Volume 2, Issue 4, 2012

By | September 4, 2018

A Biometric Model for Examination Screening and Attendance Monitoring in Yaba College of Technology

Rufai M.M, Adigun J. O, N. A. Yekini
Department of Computer Technology, Yaba College of Technology.

Abstract —Examination malpractices have consistently remained a bane of Nigerian educational system. A common form of examination malpractices is the deliberate impersonation of the applicant. Part of the requirement of a credible examination is that the real applicants wrote the exams. Several steps have been taken to check this crime unabated. Some of the methods adopted are: the use of Identity card; the presence of invigilators to identify fake students; the allocation of sitting arrangement number that determines the hall where the student will write exam and the need to sign in and out on the attendance sheets. This research work proffers solution to the problem of student impersonation during exams. A biometric model is designed to identify every applicant at the point of entry into the examination hall. A biometric verification exercise is also conducted while the examination is going and at the point of submission of examination papers. The students’ attendance is captured automatically as their identity is verified on the biometric systems. The Biometric Access Control Techniques is explained. A model describing its application to examination screening and attendance monitoring is designed using denotational mathematics.

Keywords- Biometrics; Examination Malpractices; Attendance Monitoring.


A Generator of MVC-based Web Applications

Strahinja Lazetic, Instituto Superior Tecnico, Universidade Tecnica de Lisboa, Lisbon, Portugal.
Dusan Savic, Sinisa Vlajic, Sasa Lazarevic
The Faculty of Organizational Sciences, Belgrade University, Belgrade, Serbia.

Abstract— This paper presents a generator of Spring MVC-based web applications. The generator was designed using Freemarker template and HibernateTools toolset. The generated applications are fully functional web applications based on three tiers architecture and MVC software pattern. The structure of Spring web applications is explained in brief, while designed templates and their role in the process of code generation are elaborated in more detail. The generator was designed to show a possibility for fast development of a custom generator as a solution for specific  application requirements.

Keywords- applications generator; Spring; Freemarker; HibernateTools; MVC.


Electronic Payment Fraud Detection Techniques

Adnan M. Al-Khatib
CIS Dept. – Faculty of Information Technology, Jerash University, Jarash – Jordan.

Abstract— In this paper, we discuss the fraudulent transactions that occur in electronic payment systems. We evaluate various techniques that can be used in detecting fraudulent transactions of card-not-present payment systems. The presented evaluation based on the literature, and from our own studies for these techniques. It provides a basis for exploring the common ground between techniques and for analyzing experimental studies and scenarios in practice.

Keywords- Electronic Payment; Credit Card; Card-Not-Present; Fraud Detection; Data Mining; Machine learning; Neural Network; Expert System.


Ethical Communication in IT Project From an Islamic Perspective

Mohamed Nizam, Kulliyyah of Information & Communication Technology (KICT), International Islamic University, Malaysia (IIUM), Kuala Lumpur, Malaysia.
Alia Ahmed Aldossary, Kulliyyah of Information & Communication Technology (KICT), International Islamic University, Malaysia (IIUM), Kuala Lumpur, Malaysia.
Jamaludin Ibrahim
Kulliyyah of Information & Communication Technology (KICT), International Islamic University, Malaysia (IIUM), Kuala Lumpur, Malaysia.

Abstract—Interactive communication morals distinguish it from other methods of interaction morals by focused point for the association among information technology project team members. Official communications design is not focused in a minor portion of the information technology projects, and neither writing performance reports nor having a system of control over lessons learned frequent practices within organization. When the communication is not at the best relationship, interpersonal communication at all levels moves into another form of communicative interaction. The major objective of this paper is to identify the communicational obstacles and its impact on the information technology projects and suggest the best possible solution for these obstacles from the Islamic perspective. We assume that the knowledge that we pass through this paper would be beneficial for the future IT projects.

Keywords – Communication; ethics, Islamic perspective; information technology project.


Hybridization Between Iterative Simulated Annealing and Modified Great Deluge for Medical Clustering Problems

Anmar Abuhamdah, Department of Computer Science, Jearsh private university, Amman, Jordan.
Anas Quteishat, Department of Computer Engineering, Al- Balqa’ Applied University, Amman, Jordan.
Bassam M. El-Zaghmouri, Department of Computer Information Systems, Jearsh private university, Amman, Jordan.
Rawnaq Kittaneh, Department of Computer Science, University Kabangsaan Malaysia, Bangi, Malaysia.

Abstract—Clustering is a type of classification under optimization problems, which is considered as a critical area of data mining. Medical clustering problem is a type of unsupervised learning in data mining. This work present a hybridization between our previous proposed Iterative Simulated Annealing (ISA) and Modified Great Deluge (MGD) algorithms for medical clustering problems. The aim of this work is to produce an effective algorithm for partitioning N objects into K clusters. The idea of the hybridization between MGD and ISA is to incorporate the strength of one approach with the strength of the other hoping a more promising algorithm. Also this combination can help to diverse the search space. Experimental results obtained two way of calculating the minimal distance that have been tested on six benchmark medical datasets show that, ISA-MGD is able to outperform some instances of MGD and ISA algorithms.

Keywords- Clustering; Modified Great Deluge component; Iterative Simulated Annealing.


Swap Training: A Genetic Algorithm Based Feature Selection Method Applied on Face Recognition System

Ashkan Parsi, Department of Computer, Engineering and IT, Shahrood University of Technology, Shahrood, Iran.
Mehrdad Salehi, Computer Aided Medical Procedures, Technische Universität München, Munich, Germany.
Ali Doostmohammadi, Department of Computer, Engineering and IT, Shahrood University of Technology, Shahrood, Iran.

Abstract— This paper presents a new feature selection method by modifying fitness function of genetic algorithm. Our implementation environment is a face recognition system which uses genetic algorithm for feature selection and k-Nearest Neighbor as a classifier together with our proposed Swap Training. In each iteration of genetic algorithm for assessment of one specific chromosome, swaps training switch the training and test data with each other. By using this method, genetic algorithm does not quickly converge to local minimums and final recognition rate will be enhanced. Obtained results from implementing the proposed technique on Yale Face database show performance improvement of genetic algorithm in selecting proper features.

Keywords- face recognition; feature selection; principal component analysis; genetic algorithm; k-Nearest Neighbor classifier.

Leave a Reply

Your email address will not be published. Required fields are marked *