Displaying publications 1 - 20 of 63 in total

Abstract:
Sort:
  1. Whaiduzzaman M, Haque MN, Rejaul Karim Chowdhury M, Gani A
    ScientificWorldJournal, 2014;2014:894362.
    PMID: 25032243 DOI: 10.1155/2014/894362
    Cloud computing is currently emerging as an ever-changing, growing paradigm that models "everything-as-a-service." Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified.
    Matched MeSH terms: Information Storage and Retrieval/methods*; Information Storage and Retrieval/standards
  2. Rosilawati Zainol, Sayed Jamaludin Sayed Ali, Zainab Abu Bakar
    MyJurnal
    This paper presents the evaluation of integrated partial match query in Geographic Information Retrieval (GIR). To facilitate the evaluation, Kuala Lumpur tourist related data is used as test collection and is stored in SuperWeb, a map server. Then the map server is customized to enhance its query capability to recognize word in partial or case sensitive between layers of spatial data. Query keyword is tested using the system and results are evaluated using experiments on sample data. Findings show that integrated partial match query provides more flexibility to tourist in determining search results.
    Matched MeSH terms: Information Storage and Retrieval
  3. Khan S, Shiraz M, Wahab AW, Gani A, Han Q, Rahman ZB
    ScientificWorldJournal, 2014;2014:547062.
    PMID: 25097880 DOI: 10.1155/2014/547062
    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  4. Shah PA, Hasbullah HB, Lawal IA, Aminu Mu'azu A, Tang Jung L
    ScientificWorldJournal, 2014;2014:506028.
    PMID: 24688398 DOI: 10.1155/2014/506028
    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).
    Matched MeSH terms: Information Storage and Retrieval/methods*
  5. Aldeen YA, Salleh M, Aljeroudi Y
    J Biomed Inform, 2016 08;62:107-16.
    PMID: 27369566 DOI: 10.1016/j.jbi.2016.06.011
    Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation.
    Matched MeSH terms: Information Storage and Retrieval*
  6. Zaidi SZ, Abidi SS, Manickam S
    PMID: 15460713
    This paper presents a case for an intelligent agent based framework for knowledge discovery in a distributed healthcare environment comprising multiple heterogeneous healthcare data repositories. Data-mediated knowledge discovery, especially from multiple heterogeneous data resources, is a tedious process and imposes significant operational constraints on end-users. We demonstrate that autonomous, reactive and proactive intelligent agents provide an opportunity to generate end-user oriented, packaged, value-added decision-support/strategic planning services for healthcare professionals, manages and policy makers, without the need for a priori technical knowledge. Since effective healthcare is grounded in good communication, experience sharing, continuous learning and proactive actions, we use intelligent agents to implement an Agent based Data Mining Infostructure that provides a suite of healthcare-oriented decision-support/strategic planning services.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  7. Nolida Yussup, Nur Aira Abd. Rahman, Ismail Mustapha, Jaafar Abdullah, Mohd. Ashhar Khalid, Hearie Hassan, et al.
    MyJurnal
    Data transmission in field works especially that is related to industry, gas and chemical is paramount importance to ensure data accuracy and delivery time. A development of wireless detector system for remote data acquisition to be applied in conducting fieldwork in industry is described in this paper. A wireless communication which is applied in the project development is a viable and cost-effective method of transmitting data from the detector to the laptop on the site to facilitate data storage and analysis automatically, which can be used in various applications such as column scanning. The project involves hardware design for the detector and electronics parts besides programming for control board and user interface. A prototype of a wireless gamma scintillation detector is developed with capabilities of transmitting data to computer via radio frequency (RF) and recording the data within the 433MHz band at baud rate of 19200.
    Matched MeSH terms: Information Storage and Retrieval
  8. Az Azrinudin Alidin, Crestani, Fabio
    MyJurnal
    Mobile users have the capability of accessing information anywhere at any time with the introduction of mobile browsers and mobile web search. However, the current mobile browsers are implemented without considering the characteristics of mobile searches. As a result, mobile users need to devote time and effort in order to retrieve relevant information from the web in mobile devices. On the other hand, mobile users often request information related to their surroundings, which is also known as context. This recognizes the importance of including context in information retrieval. Besides, the availability of the embedded sensors in mobile devices has supported the recognition of context. In this study, the context acquisition and utilization for mobile information retrieval are proposed. The “just-in-time” approach is exploited in which the information that is relevant to a user is retrieved without the user requesting it. This will reduce the mobile user’s effort, time and interaction when retrieving information in mobile devices. In this paper, the context dimensions and context model are presented. Simple experiments are shown where user context is predicted using the context model.
    Matched MeSH terms: Information Storage and Retrieval
  9. Rizwan Iqbal, Masrah Azrifah Azmi Murad
    MyJurnal
    Natural language interfaces to ontologies allow users to query the system using natural language queries.
    These systems take natural language query as input and transform it to formal query language equivalent
    to retrieve the desired information from ontologies. The existing natural language interfaces to ontologies
    offer support for handling negation queries; however, they offer limited support for dealing with them.
    This paper proposes a negation query handling engine which can handle relatively complex natural
    language queries than the existing systems. The proposed engine effectively understands the intent of
    the user query on the basis of a sophisticated algorithm, which is governed by a set of techniques and
    transformation rules. The proposed engine was evaluated using the Mooney data set and AquaLog dataset,
    and it manifested encouraging results.
    Matched MeSH terms: Information Storage and Retrieval
  10. Ngah Nasaruddin A, Tee BT, Musthafah MT, Md Jasman MES
    Data Brief, 2019 Dec;27:104534.
    PMID: 31709283 DOI: 10.1016/j.dib.2019.104534
    The rapid development of open source developmental boards incorporating microcontrollers on printed circuit boards has offered many alternatives in creating feasible, low cost indoor environment monitoring and controlling platforms. Data are collected and stored in predetermined locations throughout a series of communication activities between a network of active sensors and their processing units. However, the issue of data precision and accuracy are of real concern for generating baseline information. Therefore, with that in mind, the purpose of this paper is to accentuate an insightful trend of retrieving indoor environment data (temperature and relative humidity) for an office building in a hot and humid climate condition. The indoor parameters were monitored using a combination of a single board microcontroller with an active sensor with well calibrated thermal microclimate devices. Accordingly, it was found that proactive adjustment can be conducted in order to minimize waste.
    Matched MeSH terms: Information Storage and Retrieval
  11. Mohebbi K, Ibrahim S, Zamani M, Khezrian M
    PLoS ONE, 2014;9(8):e104735.
    PMID: 25157872 DOI: 10.1371/journal.pone.0104735
    In this paper, a Semantic Web service matchmaker called UltiMatch-NL is presented. UltiMatch-NL applies two filters namely Signature-based and Description-based on different abstraction levels of a service profile to achieve more accurate results. More specifically, the proposed filters rely on semantic knowledge to extract the similarity between a given pair of service descriptions. Thus it is a further step towards fully automated Web service discovery via making this process more semantic-aware. In addition, a new technique is proposed to weight and combine the results of different filters of UltiMatch-NL, automatically. Moreover, an innovative approach is introduced to predict the relevance of requests and Web services and eliminate the need for setting a threshold value of similarity. In order to evaluate UltiMatch-NL, the repository of OWLS-TC is used. The performance evaluation based on standard measures from the information retrieval field shows that semantic matching of OWL-S services can be significantly improved by incorporating designed matching filters.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  12. Sookhak M, Akhunzada A, Gani A, Khurram Khan M, Anuar NB
    ScientificWorldJournal, 2014;2014:269357.
    PMID: 25121114 DOI: 10.1155/2014/269357
    Cloud computing is a significant shift of computational paradigm where computing as a utility and storing data remotely have a great potential. Enterprise and businesses are now more interested in outsourcing their data to the cloud to lessen the burden of local data storage and maintenance. However, the outsourced data and the computation outcomes are not continuously trustworthy due to the lack of control and physical possession of the data owners. To better streamline this issue, researchers have now focused on designing remote data auditing (RDA) techniques. The majority of these techniques, however, are only applicable for static archive data and are not subject to audit the dynamically updated outsourced data. We propose an effectual RDA technique based on algebraic signature properties for cloud storage system and also present a new data structure capable of efficiently supporting dynamic data operations like append, insert, modify, and delete. Moreover, this data structure empowers our method to be applicable for large-scale data with minimum computation cost. The comparative analysis with the state-of-the-art RDA schemes shows that the proposed scheme is secure and highly efficient in terms of the computation and communication overhead on the auditor and server.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  13. Samimi P, Ravana SD
    ScientificWorldJournal, 2014;2014:135641.
    PMID: 24977172 DOI: 10.1155/2014/135641
    Test collection is used to evaluate the information retrieval systems in laboratory-based evaluation experimentation. In a classic setting, generating relevance judgments involves human assessors and is a costly and time consuming task. Researchers and practitioners are still being challenged in performing reliable and low-cost evaluation of retrieval systems. Crowdsourcing as a novel method of data acquisition is broadly used in many research fields. It has been proven that crowdsourcing is an inexpensive and quick solution as well as a reliable alternative for creating relevance judgments. One of the crowdsourcing applications in IR is to judge relevancy of query document pair. In order to have a successful crowdsourcing experiment, the relevance judgment tasks should be designed precisely to emphasize quality control. This paper is intended to explore different factors that have an influence on the accuracy of relevance judgments accomplished by workers and how to intensify the reliability of judgments in crowdsourcing experiment.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  14. Whaiduzzaman M, Gani A, Anuar NB, Shiraz M, Haque MN, Haque IT
    ScientificWorldJournal, 2014;2014:459375.
    PMID: 24696645 DOI: 10.1155/2014/459375
    Cloud computing (CC) has recently been receiving tremendous attention from the IT industry and academic researchers. CC leverages its unique services to cloud customers in a pay-as-you-go, anytime, anywhere manner. Cloud services provide dynamically scalable services through the Internet on demand. Therefore, service provisioning plays a key role in CC. The cloud customer must be able to select appropriate services according to his or her needs. Several approaches have been proposed to solve the service selection problem, including multicriteria decision analysis (MCDA). MCDA enables the user to choose from among a number of available choices. In this paper, we analyze the application of MCDA to service selection in CC. We identify and synthesize several MCDA techniques and provide a comprehensive analysis of this technology for general readers. In addition, we present a taxonomy derived from a survey of the current literature. Finally, we highlight several state-of-the-art practical aspects of MCDA implementation in cloud computing service selection. The contributions of this study are four-fold: (a) focusing on the state-of-the-art MCDA techniques, (b) highlighting the comparative analysis and suitability of several MCDA methods, (c) presenting a taxonomy through extensive literature review, and (d) analyzing and summarizing the cloud computing service selections in different scenarios.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  15. Khairudin NM, Mustapha A, Ahmad MH
    ScientificWorldJournal, 2014;2014:813983.
    PMID: 24587757 DOI: 10.1155/2014/813983
    The advent of web-based applications and services has created such diverse and voluminous web log data stored in web servers, proxy servers, client machines, or organizational databases. This paper attempts to investigate the effect of temporal attribute in relational rule mining for web log data. We incorporated the characteristics of time in the rule mining process and analysed the effect of various temporal parameters. The rules generated from temporal relational rule mining are then compared against the rules generated from the classical rule mining approach such as the Apriori and FP-Growth algorithms. The results showed that by incorporating the temporal attribute via time, the number of rules generated is subsequently smaller but is comparable in terms of quality.
    Matched MeSH terms: Information Storage and Retrieval/methods*
  16. Abdulhamid SM, Abd Latiff MS, Abdul-Salaam G, Hussain Madni SH
    PLoS ONE, 2016;11(7):e0158102.
    PMID: 27384239 DOI: 10.1371/journal.pone.0158102
    Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques.
    Matched MeSH terms: Information Storage and Retrieval*
  17. Mueen A, Zainuddin R, Baba MS
    J Med Syst, 2010 Oct;34(5):859-64.
    PMID: 20703623 DOI: 10.1007/s10916-009-9300-y
    The next generation of medical information system will integrate multimedia data to assist physicians in clinical decision-making, diagnoses, teaching, and research. This paper describes MIARS (Medical Image Annotation and Retrieval System). MIARS not only provides automatic annotation, but also supports text based as well as image based retrieval strategies, which play important roles in medical training, research, and diagnostics. The system utilizes three trained classifiers, which are trained using training images. The goal of these classifiers is to provide multi-level automatic annotation. Another main purpose of the MIARS system is to study image semantic retrieval strategy by which images can be retrieved according to different levels of annotation.
    Matched MeSH terms: Information Storage and Retrieval*
  18. Alhaj TA, Siraj MM, Zainal A, Elshoush HT, Elhaj F
    PLoS ONE, 2016;11(11):e0166017.
    PMID: 27893821 DOI: 10.1371/journal.pone.0166017
    Grouping and clustering alerts for intrusion detection based on the similarity of features is referred to as structurally base alert correlation and can discover a list of attack steps. Previous researchers selected different features and data sources manually based on their knowledge and experience, which lead to the less accurate identification of attack steps and inconsistent performance of clustering accuracy. Furthermore, the existing alert correlation systems deal with a huge amount of data that contains null values, incomplete information, and irrelevant features causing the analysis of the alerts to be tedious, time-consuming and error-prone. Therefore, this paper focuses on selecting accurate and significant features of alerts that are appropriate to represent the attack steps, thus, enhancing the structural-based alert correlation model. A two-tier feature selection method is proposed to obtain the significant features. The first tier aims at ranking the subset of features based on high information gain entropy in decreasing order. The‏ second tier extends additional features with a better discriminative ability than the initially ranked features. Performance analysis results show the significance of the selected features in terms of the clustering accuracy using 2000 DARPA intrusion detection scenario-specific dataset.
    Matched MeSH terms: Information Storage and Retrieval
  19. Shekhawat KS, Chauhan A
    Indian J Dent Res, 2019 3 23;30(1):125-126.
    PMID: 30900670 DOI: 10.4103/ijdr.IJDR_27_17
    Counting citations have been the usual norm to determine the impact of any research and/or scholar. However, with majority of the scholarly activities happening on the World Wide Web, traditional counting of citations is now being termed "slower." The recent explosion of online data storage for many articles may serve as a pool which uses social media sites to navigate. Altmetrics has been proposed as the new entity which aims to change the focus of the scholarly reward system to value and encourage web-native scholarship. This paper makes an attempt to understand altmetrics.
    Matched MeSH terms: Information Storage and Retrieval
  20. Ghazizadeh E, Zamani M, Ab Manan JL, Alizadeh M
    ScientificWorldJournal, 2014;2014:260187.
    PMID: 24701149 DOI: 10.1155/2014/260187
    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
    Matched MeSH terms: Information Storage and Retrieval/standards; Information Storage and Retrieval/trends
Filters
Contact Us

Please provide feedback to Administrator (tengcl@gmail.com)

External Links