International Journal of Information Engineering and Electronic Business (IJIEEB)

IJIEEB Vol. 8, No. 3, May. 2016

Cover page and Table of Contents: PDF (size: 181KB)

Table Of Contents

REGULAR PAPERS

Course and Student Management System Based on ABET Computing Criteria

By Sahar A. El Rahman Sahar S. Shabanah

DOI: https://doi.org/10.5815/ijieeb.2016.03.01, Pub. Date: 8 May 2016

Accreditation is considered as one of the major aspects of ABET, where educational institutions continuously develop the quality of academic programs to achieve it. For the most part of this continuous development needs, the programs determine definite and measured objectives for their students, evaluate their efforts to achieve these objectives, and amend their programs based on the results of that assessment. In addition to providing educational institutions an organized strategy to appraise and develop their programs. The primary focal point to prepare for accreditation is the learning objectives and program outcomes assessment. So, College of Computer and information Sciences (CCIS) at Princess Nourah Bint Abdulrahman (PNU) needs to fulfill ABET criteria to achieve the outcomes. So, CCIS need a system to achieve course assessment matrix without wasting the time and efforts. This system will help the staff members in identifying student learning objectives that are expected to achieve as well as to identify assessment tools and evaluation feedback for each topic. This paper describes Course and Student Management System (CSMS) established to address a course assessment matrix, and help achieve department-stated objectives. Whereas, CSMS is a web based system provides many features to facilitate the creation of articulation matrix, course assessment based on students learning objectives, the student's evaluation and tracking attendance of students. This system is considered as a new method of creating the course assessment matrix that will help the department head, instructors and course coordinator. It is user friendly and interactive interface, saving the time and efforts.

[...] Read more.
Despeckling of Medical Ultrasound Images: A Technical Review

By Nidhi Gupta A.P Shukla Suneeta Agarwal

DOI: https://doi.org/10.5815/ijieeb.2016.03.02, Pub. Date: 8 May 2016

Acquisition of digital image and preprocessing methods plays a vital role in clinical diagnosis. The ultrasound medical images are more popular than other imaging modalities, due to portable, adequate, harmless and cheaper nature of it. Because of intrinsic nature of speckle noise (signal based noise), ultrasound medical image leads to degradation of the resolution and contrast of the image. Reduction of this signal based noise is helpful for the purpose of visualization of the ultrasound images. The low quality of image is considered as a barrier for the better extraction of features, recognition, analysis and detection of edges. Because of which inappropriate diagnosis may be done by doctor. Thus, speckle noise reduction is essential and preprocessing step of ultrasound images. Analysts survey manifold reduction methods of speckle noise, yet there is no exact method that takes all the limitations into account. In this review paper, we compare filters that are Lee, Frost, Median, SRAD, PMAD, SRBF, Bilateral, Adaptive Bilateral and Multiresolution on medical ultrasound images. The results are compared with parameter PSNR along with the visual inspection. The conclusion is illustrated by filtered images and data tables.

[...] Read more.
Development of Decision Support System for Health Care Consultation using RFID Based NFC Tags for Patient Identification

By Arshia Zaffar Mahnoor Gul Rida Mumtaz Aliya Ashraf Khan

DOI: https://doi.org/10.5815/ijieeb.2016.03.03, Pub. Date: 8 May 2016

The paper core idea is to develop a Decision Support System for Health Care Center with primary focus on Patient, Admin and Doctor's authentication using (Radio Frequency Identification) RFID based NFC tags. Paper flow is categorized mainly in four parts. First phase deals with registration and authentication (NFC tags), while the next phase deals with the diagnosis of the diseases based on two Data Mining algorithms NN and BNN. Third phase is about General Check-up of patient in order to examine patient medical history based on heart rate, respiratory rate, sugar level and cholesterol level. Lastly, information about blood donor is kept for facilitating the needy patients. staff to view and update the desired patient’s information from hospital system, only by reading the patient’s NFC tag.

[...] Read more.
Two Level Hybrid SECO Environment for Secure Cloud Environment

By Manpreet kaur Hardeep Singh

DOI: https://doi.org/10.5815/ijieeb.2016.03.04, Pub. Date: 8 May 2016

As cloud computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. Number of users used cloud to store their data. In general terms means encrypted form hackers can easily hack or modify the data because there is no security while uploading the data to cloud server. Due to this problem cloud server can easily deployed. As security is one of the major concerns in cloud environment for preventing data deployment during upload. The best solution for the protection of data privacy is done by encryption the sensitive data before being outsourced to cloud server, which makes effective data utilization a very challenging task. There are a number of security and privacy concerns associated with cloud computing but these issues fall into two broad categories: security and privacy concerns faced by cloud providers and security and privacy concerns faced by their customers. Different set of algorithms have been implemented on cloud environment for enhancing the security but still there are some major concerns like malicious attacks. In previous work on AES based encryption and a SECO based environment were introduced.. In SECO based environment root package generated key by using diffie-hellman algorithm and domain package generated key by using private key of root package. In AES algorithm and SECO based environment individually provided some sort of level encryption. In this both algorithms work on single level encryption approach which may be easily broken by malicious users. So, in proposed work both techniques that is AES and SECO based environment will be combined to provide two level security and also will double the encrypted environment which may not be easily broken by malicious users. Result will be more efficient and secure than the previous work.

[...] Read more.
Microcontroller-Based Automobile Tracking System with Audio Surveillance using GPS and GSM Module

By Nureni A. Yekini Adetokunbo O. Oloyede Akinwole K. Agnes Folasade M. Okikiola

DOI: https://doi.org/10.5815/ijieeb.2016.03.05, Pub. Date: 8 May 2016

This paper presents automobile tracking system with audio surveillance using GPS and GSM Module to provide an alternative solution to security challenges experienced by car owner, and to develop a system that can track the location of vehicles. We make use of Microcontroller Unit, GPS, and GSM unit. The design is an embedded application, which will continuously monitor a moving Vehicle and report the status of the Vehicle on demand. The PIC18F452 microcontroller is interfaced serially to a GSM Modem and GPS Receiver. A GSM modem is used to send the position (Latitude and Longitude) of the vehicle from a remote place. The GPS modem will continuously give the information indicating the position of the vehicle. The GPS modem gives many parameters as the output, but only the data coming out is read and sent to the user’s phone number. We use RS-232 protocol for serial communication between the modems and the microcontroller. A serial driver IC is used for converting TTL voltage levels to RS-232 voltage levels. When the request by user is sent to the number in the modem, the system automatically sends a return reply to the mobile phone indicating the position of the vehicle in terms of latitude and longitude from this information we can track our vehicles.

[...] Read more.
Mobile Augmented Integrated Framework for Citizen Centric E-Governance Services-MAIFCCES

By Shailesh Khanesha Ashish Jani

DOI: https://doi.org/10.5815/ijieeb.2016.03.06, Pub. Date: 8 May 2016

The increasing adoption of improving mobile technologies has opened up a window for research and innovative services development opportunities in diversified dimensions. Government system anticipates delivery of citizen centric services through hand held devices in an integrated manner. This paper has made an attempt to develop user friendly citizen centric interface to avail government services in faster and cost-effective way through mobile device. The proposed MAIFCCES framework provides an interface for citizen to apply for government services and monitor it’s status through mobile device. Also suggest a mechanism to process and monitor the applications of citizen centrally in government data centre.

[...] Read more.
Preparing Mammograms for Classification Task: Processing and Analysis of Mammograms

By Aderonke A. Kayode Babajide S.Afolabi Bolanle O. Ibitoye

DOI: https://doi.org/10.5815/ijieeb.2016.03.07, Pub. Date: 8 May 2016

Breast cancer is the most common cancer found in women in the world. Mammography has become indispensable for early detection of breast cancer. Radiologists interpret patients’ mammograms by looking for some significant visual features for decision making. These features could have different interpretations based on expert’s opinion and experience. Therefore, to solve the problem of different interpretations among experts, the use of computer in facilitating the processing and analysis of mammograms has become necessary.
This study enhanced and segmented suspicious areas on mammograms obtained from Radiology Department, Obafemi Awolowo University Teaching Hospital, Ile-Ife, Nigeria. Also, Features were extracted from the segmented region of interests in order to prepare them for classification task.
The result of implementation of enhancement algorithm used on mammograms shows all the subtle and obscure regions thereby making suspicious regions well visible which in turn helps in isolating the regions for extraction of textural features from them. Also, the result of the feature extraction shows pattern that will enable a classifier to classify these mammograms to one of normal, benign and malignant classes.

[...] Read more.
Metadata Management System for E-learning Objects using Cloud

By Ashok Kumar.S

DOI: https://doi.org/10.5815/ijieeb.2016.03.08, Pub. Date: 8 May 2016

Existing e-learning systems suffer seriously from the problems of scalability, maintainability, manageability, which can be overcome by merging e-learning with the cloud environment. Cloud technologies can satisfy the need of efficient e-learning system, resource management, user management and security for maintaining the secret information. Efficient delivery of the learning content can be done using Learning Content Management System. It is an environment where multiple users can create, accumulate, reuse, administer and deliver learning content from a central object repository. Learning Content Management System contains only the content description. So metadata for that content created which acts as an index for the learning content and holds details regarding author, location, format etc., Metadata is data about the data which is used for efficient searching.

[...] Read more.