Displaying publications 1 - 20 of 69 in total

Abstract:
Sort:
  1. Abdul Rahim R, Pang JF, Chan KS, Leong LC, Sulaiman S, Abdul Manaf MS
    ISA Trans, 2007 Apr;46(2):131-45.
    PMID: 17367791
    The data distribution system of this project is divided into two types, which are a Two-PC Image Reconstruction System and a Two-PC Velocity Measurement System. Each data distribution system is investigated to see whether the results' refreshing rate of the corresponding measurement can be greater than the rate obtained by using a single computer in the same measurement system for each application. Each system has its own flow control protocol for controlling how data is distributed within the system in order to speed up the data processing time. This can be done if two PCs work in parallel. The challenge of this project is to define the data flow process and critical timing during data packaging, transferring and extracting in between PCs. If a single computer is used as a data processing unit, a longer time is needed to produce a measurement result. This insufficient real-time result will cause problems in a feedback control process when applying the system in industrial plants. To increase the refreshing rate of the measurement result, an investigation on a data distribution system is performed to replace the existing data processing unit.
    Matched MeSH terms: Computer Systems
  2. Umair M, Hidayat NM, Sukri Ahmad A, Nik Ali NH, Mawardi MIM, Abdullah E
    PLoS One, 2024;19(2):e0297376.
    PMID: 38422065 DOI: 10.1371/journal.pone.0297376
    Developing novel EV chargers is crucial for accelerating Electric Vehicle (EV) adoption, mitigating range anxiety, and fostering technological advancements that enhance charging efficiency and grid integration. These advancements address current challenges and contribute to a more sustainable and convenient future of electric mobility. This paper explores the performance dynamics of a solar-integrated charging system. It outlines a simulation study on harnessing solar energy as the primary Direct Current (DC) EV charging source. The approach incorporates an Energy Storage System (ESS) to address solar intermittencies and mitigate photovoltaic (PV) mismatch losses. Executed through MATLAB, the system integrates key components, including solar PV panels, the ESS, a DC charger, and an EV battery. The study finds that a change in solar irradiance from 400 W/m2 to 1000 W/m2 resulted in a substantial 47% increase in the output power of the solar PV system. Simultaneously, the ESS shows a 38% boost in output power under similar conditions, with the assessments conducted at a room temperature of 25°C. The results emphasize that optimal solar panel placement with higher irradiance levels is essential to leverage integrated solar energy EV chargers. The research also illuminates the positive correlation between elevated irradiance levels and the EV battery's State of Charge (SOC). This correlation underscores the efficiency gains achievable through enhanced solar power absorption, facilitating more effective and expedited EV charging.
    Matched MeSH terms: Computer Systems
  3. Mohd Agos Salim Nasir, Ahmad Izani Md Ismail
    Sains Malaysiana, 2013;42:341-346.
    A high-order uniform Cartesian grid compact finite difference scheme for the Goursat problem is developed. The basic idea of high-order compact schemes is to find the compact approximations to the derivatives terms by differentiating centrally the governing equations. Our compact scheme will approximate the derivative terms by involving the higher terms and reducing the number of grid points. The compact finite difference scheme is given for general form of the Goursat problem in uniform domain and illustrates the performance by applying a linear problem. Numerical experiments have been conducted with the new scheme and encouraging results have been obtained. In this paper we present the compact finite difference scheme for the Goursat problem. With the aid of computational software the scheme was programmed for determining the relative errors of linear Goursat problem.
    Matched MeSH terms: Computer Systems
  4. Humada AM, Hojabri M, Sulaiman MH, Hamada HM, Ahmed MN
    PLoS One, 2016;11(4):e0152766.
    PMID: 27035575 DOI: 10.1371/journal.pone.0152766
    A grid-connected photovoltaic (PV) system operates under fluctuated weather condition has been modeled and characterized based on specific test bed. A mathematical model of a small-scale PV system has been developed mainly for residential usage, and the potential results have been simulated. The proposed PV model based on three PV parameters, which are the photocurrent, IL, the reverse diode saturation current, Io, the ideality factor of diode, n. Accuracy of the proposed model and its parameters evaluated based on different benchmarks. The results showed that the proposed model fitting the experimental results with high accuracy compare to the other models, as well as the I-V characteristic curve. The results of this study can be considered valuable in terms of the installation of a grid-connected PV system in fluctuated climatic conditions.
    Matched MeSH terms: Computer Systems
  5. Mutlaq KA, Nyangaresi VO, Omar MA, Abduljabbar ZA, Abduljaleel IQ, Ma J, et al.
    PLoS One, 2024;19(1):e0296781.
    PMID: 38261555 DOI: 10.1371/journal.pone.0296781
    The incorporation of information and communication technologies in the power grids has greatly enhanced efficiency in the management of demand-responses. In addition, smart grids have seen considerable minimization in energy consumption and enhancement in power supply quality. However, the transmission of control and consumption information over open public communication channels renders the transmitted messages vulnerable to numerous security and privacy violations. Although many authentication and key agreement protocols have been developed to counter these issues, the achievement of ideal security and privacy levels at optimal performance still remains an uphill task. In this paper, we leverage on Hamming distance, elliptic curve cryptography, smart cards and biometrics to develop an authentication protocol. It is formally analyzed using the Burrows-Abadi-Needham (BAN) logic, which shows strong mutual authentication and session key negotiation. Its semantic security analysis demonstrates its robustness under all the assumptions of the Dolev-Yao (DY) and Canetti- Krawczyk (CK) threat models. From the performance perspective, it is shown to incur communication, storage and computation complexities compared with other related state of the art protocols.
    Matched MeSH terms: Computer Systems
  6. Al-Ani AK, Anbar M, Manickam S, Al-Ani A
    PLoS One, 2019;14(4):e0214518.
    PMID: 30939154 DOI: 10.1371/journal.pone.0214518
    An efficiently unlimited address space is provided by Internet Protocol version 6 (IPv6). It aims to accommodate thousands of hundreds of unique devices on a similar link. This can be achieved through the Duplicate Address Detection (DAD) process. It is considered one of the core IPv6 network's functions. It is implemented to make sure that IP addresses do not conflict with each other on the same link. However, IPv6 design's functions are exposed to security threats like the DAD process, which is vulnerable to Denial of Service (DoS) attack. Such a threat prevents the host from configuring its IP address by responding to each Neighbor Solicitation (NS) through fake Neighbor Advertisement (NA). Various mechanisms have been proposed to secure the IPv6 DAD procedure. The proposed mechanisms, however, suffer from complexity, high processing time, and the consumption of more resources. The experiments-based findings revealed that all the existing mechanisms had failed to secure the IPv6 DAD process. Therefore, DAD-match security technique is proposed in this study to efficiently secure the DAD process consuming less processing time. DAD-match is built based on SHA-3 to hide the exchange tentative IP among hosts throughout the process of DAD in an IPv6 link-local network. The obtained experimental results demonstrated that the DAD-match security technique achieved less processing time compared with the existing mechanisms as it can resist a range of different threats like collision and brute-force attacks. The findings concluded that the DAD-match technique effectively prevents the DoS attack during the DAD process. The DAD-match technique is implemented on a small area IPv6 network; hence, the author future work is to implement and test the DAD-match technique on a large area IPv6 network.
    Matched MeSH terms: Computer Systems
  7. Al-batah MS, Isa NA, Klaib MF, Al-Betar MA
    Comput Math Methods Med, 2014;2014:181245.
    PMID: 24707316 DOI: 10.1155/2014/181245
    To date, cancer of uterine cervix is still a leading cause of cancer-related deaths in women worldwide. The current methods (i.e., Pap smear and liquid-based cytology (LBC)) to screen for cervical cancer are time-consuming and dependent on the skill of the cytopathologist and thus are rather subjective. Therefore, this paper presents an intelligent computer vision system to assist pathologists in overcoming these problems and, consequently, produce more accurate results. The developed system consists of two stages. In the first stage, the automatic features extraction (AFE) algorithm is performed. In the second stage, a neuro-fuzzy model called multiple adaptive neuro-fuzzy inference system (MANFIS) is proposed for recognition process. The MANFIS contains a set of ANFIS models which are arranged in parallel combination to produce a model with multi-input-multioutput structure. The system is capable of classifying cervical cell image into three groups, namely, normal, low-grade squamous intraepithelial lesion (LSIL) and high-grade squamous intraepithelial lesion (HSIL). The experimental results prove the capability of the AFE algorithm to be as effective as the manual extraction by human experts, while the proposed MANFIS produces a good classification performance with 94.2% accuracy.
    Matched MeSH terms: Computer Systems
  8. Albahri OS, Zaidan AA, Zaidan BB, Hashim M, Albahri AS, Alsalem MA
    J Med Syst, 2018 Jul 25;42(9):164.
    PMID: 30043085 DOI: 10.1007/s10916-018-1006-6
    Promoting patient care is a priority for all healthcare providers with the overall purpose of realising a high degree of patient satisfaction. A medical centre server is a remote computer that enables hospitals and physicians to analyse data in real time and offer appropriate services to patients. The server can also manage, organise and support professionals in telemedicine. Therefore, a remote medical centre server plays a crucial role in sustainably delivering quality healthcare services in telemedicine. This article presents a comprehensive review of the provision of healthcare services in telemedicine applications, especially in the medical centre server. Moreover, it highlights the open issues and challenges related to providing healthcare services in the medical centre server within telemedicine. Methodological aspects to control and manage the process of healthcare service provision and three distinct and successive phases are presented. The first phase presents the identification process to propose a decision matrix (DM) on the basis of a crossover of 'multi-healthcare services' and 'hospital list' within intelligent data and service management centre (Tier 4). The second phase discusses the development of a DM for hospital selection on the basis of integrated VIKOR-Analytic Hierarchy Process (AHP) methods. Finally, the last phase examines the validation process for the proposed framework.
    Matched MeSH terms: Computer Systems*
  9. Albahri AS, Zaidan AA, Albahri OS, Zaidan BB, Alsalem MA
    J Med Syst, 2018 Jun 23;42(8):137.
    PMID: 29936593 DOI: 10.1007/s10916-018-0983-9
    The burden on healthcare services in the world has increased substantially in the past decades. The quality and quantity of care have to increase to meet surging demands, especially among patients with chronic heart diseases. The expansion of information and communication technologies has led to new models for the delivery healthcare services in telemedicine. Therefore, mHealth plays an imperative role in the sustainable delivery of healthcare services in telemedicine. This paper presents a comprehensive review of healthcare service provision. It highlights the open issues and challenges related to the use of the real-time fault-tolerant mHealth system in telemedicine. The methodological aspects of mHealth are examined, and three distinct and successive phases are presented. The first discusses the identification process for establishing a decision matrix based on a crossover of 'time of arrival of patient at the hospital/multi-services' and 'hospitals' within mHealth. The second phase discusses the development of a decision matrix for hospital selection based on the MAHP method. The third phase discusses the validation of the proposed system.
    Matched MeSH terms: Computer Systems*
  10. Sangaran, G., Ahmad Taufik, J., Aniza, I.
    MyJurnal
    Hospital information systems have evolved with the recent widespread, involving technology and target functions, and this involves the critical computer systems from multiple perspectives. Healthcare organizations increasingly use information technology as a basis for improving productivity and user satisfaction. A research had been done about the level of satisfaction in using the Hospital Information System. Data was obtained by using a set of questionnaires that have been tested for reliability and validity. The staff are comprised of two (2) categories: Nurses (community nurses / Head nurse / staff nurse, nurse managers and others) while the second category consists of administrative officers (administrative officers, administrative assistants and clerks) in selected departments. Variables consist of sociodemographic factors, occupational factors and perception factors. A total of 152 respondents identified using stratified sampling method. The factors studied were age, gender, marital status, level of qualifications, length of service, knowledge of the system, attitude towards the use of the system, behavioral intention to use the system and compatibility with work. Majority of respondents were females (88.2%). The level of satisfaction among the staff in using the hospital information system is high (88.8%) compared to the dissatisfied staff in UKMMC (11.2%). In overall, the staffs in UKMMC are satisfied using the hospital information system available now but there are always a room for improvement so that the system can be used more intensively.
    Matched MeSH terms: Computer Systems
  11. Hannan MA, Arebey M, Begum RA, Basri H
    Waste Manag, 2011 Dec;31(12):2406-13.
    PMID: 21871788 DOI: 10.1016/j.wasman.2011.07.022
    This paper deals with a system of integration of Radio Frequency Identification (RFID) and communication technologies for solid waste bin and truck monitoring system. RFID, GPS, GPRS and GIS along with camera technologies have been integrated and developed the bin and truck intelligent monitoring system. A new kind of integrated theoretical framework, hardware architecture and interface algorithm has been introduced between the technologies for the successful implementation of the proposed system. In this system, bin and truck database have been developed such a way that the information of bin and truck ID, date and time of waste collection, bin status, amount of waste and bin and truck GPS coordinates etc. are complied and stored for monitoring and management activities. The results showed that the real-time image processing, histogram analysis, waste estimation and other bin information have been displayed in the GUI of the monitoring system. The real-time test and experimental results showed that the performance of the developed system was stable and satisfied the monitoring system with high practicability and validity.
    Matched MeSH terms: Computer Systems/economics*
  12. Logeswaran R, Chen LC
    J Med Syst, 2012 Apr;36(2):483-90.
    PMID: 20703702 DOI: 10.1007/s10916-010-9493-0
    Current trends in medicine, specifically in the electronic handling of medical applications, ranging from digital imaging, paperless hospital administration and electronic medical records, telemedicine, to computer-aided diagnosis, creates a burden on the network. Distributed Service Architectures, such as Intelligent Network (IN), Telecommunication Information Networking Architecture (TINA) and Open Service Access (OSA), are able to meet this new challenge. Distribution enables computational tasks to be spread among multiple processors; hence, performance is an important issue. This paper proposes a novel approach in load balancing, the Random Sender Initiated Algorithm, for distribution of tasks among several nodes sharing the same computational object (CO) instances in Distributed Service Architectures. Simulations illustrate that the proposed algorithm produces better network performance than the benchmark load balancing algorithms-the Random Node Selection Algorithm and the Shortest Queue Algorithm, especially under medium and heavily loaded conditions.
    Matched MeSH terms: Computer Systems*
  13. Naderipour A, Abdul-Malek Z, Hajivand M, Seifabad ZM, Farsi MA, Nowdeh SA, et al.
    Sci Rep, 2021 Feb 01;11(1):2728.
    PMID: 33526829 DOI: 10.1038/s41598-021-82440-9
    In this paper, the optimal allocation of constant and switchable capacitors is presented simultaneously in two operation modes, grid-connected and islanded, for a microgrid. Different load levels are considered by employing non-dispatchable distributed generations. The objective function includes minimising the energy losses cost, the cost of peak power losses, and the cost of the capacitor. The optimization problem is solved using the spotted hyena optimizer (SHO) algorithm to determine the optimal size and location of capacitors, considering different loading levels and the two operation modes. In this study, a three-level load and various types of loads, including constant power, constant current, and constant impedance are considered. The proposed method is implemented on a 24-bus radial distribution network. To evaluate the performance of the SHO, the results are compared with GWO and the genetic algorithm (GA). The simulation results demonstrate the superior performance of the SHO in reducing the cost of losses and improving the voltage profile during injection and non-injection of reactive power by distributed generations in two operation modes. The total cost and net saving values for DGs only with the capability of active power injection is achieved 105,780 $ and 100,560.54 $, respectively and for DGs with the capability of active and reactive power injection is obtained 89,568 $ and 76,850.46 $, respectively using the SHO. The proposed method has achieved more annual net savings due to the lower cost of losses than other optimization methods.
    Matched MeSH terms: Computer Systems
  14. Shamsudin N, Hussein SH, Nugroho H, Fadzil MH
    Australas J Dermatol, 2015 Nov;56(4):285-9.
    PMID: 25367709 DOI: 10.1111/ajd.12247
    An objective tool to quantify treatment response in vitiligo is currently lacking. This study aimed to objectively evaluate the treatment response in vitiligo by using a computerised digital imaging analysis system (C-DIAS) and to compare it with the physician's global assessment (PGA). Tacrolimus ointment 0.1% (Protopic; Astellas Pharma Tech,Toyama, Japan) was applied twice daily on selected lesions which were photographed every 6 weeks for 24 weeks. The primary efficacy end-point was the mean percentage of repigmentation (MPR), as assessed by the digital method (MPR-C-DIAS) or by the PGA. The response was categorised into none (0%), mild (1-25%), moderate (26-50%), good (51-75%) and excellent (76-100%).
    Matched MeSH terms: Computer Systems
  15. Reza SM, Ahmad N, Choudhury IA, Ghazilla RA
    Sensors (Basel), 2014 Mar 04;14(3):4342-63.
    PMID: 24599193 DOI: 10.3390/s140304342
    Human motion is a daily and rhythmic activity. The exoskeleton concept is a very positive scientific approach for human rehabilitation in case of lower limb impairment. Although the exoskeleton shows potential, it is not yet applied extensively in clinical rehabilitation. In this research, a fuzzy based control algorithm is proposed for lower limb exoskeletons during sit-to-stand and stand-to-sit movements. Surface electromyograms (EMGs) are acquired from the vastus lateralis muscle using a wearable EMG sensor. The resultant acceleration angle along the z-axis is determined from a kinematics sensor. Twenty volunteers were chosen to perform the experiments. The whole experiment was accomplished in two phases. In the first phase, acceleration angles and EMG data were acquired from the volunteers during both sit-to-stand and stand-to-sit motions. During sit-to-stand movements, the average acceleration angle at activation was 11°-48° and the EMG varied from -0.19 mV to +0.19 mV. On the other hand, during stand-to-sit movements, the average acceleration angle was found to be 57.5°-108° at the activation point and the EMG varied from -0.32 mV to +0.32 mV. In the second phase, a fuzzy controller was designed from the experimental data. The controller was tested and validated with both offline and real time data using LabVIEW.
    Matched MeSH terms: Computer Systems
  16. Ho GJ, Liew SM, Ng CJ, Hisham Shunmugam R, Glasziou P
    PLoS One, 2016;11(12):e0167170.
    PMID: 27935993 DOI: 10.1371/journal.pone.0167170
    BACKGROUND: Physicians are often encouraged to locate answers for their clinical queries via an evidence-based literature search approach. The methods used are often not clearly specified. Inappropriate search strategies, time constraint and contradictory information complicate evidence retrieval.

    AIMS: Our study aimed to develop a search strategy to answer clinical queries among physicians in a primary care setting.

    METHODS: Six clinical questions of different medical conditions seen in primary care were formulated. A series of experimental searches to answer each question was conducted on 3 commonly advocated medical databases. We compared search results from a PICO (patients, intervention, comparison, outcome) framework for questions using different combinations of PICO elements. We also compared outcomes from doing searches using text words, Medical Subject Headings (MeSH), or a combination of both. All searches were documented using screenshots and saved search strategies.

    RESULTS: Answers to all 6 questions using the PICO framework were found. A higher number of systematic reviews were obtained using a 2 PICO element search compared to a 4 element search. A more optimal choice of search is a combination of both text words and MeSH terms. Despite searching using the Systematic Review filter, many non-systematic reviews or narrative reviews were found in PubMed. There was poor overlap between outcomes of searches using different databases. The duration of search and screening for the 6 questions ranged from 1 to 4 hours.

    CONCLUSION: This strategy has been shown to be feasible and can provide evidence to doctors' clinical questions. It has the potential to be incorporated into an interventional study to determine the impact of an online evidence retrieval system.

    Matched MeSH terms: Computer Systems
  17. Faheem M, Fizza G, Ashraf MW, Butt RA, Ngadi MA, Gungor VC
    Data Brief, 2021 Apr;35:106854.
    PMID: 33659599 DOI: 10.1016/j.dib.2021.106854
    Smart Grid Industry 4.0 (SGI4.0) defines a new paradigm to provide high-quality electricity at a low cost by reacting quickly and effectively to changing energy demands in the highly volatile global markets. However, in SGI4.0, the reliable and efficient gathering and transmission of the observed information from the Internet of Things (IoT)-enabled Cyber-physical systems, such as sensors located in remote places to the control center is the biggest challenge for the Industrial Multichannel Wireless Sensors Networks (IMWSNs). This is due to the harsh nature of the smart grid environment that causes high noise, signal fading, multipath effects, heat, and electromagnetic interference, which reduces the transmission quality and trigger errors in the IMWSNs. Thus, an efficient monitoring and real-time control of unexpected changes in the power generation and distribution processes is essential to guarantee the quality of service (QoS) requirements in the smart grid. In this context, this paper describes the dataset contains measurements acquired by the IMWSNs during events monitoring and control in the smart grid. This work provides an updated detail comparison of our proposed work, including channel detection, channel assignment, and packets forwarding algorithms, collectively called CARP [1] with existing G-RPL [2] and EQSHC [3] schemes in the smart grid. The experimental outcomes show that the dataset and is useful for the design, development, testing, and validation of algorithms for real-time events monitoring and control applications in the smart grid.
    Matched MeSH terms: Computer Systems
  18. Bahraminejad B, Basri S, Isa M, Hambli Z
    Sensors (Basel), 2010;10(6):5359-77.
    PMID: 22219666 DOI: 10.3390/s100605359
    In this study, the ability of the Capillary-attached conductive gas sensor (CGS) in real-time gas identification was investigated. The structure of the prototype fabricated CGS is presented. Portions were selected from the beginning of the CGS transient response including the first 11 samples to the first 100 samples. Different feature extraction and classification methods were applied on the selected portions. Validation of methods was evaluated to study the ability of an early portion of the CGS transient response in target gas (TG) identification. Experimental results proved that applying extracted features from an early part of the CGS transient response along with a classifier can distinguish short-chain alcohols from each other perfectly. Decreasing time of exposition in the interaction between target gas and sensing element improved the reliability of the sensor. Classification rate was also improved and time of identification was decreased. Moreover, the results indicated the optimum interval of the early transient response of the CGS for selecting portions to achieve the best classification rates.
    Matched MeSH terms: Computer Systems
  19. Mohsin AH, Zaidan AA, Zaidan BB, Ariffin SAB, Albahri OS, Albahri AS, et al.
    J Med Syst, 2018 Oct 29;42(12):245.
    PMID: 30374820 DOI: 10.1007/s10916-018-1103-6
    In real-time medical systems, the role of biometric technology is significant in authentication systems because it is used in verifying the identity of people through their biometric features. The biometric technology provides crucial properties for biometric features that can support the process of personal identification. The storage of biometric template within a central database makes it vulnerable to attack which can also occur during data transmission. Therefore, an alternative mechanism of protection becomes important to develop. On this basis, this study focuses on providing a detailed analysis of the extant literature (2013-2018) to identify the taxonomy and research distribution. Furthermore, this study also seeks to ascertain the challenges and motivations associated with biometric steganography in real-time medical systems to provide recommendations that can enhance the efficient use of real-time medical systems in biometric steganography and its applications. A review of articles on human biometric steganography in real-time medical systems obtained from three main databases (IEEE Xplore, ScienceDirect and Web of Science) is conducted according to an appropriate review protocol. Then, 41 related articles are selected by using exclusion and inclusion criteria. Majority of the studies reviewed had been conducted in the field of data-hiding (particularly steganography) technologies. In this review, various steganographic methods that have been applied in different human biometrics are investigated. Thereafter, these methods are categorised according to taxonomy, and the results are presented on the basis of human steganography biometric real-time medical systems, testing and evaluation methods, significance of use and applications and techniques. Finally, recommendations on how the challenges associated with data hiding can be addressed are provided to enhance the efficiency of using biometric information processed in any authentication real-time medical system. These recommendations are expected to be immensely helpful to developers, company users and researchers.
    Matched MeSH terms: Computer Systems
  20. Mat Kiah ML, Al-Bakri SH, Zaidan AA, Zaidan BB, Hussain M
    J Med Syst, 2014 Oct;38(10):133.
    PMID: 25199651 DOI: 10.1007/s10916-014-0133-y
    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.
    Matched MeSH terms: Computer Systems*
Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links