Displaying publications 21 - 40 of 69 in total

Abstract:
Sort:
  1. Ahamad, I.S., Choong, T.S.Y., Yunus, R., Chuah, T.G., Vassiliadis, V.S.
    MyJurnal
    Controller tuning is needed to select the optimum response for the controlled process. This work presents a new tuning procedure of PID controllers with safety and response quality measures on a non-linear process model by optimization procedure, with a demonstration of two tanks in series. The model was developed to include safety constraints in the form of path constraints. The model was then solved with a new optimization solver, NLPOPT1, which uses a primal-dual interior point method with a novel non-monotone line search procedure with discretized penalty parameters. This procedure generated a grid of optimal PID tuning parameters for various switching of steadystates to be used as apredictor of PID tunings for arbitrary transitions. The interpolation of tuning parameters between the available parameters was found to be capable to produce state profiles with no violation on the safety measures, while maintaining the quality of the solution with the final set points targeted achievable.
    Matched MeSH terms: Computer Systems
  2. Nurul Husna Kamarudin, Nor Azlina Ab Rahman, Zainul Ibrahim Zainuddin
    MyJurnal
    The Medical imaging service in Malaysia is expanding. The presence of
    imaging technologies needs to be supported by homegrown research to optimize their
    use. This study investigated the contribution of researches by Malaysian practitioners to
    the field of Medical imaging in the Malaysian Citation index (MyCite) database. (Copied from article).
    Matched MeSH terms: Computer Systems
  3. Erum Pathan, Shamsul Aizam Zulkifli
    MyJurnal
    In this paper, the challenge of harmonic injection mitigation becomes critical with the massive use of inverters in electrical distribution systems that has been discussed and analyzed. Currently, between the inverter and the grid, L, LC or LCL filters is often used to mitigate the current harmonic. Further, filter connection in both delta-to-star or star-to-delta transformer for state space model of LC filter couplings with impedance is obtained in this paper and it also talked about the different passive damping techniques that been used to suppress the resonance effect on the filter. The effect of series and parallel damping resistor techniques that impact filtering and stability are also been analyzed and discussed. At the end, the simulation results show that LCL filter with parallel damping resistor achieves best performance compared on those for L, LC, or LCL with series damping resistor while at the same time enhancing the smoothness of the signal output while at the same time reducing the percentage of total harmonic distortion between inverter-grid connection.
    Matched MeSH terms: Computer Systems
  4. Al-Haiqi A, Ismail M, Nordin R
    ScientificWorldJournal, 2014;2014:969628.
    PMID: 25295311 DOI: 10.1155/2014/969628
    Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications communicating over covert channels. Still no universal solution can countermeasure this sort of attack unless the covert channels are known. This paper is an attempt to reveal a new covert channel, not only being specific to smartphones, but also exploiting an unusual resource as a vehicle to carry covert information: sensors data. Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. Our evaluations confirmed a real threat where strings of tens of characters could be transmitted errorless if the throughput is reduced to around 2.5-5 bps. The proposed covert channel is very stealthy as no unusual permissions are required and there is no explicit communication between the colluding applications.
    Matched MeSH terms: Computer Systems/trends
  5. Yuen CW, Karim MR, Saifizul A
    ScientificWorldJournal, 2014;2014:236396.
    PMID: 24991638 DOI: 10.1155/2014/236396
    This paper focuses on the study of the change of various types of riding behaviour, such as speed, brake force, and throttle force applied, when they ride across the speed table. An instrumented motorcycle equipped with various types of sensor, on-board camera, and data logger was used in acquiring the traffic data in the research. Riders were instructed to ride across two speed tables and the riding data were then analyzed to study the behaviour change from different riders. The results from statistical analysis showed that the riding characteristics such as speed, brake force, and throttle force applied are influenced by distance from hump, riding experience, and travel mileage of riders. Riders tend to apply higher brake intensity at distance point 50 m before the speed table and release the braking at point -10 m after the hump. In short, speed table has different rates of influence towards riding behaviour on different factors, such as distance from hump and different riders' attributes.
    Matched MeSH terms: Computer Systems*
  6. Abdulhamid SM, Abd Latiff MS, Abdul-Salaam G, Hussain Madni SH
    PLoS One, 2016;11(7):e0158102.
    PMID: 27384239 DOI: 10.1371/journal.pone.0158102
    Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques.
    Matched MeSH terms: Computer Systems*
  7. Albahri AS, Zaidan AA, Albahri OS, Zaidan BB, Alsalem MA
    J Med Syst, 2018 Jun 23;42(8):137.
    PMID: 29936593 DOI: 10.1007/s10916-018-0983-9
    The burden on healthcare services in the world has increased substantially in the past decades. The quality and quantity of care have to increase to meet surging demands, especially among patients with chronic heart diseases. The expansion of information and communication technologies has led to new models for the delivery healthcare services in telemedicine. Therefore, mHealth plays an imperative role in the sustainable delivery of healthcare services in telemedicine. This paper presents a comprehensive review of healthcare service provision. It highlights the open issues and challenges related to the use of the real-time fault-tolerant mHealth system in telemedicine. The methodological aspects of mHealth are examined, and three distinct and successive phases are presented. The first discusses the identification process for establishing a decision matrix based on a crossover of 'time of arrival of patient at the hospital/multi-services' and 'hospitals' within mHealth. The second phase discusses the development of a decision matrix for hospital selection based on the MAHP method. The third phase discusses the validation of the proposed system.
    Matched MeSH terms: Computer Systems*
  8. Faheem M, Fizza G, Ashraf MW, Butt RA, Ngadi MA, Gungor VC
    Data Brief, 2021 Apr;35:106854.
    PMID: 33659599 DOI: 10.1016/j.dib.2021.106854
    Smart Grid Industry 4.0 (SGI4.0) defines a new paradigm to provide high-quality electricity at a low cost by reacting quickly and effectively to changing energy demands in the highly volatile global markets. However, in SGI4.0, the reliable and efficient gathering and transmission of the observed information from the Internet of Things (IoT)-enabled Cyber-physical systems, such as sensors located in remote places to the control center is the biggest challenge for the Industrial Multichannel Wireless Sensors Networks (IMWSNs). This is due to the harsh nature of the smart grid environment that causes high noise, signal fading, multipath effects, heat, and electromagnetic interference, which reduces the transmission quality and trigger errors in the IMWSNs. Thus, an efficient monitoring and real-time control of unexpected changes in the power generation and distribution processes is essential to guarantee the quality of service (QoS) requirements in the smart grid. In this context, this paper describes the dataset contains measurements acquired by the IMWSNs during events monitoring and control in the smart grid. This work provides an updated detail comparison of our proposed work, including channel detection, channel assignment, and packets forwarding algorithms, collectively called CARP [1] with existing G-RPL [2] and EQSHC [3] schemes in the smart grid. The experimental outcomes show that the dataset and is useful for the design, development, testing, and validation of algorithms for real-time events monitoring and control applications in the smart grid.
    Matched MeSH terms: Computer Systems
  9. Rasif Mohd Zain, Roslan Yahya, Mohamad Rabaie Shari, Airwan Affandi Mahmood, Mior Ahmad Khusaini Adnan
    MyJurnal
    Many times a year natural gas transmission and distribution companies need to make new connections to pipelines to expand or modify their existing system through hot tapping procedure. This procedure involves the installation of a new pipeline connection while the pipeline remains in service, flowing natural gas under pressure. The hot tap procedure includes attaching a branch connection and valve on the outside of an operating pipeline, and then cutting out the pipe-line wall within the branch and removing the wall section, which is called object of coupon through the valve. During the hot tapping process a critical problems occurred when a coupon fell into the mother pipeline. To overcome this problem, a gamma-ray absorption technique was chosen whereby a mapping technique will be done to detect the coupon position. The technique is non-destructive as it applies Co-60 (5mCi) as a radioisotope sealed source to emit gamma radiation and a NaI(Tl) scintillation as detector. The result provided a visible representation of density profile inside pipeline where the coupon location can be located. This paper provides the detail of the technique used and presents the result obtained.
    Matched MeSH terms: Computer Systems
  10. Khan RU, Khattak H, Wong WS, AlSalman H, Mosleh MAA, Mizanur Rahman SM
    Comput Intell Neurosci, 2021;2021:9023010.
    PMID: 34925497 DOI: 10.1155/2021/9023010
    The deaf-mutes population always feels helpless when they are not understood by others and vice versa. This is a big humanitarian problem and needs localised solution. To solve this problem, this study implements a convolutional neural network (CNN), convolutional-based attention module (CBAM) to recognise Malaysian Sign Language (MSL) from images. Two different experiments were conducted for MSL signs, using CBAM-2DResNet (2-Dimensional Residual Network) implementing "Within Blocks" and "Before Classifier" methods. Various metrics such as the accuracy, loss, precision, recall, F1-score, confusion matrix, and training time are recorded to evaluate the models' efficiency. The experimental results showed that CBAM-ResNet models achieved a good performance in MSL signs recognition tasks, with accuracy rates of over 90% through a little of variations. The CBAM-ResNet "Before Classifier" models are more efficient than "Within Blocks" CBAM-ResNet models. Thus, the best trained model of CBAM-2DResNet is chosen to develop a real-time sign recognition system for translating from sign language to text and from text to sign language in an easy way of communication between deaf-mutes and other people. All experiment results indicated that the "Before Classifier" of CBAMResNet models is more efficient in recognising MSL and it is worth for future research.
    Matched MeSH terms: Computer Systems
  11. Umair M, Hidayat NM, Sukri Ahmad A, Nik Ali NH, Mawardi MIM, Abdullah E
    PLoS One, 2024;19(2):e0297376.
    PMID: 38422065 DOI: 10.1371/journal.pone.0297376
    Developing novel EV chargers is crucial for accelerating Electric Vehicle (EV) adoption, mitigating range anxiety, and fostering technological advancements that enhance charging efficiency and grid integration. These advancements address current challenges and contribute to a more sustainable and convenient future of electric mobility. This paper explores the performance dynamics of a solar-integrated charging system. It outlines a simulation study on harnessing solar energy as the primary Direct Current (DC) EV charging source. The approach incorporates an Energy Storage System (ESS) to address solar intermittencies and mitigate photovoltaic (PV) mismatch losses. Executed through MATLAB, the system integrates key components, including solar PV panels, the ESS, a DC charger, and an EV battery. The study finds that a change in solar irradiance from 400 W/m2 to 1000 W/m2 resulted in a substantial 47% increase in the output power of the solar PV system. Simultaneously, the ESS shows a 38% boost in output power under similar conditions, with the assessments conducted at a room temperature of 25°C. The results emphasize that optimal solar panel placement with higher irradiance levels is essential to leverage integrated solar energy EV chargers. The research also illuminates the positive correlation between elevated irradiance levels and the EV battery's State of Charge (SOC). This correlation underscores the efficiency gains achievable through enhanced solar power absorption, facilitating more effective and expedited EV charging.
    Matched MeSH terms: Computer Systems
  12. Nagrath V, Morel O, Malik A, Saad N, Meriaudeau F
    Springerplus, 2015;4:103.
    PMID: 25763310 DOI: 10.1186/s40064-015-0810-4
    The dot-com bubble bursted in the year 2000 followed by a swift movement towards resource virtualization and cloud computing business model. Cloud computing emerged not as new form of computing or network technology but a mere remoulding of existing technologies to suit a new business model. Cloud robotics is understood as adaptation of cloud computing ideas for robotic applications. Current efforts in cloud robotics stress upon developing robots that utilize computing and service infrastructure of the cloud, without debating on the underlying business model. HTM5 is an OMG's MDA based Meta-model for agent oriented development of cloud robotic systems. The trade-view of HTM5 promotes peer-to-peer trade amongst software agents. HTM5 agents represent various cloud entities and implement their business logic on cloud interactions. Trade in a peer-to-peer cloud robotic system is based on relationships and contracts amongst several agent subsets. Electronic Institutions are associations of heterogeneous intelligent agents which interact with each other following predefined norms. In Dynamic Electronic Institutions, the process of formation, reformation and dissolution of institutions is automated leading to run time adaptations in groups of agents. DEIs in agent oriented cloud robotic ecosystems bring order and group intellect. This article presents DEI implementations through HTM5 methodology.
    Matched MeSH terms: Computer Systems
  13. Hussin, K., Hassan, M.R., Hamzah, M.L., Fadzli, A., Nik Mohamad, N.A., Nik Him, N.A.S.
    MyJurnal
    The importance of rapid ambulance response to emergency medical crises is undeniable. An early
    access to advanced care is crucial to saving a life. Modern computerised call centre and the hospitalbased ambulance services are believed to enhance the quality of service delivery. However, whether
    it will further reduce the ambulance response time is still debatable. A cross-sectional study was
    conducted in June 2012 until July 2012 at three selected tertiary hospitals in Malaysia. The
    ambulance response time was expressed in a median and interquartile range (IQR) and MannWhitney U test was used to determine the associations between types of ambulance and
    computerised call centre system versus voice only. Wilcoxon Rank Sign Test was used to assess
    the significance of means difference. A hospital-based ambulance had the median time of 0.19
    minutes while community-based ambulance had the median time of 0.20 minutes (The Z score -
    0.916, p-value - 0.360). The hospital with computer call centre had the median time of 0.19 minutes
    while hospital without computer call centre had the median of 0.20 minutes (The Z score - 0.816, P
    value - 0.414).The response time of hospital-based ambulance equipped with computerised call
    centre system was comparable in three selected tertiary hospitals in Malaysia.
    Matched MeSH terms: Computer Systems
  14. Nor Hasnul Azirah Abdul Hamid, Normalina Ibrahim@Mat, Nurul Najihah Mustopa
    ESTEEM Academic Journal, 2020;16(2):51-64.
    MyJurnal
    Student Information Management System (SIMS) is a computerized system for education that can be used to manage student information and data. PASTI An-Nur is chosen as a case study in developing the system. Thus, several problems are identified that PASTI An-Nur faces due to the
    implementation of a manual system in the admission process. The first problem is the paper-based registration form that is prone to lose, misplaced and less secure. As for the payment process, arise a problem in term of higher error rate when checking and calculating the payments. The biggest downfall for PASTI An-Nur is the amount of space used to store all the students' files.
    These problems bring inefficiency since the world is changing to computerized, where data management become one of the most significant issues nowadays. So, the aim of developing the Preschool Management System (PRESIMS) is for helping the staffs and teachers in managing the
    students' information. The Adapter Waterfall model was used in developing this system. Additionally, usability heuristics was used also as a theory to guide the development of this system. The system has been tested with the four (4) users and two (2) experts. The testing method is the ISO/IEC 9126- 4 approach to measure usability metrics, including efficiency, effectiveness, and satisfaction. Whereas, for the experts, heuristic evaluation is used to bring six (6) usability principles into implementation for testing. The result of the testing is very satisfying, which shows 75.5% of efficiency, 83.33% of effectiveness and three (3) out of four (4) users very satisfied with the system. The result of heuristic evaluation also shows a successful implementation of the system. The details of the result are discussed in this paper and expected to meet the users' specification and it is ready to go live.
    Matched MeSH terms: Computer Systems
  15. Naderipour A, Abdul-Malek Z, Hajivand M, Seifabad ZM, Farsi MA, Nowdeh SA, et al.
    Sci Rep, 2021 Feb 01;11(1):2728.
    PMID: 33526829 DOI: 10.1038/s41598-021-82440-9
    In this paper, the optimal allocation of constant and switchable capacitors is presented simultaneously in two operation modes, grid-connected and islanded, for a microgrid. Different load levels are considered by employing non-dispatchable distributed generations. The objective function includes minimising the energy losses cost, the cost of peak power losses, and the cost of the capacitor. The optimization problem is solved using the spotted hyena optimizer (SHO) algorithm to determine the optimal size and location of capacitors, considering different loading levels and the two operation modes. In this study, a three-level load and various types of loads, including constant power, constant current, and constant impedance are considered. The proposed method is implemented on a 24-bus radial distribution network. To evaluate the performance of the SHO, the results are compared with GWO and the genetic algorithm (GA). The simulation results demonstrate the superior performance of the SHO in reducing the cost of losses and improving the voltage profile during injection and non-injection of reactive power by distributed generations in two operation modes. The total cost and net saving values for DGs only with the capability of active power injection is achieved 105,780 $ and 100,560.54 $, respectively and for DGs with the capability of active and reactive power injection is obtained 89,568 $ and 76,850.46 $, respectively using the SHO. The proposed method has achieved more annual net savings due to the lower cost of losses than other optimization methods.
    Matched MeSH terms: Computer Systems
  16. MUHAMMAD FAKHRURAZI MD YUNOS, NUR FARIZAN MUNAJAT, WAN MARIAM WAN MUDA
    MyJurnal
    This study focused on feasibility analysis of hybrid electrification system for an aqua-tourism resort located remotely from the grid connection in Terengganu. There were four standalone systems used in this study: diesel/PV/biomass/battery, diesel/PV/battery, biomass/diesel/battery, and diesel only. The design and analysis of these systems were done using Hybrid Optimization of MultipleEnergy Resources (HOMER) software. The results showed that the diesel/PV/battery system was the optimum solution in terms of net present cost (NPC) and cost of energy (COE). This system comprises 20 % of PV penetration with NPC and COE of USD 57,823 (RM 241, 729.90) and 0.428 USD/kWh (1.79 RM/kWh), respectively. Meanwhile, the diesel/PV/biomass/battery system with NPC of USD 65,388 (RM 273, 355.49) and COE of 0.484 USD/kWh (2.02 RM/kWh) was found to be the best among all systems in terms of greenhouse emissions. This system was able to reduce almost 70 % of carbon dioxide if compared with diesel only system and about 15 % lower than the diesel/PV/battery system with a renewable energy fraction of 44 %.
    Matched MeSH terms: Computer Systems
  17. PAULEEN ONG, MUHAMMAD SUZURI HITAM, ZAINUDDIN BACHOK, ZAINUDDIN BACHOK, MOHD SAFUAN CHE DIN
    MyJurnal
    At present, marine scientists employ manual method to estimate the components in coral reef environment,where Coral Point Count with Excel extensions (CPCe) software is used to determine the coral reef components and substrate coverage. This manual processis laboriousand time consuming,and needsexpertsto conduct the survey. In this paper, a prototype for estimating the distribution of sand cover in coral reef environment from still images by using colourextraction methods was introduced. The coloursegmentation called delta E was used to calculate the colourdifference between two coloursamples. Another method used wascolourthresholdby setting the range of sand colourpixels. Thesystem was developed by using a MATLAB software withimage processing toolbox. The developed system was semi-automatic computer-based system that can be used by researcherseven with little knowledge and experience to estimatethepercentage of sand coveragein coral reef still images.
    Matched MeSH terms: Computer Systems
  18. Mutlaq KA, Nyangaresi VO, Omar MA, Abduljabbar ZA, Abduljaleel IQ, Ma J, et al.
    PLoS One, 2024;19(1):e0296781.
    PMID: 38261555 DOI: 10.1371/journal.pone.0296781
    The incorporation of information and communication technologies in the power grids has greatly enhanced efficiency in the management of demand-responses. In addition, smart grids have seen considerable minimization in energy consumption and enhancement in power supply quality. However, the transmission of control and consumption information over open public communication channels renders the transmitted messages vulnerable to numerous security and privacy violations. Although many authentication and key agreement protocols have been developed to counter these issues, the achievement of ideal security and privacy levels at optimal performance still remains an uphill task. In this paper, we leverage on Hamming distance, elliptic curve cryptography, smart cards and biometrics to develop an authentication protocol. It is formally analyzed using the Burrows-Abadi-Needham (BAN) logic, which shows strong mutual authentication and session key negotiation. Its semantic security analysis demonstrates its robustness under all the assumptions of the Dolev-Yao (DY) and Canetti- Krawczyk (CK) threat models. From the performance perspective, it is shown to incur communication, storage and computation complexities compared with other related state of the art protocols.
    Matched MeSH terms: Computer Systems
  19. Ch'ng YH, Osman MA, Jong HY
    Malays J Med Sci, 2021 Apr;28(2):161-170.
    PMID: 33958970 DOI: 10.21315/mjms2021.28.2.15
    Background: Specific language impairment (SLI) diagnosis is inconvenient due to manual procedures and hardware cost. Computer-aided SLI diagnosis has been proposed to counter these inconveniences. This study focuses on evaluating the feasibility of computer systems used to diagnose SLI.

    Methods: The accuracy of Webgazer.js for software-based gaze tracking is tested under different lighting conditions. Predefined time delays of a prototype diagnosis task automation script are contrasted against with manual delays based on human time estimation to understand how automation influences diagnosis accuracy. SLI diagnosis binary classifier was built and tested based on randomised parameters. The obtained results were cross-compared to Singlims_ES.exe for equality.

    Results: Webgazer.js achieved an average accuracy of 88.755% under global lighting conditions, 61.379% under low lighting conditions and 52.7% under face-focused lighting conditions. The diagnosis task automation script found to execute with actual time delays with a deviation percentage no more than 0.04%, while manually executing time delays based on human time estimation resulted in a deviation percentage of not more than 3.37%. One-tailed test probability value produced by both the newly built classifier and Singlims_ES were observed to be similar up to three decimal places.

    Conclusion: The results obtained should serve as a foundation for further evaluation of computer tools to help speech language pathologists diagnose SLI.

    Matched MeSH terms: Computer Systems
  20. Hannan MA, Arebey M, Begum RA, Basri H
    Waste Manag, 2011 Dec;31(12):2406-13.
    PMID: 21871788 DOI: 10.1016/j.wasman.2011.07.022
    This paper deals with a system of integration of Radio Frequency Identification (RFID) and communication technologies for solid waste bin and truck monitoring system. RFID, GPS, GPRS and GIS along with camera technologies have been integrated and developed the bin and truck intelligent monitoring system. A new kind of integrated theoretical framework, hardware architecture and interface algorithm has been introduced between the technologies for the successful implementation of the proposed system. In this system, bin and truck database have been developed such a way that the information of bin and truck ID, date and time of waste collection, bin status, amount of waste and bin and truck GPS coordinates etc. are complied and stored for monitoring and management activities. The results showed that the real-time image processing, histogram analysis, waste estimation and other bin information have been displayed in the GUI of the monitoring system. The real-time test and experimental results showed that the performance of the developed system was stable and satisfied the monitoring system with high practicability and validity.
    Matched MeSH terms: Computer Systems/economics*
Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links