International Journal of Information Technology and Computer Science (IJITCS)

IJITCS Vol. 11, No. 3, Mar. 2019

Cover page and Table of Contents: PDF (size: 189KB)

Table Of Contents

REGULAR PAPERS

Big Data Analytics and Visualization for Hospital Recommendation using HCAHPS Standardized Patient Survey

By Ajinkya Kunjir Jugal Shah Navdeep Singh Tejas Wadiwala

DOI: https://doi.org/10.5815/ijitcs.2019.03.01, Pub. Date: 8 Mar. 2019

In Healthcare and Medical diagnosis, Patient Satisfaction surveys are a valuable information resource and if studied adequately can contribute significantly to recognize the performance of the hospitals and recommend it. The analysis of measurements concerning patient satisfaction can act as a valid indicator for giving recommendations to the patient about a specific hospital, as well as can provide insights to improve the services for healthcare organizations. The primary objective of the proposed research is to carry out an in-depth investigation of all the measurements in HCAHPS survey dataset and distinguish those that contribute considerably to the hospital suggestions. This work performs predictive analysis by building multiple classification models, each of which examined and evaluated to determine the efficiency in predicting the target variable, i.e., whether the hospital is recommended or not, based on specific set of measurements that contribute to it. All the models built as a part of research specified the same list of measure id is that help in deriving the target. It provides an insight into how caregiver interaction, emphasizes on the services rendered by the caregiver and overall patient experience makes a hospital highly valued and preferred. An in depth-analysis is conducted to derive the implementation results and have been stated in the later part of the paper.

[...] Read more.
Health Informatics System for Screening Arboviral Infections in Adults

By Chinecherem Umezuruike Wilson Nwankwo Samuel O. Okolie Adewale O. Adebayo Joshua V. Jonah Habiba Ngugi

DOI: https://doi.org/10.5815/ijitcs.2019.03.02, Pub. Date: 8 Mar. 2019

Health Informatics (HI) has played vital roles in the management of several diseases especially in the tropics. It has revolutionized the mainstream healthcare and healthcare delivery system. This paper applies the principle of Health Informatics to addressing the detection and management of arboviruses particularly Zika and Dengue viruses around which the aetiology of Zika Virus Disease and Dengue fever revolves. In this paper, the object-oriented approach was employed to study the fundamental procedures in the detection and management of arboviral infections. The study culminated into modelling of knowledge-based prototype system for screening patients in incidence areas. Existing knowledge on the management of arbovirus infections was complemented with purposive sampling of two specialist infectious diseases facilities in Nigeria. The health informatics prototype is christened NCliniSoft Diagnostic ZikaSol and is composed of five components validated through expert-driven differential diagnostic procedures. The prototype was evaluated to test for usability, diagnostic consistency, user acceptance and satisfaction. The prototype performs a differential screening between Dengue fever and Zika Virus disease using the Bayesian probabilities complemented by situational constructs. The result of each screening process is an automated diagnostic report that shows the status of the patient. Computed result showed high level of efficiency and acceptability.

[...] Read more.
Attacking Image Watermarking and Steganography - A Survey

By Osama Hosam

DOI: https://doi.org/10.5815/ijitcs.2019.03.03, Pub. Date: 8 Mar. 2019

Image hiding techniques include steganography and watermarking. Steganography procedures are directed to keep the secure information from eavesdropping and perturbations. On the other hand, watermarking algorithms are used for keeping the watermark robust to attacks. When the attacker tries to perturb the carrier image to remove the watermark, the image quality will be degraded to level that makes it useless. Data hiding is essential in many applications such as communication channel security, data security and forgery detection. Watermarking is used in copyright protection. Image hiding attacks can be active or passive. In active attack, the attacker changes the content of the data. While in passive attacks the attacker tries to guess the secure data by eavesdropping. In this paper, we discuss the image data hiding attacks that directed to both secure message and carrier image. First, message attacks such as Oracle and Template attacks will be discussed. Second, the carrier image attacks are presented in two broad categories, namely passive and active attacks. Finally, the paper conclusion will be presented. The paper presented image data hiding attack types in professional and well-organized categories.

[...] Read more.
Comparative Analysis of Bayes Net Classifier, Naive Bayes Classifier and Combination of both Classifiers using WEKA

By Abhilasha Nakra Manoj Duhan

DOI: https://doi.org/10.5815/ijitcs.2019.03.04, Pub. Date: 8 Mar. 2019

Authors here tried to use the WEKA tool to evaluate the performance of various classifiers on a dataset to come out with the optimum classifier, for a particular application. A Classifier is an important part of any machine learning application. It is required to classify various classes and get to know whether the predicted class lies in the true class. There are various performance analysis measures to judge the efficiency of a classifier and there are many tools which provide oodles of classifiers. In the present investigation, Bayes Net, Naive Bayes and their combination have been implemented using WEKA. It has been concluded that the combination of Bayes Net and Naive Bayes provides the maximum classification efficiency out of these three classifiers. Such a hybridization approach will always motivate for combining different classifiers to get the best results.

[...] Read more.
Real-Time Realistic Telepresence using a 360 ° Camera and a Virtual Reality Box

By Dan Vincent G. Alcabaza Marvin E. Legaspi Trisha Leinelle Muyot Kate Louise C. Ofren Johsua Angelo D. Panganiban Roselito E. Tolentino

DOI: https://doi.org/10.5815/ijitcs.2019.03.05, Pub. Date: 8 Mar. 2019

This study focuses on the transmission of live 360 video using Ricoh Theta S which is transmitted to Android phone mounted in BoboVR. The proposed solution is to use a 360 camera that captures the scene in all direction and create an application which streams the captured 360 live video from Laptop (Server) into the Android Phone (Client). The Android phone’s IMU sensor is responsible for the corresponding viewport selected from the 360 environment. The viewport is subject for Stereoscopic SBS to show the 3D effect in accordance with the user’s perception The viewport is subject for Stereoscopic SBS to show the 3D effect in accordance with the user’s perception. A 3D video can be produced by applying the Stereogram SBS. Also, depth can be perceived due to the varying distance between the focal baseline and focal length.

[...] Read more.
Energy Efficiency Analysis by Fine Grained Modification in Link State Routing Protocol

By Md Masuduzzaman Istiak Ahmed Allin Arzoo Tanuka Sharmin

DOI: https://doi.org/10.5815/ijitcs.2019.03.06, Pub. Date: 8 Mar. 2019

A major concern in modern explosive development of information and communication technology, especially in wired networking is to reduce of unnecessary energy consumption. It is needed because of expected environmental impact and potential economic benefits. These issues are usually referred as “Green networking”. It is related to increase the awareness of energy consuming in routing protocols, in the devices, including the structure of the whole networking system. Here different issues will be described which is topically related and the possible impact in green networking field. Also, special attention will be monitored in the routing protocol and algorithm especially link state routing protocol which is generally used for calculating the shortest path. This research paper tries to find out a new technique or modified routing technique that will be more effective for every router in terms of energy efficiency.

[...] Read more.