Displaying publications 1 - 20 of 69 in total

Abstract:
Sort:
  1. Abdul Rahim R, Pang JF, Chan KS, Leong LC, Sulaiman S, Abdul Manaf MS
    ISA Trans, 2007 Apr;46(2):131-45.
    PMID: 17367791
    The data distribution system of this project is divided into two types, which are a Two-PC Image Reconstruction System and a Two-PC Velocity Measurement System. Each data distribution system is investigated to see whether the results' refreshing rate of the corresponding measurement can be greater than the rate obtained by using a single computer in the same measurement system for each application. Each system has its own flow control protocol for controlling how data is distributed within the system in order to speed up the data processing time. This can be done if two PCs work in parallel. The challenge of this project is to define the data flow process and critical timing during data packaging, transferring and extracting in between PCs. If a single computer is used as a data processing unit, a longer time is needed to produce a measurement result. This insufficient real-time result will cause problems in a feedback control process when applying the system in industrial plants. To increase the refreshing rate of the measurement result, an investigation on a data distribution system is performed to replace the existing data processing unit.
    Matched MeSH terms: Computer Systems
  2. Abdul Taib, N.I., Seed, H.F., Yeoh, C.M., Thon,g K.S.
    MyJurnal
    Neurosyphilis has been known to present with wide array of neuropsychiatric
    signs and symptoms. However little is known of the severity of its
    manifestations especially in our Malaysia setting. We are reporting a case of
    a middle-aged ex-military Malay man who contracted neurosyphilis during
    active service and since then had severe neuropsychiatric symptoms which
    caused deterioration in his activities of daily living skills which warrants
    constant supervision. We discuss the various presentations of neurosyphilis
    and its sequelae despite completion of antibiotics treatment.
    Matched MeSH terms: Computer Systems
  3. Abdulhamid SM, Abd Latiff MS, Abdul-Salaam G, Hussain Madni SH
    PLoS One, 2016;11(7):e0158102.
    PMID: 27384239 DOI: 10.1371/journal.pone.0158102
    Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques.
    Matched MeSH terms: Computer Systems*
  4. Ahamad, I.S., Choong, T.S.Y., Yunus, R., Chuah, T.G., Vassiliadis, V.S.
    MyJurnal
    Controller tuning is needed to select the optimum response for the controlled process. This work presents a new tuning procedure of PID controllers with safety and response quality measures on a non-linear process model by optimization procedure, with a demonstration of two tanks in series. The model was developed to include safety constraints in the form of path constraints. The model was then solved with a new optimization solver, NLPOPT1, which uses a primal-dual interior point method with a novel non-monotone line search procedure with discretized penalty parameters. This procedure generated a grid of optimal PID tuning parameters for various switching of steadystates to be used as apredictor of PID tunings for arbitrary transitions. The interpolation of tuning parameters between the available parameters was found to be capable to produce state profiles with no violation on the safety measures, while maintaining the quality of the solution with the final set points targeted achievable.
    Matched MeSH terms: Computer Systems
  5. Al-Ani AK, Anbar M, Manickam S, Al-Ani A
    PLoS One, 2019;14(4):e0214518.
    PMID: 30939154 DOI: 10.1371/journal.pone.0214518
    An efficiently unlimited address space is provided by Internet Protocol version 6 (IPv6). It aims to accommodate thousands of hundreds of unique devices on a similar link. This can be achieved through the Duplicate Address Detection (DAD) process. It is considered one of the core IPv6 network's functions. It is implemented to make sure that IP addresses do not conflict with each other on the same link. However, IPv6 design's functions are exposed to security threats like the DAD process, which is vulnerable to Denial of Service (DoS) attack. Such a threat prevents the host from configuring its IP address by responding to each Neighbor Solicitation (NS) through fake Neighbor Advertisement (NA). Various mechanisms have been proposed to secure the IPv6 DAD procedure. The proposed mechanisms, however, suffer from complexity, high processing time, and the consumption of more resources. The experiments-based findings revealed that all the existing mechanisms had failed to secure the IPv6 DAD process. Therefore, DAD-match security technique is proposed in this study to efficiently secure the DAD process consuming less processing time. DAD-match is built based on SHA-3 to hide the exchange tentative IP among hosts throughout the process of DAD in an IPv6 link-local network. The obtained experimental results demonstrated that the DAD-match security technique achieved less processing time compared with the existing mechanisms as it can resist a range of different threats like collision and brute-force attacks. The findings concluded that the DAD-match technique effectively prevents the DoS attack during the DAD process. The DAD-match technique is implemented on a small area IPv6 network; hence, the author future work is to implement and test the DAD-match technique on a large area IPv6 network.
    Matched MeSH terms: Computer Systems
  6. Al-Haiqi A, Ismail M, Nordin R
    ScientificWorldJournal, 2014;2014:969628.
    PMID: 25295311 DOI: 10.1155/2014/969628
    Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications communicating over covert channels. Still no universal solution can countermeasure this sort of attack unless the covert channels are known. This paper is an attempt to reveal a new covert channel, not only being specific to smartphones, but also exploiting an unusual resource as a vehicle to carry covert information: sensors data. Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. Our evaluations confirmed a real threat where strings of tens of characters could be transmitted errorless if the throughput is reduced to around 2.5-5 bps. The proposed covert channel is very stealthy as no unusual permissions are required and there is no explicit communication between the colluding applications.
    Matched MeSH terms: Computer Systems/trends
  7. Al-batah MS, Isa NA, Klaib MF, Al-Betar MA
    Comput Math Methods Med, 2014;2014:181245.
    PMID: 24707316 DOI: 10.1155/2014/181245
    To date, cancer of uterine cervix is still a leading cause of cancer-related deaths in women worldwide. The current methods (i.e., Pap smear and liquid-based cytology (LBC)) to screen for cervical cancer are time-consuming and dependent on the skill of the cytopathologist and thus are rather subjective. Therefore, this paper presents an intelligent computer vision system to assist pathologists in overcoming these problems and, consequently, produce more accurate results. The developed system consists of two stages. In the first stage, the automatic features extraction (AFE) algorithm is performed. In the second stage, a neuro-fuzzy model called multiple adaptive neuro-fuzzy inference system (MANFIS) is proposed for recognition process. The MANFIS contains a set of ANFIS models which are arranged in parallel combination to produce a model with multi-input-multioutput structure. The system is capable of classifying cervical cell image into three groups, namely, normal, low-grade squamous intraepithelial lesion (LSIL) and high-grade squamous intraepithelial lesion (HSIL). The experimental results prove the capability of the AFE algorithm to be as effective as the manual extraction by human experts, while the proposed MANFIS produces a good classification performance with 94.2% accuracy.
    Matched MeSH terms: Computer Systems
  8. Albahri AS, Zaidan AA, Albahri OS, Zaidan BB, Alsalem MA
    J Med Syst, 2018 Jun 23;42(8):137.
    PMID: 29936593 DOI: 10.1007/s10916-018-0983-9
    The burden on healthcare services in the world has increased substantially in the past decades. The quality and quantity of care have to increase to meet surging demands, especially among patients with chronic heart diseases. The expansion of information and communication technologies has led to new models for the delivery healthcare services in telemedicine. Therefore, mHealth plays an imperative role in the sustainable delivery of healthcare services in telemedicine. This paper presents a comprehensive review of healthcare service provision. It highlights the open issues and challenges related to the use of the real-time fault-tolerant mHealth system in telemedicine. The methodological aspects of mHealth are examined, and three distinct and successive phases are presented. The first discusses the identification process for establishing a decision matrix based on a crossover of 'time of arrival of patient at the hospital/multi-services' and 'hospitals' within mHealth. The second phase discusses the development of a decision matrix for hospital selection based on the MAHP method. The third phase discusses the validation of the proposed system.
    Matched MeSH terms: Computer Systems*
  9. Albahri OS, Zaidan AA, Zaidan BB, Hashim M, Albahri AS, Alsalem MA
    J Med Syst, 2018 Jul 25;42(9):164.
    PMID: 30043085 DOI: 10.1007/s10916-018-1006-6
    Promoting patient care is a priority for all healthcare providers with the overall purpose of realising a high degree of patient satisfaction. A medical centre server is a remote computer that enables hospitals and physicians to analyse data in real time and offer appropriate services to patients. The server can also manage, organise and support professionals in telemedicine. Therefore, a remote medical centre server plays a crucial role in sustainably delivering quality healthcare services in telemedicine. This article presents a comprehensive review of the provision of healthcare services in telemedicine applications, especially in the medical centre server. Moreover, it highlights the open issues and challenges related to providing healthcare services in the medical centre server within telemedicine. Methodological aspects to control and manage the process of healthcare service provision and three distinct and successive phases are presented. The first phase presents the identification process to propose a decision matrix (DM) on the basis of a crossover of 'multi-healthcare services' and 'hospital list' within intelligent data and service management centre (Tier 4). The second phase discusses the development of a DM for hospital selection on the basis of integrated VIKOR-Analytic Hierarchy Process (AHP) methods. Finally, the last phase examines the validation process for the proposed framework.
    Matched MeSH terms: Computer Systems*
  10. Albahri OS, Albahri AS, Mohammed KI, Zaidan AA, Zaidan BB, Hashim M, et al.
    J Med Syst, 2018 Mar 22;42(5):80.
    PMID: 29564649 DOI: 10.1007/s10916-018-0943-4
    The new and ground-breaking real-time remote monitoring in triage and priority-based sensor technology used in telemedicine have significantly bounded and dispersed communication components. To examine these technologies and provide researchers with a clear vision of this area, we must first be aware of the utilised approaches and existing limitations in this line of research. To this end, an extensive search was conducted to find articles dealing with (a) telemedicine, (b) triage, (c) priority and (d) sensor; (e) comprehensively review related applications and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were checked for articles on triage and priority-based sensor technology in telemedicine. The retrieved articles were filtered according to the type of telemedicine technology explored. A total of 150 articles were selected and classified into two categories. The first category includes reviews and surveys of triage and priority-based sensor technology in telemedicine. The second category includes articles on the three-tiered architecture of telemedicine. Tier 1 represents the users. Sensors acquire the vital signs of the users and send them to Tier 2, which is the personal gateway that uses local area network protocols or wireless body area network. Medical data are sent from Tier 2 to Tier 3, which is the healthcare provider in medical institutes. Then, the motivation for using triage and priority-based sensor technology in telemedicine, the issues related to the obstruction of its application and the development and utilisation of telemedicine are examined on the basis of the findings presented in the literature.
    Matched MeSH terms: Computer Systems
  11. Awang Kalong N, Yusof M
    Int J Health Care Qual Assur, 2017 May 08;30(4):341-357.
    PMID: 28470137 DOI: 10.1108/IJHCQA-06-2016-0082
    Purpose The purpose of this paper is to discuss a systematic review on waste identification related to health information systems (HIS) in Lean transformation. Design/methodology/approach A systematic review was conducted on 19 studies to evaluate Lean transformation and tools used to remove waste related to HIS in clinical settings. Findings Ten waste categories were identified, along with their relationships and applications of Lean tool types related to HIS. Different Lean tools were used at the early and final stages of Lean transformation; the tool selection depended on the waste characteristic. Nine studies reported a positive impact from Lean transformation in improving daily work processes. The selection of Lean tools should be made based on the timing, purpose and characteristics of waste to be removed. Research limitations/implications Overview of waste and its category within HIS and its analysis from socio-technical perspectives enabled the identification of its root cause in a holistic and rigorous manner. Practical implications Understanding waste types, their root cause and review of Lean tools could subsequently lead to the identification of mitigation approach to prevent future error occurrence. Originality/value Specific waste models for HIS settings are yet to be developed. Hence, the identification of the waste categories could guide future implementation of Lean transformations in HIS settings.
    Matched MeSH terms: Computer Systems
  12. Bahraminejad B, Basri S, Isa M, Hambli Z
    Sensors (Basel), 2010;10(6):5359-77.
    PMID: 22219666 DOI: 10.3390/s100605359
    In this study, the ability of the Capillary-attached conductive gas sensor (CGS) in real-time gas identification was investigated. The structure of the prototype fabricated CGS is presented. Portions were selected from the beginning of the CGS transient response including the first 11 samples to the first 100 samples. Different feature extraction and classification methods were applied on the selected portions. Validation of methods was evaluated to study the ability of an early portion of the CGS transient response in target gas (TG) identification. Experimental results proved that applying extracted features from an early part of the CGS transient response along with a classifier can distinguish short-chain alcohols from each other perfectly. Decreasing time of exposition in the interaction between target gas and sensing element improved the reliability of the sensor. Classification rate was also improved and time of identification was decreased. Moreover, the results indicated the optimum interval of the early transient response of the CGS for selecting portions to achieve the best classification rates.
    Matched MeSH terms: Computer Systems
  13. Ch'ng YH, Osman MA, Jong HY
    Malays J Med Sci, 2021 Apr;28(2):161-170.
    PMID: 33958970 DOI: 10.21315/mjms2021.28.2.15
    Background: Specific language impairment (SLI) diagnosis is inconvenient due to manual procedures and hardware cost. Computer-aided SLI diagnosis has been proposed to counter these inconveniences. This study focuses on evaluating the feasibility of computer systems used to diagnose SLI.

    Methods: The accuracy of Webgazer.js for software-based gaze tracking is tested under different lighting conditions. Predefined time delays of a prototype diagnosis task automation script are contrasted against with manual delays based on human time estimation to understand how automation influences diagnosis accuracy. SLI diagnosis binary classifier was built and tested based on randomised parameters. The obtained results were cross-compared to Singlims_ES.exe for equality.

    Results: Webgazer.js achieved an average accuracy of 88.755% under global lighting conditions, 61.379% under low lighting conditions and 52.7% under face-focused lighting conditions. The diagnosis task automation script found to execute with actual time delays with a deviation percentage no more than 0.04%, while manually executing time delays based on human time estimation resulted in a deviation percentage of not more than 3.37%. One-tailed test probability value produced by both the newly built classifier and Singlims_ES were observed to be similar up to three decimal places.

    Conclusion: The results obtained should serve as a foundation for further evaluation of computer tools to help speech language pathologists diagnose SLI.

    Matched MeSH terms: Computer Systems
  14. Chaudhry MT, Ling TC, Hussain SA, Manzoor A
    ScientificWorldJournal, 2014;2014:684501.
    PMID: 24987743 DOI: 10.1155/2014/684501
    A rise in inlet air temperature may lower the rate of heat dissipation from air cooled computing servers. This introduces a thermal stress to these servers. As a result, the poorly cooled active servers will start conducting heat to the neighboring servers and giving rise to hotspot regions of thermal stress, inside the data center. As a result, the physical hardware of these servers may fail, thus causing performance loss, monetary loss, and higher energy consumption for cooling mechanism. In order to minimize these situations, this paper performs the profiling of inlet temperature sensitivity (ITS) and defines the optimum location for each server to minimize the chances of creating a thermal hotspot and thermal stress. Based upon novel ITS analysis, a thermal state monitoring and server relocation algorithm for data centers is being proposed. The contribution of this paper is bringing the peak outlet temperatures of the relocated servers closer to average outlet temperature by over 5 times, lowering the average peak outlet temperature by 3.5% and minimizing the thermal stress.
    Matched MeSH terms: Computer Systems*
  15. Chong SE, Mohd Nikman A, Saedah A, Wan Mohd Nazaruddin WH, Kueh YC, Lim JA, et al.
    Br J Anaesth, 2017 05 01;118(5):799-801.
    PMID: 28510752 DOI: 10.1093/bja/aex108
    Matched MeSH terms: Computer Systems
  16. Erum Pathan, Shamsul Aizam Zulkifli
    MyJurnal
    In this paper, the challenge of harmonic injection mitigation becomes critical with the massive use of inverters in electrical distribution systems that has been discussed and analyzed. Currently, between the inverter and the grid, L, LC or LCL filters is often used to mitigate the current harmonic. Further, filter connection in both delta-to-star or star-to-delta transformer for state space model of LC filter couplings with impedance is obtained in this paper and it also talked about the different passive damping techniques that been used to suppress the resonance effect on the filter. The effect of series and parallel damping resistor techniques that impact filtering and stability are also been analyzed and discussed. At the end, the simulation results show that LCL filter with parallel damping resistor achieves best performance compared on those for L, LC, or LCL with series damping resistor while at the same time enhancing the smoothness of the signal output while at the same time reducing the percentage of total harmonic distortion between inverter-grid connection.
    Matched MeSH terms: Computer Systems
  17. Faheem M, Fizza G, Ashraf MW, Butt RA, Ngadi MA, Gungor VC
    Data Brief, 2021 Apr;35:106854.
    PMID: 33659599 DOI: 10.1016/j.dib.2021.106854
    Smart Grid Industry 4.0 (SGI4.0) defines a new paradigm to provide high-quality electricity at a low cost by reacting quickly and effectively to changing energy demands in the highly volatile global markets. However, in SGI4.0, the reliable and efficient gathering and transmission of the observed information from the Internet of Things (IoT)-enabled Cyber-physical systems, such as sensors located in remote places to the control center is the biggest challenge for the Industrial Multichannel Wireless Sensors Networks (IMWSNs). This is due to the harsh nature of the smart grid environment that causes high noise, signal fading, multipath effects, heat, and electromagnetic interference, which reduces the transmission quality and trigger errors in the IMWSNs. Thus, an efficient monitoring and real-time control of unexpected changes in the power generation and distribution processes is essential to guarantee the quality of service (QoS) requirements in the smart grid. In this context, this paper describes the dataset contains measurements acquired by the IMWSNs during events monitoring and control in the smart grid. This work provides an updated detail comparison of our proposed work, including channel detection, channel assignment, and packets forwarding algorithms, collectively called CARP [1] with existing G-RPL [2] and EQSHC [3] schemes in the smart grid. The experimental outcomes show that the dataset and is useful for the design, development, testing, and validation of algorithms for real-time events monitoring and control applications in the smart grid.
    Matched MeSH terms: Computer Systems
  18. Faisal A, Parveen S, Badsha S, Sarwar H, Reza AW
    J Med Syst, 2013 Jun;37(3):9938.
    PMID: 23504472 DOI: 10.1007/s10916-013-9938-3
    An improved and efficient method is presented in this paper to achieve a better trade-off between noise removal and edge preservation, thereby detecting the tumor region of MRI brain images automatically. Compass operator has been used in the fourth order Partial Differential Equation (PDE) based denoising technique to preserve the anatomically significant information at the edges. A new morphological technique is also introduced for stripping skull region from the brain images, which consequently leading to the process of detecting tumor accurately. Finally, automatic seeded region growing segmentation based on an improved single seed point selection algorithm is applied to detect the tumor. The method is tested on publicly available MRI brain images and it gives an average PSNR (Peak Signal to Noise Ratio) of 36.49. The obtained results also show detection accuracy of 99.46%, which is a significant improvement than that of the existing results.
    Matched MeSH terms: Computer Systems
  19. Golkar E, Prabuwono AS, Patel A
    Sensors (Basel), 2012;12(11):14774-91.
    PMID: 23202186 DOI: 10.3390/s121114774
    This paper presents a novel, real-time defect detection system, based on a best-fit polynomial interpolation, that inspects the conditions of outer surfaces. The defect detection system is an enhanced feature extraction method that employs this technique to inspect the flatness, waviness, blob, and curvature faults of these surfaces. The proposed method has been performed, tested, and validated on numerous pipes and ceramic tiles. The results illustrate that the physical defects such as abnormal, popped-up blobs are recognized completely, and that flames, waviness, and curvature faults are detected simultaneously.
    Matched MeSH terms: Computer Systems
  20. Halmi MI, Jirangon H, Johari WL, Rachman AR, Shukor MY, Syed MA
    ScientificWorldJournal, 2014;2014:834202.
    PMID: 24977231 DOI: 10.1155/2014/834202
    Luminescence-based assays for toxicants such as Microtox, ToxAlert, and Biotox have been used extensively worldwide. However, the use of these assays in near real time conditions is limited due to nonoptimal assay temperature for the tropical climate. An isolate that exhibits a high luminescence activity in a broad range of temperatures was successfully isolated from the mackerel, Rastrelliger kanagurta. This isolate was tentatively identified as Photobacterium sp. strain MIE, based on partial 16S rDNA molecular phylogeny. Optimum conditions that support high bioluminescence activity occurred between 24 and 30°C, with pH 5.5 to 7.5, 10 to 20 g/L of sodium chloride, 30 to 50 g/L of tryptone, and 4 g/L of glycerol as the carbon source. Assessment of near real time capability of this bacterial system, Xenoassay light to monitor heavy metals from a contaminated river running through the Juru River Basin shows near real time capability with assaying time of less than 30 minutes per samples. Samples returned to the lab were tested with a standard Microtox assay using Vibrio fishceri. Similar results were obtained to Xenoassay light that show temporal variation of copper concentration. Thus, this strain is suitable for near real time river monitoring of toxicants especially in the tropics.
    Matched MeSH terms: Computer Systems
Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links