Displaying publications 21 - 40 of 353 in total

Abstract:
Sort:
  1. Khor HL, Liew SC, Zain JM
    Int J Biomed Imaging, 2016;2016:9583727.
    PMID: 26981111 DOI: 10.1155/2016/9583727
    With the advancement of technology in communication network, it facilitated digital medical images transmitted to healthcare professionals via internal network or public network (e.g., Internet), but it also exposes the transmitted digital medical images to the security threats, such as images tampering or inserting false data in the images, which may cause an inaccurate diagnosis and treatment. Medical image distortion is not to be tolerated for diagnosis purposes; thus a digital watermarking on medical image is introduced. So far most of the watermarking research has been done on single frame medical image which is impractical in the real environment. In this paper, a digital watermarking on multiframes medical images is proposed. In order to speed up multiframes watermarking processing time, a parallel watermarking processing on medical images processing by utilizing multicores technology is introduced. An experiment result has shown that elapsed time on parallel watermarking processing is much shorter than sequential watermarking processing.
    Matched MeSH terms: Internet
  2. Asmalia Che Ahmad, Normazlina Mohamed Zi, Ismail Bahari, Azizah Jaafar
    MyJurnal
    Safety Intervention Need Analysis System (SINAS) is a web-based safety management program that aspires the identification for the need of construction safety intervention. It can be accessed through the website www.sinas.org. This first phase of SINAS project development only focus on safe design intervention. SINAS was created to provide assistance for safety practitioners in identifying the need of safe design intervention. This was put forward through the investigations of construction accidents that relate to design. The SINAS process of need analysis are carved up to six steps i.e. user information, accident details, accident evaluation, result of the need analysis, construction design intervention and safety intervention need analysis report. At the end of the process, Safety Intervention Need Analysis Report will be generated. This report is an essential document to proof the need of safe design intervention. Additionally, SINAS also offers recommendations for construction designers and professionals on suitable safe design intervention to prevent construction accidents and minimises construction risks.
    Matched MeSH terms: Internet
  3. Din IU, Kim BS, Hassan S, Guizani M, Atiquzzaman M, Rodrigues JJPC
    Sensors (Basel), 2018 Nov 15;18(11).
    PMID: 30445723 DOI: 10.3390/s18113957
    Information Centric Network (ICN) is expected to be the favorable deployable future Internet paradigm. ICN intends to replace the current IP-based model with the name-based content-centric model, as it aims at providing better security, scalability, and content distribution. However, it is a challenging task to conceive how ICN can be linked with the other most emerging paradigm, i.e., Vehicular Ad hoc Network (VANET). In this article, we present an overview of the ICN-based VANET approach in line with its contributions and research challenges.In addition, the connectivity issues of vehicular ICN model is presented with some other emerging paradigms, such as Software Defined Network (SDN), Cloud, and Edge computing. Moreover, some ICN-based VANET research opportunities, in terms of security, mobility, routing, naming, caching, and fifth generation (5G) communications, are also covered at the end of the paper.
    Matched MeSH terms: Internet
  4. Lo SK, Liew CS, Tey KS, Mekhilef S
    Sensors (Basel), 2019 Oct 09;19(20).
    PMID: 31600904 DOI: 10.3390/s19204354
    The advancement of the Internet of Things (IoT) as a solution in diverse application domains has nurtured the expansion in the number of devices and data volume. Multiple platforms and protocols have been introduced and resulted in high device ubiquity and heterogeneity. However, currently available IoT architectures face challenges to accommodate the diversity in IoT devices or services operating under different operating systems and protocols. In this paper, we propose a new IoT architecture that utilizes the component-based design approach to create and define the loosely-coupled, standalone but interoperable service components for IoT systems. Furthermore, a data-driven feedback function is included as a key feature of the proposed architecture to enable a greater degree of system automation and to reduce the dependency on mankind for data analysis and decision-making. The proposed architecture aims to tackle device interoperability, system reusability and the lack of data-driven functionality issues. Using a real-world use case on a proof-of-concept prototype, we examined the viability and usability of the proposed architecture.
    Matched MeSH terms: Internet
  5. Awang Bulgiba AM
    JUMMEC, 2000;5:36-40.
    In 1999, the Department of Social and Preventive Medicine set up its website on the Internet (http://ummc.med.uni.edu.my/sps/. Setting up the website was a whole new experience for the author and many new things were learnt along the way. This paper describes how the website was constructed, the problems, and solutions to all these problems. The experience of the author in setting up the SPM website may be useful to others wishing to set up their own department websites. KEYWORDS: Internet, SPM, website, web page
    Matched MeSH terms: Internet
  6. Martín DG, Florez SL, González-Briones A, Corchado JM
    Sensors (Basel), 2023 Jan 14;23(2).
    PMID: 36679779 DOI: 10.3390/s23020982
    The revolution generated by the Internet of Things (IoT) has radically changed the world; countless objects with remote sensing, actuation, analysis and sharing capabilities are interconnected over heterogeneous communication networks. Consequently, all of today's devices can connect to the internet and can provide valuable information for decision making. However, the data collected by different devices are in different formats, which makes it necessary to develop a solution that integrates comprehensive semantic tools to represent, integrate and acquire knowledge, which is a major challenge for IoT environments. The proposed solution addresses this challenge by using IoT semantic data to reason about actionable knowledge, combining next-generation semantic technologies and artificial intelligence through a set of cognitive components that enables easy interoperability and integration for both legacy systems and emerging technologies, such as IoT, to generate business value in terms of faster analytics and improved decision making. Thus, combining IoT environments with cognitive artificial intelligence services, COSIBAS builds an abstraction layer between existing platforms for IoT and AI technologies to enable cognitive solutions and increase interoperability across multiple domains. The resulting low-cost cross platform supports scalability and the evolution of large-scale heterogeneous systems and allows the modernization of legacy infrastructures with cognitive tools and communication mechanisms while reusing assets.
    Matched MeSH terms: Internet
  7. Chia J, Chin JJ, Yip SC
    F1000Res, 2021;10:931.
    PMID: 36798451 DOI: 10.12688/f1000research.72910.1
    Digital signature schemes (DSS) are ubiquitously used for public authentication in the infrastructure of the internet, in addition to their use as a cryptographic tool to construct even more sophisticated schemes such as those that are identity-based. The security of DSS is analyzed through the existential unforgeability under chosen message attack (EUF-CMA) experiment which promises unforgeability of signatures on new messages even when the attacker has access to an arbitrary set of messages and their corresponding signatures. However, the EUF-CMA model does not account for attacks such as an attacker forging a different signature on an existing message, even though the attack could be devastating in the real world and constitutes a severe breach of the security system. Nonetheless, most of the DSS are not analyzed in this security model, which possibly makes them vulnerable to such an attack. In contrast, a better security notion known as strong EUF-CMA (sEUF-CMA) is designed to be resistant to such attacks. This review aims to identify DSS in the literature that are secure in the sEUF-CMA model. In addition, the article discusses the challenges and future directions of DSS. In our review, we consider the security of existing DSS that fit our criterion in the sEUF-CMA model; our criterion is simple as we only require the DSS to be at least secure against the minimum of existential forgery. Our findings are categorized into two classes: the direct and indirect classes of sEUF-CMA. The former is inherently sEUF-CMA without any modification while the latter requires some transformation. Our comprehensive  review contributes to the security and cryptographic research community by discussing the efficiency and security of DSS that are sEUF-CMA, which aids in selecting robust DSS in future design considerations.
    Matched MeSH terms: Internet
  8. Zhu JJ, Liu Z, Huang T, Guo XS
    PLoS One, 2023;18(6):e0287439.
    PMID: 37390063 DOI: 10.1371/journal.pone.0287439
    This study aims to give a comprehensive analysis of customers' acceptance and use of AI gadgets and its relevant ethical issues in the tourism and hospitality business in the era of the Internet of Things. Adopting a PRISMA methodology for Systematic Reviews and Meta-Analyses, the present research reviews how tourism and hospitality scholars have conducted research on AI technology in the field of tourism and the hospitality industry. Most of the journal articles related to AI issues published in Web of Science, ScienceDirect.com and the journal websites were considered in this review. The results of this research offer a better understanding of AI implementation with roboethics to investigate AI-related issues in the tourism and hospitality industry. In addition, it provides decision-makers in the hotel industry with practical references on service innovation, participation in the design of AI devices and AI device applications, meeting customer needs, and optimising customer experience. The theoretical implications and practical interpretations are further identified.
    Matched MeSH terms: Internet
  9. Alabsi BA, Anbar M, Rihan SDA
    Sensors (Basel), 2023 Jun 16;23(12).
    PMID: 37420810 DOI: 10.3390/s23125644
    The increasing use of Internet of Things (IoT) devices has led to a rise in Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks on these networks. These attacks can have severe consequences, resulting in the unavailability of critical services and financial losses. In this paper, we propose an Intrusion Detection System (IDS) based on a Conditional Tabular Generative Adversarial Network (CTGAN) for detecting DDoS and DoS attacks on IoT networks. Our CGAN-based IDS utilizes a generator network to produce synthetic traffic that mimics legitimate traffic patterns, while the discriminator network learns to differentiate between legitimate and malicious traffic. The syntactic tabular data generated by CTGAN is employed to train multiple shallow machine-learning and deep-learning classifiers, enhancing their detection model performance. The proposed approach is evaluated using the Bot-IoT dataset, measuring detection accuracy, precision, recall, and F1 measure. Our experimental results demonstrate the accurate detection of DDoS and DoS attacks on IoT networks using the proposed approach. Furthermore, the results highlight the significant contribution of CTGAN in improving the performance of detection models in machine learning and deep learning classifiers.
    Matched MeSH terms: Internet
  10. Zegarra Rodríguez D, Daniel Okey O, Maidin SS, Umoren Udo E, Kleinschmidt JH
    PLoS One, 2023;18(10):e0286652.
    PMID: 37844095 DOI: 10.1371/journal.pone.0286652
    Recent years have witnessed an in-depth proliferation of the Internet of Things (IoT) and Industrial Internet of Things (IIoT) systems linked to Industry 4.0 technology. The increasing rate of IoT device usage is associated with rising security risks resulting from malicious network flows during data exchange between the connected devices. Various security threats have shown high adverse effects on the availability, functionality, and usability of the devices among which denial of service (DoS) and distributed denial of service (DDoS), which attempt to exhaust the capacity of the IoT network (gateway), thereby causing failure in the functionality of the system have been more pronounced. Various machine learning and deep learning algorithms have been used to propose intelligent intrusion detection systems (IDS) to mitigate the challenging effects of these network threats. One concern is that although deep learning algorithms have shown good accuracy results on tabular data, not all deep learning algorithms can perform well on tabular datasets, which happen to be the most commonly available format of datasets for machine learning tasks. Again, there is also the challenge of model explainability and feature selection, which affect model performance. In this regard, we propose a model for IDS that uses attentive mechanisms to automatically select salient features from a dataset to train the IDS model and provide explainable results, the TabNet-IDS. We implement the proposed model using the TabNet algorithm based on PyTorch which is a deep-learning framework. The results obtained show that the TabNet architecture can be used on tabular datasets for IoT security to achieve good results comparable to those of neural networks, reaching an accuracy of 97% on CIC-IDS2017, 95% on CSE-CICIDS2018 and 98% on CIC-DDoS2019 datasets.
    Matched MeSH terms: Internet
  11. Zulkapli NA, Sobi S, Mohd Zubaidi NA, Abdullah JM
    Malays J Med Sci, 2016 Jul;23(4):1-4.
    PMID: 27660539 DOI: 10.21315/mjms2016.23.4.1
    The Malaysian Journal of Medical Sciences (MJMS) has conducted a simple analysis of its scholarly publication, based on the auto-generated data compiled from ScholarOne Manuscripts(™), an innovative, web-based, submission and peer-review workflow solution for scholarly publishers. The performance of the MJMS from 2014-2015 is reported on in this editorial, with a focus on the pattern of manuscript submission, geographical contributors and the acceptance-rejection rate. The total number of manuscript submissions has increased from 264 in 2014, to 272 in 2015. Malaysians are the main contributors to the MJMS. The total number of manuscript rejections following the review process was 79 (29.9%) in 2014, increasing to 92 (33.8%) the following year, in accordance with the exacting quality control criteria applied by the journal's editor to the submitted manuscripts.
    Matched MeSH terms: Internet
  12. Khezrian M, Jahan A, Kadir WM, Ibrahim S
    PLoS One, 2014;9(6):e97831.
    PMID: 24897426 DOI: 10.1371/journal.pone.0097831
    Web services today are among the most widely used groups for Service Oriented Architecture (SOA). Service selection is one of the most significant current discussions in SOA, which evaluates discovered services and chooses the best candidate from them. Although a majority of service selection techniques apply Quality of Service (QoS), the behaviour of QoS-based service selection leads to service selection problems in Multi-Criteria Decision Making (MCDM). In the existing works, the confidence level of decision makers is neglected and does not consider their expertise in assessing Web services. In this paper, we employ the VIKOR (VIšekriterijumskoKOmpromisnoRangiranje) method, which is absent in the literature for service selection, but is well-known in other research. We propose a QoS-based approach that deals with service selection by applying VIKOR with improvement of features. This research determines the weights of criteria based on user preference and accounts for the confidence level of decision makers. The proposed approach is illustrated by an example in order to demonstrate and validate the model. The results of this research may facilitate service consumers to attain a more efficient decision when selecting the appropriate service.
    Matched MeSH terms: Internet*
  13. Hu C, Kumar S, Huang J, Ratnavelu K
    PLoS One, 2017;12(4):e0175623.
    PMID: 28399153 DOI: 10.1371/journal.pone.0175623
    In face-to-face communications, to avoid sanctions and disapproval from others, people are more likely to hide negative aspects of their true self (such as socially undesirable personalities, minds, beliefs and consciousness) to avoid conflict with social norms and laws. The anonymity of cyberspace provides people a unique environment to behave more freely and openly with less restraint from the real word. Existing research related to online true self expression has mainly explored true self as an independent aspect of self. Regarding true self as a two-dimensional concept, this study investigates true self from the perspective of individuals' self-guide and identity reconstruction in both online and offline world. Using qualitative research methods, the current study investigates 57 participants through interviews and questionnaires. Content analysis reveals four factors that motivate people to express more true self (especially negative true self) when reconstructing their online identity and involve true self as a part of their self-guide in anonymous environment. By incorporating true self as an important part of individuals' self-guide and identity online, the current study advances self-discrepancy theory, making it more comprehensive for cyberspace. The results are also interpreted based on self-determination theory. The theoretical contributions of this study are discussed and practical implications are also presented.
    Matched MeSH terms: Internet*
  14. Hindia MN, Rahman TA, Ojukwu H, Hanafi EB, Fattouh A
    PLoS One, 2016;11(5):e0155077.
    PMID: 27152423 DOI: 10.1371/journal.pone.0155077
    As the enterprise of the "Internet of Things" is rapidly gaining widespread acceptance, sensors are being deployed in an unrestrained manner around the world to make efficient use of this new technological evolution. A recent survey has shown that sensor deployments over the past decade have increased significantly and has predicted an upsurge in the future growth rate. In health-care services, for instance, sensors are used as a key technology to enable Internet of Things oriented health-care monitoring systems. In this paper, we have proposed a two-stage fundamental approach to facilitate the implementation of such a system. In the first stage, sensors promptly gather together the particle measurements of an android application. Then, in the second stage, the collected data are sent over a Femto-LTE network following a new scheduling technique. The proposed scheduling strategy is used to send the data according to the application's priority. The efficiency of the proposed technique is demonstrated by comparing it with that of well-known algorithms, namely, proportional fairness and exponential proportional fairness.
    Matched MeSH terms: Internet*
  15. Adeyemi IR, Razak SA, Salleh M, Venter HS
    PLoS One, 2016;11(12):e0166930.
    PMID: 27918593 DOI: 10.1371/journal.pone.0166930
    Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role in online user identification, online profile development, and recommender systems. However, building a characteristic model of human dynamics on the Internet involves a complete analysis of the variations in human activity patterns, which is a complex process. This complexity is inherent in human dynamics and has not been extensively studied to reveal the structural composition of human behavior. A typical method of anatomizing such a complex system is viewing all independent interconnectivity that constitutes the complexity. An examination of the various dimensions of human communication pattern in online interactions is presented in this paper. The study employed reliable server-side web data from 31 known users to explore characteristics of human-driven communications. Various machine-learning techniques were explored. The results revealed that each individual exhibited a relatively consistent, unique behavioral signature and that the logistic regression model and model tree can be used to accurately distinguish online users. These results are applicable to one-to-one online user identification processes, insider misuse investigation processes, and online profiling in various areas.
    Matched MeSH terms: Internet*
  16. Whaiduzzaman M, Haque MN, Rejaul Karim Chowdhury M, Gani A
    ScientificWorldJournal, 2014;2014:894362.
    PMID: 25032243 DOI: 10.1155/2014/894362
    Cloud computing is currently emerging as an ever-changing, growing paradigm that models "everything-as-a-service." Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified.
    Matched MeSH terms: Internet/standards
  17. Khan N, Yaqoob I, Hashem IA, Inayat Z, Ali WK, Alam M, et al.
    ScientificWorldJournal, 2014;2014:712826.
    PMID: 25136682 DOI: 10.1155/2014/712826
    Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion devices are expected to be connected to the Internet. At this point, predicted data production will be 44 times greater than that in 2009. As information is transferred and shared at light speed on optic fiber and wireless networks, the volume of data and the speed of market growth increase. However, the fast growth rate of such large data generates numerous challenges, such as the rapid growth of data, transfer speed, diverse data, and security. Nonetheless, Big Data is still in its infancy stage, and the domain has not been reviewed in general. Hence, this study comprehensively surveys and classifies the various attributes of Big Data, including its nature, definitions, rapid growth rate, volume, management, analysis, and security. This study also proposes a data life cycle that uses the technologies and terminologies of Big Data. Future research directions in this field are determined based on opportunities and several open issues in Big Data domination. These research directions facilitate the exploration of the domain and the development of optimal techniques to address Big Data.
    Matched MeSH terms: Internet*
  18. Shiraz M, Gani A, Ahmad RW, Adeel Ali Shah S, Karim A, Rahman ZA
    PLoS One, 2014;9(8):e102270.
    PMID: 25127245 DOI: 10.1371/journal.pone.0102270
    The latest developments in mobile computing technology have enabled intensive applications on the modern Smartphones. However, such applications are still constrained by limitations in processing potentials, storage capacity and battery lifetime of the Smart Mobile Devices (SMDs). Therefore, Mobile Cloud Computing (MCC) leverages the application processing services of computational clouds for mitigating resources limitations in SMDs. Currently, a number of computational offloading frameworks are proposed for MCC wherein the intensive components of the application are outsourced to computational clouds. Nevertheless, such frameworks focus on runtime partitioning of the application for computational offloading, which is time consuming and resources intensive. The resource constraint nature of SMDs require lightweight procedures for leveraging computational clouds. Therefore, this paper presents a lightweight framework which focuses on minimizing additional resources utilization in computational offloading for MCC. The framework employs features of centralized monitoring, high availability and on demand access services of computational clouds for computational offloading. As a result, the turnaround time and execution cost of the application are reduced. The framework is evaluated by testing prototype application in the real MCC environment. The lightweight nature of the proposed framework is validated by employing computational offloading for the proposed framework and the latest existing frameworks. Analysis shows that by employing the proposed framework for computational offloading, the size of data transmission is reduced by 91%, energy consumption cost is minimized by 81% and turnaround time of the application is decreased by 83.5% as compared to the existing offloading frameworks. Hence, the proposed framework minimizes additional resources utilization and therefore offers lightweight solution for computational offloading in MCC.
    Matched MeSH terms: Internet*
  19. Shah PA, Hasbullah HB, Lawal IA, Aminu Mu'azu A, Tang Jung L
    ScientificWorldJournal, 2014;2014:506028.
    PMID: 24688398 DOI: 10.1155/2014/506028
    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).
    Matched MeSH terms: Internet*
  20. Shahar S, Shirley N, Noah SA
    Inform Health Soc Care, 2013 Jan;38(1):15-26.
    PMID: 22957981 DOI: 10.3109/17538157.2012.710684
    This study aimed to assess the quality and accuracy of nutrition information about cancer prevention available on the Web. The keywords 'nutrition  +  diet  +  cancer  +  prevention' were submitted to the Google search engine. Out of 400 websites evaluated, 100 met the inclusion and exclusion criteria and were selected as the sample for the assessment of quality and accuracy. Overall, 54% of the studied websites had low quality, 48 and 57% had no author's name or information, respectively, 100% were not updated within 1 month during the study period and 86% did not have the Health on the Net seal. When the websites were assessed for readability using the Flesch Reading Ease test, nearly 44% of the websites were categorised as 'quite difficult'. With regard to accuracy, 91% of the websites did not precisely follow the latest WCRF/AICR 2007 recommendation. The quality scores correlated significantly with the accuracy scores (r  =  0.250, p  
    Matched MeSH terms: Internet*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links