Displaying publications 21 - 40 of 618 in total

Abstract:
Sort:
  1. Aghabozorgi S, Ying Wah T, Herawan T, Jalab HA, Shaygan MA, Jalali A
    ScientificWorldJournal, 2014;2014:562194.
    PMID: 24982966 DOI: 10.1155/2014/562194
    Time series clustering is an important solution to various problems in numerous fields of research, including business, medical science, and finance. However, conventional clustering algorithms are not practical for time series data because they are essentially designed for static data. This impracticality results in poor clustering accuracy in several systems. In this paper, a new hybrid clustering algorithm is proposed based on the similarity in shape of time series data. Time series data are first grouped as subclusters based on similarity in time. The subclusters are then merged using the k-Medoids algorithm based on similarity in shape. This model has two contributions: (1) it is more accurate than other conventional and hybrid approaches and (2) it determines the similarity in shape among time series data with a low complexity. To evaluate the accuracy of the proposed model, the model is tested extensively using syntactic and real-world time series datasets.
  2. Tayan O, Kabir MN, Alginahi YM
    ScientificWorldJournal, 2014;2014:514652.
    PMID: 25254247 DOI: 10.1155/2014/514652
    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.
  3. Abdulameer MH, Sheikh Abdullah SN, Othman ZA
    ScientificWorldJournal, 2014;2014:879031.
    PMID: 25165748 DOI: 10.1155/2014/879031
    Active appearance model (AAM) is one of the most popular model-based approaches that have been extensively used to extract features by highly accurate modeling of human faces under various physical and environmental circumstances. However, in such active appearance model, fitting the model with original image is a challenging task. State of the art shows that optimization method is applicable to resolve this problem. However, another common problem is applying optimization. Hence, in this paper we propose an AAM based face recognition technique, which is capable of resolving the fitting problem of AAM by introducing a new adaptive ABC algorithm. The adaptation increases the efficiency of fitting as against the conventional ABC algorithm. We have used three datasets: CASIA dataset, property 2.5D face dataset, and UBIRIS v1 images dataset in our experiments. The results have revealed that the proposed face recognition technique has performed effectively, in terms of accuracy of face recognition.
  4. Hentabli H, Saeed F, Abdo A, Salim N
    ScientificWorldJournal, 2014;2014:286974.
    PMID: 25140330 DOI: 10.1155/2014/286974
    Molecular similarity is a pervasive concept in drug design. The basic idea underlying molecular similarity is the similar property principle, which states that structurally similar molecules will exhibit similar physicochemical and biological properties. In this paper, a new graph-based molecular descriptor (GBMD) is introduced. The GBMD is a new method of obtaining a rough description of 2D molecular structure in textual form based on the canonical representations of the molecule outline shape and it allows rigorous structure specification using small and natural grammars. Simulated virtual screening experiments with the MDDR database show clearly the superiority of the graph-based descriptor compared to many standard descriptors (ALOGP, MACCS, EPFP4, CDKFP, PCFP, and SMILE) using the Tanimoto coefficient (TAN) and the basic local alignment search tool (BLAST) when searches were carried.
  5. Asgari B, Osman SA, Adnan A
    ScientificWorldJournal, 2014;2014:503016.
    PMID: 25050400 DOI: 10.1155/2014/503016
    Cable-stayed bridges are one of the most popular types of long-span bridges. The structural behaviour of cable-stayed bridges is sensitive to the load distribution between the girder, pylons, and cables. The determination of pretensioning cable stresses is critical in the cable-stayed bridge design procedure. By finding the optimum stresses in cables, the load and moment distribution of the bridge can be improved. In recent years, different research works have studied iterative and modern methods to find optimum stresses of cables. However, most of the proposed methods have limitations in optimising the structural performance of cable-stayed bridges. This paper presents a multiconstraint optimisation method to specify the optimum cable forces in cable-stayed bridges. The proposed optimisation method produces less bending moments and stresses in the bridge members and requires shorter simulation time than other proposed methods. The results of comparative study show that the proposed method is more successful in restricting the deck and pylon displacements and providing uniform deck moment distribution than unit load method (ULM). The final design of cable-stayed bridges can be optimised considerably through proposed multiconstraint optimisation method.
  6. Al-Haiqi A, Ismail M, Nordin R
    ScientificWorldJournal, 2014;2014:969628.
    PMID: 25295311 DOI: 10.1155/2014/969628
    Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications communicating over covert channels. Still no universal solution can countermeasure this sort of attack unless the covert channels are known. This paper is an attempt to reveal a new covert channel, not only being specific to smartphones, but also exploiting an unusual resource as a vehicle to carry covert information: sensors data. Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. Our evaluations confirmed a real threat where strings of tens of characters could be transmitted errorless if the throughput is reduced to around 2.5-5 bps. The proposed covert channel is very stealthy as no unusual permissions are required and there is no explicit communication between the colluding applications.
  7. Rosli MK, Syed-Shabthar SM, Abdul-Patah P, Abdul-Samad Z, Abdul SN, Burhanuddin MN, et al.
    ScientificWorldJournal, 2014;2014:457350.
    PMID: 24715812 DOI: 10.1155/2014/457350
    Three species of otter can be found throughout Malay Peninsula: Aonyx cinereus, Lutra sumatrana, and Lutrogale perspicillata. In this study, we focused on the A. cinereus population that ranges from the southern and the east coast to the northern regions of Malay Peninsula up to southern Thailand to review the relationships between the populations based on the mitochondrial D-loop region. Forty-eight samples from six populations were recognized as Johor, Perak, Terengganu, Kelantan, Ranong, and Thale Noi. Among the 48 samples, 33 were identified as A. cinereus, seven as L. sumatrana, and eight as L. perspicillata. Phylogenetically, two subclades formed for A. cinereus. The first subclade grouped all Malay Peninsula samples except for samples from Kelantan, and the second subclade grouped Kelantan samples with Thai sample. Genetic distance analysis supported the close relationships between Thai and Kelantan samples compared to the samples from Terengganu and the other Malaysian states. A minimum-spanning network showed that Kelantan and Thailand formed a haplogroup distinct from the other populations. Our results show that Thai subspecies A. cinereus may have migrated to Kelantan from Thai mainland. We also suggest the classification of a new subspecies from Malay Peninsula, the small-clawed otter named A. cinereus kecilensis.
  8. Karimi A, Zarafshan F, Al-Haddad SA, Ramli AR
    ScientificWorldJournal, 2014;2014:672832.
    PMID: 25386613 DOI: 10.1155/2014/672832
    Voting is an important operation in multichannel computation paradigm and realization of ultrareliable and real-time control systems that arbitrates among the results of N redundant variants. These systems include N-modular redundant (NMR) hardware systems and diversely designed software systems based on N-version programming (NVP). Depending on the characteristics of the application and the type of selected voter, the voting algorithms can be implemented for either hardware or software systems. In this paper, a novel voting algorithm is introduced for real-time fault-tolerant control systems, appropriate for applications in which N is large. Then, its behavior has been software implemented in different scenarios of error-injection on the system inputs. The results of analyzed evaluations through plots and statistical computations have demonstrated that this novel algorithm does not have the limitations of some popular voting algorithms such as median and weighted; moreover, it is able to significantly increase the reliability and availability of the system in the best case to 2489.7% and 626.74%, respectively, and in the worst case to 3.84% and 1.55%, respectively.
  9. Marto A, Hajihassani M, Armaghani DJ, Mohamad ET, Makhtar AM
    ScientificWorldJournal, 2014;2014:643715.
    PMID: 25147856 DOI: 10.1155/2014/643715
    Flyrock is one of the major disturbances induced by blasting which may cause severe damage to nearby structures. This phenomenon has to be precisely predicted and subsequently controlled through the changing in the blast design to minimize potential risk of blasting. The scope of this study is to predict flyrock induced by blasting through a novel approach based on the combination of imperialist competitive algorithm (ICA) and artificial neural network (ANN). For this purpose, the parameters of 113 blasting operations were accurately recorded and flyrock distances were measured for each operation. By applying the sensitivity analysis, maximum charge per delay and powder factor were determined as the most influential parameters on flyrock. In the light of this analysis, two new empirical predictors were developed to predict flyrock distance. For a comparison purpose, a predeveloped backpropagation (BP) ANN was developed and the results were compared with those of the proposed ICA-ANN model and empirical predictors. The results clearly showed the superiority of the proposed ICA-ANN model in comparison with the proposed BP-ANN model and empirical approaches.
  10. Khan FM, Sarmin NH, Khan HU
    ScientificWorldJournal, 2014;2014:275947.
    PMID: 24883375 DOI: 10.1155/2014/275947
    In several advanced fields like control engineering, computer science, fuzzy automata, finite state machine, and error correcting codes, the use of fuzzified algebraic structures especially ordered semigroups plays a central role. In this paper, we introduced a new and advanced generalization of fuzzy generalized bi-ideals of ordered semigroups. These new concepts are supported by suitable examples. These new notions are the generalizations of ordinary fuzzy generalized bi-ideals of ordered semigroups. Several fundamental theorems of ordered semigroups are investigated by the properties of these newly defined fuzzy generalized bi-ideals. Further, using level sets, ordinary fuzzy generalized bi-ideals are linked with these newly defined ideals which is the most significant part of this paper.
  11. Karimi A, Afsharfarnia A, Zarafshan F, Al-Haddad SA
    ScientificWorldJournal, 2014;2014:432952.
    PMID: 25114965 DOI: 10.1155/2014/432952
    The stability of clusters is a serious issue in mobile ad hoc networks. Low stability of clusters may lead to rapid failure of clusters, high energy consumption for reclustering, and decrease in the overall network stability in mobile ad hoc network. In order to improve the stability of clusters, weight-based clustering algorithms are utilized. However, these algorithms only use limited features of the nodes. Thus, they decrease the weight accuracy in determining node's competency and lead to incorrect selection of cluster heads. A new weight-based algorithm presented in this paper not only determines node's weight using its own features, but also considers the direct effect of feature of adjacent nodes. It determines the weight of virtual links between nodes and the effect of the weights on determining node's final weight. By using this strategy, the highest weight is assigned to the best choices for being the cluster heads and the accuracy of nodes selection increases. The performance of new algorithm is analyzed by using computer simulation. The results show that produced clusters have longer lifetime and higher stability. Mathematical simulation shows that this algorithm has high availability in case of failure.
  12. Abu NA, Ernawan F
    ScientificWorldJournal, 2015;2015:821497.
    PMID: 25874257 DOI: 10.1155/2015/821497
    A psychovisual experiment prescribes the quantization values in image compression. The quantization process is used as a threshold of the human visual system tolerance to reduce the amount of encoded transform coefficients. It is very challenging to generate an optimal quantization value based on the contribution of the transform coefficient at each frequency order. The psychovisual threshold represents the sensitivity of the human visual perception at each frequency order to the image reconstruction. An ideal contribution of the transform at each frequency order will be the primitive of the psychovisual threshold in image compression. This research study proposes a psychovisual threshold on the large discrete cosine transform (DCT) image block which will be used to automatically generate the much needed quantization tables. The proposed psychovisual threshold will be used to prescribe the quantization values at each frequency order. The psychovisual threshold on the large image block provides significant improvement in the quality of output images. The experimental results on large quantization tables from psychovisual threshold produce largely free artifacts in the visual output image. Besides, the experimental results show that the concept of psychovisual threshold produces better quality image at the higher compression rate than JPEG image compression.
  13. Nazir S, Shahzad S, Khan SA, Alias NB, Anwar S
    ScientificWorldJournal, 2015;2015:579390.
    PMID: 25945363 DOI: 10.1155/2015/579390
    Software birthmark is a unique quality of software to detect software theft. Comparing birthmarks of software can tell us whether a program or software is a copy of another. Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. The estimation of birthmark can play a key role in understanding the effectiveness of a birthmark. In this paper, a new technique is presented to evaluate and estimate software birthmark based on the two most sought-after properties of birthmarks, that is, credibility and resilience. For this purpose, the concept of soft computing such as probabilistic and fuzzy computing has been taken into account and fuzzy logic is used to estimate properties of birthmark. The proposed fuzzy rule based technique is validated through a case study and the results show that the technique is successful in assessing the specified properties of the birthmark, its resilience and credibility. This, in turn, shows how much effort will be required to detect the originality of the software based on its birthmark.
  14. Mohamed Moubark A, Ali SH
    ScientificWorldJournal, 2014;2014:107831.
    PMID: 25197687 DOI: 10.1155/2014/107831
    This paper presents a new practical QPSK receiver that uses digitized samples of incoming QPSK analog signal to determine the phase of the QPSK symbol. The proposed technique is more robust to phase noise and consumes up to 89.6% less power for signal detection in demodulation operation. On the contrary, the conventional QPSK demodulation process where it uses coherent detection technique requires the exact incoming signal frequency; thus, any variation in the frequency of the local oscillator or incoming signal will cause phase noise. A software simulation of the proposed design was successfully carried out using MATLAB Simulink software platform. In the conventional system, at least 10 dB signal to noise ratio (SNR) is required to achieve the bit error rate (BER) of 10(-6), whereas, in the proposed technique, the same BER value can be achieved with only 5 dB SNR. Since some of the power consuming elements such as voltage control oscillator (VCO), mixer, and low pass filter (LPF) are no longer needed, the proposed QPSK demodulator will consume almost 68.8% to 99.6% less operational power compared to conventional QPSK demodulator.
  15. Ahmed AU, Islam MT, Ismail M, Kibria S, Arshad H
    ScientificWorldJournal, 2014;2014:253787.
    PMID: 25133214 DOI: 10.1155/2014/253787
    An artificial neural network (ANN) and affinity propagation (AP) algorithm based user categorization technique is presented. The proposed algorithm is designed for closed access femtocell network. ANN is used for user classification process and AP algorithm is used to optimize the ANN training process. AP selects the best possible training samples for faster ANN training cycle. The users are distinguished by using the difference of received signal strength in a multielement femtocell device. A previously developed directive microstrip antenna is used to configure the femtocell device. Simulation results show that, for a particular house pattern, the categorization technique without AP algorithm takes 5 indoor users and 10 outdoor users to attain an error-free operation. While integrating AP algorithm with ANN, the system takes 60% less training samples reducing the training time up to 50%. This procedure makes the femtocell more effective for closed access operation.
  16. Amin MS, Reaz MB, Nasir SS, Bhuiyan MA, Ali MA
    ScientificWorldJournal, 2014;2014:597180.
    PMID: 25276855 DOI: 10.1155/2014/597180
    Precise navigation is a vital need for many modern vehicular applications. The global positioning system (GPS) cannot provide continuous navigation information in urban areas. The widely used inertial navigation system (INS) can provide full vehicle state at high rates. However, the accuracy diverges quickly in low cost microelectromechanical systems (MEMS) based INS due to bias, drift, noise, and other errors. These errors can be corrected in a stationary state. But detecting stationary state is a challenging task. A novel stationary state detection technique from the variation of acceleration, heading, and pitch and roll of an attitude heading reference system (AHRS) built from the inertial measurement unit (IMU) sensors is proposed. Besides, the map matching (MM) algorithm detects the intersections where the vehicle is likely to stop. Combining these two results, the stationary state is detected with a smaller timing window of 3 s. A longer timing window of 5 s is used when the stationary state is detected only from the AHRS. The experimental results show that the stationary state is correctly identified and the position error is reduced to 90% and outperforms previously reported work. The proposed algorithm would help to reduce INS errors and enhance the performance of the navigation system.
  17. Wan Ab Naim WN, Ganesan PB, Sun Z, Chee KH, Hashim SA, Lim E
    ScientificWorldJournal, 2014;2014:652520.
    PMID: 24672348 DOI: 10.1155/2014/652520
    Aortic dissection, characterized by separation of the layers of the aortic wall, poses a significant challenge for clinicians. While type A aortic dissection patients are normally managed using surgical treatment, optimal treatment strategy for type B aortic dissection remains controversial and requires further evaluation. Although aortic diameter measured by CT angiography has been clinically used as a guideline to predict dilation in aortic dissection, hemodynamic parameters (e.g., pressure and wall shear stress), geometrical factors, and composition of the aorta wall are known to substantially affect disease progression. Due to the limitations of cardiac imaging modalities, numerical simulations have been widely used for the prediction of disease progression and therapeutic outcomes, by providing detailed insights into the hemodynamics. This paper presents a comprehensive review of the existing numerical models developed to investigate reasons behind tear initiation and progression, as well as the effectiveness of various treatment strategies, particularly the stent graft treatment.
  18. Kura NU, Ramli MF, Ibrahim S, Sulaiman WN, Zaudi MA, Aris AZ
    ScientificWorldJournal, 2014;2014:796425.
    PMID: 25574493 DOI: 10.1155/2014/796425
    The existing knowledge regarding seawater intrusion and particularly upconing, in which both problems are linked to pumping, entirely relies on theoretical assumptions. Therefore, in this paper, an attempt is made to capture the effects of pumping on seawater intrusion and upconing using 2D resistivity measurement. For this work, two positions, one perpendicular and the other parallel to the sea, were chosen as profile line for resistivity measurement in the coastal area near the pumping wells of Kapas Island, Malaysia. Subsequently, water was pumped out of two pumping wells simultaneously for about five straight hours. Then, immediately after the pumping stopped, resistivity measurements were taken along the two stationed profile lines. This was followed by additional measurements after four and eight hours. The results showed an upconing with low resistivity of about 1-10 Ωm just beneath the pumping well along the first profile line that was taken just after the pumping stopped. The resistivity image also shows an intrusion of saline water (water enriched with diluted salt) from the sea coming towards the pumping well with resistivity values ranging between 10 and 25 Ωm. The subsequent measurements show the recovery of freshwater in the aquifer and how the saline water is gradually diluted or pushed out of the aquifer. Similarly the line parallel to the sea (L2) reveals almost the same result as the first line. However, in the second and third measurements, there were some significant variations which were contrary to the expectation that the freshwater may completely flush out the saline water from the aquifer. These two time series lines show that as the areas with the lowest resistivity (1 Ωm) shrink with time, the low resistivity (10 Ωm) tends to take over almost the entire area implying that the freshwater-saltwater equilibrium zone has already been altered. These results have clearly enhanced our current understanding and add more scientific weight to the theoretical assumptions on the effects of pumping on seawater intrusion and upconing.
  19. Qazi A, Raj RG, Tahir M, Waheed M, Waheed M, Khan SU, et al.
    ScientificWorldJournal, 2014;2014:872929.
    PMID: 24711739 DOI: 10.1155/2014/872929
    Existing opinion mining studies have focused on and explored only two types of reviews, that is, regular and comparative. There is a visible gap in determining the useful review types from customers and designers perspective. Based on Technology Acceptance Model (TAM) and statistical measures we examine users' perception about different review types and its effects in terms of behavioral intention towards using online review system. By using sample of users (N = 400) and designers (N = 106), current research work studies three review types, A (regular), B (comparative), and C (suggestive), which are related to perceived usefulness, perceived ease of use, and behavioral intention. The study reveals that positive perception of the use of suggestive reviews improves users' decision making in business intelligence. The results also depict that type C (suggestive reviews) could be considered a new useful review type in addition to other types, A and B.
  20. Idris J, Eyu GD, Mansor AM, Ahmad Z, Chukwuekezie CS
    ScientificWorldJournal, 2014;2014:638687.
    PMID: 24693241 DOI: 10.1155/2014/638687
    Oil spill constitutes a major source of fresh and seawater pollution as a result of accidental discharge from tankers, marine engines, and underwater pipes. Therefore, the need for cost-effective and environmental friendly sorbent materials for oil spill cleanup cannot be overemphasized. The present work focuses on the preliminary study of empty palm fruit bunch fibre as a promising sorbent material. The morphology of the unmodified empty palm fruit bunch, EPFB fibre, was examined using an optical microcopy, scanning electron microcopy coupled with EDX and X-ray diffraction. The effects of oil volume, fibre weight, and time on oil absorption of EPFB fibre were evaluated with new engine oil from the model oil. The results show that EPFB fibre consists of numerous micro pores, hydrophobic, and partially crystalline and amorphous with approximately 13.5% carbon. The oil absorbency of the fibre increased with the increase in oil volume, immersion time, and fibre weight. However, sorption capacity decreased beyond 3 g in 100 mL. Additionally unmodified EPFB fibre showed optimum oil sorption efficiency of approximately 2.8 g/g within three days of immersion time.
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links