Displaying publications 21 - 40 of 77 in total

Abstract:
Sort:
  1. Hasan S, Shamsuddin SM
    Comput Intell Neurosci, 2011;2011:121787.
    PMID: 21876686 DOI: 10.1155/2011/121787
    Multistrategy Learning of Self-Organizing Map (SOM) and Particle Swarm Optimization (PSO) is commonly implemented in clustering domain due to its capabilities in handling complex data characteristics. However, some of these multistrategy learning architectures have weaknesses such as slow convergence time always being trapped in the local minima. This paper proposes multistrategy learning of SOM lattice structure with Particle Swarm Optimisation which is called ESOMPSO for solving various classification problems. The enhancement of SOM lattice structure is implemented by introducing a new hexagon formulation for better mapping quality in data classification and labeling. The weights of the enhanced SOM are optimised using PSO to obtain better output quality. The proposed method has been tested on various standard datasets with substantial comparisons with existing SOM network and various distance measurement. The results show that our proposed method yields a promising result with better average accuracy and quantisation errors compared to the other methods as well as convincing significant test.
    Matched MeSH terms: Information Storage and Retrieval/methods
  2. Rosilawati Zainol, Sayed Jamaludin Sayed Ali, Zainab Abu Bakar
    MyJurnal
    This paper presents the evaluation of integrated partial match query in Geographic Information Retrieval (GIR). To facilitate the evaluation, Kuala Lumpur tourist related data is used as test collection and is stored in SuperWeb, a map server. Then the map server is customized to enhance its query capability to recognize word in partial or case sensitive between layers of spatial data. Query keyword is tested using the system and results are evaluated using experiments on sample data. Findings show that integrated partial match query provides more flexibility to tourist in determining search results.
    Matched MeSH terms: Information Storage and Retrieval
  3. Logeswaran R, Chen LC
    J Med Syst, 2012 Apr;36(2):483-90.
    PMID: 20703702 DOI: 10.1007/s10916-010-9493-0
    Current trends in medicine, specifically in the electronic handling of medical applications, ranging from digital imaging, paperless hospital administration and electronic medical records, telemedicine, to computer-aided diagnosis, creates a burden on the network. Distributed Service Architectures, such as Intelligent Network (IN), Telecommunication Information Networking Architecture (TINA) and Open Service Access (OSA), are able to meet this new challenge. Distribution enables computational tasks to be spread among multiple processors; hence, performance is an important issue. This paper proposes a novel approach in load balancing, the Random Sender Initiated Algorithm, for distribution of tasks among several nodes sharing the same computational object (CO) instances in Distributed Service Architectures. Simulations illustrate that the proposed algorithm produces better network performance than the benchmark load balancing algorithms-the Random Node Selection Algorithm and the Shortest Queue Algorithm, especially under medium and heavily loaded conditions.
    Matched MeSH terms: Information Storage and Retrieval
  4. Nolida Yussup, Nur Aira Abd. Rahman, Ismail Mustapha, Jaafar Abdullah, Mohd. Ashhar Khalid, Hearie Hassan, et al.
    MyJurnal
    Data transmission in field works especially that is related to industry, gas and chemical is paramount importance to ensure data accuracy and delivery time. A development of wireless detector system for remote data acquisition to be applied in conducting fieldwork in industry is described in this paper. A wireless communication which is applied in the project development is a viable and cost-effective method of transmitting data from the detector to the laptop on the site to facilitate data storage and analysis automatically, which can be used in various applications such as column scanning. The project involves hardware design for the detector and electronics parts besides programming for control board and user interface. A prototype of a wireless gamma scintillation detector is developed with capabilities of transmitting data to computer via radio frequency (RF) and recording the data within the 433MHz band at baud rate of 19200.
    Matched MeSH terms: Information Storage and Retrieval
  5. Wan Nor Arifin, Muhamad Saiful Bahri Yusoff, Nyi Nyi Naing
    MyJurnal
    Introduction: Emotional intelligence (EI) is deemed an important aspect of being good medical doctors. Universiti Sains Malaysia (USM) Emotional Quotient Inventory (USMEQ-i) is an EI inventory in Malay language developed primarily as medical student selection tool in USM. Although it was already validated by exploratory factor analysis (EFA), EFA is considered insufficient evidence of construct validity, thus confirmatory factor analysis (CFA) was conducted. Objectives: To determine measurement model validity and construct validity of USMEQ-i among medical degree program applicants in USM by CFA. Methods: USMEQ-i data file for medical degree program applicants in USM for year 2010/2011 and 2011/2012 academic sessions were obtained from Medical Education Department in USM. A random sample of 512 cases was drawn from the data file. Of the sample, only 453 cases were valid study sample after preliminary data screening and assumption checking. CFA was conducted on the sample using maximum likelihood (ML) estimation with bootstrapping technique due to violation of multivariate normality assumption. USMEQ-i measurement model was proposed as a second-order EI factor with seven first-order factors of EI and a Faking Index (FI) factor, with correlation between second-order EI factor and FI factor. Results: The proposed model could not be fit into the study sample data. EI factors and FI factor had to be analyzed separately due to non-positive definite problem. After modifications to the model, CFA of EI factors were suggestive of two-factor model instead of the proposed seven-factor model. Consciousness, Maturity and Control (CoMaCt). CFA of FI factor maintained one-factor model and also valid in term of construct. Conclusion: The modified USMEQ-i, which consisted of separate EI and FI models, was proven to have valid measurement models and reliable constructs. It is considered to be suitable for use among applicants to medical degree program in USM. However, its use as medical student selection tool may require further research, especially how predictive USMEQ-i scores with real performance of medical students, generalizability of the inventory and its stability over time.
    Matched MeSH terms: Information Storage and Retrieval
  6. Zubair S, Fisal N, Baguda YS, Saleem K
    Sensors (Basel), 2013;13(10):13005-38.
    PMID: 24077319 DOI: 10.3390/s131013005
    Interest in the cognitive radio sensor network (CRSN) paradigm has gradually grown among researchers. This concept seeks to fuse the benefits of dynamic spectrum access into the sensor network, making it a potential player in the next generation (NextGen) network, which is characterized by ubiquity. Notwithstanding its massive potential, little research activity has been dedicated to the network layer. By contrast, we find recent research trends focusing on the physical layer, the link layer and the transport layers. The fact that the cross-layer approach is imperative, due to the resource-constrained nature of CRSNs, can make the design of unique solutions non-trivial in this respect. This paper seeks to explore possible design opportunities with wireless sensor networks (WSNs), cognitive radio ad-hoc networks (CRAHNs) and cross-layer considerations for implementing viable CRSN routing solutions. Additionally, a detailed performance evaluation of WSN routing strategies in a cognitive radio environment is performed to expose research gaps. With this work, we intend to lay a foundation for developing CRSN routing solutions and to establish a basis for future work in this area.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  7. Che Mustapha Yusuf, J., Mohd Su’ud, M., Boursier, P., Muhammad, A.
    MyJurnal
    Finding relevant disaster data from a huge metadata overhead often results in frustrating search
    experiences caused by unclear access points, ambiguous search methods, unsuitable metadata, and long response times. More frequently, semantic relation between the retrieved objects is neglected. This paper presents a system architecture that makes use of ontologies in order to enable semantic metadata descriptions for gathering and integrating multi-format documents in the context of disaster management. After a brief discussion on the challenges of the integration process, the Multi-format Information Retrieval, Integration and Presentation (MIRIP) architecture is presented. A specific approach for ontology development and mapping process is introduced in order to semantically associate user’s query and documents metadata. An ontology model approach was designed to follow inspirational and collaborative approaches with top-down to bottom-up implementation. A prototype of the integrated disaster management information system is currently under development, based on the architecture that is presented in this paper.
    Matched MeSH terms: Information Storage and Retrieval
  8. Az Azrinudin Alidin, Crestani, Fabio
    MyJurnal
    Mobile users have the capability of accessing information anywhere at any time with the introduction of mobile browsers and mobile web search. However, the current mobile browsers are implemented without considering the characteristics of mobile searches. As a result, mobile users need to devote time and effort in order to retrieve relevant information from the web in mobile devices. On the other hand, mobile users often request information related to their surroundings, which is also known as context. This recognizes the importance of including context in information retrieval. Besides, the availability of the embedded sensors in mobile devices has supported the recognition of context. In this study, the context acquisition and utilization for mobile information retrieval are proposed. The “just-in-time” approach is exploited in which the information that is relevant to a user is retrieved without the user requesting it. This will reduce the mobile user’s effort, time and interaction when retrieving information in mobile devices. In this paper, the context dimensions and context model are presented. Simple experiments are shown where user context is predicted using the context model.
    Matched MeSH terms: Information Storage and Retrieval
  9. Rizwan Iqbal, Masrah Azrifah Azmi Murad
    MyJurnal
    Natural language interfaces to ontologies allow users to query the system using natural language queries.
    These systems take natural language query as input and transform it to formal query language equivalent
    to retrieve the desired information from ontologies. The existing natural language interfaces to ontologies
    offer support for handling negation queries; however, they offer limited support for dealing with them.
    This paper proposes a negation query handling engine which can handle relatively complex natural
    language queries than the existing systems. The proposed engine effectively understands the intent of
    the user query on the basis of a sophisticated algorithm, which is governed by a set of techniques and
    transformation rules. The proposed engine was evaluated using the Mooney data set and AquaLog dataset,
    and it manifested encouraging results.
    Matched MeSH terms: Information Storage and Retrieval
  10. Zare MR, Mueen A, Seng WC
    J Digit Imaging, 2014 Feb;27(1):77-89.
    PMID: 24092327 DOI: 10.1007/s10278-013-9637-0
    The demand for automatically classification of medical X-ray images is rising faster than ever. In this paper, an approach is presented to gain high accuracy rate for those classes of medical database with high ratio of intraclass variability and interclass similarities. The classification framework was constructed via annotation using the following three techniques: annotation by binary classification, annotation by probabilistic latent semantic analysis, and annotation using top similar images. Next, final annotation was constructed by applying ranking similarity on annotated keywords made by each technique. The final annotation keywords were then divided into three levels according to the body region, specific bone structure in body region as well as imaging direction. Different weights were given to each level of the keywords; they are then used to calculate the weightage for each category of medical images based on their ground truth annotation. The weightage computed from the generated annotation of query image was compared with the weightage of each category of medical images, and then the query image would be assigned to the category with closest weightage to the query image. The average accuracy rate reported is 87.5 %.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  11. Sookhak M, Akhunzada A, Gani A, Khurram Khan M, Anuar NB
    ScientificWorldJournal, 2014;2014:269357.
    PMID: 25121114 DOI: 10.1155/2014/269357
    Cloud computing is a significant shift of computational paradigm where computing as a utility and storing data remotely have a great potential. Enterprise and businesses are now more interested in outsourcing their data to the cloud to lessen the burden of local data storage and maintenance. However, the outsourced data and the computation outcomes are not continuously trustworthy due to the lack of control and physical possession of the data owners. To better streamline this issue, researchers have now focused on designing remote data auditing (RDA) techniques. The majority of these techniques, however, are only applicable for static archive data and are not subject to audit the dynamically updated outsourced data. We propose an effectual RDA technique based on algebraic signature properties for cloud storage system and also present a new data structure capable of efficiently supporting dynamic data operations like append, insert, modify, and delete. Moreover, this data structure empowers our method to be applicable for large-scale data with minimum computation cost. The comparative analysis with the state-of-the-art RDA schemes shows that the proposed scheme is secure and highly efficient in terms of the computation and communication overhead on the auditor and server.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  12. Imran M, Hashim R, Noor Elaiza AK, Irtaza A
    ScientificWorldJournal, 2014;2014:752090.
    PMID: 25121136 DOI: 10.1155/2014/752090
    One of the major challenges for the CBIR is to bridge the gap between low level features and high level semantics according to the need of the user. To overcome this gap, relevance feedback (RF) coupled with support vector machine (SVM) has been applied successfully. However, when the feedback sample is small, the performance of the SVM based RF is often poor. To improve the performance of RF, this paper has proposed a new technique, namely, PSO-SVM-RF, which combines SVM based RF with particle swarm optimization (PSO). The aims of this proposed technique are to enhance the performance of SVM based RF and also to minimize the user interaction with the system by minimizing the RF number. The PSO-SVM-RF was tested on the coral photo gallery containing 10908 images. The results obtained from the experiments showed that the proposed PSO-SVM-RF achieved 100% accuracy in 8 feedback iterations for top 10 retrievals and 80% accuracy in 6 iterations for 100 top retrievals. This implies that with PSO-SVM-RF technique high accuracy rate is achieved at a small number of iterations.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  13. Whaiduzzaman M, Haque MN, Rejaul Karim Chowdhury M, Gani A
    ScientificWorldJournal, 2014;2014:894362.
    PMID: 25032243 DOI: 10.1155/2014/894362
    Cloud computing is currently emerging as an ever-changing, growing paradigm that models "everything-as-a-service." Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified.
    Matched MeSH terms: Information Storage and Retrieval/methods*; Information Storage and Retrieval/standards
  14. Mohebbi K, Ibrahim S, Zamani M, Khezrian M
    PLoS One, 2014;9(8):e104735.
    PMID: 25157872 DOI: 10.1371/journal.pone.0104735
    In this paper, a Semantic Web service matchmaker called UltiMatch-NL is presented. UltiMatch-NL applies two filters namely Signature-based and Description-based on different abstraction levels of a service profile to achieve more accurate results. More specifically, the proposed filters rely on semantic knowledge to extract the similarity between a given pair of service descriptions. Thus it is a further step towards fully automated Web service discovery via making this process more semantic-aware. In addition, a new technique is proposed to weight and combine the results of different filters of UltiMatch-NL, automatically. Moreover, an innovative approach is introduced to predict the relevance of requests and Web services and eliminate the need for setting a threshold value of similarity. In order to evaluate UltiMatch-NL, the repository of OWLS-TC is used. The performance evaluation based on standard measures from the information retrieval field shows that semantic matching of OWL-S services can be significantly improved by incorporating designed matching filters.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  15. Khan N, Yaqoob I, Hashem IA, Inayat Z, Ali WK, Alam M, et al.
    ScientificWorldJournal, 2014;2014:712826.
    PMID: 25136682 DOI: 10.1155/2014/712826
    Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion devices are expected to be connected to the Internet. At this point, predicted data production will be 44 times greater than that in 2009. As information is transferred and shared at light speed on optic fiber and wireless networks, the volume of data and the speed of market growth increase. However, the fast growth rate of such large data generates numerous challenges, such as the rapid growth of data, transfer speed, diverse data, and security. Nonetheless, Big Data is still in its infancy stage, and the domain has not been reviewed in general. Hence, this study comprehensively surveys and classifies the various attributes of Big Data, including its nature, definitions, rapid growth rate, volume, management, analysis, and security. This study also proposes a data life cycle that uses the technologies and terminologies of Big Data. Future research directions in this field are determined based on opportunities and several open issues in Big Data domination. These research directions facilitate the exploration of the domain and the development of optimal techniques to address Big Data.
    Matched MeSH terms: Information Storage and Retrieval
  16. Khan S, Shiraz M, Wahab AW, Gani A, Han Q, Rahman ZB
    ScientificWorldJournal, 2014;2014:547062.
    PMID: 25097880 DOI: 10.1155/2014/547062
    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  17. Samimi P, Ravana SD
    ScientificWorldJournal, 2014;2014:135641.
    PMID: 24977172 DOI: 10.1155/2014/135641
    Test collection is used to evaluate the information retrieval systems in laboratory-based evaluation experimentation. In a classic setting, generating relevance judgments involves human assessors and is a costly and time consuming task. Researchers and practitioners are still being challenged in performing reliable and low-cost evaluation of retrieval systems. Crowdsourcing as a novel method of data acquisition is broadly used in many research fields. It has been proven that crowdsourcing is an inexpensive and quick solution as well as a reliable alternative for creating relevance judgments. One of the crowdsourcing applications in IR is to judge relevancy of query document pair. In order to have a successful crowdsourcing experiment, the relevance judgment tasks should be designed precisely to emphasize quality control. This paper is intended to explore different factors that have an influence on the accuracy of relevance judgments accomplished by workers and how to intensify the reliability of judgments in crowdsourcing experiment.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  18. Whaiduzzaman M, Gani A, Anuar NB, Shiraz M, Haque MN, Haque IT
    ScientificWorldJournal, 2014;2014:459375.
    PMID: 24696645 DOI: 10.1155/2014/459375
    Cloud computing (CC) has recently been receiving tremendous attention from the IT industry and academic researchers. CC leverages its unique services to cloud customers in a pay-as-you-go, anytime, anywhere manner. Cloud services provide dynamically scalable services through the Internet on demand. Therefore, service provisioning plays a key role in CC. The cloud customer must be able to select appropriate services according to his or her needs. Several approaches have been proposed to solve the service selection problem, including multicriteria decision analysis (MCDA). MCDA enables the user to choose from among a number of available choices. In this paper, we analyze the application of MCDA to service selection in CC. We identify and synthesize several MCDA techniques and provide a comprehensive analysis of this technology for general readers. In addition, we present a taxonomy derived from a survey of the current literature. Finally, we highlight several state-of-the-art practical aspects of MCDA implementation in cloud computing service selection. The contributions of this study are four-fold: (a) focusing on the state-of-the-art MCDA techniques, (b) highlighting the comparative analysis and suitability of several MCDA methods, (c) presenting a taxonomy through extensive literature review, and (d) analyzing and summarizing the cloud computing service selections in different scenarios.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  19. Ghazizadeh E, Zamani M, Ab Manan JL, Alizadeh M
    ScientificWorldJournal, 2014;2014:260187.
    PMID: 24701149 DOI: 10.1155/2014/260187
    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
    Matched MeSH terms: Information Storage and Retrieval/standards; Information Storage and Retrieval/trends
  20. Shah PA, Hasbullah HB, Lawal IA, Aminu Mu'azu A, Tang Jung L
    ScientificWorldJournal, 2014;2014:506028.
    PMID: 24688398 DOI: 10.1155/2014/506028
    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).
    Matched MeSH terms: Information Storage and Retrieval/methods*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links