Journal of Software Engineering & Intelligent Systems

ISSN: 2518-8739 (Online)
AUGUST 2018 | VOLUME. 3  ISSUE. 2
Title:

COMPUTERIZED SYSTEM DESIGN FOR THE DETECTION AND DIAGNOSIS OF LUNG NODULES IN CT IMAGES

Authors:

Ali Abdrhman Ukasha, Emhmed Saaid Alfakhry, Rasim Amir Ali, Mabrukah Edrees Fadel

Abstract:

In recent years, image processing techniques have become widely used in many medical fields to improve image quality in early detection and treatment stages, as time is a very important factor to detect and detect abnormal cells in the target image, especially in many cancerous tumors such as lung cancer, breast cancer, and many more. In this paper, a method was proposed to detect and diagnose lung nodes (malignant and benign) from CT images. The detection stage is divided into two parts: - 1) The first part is obtained by the lung image of the CT-SCAN image of the chest area, lung using the vehicle-related learning algorithm (CCL) and a number of morphological processes, 2) The second part involves obtaining the lung nodules using the properties of the anatomical characteristics and then using the characteristics of the shape (geometric characteristics) of the lung nodules. The diagnosis of the nodules (identification of benign and malignant nodules) was based on the characteristics of the edges of the discovered nodules. The MATLAB programming language was used to design the algorithm for the proposed method, and an easy-to-use graphical interface was designed to display the results to the user. Experimental results show that the system accuracy exceeds to the 77.27% for the 22 tested CT scan images.

Keywords: lung nodules detection; thresholding, morphological processes; CCL, nodules features extraction; computer-aided design (CAD); tumor metastasis; CT scan;
Available: COMPUTERIZED SYSTEM DESIGN FOR THE DETECTION AND DIAGNOSIS OF LUNG NODULS IN CT IMAGES by Ali Abdrhman Ukasha, Emhmed Saaid Alfakhry, Rasim Amir Ali, Mabrukah Edrees Fadel is available under cc by-nc 4.0 License Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

OVERVIEW ON AGILE REQUIREMENT ENGINEERING: PRACTICES, TECHNIQUES AND CHALLENGES

Authors:

Mahdi Mousaei, Taghi Javdani Gandomani

Abstract:

Requirement engineering (RE) is one of the important phases of development life cycle. Many software projects are failed because that was made without enough requirements information. RE is one of a process of customer services which have to expect customer from a system. Correct executions of engineering requirements caused to reduce the cost of software projects. In the agile methods unlike traditional methods, RE agrees with the change of new requirements. In this research, a survey, about practices, techniques, challenges, and activities, is conducted in agile requirement engineering. Moreover, this survey compares traditional RE and agile RE in different aspects.

Keywords: agile requirement engineering; agile development; requirement engineering; RE challenges; RE techniques; RE practices;
Available: OVERVIEW ON AGILE REQUIREMENT ENGINEERING: PRACTICES, TECHNIQUES AND CHALLENGES by Mahdi Mousaei, Taghi Javdani Gandomani is available under cc by-nc 4.0 License Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

BINARY IMAGE DATA COMPRESSION AND ENCRYPTION APPROACH USING ARITHMETIC CODING AND TRAPEZOID METHOD FOR CONTOUR APPROXIMATION

Authors:

Ali Abdrhman Ukasha , Mohammed Abdullah S. Hassan , Mohamed Nuri Hussin

Abstract:

This paper presents a new algorithm of image compression that reduces number of bytes required to represent images which are useful in those applications where original image can be retrieved without distortions. Arnold transform is applied for scrambling data to prevent eavesdropping and jamming, reduce interference; increase immunity from various noise and multipath distortions. This work deals with data storage reduction and high-speed transmission in digital communication systems. In the proposed scheme, contour data is compressed with both lossless and lossy techniques using Arithmetic coding (source coding) and Trapezoid contour approximation method respectively. In channel coding we choose the Trellis diagram as convolutional coding. We are going to choose a method depending on one of the spread spectrum technique types which is direct sequence spread spectrum (DSSS). The experimental results are conducted and compared against M-QAM to find the better approach under various performance measures such as Mean Square Error (MSE), Compression Ratio (CR), Normalized Correlation coefficient (NCC), and Signal to Noise Ratio (SNR). Experimental results show that the contours of the original binary image can be compressed by using arithmetic coding and Trapezoid method exceeded to 85% and 17% respectively. The NCC values for the reconstructed binary image exceeds to 0.97 for some images. Options for double compression mode, make the proposed scheme attractive for wireless communications systems. The experiments show that the analyzed algorithm reconstructs the image contours exactly with NCC equals to 1. The main advantage of the analyzed digital communication system algorithm is that it uses only few contour points (compressed) instead of huge number of binary image which can be reconstructed perfectly at the receiver with high quality where NCC values approach to 1 in some binary images. This analyzed method is very useful for real time application.

Keywords: trapezoid method; arithmetic coding; arnold transform map; contour extraction; channel coding, QAM modulation; spread spectrum;
Available: BINARY IMAGE DATA COMPRESSION AND ENCRYPTION APPROACH USING ARITHMETIC CODING AND TRAPEZOID METHOD FOR CONTOUR APPROXIMATION by Ali Abdrhman Ukasha , Mohammed Abdullah S. Hassan , Mohamed Nuri Hussin ia available under cc by-nc 4.0 License Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

IMPACT OF USER REQUIREMENTS ON HEALTH INFORMATION SYSTEMS (HIS) AND ADOPTION OF HIS IN DEVELOPING COUNTRIES

Authors:

Ebrahim Ghaleb,Ibrahim Mohamed

Abstract:

This study aims to explicate the strategic utilization of Information Systems (IS) in health sector of upmost significance as Health Information System (HIS). There is a fundamental role in improvement of IS and knowledge transfer, especially in developing countries and following of Millennium Development Goals (MDGs). HIS, despite of its importance for a secure access to patients' vital medical information among doctors, nurses, pharmacists, other healthcare providers, and the patients themselves, is still in its infancy in the developing countries. A number of barriers have been identified as the root cause of the problem, the most challenging of which is the lack of user requirements. Generally, the previous studies on HIS have not taken into account the factor of user requirements. Furthermore, to date, there is no comprehensive model available for the success of HIS, which takes the impact of user requirements factor in the developing countries into consideration. Thus, the present study addresses this gap by exploring the influence of user requirements factor on HIS in Yemen. Rapidly evolving technology transforms IS and information transfer significantly without the rapid pace of IS in the healthcare sector that leaves no support choice for service providers if they want to remain competitive. Human capital, an important element in the context of relationships with contemporary employees, is the most important competitive advantage in healthcare systems. Therefore, healthcare professionals need a new strategy for the public health sector and the training of their employees. Besides, the knowledge and skills of health professionals are not only vital components, but also essential for the quality of care and health of society. Therefore, these motivations mean that today's health care providers are embracing IS in the health sector.

Keywords: health Information system quality; user requirements; health information system; information system; developing countries;
Available: IMPACT OF USER REQUIREMENTS ON HEALTH INFORMATION SYSTEMS (HIS) AND ADOPTION OF HIS IN DEVELOPING COUNTRIES by Ebrahim Gahleb, Ibrahim Mohamed is available under cc by-nc 4.0 License Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

COST ESTIMATION IN GLOBAL SOFTWARE DEVELOPMENT

Authors:

Fariha Zahir Bukhari, Mariyam Sultana, Mishal Hussain

Abstract:

In Current world multiple organizations are using the methodology of Global Software Development (GSD) because it is a convenient technique for developing the software projects. Global software advancement serves as a vowed relation among the client and vendor companies. In such relation the client contracts out a part or complete development of the software to the vendor. As a response the vendor provides the services on which the agreement was made in lieu of the payment is made to the vendor as per agreed. GSD method is used because it offers the completion of project in less cost, quick development and the access to experienced resources. Even though GSD is coming out as a successful method but it has multiple difficulties which needs to be overcome such as bad communication, absence of faith and coordination among the team. Due to these challenges there is a significant risk factor in trouble free execution. Our results show that most of the focus in previous research in this area has been limited to highlighting the problems encountered by the client companies. The vendor side up to this time is not very mature because this aspect of GSD is not payed much attention.

Keywords: cost estimation; global software development; challenges; software risk; software quality; communication;
Available: COST ESTIMATION IN GLOBAL SOFTWARE DEVELOPMENT by Fariha Zahir Bukhari, Mariyam Sultana, Mishal Hussain is available under cc by-nc 4.0 License Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

AUTOMATED CHECKING OF ANDROID BASED EXAMINATION SCHEDULING OF IT FACULTY

Authors:

Ferdian Aditya Pratama, Christine Dewi

Abstract:

Exam scheduling is one of the key tasks in any educational institute. The implementation of technology in educational organizations can make such task much easier. The division of Final Task, at Faculty of Information and Technology Satya Wacana Christian University, determines the schedule of final exam. The division analyzes the same schedule between the reviewer, adviser, room, and the schedule of backup reviewer. The purpose of this research is to develop a mobile and web application-based solution for the schedule of final exam using the Phonegap framework and GCM service as a notification. The output of this research is a mobile application that helps lecturers and students to resolve scheduling issues.

Keywords: scheduling; phonegap; android platform; automation; google cloud messaging;
Available: AUTOMATED CHECKING OF ANDROID BASED EXAMINATION SCHEDULING OF IT FACULTY by Ferdian Aditya Pratama, Christine Dewi will be available under cc by-nc 4.0 License Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

AN UNSUPERVISED APPROACH FOR USER BEHAVIOUR CLUSTERING OF WEBSITES USING THE NAVIGATION PATTERNS OF WEB USERS

Authors:

Syed Tauhid Zuhori, James Miller

Abstract:

Web traffic and e-commerce activities are increasing rapidly day by day. Hence, understanding the behavior of users based on their interactions with a website is becoming important. Web usage mining is needed for that. It works on web clickstream data in order to extract usage patterns. There are two major challenges involved here: One is preprocessing the raw data to provide an accurate picture of how a website is used. Other is to present the rules and patterns that are potentially interesting to the users. This paper proposes and develops an architecture for performing that. Firstly, we clean the web server logs by using a traditional clustering approach. Then, we apply a Discrete Time Markov Chain approach to generate a model of the user behavior. For generating the nodes for the model, we use a technique (regular expressions) to find out the atomic propositions. Then we find a directed graph as an output of a DTMC inference process. Next, we apply spectral clustering on that directed graph, which works on the affinity of the graph nodes and divides the nodes into clusters. Finally, we use graph traversal algorithms and discover the navigation patterns of web users for each cluster. To evaluate the approach, we use server log files from the website www.ualberta.ca. This approach is very useful to simplify better web personalization and website organization. It automatically finds out clusters of usage patterns undertake by the users, and makes this data available to the web designer. Hence the web designer will know the interests of the user and this will help them to develop a more personalized space for users.

Keywords: website personalization; atomic propositions; Discrete time Markov chain inference process; navigation patterns; spectral clustering;
Available: AN UNSUPERVISED APPROACH FOR USER BEHAVIOUR CLUSTERING OF WEBSITES USING THE NAVIGATION PATTERNS OF WEB USERS by Syed Tauhid Zuhori, James Miller will be available under cc by-nc 4.0 License Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

COMPARATIVE ANALYSIS OF AGILE PRACTICES: XP VS SCRUM

Authors:

Sabia Salman, Bushra Nisar, Humaira Ashraf

Abstract:

Most of the organizations move towards agile processes, in order to take advantage from them, to produce quality software and higher customer satisfaction. SCRUM and Xtreme Programming (XP) are most popular agile methodologies. Both have their own merits and demerits. Therefore, a comparative analysis is conducted on the basis of survey held in Islamabad, Pakistan. The survey results express high adaptation of SCRUM in present days in Pakistan as compared to XP.

Keywords: agile methodology; agile software development; SCRUM; XP; agile manifesto; Xtreme programming;
Available: COMPARATIVE ANALYSIS OF AGILE PRACTICES: XP VS SCRUM by Sabia Salman, Bushra Nisar, Humaira Ashraf is available under cc by-nc 4.0 License Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

QUALITY MEASUREMENT OF AUTOMATIC TEXT SUMMARIZATION APPLICATIONS BASED ON WEB

Authors:

Firda Maryana, Ana Kurniawati

Abstract:

The large number of electronic text documents, makes too much information that required to be accessed quickly and does not take much time in retrieving the core of the text document. Automatic text summarization is one of the solutions to help users to find the core of electronic text documents in a short description or summary. There are some examples of automatic text summarization application based on web, it does not guarantee that every application has the same quality one and other. There are many parameters to measure the software quality. ISO 25010 parameter is one of the standards that can be used to measure software quality and is the latest standard in 2011. Measurement of software quality is done in two dimensions of product quality dimension and quality in use dimension. The steps done in this measurement include the adjustment of ISO 25010 quality model, weight determination of characteristics and sub-characteristics using AHP method and questionnaire, testing is done with black box testing and stress testing, and a questionnaire is used to measure characteristics of usability and quality in use. Based on the quality measurement results obtained that the SUMMRYKu application is better than Autosummarizer applications.

Keywords: automatic text summarization; Autosummarizer; ISO 25010; measurement; SUMMARYKu; quality model;
Available: QUALITY MEASUREMENT OF AUTOMATIC TEXT SUMMARIZATION APPLICATIONS BASED ON WEB by Firda Maryana, Ana Kurniawati will be available under cc by-nc 4.0 License Permissions beyond the scope of this license may be available at JSEIS.
Download PDF


Archive

Volume 4:
Issue 2   New
Issue 1
Volume 3:
Issue 3
Issue 2
Issue 1
Volume 2:
Issue 3
Issue 2
Issue 1
Volume 1:
Issue 2
Issue 1
Journal PicsCaomei Publishers © 2016-2019
f t