Volume 9, Issue 6, November 2018

Movement of Interest Detection in Crowd Scenes
Pages: 1-4 (4) | [Full Text] PDF (173K)
Abdulrahman Alreshidi and Hina Afridi
College of Computer Science and Engineering, University of Ha'il, Ha'il, Saudi Arabia
COMSATS University, Wah Cantt, Pakistan

Abstract -
We introduce a novel method to detect movement of interest in crowd scenes. For this purpose, we consider regions of interest and discretize them into a number of patterns. Furthermore, we investigate a representative movement of key patterns to detect movement of interest. The investigation of region of interest and key patterns help in detecting movement of interest in both regular and irregular scenes. The experimental analysis on a standard dataset reveals the effectiveness of our method.
 Index Terms - Region of Interest, Key Patterns, Phase Correlation and Bayes Theorem
Offline Accessible System for Agricultural E-Commerce Using Unstructured Supplementary Services Data Application
Pages: 5-11 (7) | [Full Text] PDF (490K)
Ojo, A.K. and Ogundare, M. A.
Department of Computer Science, University of Ibadan, Nigeria

Abstract -
E-commerce has a major impact in the agricultural sector. The way people go about purchasing agricultural products and the way the farmers sell them are important. Sometimes, buyers have to travel far distances to get agricultural products and getting the right quality is not guaranteed. Various market prices cannot be compared because buyers do not have all the time and resources to visit every agricultural farm. Hence, the need for an offline accessible means of trading electronically which would help farmers and other buyers, make their appropriate business transactions online. This study is concerned with the application of Unstructured Supplementary Services Data Application (USSD) and Short Messaging Service to connect farmers to an e-commerce platform. Entity relationship model, use case diagram and Unified Modeling Language class diagram were used in the system design. The farmer accesses the offline service via a USSD short code (offline module) and they can then manage their crop inventory and other basic details. Their crop inventory is then synced to the online e-commerce platform for buyers to compare prices, view crop availability and order crops. The farmer can either accept or reject to do business with a buyer via SMS and the buyer will be notified in the All Orders section of the platform. The system helps to connect farmers that do not have smartphones and Internet access to an online marketplace thereby increasing their access to market.
 Index Terms - Information and Communication Technology, Unstructured Supplementary Services Data Application, Short Messaging Service, Farmers And E-Commerce
Comparison of Classification Models for Prediction of Heart Disease
Pages: 12-16 (5) | [Full Text] PDF (543K)
Mubbara Samreen
Department of Computer Sciences and Engineering, University of Engineering and Technology, Lahore, Pakistan

Abstract -
Data mining is used for extracting valuable information from a lot of data. The mostly used data mining strategies are clustering, classification and predicting a disease. In health-related issues data mining plays an important role for predicting the disease. Various tests are performed to diagnose a disease. The use of data mining techniques will lead researchers to the prediction of any disease. Nowadays heart disease is growing very rapidly. Many researches had done work on the topic of heart disease for last few years. In this paper we will use different techniques for the prediction of heart disease. The heart disease can be predicted using data mining techniques Naive Bayes, KNN, decision tree, ANN, support vector machine. For prediction the system uses BP, age, cholesterol level, gender, sugar level and some more attributes.
 Index Terms - Data Mining, Heart Disease, Classification, Neural Network and KNN
A Survey on Multicast Routing Protocol
Pages: 17-21 (5) | [Full Text] PDF (277K)
Haroon Khan
University of Engineering and Technology, Peshawar

Abstract -
MANET is a type of decentralized wireless network suited for a variety of ad-hoc applications. Its nodes reconfigure themselves from continuously to perform the desired task with optimum battery power. Multicasting supports group communication by utilizing bandwidth efficiently with increased reliability and reduced delay. This requires effective management of the nodes becoming members of the multicast group. Topology-wise, there are two main types of multicast routing protocols: tree-based protocols and mesh-based protocols with both are having proactive and reactive routing alternatives. We evaluate these protocols and highlight their respective pros and cons. We also suggest the suitable places of application for excellent use of these multicast routing protocols.
 Index Terms - Mobile Ad-Hoc Networks, Multicast Routing Protocols, Tree-Based Protocols and Mesh-Based Protocols
Critical Analysis of Existing Security Implications for Wireless Technology in IoT's Healthcare Domain
Pages: 22-35 (14) | [Full Text] PDF (234K)
Ayesha Kanwer
Department of Computer Sciences and Engineering, University of Engineering and Technology, Lahore, Pakistan

Abstract -
The term 'Internet of Things' (IoT) is one of the buzzwords in information technology. It is a technological innovation which can flourish the future of computing and telecommunications. In the IoT paradigm, the everyday real-life objects are transformed into intelligent virtual objects. This results in enormous data production which must be deposited, managed, executed and transmitted in a secure and effective way. There are various application areas of Internet of Things in which healthcare application is most famous. The increasing use of wireless sensors and identification technologies in healthcare domain has led the researchers to pay attention on new evolving technique called as Wireless Medical Sensor Network (WMSN). As with any developing technology, Internet of Things and its healthcare domain using WMSN has its issues and challenges. Security issue is one of the main challenges faced by Internet of Things. This paper reviews the technological revolution in healthcare domain of IoT and analyze the security requirements and possible attacks regarding healthcare application using WSN. Further, an extensive literature survey about the proposed solutions for secure healthcare applications is provided and also the problems which must be discussed in future for improving healthy and comfortable life style for children, old aged and continuously ill patients are presented. The main perspective is to provide the readers the opportunity of understanding what has been done (protocols, proposed solutions) and what issues still remain to be addressed in this evolutionary paradigm.
 Index Terms - Internet of Things (IoT), Healthcare, Wireless Sensor Network (WSN), Wireless Medical Sensor Network (WMSN) and Security Issues