{"title":"Privacy-Preserving Personal Health Record (P3HR): A Secure Android Application","authors":"Saeed Samet, Mohd Tazim Ishraque, Anupam Sharma","doi":"10.1145/3220267.3220271","DOIUrl":"https://doi.org/10.1145/3220267.3220271","url":null,"abstract":"In contrast to the Electronic Medical Record (EMR) and Electronic Health Record (EHR) systems that are created to maintain and manage patient data by health professionals and organizations, Personal Health Record (PHR) systems are operated and managed by patients. Therefore, it necessitates increased attention to the importance of security and privacy challenges, as patients are most often unfamiliar with the potential security threats that can result from release of their health data. On the other hand, the use of PHR systems is increasingly becoming an important part of the healthcare system by sharing patient information among their circle of care. To have a system with a more favorable interface and a high level of security, it is crucial to provide a mobile application for PHR that fulfills six important features: (1) ease the usage for various patient demographics and their delegates, (2) security, (3) quickly transfer patient data to their health professionals, (4) give the ability of access revocation to the patient, (5) provide ease of interaction between patients and their circle of care, and (6) inform patients about any instances of access to their data by their circle of care. In this work, we propose an implementation of a Privacy-Preserving PHR system (P3HR) for Android devices to fulfill the above six characteristics, using a Ciphertext Policy Attribute Based Encryption to enhance security and privacy of the system, as well as providing access revocation in a hierarchical scheme of the health professionals and organizations involved. Using this application, patients can securely store their health data, share the records, and receive feedback and recommendations from their circle of care.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132554954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A RESTful Architecture for Portable Remote Online Experimentation Services","authors":"Mohanad Odema, I. Adly, A. El-Baz, H. Amin","doi":"10.1145/3220267.3220280","DOIUrl":"https://doi.org/10.1145/3220267.3220280","url":null,"abstract":"In this paper, an architecture is proposed to deliver portable remote online experimentation services. This can benefit the educational and academic sectors in terms of providing remote online accessibility to real experiment setups. Thus, the users can be relieved from geographical and time dependence for the experiment to be conducted. Nowadays, almost all web services leverage the efficiency and prevalence of the REST (Representational State Transfer) architecture. Hence, this proposed remote online service has been implemented in compliance with the RESTful architectural style.\u0000 Web-based experiments require compatibility with any of the users' portable devices and accessibility at any time. A RESTful architecture can fulfill these requirements. In addition, different experiments can be made available online based on this architecture while sharing the same infrastructure. A case study has been selected to obtain measurements of different force components existing inside wind tunnels. The complete implementation of this system is provided starting from the embedded controller retrieving sensor measurements to the web server development and user interface design.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129010332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Interactive Mixed Reality Imaging System for Minimally Invasive Surgeries","authors":"S. El-Seoud, Amr S. Mady, E. Rashed","doi":"10.1145/3220267.3220290","DOIUrl":"https://doi.org/10.1145/3220267.3220290","url":null,"abstract":"In orthopedic surgery, it is important for physicians to completely understand the three-dimensional (3D) anatomical structures for several procedures. With the current revolution in technology in every aspect of our life, mixed reality in the medical field is going to be very useful. However, medicine has a visualization problem hindering how surgeons operate. The surgeons are required to imagine the actual 3D structure of the patient by looking at multiple 2D slices of the patients' body. This process is time consuming, exhausting and requires special skill and experience. Moreover, patients and surgeons are exposed to extra x-ray doses.\u0000 Therefore, it is important to provide the surgeon with a better way to diagnose the patient; a way that is more accurate and locates where the problem is in a faster and more efficient manner. Medical imaging systems usually provide 3D images that can guide interventional clinical procedures. However, it is difficult to map the 3D anatomical structure with real objects. This project investigates and solves this problem by providing a mixed reality technology solution that merges the 3D image with real objects to facilitate the work progress of the surgeon. The proposed solution is an interactive mixed reality (MR) system for minimally invasive surgeries. The system is based on mapping the patient volume scan using computed tomography (CT) or Magnetic Resonance Imaging (MRI) to a 3D model of the patient's body. The rendered model can be used in MR system to view 3D human structures through a set of wearable glasses.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116898382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suhaib Khater, Oraib Al-Sahlee, Daoud M. Daoud, M. El-Seoud
{"title":"Clickbait Detection","authors":"Suhaib Khater, Oraib Al-Sahlee, Daoud M. Daoud, M. El-Seoud","doi":"10.1145/3220267.3220287","DOIUrl":"https://doi.org/10.1145/3220267.3220287","url":null,"abstract":"Clickbait is a term that describes deceiving web content that uses ambiguity to provoke the user into clicking a link. It aims to increase the number of online readers in order to generate more advertising revenue. Clickbaits are heavily present on social media platforms wasting the time of users. We used supervised machine learning to create a model trained on 24 features extracted from a dataset of social media posts to classify the posts into two classes. This method achieved an F1-score of %79 and area under ROC curve of 0.7. The method used highlights the importance of using features extracted from different elements of a social media posts along with the traditional features extracted from the title and the article. In this research, we prove that it is possible to identify clickbaits using all parts of the post while having minimum number of features possible.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Mobile Learning Platform at the British University in Egypt","authors":"I. Adly, M. Fadel, A. El-Baz, H. Amin","doi":"10.1145/3220267.3220279","DOIUrl":"https://doi.org/10.1145/3220267.3220279","url":null,"abstract":"In recent years, mobile technology has been rapidly developed and now plays an important role in education. Traditional course offerings are on the change towards M-Learning. However, such shift requires combined and integrated efforts from course planners, system designers, software developers, teachers, and students.\u0000 This paper introduces the design of an online M-Learning interactive teaching and learning platform that has been developed and deployed at the British University in Egypt (BUE). Different real cases of interactive learning applications have been designed, developed, integrated within the platform and evaluated by students. Feedbacks from students show promising results on different aspects; 1) significant improvement of engagement in the learning processes, 2) better understanding of abstract concepts through the visualization interactivity provided through the learning applications. In addition, students showed motivation to use this kind of ICT-based learning techniques in different subjects.\u0000 Although different types of applications have been developed and integrated within the platform, focus will be given on the design and implementation of interactive online tools where students can use calculations/simulations and visualization activities to better understand and even imagine the effect of different parameters on the behavior of targeted concept.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131700529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Fuzzy Logic in QCA for the Selection of Relevant IS Adoption Drivers in Emerging Economies","authors":"N. I. Alcivar, L. Houghton, L. Sanzogni","doi":"10.1145/3220267.3220285","DOIUrl":"https://doi.org/10.1145/3220267.3220285","url":null,"abstract":"This paper argues that typical adoption studies fail to capture the nuances and realities of emerging economies in Latin American (LAT) regions. Existing research has a long list of factors that are based on studies outside of the LAT region, which is a problem because there are almost no studies that capture the unique perspective of the LAT context. These issues, in turn, creates uncertainty because the context in LAT varies widely from the economies where most of these studies are conducted. To begin to address this problem, the authors used a Qualitative Comparative Analysis (QCA) using fuzzy logic to refine the selection of drivers obtained from earlier studies. The study revealed fourteen themes as being relevant candidate drivers for comparative future research purposes. It is argued that these results provide local stakeholders with a set of drivers relating to IS adoption within a specific context, namely in LAT economies and provide a contextual frame to develop more meaningful studies in LAT economies.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Computer-Aided Early Detection System of Pulmonary Nodules in CT Scan Images","authors":"Hanan M. Amer, F. Abou-Chadi, S. Kishk, M. Obayya","doi":"10.1145/3220267.3220291","DOIUrl":"https://doi.org/10.1145/3220267.3220291","url":null,"abstract":"In the present paper, computer-aided system for the early detection of pulmonary nodules in Computed Tomography (CT) scan images is developed where pulmonary nodules are one of the critical notifications to identify lung cancer. The proposed system consists of four main stages. First, the raw CT chest images were preprocessed to enhance the image contrast and eliminate noise. Second, an automatic segmentation stage for human's lung and pulmonary nodule candidates (nodules, blood vessels) using a two-level thresholding technique and a number of morphological operations. Third, the main significant features of the pulmonary nodule candidates are extracted using a feature fusion technique that fuses four feature extraction techniques: the statistical features of first and second order, Value Histogram (VH) features, Histogram of Oriented Gradients (HOG) features, and texture features of Gray Level Co-Occurrence Matrix (GLCM) based on wavelet coefficients. To obtain the highest classification accuracy, three classifiers were used and their performance was compared. These are; Multi-layer Feed-forward Neural Network (MF_NN), Radial Basis Function Neural Network (RB-NN) and Support Vector Machine (SVM). To assess the performance of the proposed system, three quantitative parameters were used to compare the classifier performance: the classification accuracy rate (CAR), the sensitivity (S) and the Specificity (SP). The developed system is tested using forty standard Computed Tomography (CT) images containing 320 regions of interest (ROI) obtained from an early lung cancer action project (ELCAP) association. The images consists of 40 CT scans. The results show that the fused features vector which resulted from GA as a feature selection technique and the SVM classifier gives the highest CAR, S, and SP values of99.6%, 100% and 99.2%, respectively.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124389336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marlina Abdul Latib, Saiful Adli Ismail, O. Yusop, Pritheega Magalingam, Azri Azmi
{"title":"Analysing Log Files For Web Intrusion Investigation Using Hadoop","authors":"Marlina Abdul Latib, Saiful Adli Ismail, O. Yusop, Pritheega Magalingam, Azri Azmi","doi":"10.1145/3220267.3220269","DOIUrl":"https://doi.org/10.1145/3220267.3220269","url":null,"abstract":"The process of analyzing large amount of data from the log file helps organization to identify the web intruders' activities as well as the vulnerabilities of the website. However, analyzing them is totally a great challenge as the process is time consuming and sometimes can be inefficient. Existing or traditional log analyzers may not able to analyze such big chunk of data. Therefore, the aim of this research is to produce an analysis result for web intrusion investigation in Big Data environment. In this study, web log was analyzed based on attacks that are captured through web server log files. The web log was cleaned and refined through a log-preprocessing program before it was analyzed. An experimental simulation was conducted using Hadoop framework to produce the required analysis results. The results of this experimental simulation indicate that Hadoop application is able to produce analysis results from large size web log files in order to assist the web intrusion investigation. Besides that, the execution time performance analysis shows that the total execution time will not increase linearly with the size of the data. This study also provides solution on visualizing the analysis result using Power View and Hive.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127903696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eslam Abou Gamie, M. El-Seoud, M. Salama, Walid B. Hussein
{"title":"Pedagogical and Elearning Logs Analyses to Enhance Students' Performance","authors":"Eslam Abou Gamie, M. El-Seoud, M. Salama, Walid B. Hussein","doi":"10.1145/3220267.3220289","DOIUrl":"https://doi.org/10.1145/3220267.3220289","url":null,"abstract":"This paper introduces a model to analyze and predict students' performance based on two dimensions; teaching style, and eLearning activities. Such data will be collected from educational settings within an academic institution. The analyzed data is used to reveal knowledge and useful patterns from which critical decisions could be made.\u0000 The suggested model should be able to:\u0000 • Classify modules according to their module nature\u0000 • Analyze different kinds of students' interaction with eLearning\u0000 • Classify teaching styles and pedagogical approaches and their effect on students' performance\u0000 • Classify students and their final grades according to their background and characteristics.\u0000 • Utilize different correlation analysis and feature selection techniques","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122489480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Ethnography in Agile Requirements Analysis","authors":"A. Meligy, Walid Dabour, Alaa S. Farhat","doi":"10.1145/3220267.3220273","DOIUrl":"https://doi.org/10.1145/3220267.3220273","url":null,"abstract":"The integration of ethnography analysis with agile methods is a new topic of the research of software engineering. In agile development, ethnography is particularly effective at discovering two types of requirements: the functions requested from customers and the functions observed from the ethnographic analyst. The proposed model depends on the role of ethnographic analyst in understanding how people operate actually and discover requirements that support software functionality. This help to predicts implicit system requirements that not defined by the organization. The proposed ethnographic model requires that the ethnographic analyst remain in the organization and observe the actual ways in which people work, rather than only the formal requirements documented by the organization.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126437696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}