Learn More
Patient health record (PHR) is a rising patient centric model which is frequently outsourced to store at third party. This addresses the issue in privacy such as hiding the sensitive health data of a patient which can be assessed by unauthorized users. In this paper, a new secured e-health framework has proposed. In this framework, patient centric personal(More)
This paper presents a SIFT-based geometrically computational approach to vigorously recognize Bangla sign language (BdSL). Gaussian distribution and grayscaling techniques are applied for image processing and normalizing the sign image. After this pre-processing, features are extracted from the sign image by implementing scale invariant feature transform.(More)
Association Rule Mining (ARM) includes one of the most popular algorithms called Apriori Algorithm (AA) in it. AA has some limitations and areas for improvement related to the execution time consumption. The extended AA has some improvements based on the existing algorithm AA. The main findings indicate that not much has been done in an educational data(More)
Face detection and tracking have wide applications, for example, law enforcement, gaming, image search, marketing, etc. The detection and tracking tasks are quite challenging. Tracking the face in an image includes gender identification and segmenting the face using the skin color. In the past, many methods have been proposed to identify a face in videos,(More)
Some individuals who have the disability of the limbs cannot use the computer with their limbs. This paper is aimed to propose a new robust method for the implementation of the camera mouse for such disabled people. This method consists of the face recognition and extraction of user eyes location. The experiment is conducted to verify the results that were(More)
This pilot paper presents a newly enhanced Model of Game-Based Learning (GBL) for English learners in high school. The extension was made based on modified GBL integration steps. The presented model also incorporated the results of the impact of GBL on English skill performance and a survey on teachers' perceptions of using GBL in English teaching and(More)
A username and password based login mechanism is commonly used for authenticating a user in online environments. It is a popular scheme because it helps to balance the usability and security traits of the system. However, online environments and pervasive computing may bring many risks through adversaries. Shoulder-surfing attack is one of the risks where(More)
Agile software development methods have emerged to Australian organizations in recent years. This paper is a survey of agile method employments found in information technology industries, educational courses and research programs. The survey aims to collect, compare, analyze and determine the movement of agile methods in several countries and focuses on(More)
A large variety of problems in digital system design, com-binational optimization and verification can be formulated in terms of operations on Boolean functions. Minimizing the Average Path Length (APL) in Binary Decision Diagrams (BDDs) can reduce the evaluation time of Boolean functions represented by these BDDs. This paper presents a novel method to(More)