International Journal of Computer (IJC) <p>The <a title="International Journal of Computer (IJC) home page" href="/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener"><strong>International Journal of Computer (IJC)</strong></a> is an open access International Journal for scientists and researchers to publish their scientific papers in Computer Science related fields. <a title="International Journal of Computer (IJC)" href="/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> plays its role as a refereed international journal to publish research results conducted by researchers.</p> <p>This journal accepts scientific papers for publication after passing the journal's double&nbsp;peer review process.&nbsp; For detailed information about the journal kindly check <a title="About the Journal" href="/index.php/InternationalJournalOfComputer/about">About the Journal</a>&nbsp;page.&nbsp;</p> <p>All <a title="International Journal of Computer (IJC)" href="/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> published papers in Computer Science will be available for scientific readers for free; no fees are required to download published papers in this international journal.</p> <p>&nbsp;</p> en-US <p style="text-align: justify;">Authors who submit papers&nbsp;with this journal agree to the following terms:</p> <ol start="1"> <li class="show" style="text-align: justify;">Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a&nbsp;<a href="" target="_new">Creative Commons Attribution License</a>&nbsp;that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li> <li class="show" style="text-align: justify;">Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li> <li class="show" style="text-align: justify;">Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See&nbsp;<a href="" target="_new">The Effect of Open Access</a>).</li> <li class="show" style="text-align: justify;">By submitting the processing fee, it is understood that the author has agreed to our terms and conditions which may change from time to time without any notice.</li> <li class="show" style="text-align: justify;">It should be clear for authors that the Editor In Chief is responsible for the final decision about the submitted papers; have the right to accept\reject any paper. &nbsp;The Editor In Chief will choose any option from the following to review the submitted papers:A. send the paper to two reviewers, if the results were negative by one reviewer and positive by the other one; then the editor may send the paper for third reviewer or he take immediately the final decision by accepting\rejecting the paper. The Editor In Chief will ask the selected reviewers to present the results within 7 working days, if they were unable to complete the review within the agreed period then the editor have the right to resend the papers for new reviewers using the same procedure. If the Editor In Chief was not able to find suitable reviewers for certain papers then he have the right to reject the paper.</li> <li class="show" style="text-align: justify;">Author will take the responsibility what so ever if any copyright infringement or any other violation of any law is done by publishing the research work by the author</li> <li class="show" style="text-align: justify;">Before publishing, author must check whether this journal is accepted by his employer, or any authority he intends to submit his research work. we will not be responsible in this matter.</li> <li class="show" style="text-align: justify;">If at any time, due to any legal reason, if the journal stops accepting manuscripts or could not publish already accepted manuscripts, we will have the right to cancel all or any one of the manuscripts without any compensation or returning back any kind of processing cost.</li> <li class="show" style="text-align: justify;">The cost covered in the publication fees is only for online publication of a single manuscript.</li> </ol> (Dr. Mohammad Nasar) (Rabindra Corat Kayastha.) Tue, 16 Apr 2019 19:27:18 +0000 OJS 60 Survey on Emotion Recognition Using Facial Expression <p class="Els-Abstract-text">Automatic recognition of human affects has become more interesting and challenging problem in artificial intelligence, human-computer interaction and computer vision fields. Facial Expression (FE) is the one of the most significant features to recognize the emotion of human in daily human interaction. FE Recognition (FER) has received important interest from psychologists and computer scientists for the applications of health care assessment, human affect analysis, and human computer interaction. Human express their emotions in a number of ways including body gesture, word, vocal and facial expressions. Expression is the important channel to convey emotion information of different people because face can express mainly human emotion. This paper surveys the current research works related to facial expression recognition. The study attends to explored details of the facial datasets, feature extraction methods, the comparison results and futures studies of the facial emotion system.</p> Moe Moe Htay, Zin Mar Win Copyright (c) 2019 International Journal of Computer (IJC) Tue, 16 Apr 2019 19:28:20 +0000 Smart Touch Attendance Management System Using NFC Tag: Improving Learning Outcomes <p>Given the need to maximize information technology to optimize attendance management systems, based on its apparent shortcomings, the aim of the study is to develop, test, appraise and analyze a NFC tag automated attendance system in an educational learning environment to improve learning outcomes. We used unified modeling language, PHP and Aptana Studio to develop a system based on the Radio Frequency Identification (RFID) technology. It operates at 13.56 MHz and relies on ISO14443 and ISO 18092 for low level data exchange between two NFC devices to automate attendance, which can be used by educational institutions and other organizations for efficient, effective and sustainable attendance database management. It was discovered that variables such as time, cost, energy inherent in the use of traditional systems were not significant factors as they were optimized to add value to the organization. This work adds value to the management of organizations’ processes, people and product affording them opportunity to maximize time, cost, effort and energy.</p> Olorunfemi Temitope Oluwaseun, Aworinde Halleluyah Oluwatobi, Jesutoye Boluwatife Copyright (c) 2019 International Journal of Computer (IJC) Thu, 18 Apr 2019 09:08:57 +0000 Comparative Study for Text Document Classification Using Different Machine Learning Algorithms <p>Classification is a supervised learning method: the goal is finding the labels of the unknown object. In the real world, the tedious amounts of manual works are required to label the unknown documents. The system is initially trained by labeled documents by using one of the supervise machine learning algorithm and then applied trained model to predict the label of the unknown documents. The framework of text document classification consists of: input text document, pre-processing, feature extraction and classification. The analysis four common classification methods are performed: Naïve Bayes, Decision Tree, Support Vector Machine and K-nearest neighbors for text document classification. The main focus of this paper is to present comparative study of different exiting classification methods for text document classification. The experiment performed different classification methods on the Enron Email Dataset and measure classification accuracy, true positive, true negative, false positive and false negative to compare the performance of different classification methods.</p> Yin Min Tun, Phyu Hnin Myint Copyright (c) 2019 International Journal of Computer (IJC) Fri, 19 Apr 2019 20:41:32 +0000 Automatic Plant Detection Using HOG and LBP Features With SVM <p class="Els-Abstract-Copyright">Plants play a vital role in the cycle of nature. Plants are the only organisms which produce food by converting light energy from the sun. They also help in maintaining oxygen balance on earth by emitting oxygen and taking carbon dioxide. They have plenty of use in medicine and industry. But plant species are vast in number. To identify this large number of existing plant species in the world is a tedious and time-consuming task for a human. Hence, an automatic plant identification tool is very useful even for experienced botanists to identify the vast number of plants. In this paper, we proposed a technique to identify the plant leaf images. For training and testing, we used a publicly available dataset called Flavia leaf dataset. Histogram of Oriented Gradients (HOG) and Local Binary Pattern (LBP) are used to extract features and multiclass Support Vector Machine (SVM) is applied to classify the leaf images. We observed that the accuracy of HOG+SVM with HOG feature extraction using cells size of 2 x 2, 4 x 4 and 8 x 8 are 77.5%, 81.25% and 85.31 respectively. The accuracy of LBP+ SVM is 40.6% and the combination of HOG and LBP based features with SVM achieved 91.25% accuracy. The experimental results indicate the effectiveness of HOG+LBP with SVM over HOG+SVM and LBP+SVM techniques. </p> Mohammad Aminul Islam, Md. Sayeed Iftekhar Yousuf, M. M. Billah Copyright (c) 2019 International Journal of Computer (IJC) Sun, 28 Apr 2019 13:50:06 +0000 Review on Blockchain Technology for Healthcare Records <p class="Els-Abstract-text">For a long time, the healthcare system has been facing many problems such as incomprehensible doctor’s hand-writing, problematic retrieval of patient information and patients are unable to monitor their own data. In addition to that, there are problems afflicting the medical record systems such as how to share the medical data for various purposes without risking data privacy and security. Due to technology advancements, it is now possible to improve the current situations and to minimise these problems by providing more personalised services to the patients. This paper explains the interesting area of blockchain in healthcare, evaluating the blockchain technology from the multiple perspectives around healthcare data and explaining some platforms which could be used for the blockchain system development. Finally, the challenges of implementing the blockchain technology are deliberated. </p> Ekram Ahmed Ali Mirdah, Sokchoo Ng, Khiam Ping Chih Copyright (c) 2019 International Journal of Computer (IJC) Mon, 06 May 2019 08:30:35 +0000 A Synthesis Survey of Ontology Evaluation Tools, Applications and Methods to Propose a Novel Branch in Evaluating the Structure of Ontologies: Graph-Independent Approach <p class="Els-Abstract-text">Diverse tools, application and methods can logically be organized in clear categories (i.e., Gold standard, Application, Data-driven and Human assessment) or their dimensions (i.e., Functionality (task-based), Usability based and Structural evaluation). This paper attempts to propose a novel branch in structural analysis of ontology through analyzing current methods. Structural dimensions can be involved in evaluating ontologies when the research attempts to analyze the graph representation based on Conceptual Graph (CG). Two types of nodes (i.e., concepts and conceptual relations) can be merely linked with one another via logical conjunction. When logical conjunction between concepts and conceptual relations were removed, the remaining components would be independent domains which would no longer bear the meaning of graph. The separate concepts and conceptual relations cannot be involved in the notion of the graph-dependent approach. Thus, there is the lack of a novel branch in structural analysis which is called Graph-independent approach.</p> Maziar Amirhosseini, Juhana Salim Copyright (c) 2019 International Journal of Computer (IJC) Thu, 16 May 2019 07:31:07 +0000 Swarm Intelligence Based Feature Selection for High Dimensional Classification: A Literature Survey <p class="Els-Abstract-Copyright">Feature selection is an important and challenging task in machine learning and data mining techniques to avoid the curse of dimensionality and maximize the classification accuracy. Moreover, feature selection helps to reduce computational complexity of learning algorithm, improve prediction performance, better data understanding and reduce data storage space. Swarm intelligence based feature selection approach enables to find an optimal feature subset from an extremely large dimensionality of features for building the most accurate classifier model. There is still a type of researches that is not done yet in data mining. In this paper, the utilization of swarm intelligence algorithms for feature selection process in high dimensional data focusing on medical data classification is form the subject matter. The results shows that swarm intelligence algorithms reviewed based on state-of-the-art literature have a promising capability that can be applied in feature selections techniques. The significance of this work is to present the comparison and various alternatives of swarm algorithms to be applied in feature selections for high dimensional classification.</p> Thinzar Saw, Phyu Hnin Myint Copyright (c) 2019 International Journal of Computer (IJC) Thu, 16 May 2019 07:52:23 +0000 A Study on Image Forgery Detection Techniques <p>In this contemporary world, digital image plays a vital role in several application areas. Image forgery means that handling of the digital image to hide some significant or helpful information of the image. The aim of this study is to provide the knowledge of image forgery and its detection techniques for the new researchers.<strong></strong></p> Shijo Easow, Dr. L. C. Manikandan Copyright (c) 2019 International Journal of Computer (IJC) Fri, 24 May 2019 08:06:06 +0000