. Manideep, B. Hari Chandana, K. Sangeetha, (2019), “A different way of Level Measurement for PBL in Education of students through NI LabVIEW, Multisim & myRIO”, Presented at iPACT 2019 conference Vellore, DOI – 10.1109/i-PACT44901.2019. 8960023.
- Antonio de la Piedra, An Braeken, Abdellah Touhafi, (2012), Sensor Systems based on FPGAs and their applications: A Survey, J. Sensors, ISSN 1424-8220, DOI – 10.3390/s120912235.
- Marina Miranda, Almudena da Costa, Jorge Castro, Angela Saiz-Linares, (2019), A Case study of PBL activity implemented in a Geotechnical Engg course, Proceedings of EDULEARN 19 Conference Spain, pp. 28782883.
- A Noriega, J.M. Sierra, J.L. Cortizo, M.J.
- Prieto, F.F. Linera, J.A. Martin, (2018), Project Based Learning applied to Mechatronics teaching, pp 49-56, New Trends in Educational Activity in the Field of Mechanism and Machine Theory.
- Rocio Garcia, Fernando Diaz-del-Rio, Satirnino Vicente-Diaz, Alejandro LinaresBarranco, (2009), An eLearning standard approach for supporting PBL in computer Engineering, J.Trans. Edu, Vol 52, No 3, pp 328-339, 10.1109/TE.2008.928220.
- Wei Zhan, Jay R Porter, Joseph A Morgan, (2014), Experimental Learning of Digital Communication using LabVIEW, J. Trans. Edu Vol 57, No. 1, pp 34-41, 10.1109/TE.2013.2264059.
- Akash Kumar, Shakith Fernando, Rajesh C Panicker, (2013), PBL in Embedded Systems Education using an FPGA Platform, J. Tans. Edu, Vol 56, No 4, pp 407-415, 10.1109/TE.2013.2246568.
- M.C Rodriguez-Sanchez, Angel Torrado Carvajal, Joaquin Vaquero, Susana Borromeo, Juan A Hernande, (2016), An Embedded Systems course for Engineering students using open source platforms in wireless scenarios, J. Trans. Edu, Vol 59, Issue 4, pp 248-254, 10.1109/TE.2016.2526676.
- Archana Mantri, Sunil Dutt, J.P Gupta, Madhu Chitkara, (2008), Design and Evaluation of PBL based course in Analog Electronics, J. Trans. Edu, Vol 51, No 4, PP 432-438, 10.1109/TE.2007.912525.
- Houcine Hassan, Carlos Dominguez, Juan Miguel Martinex, Angel Perles, Juan Vicente Capella, Jose Albal ad ejo, (2015), A Multidisciplinary PBL robot control project in Automation and Electronics Engineering, J. Trans. Edu, Vol 58, No 3, pp. 167-172, 10.1109/TE.2014.2348538.
- Isidro Calvo, Itziar Cabanes, Jeronimo Quesada, Oscar Barambones, (2108), A multidisciplinary PBL approach for teaching industrial informatics and robotics in engineering, Vol. 61, No 1, pp 21-28, 10.1109/TE.2017.2721907.
- Gimenez G, De Castro R, Key, (2019), Aspects for an effective implementation of PBL: experience in engineering studies, presented at 13 International conference th on Industrial Engineering and Industrial Management, Spain.
- Ayala L Ribeiro, Roberto A Bittencourt, (2019), A case study of an integrated programming course based on PBL, presented at 2019 IEEE Frontiers in Education confe rence, 10.1109/FIE43999.2019.9028579.
- Simone C dos Santos, Eden Santana, Lucas Santana, Pedro Rossi, Lucas Cardoso, Ulayne Fernandes, Claudio Carvalho, Pedro Torres, (2018), Applying PBL in teaching programming: an experience report, presented at 2018 IEEE Frontiers in Education Conference, 10.1109/FIE.2018.8658978.
- Joshua C. Nwokeji, Faisal Aqlan, Ayodele Olagunju, Terry Holmes, Nkeiruka C. Okolie, (2018), WIP: Implementing Project Based Learning: Some challenges from a Requirements Engineering Perspective, presented at 48th Frontiers in Education Conference, FIE 2018, San Jose, United States, 10.1109/FIE.2018.8659307.
- NI (2006), LabVIEW Basics I Intro Course Manual, 320628P-01.
- NI (2006), LabVIEW Basics II Dev Course Manual, 320629P-01