{"title":"Web Based Student Registration and Exam Form Fill-up Management System for Educational Institute","authors":"Md. Tofail Ahmed, Md. Humaun Kabir, Sujit Roy","doi":"10.5815/ijieeb.2022.02.04","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.02.04","url":null,"abstract":"","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124993720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of Concept Mapping and Guided Discovery Instructional Strategies on Students’ Achievement in Redox Concept of Chemistry in Oyo State, Nigeria","authors":"A. Tella, T.A. Ogundiya","doi":"10.5815/ijieeb.2022.02.05","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.02.05","url":null,"abstract":": The study determined the effects of concept mapping and guided discovery instructional strategies on student’s learning achievement in Redox concept in Chemistry in Oyo State, Nigeria. The pretest-posttest control group quasi experimental design with 3x2 factorial matrix was adopted, while six schools with one intact class each; two each for experimental groups and two for control group were used. A total of 176 senior secondary school 2 Chemistry students participated in the study. A validated Chemistry Student Achievement Test (r = 0.77) was used for data collection, while Analysis of covariance and Bonferroni post hoc were used to analyze the data collected at 0.05 level of significance. There was a significant main effect of treatment (F (2, 175) =11.84; p<0.05, partial η 2 = 0.13) on student’s achievement. The participants in concept mapping strategy obtained the highest post achievement mean score (12.71), followed by guided discovery instructional strategy (9.24) and conventional strategy (8.60) groups. There was no significant main effect of gender on student’s achievement. There was no significant two- way interaction effect of treatment and gender on student’s achievement in Redox concept of chemistry. Concept mapping and guided discovery instructional strategies enhanced student’s achievement in Redox concept of chemistry. It is therefore recommended that chemistry teachers should adopt these strategies to improve student’s achievement in Chemistry. of concept in moderating effect of of on","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117046368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy","authors":"Alovsat Garaja Aliyev, R. Shahverdiyeva","doi":"10.5815/ijieeb.2022.02.02","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.02.02","url":null,"abstract":": The article examines the scientific and methodological basis of a comprehensive assessment of threats and damage to information systems of the digital economy. The information infrastructure and tasks of the digital economy have been defined. Sources of information security in the digital economy sectors and their information security requirements have been studied. The results of the analysis of the situation in the countries of the world on the Global Cyber security Index are shown schematically. The graph of the dynamics of cybersecurity expenditures in the ICT segments is shown. It is argued that cybersecurity, which is formed and developed through the use of digital systems, is a priority. Many goals and methods of cyber-attacks are given on the platform of the 4.0 Industrial revolution. Cases of information security violations in the digital economy and the processes of assessing the damage caused by them have been studied. Generalized criteria for assessing information damage in the digital economy have been proposed. Threats to information and communication systems and classification of damage are given. A structural scheme of the conceptual model of threats and damage to information systems and resources in the field of digital economy of Azerbaijan has been proposed. An expert description of the ways in which information threats are disseminated has been developed using a fuzzy approach. The main types of damage caused by threats to the security of information systems are given. The security aspects of the abundance and surplus of information in the digital economy are shown. The directions of increasing the level of security and confidence in the digital economy and the structures to ensure its security are given. The main directions of information security in the digital economy have been identified, the directions of ensuring its security and increasing its confidence have been identified. Commonly used universal base technologies have been proposed in the digital economy sectors. Some methodological approaches to integrated risk and damage assessment in the digital economy have been explored. A scientific-methodological approach based on fuzzy methods has been proposed for the implementation of complex risk and damage assessment in the digital economy. Generalized ICT-based Big artificial sustainable of Industry payment innovation","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130595010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hindrance to Requirements Engineering During Software Development with Globally Distributed Teams","authors":"Waqas Mahmood, Syed Shaharyar Rizvi, Siraj Munir","doi":"10.5815/ijieeb.2022.02.03","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.02.03","url":null,"abstract":": With the increase in the availability of skilled software engineers, the process of global software development is being increasingly adopted by organizations, at a relatively lesser cost. This has led to software processes being more viable in a progressive manner for several reasons that include better communication technologies and the levels of maturity seen in the software industry. That being said, Organizations that undertake the decision of adopting Global software development should realize that this process isn't exactly a risk-free action and there have been many failures reported with regard to it. The existing bools of globally distributed projects portray a number of challenges. During the interactive phase, the need for particular consideration towards the requirements of the client and the globally dispersed distributed software provider teams has been indicated. This paper makes use of surveys collected from IT professionals and people working in the software industry in order to present realistic insights gathered from them.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115725116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Secure Electronic Cybercrime Cases Database System for the Judiciary","authors":"Olawale Surajudeen Adebayo, Joshua Bulus Micah, Ganiyu Shefiu Olusegun, Ishaq O. Alabi, Lateefah Abdulazeez","doi":"10.5815/ijieeb.2022.01.01","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.01.01","url":null,"abstract":"The recent covid-19 pandemic created a barrier to every activity that needed physical interaction and involvement, especially in the judiciary. Careful research of some courts in Nigeria shown that case records are still been manually processed and stored and some courts operate a semi-digital and semi-manual processing pattern, which also has its own shortcoming of preprocessing manual records and converting them into digital records and physical presence is required to access court records. This research develops a secure electronic Cybercrime Cases Database System (eCCDBS), for prosecuted cybercrime in the judicial service in Nigeria. The system will provide an efficient method for collecting, retrieving, preserving, and management of court case records. The Rapid Application Development (RAD) methodology is used for the system development, because of its speed and time friendliness and can be easily restructured to meet the client's requirement at any point in time during the development life span. RAD can also present a prototype of the final system software to the client. Access control mechanism and secure password hashing were used to ensure the security of the system. The system was implemented and evaluated through deployment and found to have functioned according to the specification. The application subunits of records' creation, submission, modification, deletion, retrieval, and storage functioned effectively. Hence this system provides a secure online repository specifically for cybercrime case records that have elements of confidentiality, integrity and availability.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adamu Abubakar, A. Mishra, Aliyu Yahaya Badeggi, A. Abdulkadir
{"title":"USSD System for Monitoring and Management of Employee Leave in Higher Educational Institution","authors":"Adamu Abubakar, A. Mishra, Aliyu Yahaya Badeggi, A. Abdulkadir","doi":"10.5815/ijieeb.2022.01.04","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.01.04","url":null,"abstract":": Unstructured supplementary service data also referred to as feature code or quick code has become a monumental part of services and products offered by Telecommunication Operators, and its application to various areas of telecommunication and real-world scenarios. It is a protocol of communication utilized by global system for mobile communications cell phones to communicate with mobile telecommunication network operators and applicable to various areas of trend in modern information technology sectors such as Wireless Application Protocol browsing, mobile-money services, prepaid call back services, menu-based information services, location-based content services, paid content portal, voting surveys","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"69 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124840840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development \"Acep the Explorer\" an Educational Game Introduction Animal Ecosystem","authors":"Heny Pratiwi, Ita Arfyanti, Asep Nurhuda","doi":"10.5815/ijieeb.2022.01.02","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.01.02","url":null,"abstract":"Acep the Explorer is a game about animal ecosystem, this lesson is a must-know lesson for elementary school children who aim to introduce to children who are just beginning to know animals that are foreign to them, so that children can recognize the animals and place them according to their own ecology. Educational games are games designed or created to stimulate thought including increasing concentration and problem solving. This game developed by multimedia development system, start form concept, design, until testing. AI development is also carried out in this game, we use a finite state automata to create enemies that annoy players The result of this research, an educational game about animal ecosystem and the children's response to the use of educational games know animals according to ecosystem is good, children can get to know animals according to their ecosystem. And the AI, the Finite state automata in this game makes the game more challenging, interesting and fun. Because in this game they can learn while playing games and face some obstacles and destroy the enemy hunting device and complete the game. This research contributes to combining AI technology with educational games to make students learning about animal ecosystems more interesting and challenging","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Recognition Using Histogram of Oriented Gradients with TensorFlow in Surveillance Camera on Raspberry Pi","authors":"Reza Andrea, N. Ikhsan, Zulkarnain Sudirman","doi":"10.5815/ijieeb.2022.01.05","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.01.05","url":null,"abstract":"The implementation of face recognition with TensorFlow deep learning uses the webcam as a surveillance camera on the Raspberry Pi, aiming to provide a sense of security to the requiring party. A frequent surveillance camera problem is that crimes are performed at certain hours, the absence of early warning features, and there is no application of facial recognition on surveillance cameras. The function of this system is to perform facial recognition on every face captured by the webcam. Use the Histogram of the Oriented Gradient (HOG) method for the extraction process of deep learning. The image that is input from the camera will undergo a gray scaling process, then it will be taken the extraction value and classified by deep learning framework with TensorFlow. The system will send notifications when faces are not recognized. Based on the analysis of the data is done, the conclusion that the implementation of face recognition is built on the Raspberry Pi using a Python programming language with the help of TensorFlow so that the training process of the sample is much faster and more accurate. It uses a Graphical User Interface (GUI) as the main display and is built using Python designer, using email as an initial warning delivery medium to the user as well as using the webcam as the main camera to capture image.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133471723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akaninyene Udo Ntuen, John Edet Efiong, E. Ogwo, Edward O. Uche-Nwachi
{"title":"An Improved Framework of Healthcare Supports System for the Treatment of Dementia Cases","authors":"Akaninyene Udo Ntuen, John Edet Efiong, E. Ogwo, Edward O. Uche-Nwachi","doi":"10.5815/ijieeb.2021.06.04","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.06.04","url":null,"abstract":"This research proposes an improved framework that would support the healthcare services and attention given to dementia patients. The paper shows the design and implementation of a web-based application that demonstrates the proposed framework. This study was necessitated by the observed flaws and weaknesses in the current manual technique of handling dementia cases in care homes which are plagued with loss of records, time wastage in retrieving records, data insecurity, user entry and data management errors, among others. The system design was realized using the unified modeling language (UML) on EdrawMax. The frontend implementation was done using HTML5, CSS3, and JavaScript, while the business logic was achieved using PHP, and the Database was designed with MySQL and managed through PHPMyAdmin. The system was tested by medical practitioners and dementia patients in a select care home. Other tests on browsers’ compatibility and platform interoperability were successful. The result of the study advances technical knowledge in developing medical expert systems using web 2.0 technologies, and promotes academic inquiry in the domain. The demonstration of the framework shows an improvement on the existing techniques which use quasi-automated approach. The proposed model is suitable for supporting efficient management of data of dementia patients.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}