Displaying publications 1 - 20 of 354 in total

Abstract:
Sort:
  1. Kathiravan, Yamunah, Mohd Fahmi Mohamad Amran, Noor Afiza Mat Razali, Mohd Afizi Mohd Shukran, Norshahriah Abdul Wahab, Mohammad Adib Khairuddin, et al.
    MyJurnal
    Privacy has always been a constant concern for many people. Internet users are often worried about the browsing information that is left on their storage media. Web browsers were later introduced with a new feature called private browsing to overcome this issue. The private browsing mode is expected to behave as normal browsing session but without storing any data such as browser cookies, history, cache and passwords on the local machine. Unfortunately, previous researchers concluded web browser often failed to provide the intended privacy protection to their user. Along the way of this reviewing process, the weakness and downside of previous web browser vendors have been identified.
    Matched MeSH terms: Internet
  2. Rada EC, Ragazzi M, Fedrizzi P
    Waste Manag, 2013 Apr;33(4):785-92.
    PMID: 23402896 DOI: 10.1016/j.wasman.2013.01.002
    Municipal solid waste management is a multidisciplinary activity that includes generation, source separation, storage, collection, transfer and transport, processing and recovery, and, last but not least, disposal. The optimization of waste collection, through source separation, is compulsory where a landfill based management must be overcome. In this paper, a few aspects related to the implementation of a Web-GIS based system are analyzed. This approach is critically analyzed referring to the experience of two Italian case studies and two additional extra-European case studies. The first case is one of the best examples of selective collection optimization in Italy. The obtained efficiency is very high: 80% of waste is source separated for recycling purposes. In the second reference case, the local administration is going to be faced with the optimization of waste collection through Web-GIS oriented technologies for the first time. The starting scenario is far from an optimized management of municipal solid waste. The last two case studies concern pilot experiences in China and Malaysia. Each step of the Web-GIS oriented strategy is comparatively discussed referring to typical scenarios of developed and transient economies. The main result is that transient economies are ready to move toward Web oriented tools for MSW management, but this opportunity is not yet well exploited in the sector.
    Matched MeSH terms: Internet
  3. Hannan MA, Abdulla Al Mamun M, Hussain A, Basri H, Begum RA
    Waste Manag, 2015 Sep;43:509-23.
    PMID: 26072186 DOI: 10.1016/j.wasman.2015.05.033
    In the backdrop of prompt advancement, information and communication technology (ICT) has become an inevitable part to plan and design of modern solid waste management (SWM) systems. This study presents a critical review of the existing ICTs and their usage in SWM systems to unfold the issues and challenges towards using integrated technologies based system. To plan, monitor, collect and manage solid waste, the ICTs are divided into four categories such as spatial technologies, identification technologies, data acquisition technologies and data communication technologies. The ICT based SWM systems classified in this paper are based on the first three technologies while the forth one is employed by almost every systems. This review may guide the reader about the basics of available ICTs and their application in SWM to facilitate the search for planning and design of a sustainable new system.
    Matched MeSH terms: Internet
  4. Mohd Azizi FS, Kew Y, Moy FM
    Vaccine, 2017 05 19;35(22):2955-2961.
    PMID: 28434687 DOI: 10.1016/j.vaccine.2017.04.010
    BACKGROUND: Vaccine hesitancy is a threat in combating vaccine-preventable diseases. It has been studied extensively in the Western countries but not so among Asian countries.

    OBJECTIVES: To assess the test-retest reliability of the Parent Attitudes about Childhood Vaccines (PACV) questionnaire in Malay language; to determine the prevalence of vaccine hesitancy among parents and its associations with parents' socio-demographic characteristics.

    METHODS: Forward and backward translation of PACV in Malay language was carried out. The reliability of the Malay-PACV questionnaire was tested among parents with children. The same questionnaire was used to study vaccine hesitancy among parents in a tertiary hospital in Kuala Lumpur. Information pertaining to socio-demographic characteristics, sources of information regarding vaccination and vaccine hesitancy were collected. Associations between vaccine hesitancy with socio-demographic factors were tested using Multivariable Logistic Regression.

    RESULTS: The Spearman correlation coefficient and Cronbach alpha for total PACV was 0.79 (p<0.001) and 0.79 respectively. The intra-class correlation coefficients of the subscales ranged from 0.54 to 0.90 demonstrating fair to excellent reliability. A total of 63 (11.6%) parents were noted to be vaccine hesitant. In the univariate analyses, vaccine hesitancy was associated with unemployed parents, parents who were younger, had fewer children and non-Muslim. In the multivariate model, pregnant mothers expecting their first child were four times more likely to be vaccine hesitant compared to those who already had one or more children (aOR: 3.91, 95% CI: 1.74-8.79) and unemployed parents were also more likely to be vaccine hesitant (aOR: 1.97, 95% CI: 1.08-3.59). The internet (65.6%) was the main source of information on vaccination followed by brochures (56.9%).

    CONCLUSION: The Malay-PACV questionnaire is reliable to be used. The prevalence of vaccine hesitancy among the multi-ethnic Malaysians was comparable with other populations. Pregnant mothers expecting their first child and unemployed parents were found to be more vaccine hesitant.

    Matched MeSH terms: Internet
  5. NURUL SYUHADA SHARIFF, YUSNITA YUSOF, NOOR ZATUL IFFAH HUSSIN
    MyJurnal
    Recreation centre become one of the centres for a family to bring their children for recreation and leisure activity. Moreover, the recreation centre is the place for education, research, and awareness to the public. The main objective of this study is to investigate factors that relate to tourist perception in their reference to their interest, expectations, satisfaction, and a general understanding of the recreation centre. The antecedent factors are awareness of the surrounding environment, visitor experiences, and destination image. This research using a quantitative method via a survey questionnaire and a domestic tourist as a sample. A sample is consist of 384 respondent of domestic tourists who visited the recreation centre in Malaysia. This survey has been done in Zoo Negara, Aquaria KLCC, and FRIM, Kepong. The results show the majority of respondents are female, age below 26 years old, single, obtained higher education, working, and had an income below RM1000. The respondents are mostly from Selangor and their purpose of visit to the recreation centre is for leisure and recreation. The major source of information to visit the recreation centre was from the internet. There were have a significant relationship between an antecedent factor with tourist perception towards the recreation centre in Malaysia. The result of this study will help marketers and management of recreation centres to understand the perceptions of their future visitors. Based on the study, it is should be used as an initial benchmark for the future study, however, they may execute a depth analysis on the tourism that related to the recreation centre in Malaysia.
    Matched MeSH terms: Internet
  6. Mohd Zulhilmi Aqil Muhamad, Noor Hafhizah Abd Rahim
    MyJurnal
    Expert system is a system that emulates experts to aid in decision making. This system can be applied in various categories such as diagnosis, prediction, interpretation, and others. Expert System to Diagnose Dengue Fever is a web-based system which is integrated with prolog language in order to provide rules for dengue fever detection. The aims of this research are to study dengue fever symptoms and other illnesses related to the fever, to design an inference engine, and to build an expert system. The challenges faced while developing this expert system were the complexity of prolog codes and their integration with the web development. In this system, rules were developed by prolog language which define dengue fever and accuracy based on input from the user. This system is expected to aid users in self-detecting early symptoms of dengue fever before seeing the doctors.
    Matched MeSH terms: Internet
  7. Iranmanesh V, Ahmad SM, Adnan WA, Yussof S, Arigbabu OA, Malallah FL
    ScientificWorldJournal, 2014;2014:381469.
    PMID: 25133227 DOI: 10.1155/2014/381469
    One of the main difficulties in designing online signature verification (OSV) system is to find the most distinctive features with high discriminating capabilities for the verification, particularly, with regard to the high variability which is inherent in genuine handwritten signatures, coupled with the possibility of skilled forgeries having close resemblance to the original counterparts. In this paper, we proposed a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features. The proposed approach illustrates a feature selection technique on the usually discarded information from PCA computation, which can be significant in attaining reduced error rates. The experiment is performed using 4000 signature samples from SIGMA database, which yielded a false acceptance rate (FAR) of 7.4% and a false rejection rate (FRR) of 6.4%.
    Matched MeSH terms: Internet*
  8. Whaiduzzaman M, Haque MN, Rejaul Karim Chowdhury M, Gani A
    ScientificWorldJournal, 2014;2014:894362.
    PMID: 25032243 DOI: 10.1155/2014/894362
    Cloud computing is currently emerging as an ever-changing, growing paradigm that models "everything-as-a-service." Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified.
    Matched MeSH terms: Internet/standards
  9. Falamarzi A, Borhan MN, Rahmat RA
    ScientificWorldJournal, 2014;2014:757981.
    PMID: 25276861 DOI: 10.1155/2014/757981
    Lack of traffic safety has become a serious issue in residential areas. In this paper, a web-based advisory expert system for the purpose of applying traffic calming strategies on residential streets is described because there currently lacks a structured framework for the implementation of such strategies. Developing an expert system can assist and advise engineers for dealing with traffic safety problems. This expert system is developed to fill the gap between the traffic safety experts and people who seek to employ traffic calming strategies including decision makers, engineers, and students. In order to build the expert system, examining sources related to traffic calming studies as well as interviewing with domain experts have been carried out. The system includes above 150 rules and 200 images for different types of measures. The system has three main functions including classifying traffic calming measures, prioritizing traffic calming strategies, and presenting solutions for different traffic safety problems. Verifying, validating processes, and comparing the system with similar works have shown that the system is consistent and acceptable for practical uses. Finally, some recommendations for improving the system are presented.
    Matched MeSH terms: Internet*
  10. Khan N, Yaqoob I, Hashem IA, Inayat Z, Ali WK, Alam M, et al.
    ScientificWorldJournal, 2014;2014:712826.
    PMID: 25136682 DOI: 10.1155/2014/712826
    Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion devices are expected to be connected to the Internet. At this point, predicted data production will be 44 times greater than that in 2009. As information is transferred and shared at light speed on optic fiber and wireless networks, the volume of data and the speed of market growth increase. However, the fast growth rate of such large data generates numerous challenges, such as the rapid growth of data, transfer speed, diverse data, and security. Nonetheless, Big Data is still in its infancy stage, and the domain has not been reviewed in general. Hence, this study comprehensively surveys and classifies the various attributes of Big Data, including its nature, definitions, rapid growth rate, volume, management, analysis, and security. This study also proposes a data life cycle that uses the technologies and terminologies of Big Data. Future research directions in this field are determined based on opportunities and several open issues in Big Data domination. These research directions facilitate the exploration of the domain and the development of optimal techniques to address Big Data.
    Matched MeSH terms: Internet*
  11. Amini A, Saboohi H, Wah TY, Herawan T
    ScientificWorldJournal, 2014;2014:926020.
    PMID: 25110753 DOI: 10.1155/2014/926020
    Data streams are continuously generated over time from Internet of Things (IoT) devices. The faster all of this data is analyzed, its hidden trends and patterns discovered, and new strategies created, the faster action can be taken, creating greater value for organizations. Density-based method is a prominent class in clustering data streams. It has the ability to detect arbitrary shape clusters, to handle outlier, and it does not need the number of clusters in advance. Therefore, density-based clustering algorithm is a proper choice for clustering IoT streams. Recently, several density-based algorithms have been proposed for clustering data streams. However, density-based clustering in limited time is still a challenging issue. In this paper, we propose a density-based clustering algorithm for IoT streams. The method has fast processing time to be applicable in real-time application of IoT devices. Experimental results show that the proposed approach obtains high quality results with low computation time on real and synthetic datasets.
    Matched MeSH terms: Internet*
  12. Nematzadeh H, Motameni H, Mohamad R, Nematzadeh Z
    ScientificWorldJournal, 2014;2014:847930.
    PMID: 25110748 DOI: 10.1155/2014/847930
    Workflow-based web service compositions (WB-WSCs) is one of the main composition categories in service oriented architecture (SOA). Eflow, polymorphic process model (PPM), and business process execution language (BPEL) are the main techniques of the category of WB-WSCs. Due to maturity of web services, measuring the quality of composite web services being developed by different techniques becomes one of the most important challenges in today's web environments. Business should try to provide good quality regarding the customers' requirements to a composed web service. Thus, quality of service (QoS) which refers to nonfunctional parameters is important to be measured since the quality degree of a certain web service composition could be achieved. This paper tried to find a deterministic analytical method for dependability and performance measurement using Colored Petri net (CPN) with explicit routing constructs and application of theory of probability. A computer tool called WSET was also developed for modeling and supporting QoS measurement through simulation.
    Matched MeSH terms: Internet/standards*
  13. Whaiduzzaman M, Gani A, Anuar NB, Shiraz M, Haque MN, Haque IT
    ScientificWorldJournal, 2014;2014:459375.
    PMID: 24696645 DOI: 10.1155/2014/459375
    Cloud computing (CC) has recently been receiving tremendous attention from the IT industry and academic researchers. CC leverages its unique services to cloud customers in a pay-as-you-go, anytime, anywhere manner. Cloud services provide dynamically scalable services through the Internet on demand. Therefore, service provisioning plays a key role in CC. The cloud customer must be able to select appropriate services according to his or her needs. Several approaches have been proposed to solve the service selection problem, including multicriteria decision analysis (MCDA). MCDA enables the user to choose from among a number of available choices. In this paper, we analyze the application of MCDA to service selection in CC. We identify and synthesize several MCDA techniques and provide a comprehensive analysis of this technology for general readers. In addition, we present a taxonomy derived from a survey of the current literature. Finally, we highlight several state-of-the-art practical aspects of MCDA implementation in cloud computing service selection. The contributions of this study are four-fold: (a) focusing on the state-of-the-art MCDA techniques, (b) highlighting the comparative analysis and suitability of several MCDA methods, (c) presenting a taxonomy through extensive literature review, and (d) analyzing and summarizing the cloud computing service selections in different scenarios.
    Matched MeSH terms: Internet*
  14. Ghazizadeh E, Zamani M, Ab Manan JL, Alizadeh M
    ScientificWorldJournal, 2014;2014:260187.
    PMID: 24701149 DOI: 10.1155/2014/260187
    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
    Matched MeSH terms: Internet/standards*; Internet/trends
  15. Shah PA, Hasbullah HB, Lawal IA, Aminu Mu'azu A, Tang Jung L
    ScientificWorldJournal, 2014;2014:506028.
    PMID: 24688398 DOI: 10.1155/2014/506028
    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).
    Matched MeSH terms: Internet*
  16. Qazi A, Raj RG, Tahir M, Waheed M, Waheed M, Khan SU, et al.
    ScientificWorldJournal, 2014;2014:872929.
    PMID: 24711739 DOI: 10.1155/2014/872929
    Existing opinion mining studies have focused on and explored only two types of reviews, that is, regular and comparative. There is a visible gap in determining the useful review types from customers and designers perspective. Based on Technology Acceptance Model (TAM) and statistical measures we examine users' perception about different review types and its effects in terms of behavioral intention towards using online review system. By using sample of users (N = 400) and designers (N = 106), current research work studies three review types, A (regular), B (comparative), and C (suggestive), which are related to perceived usefulness, perceived ease of use, and behavioral intention. The study reveals that positive perception of the use of suggestive reviews improves users' decision making in business intelligence. The results also depict that type C (suggestive reviews) could be considered a new useful review type in addition to other types, A and B.
    Matched MeSH terms: Internet
  17. Khairudin NM, Mustapha A, Ahmad MH
    ScientificWorldJournal, 2014;2014:813983.
    PMID: 24587757 DOI: 10.1155/2014/813983
    The advent of web-based applications and services has created such diverse and voluminous web log data stored in web servers, proxy servers, client machines, or organizational databases. This paper attempts to investigate the effect of temporal attribute in relational rule mining for web log data. We incorporated the characteristics of time in the rule mining process and analysed the effect of various temporal parameters. The rules generated from temporal relational rule mining are then compared against the rules generated from the classical rule mining approach such as the Apriori and FP-Growth algorithms. The results showed that by incorporating the temporal attribute via time, the number of rules generated is subsequently smaller but is comparable in terms of quality.
    Matched MeSH terms: Internet*
  18. Yang HK, Ji J, Han SU, Terashima M, Li G, Kim HH, et al.
    Lancet Gastroenterol Hepatol, 2021 02;6(2):120-127.
    PMID: 33253659 DOI: 10.1016/S2468-1253(20)30315-0
    BACKGROUND: Peritoneal recurrence of gastric cancer after curative surgical resection is common and portends a poor prognosis. Early studies suggest that extensive intraoperative peritoneal lavage (EIPL) might reduce the risk of peritoneal recurrence and improve survival. We aimed to evaluate the survival benefit of EIPL in patients with gastric cancer undergoing curative gastrectomy.

    METHODS: In this open-label, phase 3, multicentre randomised trial, patients aged 21-80 years with cT3 or cT4 gastric cancer undergoing curative resection were enrolled at 22 centres from South Korea, China, Japan, Malaysia, Hong Kong, and Singapore. Patients were randomly assigned to receive surgery and EIPL (EIPL group) or surgery alone (standard surgery group) via a web-based programme in random permuted blocks in varying block sizes of four and six, assuming equal allocation between treatment groups. Randomisation was stratified according to study site and the sequence was generated using a computer program and concealed until the interventions were assigned. After surgery in the EIPL group, peritoneal lavage was done with 1 L of warm (42°C) normal 0·9% saline followed by complete aspiration; this procedure was repeated ten times. The primary endpoint was overall survival. All analyses were done assuming intention to treat. This trial is registered with ClinicalTrials.gov, NCT02140034.

    FINDINGS: Between Sept 16, 2012, and Aug 3, 2018, 800 patients were randomly assigned to the EIPL group (n=398) or the standard surgery group (n=402). Two patients in the EIPL group and one in the standard surgery group withdrew from the trial immediately after randomisation and were excluded from the intention-to-treat analysis. At the third interim analysis on Aug 28, 2019, the predictive probability of overall survival being significantly higher in the EIPL group was less than 0·5%; therefore, the trial was terminated on the basis of futility. With a median follow-up of 2·4 years (IQR 1·5-3·0), the two groups were similar in terms of overall survival (hazard ratio 1·09 [95% CI 0·78-1·52; p=0·62). 3-year overall survival was 77·0% (95% CI 71·4-81·6) for the EIPL group and 76·7% (71·0-81·5) for the standard surgery group. 60 adverse events were reported in the EIPL group and 41 were reported in the standard surgery group. The most common adverse events included anastomotic leak (ten [3%] of 346 patients in the EIPL group vs six [2%] of 362 patients in the standard surgery group), bleeding (six [2%] vs six [2%]), intra-abdominal abscess (four [1%] vs five [1%]), superficial wound infection (seven [2%] vs one [<1%]), and abnormal liver function (six [2%] vs one [<1%]). Ten of the reported adverse events (eight in the EIPL group and two in the standard surgery group) resulted in death.

    INTERPRETATION: EIPL and surgery did not have a survival benefit compared with surgery alone and is not recommended for patients undergoing curative gastrectomy for gastric cancer.

    FUNDING: National Medical Research Council, Singapore.

    Matched MeSH terms: Internet
  19. Alhajj MN, Mashyakhy M, Ariffin Z, Ab-Ghani Z, Johari Y, Salim NS
    J Contemp Dent Pract, 2020 Sep 01;21(9):956-960.
    PMID: 33568578
    AIM: This study aimed to assess the quality and readability of the available health information on the net regarding denture hygiene.

    MATERIALS AND METHODS: Three search engines (Google, Yahoo!, and Bing) were searched. The first 20 consecutive websites from each engine were obtained and checked for eligibility. For the quality of the websites, the Health on the Net Foundation Code of Conduct (HONcode), the DISCERN tool, the Journal of the American Medical Association (JAMA) Benchmarks, and Google PageRank were used for the assessment of the included websites. For readability, an online web tool was used, including well-known analyzing indices [Flesch Kincaid grade level (FKGL), Simple Measure of Gobbledygook (SMOG), and Flesch Reading Ease (FRE)]. The acceptable readability level was set to be ≥80.0 for the FRE and <7 for the FKGL and SMOG. The data were presented in frequencies and percentages.

    RESULTS: Out of the 60 screened websites, 14 websites were eligible for analysis. There was only one (7.1%) website that had the HONcode seal. The mean score of all websites based on the DISCERN tool was 29.6 ± 12.1, with no website achieved the high score (≥65). Only one (7.1%) website scored >5 based on Google PageRank. Regarding JAMA benchmarks, all websites achieved a mean score of 2.57 ± 1.1. The mean grade level based on the FKGL was 8.4 ± 6.3. All websites had a score of <7 according to the SMOG index. The mean score of the readability ease index was 90.5 ± 16.4.

    CONCLUSION: Most of the dental health information on denture hygiene available on the Arabic websites did not have the required level of quality, regardless of being readable and comprehensible by most of the general people.

    CLINICAL SIGNIFICANCE: Directing the patients to the appropriate websites related to their cases is the responsibility of the dentists.

    Matched MeSH terms: Internet
  20. Goh PP, Elias H, Norfariza N, Mariam I, National Eye Database Steering Committee
    Med J Malaysia, 2008 Sep;63 Suppl C:20-3.
    PMID: 19227672
    National Eye Database (www.acrm.org.my/ned) is a web based surveillance system which collects data on eye diseases and clinical performance in ophthalmology service. It is a prospective study with online data collection, concurrent descriptive data analysis and real time report. It includes cataract surgery registry, diabetic eye registry, glaucoma registry, contact lens related corneal ulcer surveillance and monthly ophthalmology service census. This article presents the methodology and some registries reports. The web based surveillance system has made dissemination of report prompt, easy and without barrier.
    Matched MeSH terms: Internet/statistics & numerical data*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links