International Journal of Information Engineering and Electronic Business (IJIEEB)

ISSN: 2074-9023 (Print)

ISSN: 2074-9031 (Online)

DOI: https://doi.org/10.5815/ijieeb

Website: https://www.mecs-press.org/ijieeb

Published By: MECS Press

Frequency: 6 issues per year

Number(s) Available: 86

(IJIEEB) in Google Scholar Citations / h5-index

IJIEEB is committed to bridge the theory and practice of information engineering and electronic business. From innovative ideas to specific algorithms and full system implementations, IJIEEB publishes original, peer-reviewed, and high quality articles in the areas of information engineering and electronic business. IJIEEB is a well-indexed scholarly journal and is indispensable reading and references for people working at the cutting edge of information engineering and electronic business applications.

 

IJIEEB has been abstracted or indexed by several world class databases: Scopus, Google Scholar, Microsoft Academic Search, CrossRef, Baidu Wenku, IndexCopernicus, IET Inspec, EBSCO, VINITI, JournalSeek, ULRICH's Periodicals Directory, WorldCat, Scirus, Academic Journals Database, Stanford University Libraries, Cornell University Library, UniSA Library, CNKI Scholar, ProQuest, J-Gate, ZDB, BASE, OhioLINK, iThenticate, Open Access Articles, Open Science Directory, National Science Library of Chinese Academy of Sciences, The HKU Scholars Hub, etc..

Latest Issue
Most Viewed
Most Downloaded

IJIEEB Vol. 17, No. 3, Jun. 2025

REGULAR PAPERS

Classifying IoT Device’s Traffic Traces Using Network Traffic Characteristics

By Rajarshi Roy Chowdhury Debashish Roy Pg Emeroylariffion Abas

DOI: https://doi.org/10.5815/ijieeb.2025.03.01, Pub. Date: 8 Jun. 2025

The escalating proliferation of devices, including both Internet of Things (IoT) and non-IoT devices, has triggered a suite of emergent security challenges in cyberspace, such as accurate device identification and authentication. The wide array of device types, protocols, and usability exacerbates these challenges. While conventional addressing schemes such as the logical Internet Protocol addressing and physical Media Access Control addressing schemes are integral for communication, they are susceptible to spoofing attacks. Device fingerprinting can be used to address the issue of identifying devices and traffic types using only implicit identifiers such as network traffic characteristics. In this paper, supervised machine learning based a device fingerprinting model has been proposed for the classification of both IoT and non-IoT devices on three levels based on their communication traffic characteristics. A meticulous feature selection process, employing two attribute evaluators, identified a subset of twenty features crucial for generating unique fingerprints from a large set of features pool. Three publicly available datasets and two supervised classifiers were utilized for evaluation purposes. Experimental results illustrated that the proposed model attained a classification accuracy exceeding 99% in discerning between known and unknown traffic traces (Level-1) on both the UNSW IoT and D-Link IoT datasets using the Random Forest (RF) classifier, and 99.74% accuracy in classifying network traffic types (Level-2) on the UNSW dataset. Individual device identification (Level-3) proves equally robust, with the RF and J48 classifiers achieving 99.03% and 98.14% accuracies on the UNSW non-IoT and IoT datasets, respectively. These findings underscore the potential of the device fingerprinting model in enhancing network security. The model’s robust classification capabilities across various datasets and identification levels make it a valuable asset in tackling modern security challenges in networked environments.

[...] Read more.
Optimizing Credit Risk Assessment in Banking Human Resource Management: A Enhanced Humboldt Squid based Probabilistic Spiking Neural Networks with Shunted Self-Attention

By R. Sangeetha S. Sathish Kumar B. Sharmila P. Dency Mary

DOI: https://doi.org/10.5815/ijieeb.2025.03.02, Pub. Date: 8 Jun. 2025

The movement of capital, integration, distribution, and social supply and demand adjustment are all greatly aided by commercial banks; yet, integrating credit risk assessment is a difficult task for banking Human Resource Management (HRM). To overcome these issues, a novel credit risk assessment in HRM frameworks is done using the Enhanced Humboldt Squid based Probabilistic Spiking Neural Networks with Shunted self-attention (EHSPNN-SSA) method is proposed. Initially, the input commercial bank datasets are taken from General Data Protection Regulation (GDPR) and Advanced Analytics of Credit Registry (AACR) Datasets. Then these data are pre-processes using Grid-Restricted Data Filtering Approach (GRDFA). After that, the data is extracted using Hybrid Absolute deviation factors (ADFs) class document frequency (CDF) (hyb ADF-CDF) based feature extraction method. Then these data are classified using Enhanced Probabilistic Spiking Neural Networks with Shunted self-attention (EPSNN-SSA) and optimized using the Humboldt Squid Optimization Algorithm (HSOA). The framework is validated using real-world banking data and compared to existing methods to demonstrate its efficacy in assessing credit risk and optimizing human resource management processes. The results show that the introduced approach performs better than previous approaches in a number of performance measures, including risky data accuracy (99.6%), non-risky data accuracy (99.7%), and risky data accuracy (99.4%) for dataset 1 and dataset 2, respectively. This indicates the method's exceptional effectiveness and room for advancement in the field.

[...] Read more.
Sustainable Approach to Data Security: Multi-Key Biometric Encryption and Cloud Storage for SDG-Focused Businesses

By Mukesh Kumar Vivek Bhardwaj Karan Bajaj Nandini Modi Ahmed Qtaishat

DOI: https://doi.org/10.5815/ijieeb.2025.03.03, Pub. Date: 8 Jun. 2025

This paper presents the implementation and evaluation of a Multi-key Multi-modalities Biometric Encryption System designed for business enterprises, leveraging cloud storage for secure and scalable data management. The system integrates multiple biometric modalities fingerprint, iris scan, and face recognition to enhance data security through advanced multi-key encryption techniques, utilizing algorithms such as Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA). The encrypted biometric data is securely stored in the cloud, providing enterprises with efficient storage solutions. The system's performance was evaluated across several parameters including encryption/decryption time, biometric match accuracy, data transfer speeds, energy consumption, cost, and user satisfaction. The results demonstrate that multi-modal systems offer superior accuracy and security compared to single-modality systems, reducing error rates and enhancing reliability. However, multi-modal authentication incurs higher costs, energy consumption, and slightly longer processing times. Despite these trade-offs, the system achieved high user satisfaction, particularly in high-security environments where data protection is a priority. The findings indicate that the proposed system is a viable solution for businesses seeking a secure, scalable, and efficient method of protecting sensitive data.

[...] Read more.
Enhancing E-commerce Sentiment Analysis with Advanced BERT Techniques

By Nusrat Jahan Jubayer Ahamed Dip Nandi

DOI: https://doi.org/10.5815/ijieeb.2025.03.04, Pub. Date: 8 Jun. 2025

This study introduces an improved BERT-based model for sentiment analysis in several languages, specifically focusing on analyzing e-commerce evaluations written in English and Bengali. Conventional sentiment analysis techniques frequently face difficulties in dealing with the subtle linguistic differences and cultural diversities present in datasets containing multiple languages. The model we propose integrates sophisticated methodologies and utilizes Local Interpretable Model-agnostic Explanations (LIME) to enhance the accuracy, interpretability, and dependability of sentiment assessments in various language situations. To tackle the challenges of sentiment categorization in a multilingual setting, we enhance the pre-trained BERT architecture by incorporating extra neural network layers. Compared to traditional machine learning and current deep learning methods, the model underwent a thorough evaluation, showcasing its superior capabilities with accuracy, precision, recall, and F1-score of 0.92. Including LIME improves the model’s transparency, allowing for a better understanding of the decision-making process and increasing user confidence. This research highlights the potential of utilizing advanced deep learning models to address the difficulties of sentiment analysis in global e-commerce environments, providing major implications for both academic research and practical applications in industry.

[...] Read more.
DSNFyS: Deep Stacked Neuro Fuzzy System for Attack Detection and Mitigation in RPL based IoT

By Prashant Maurya Vandana Kushwaha

DOI: https://doi.org/10.5815/ijieeb.2025.03.05, Pub. Date: 8 Jun. 2025

The Routing Protocol for Low-Power and Lossy Networks (RPL) is a widely adopted protocol for managing and optimizing routing in resource-constrained Internet of Things (IoT) environments.  RPL operates by constructing a Destination-Oriented Directed Acyclic Graph (DODAG) to establish efficient routes between nodes. This protocol is designed to address the unique challenges of IoT networks, such as limited energy resources, unreliable wireless links, and frequent topology changes. RPL's adaptability and scalability render it particularly suitable for large-scale IoT deployments in various applications, including smart cities, industrial automation, and environmental monitoring. However, the protocol's vulnerability to various security attacks poses significant threats to the reliability and confidentiality of IoT networks. To address this issue, a novel deep-stacked neuro-fuzzy system (DSNFyS) has been developed for attack detection in RPL-based IoT. The proposed approach begins with simulating RPL routing in IoT, followed by attack detection processing at the Base Station (BS) using log data. Data normalization is accomplished through the application of min-max normalization techniques. The most crucial features are then identified through feature selection, utilizing information gain and Support Vector Machine-Recursive Feature Elimination (SVM-RFE). Attack detection is subsequently performed using DSNFyS, which integrates a Deep Stacked Autoencoder (DSA) with an Adaptive Neuro-Fuzzy Inference System (ANFIS). Upon detection of an attack, mitigation is carried out employing a DSA trained using the Hiking Optimization Algorithm (HOA). The proposed DSNFyS demonstrated exceptional performance, achieving the better accuracy of 97.41%, True Positive Rate (TPR) of 97.60%, and True Negative Rate (TNR) of 97.12%.

[...] Read more.
Agile Method: Challenges and Adaptations for Complex Project Environments

By Abdulmajeed Aljehani M. Rizwan J. Qureshi

DOI: https://doi.org/10.5815/ijieeb.2025.03.06, Pub. Date: 8 Jun. 2025

This paper conducts a comparative analysis of three widely adopted Agile methodologies: Scrum, Kanban, and Extreme Programming (XP). By examining their application across diverse software development environments, the study highlights each methodology's inherent strengths and explores their practical implications for managing complex, large-scale projects. Central to this investigation are the scalability challenges that become particularly pronounced in settings with extensive stakeholder groups and complex coordination needs. The research draws upon a robust literature review and case studies to identify these challenges, setting the stage for a discussion of innovative solutions aimed at refining Agile practices. While specific solutions are reserved for detailed treatment in the proposed solutions section, the abstract is written to underscore the critical need for scalable strategies that can adapt to the dynamic landscapes of modern project management. This comparative inquiry not only enriches the academic discourse on Agile methodologies but also serves as a vital resource for practitioners seeking to optimize their project management strategies in complex scenarios.

[...] Read more.
Agile Technology of Information Data Engineering for Intelligent Analysis of the Happiness Index and Life Satisfaction in Known World Cities

By Yuriy Ushenko Victoria Vysotska Daryna Zadorozhna Mariia Spodaryk Zhengbing Hu Dmytro Uhryn

DOI: https://doi.org/10.5815/ijieeb.2025.03.07, Pub. Date: 8 Jun. 2025

This paper presents the development of an intelligent information system for analysing the happiness index and life satisfaction based on sociological survey data from various countries. The research addresses the need to improve the accuracy and efficiency of social research by integrating data mining and machine learning methods – specifically K-means clustering and multiple regression analysis – into the system design. The proposed module enables automated classification of countries and cities by life satisfaction levels, allowing stakeholders to make informed decisions on urban planning and social policy. The system also facilitates the identification of favourable living environments, providing valuable insights into the social, economic, and environmental factors affecting well-being. The experimental results on real-world datasets confirm the module’s effectiveness and predictive capabilities.

[...] Read more.
PARADAJuan: A Web-Based Parking Lot Management System Designed and Developed Using Multi-Paradigm Programming Languages

By Ruth G. Luciano Angelito I. Cunanan Romualdo P. Mariano Edrain Nico A. Tavares Mark Reniel L. Jacinto

DOI: https://doi.org/10.5815/ijieeb.2023.03.05, Pub. Date: 8 Jun. 2023

This study aims to develop a web-based parking lot management system using multi-paradigm programming languages. This application is designed to help parking lot owners in monitoring the ins and outs of the parking spaces including the income they generated from it. The researchers used multi-paradigm programming languages where more than one programming paradigm was employed. This allows them to use the most suitable programming style and associated language constructs to build the system. Specifically, the researchers made use of the following languages in creating the system: HTML5, CSS3, JavaScript, PHP, MySQL, and Flutter. The study utilized developmental research methods in which the product-development process is analyzed and described, and the final product is evaluated. As a result, the creation of the system has been successful.

[...] Read more.
Diabetes Prediction: A Deep Learning Approach

By Safial Islam Ayon

DOI: https://doi.org/10.5815/ijieeb.2019.02.03, Pub. Date: 8 Mar. 2019

Nowadays, Diabetes is one of the most common and severe diseases in Bangladesh as well as all over the world. It is not only harmful to the blood but also causes different kinds of diseases like blindness, renal disease, kidney problem, heart diseases etc. that causes a lot of death per year. So, it badly needs to develop a system that can effectively diagnose the diabetes patients using medical details. We propose a strategy for the diagnosis of diabetes using deep neural network by training its attributes in five and ten-fold cross-validation fashion. The Pima Indian Diabetes (PID) data set is retrieved from the UCI machine learning repository database. The results on PID dataset demonstrate that deep learning approach design an auspicious system for the prediction of diabetes with prediction accuracy of 98.35%, F1 score of 98, and MCC of 97 for five-fold cross-validation. Additionally, accuracy of 97.11%, sensitivity of 96.25%, and specificity of 98.80% are obtained for ten-fold cross-validation. The experimental results exhibit that the proposed system provides promising results in case of five-fold cross-validation.

[...] Read more.
Two Proposed Models for Securing Data Management for Enterprise Resource Planning Systems Using Blockchain Technology

By Nafiz Ahmed Anik Kumar Saha Mustafa Ahmad Arabi Sheikh Talha Jubayer Rahman Dip Nandi

DOI: https://doi.org/10.5815/ijieeb.2023.06.02, Pub. Date: 8 Dec. 2023

An Enterprise Resource Planning (ERP) system is a software application that serves as a centralized platform to streamline and automate organizational functions and share real-time data, facilitating efficient communication and collaboration. It provides an all-inclusive approach to managing and optimizing business processes, boosting efficiency, fostering cooperation, and giving an overall picture of how the organization is operating. However, the traditional centralized databases in ERP systems pose security concerns. Blockchain Technology can be an appealing alternative as it comes with immutable and decentralized data as well as enhanced security. This study focuses on two methods of securing data management in ERP systems: Organizing the distributed information using The Ralph Kimball data model and optimizing an individual block using Database Sharding. This study does an extensive examination to determine the effectiveness of both suggested strategies, comprising a detailed evaluation that highlights the benefits and limitations of both techniques. This paper intends to patch the security holes in ERP systems to safeguard sensitive data and mitigate risks.

[...] Read more.
A Review of Applications of Linear Programming to Optimize Agricultural Solutions

By Alanoud Alotaibi Farrukh Nadeem

DOI: https://doi.org/10.5815/ijieeb.2021.02.02, Pub. Date: 8 Apr. 2021

Quantitative methods help farmers plan and make decisions. An apt example of these methods is the linear programming (LP) model. These methods acknowledge the importance of economizing on available resources among them being water supply, labor, and fertilizers. It is through this economizing that farmers maximize their profit. The significance of linear programming is to provide a solution to the existing real-world problems through the evaluation of existing resources and the provision of relevant solutions. This research studies various LP applications including feed mix, crop pattern and rotation plan, irrigation water, and product transformation; that have the main role to enhance various facets of the agriculture sector. The paper will be a review that will probe into the applications of the LP model and it will also highlight the various tools that are central to analyzing LP model results. The review will culminate in a discussion on the different approaches that help optimize agricultural solutions.

[...] Read more.
Sentiment Analysis of Review Datasets Using Na?ve Bayes‘ and K-NN Classifier

By Lopamudra Dey Sanjay Chakraborty Anuraag Biswas Beepa Bose Sweta Tiwari

DOI: https://doi.org/10.5815/ijieeb.2016.04.07, Pub. Date: 8 Jul. 2016

The advent of Web 2.0 has led to an increase in the amount of sentimental content available in the Web. Such content is often found in social media web sites in the form of movie or product reviews, user comments, testimonials, messages in discussion forums etc. Timely discovery of the sentimental or opinionated web content has a number of advantages, the most important of all being monetization. Understanding of the sentiments of human masses towards different entities and products enables better services for contextual advertisements, recommendation systems and analysis of market trends. The focus of our project is sentiment focussed web crawling framework to facilitate the quick discovery of sentimental contents of movie reviews and hotel reviews and analysis of the same. We use statistical methods to capture elements of subjective style and the sentence polarity. The paper elaborately discusses two supervised machine learning algorithms: K-Nearest Neighbour(K-NN) and Naïve Bayes‘ and compares their overall accuracy, precisions as well as recall values. It was seen that in case of movie reviews Naïve Bayes‘ gave far better results than K-NN but for hotel reviews these algorithms gave lesser, almost same accuracies.

[...] Read more.
Web Based Student Registration and Exam Form Fill-up Management System for Educational Institute

By Md. Tofail Ahmed Md. Humaun Kabir Sujit Roy

DOI: https://doi.org/10.5815/ijieeb.2022.02.04, Pub. Date: 8 Apr. 2022

Registration of new students’ academic information is essential for every educational institute to continue their education at every semester level and go through their whole student life. And this registration information is used when they do their form fill up of consecutive semesters. Nowadays, almost all educational institutes are using paper based registration and form fill up systems which is prone to many human errors and very time consuming for both students, teachers as well as other related administrative bodies. In this paper, we developed a web based application for academic purposes to control and save student registration and form fill up data that will be helpful for students, teachers and admin authority to make the process easier, less time consuming and error free. There are four main types of users who can use this system: student, department authority, students’ hall authority and administrator. The student can submit their registration and form fill up information by using a web form. Moreover, he/she can download their admit card and registration form after the approval of the concerned authority. The students also can be able to do other module activities. The hall and department authority can use the system to approve the students' registration, semester examination form and to provide the students' attendance data. In addition, the department and hall authority has a choice to see all students’ academic information. Moreover, the system administrator controls the system by managing (add, delete, update) student, hall and department authority, exam or registration date, subjects of a particular semester, notice board of the institute, module and programme data. The administrator can also add and remove the running and passed student data. The students also can pay their semester fees by using an online banking system.

[...] Read more.
A Review on Data Analytics for Supply Chain Management: A Case study

By Anitha P Malini M. Patil

DOI: https://doi.org/10.5815/ijieeb.2018.05.05, Pub. Date: 8 Sep. 2018

The present study bridges the gap between the two intersecting domains, data science and supply chain management. The data can be analyzed for inventory management, forecasting and prediction, which is in the form of reports, queries and forecasts. Because of the price, weather patterns, economic volatility and complex nature of business, the forecasts may not be accurate. This has resulted in the growth of Supply chain analytics. It is the application of qualitative and quantitative methods to solve relevant problems and to predict the outcomes by considering quality of data. The issues like increased collaboration between companies, customers, retailers and governmental organizations, companies are adopting Big Data solutions. Big Data applications can be linked for Supply Chain Management across the fields like procurement, transportation, warehouse operations, marketing and also for smart logistics. As supply chain networks becoming vast, more complex and driven by demands for more exacting service levels, the type of data that is managed and analyzed also becomes more complex. The present work aims at providing an overview of adoption of capabilities of Data Analytics as part of a “next generation” architecture by developing a linear regression model on a sales-data. The paper also covers the survey of how big data techniques can be used for storage, processing, managing, interpretation and visualization of data in the field of Supply chain.

[...] Read more.
The Role of Knowledge Management in Enhancing Organizational Performance

By Abdel Nasser H. Zaied Gawaher Soliman Hussein Mohamed M. Hassanc

DOI: https://doi.org/10.5815/ijieeb.2012.05.04, Pub. Date: 8 Oct. 2012

Knowledge management is recognized as an important weapon for sustaining competitive advantage and improving performance. The evaluation of knowledge management (KM) performance has become increasingly important since it provides the reference for directing the organizations to enhance their performance and competitiveness. This paper provides an understanding of factors that involved in implementing knowledge management concept to enhance organizational performance. Also, it provides an assessment tool that helps organizations to assess their knowledge management capabilities and identify the possible existing gaps in their knowledge management systems and suggest the possible ways to enhance organizational performance. The results show that all elements of knowledge management capabilities have a positive significant relationship with all measures of the performance at 1% level of significant; it means that there is a great correlation between knowledge management capabilities and organizational performance

[...] Read more.
E –Hospital Management & Hospital Information Systems – Changing Trends

By Premkumar Balaraman Kalpana Kosalram

DOI: https://doi.org/10.5815/ijieeb.2013.01.06, Pub. Date: 8 May 2013

The rapid growth in Information & Communication Technology (ICT), and the power of Internet has strongly impacted the business and service delivery models of today’s global environment. E-Hospital Management Systems provide the benefits of streamlined operations, enhanced administration & control, superior patient care, strict cost control and improved profitability. Globally accepted health care systems need to comply with Healthcare Insurance Portability and Accountability Act (HIPAA) standards of the US and that has become the norm of the Healthcare industry when it comes to medical records management and patient information privacy. The study is focused on understanding the performance indicators of Hospital information systems (HIS), summarizing the latest commonly agreed standards and protocols like Health Level Seven (HL7) standards for mutual message exchange, HIS components, etc… The study is qualitative and descriptive in nature and most of the data is based on secondary sources of survey data. To arrive at a conclusive idea of the larger picture on E- Hospital Management and Hospital information systems, existing survey data and specific successful case studies of HIS are considered in the study. With so many customized versions of E – hospital management solutions (E – HMS) and Hospital Information systems (HIS) available in the market, a generic module wise version of E – Hospital management system is charted out to give a clear understanding for researchers and industry experts. From the specific successful case studies analyzed in the study, the success factors and challenges faced in successful E-HMS implementation are highlighted. Some of the mandatory standards like HIPAA are discussed in detail for clarity on Healthcare system implementation requirements.

[...] Read more.
Barriers to E-Commerce Adoption in Egyptian SMEs

By Abdel Nasser H. Zaied

DOI: https://doi.org/10.5815/ijieeb.2012.03.02, Pub. Date: 8 Jul. 2012

E-commerce has been predicted to be a new driver of economic growth for developing countries. The SME sector plays a significant role in its contribution to the national economy in terms of the wealth created and the number of people employed. Small and Medium Enterprises (SMEs) in Egypt represent the greatest share of the productive units of the Egyptian economy and the current national policy directions address ways and means of developing the capacities of SMEs. Many factors could be responsible for the low usage of e-commerce among the SMEs in Egypt. In order to determine the factors that promote the adoption of e-commerce, SMEs adopters and non-adopters of e-commerce were asked to indicate the factors inhibiting the adoption of e-commerce. The results show that technical barriers are the most important barriers followed by legal and regulatory barriers, whereas lack of Internet security is the highest barrier that inhibit the implementation of e-commerce in SMEs in Egypt followed by limited use of Internet banking and web portals by SMEs. Also, findings implied that more efforts are needed to help and encourage SMEs in Egypt to speed up e-commerce adoption, particularly the more advanced applications.

[...] Read more.
PARADAJuan: A Web-Based Parking Lot Management System Designed and Developed Using Multi-Paradigm Programming Languages

By Ruth G. Luciano Angelito I. Cunanan Romualdo P. Mariano Edrain Nico A. Tavares Mark Reniel L. Jacinto

DOI: https://doi.org/10.5815/ijieeb.2023.03.05, Pub. Date: 8 Jun. 2023

This study aims to develop a web-based parking lot management system using multi-paradigm programming languages. This application is designed to help parking lot owners in monitoring the ins and outs of the parking spaces including the income they generated from it. The researchers used multi-paradigm programming languages where more than one programming paradigm was employed. This allows them to use the most suitable programming style and associated language constructs to build the system. Specifically, the researchers made use of the following languages in creating the system: HTML5, CSS3, JavaScript, PHP, MySQL, and Flutter. The study utilized developmental research methods in which the product-development process is analyzed and described, and the final product is evaluated. As a result, the creation of the system has been successful.

[...] Read more.
Web Based Student Registration and Exam Form Fill-up Management System for Educational Institute

By Md. Tofail Ahmed Md. Humaun Kabir Sujit Roy

DOI: https://doi.org/10.5815/ijieeb.2022.02.04, Pub. Date: 8 Apr. 2022

Registration of new students’ academic information is essential for every educational institute to continue their education at every semester level and go through their whole student life. And this registration information is used when they do their form fill up of consecutive semesters. Nowadays, almost all educational institutes are using paper based registration and form fill up systems which is prone to many human errors and very time consuming for both students, teachers as well as other related administrative bodies. In this paper, we developed a web based application for academic purposes to control and save student registration and form fill up data that will be helpful for students, teachers and admin authority to make the process easier, less time consuming and error free. There are four main types of users who can use this system: student, department authority, students’ hall authority and administrator. The student can submit their registration and form fill up information by using a web form. Moreover, he/she can download their admit card and registration form after the approval of the concerned authority. The students also can be able to do other module activities. The hall and department authority can use the system to approve the students' registration, semester examination form and to provide the students' attendance data. In addition, the department and hall authority has a choice to see all students’ academic information. Moreover, the system administrator controls the system by managing (add, delete, update) student, hall and department authority, exam or registration date, subjects of a particular semester, notice board of the institute, module and programme data. The administrator can also add and remove the running and passed student data. The students also can pay their semester fees by using an online banking system.

[...] Read more.
A Review of Applications of Linear Programming to Optimize Agricultural Solutions

By Alanoud Alotaibi Farrukh Nadeem

DOI: https://doi.org/10.5815/ijieeb.2021.02.02, Pub. Date: 8 Apr. 2021

Quantitative methods help farmers plan and make decisions. An apt example of these methods is the linear programming (LP) model. These methods acknowledge the importance of economizing on available resources among them being water supply, labor, and fertilizers. It is through this economizing that farmers maximize their profit. The significance of linear programming is to provide a solution to the existing real-world problems through the evaluation of existing resources and the provision of relevant solutions. This research studies various LP applications including feed mix, crop pattern and rotation plan, irrigation water, and product transformation; that have the main role to enhance various facets of the agriculture sector. The paper will be a review that will probe into the applications of the LP model and it will also highlight the various tools that are central to analyzing LP model results. The review will culminate in a discussion on the different approaches that help optimize agricultural solutions.

[...] Read more.
Development of a Decision Support System on Employee Performance Assessment Using Weighted Performance Indicators Method

By Terttiaavini Yusuf Hartono Ermatita Dian Palupi Rini

DOI: https://doi.org/10.5815/ijieeb.2023.03.01, Pub. Date: 8 Jun. 2023

Employee Performance Assessment is a part of the Decision Support System. One of the decision support system methods that are most used in performance assessment is Simple Additive Weighting (SAW). In the SAW method, each criterion has a weight value to show the interest level. The determination of the criteria on the SAW method is subjective and the final result is on the ranked system and creates many problems. The study utilizes the Weighted Performance Indicators (WPI) method to solve the problems in the SAW method. The criterion is determined based on the respondent's opinion so that it will be more realistic to achieve the target. The population of the study is the employee of Indo Global Mandiri University which reach 30 persons. WPI method consists of 9 steps. The research result is shown that 4 employees has a performance below MSV and 36 employee has above MSV. The general value of the employee performance value = is 0.69. It shows that the performance of the employee at Indo Global Mandiri University is good enough. However, it needs to be increased, so that the target could be achieved. WPI method is easy to implement, it is not just limited to the employee performance assessment only, but it could be implemented for the other performance assessment, for example, human resource performance, finance, company, industry, system, etc.

[...] Read more.
Development E-commerce Information System of Agriculture in Samarinda

By Asep Nurhuda Aulia Khoirunnita Arika Rusli Dimas K. Umami Sri Handayani

DOI: https://doi.org/10.5815/ijieeb.2022.06.05, Pub. Date: 8 Dec. 2022

Samarinda village is a village that is predominantly working as a farmer and has a wide range of agricultural products, in addition to the abundance of agricultural products there is a problem of marketing of agricultural products that do not have access to sell their agricultural products. Authors conducted research in order to increase sales and expand marketing in the Village Samarinda through sales system-based Business to the Business and method development using the Research and Development. The results obtained in the form of a web site that can be accessed to serve online sales transaction so that it can increase sales in the village Samarinda.

[...] Read more.
Developing Smart Conversation Agent ECOM-BOT for Ecommerce Applications using Deep Learning and Pattern Matching

By Maria Zafar

DOI: https://doi.org/10.5815/ijieeb.2023.02.01, Pub. Date: 8 Apr. 2023

Chatbots are a technological leap in conversational services, generating messages to users either following a set of rules to respond based on recognized patterns or training themselves from previous data or conversations. The primary goal is to enable a device to communicate with a user upon receiving natural language user requests using artificial intelligence and machine learning to generate automated responses. Technology is progressively catering to the questions, both in academic and business contexts, such as situations that require agents to investigate the cause of customer dissatisfaction or to recommend products and services. Significance of this research is to reduce the human dependency and improving customer support by providing close to human natural responses using pattern matching and deep learning on the custom-made data. The main objective of this work is to (a) study the existing literature on cutting-edge technologies in chatbot development in terms of research trends, legacy components, techniques, datasets, and domains specifically in e-commerce and (b) to develop a product that fill some of the gaps/missing functionality identified in current frameworks. We have achieved the following, (a) generated small yet generic dataset, which can be used for all types of products, (b) the intents are identified accurately by the bot using deep learning, whenever a user query.

[...] Read more.
Sales Management Application at Widya Collection Store Web-based

By Vilianty Rafida Ita Arfyanti Irfan Hidayat

DOI: https://doi.org/10.5815/ijieeb.2022.04.01, Pub. Date: 8 Aug. 2022

Widya Collection Store is a business that provides sports clothing, as well as one of the producers in the Samarinda area. Sales management is still not optimal because it still uses paper notes and is still being written which makes it easy for errors to occur in writing prices, quantities of goods and total prices so that it takes a long time to process transactions, both from payment in full or receivables. In addition, managing stock of goods is also more difficult because it is not recorded in the database. Therefore, a Sales Management application was made at the Web-Based Widya Collection Store to process item data, sales transactions, make complete notes and reports and make the transaction process faster. The long-term goal to be achieved is that the stock management process has been recorded in order to know the stock that must be ordered from the supplier. In addition, to simplify and expedite activities in searching for sales transaction data if one day it is needed. In this study, the method used to build a Sales Management Application at a Web-Based Widya Collection Store is the System Development Life Cycle (SDLC) development stage which consists of needs analysis, system design, and implementation.

[...] Read more.
House Price Prediction Modeling Using Machine Learning

By M. Thamarai SP. Malarvizhi

DOI: https://doi.org/10.5815/ijieeb.2020.02.03, Pub. Date: 8 Apr. 2020

Machine Learning is seeing its growth more rapidly in this decade. Many applications and algorithms evolve in Machine Learning day to day. One such application found in journals is house price prediction. House prices are increasing every year which has necessitated the modeling of house price prediction. These models constructed, help the customers to purchase a house suitable for their need. Proposed work makes use of the attributes or features of the houses such as number of bedrooms available in the house, age of the house, travelling facility from the location, school facility available nearby the houses and Shopping malls available nearby the house location. House availability based on desired features of the house and house price prediction are modeled in the proposed work and the model is constructed for a small town in West Godavari district of Andhrapradesh. The work involves decision tree classification, decision tree regression and multiple linear regression and is implemented using Scikit-Learn Machine Learning Tool.

[...] Read more.
Cybercrimes during COVID -19 Pandemic

By Raghad Khweiled Mahmoud Jazzar Derar Eleyan

DOI: https://doi.org/10.5815/ijieeb.2021.02.01, Pub. Date: 8 Apr. 2021

COVID-19 pandemic has changed the lifestyle of all aspects of life. These circumstances have created new patterns in lifestyle that people had to deal with. As such, full and direct dependence on the use of the unsafe Internet network in running all aspects of life. As example, many organizations started officially working through the Internet, students moved to e-education, online shopping increased, and more. These conditions have created a fertile environment for cybercriminals to grow their activity and exploit the pressures that affected human psychology to increase their attack success. The purpose of this paper is to analyze the data collected from global online fraud and cybersecurity service companies to demonstrate on how cybercrimes increased during the COVID-19 epidemic. The significance and value of this research is to highlight by evident on how criminals exploit crisis, and for the need to develop strategies and to enhance user awareness for better detection and prevention of future cybercrimes.

[...] Read more.
A Review on Data Analytics for Supply Chain Management: A Case study

By Anitha P Malini M. Patil

DOI: https://doi.org/10.5815/ijieeb.2018.05.05, Pub. Date: 8 Sep. 2018

The present study bridges the gap between the two intersecting domains, data science and supply chain management. The data can be analyzed for inventory management, forecasting and prediction, which is in the form of reports, queries and forecasts. Because of the price, weather patterns, economic volatility and complex nature of business, the forecasts may not be accurate. This has resulted in the growth of Supply chain analytics. It is the application of qualitative and quantitative methods to solve relevant problems and to predict the outcomes by considering quality of data. The issues like increased collaboration between companies, customers, retailers and governmental organizations, companies are adopting Big Data solutions. Big Data applications can be linked for Supply Chain Management across the fields like procurement, transportation, warehouse operations, marketing and also for smart logistics. As supply chain networks becoming vast, more complex and driven by demands for more exacting service levels, the type of data that is managed and analyzed also becomes more complex. The present work aims at providing an overview of adoption of capabilities of Data Analytics as part of a “next generation” architecture by developing a linear regression model on a sales-data. The paper also covers the survey of how big data techniques can be used for storage, processing, managing, interpretation and visualization of data in the field of Supply chain.

[...] Read more.