Displaying publications 1 - 20 of 278 in total

Abstract:
Sort:
  1. Awang Bulgiba AM, Rohani K, Rasiah RI, Esmadi A, Norazlin AM, Nor Mila MS, et al.
    JUMMEC, 2000;5:93-97.
    In early 2001, Nadi IT (the IT department of the UMMC) migrated the UMMC leased line from its old 64 kbps line 10 the 34 Mbps University of Malaya leased line. The migration was a new leuning experience for Nadi IT and many lessons were learnt along the way. This paper describes the ideOll behind the migration process, the reason (or the migration, problems and solutions 10 aU these problems as well as the benefits derived from the migration. The experience of this process m~y be useful to others wishing 10 improve IT facilities without resorting to expensive solutions. KEYWORDS: Internet, leased line, migration
    Matched MeSH terms: Internet
  2. Al-Shargabi MA, Shaikh A, Ismail AS
    PLoS One, 2016;11(9):e0161873.
    PMID: 27583557 DOI: 10.1371/journal.pone.0161873
    Optical burst switching (OBS) networks have been attracting much consideration as a promising approach to build the next generation optical Internet. A solution for enhancing the Quality of Service (QoS) for high priority real time traffic over OBS with the fairness among the traffic types is absent in current OBS' QoS schemes. In this paper we present a novel Real Time Quality of Service with Fairness Ratio (RT-QoSFR) scheme that can adapt the burst assembly parameters according to the traffic QoS needs in order to enhance the real time traffic QoS requirements and to ensure the fairness for other traffic. The results show that RT-QoSFR scheme is able to fulfill the real time traffic requirements (end to end delay, and loss rate) ensuring the fairness for other traffics under various conditions such as the type of real time traffic and traffic load. RT-QoSFR can guarantee that the delay of the real time traffic packets does not exceed the maximum packets transfer delay value. Furthermore, it can reduce the real time traffic packets loss, at the same time guarantee the fairness for non real time traffic packets by determining the ratio of real time traffic inside the burst to be 50-60%, 30-40%, and 10-20% for high, normal, and low traffic loads respectively.
    Matched MeSH terms: Internet*
  3. Hassan MM, Tan IKT, Yap TTV
    Data Brief, 2019 Dec;27:104736.
    PMID: 31788509 DOI: 10.1016/j.dib.2019.104736
    The Internet Engineering Task Force provides a network-based mobility management solution to execute handover in heterogeneous networks on network-side called Proxy Mobile IPv6 (PMIPv6). In this data article, data are presented during the horizontal and vertical handover on video communication in PMIPv6 mobility protocols. The handover data are gathered using several measurement factors, which are latency, jitter, cumulative measured, and peak signal noise ratio under network simulation software, for both horizontal and vertical handovers [8].
    Matched MeSH terms: Internet
  4. Amini A, Saboohi H, Wah TY, Herawan T
    ScientificWorldJournal, 2014;2014:926020.
    PMID: 25110753 DOI: 10.1155/2014/926020
    Data streams are continuously generated over time from Internet of Things (IoT) devices. The faster all of this data is analyzed, its hidden trends and patterns discovered, and new strategies created, the faster action can be taken, creating greater value for organizations. Density-based method is a prominent class in clustering data streams. It has the ability to detect arbitrary shape clusters, to handle outlier, and it does not need the number of clusters in advance. Therefore, density-based clustering algorithm is a proper choice for clustering IoT streams. Recently, several density-based algorithms have been proposed for clustering data streams. However, density-based clustering in limited time is still a challenging issue. In this paper, we propose a density-based clustering algorithm for IoT streams. The method has fast processing time to be applicable in real-time application of IoT devices. Experimental results show that the proposed approach obtains high quality results with low computation time on real and synthetic datasets.
    Matched MeSH terms: Internet*
  5. Nematzadeh H, Motameni H, Mohamad R, Nematzadeh Z
    ScientificWorldJournal, 2014;2014:847930.
    PMID: 25110748 DOI: 10.1155/2014/847930
    Workflow-based web service compositions (WB-WSCs) is one of the main composition categories in service oriented architecture (SOA). Eflow, polymorphic process model (PPM), and business process execution language (BPEL) are the main techniques of the category of WB-WSCs. Due to maturity of web services, measuring the quality of composite web services being developed by different techniques becomes one of the most important challenges in today's web environments. Business should try to provide good quality regarding the customers' requirements to a composed web service. Thus, quality of service (QoS) which refers to nonfunctional parameters is important to be measured since the quality degree of a certain web service composition could be achieved. This paper tried to find a deterministic analytical method for dependability and performance measurement using Colored Petri net (CPN) with explicit routing constructs and application of theory of probability. A computer tool called WSET was also developed for modeling and supporting QoS measurement through simulation.
    Matched MeSH terms: Internet/standards*
  6. Lai MH, Maniam T, Chan LF, Ravindran AV
    J Med Internet Res, 2014;16(1):e30.
    PMID: 24472876 DOI: 10.2196/jmir.2973
    Suicide is a serious and increasing problem worldwide. The emergence of the digital world has had a tremendous impact on people's lives, both negative and positive, including an impact on suicidal behaviors.
    Matched MeSH terms: Internet*
  7. Cheong WH, Tan YC, Yap SJ, Ng KP
    Bioinformatics, 2015 Nov 15;31(22):3685-7.
    PMID: 26227146 DOI: 10.1093/bioinformatics/btv433
    : We present ClicO Free Service, an online web-service based on Circos, which provides a user-friendly, interactive web-based interface with configurable features to generate Circos circular plots.
    Matched MeSH terms: Internet*
  8. Tan CH, Teh YW
    J Med Syst, 2013 Aug;37(4):9950.
    PMID: 23709190 DOI: 10.1007/s10916-013-9950-7
    The main obstacles in mass adoption of cloud computing for database operations in healthcare organization are the data security and privacy issues. In this paper, it is shown that IT services particularly in hardware performance evaluation in virtual machine can be accomplished effectively without IT personnel gaining access to actual data for diagnostic and remediation purposes. The proposed mechanisms utilized the hypothetical data from TPC-H benchmark, to achieve 2 objectives. First, the underlying hardware performance and consistency is monitored via a control system, which is constructed using TPC-H queries. Second, the mechanism to construct stress-testing scenario is envisaged in the host, using a single or combination of TPC-H queries, so that the resource threshold point can be verified, if the virtual machine is still capable of serving critical transactions at this constraining juncture. This threshold point uses server run queue size as input parameter, and it serves 2 purposes: It provides the boundary threshold to the control system, so that periodic learning of the synthetic data sets for performance evaluation does not reach the host's constraint level. Secondly, when the host undergoes hardware change, stress-testing scenarios are simulated in the host by loading up to this resource threshold level, for subsequent response time verification from real and critical transactions.
    Matched MeSH terms: Internet*
  9. Kohl SE, Van Tilburg C, Flaherty GT
    J Travel Med, 2019 Jan 01;26(1).
    PMID: 30535106 DOI: 10.1093/jtm/tay145
    Matched MeSH terms: Internet*
  10. Mohamed Shakeel P, Baskar S, Sarma Dhulipala VR, Mishra S, Jaber MM
    J Med Syst, 2018 Aug 31;42(10):186.
    PMID: 30171378 DOI: 10.1007/s10916-018-1045-z
    In the recent past, Internet of Things (IoT) plays a significant role in different applications such as health care, industrial sector, defense and research etc.… It provides effective framework in maintaining the security, privacy and reliability of the information in internet environment. Among various applications as mentioned health care place a major role, because security, privacy and reliability of the medical information is maintained in an effective way. Even though, IoT provides the effective protocols for maintaining the information, several intermediate attacks and intruders trying to access the health information which in turn reduce the privacy, security and reliability of the entire health care system in internet environment. As a result and to solve the issues, in this research Learning based Deep-Q-Networks has been introduced for reducing the malware attacks while managing the health information. This method examines the medical information in different layers according to the Q-learning concept which helps to minimize the intermediate attacks with less complexity. The efficiency of the system has been evaluated with the help of experimental results and discussions.
    Matched MeSH terms: Internet*
  11. Al-Ani A, Anbar M, Laghari SA, Al-Ani AK
    PLoS One, 2020;15(5):e0232574.
    PMID: 32392261 DOI: 10.1371/journal.pone.0232574
    OpenFlow makes a network highly flexible and fast-evolving by separating control and data planes. The control plane thus becomes responsive to changes in topology and load balancing requirements. OpenFlow also offers a new approach to handle security threats accurately and responsively. Therefore, it is used as an innovative firewall that acts as a first-hop security to protect networks against malicious users. However, the firewall provided by OpenFlow suffers from Internet protocol version 6 (IPv6) fragmentation, which can be used to bypass the OpenFlow firewall. The OpenFlow firewall cannot identify the message payload unless the switch implements IPv6 fragment reassembly. This study tests the IPv6 fragmented packets that can evade the OpenFlow firewall, and proposes a new mechanism to guard against attacks carried out by malicious users to exploit IPv6 fragmentation loophole in OpenFlow networks. The proposed mechanism is evaluated in a simulated environment by using six scenarios, and results exhibit that the proposed mechanism effectively fixes the loophole and successfully prevents the abuse of IPv6 fragmentation in OpenFlow networks.
    Matched MeSH terms: Internet*
  12. Hafeez S, Arshad NI, Rahim LBAB, Shabbir MF, Iqbal J
    PLoS One, 2020;15(5):e0233278.
    PMID: 32437383 DOI: 10.1371/journal.pone.0233278
    The innovation of a particular company benefits the whole industry when innovation technology transfers to others. Similarly, the development and innovation in internet companies influence the development and innovation of the industry. This investigation has applied a unique approach of meta-frontier analysis to estimate and analyze the innovation in internet companies in China. A unique dataset of Chinese internet companies from 2000 to 2017 has been utilized to estimate and compare the innovation over the period of study. The change in technology gap ratio (TGR) and a shift in production function have translated into innovation which was overlooked by previous studies. It is found that the production function of internet companies is moving upward in the presence of external factors such as smartphones invention, mobile internet, mobile payments, and artificial intelligence, etc. Consequently, a sudden increase in TGR is captured due to the innovation of some companies. Hence, the average TE of the industry falls caused by the increased distance of other companies form industry production function. However, the innovation advantage defused when other companies start imitating and the average TE elevates. A steady increase in the TGR index revealed that the continuous innovation-based growth of some companies lifting the production frontier upward. This provides the opportunity for other companies to imitate and provides continuous growth in the industry. This study provides a novel methodological approach to measure innovation and also provide practical implication by empirical estimation of innovation in Chinese internet companies.
    Matched MeSH terms: Internet/trends*; Internet/statistics & numerical data
  13. Khor HL, Liew SC, Zain JM
    PMID: 26981111 DOI: 10.1155/2016/9583727
    With the advancement of technology in communication network, it facilitated digital medical images transmitted to healthcare professionals via internal network or public network (e.g., Internet), but it also exposes the transmitted digital medical images to the security threats, such as images tampering or inserting false data in the images, which may cause an inaccurate diagnosis and treatment. Medical image distortion is not to be tolerated for diagnosis purposes; thus a digital watermarking on medical image is introduced. So far most of the watermarking research has been done on single frame medical image which is impractical in the real environment. In this paper, a digital watermarking on multiframes medical images is proposed. In order to speed up multiframes watermarking processing time, a parallel watermarking processing on medical images processing by utilizing multicores technology is introduced. An experiment result has shown that elapsed time on parallel watermarking processing is much shorter than sequential watermarking processing.
    Matched MeSH terms: Internet
  14. Badshah G, Liew SC, Zain JM, Ali M
    J Med Imaging (Bellingham), 2016 Jan;3(1):017001.
    PMID: 26839914 DOI: 10.1117/1.JMI.3.1.017001
    The open accessibility of Internet-based medical images in teleradialogy face security threats due to the nonsecured communication media. This paper discusses the spatial domain watermarking of ultrasound medical images for content authentication, tamper detection, and lossless recovery. For this purpose, the image is divided into two main parts, the region of interest (ROI) and region of noninterest (RONI). The defined ROI and its hash value are combined as watermark, lossless compressed, and embedded into the RONI part of images at pixel's least significant bits (LSBs). The watermark lossless compression and embedding at pixel's LSBs preserve image diagnostic and perceptual qualities. Different lossless compression techniques including Lempel-Ziv-Welch (LZW) were tested for watermark compression. The performances of these techniques were compared based on more bit reduction and compression ratio. LZW was found better than others and used in tamper detection and recovery watermarking of medical images (TDARWMI) scheme development to be used for ROI authentication, tamper detection, localization, and lossless recovery. TDARWMI performance was compared and found to be better than other watermarking schemes.
    Matched MeSH terms: Internet
  15. Habibi N, Samian MR, Hashim SZ, Norouzi A
    Protein Expr. Purif., 2014 Mar;95:92-5.
    PMID: 24333540 DOI: 10.1016/j.pep.2013.11.014
    Recombinant protein production is a significant biotechnological process as it allows researchers to produce a specific protein in desired quantities. Escherichia coli (E. coli) is the most popular heterologous expression host for the production of recombinant proteins due to its advantages such as low cost, high-productivity, well-characterized genetics, simple growth requirements and rapid growth. There are a number of factors that influence the expression level of a recombinant protein in E. coli which are the gene to be expressed, the expression vector, the expression host, and the culture condition. The major motivation to develop our database, EcoliOverExpressionDB, is to provide a means for researchers to quickly locate key factors in the overexpression of certain proteins. Such information would be a useful guide for the overexpression of similar proteins in E. coli. To the best of the present researchers' knowledge, in general and specifically in E. coli, EcoliOverExpressionDB is the first database of recombinant protein expression experiments which gathers the influential parameters on protein overexpression and the results in one place.
    Matched MeSH terms: Internet
  16. Rada EC, Ragazzi M, Fedrizzi P
    Waste Manag, 2013 Apr;33(4):785-92.
    PMID: 23402896 DOI: 10.1016/j.wasman.2013.01.002
    Municipal solid waste management is a multidisciplinary activity that includes generation, source separation, storage, collection, transfer and transport, processing and recovery, and, last but not least, disposal. The optimization of waste collection, through source separation, is compulsory where a landfill based management must be overcome. In this paper, a few aspects related to the implementation of a Web-GIS based system are analyzed. This approach is critically analyzed referring to the experience of two Italian case studies and two additional extra-European case studies. The first case is one of the best examples of selective collection optimization in Italy. The obtained efficiency is very high: 80% of waste is source separated for recycling purposes. In the second reference case, the local administration is going to be faced with the optimization of waste collection through Web-GIS oriented technologies for the first time. The starting scenario is far from an optimized management of municipal solid waste. The last two case studies concern pilot experiences in China and Malaysia. Each step of the Web-GIS oriented strategy is comparatively discussed referring to typical scenarios of developed and transient economies. The main result is that transient economies are ready to move toward Web oriented tools for MSW management, but this opportunity is not yet well exploited in the sector.
    Matched MeSH terms: Internet
  17. Asmalia Che Ahmad, Normazlina Mohamed Zi, Ismail Bahari, Azizah Jaafar
    MyJurnal
    Safety Intervention Need Analysis System (SINAS) is a web-based safety management program that aspires the identification for the need of construction safety intervention. It can be accessed through the website www.sinas.org. This first phase of SINAS project development only focus on safe design intervention. SINAS was created to provide assistance for safety practitioners in identifying the need of safe design intervention. This was put forward through the investigations of construction accidents that relate to design. The SINAS process of need analysis are carved up to six steps i.e. user information, accident details, accident evaluation, result of the need analysis, construction design intervention and safety intervention need analysis report. At the end of the process, Safety Intervention Need Analysis Report will be generated. This report is an essential document to proof the need of safe design intervention. Additionally, SINAS also offers recommendations for construction designers and professionals on suitable safe design intervention to prevent construction accidents and minimises construction risks.
    Matched MeSH terms: Internet
  18. Zulkapli NA, Sobi S, Mohd Zubaidi NA, Abdullah JM
    PMID: 27660539 DOI: 10.21315/mjms2016.23.4.1
    The Malaysian Journal of Medical Sciences (MJMS) has conducted a simple analysis of its scholarly publication, based on the auto-generated data compiled from ScholarOne Manuscripts(™), an innovative, web-based, submission and peer-review workflow solution for scholarly publishers. The performance of the MJMS from 2014-2015 is reported on in this editorial, with a focus on the pattern of manuscript submission, geographical contributors and the acceptance-rejection rate. The total number of manuscript submissions has increased from 264 in 2014, to 272 in 2015. Malaysians are the main contributors to the MJMS. The total number of manuscript rejections following the review process was 79 (29.9%) in 2014, increasing to 92 (33.8%) the following year, in accordance with the exacting quality control criteria applied by the journal's editor to the submitted manuscripts.
    Matched MeSH terms: Internet
  19. Din IU, Kim BS, Hassan S, Guizani M, Atiquzzaman M, Rodrigues JJPC
    Sensors (Basel), 2018 Nov 15;18(11).
    PMID: 30445723 DOI: 10.3390/s18113957
    Information Centric Network (ICN) is expected to be the favorable deployable future Internet paradigm. ICN intends to replace the current IP-based model with the name-based content-centric model, as it aims at providing better security, scalability, and content distribution. However, it is a challenging task to conceive how ICN can be linked with the other most emerging paradigm, i.e., Vehicular Ad hoc Network (VANET). In this article, we present an overview of the ICN-based VANET approach in line with its contributions and research challenges.In addition, the connectivity issues of vehicular ICN model is presented with some other emerging paradigms, such as Software Defined Network (SDN), Cloud, and Edge computing. Moreover, some ICN-based VANET research opportunities, in terms of security, mobility, routing, naming, caching, and fifth generation (5G) communications, are also covered at the end of the paper.
    Matched MeSH terms: Internet
  20. Awang Bulgiba AM
    JUMMEC, 2000;5:36-40.
    In 1999, the Department of Social and Preventive Medicine set up its website on the Internet (http://ummc.med.uni.edu.my/sps/. Setting up the website was a whole new experience for the author and many new things were learnt along the way. This paper describes how the website was constructed, the problems, and solutions to all these problems. The experience of the author in setting up the SPM website may be useful to others wishing to set up their own department websites. KEYWORDS: Internet, SPM, website, web page
    Matched MeSH terms: Internet
Filters
Contact Us

Please provide feedback to Administrator (tengcl@gmail.com)

External Links