Journal of Software Engineering & Intelligent Systems

ISSN: 2518-8739 (Online)

APRIL 2018 | VOLUME. 3  ISSUE. 1
Title:

CONTOUR EXTRACTION FOR MEDICAL IMAGES USING BIT-PLANE AND GRAY LEVEL DECOMPOSITION

Authors:

Ali Abdrahman M Ukasha, Ahmed B. Abdurrhman, Alwaleed Alzaroog Alshareef

Abstract:

In this paper we have implemented a contour extraction and compression from digital medical image (X-ray & CT scan) and is proposed by using the most significant bit (MSB), maximum gray level (MGL), discrete cosine transform (DCT), and discrete wavelet transform (DWT). Transforms depend on different methods of contour extraction like Sobel, Canny and SSPCE (single step parallel contour extraction) methods. To remove the noise from the medical image the pre-processing stage (filtering by median & enhancement by linear contrast stretch) is performed. The extracted contour is compressed using well-known method (Ramer). Experimental results and analysis show that proposed algorithm is trustworthy in establishing the ownership. Signal-to-noise ratio (SNR), mean square error (MSE), and compression ratio (CR) values obtained from MSB, MGL, DCT & DWT methods are compared. Experimental results show that the contours of the original medical image can be extracted easily with few contour points at high compression exceeded to 87% in some cases. The simplicity of the method with accepted level of the reconstruction is the main advantage of the proposed algorithm. The results indicate that this method improves the contrast of medical images and can help with better diagnosis after contour extraction. This proposed method is very useful for real time application.

Keywords: bit-planes and Gray level decomposition; contour edge extraction and compression; image compression; DCT and DWT;
Available: CONTOUR EXTRACTION FOR MEDICAL IMAGES USING BIT-PLANE AND GRAY LEVEL DECOMPOSITION by Ali Abdrahman M Ukasha, Ahmed B. Abdurrhman, Alwaleed Alzaroog Alshareef is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

AN APPRAISAL FOR FEATURES SELECTION OF OFFLINE HANDWRITTEN SIGNATURE VERIFICATION TECHNIQUES

Authors:

Anwar Yahy Ebrahim, Hoshang Kolivand, Mohd Shafry Mohd Rahim

Abstract:

This research provides a summary of widely used Handwritten Signature Verification based feature selection techniques. Moreover, the focus is on selected best features of signature verification, characterized by the number of features represented for each signature and the aim is to discriminate if a given signature is genuine or a forgery. We presented how the discussion, on the advantages and drawbacks of feature selection techniques, has been handled by several researchers in the past few decades and the recent advancements in the field.

Keywords: signature verification; feature extraction; Dimension Reduction; feature selection;
Available: AN APPRAISAL FOR FEATURES SELECTION OF OFFLINE HANDWRITTEN SIGNATURE VERIFICATION TECHNIQUES by Anwar Yahy Ebrahim, Hoshang Kolivand, Mohd Shafry Mohd Rahim is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

INDOOR NAVIGATION TO ESTIMATE ENERGY CONSUMPTION IN ANDROID PLATFORM

Authors:

Hasan Sajid Atta Al Nidawi, Ammar Khaleel, Kareem Abbas Dawood

Abstract:

Consumption of a mobile application energy (battery and data traffic) is still a primary concern to mobile manufacturers. It has been noted earlier that the consumption of a particular mobile application depends heavily on its software architecture. Therefore, mobile developers can make necessary design decisions based on the comparative study performed on different software architectures. This work presents the consumption analysis of two different software architectures: server-centric architecture and mobile-centric architecture, in order to show the least energy-consumption in Android-mobile application which is implemented to execute effectively the primitive operations for indoor navigation. To do so, either PowerTutor1.4 or Trepn Power Profiler will be applied to estimate the energy consumption. Ultimately, this application will be implemented on indoor navigation environment of first floor - IMAM HUSSEIN LIBRARY (IHL) at Imam Hussein Shrine, Karbala, IRAQ.

Keywords: software architecture; energy consumption; android mobile application; indoor navigation;
Available: INDOOR NAVIGATION TO ESTIMATE ENERGY CONSUMPTION IN ANDROID PLATFORM by Hasan Sajid Atta Al Nidawi, Ammar Khaleel, Kareem Abbas Dawood is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

A REVIEW OF SOFTWARE FAULT DETECTION AND CORRECTION PROCESS, MODELS AND TECHNIQUES

Authors:

Sabia Sulman, Bushra Nisar

Abstract:

In software development life cycle, the most important activity is software maintenance, in order to get a reliable and quality product. Huge amount of time, cost and effort is involved in it. Maintenance of software encompasses various activities like prediction, detection, prevention and correction of fault. Due to refined and multifaceted applications, clustered architecture, artificial intelligence and commercial hardware are in use. Hence, in this research work a review is conducted in the field of software fault detection and correction. There are a lot of software reliability growth models and techniques which help in software fault detection and correction, nevertheless, the room for more models and processes is vacant to detect and correct faults.

Keywords: software maintenance; reliability; software fault detection; software fault prevention; reliability models;
Available: A REVIEW OF SOFTWARE FAULT DETECTION AND CORRECTION PROCESS, MODELS AND TECHNIQUES by Sabia Sulman, Bushra Nisar is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

USING PEER COMPARISON APPROACHES TO MEASURE SOFTWARE STABILITY

Authors:

Liguo Yu, Yingmei Li, Srini Ramaswamy

Abstract:

Software systems must change to adapt to new functional requirements and new nonfunctional requirements. This is called software revision. However, not all the modules within the system need to be changed during each revision. In this paper, we study how frequently each module is modified. Our study is performed through comparing the stability of peer software modules. The study is performed on six open-source Java projects: Ant, Flow4j, Jena, Lucence, Struct, and Xalan, in which classes are identified as basic software modules. Our study shows (1) about half of the total classes never changed; (2) frequent changes occur to small number of classes; and (3) the number of changed classes between current release and next release has no significant relations with the time duration between current release and next release.

Keywords: software evolution; software revision; software stability; class stability; open-source project; java class;
Available: USING PEER COMPARISON APPROACHES TO MEASURE SOFTWARE STABILITY by Liguo Yu, Yingmei Li, Srini Ramaswamy is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

A FRAMEWORK FOR SOFTWARE RE-DOCUMENTATION USING REVERSE ENGINEERING APPROACH

Authors:

Nasrin Ismail Mohamed, Nisreen Beshir Osman

Abstract:

During software evolution, programmers spend time and effort in the comprehension of programs and that is due to the fact that the documentation is often incomplete, inconsistent and outdated. In order to avoid these problems, software could be re-documented. Software re-documentation enables the understanding of software that aids the support, maintenance and evolution of software. Re-documentation is implemented by different approaches. Reverse engineering is one of these approaches that provide a better understanding of an existing system by maintainers and developers, especially when faced by a large and evolving legacy system. This study proposes a framework for systems re-documentation based on reverse engineering approach. The re-documentation is done using a reverse engineering tool that generates graphical representations of a system which are then used to produce documentation in the form of a standard document UML notation. Since, the quality of the generated documentation is important for program understanding and software evolution, the study also proposes a model for evaluating the quality of the generated documentation. The Documentation Quality Model (DQM) was validated and result of the evaluation showed that the documentation generated using reverse engineering was usable, up-to-date and complete.

Keywords: reverse engineering; software re-documentation; code understanding; software maintenance; documentation quality model;
Available: A FRAMEWORK FOR SOFTWARE RE-DOCUMENTATION USING REVERSE ENGINEERING APPROACH by Nasrin Ismail Mohamed, Nisreen Beshir Osman is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

A REVIEW OF ADOPTION OF E-LEARNING IN MIDDLE EAST COUNTRIES

Authors:

Asmala Ahmad, Ali Fahem Nemeah, Hassan Mohammed

Abstract:

E-learning has provided men with new opportunities in teaching-learning procedures. A historical review of educational systems literature reveals that e-learning has spread out among people much faster than any other learning methods. E-learning, as a state-of-the-art technology, has caused great innovations in materials development in those societies in which new methods and procedures could hardly ever been accepted. Technological innovations and the development of telecommunications such as Television Stations and Channels, Satellites, Mobile, and Internet have made it possible for the children and teenagers in the Middle East to access to the latest news and information. Of course, these developments have endangered both political and educational systems in some aspects. The present paper while pointing to some of the recent developments in the field of e-learning in the Middle East, tries to examine the political and educational systems reactions to this phenomenon.

Keywords: e-learning ; technology; culture; learning; higher education; educational systems;
Available: A REVIEW OF ADOPTION OF E-LEARNING IN MIDDLE EAST COUNTRIES by Asmala Ahmad, Ali Fahem Nemeah, Hassan Mohammed is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

DNA-BASED CRYPTOGRAPHY: MOTIVATION, PROGRESS, CHALLENGES, AND FUTURE

Authors:

A.E. El-Moursy, Mohammed Elmogy, Ahmad Atwan

Abstract:

Cryptography is about constructing protocols by which different security means are being added to our precious information to block adversaries. Properties of DNA are appointed for different sciences and cryptographic purposes. Biological complexity and computing difficulties provide twofold security safeguards and make it difficult to penetrate. Thus, a development in cryptography is needed not to negate the tradition but to make it applicable to new technologies. In this paper, we review the most significant research, which is achieved in the DNA cryptography area. We analysed and discussed its achievements, limitations, and suggestions. In addition, some suggested modifications can be made to bypass some detected inadequacies of these mechanisms to increase their robustness. Biological characteristics and current cryptography mechanisms limitations were discussed as motivations for heading DNA-based cryptography direction.

Keywords: DNA; cryptography; encryption; DNA computing; bio-inspired cryptography;
Available: DNA-BASED CRYPTOGRAPHY: MOTIVATION, PROGRESS, CHALLENGES, AND FUTURE by A.E. El-Moursy, Mohammed Elmogy, Ahmad Atwan is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

BIG DATA AND DATA QUALITY DIMENSIONS: A SURVEY

Authors:

Onyeabor Grace Amina, Azman Ta’a

Abstract:

Data is a vital asset in virtually all types of organizations. These days data or information acquired from data analysis is the basis of decision making in various businesses or organizations in general and this offers numerous benefits by building accurate and dependable process. The degradation of its quality has erratic consequences resulting to wrong insights and decisions. Moreover, these are the days of Big Data (BD) which comes with varieties of vast amount of unprecedented data with unknown quality which makes its Data Quality (DQ) evaluation very challenging. DQ is therefore critical for the processes of data operations and management in order to detect associated performance problems. Besides, data of high quality has the ability to attain top services within an organization through enlarged prospects. Nonetheless, recognising different characteristics of DQ from its definition to the different Data Quality Dimensions (DQDs) are crucial for equipping methods and processes for the purpose of improving DQ. This paper focuses on the review of BD and the most commonly used DQDs for BD which are basis for the assessment and evaluation of the quality of BD.

Keywords: big data; data quality; data quality dimensions; big data auality
Available: BIG DATA AND DATA QUALITY DIMENSIONS: A SURVEY by Onyeabor Grace Amina, Azman Ta’a is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

AN EVOLUTIONARY-BASED ADAPTIVE NEURO-FUZZY EXPERT SYSTEM AS A MARRIAGE COUNSELLOR USING ASTROLOGY SCIENCE

Authors:

Seyed Muhammad Hossein Mousavi

Abstract:

Divorce rate is increasing around the globe. The result of such a phenomenon could be a criminal one for coming generations. Too many ways, to decrease this phenomenon, are employed during times and some of them lead to success and some of them to failure. By using expert systems, human errors reduce. In this paper a new way to divorce rate reduction is proposed. Combining astrology science with artificial intelligence techniques could make a decent automatic expert system for this purpose. The main idea is just to order everything based on couples’ birthday chart but according to Vedic astrology. Using such an expert system as an assistant or even replacement for family counsellor could have good effects. In this approach wealth and money and other things doesn’t matter and the only thing which matters is the way of thinking that is achievable through astrology. This expert system proposed three classes of “do marry” in the case of (+60 %) compatibility, “do not marry” in the case of (-40 %) compatibility and “marriage with caution” class in the case of (50 ± 10 %) compatibility. The data has been trained and tested with different Meta-heuristic optimization algorithms like (ACO, DE, PSO and GA) and neural network training methods like (Hybrid and back-propagation). Error factors like (MSE, RMSE, Error Mean and Error STD) are calculated for each one of these approaches as validation results. Very satisfactory results were achieved. Dream to a perfect life for all couples in the globe and decreasing divorce rate into zero.

Keywords: divorce; expert system; astrology; optimization algorithm; neural network
Available: AN EVOLUTIONARY-BASED ADAPTIVE NEURO-FUZZY EXPERT SYSTEM AS A MARRIAGE COUNSELLOR USING ASTROLOGY SCIENCE by Seyed Muhammad Hossein Mousavi is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF


Archive

Volume 4:
Issue 1   New
Volume 3:
Issue 3
Issue 2
Issue 1
Volume 2:
Issue 3
Issue 2
Issue 1
Volume 1:
Issue 2
Issue 1
Journal PicsCaomei Publishers © 2016-2019
f t