Volume 6, Issue 1, January 2015

Detection of Epileptic Spike Patterns on EEG Signal of Epilepsy Patients with Wavelet Transform Method
Pages: 1-6 (6) | [Full Text] PDF (551K)
Endro Yulianto, Endang Dian S. and Sari Luthfiyah
Electromedical Engineering Department, Polytechnic of Health Surabaya, Ministry of Health of the Republic of Indonesia

Abstract -
Epilepsy is a disorder that occurs as such excessive not controlled from some or all central nervous system. Epilepsy is characterized by entering transient voltage to wave (spike and sharp wave) that are usually called epileptic spike. Detection and classifying of epileptic spike by using visual screening of EEG record is a work that complex and many time-consuming. This Research detect patterns epileptic spike in EEG signal of patients with epilepsy with the method wavelet transform through detection test result against gold standards using the detectability and selectivity. Types of wavelet that used in this research is Daubhecies 4, Coiflet 4, Mexican hat and Symlet 6. Wavelet Daubechies 4 produces the same value high of detectability and selectivity is 80% and 78.57% on the scale 9, Symlet 6 produces the 86.79% and 80.70% at scale 10, Coiflet 4 produces 83.02% and 78.57 % at scale 8, Mexican Hat produces 89.13% and 71.93% on the scale 3. Wavelet type Symlet 6 at scale 10 produces the detectability and selectivity, that is the best than 3 types of another wavelet.
 Index Terms - Epileptic Spike, Wavelet, Detectability and Selectivity
Medical Image Enhancement Application Using Histogram Equalization in Computational Libraries
Pages: 7-12 (6) | [Full Text] PDF (761K)
Mohamed Y. Adam, Mozamel M. Saeed and Al Samani A. Ahmed
King Saud University, Agency for Business Development, Dept. Training and Community Service Center, KSA
Salman Bin Abdul-Aziz University, Collage of Science, Dept. of Computer Science, KSA
Al Neelain University Collage of Computer Science and Information Technology, Dept. of Computer Science, Sudan

Abstract -
Medical images are one of the fundamental images, because they are used in more sensitive field which is a medical field. The main goal of this paper is to give a simple guideline to build small application in order to enhance the Medical images using histogram equalization technique in MATLAB, which is the strong and most popular program in Computational Libraries, and the histogram equalization implemented without using the function histeq( ).
 Index Terms - Computational Libraries, Contrast, Histogram Equalization, Image Processing and Medical Image Enhancement
Performance Analysis of Traffic Patterns over MANET Routing Protocols in Zigbee Personal Area Network
Pages: 13-19 (7) | [Full Text] PDF (872K)
Elmustafa Sayed Ali Ahmed, Ibrahim Khider Altahir, A. Alrhman Mohammed and Amani Dawod Salih
Electrical and Electronic Engineering Department, Red Sea University, Sudan
School of Electronics Engineering, Sudan University of Science and Technology, Sudan

Abstract -
Mobile ad hoc network is a network technique, which connects two or more mobile computers with each other without existence of a central point of contact, and without any network server, which is the role of each point, pass packets to other branches of the network. The proposed work is to attempt to identify the performance of data traffic patterns (CBR, FTP and POISSON) in Zigbee personal area networks (PAN) using MANET routing protocols (AODV, DSR and INTANTSENSE). Simulation and computations of data loss, overhead, throughput, PDR and delay done using NS2 simulator (Version 2.34) with parameter of quality of data and pause time.
 Index Terms - Routing Protocols, DSR, AODV, INTANTSENSE, Traffic Patterns, FTP, CBR, POISSON, Bluetooth Zigbee and WPAN
Security Issues Analysis on Online Banking Implementations in Nigeria
Pages: 20-27 (8) | [Full Text] PDF (459K)
Emeka Nwogu and McChester Odoh
Directorate of Information and Communication Technology, Michael Okpara University of Agriculture, Umudike, Umuahia, Abia state, Nigeria
Department of Computer Science, Michael Okpara University of Agriculture, Umudike Umuahia, Abia state, Nigeria

Abstract -
A study of the Nigerian internet banking system was conducted. The study analyzed the levels of internet banking with an in-depth analysis of their security needs and associated issues. A particular reference was made on the attacks and vulnerabilities in the current systems. Next, is an analysis of the current defense mechanisms and how successful they have been in counteracting the occurrence and effects of Internet banking attacks in Nigeria. We established from the study and research, that the current defense mechanisms have not been very effective, as they still have vulnerabilities which have been exploited by attackers severally.
 Index Terms - E-money, Automated Teller Machines, Internet Banking, E-banking and Online Banking