Displaying publications 1 - 20 of 77 in total

Abstract:
Sort:
  1. Abdulhamid SM, Abd Latiff MS, Abdul-Salaam G, Hussain Madni SH
    PLoS One, 2016;11(7):e0158102.
    PMID: 27384239 DOI: 10.1371/journal.pone.0158102
    Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques.
    Matched MeSH terms: Information Storage and Retrieval*
  2. Abidi SS
    PMID: 10724926
    Presently, there is a growing demand from the healthcare community to leverage upon and transform the vast quantities of healthcare data into value-added, 'decision-quality' knowledge, vis-à-vis, strategic knowledge services oriented towards healthcare management and planning. To meet this end, we present a Strategic Knowledge Services Info-structure that leverages on existing healthcare knowledge/data bases to derive decision-quality knowledge-knowledge that is extracted from healthcare data through services akin to knowledge discovery in databases and data mining.
    Matched MeSH terms: Information Storage and Retrieval/statistics & numerical data*
  3. Ahmad Syaify B., Alamin M. D., Norafidah A. R.
    MyJurnal
    Introduction:Lymphatic filariasis (LF) is a neglected tropical disease that can cause significant morbidity. In Malay-sia, National Programme for the Elimination of Lymphatic Filariasis started in 2001 with the initial target of achiev-ing Lymphatic Filariasis elimination status by 2018 but it has been revised to year 2020. Mass Drug Administration (MDA) Programme was performed from 2004 to 2008 in all endemic areas (Red Implementation Unit, IU) in Malay-sia including Terengganu state to stop disease transmission. Transmission Assessment Surveys (TAS) were conducted later on and for Terengganu, they were done in 2011 (TAS 1), 2015 (TAS 2) and 2017 (TAS 3) and had passed all the surveys based on critical cut off (CCO) point given. Methods: A cross sectional analysis of 10-year Terengganu filariasis records (2009-2018) was initiated in June 2019 using data source from eVekpro and filariasis cases line-list-ing. Results: Majority of filariasis cases in Terengganu were among males (n=147, 76.6%) with the highest number among 30-39 year-old age group (n=35, 18.2%). Majority of cases were Malaysian citizens (n=162, 84.4%) with main filariasis species identified were Brugia Malayi (n=149, 77.6%). The number of cases diagnosed was slightly higher from Green Implementation Unit area (n=102, 53.1%) compared to Red Implementation Unit area. Conclu-sion: The number of lymphatic filariasis cases among Terengganu citizens was below critical cut off point after the accomplishment of MDA programme and in accordance with the aim of lymphatic filariasis elimination status in Malaysia by 2020.
    Matched MeSH terms: Information Storage and Retrieval
  4. Al-Ani AK, Anbar M, Manickam S, Al-Ani A
    PLoS One, 2019;14(4):e0214518.
    PMID: 30939154 DOI: 10.1371/journal.pone.0214518
    An efficiently unlimited address space is provided by Internet Protocol version 6 (IPv6). It aims to accommodate thousands of hundreds of unique devices on a similar link. This can be achieved through the Duplicate Address Detection (DAD) process. It is considered one of the core IPv6 network's functions. It is implemented to make sure that IP addresses do not conflict with each other on the same link. However, IPv6 design's functions are exposed to security threats like the DAD process, which is vulnerable to Denial of Service (DoS) attack. Such a threat prevents the host from configuring its IP address by responding to each Neighbor Solicitation (NS) through fake Neighbor Advertisement (NA). Various mechanisms have been proposed to secure the IPv6 DAD procedure. The proposed mechanisms, however, suffer from complexity, high processing time, and the consumption of more resources. The experiments-based findings revealed that all the existing mechanisms had failed to secure the IPv6 DAD process. Therefore, DAD-match security technique is proposed in this study to efficiently secure the DAD process consuming less processing time. DAD-match is built based on SHA-3 to hide the exchange tentative IP among hosts throughout the process of DAD in an IPv6 link-local network. The obtained experimental results demonstrated that the DAD-match security technique achieved less processing time compared with the existing mechanisms as it can resist a range of different threats like collision and brute-force attacks. The findings concluded that the DAD-match technique effectively prevents the DoS attack during the DAD process. The DAD-match technique is implemented on a small area IPv6 network; hence, the author future work is to implement and test the DAD-match technique on a large area IPv6 network.
    Matched MeSH terms: Information Storage and Retrieval/methods
  5. Aldeen YA, Salleh M, Aljeroudi Y
    J Biomed Inform, 2016 08;62:107-16.
    PMID: 27369566 DOI: 10.1016/j.jbi.2016.06.011
    Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation.
    Matched MeSH terms: Information Storage and Retrieval*
  6. Alhaj TA, Siraj MM, Zainal A, Elshoush HT, Elhaj F
    PLoS One, 2016;11(11):e0166017.
    PMID: 27893821 DOI: 10.1371/journal.pone.0166017
    Grouping and clustering alerts for intrusion detection based on the similarity of features is referred to as structurally base alert correlation and can discover a list of attack steps. Previous researchers selected different features and data sources manually based on their knowledge and experience, which lead to the less accurate identification of attack steps and inconsistent performance of clustering accuracy. Furthermore, the existing alert correlation systems deal with a huge amount of data that contains null values, incomplete information, and irrelevant features causing the analysis of the alerts to be tedious, time-consuming and error-prone. Therefore, this paper focuses on selecting accurate and significant features of alerts that are appropriate to represent the attack steps, thus, enhancing the structural-based alert correlation model. A two-tier feature selection method is proposed to obtain the significant features. The first tier aims at ranking the subset of features based on high information gain entropy in decreasing order. The‏ second tier extends additional features with a better discriminative ability than the initially ranked features. Performance analysis results show the significance of the selected features in terms of the clustering accuracy using 2000 DARPA intrusion detection scenario-specific dataset.
    Matched MeSH terms: Information Storage and Retrieval
  7. Ali NM, Khan HA, Then AY, Ving Ching C, Gaur M, Dhillon SK
    PeerJ, 2017;5:e3811.
    PMID: 28929028 DOI: 10.7717/peerj.3811
    Life science ontologies play an important role in Semantic Web. Given the diversity in fish species and the associated wealth of information, it is imperative to develop an ontology capable of linking and integrating this information in an automated fashion. As such, we introduce the Fish Ontology (FO), an automated classification architecture of existing fish taxa which provides taxonomic information on unknown fish based on metadata restrictions. It is designed to support knowledge discovery, provide semantic annotation of fish and fisheries resources, data integration, and information retrieval. Automated classification for unknown specimens is a unique feature that currently does not appear to exist in other known ontologies. Examples of automated classification for major groups of fish are demonstrated, showing the inferred information by introducing several restrictions at the species or specimen level. The current version of FO has 1,830 classes, includes widely used fisheries terminology, and models major aspects of fish taxonomy, grouping, and character. With more than 30,000 known fish species globally, the FO will be an indispensable tool for fish scientists and other interested users.
    Matched MeSH terms: Information Storage and Retrieval
  8. Az Azrinudin Alidin, Crestani, Fabio
    MyJurnal
    Mobile users have the capability of accessing information anywhere at any time with the introduction of mobile browsers and mobile web search. However, the current mobile browsers are implemented without considering the characteristics of mobile searches. As a result, mobile users need to devote time and effort in order to retrieve relevant information from the web in mobile devices. On the other hand, mobile users often request information related to their surroundings, which is also known as context. This recognizes the importance of including context in information retrieval. Besides, the availability of the embedded sensors in mobile devices has supported the recognition of context. In this study, the context acquisition and utilization for mobile information retrieval are proposed. The “just-in-time” approach is exploited in which the information that is relevant to a user is retrieved without the user requesting it. This will reduce the mobile user’s effort, time and interaction when retrieving information in mobile devices. In this paper, the context dimensions and context model are presented. Simple experiments are shown where user context is predicted using the context model.
    Matched MeSH terms: Information Storage and Retrieval
  9. Boedeker W, Watts M, Clausing P, Marquez E
    BMC Public Health, 2021 10 27;21(1):1943.
    PMID: 34702250 DOI: 10.1186/s12889-021-11941-z
    In a correspondence to BMC Public Health, Dunn et al. (Dunn SE, Reed J and Neumann C. BMC Public Health (n.d)) respond to our review on the occurrence of unintentional, acute pesticide poisoning (UAPP). Based on a systematic review and further data sources we estimated that about 385 million cases of UAPP occur annually world-wide including around 11,000 fatalities (Boedeker W. et al. BMC Public Health:1875, 2020).
    Matched MeSH terms: Information Storage and Retrieval
  10. Che Mustapha Yusuf, J., Mohd Su’ud, M., Boursier, P., Muhammad, A.
    MyJurnal
    Finding relevant disaster data from a huge metadata overhead often results in frustrating search
    experiences caused by unclear access points, ambiguous search methods, unsuitable metadata, and long response times. More frequently, semantic relation between the retrieved objects is neglected. This paper presents a system architecture that makes use of ontologies in order to enable semantic metadata descriptions for gathering and integrating multi-format documents in the context of disaster management. After a brief discussion on the challenges of the integration process, the Multi-format Information Retrieval, Integration and Presentation (MIRIP) architecture is presented. A specific approach for ontology development and mapping process is introduced in order to semantically associate user’s query and documents metadata. An ontology model approach was designed to follow inspirational and collaborative approaches with top-down to bottom-up implementation. A prototype of the integrated disaster management information system is currently under development, based on the architecture that is presented in this paper.
    Matched MeSH terms: Information Storage and Retrieval
  11. Chusniyah T, Jaafar JLS, Chaiwutikornwanich A, Kuswandi D, Firmanto A, Mustopa A, et al.
    Data Brief, 2020 Oct;32:106314.
    PMID: 32995402 DOI: 10.1016/j.dib.2020.106314
    The present data article provides a descriptive and analytical exploration on the links between positive mental health, subjective happiness, forgiveness, humility, and information literacy self-efficacy among 969 undergraduate students from Indonesia, Malaysia, and Thailand. There are 355 males and 614 females with an average age of 20.47 years and a standard deviation of 1.87. Respondents are recruited by simple random sampling using face to face method, at one time data retrieval during 2019. The Indonesian, Malaysian and Thailand-version questionnaires were provided to each groups of participants according to their nationality and native language, using back-to-back analysis. The socio-demographic details of the respondents, descriptive statistics, confirmatory factor analysis, correlation matrix of all variables in all groups according to country, results of regression analysis of variables, and Kruskal Wallis for all five variables in all groups are provided.
    Matched MeSH terms: Information Storage and Retrieval
  12. College of Pathologists, Academy of Medicine of Malaysia, Ministry of Health Malaysia
    Malays J Pathol, 2005 Jun;27(1):51-6.
    PMID: 16676694
    Matched MeSH terms: Information Storage and Retrieval/standards*
  13. Drama, S., Maliya, S., Liyana, A., Farhani, S., Jannah, R., Razman., M.R.
    MyJurnal
    Introduction: Transsexuals face discriminations and rejections from the Malaysian society. The number of
    studies done on understanding the phenomenology, experiences, and problems faced by transsexuals is still
    few in Malaysia. This research aims to document their psycho-social and spiritual backgrounds and the
    relevant experiences, and to explore their perceptions and needs as male-to-female transsexuals in the
    context of Persatuan Insaf Pahang, Malaysia. Materials and Methods: A qualitative research was carried out
    in July and August 2015 among eight male-to-female transsexual adults in Kuantan, Pahang. Snowball
    sampling was used. Participants who gave consent were interviewed in two focus groups. Data obtained was
    transcribed and used as the primary data source. Results: Subjects in this study reported confusions over
    their gender identity since childhood. They struggled against conflicts regarding their transsexuality in
    adolescence, and eventually many quit their studies. As adults, they were discriminated against in
    employment and religious settings. They provided positive feedbacks on religious authorities who could
    understand problems unique to transsexuals and empathise with the transsexual community. Conclusion: The
    psycho-sexual phenomenology is the same in transsexuals all over the world. Misunderstanding and
    discrimination from the society remain heavy towards this community. Transsexuals should learn to adapt to
    meeting expectations from the society as well, so they could be accepted in public. They will need religious
    guidance and spiritual support for better quality of life. Dedicated efforts are still needed in training
    professionals in the educational, medical, and religious fields to attend to the specific needs of transsexuals
    in this country.
    Matched MeSH terms: Information Storage and Retrieval
  14. EAS Familial Hypercholesterolaemia Studies Collaboration, Vallejo-Vaz AJ, Akram A, Kondapally Seshasai SR, Cole D, Watts GF, et al.
    Atheroscler Suppl, 2016 Dec;22:1-32.
    PMID: 27939304 DOI: 10.1016/j.atherosclerosissup.2016.10.001
    The potential for global collaborations to better inform public health policy regarding major non-communicable diseases has been successfully demonstrated by several large-scale international consortia. However, the true public health impact of familial hypercholesterolaemia (FH), a common genetic disorder associated with premature cardiovascular disease, is yet to be reliably ascertained using similar approaches. The European Atherosclerosis Society FH Studies Collaboration (EAS FHSC) is a new initiative of international stakeholders which will help establish a global FH registry to generate large-scale, robust data on the burden of FH worldwide.
    Matched MeSH terms: Information Storage and Retrieval
  15. Firdaus Raih M, Ahmad HA, Sharum MY, Azizi N, Mohamed R
    Appl. Bioinformatics, 2005;4(2):147-50.
    PMID: 16128617
    Bacterial proteases are an important group of enzymes that have very diverse biochemical and cellular functions. Proteases from prokaryotic sources also have a wide range of uses, either in medicine as pathogenic factors or in industry and therapeutics. ProLysED (Prokaryotic Lysis Enzymes Database), our meta-server integrated database of bacterial proteases, is a useful, albeit very niche, resource. The features include protease classification browsing and searching, organism-specific protease browsing, molecular information and visualisation of protease structures from the Protein Data Bank (PDB) as well as predicted protease structures.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  16. Fozi K, Teng CL, Krishnan R, Shajahan Y
    Med J Malaysia, 2000 Dec;55(4):486-92.
    PMID: 11221162
    This is a prospective study of clinical questions generated in primary care consultations and a comparison of two approaches to answering those clinical questions. Twenty-one doctors in a university-based primary care clinic submitted 78 clinical questions arising from patient consultations during 24 clinic days (0.01 question per patient encounter). These doctors subsequently found answers to 40% of their questions but were satisfied with only 67% of these answers. The investigators were able to provide answers for 95% of the questions asked and the doctors rated these answers as satisfactory in 86% of instances. Answers obtained by investigators had significantly higher satisfaction score than those obtained by doctors' search (p = 0.002). The two main findings of this study are (1) almost all questions arising in clinic setting could be answered by intensive search; (2) answers found by intensive searches were judged to be more satisfactory than those found routinely by doctors. Provision of an information retrieval service in addition to training in the searching and appraisal of medical literature are possible solutions to the information needs of busy clinicians.

    Study site: Primary Care Clinic,
    University Hospital Kuala Lumpur i
    Matched MeSH terms: Information Storage and Retrieval/standards*
  17. Gan SM, Pearl ZF, Yuvaraj AR, Lutfor MR, Gurumurthy H
    PMID: 26004096 DOI: 10.1016/j.saa.2015.05.027
    Two new ether substituted azodyes were synthesized and characterized by different spectral analysis such as (1)H NMR, (13)C NMR, FTIR and UV/Vis. Synthesized compounds were used to study the photoisomerization phenomenon by using UV-Vis spectro-photometer. Interesting polarity dependent effect is observed for the first time on these materials. Trans-cis (E-Z) and cis-trans (Z-E) conversion occurred within 41 s and 445 min, respectively for both the compounds in solutions. Polarizing optical microscopy studies revealed that there is no liquid crystal phase for both the compounds. The dramatic variation in the optical property is speculated to be the polarity of the chemical species. These derivatives are useful to fabricate optical data storage devices.
    Matched MeSH terms: Information Storage and Retrieval
  18. Ghazizadeh E, Zamani M, Ab Manan JL, Alizadeh M
    ScientificWorldJournal, 2014;2014:260187.
    PMID: 24701149 DOI: 10.1155/2014/260187
    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
    Matched MeSH terms: Information Storage and Retrieval/standards; Information Storage and Retrieval/trends
  19. Hasan S, Shamsuddin SM
    Comput Intell Neurosci, 2011;2011:121787.
    PMID: 21876686 DOI: 10.1155/2011/121787
    Multistrategy Learning of Self-Organizing Map (SOM) and Particle Swarm Optimization (PSO) is commonly implemented in clustering domain due to its capabilities in handling complex data characteristics. However, some of these multistrategy learning architectures have weaknesses such as slow convergence time always being trapped in the local minima. This paper proposes multistrategy learning of SOM lattice structure with Particle Swarm Optimisation which is called ESOMPSO for solving various classification problems. The enhancement of SOM lattice structure is implemented by introducing a new hexagon formulation for better mapping quality in data classification and labeling. The weights of the enhanced SOM are optimised using PSO to obtain better output quality. The proposed method has been tested on various standard datasets with substantial comparisons with existing SOM network and various distance measurement. The results show that our proposed method yields a promising result with better average accuracy and quantisation errors compared to the other methods as well as convincing significant test.
    Matched MeSH terms: Information Storage and Retrieval/methods
  20. Hassan A, Ibrahim F
    J Digit Imaging, 2011 Apr;24(2):308-13.
    PMID: 20386951 DOI: 10.1007/s10278-010-9283-8
    This paper presents the development of kidney TeleUltrasound consultation system. The TeleUltrasound system provides an innovative design that aids the acquisition, archiving, and dissemination of medical data and information over the internet as its backbone. The system provides data sharing to allow remote collaboration, viewing, consultation, and diagnosis of medical data. The design is layered upon a standard known as Digital Imaging and Communication in Medicine (DICOM). The DICOM standard defines protocols for exchanging medical images and their associated data. The TeleUltrasound system is an integrated solution for retrieving, processing, and archiving images and providing data storage management using Structured Query Language (SQL) database. Creating a web-based interface is an additional advantage to achieve global accessibility of experts that will widely open the opportunity of greater examination and multiple consultations. This system is equipped with a high level of data security and its performance has been tested with white, black, and gray box techniques. And the result was satisfactory. The overall system has been evaluated by several radiologists in Malaysia, United Arab Emirates, and Sudan, the result is shown within this paper.
    Matched MeSH terms: Information Storage and Retrieval/methods*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links