|
ARPN Journal of Engineering and
Applied Sciences
December 2015 | Vol. 10 No. 23 |
|
|
Title: |
Active suspension force control with electro-hydraulic actuator dynamics |
Author (s): |
Musa Mohammed Bello, Adamu Y. Babawuro and Sado Fatai |
Abstract: |
The purpose of vehicle suspension system is to keep-off the vehicle main
body from any road geometrical irregularities thereby improving the
comfort as well as maintaining a good handling stability. This work aim
at designing a double loop PID control of generated force and vehicle
suspension parameters using a four degree of freedom, nonlinear, half
vehicle active suspension system model with hydraulic actuator. The
loops arrangement is made up of an inner hydraulic actuator PID force
control loop and an outer suspension parameters PID control loop.
Simulation study was carried out; comparisons were made between the
nonlinear active PID base suspension systems with a nonlinear passive
system. Results obtained show a better performance improvement in the
active system when compared to the passive system at the expense of cost
and power consuming. |
|
|
Full Text |
|
|
Title: |
Design and development of a compressed air machine using a compressed
air energy storage system |
Author (s): |
M. A. Aziz, Arifuzzaman, Fahmida Shams, M. M. Rashid and Md. Nasir Uddin |
Abstract: |
The world is in an ongoing energy crisis. Fossil fuel reserves are in
critical condition and the environment is being bombarded with all kinds
of pollution. Therefore, it is easy to see why any technology that
brings solutions to these problems is considered to be a bounty. Among
the solutions is compressed air driven machine technology. This solution
does not require any type of fossil fuel and is driven by compressed air
as a fuel source. A general four stroke petrol engine (IC engine)
is converted to a two stroke air compressed machine. The power output is
examined by supplying compressed air from the air compressor. This
method will demonstrate the concept of a green, environmentally-friendly
new engine technology for future generations. The experimental results
show a promising maximum efficiency percentage of 23.60 under 4.5 bar
pressure under a maximum load condition. |
|
|
Full Text |
|
|
Title: |
Fair scheduling algorithm in LTE-Advanced networks |
Author (s): |
Mohammed Abduljawad M. Al-Shibly, Mohamed Hadi Habaebi, Md. Rafiqul
Islam, Jalel Chebil , Alhareth Zyoud, and Mohammed I. M. Alfaqawi |
Abstract: |
The Long Term Evolution Advanced (LTE-Advanced) transmission bandwidth
can be expanded by Carrier Aggregation (CA), where CA technology expands
effective bandwidth supported to User Equipment (UE) by utilizing of
radio resources across multiple carriers. Recently, many studies have
been conducted on the radio resource allocation with CA. However, most
of these studies are based on Proportional Fair (PF) packet scheduling
algorithms. Indeed, these algorithms are not adequate to meet the
requirements for supporting mixture real-time applications; they ignored
channel condition; and finally, they are unable to support real-time
application with delay constraint. Therefore, this paper proposes novel
Packet Scheduling (PS) condition algorithm that attractively enhances
the average system throughput by designing a weighting factor to
modified largest weighted delay first PS algorithm. The novel algorithm
is implemented in a PS module for LTE-Advanced via system level
simulations. The results demonstrate that the effectiveness of enhanced
Modified Largest Weighted Delay First (M-LWDF) algorithm in improving
throughput. |
|
|
Full Text |
|
|
Title: |
Multi-response optimizations for high speed ductile mode machining of
soda lime glass |
Author (s): |
Nasima Bagum, A.K.M. Nurul Amin, Mohamed Konneh and Noor Fathiah |
Abstract: |
Ductile regime end milling of soda lime glass needs consideration from
commercial standpoints as well as in research and development. High
speed machining is capable to obtain ductile mode at an increased
material removal rate and at the same time tool wear rate can be
optimized at higher value of cutting speed. This paper presents a simple
and workable approach to process parameters optimization, to achieve
ductile mode machining of soda lime glass applying high speed using the
experiment design and parameter optimization capabilities of Response
Surface Methodology (RSM). The particular ranges of cutting parameters
were chosen based on initial tests conducted to ensure ductile mode
machining during the experiments. The machining parameters such as
cutting speed, depth of cut, and feed rate were varied from 30000 to
50000 rpm, 20 to 50 5m and from 45 to 75 mm/min (0.45 to 1.25 5m per
tooth) respectively. Based on the experimental results empirical
mathematical models relating the machining parameters to response
parameters, namely, surface roughness, tool wear and tool life, were
first developed. Multi-criteria optimization was conducted applying the
desirability function of RSM based on the developed models, with the aim
of determining the combination of machining parameters that would lead
to optimal settings of responses. The quality criteria considered to
establish optimal parameters were the minimization of surface roughness
(Ra), tool wear (Tw) and maximization of tool life (Tl). Obtained
results demonstrated that optimal combination of the response parameters,
0.78 5m Ra, 107 5m (Tw) and 0.56 min (Tl) were achieved with maximum
desirability 77%, at the lowest depth of cut 20 5m at spindle speed of
approximately 40000 rpm with feed rate of 69 mm/min. |
|
|
Full Text |
|
|
Title: |
A proposed rain attenuation prediction method for free space optical
link based on rain rate statistics |
Author (s): |
Ahmed Basahel, Islam Md.Rafiqul, Mohamad Hadi Habaebi and A. Z. Suriza |
Abstract: |
Free Space Optics technology has gained acceptance in telecommunication
industry mostly in enterprise campus network. However in tropical
regions, rainfall is the dominant factor that degrades the FSO link
performance and its availability. In this paper, a method is proposed to
estimate the total path attenuation due to rain for Free Space Optical
communication links for all percentage of availabilities and any path
length. Path length reduction factor for FSO has been derived using
reduction factors models developed for microwave under measurement in
tropical climate. Regression analysis has been applied and model is
derived using best fit curve. Comparison between derived and measured
reduction factors has been made for validation. Derived reduction factor
seems to have strong agreement with both models which were derived based
on measurements. This method can provide estimation of total path rain
attenuation for FSO for all percentage of time with any path lengths. |
|
|
Full Text |
|
|
Title: |
Development and control of a 3DOF upper-limb robotic device for patients
with paretic limb impairment |
Author (s): |
Sado Fatai, Shahrul N. Sidek, Yusof M. Hazlina, Latif M. Hafiz and Adamu
Y. Babawuro |
Abstract: |
Rehabilitation therapy after stroke is crucial to helping patients
regain as much as possible the use of their pareticlimbs. The major
challenges, however, in conventional post-stroke rehabilitation therapy
is that the therapy is labour-intensive, time demanding, and therefore,
expensive with consequent reduction in the amount of training session
required for optimal therapeutic outcome. In recent times, the use of
robotic devices for rehabilitation training has been widely favoured.
Robot-assisted rehabilitation therapy is cost-effective, fatigue-free,
and has the potential to improve the efficiency of the rehabilitation
process. More so, positive outcome of improved motor control abilities
for patients undergoing robot-assisted therapy have been widely
recorded. This paper presents the development and control of a portable
three degree of freedom (3-DOF) end-effector-type robotic device for
upper-extremity rehabilitation of paretic stroke patients. The device
has three active DOFs consisting of two revolute joints and one prismatic
joint (R-R-P) designed to allow 3-dimensional range of motion (ROM)
exercise for elbow and shoulder rehabilitation. A novel adaptive hybrid
impedance control framework has been developed for the device to allow
safe robot-patient dynamic interaction during planned repetitive range
of motion exercises and to keep track of patients motor recovery based
on an embedded Modified Ashworth Scale assessment criteria. Experimental
results performed, using a healthy subject, to test and evaluate the
ability of the device to track a planned simple flexion/extension range
of motion exercise for the elbow joint showed position and force
tracking accuracy to a maximum root mean square error (RMSE) of 0.024m
and 0.343N respectively which indicate the possibility of use of the
device for real patients. |
|
|
Full Text |
|
|
Title: |
Analytical approximate solutions for the Helmholtz-Duffing oscillator |
Author (s): |
Md. Alal Hosen and M. S. H. Chowdhury |
Abstract: |
In the present paper, a new analytical technique is introduced for
obtaining approximate periodic solutions of Helmholtz-Duffing oscillator.
Modified Harmonic Balance Method (MHBM) is adopted as the solution
method. A classical harmonic balance method does not apply directly for
solving Helmholtz-Duffing oscillator. Generally, a set of difficult
nonlinear algebraic equations is found when MHBM is applied.
Investigating analytically for such kinds of nonlinear algebraic
equations is a tremendously difficult task and cumbersome especially for
large oscillation. In this study, the offered technique eradicates this
aforementioned limitation and avoids numerical complexity. Using
iterative homotopy perturbation method, only two or three iteration
produces desired results even for large oscillation. It is remarkably
important that a second-order approximate solution gives excellent
agreement compared to exact ones. |
|
|
Full Text |
|
|
Title: |
Phased array antenna design for 5G mobile networks |
Author (s): |
Mohamed Hadi Habebi, MohanadJanat and MD. Rafiqul Islam |
Abstract: |
In the next few years, the demands and challenges for the 4G (and its
derivatives ie LTE-A) alternative must be addressed to meet the prime
objectives of the upcoming 5G mobile networks such as increased
capacity, improved data rate, low latency, and better quality of
service. To achieve these objectives, drastic improvements need to be
made in cellular network architecture and the antenna configuration that
is used for this purpose. This paper presents the results of a detailed
survey on the fifth generation (5G) cellular network architecture and
some of the key emerging technologies that are helpful in improving the
architecture and meeting the evasively increasing demand of users. In
this detailed survey, the prime focus is on the 5G cellular network
architecture, massive multiple input multiple output (MIMO) technology,
and millimetre wave beamforming technologies. In this paper, a general
probable 5G cellular network phased array antenna concept is
proposed, which shows that a combination of multiple input multiple output
and the beamforming can be utilized at the same time to overcome the
limitation of either systems. |
|
|
Full Text |
|
|
Title: |
Design of dual band notched ultra wideband antenna using (U-W) shaped
slots |
Author (s): |
Mohammed Shihab Ahmed, Md. Rafiqul Islam, and Sheroz Khan |
Abstract: |
The Ultra-Wideband (UWB) communications have become a hot topic for
researchers. To mitigate the interference with the existing WiMAX (3.3
GHz 3.6 GHz) and WLAN (5.15 GHz 5.825 GHz) systems, a Dual Band-Notched
antenna for Ultra-Wideband applications is proposed. The antenna
consists of rectangular patch, a 50 ? Microstrip line and partial
grounding. By etching a nested inverted U-Shaped and W-Shaped slots in
the radiating patch, band rejection filtering properties for WiMAX and
WLAN were achieved. The simulation results were obtained using
electromagnetic simulation software (CST Microwave Studio). Simulation
results shows that the return loss for the frequency band from 2.87 GHz
to 11.48 GHz is below -10dB, which is considered operational. The
antenna also has band-notched functions in the range from 3.24 GHz to
3.65 GHz and from 5.01 GHz to 6.01 GHz. Thus the interference between
WiMAX, WLAN and Ultra-Wideband can be avoided. |
|
|
Full Text |
|
|
Title: |
Investigation of metamaterial unit cells based on dispersion
characteristics |
Author (s): |
Abdirashid Mohamed Nur, Mimi Aminah Wan Nordin, Md Rafiqul Islam and
Mohamed Hadi Habaebi |
Abstract: |
Metamaterials are artificial effectively-homogenous electromagnetic
structures with properties that are not readily available in nature,
they are periodic structures made up of unit cells. While the field of
metamaterial is receiving much interest, not too many researches have
been done to characterize the metamaterial. A few metamaterial unit
cells are chosen to characterize and investigate the propagation of EM
waves inside the metamaterial, eigen mode solver in Computer Simulation
Technology Microwave studio (CST MWS) has been used to derive the
dispersion diagram. We found that some unit cells produce pure left-hand
(LH) propagation while the others produced composite right/left-handed (CRLH)
propagation. It is also proposed for the unit cells that can be used for
wireless applications. |
|
|
Full Text |
|
|
Title: |
Performance evaluation of drilling tools during machining plain carbon
fiber reinforced polymer (CFRP) |
Author (s): |
Mohamed Konneh and Mohamad Hamzi Zaini |
Abstract: |
The demand of CFRP have been arises because of their capabilities and
high strength to weight ratio properties. It has been remarkably used in
most field nowadays as an example in aerospace industries as it provide
weight reduction and reduce the fuel consumption at the same time.
However, the inherent anisotropy, inhomogeneous properties of CFRP and
low bonding strength within the laminates make machining of these
composite materials results in several undesirable effects such as
delamination, burr and chipping. This experimental study was conducted
on drilling CFRP using 3mm-diameter ball nose Diamond coated, Titanium
Aluminum Nitride (TiAlN) coated and uncoated tool. Relationship between
the machining variables and the output variables is analyze and the tool
that performs better were selected so that the experiments can be
continue to prove the findings. It was observed that minimal
delamination at entry and exit is achieved when using TIAlN at high
spindle speed and feed. |
|
|
Full Text |
|
|
Title: |
Upgrading of small sewage treatment plants for ammonia removal- case of
a University campus |
Author (s): |
Md. Nuruzzaman, Abdullah Al Mamun and Md. Noor Bin Salleh |
Abstract: |
Fourteen small sewage treatment plants (STPs) are constructed to treat the
sewage generated from the International Islamic University Malaysia (IIUM)
Gombak campus. These plants are required to fulfill the effluent Standard
B of the revised environmental quality act of Malaysia. Effluent quality
data of these plants was evaluated to check the compliance with the
revised effluent quality standards set by the Department of Environment
(DOE), Malaysia. Secondary data (monthly) of the STPs was analyzed for
this study. Performance of the STPs were evaluated in terms of
ammoniacal nitrogen (AN) and biochemical oxygen demand (BOD). The
statistical analyses of the data revealed that the median effluent
concentration of AN from all the plants usually fails to meet the
allowable concentration of 20 mg/L set for Standard B. However, all of
the plants are able to meet the BOD standard of 50 mg/L. This study
recommends additional aeration for extended time to reduce AN
concentration from the effluents of the existing plants. Another
alternate solution is to construct a centralized treatment plant,
preferably a sequenced batch reactor (SBR), to provide further treatment
of effluent released from the existing small plants, which are unable to
meet the standard set for allowable AN concentration. |
|
|
Full Text |
|
|
Title: |
Parametric study of sputtering microchannels via focused ion beam (FIB) |
Author (s): |
S. F. M. Shahar, I. H. Jaafar and M. Y. Ali |
Abstract: |
Focused ion beams (FIB) are used in microfabrication and have certain
advantages compared to photolithography and other micromachining
technologies. The main advantage is that it can be used for direct
writing/patterning of the target material. FIB can create a variety of
geometric features, has the ability to process without masks, and can
accommodate the patterning of a variety of materials. In high aspect
micromilling, the beam current, beam diameter as well as the dwell time
are some of the parameters that need to be taken into account. In this
research, different beam currents with respective beam diameters were
used to investigate the optimum parameters that can be achieved in
milling microchannels. The target material that was used in this
experiment was Silicon <100>. The wafer used had 250 5m thicknesses. The
results observed were the channel width, gap between the channels, and
the channel depth. The main trend observed was that when the beam
current increases, the depth and the channels width also increase
whereas the channels gap decreases. Defects such as side wall tapering
effect and swelling were noticed from the experiments that used the
unsuitable parameters because the values of beam current are not enough
to sputter the silicon surface. The best beam current use that give the
nearest result to the actual pattern is around 7.0-8.0 pA. Extended
research need to be conducted to see the effect on the surface roughness
of the channels. |
|
|
Full Text |
|
|
Title: |
Application of LQR control technique
to offshore jacket platform
subjected to earthquake |
Author (s): |
Abbas Ahmed Syed Khaja and Deepak Kumar |
Abstract: |
Offshore structures are different than onshore structures in several
sense. Very importantly they differ in Natural frequency and Mass
distribution. Natural frequency of onshore structures is much higher
than offshore structures. Generally, onshore structures have distributed
mass, while offshore structure has the mass concentrated on the top of
the platform. Such offshore structures are prone to extreme
environmental conditions. Under extreme environmental conditions,
offshore structures are vulnerable to damages because of higher
response. Structural workability conditions get affected due to damage.
Hence the vibratory behaviour needs to be tackled with available damping
techniques. Among the available techniques Semi-active control insures
that structure should not exceed the response limit for a wider
frequency range. This can be achieved by properly modeling the control
parameters. Efficiently chosen parameter guaranties the minimization of
responses for all types of environmental forces. In this study a 50 mts
offshore structure is considered. Linear control of the structure has
been modeled for the earthquake force. The structure is subjected to
El-Centro earthquake force. The response of the structure was well
controlled by the Linear Quadratic Regulator (LQR) Methodology. |
|
|
Full Text |
|
|
Title: |
Survey on energy harvesting cognitive radio network |
Author (s): |
Mohammed I. M. Alfaqawi, Mohamed Hadi Habaebi, Mohammad Umar Siddiqi,
Md. Rafiqul Islam, Alhareth Zyoud and Mohammed Al-Shibly |
Abstract: |
Energy harvesting network (EHN) is a trending topic among the recent
researches. This substantial attention is due to the limitations,
operational cost and risks of the conventional power suppliers, such as
fossil fuel and batteries. Moreover, EHN are expected to enhance energy
efficiency by harvesting energy of RF and renewable sources. In
contemporary research works, EHN is applied to CR technology. This
energy harvesting cognitive radio network (EH-CRN) is expected to
utilize both energy and electromagnetic spectrum efficiently. However,
EH-CRN is facing enormous challenges related to technical design. Some
of these challenges are reviewed in recent surveys. However, other
challenges such as optimizing the network throughput and EH-CRN
implementation models were not the focus of these researches. Therefore,
the aim of this survey is to review EH-CRN research works by focusing
the survey perspective on maximizing the network throughput and the
implementation models. |
|
|
Full Text |
|
|
Title: |
Development of an angle sensor using optical polarizer |
Author (s): |
Masud Rana, M. A. Syraf, M. Razib, T. Saleh and Asan G. A. Muthalif |
Abstract: |
This paper presents an effective technique to measure angle of rotation
using optical polarizer. In this case combination of single wavelength
partially polarised laser beam and a linear polarizer are used for the
rotational angle measurement. The power of the transmitted partially
polarized light was found varied according to the angle variation of the
polarizer. This concept can be used to sense the angle of rotation. High
and low measurement of the transmitted power was obtained at 90:
interval for the entire range of angle 1800. To ensure the precision,
accuracy and reliability of the sensor, the experiments were repeated
and error percentage was captured in accordance of predicted model. From
all experimental investigations, it has been concluded that varying the
output power according to the polarizer s angle rotation could be an
indicator to an angle successfully. The experiment was conducted using
polarized laser source, iris, attenuator, polarizer and a photo detector
to measure the transmitted polarized power coming through a polarizer.
The major advantages of this type of angle sensor are its compact size,
cost effectiveness, passive type without extra circuit, no effect of
electromagnetic noise and flexibility in using at long distance. |
|
|
Full Text |
|
|
Title: |
Development of a quality check station in a pharmaceutical industry to
achieve zero defect production using PDCA cycle |
Author (s): |
K. S. Mahmud, M. N. A. Nasry, I. Hilmy and M. D. Yusof |
Abstract: |
This paper reports the result of a research in a pharmaceutical industry
in Malaysia. The data have been collected and analyzed because of the
some issues occurred in company X. There is need of adding a check
station in the company. Moreover, the issues on the health of human eyes
sight that required to be considered during quality check. In order to
avoid the rejection of capsule, the quality check station is
developed. The inspection table and the standard light intensity on the
inspection table must be taken into account for better capsule
production result. This also directly affects the health of human eyes
and should be considered. The objective of this research is to enhance
the production and avoid the rejection parts. There is one strategy for
the continuously improvement. The lean manufacturing approach has been
carried out in problem solving using the PDCA technique. The finding
reveals that application of lean manufacturing using PDCA helps in
solving the problem in the process. Thus, the inspection table has two
sides of lights. The inspection table has to be equipped with a
reflector in order to achieve the standard light intensity for human
eyes. Consequently, this will reduce rejection of parts and aids in
faster inspection. |
|
|
Full Text |
|
|
Title: |
Energy consideration in pharmaceutical factory layout |
Author (s): |
N. A. Nasry, K. S. Mahmud, I. Hilmy, M. D. Yusof and R. H. Basri |
Abstract: |
This paper focuses on energy consumption in a pharmaceutical industry.
The efficient energy consumption depends on energy layout planning.
Materials handling consideration may save the energy. The wastage of
energy resources leads to wastage of money. The proposed new layout has
been designed for the company X for energy efficiency. The energy
efficiency calculation is based on total weekly energy usage in the
company X. After the research, the work flow analysis can be planned for
ease material handling. The saving of the energy consumption leads in
saving 20% of electricity bills. In the other way, it save money and
environment friendly because energy consumption used is less. |
|
|
Full Text |
|
|
Title: |
Gamma shaped monopole patch antenna for tablet PC |
Author (s): |
Islam Md. Rafiqul, Mohammad Shawkat Habib and Khaizuran Abdullah |
Abstract: |
With the increasing demand of using multiple services in a single
device, instead of using multiple antennas, current trend is to use
single antenna capable of communicating in multiple frequency bands. For
the devices like tablet PC, the need of accommodating the physical
infrastructure through single multiband antenna is greatly useful. For
the multiband operation, a gamma shaped structure is proposed for tablet
PC. Gamma shaped monopole structure is designed and simulated using the
Computer Simulation Technology (CST) Microwave Studio. The Gamma shape
monopole is derived by modification from the original T shaped monopole
and the first three resonant frequencies are found to be well improved
than the T shaped one. The typical frequencies at 789.5 MHz, 988.1 MHz,
2.088 GHz and 2.376 GHz are having peak gain of 2.94 dBi, 2.11 dBi, 5.81
dBi, 4.84 dBi and radiation efficiencies of 95.57 %, 87.32 %, 96.67 %
and 95.36 %, respectively. Compared to the T shaped monopole antenna,
the modified Gamma shaped monopole antenna is performing better for the
first three resonant frequencies in terms of return loss. This work has
achieved to accommodate the multiple frequency bands of GSM750, GSM850,
GSM900, LTE800, LTE2300, PCS-1900 and UMTS. Proposed antenna size is 40
mm x 15 mm that is suitable to fit inside the commercially available
tablet PCs. |
|
|
Full Text |
|
|
Title: |
The Development of Human Biometric Identification using Acceleration
Plethysmogram |
Author (s): |
Khairul Azami Sidek, Nur Izzati Zainal, Siti Nurfarah Ain Mohd Azam and
Nur Azua Liyana Jaafar |
Abstract: |
This study explicates the practicability of using acceleration
plethysmogram (APG) signal in biometric identification. The introduction
of APG signal is initiated from the congenital of photo plethysmogram
(PPG) signal since APG signal has been widely known as the second
derivative of PPG signal. Previous researchers claimed that APG signal
elucidates more information as compared to PPG signal. For this reason,
the robustness and reliability of APG signal as biometric recognition is
demonstrated. A total of 10 subjects obtained from MIMIC II WAFEFORM
Database (MIMIC2WDB) which provides PPG signals with a 125 Hz sampling
frequency are used as test samples. The signals are then differentiated
twice to obtain the APG signals. Then, discriminative features are
extracted from the APG morphology. Finally, these APG samples were
classified using commonly known classification techniques to identify
individuals. Based on the experimentation results, APG signal when using
Multilayer Perceptron gives an identification rate of 98% as compared to
PPG signal of 76% for the same waveform. This outcome suggests the
feasibility and robustness of APG signals as a biometric modality as an
alternative to current techniques. |
|
|
Full Text |
|
|
Title: |
Finding the best feeding point location of patch antenna using HFSS |
Author (s): |
S. E Jasim, M. A. Jusoh, M. H. Mazwir and S. N. S. Mahmud |
Abstract: |
This paper describes about the finding of an optimal location of feeding
location for patch antenna by using Ansoft HFSS software. The dimensions
of patch antenna were calculated based on the three essential
parameters. The operation frequency of patch antenna was designed at 2.4
GHz. The LaAlO3 was chosen as a substrate material for the designed
patch antenna with a dielectric constant of 23.5, and a height of 1.5
mm. The materials were chosen as a perfect conductor for patch and
ground plane with a cut off area from a substrate block. The centre of
the patch as well as substrate is located at the origin coordinates of
x-y plane, and the height of substrate at z-direction. The objective of
this paper is to find the best feed point location, which achieves the
highest performance for the designed antenna. The best feed point is
located at (Xm, Yn) from the origin. The simulation was done for all
feed point locations. The return loss was calculated, and it has the
highest value of return loss at a constant y-axis point along the length
of patch antenna. The results demonstrated that the use of such a design
will achieve high directivity, gain, efficiency, and performance. |
|
|
Full Text |
|
|
Title: |
Exponential-based spiral dynamic algorithm for modeling of a flexible
manipulator system |
Author (s): |
Nasir, A. N. K., Ismail, R.M.T.R., Ahmad M. A. and Tokhi. M. O. |
Abstract: |
This paper presents an exponential-based spiral dynamic algorithm (SDA)
as an improved version of the original SDA. A simple structure with a
unique feature of a spiral model in SDA leads the algorithm achieving
fast convergence speed and short computation time. However, adopting a
constant radius and a constant angle into the spiral model of SDA causes
the algorithm to trap into local optima solution. To overcome the
problem, both radius and angle of the spiral model is adaptively varied
throughout the search process. It can be done by incorporating an
exponential-based radius and an exponential-based angle into the spiral
model of SDA. The algorithm is applied to solved dynamic modeling
problem of a single-link flexible manipulator system. Results of the
dynamic model show the proposed algorithm and the original SDA estimate
adequate model and capture good dynamic behaviour of the system.
However, the proposed algorithm acquires better model for the system
compared to its predecessor algorithm. |
|
|
Full Text |
|
|
Title: |
Evaluation algorithm- based on PID controller design for the unstable
systems |
Author (s): |
Erliza Binti Serri, Wan Ismail Ibrahim and Mohd Riduwan Ghazali |
Abstract: |
PID controller consists of proportional, integral and derivatives
controllers and it's widely used in industrial control system to provide
optimal and excellent performance for any system. In term of
controlling, unstable system exist when the system doesn’t reach a
steady-state value and will instead head towards infinity. This may
cause damage to the system and might bid danger in certain systems.
Evaluation algorithm develop to tune the PID controller for a better
performance. In this project, the evaluating PSO algorithm based on PID
controller design for unstable system was proposed. Particle Swarm
Optimization (PSO) is computation method by simulation of swarms
behaviour in performing their tasks. In the implementation of PSO in the
PID controller, the swarm will travel to search the best value of
parameter Kp, Ki and Kd. In this project, the stability impact of
implementation of PSO in PID controller is being investigate. This
implementation offers the stability effects to the unstable system by
reducing the error and provides better performance of the system. |
|
|
Full Text |
|
|
Title: |
Development of a gate drive with overcurrent protection circuit using
IR2110 for fast switching half-bridge converter |
Author (s): |
R. Baharom, K. S. Muhammad, M. N. Seroji and M. K. M. Salleh |
Abstract: |
This paper presents a gate drive with overcurrent protection circuit
using IR2110 for MOSFETs and IGBTs, which have fast switching capability
and simple control scheme. The proposed gate drive circuit is able to
achieve fast switching thanks to high speed operation devices with lower
reverse recovery time. Apart of fast switching operation capability, an
overcurrent protection circuit is also implemented for the power
switches, hence ensuring reliability and high robustness of the proposed
circuit. This paper also evaluates a dead-time circuit that is used to
prevent commutation problem during high side and low side switches
transitions. The advantages of the proposed gate drive circuit are; it
is capable to drive two power switches using a single driver circuit,
while providing an isolation between high side and low side power
switches. A test prototype circuits for a single-phase half-bridge DC to
AC converter with the proposed gate drive circuit was developed to
investigate its operation and behaviour. Experimental results are shown
to verify the effectiveness of the proposed circuit. |
|
|
Full Text |
|
|
Title: |
Development of a portable solar-powered traffic light control system for
a remote single lane bridge |
Author (s): |
M. A. M. Azau, S. Jaafar and M. Y. Saedon |
Abstract: |
The uncertainties of terrain in some rural area in Malaysia makes the
building of a bridge a real challenge. When the construction of a bridge
is built over railways, space is a matter of concern. This paper
proposed a stand-alone traffic light solution for the drivers and
motorist in Kampung Batang Benar, Negeri Sembilan who need to cross the
railways via a single lane bridge. The single lane bridge can only
accommodate one vehicle at one time and motorists have to wait for their
turn to cross to the other end. Having a single lane bridge with no
traffic light to control the traffic definitely contributes to
congestion. On a peak hour, cars and motorcycles start to queue and
there is no ruling on which end should go first. It will be a costly and
not reliable approach to station a traffic controller personnel at such
a place. This project develops a portable stand-alone traffic light
which uses Arduino microcontroller and Xbee wireless communication
system. Since the system is using a wireless communication and portable,
its usage can be extended to any remote road in the rural area to assist
the traffic flow. The system is also equipped with solar photovoltaic
and a battery bank to ensure the operation is continuous even during the
night. The implementation of this system is perceived to put the traffic
under control with minimal assistance from human operator. |
|
|
Full Text |
|
|
Title: |
GUI based energy saving controller for lighting and air-conditioning
application in lecture hall via power line communication module |
Author (s): |
N. Md. Saad, A. F. Omar, M. F. Abas and M. N. Akla |
Abstract: |
This paper presents a system that can control electricity for lighting
and air-conditioning using power line communication (PLC) module. The
control system is developed based on a case study done in UMP lecture
hall. The case study has shown that numerous air-conditioner and
lighting have been left on without any occupant. Thus, better control
strategies are needed to reduce energy wastage. This paper will
concentrate on development of Graphical User Interface (GUI) based
energy saving controller and analysis of PLC module’s performance for
the system. Conceptually, the PLC module is used for communication
between GUI to the controller. The GUI-based electricity control system
is programmed as a zero-crossing switching device for the lighting and
air-conditioning system. Once the GUI is connected to the PLC module
over existing power cables, the GUI is able to activate and deactivate
the lighting and air-conditioning remotely. It is expected that by using
this software, the users can simply control the lighting and
air-conditioning manually or remotely via computer. The performance of
PLC is reliably enough to transfer the data with high accuracy. The
system has been built and tested at wiring bay and will be install in
UMP lecture room for further analysis in energy saving application in
UMP lecture room. For market potential, the control system can also be
used in domestics, industrial and office building. |
|
|
Full Text |
|
|
Title: |
Enhanced face recognition method performance on android vs. windows
platform |
Author (s): |
Mohammed Hayyan Alsiba, Hadi Bin Manap and Abdul Adam Bin Abdullah |
Abstract: |
Android is becoming one of the most popular operating systems on
smartphones, tablet computers and similar mobile devices. With the quick
development in mobile device specifications, it is worthy to think about
mobile devices as current or - at least - near future replacement of
personal computers. This paper presents an enhanced face recognition
method. The method is tested on two different platforms using Windows
and Android operating systems. This is done to evaluate the method and
to compare the platforms. The platforms are compared according to two
factors: development simplicity and performance. The target is
evaluating the possibility of replacing personal computers using Windows
operating system by mobile devices using Android operating system. Face
recognition has been chosen because of the relatively high computing
cost of image processing and pattern recognition applications comparing
with other applications. The experiment results show acceptable
performance of the method on Android platform. |
|
|
Full Text |
|
|
Title: |
Price predictive analysis mechanism utilizing grey wolf optimizer-least
squares support vector machines |
Author (s): |
Zuriani Mustaffa and Mohd Herwan Sulaiman |
Abstract: |
A good selection of Least Squares Support Vector Machines (LSSVM)
hyper-parameters' value is crucial in order to obtain a promising
generalization on the unseen data. Any inappropriate value set to the hyper parameters would directly
demote the prediction performance of LSSVM. In this regard, this study
proposes a hybridization of LSSVM with a new Swarm Intelligence (SI) algorithm namely, Grey Wolf
Optimizer (GWO). With such hybridization, the hyper-parameters of
interest are automatically optimized by the GWO. The performance of GWO-LSSVM is realized in
predictive analysis of gold price and measured based on two indices viz.
Mean Absolute Percentage Error (MAPE) and Root Mean Square Error (RMSPE). Findings of the study
suggested that the GWO-LSSVM possess lower prediction error rate as
compared to three comparable algorithms which includes hybridization models of LSSVM and Evolutionary
Computation (EC) algorithms. |
|
|
Full Text |
|
|
Title: |
Implementation of speech recognition home control system using
Arduino |
Author (s): |
Nurul Fadzilah Hasan, Mohd Ruzaimi Mat Rejab and Nurul Hidayah Sapar |
Abstract: |
Electronically control of household activities has long been explored in
various ways. From electronic remote control using infra-red sensors, to
voice-controlled application, we are continuously trying to find a better way to control
electrical and electronic devices to ease our daily life. This paper
presents the development of a low cost remote home control system using speech recognition. The
system focused on controlling fan and lamp wirelessly by applying speech
recognition into the system, with Arduino Uno as the controller. Two different units were
developed: the main control unit which also act as the transmitter and
the receiver unit which controls the fan and lamp. The main control unit accept voice command
from the user and convert it into text by using Easy VR shield. The
signal is then transmitted to the receiver using RF signal. With the use of RF technology, the system
is able to work wirelessly. This system is hoped to be able to help
people to use the electronics devices effectively besides provide improved convenience and
comfort to user especially for elderly and disabled who live alone and
help them to be more independent. |
|
|
Full Text |
|
|
Title: |
Sliding mode control of an X4-AUV |
Author (s): |
Z. M. Zain, N. N. A. Hanipah, M. M. Noh, N. Harun, K. A. A. Rahim and N.
M. Zain |
Abstract: |
This paper presents a design method for attitude control of an
autonomous underwater vehicle(X4-AUV) based sliding mode control. We are
interested in the dynamic modeling of X4-AUV because of it complexity. The dynamic model is used
to design a stable and accurate controller to perform the best tracking
and attitude results. To stabilize the overall systems, each sliding mode controller is designed
based on the Lyapunov stability theory. The advantage of sliding mode
control is it’s not being sensitive to model errors, parametric uncertainties and other
disturbances. Lastly, we show that the control law has a good robust and
good stability through simulation. |
|
|
Full Text |
|
|
Title: |
Development of hexaquad robot: Modeling and framework |
Author (s): |
Addie Irawan, Akhtar Razul Razali, Wan Faizal Wan Ishak, Mohd Rizal
Arshad and Tan Yee Yin |
Abstract: |
This paper presents a proposed reconfigurable multi-legged robot named
Hexapod-to-Quadruped (Hexaquad) robot. Reconfigurable legged robot is
one of the robotics research area that is generally focused on optimizing the usage of leg
during locomotion. Until recent years, most of the researches emphasized
on leg reconfigurable design in order to solve the fault tolerant, stability, multi-tasking
and energy efficiency. However, the emphasis of the Hexaquad robot is on
providing optimum leg usage, actuation configuration as well as satisfying the legged robot
stability criterion in reconfiguration mechanism. Inspired from several
living creatures, such as insects, crustacean and peristaltic creatures, Hexaquad is designed and
modeled to perform flexible spine for leg adjustment and foot-to-gripper
transformation. The design also implements the indirect and parallel actuation configuration
on leg-joint motion for optimum torque on the joint of each leg without
motor/actuator mass affect that commonly happens in multi-limbed system with direct drive
configuration. The minimum torque on each joint of the leg is calculated
using the static torque calculation on multi-link structure before the actuator/motor is
selected, and verification is done by performing fundamental testing on
the leg’s movement and standing using direct switching and supply voltage. Further testing and
analysis were conducted on the gripper by performing gripping tests
using materials of different weight and shape versus total load current on the leg’s
actuators. Stress and displacement testing and analysis were also done
on the foot-to-gripper (FTG) structure of Hexaquad robot. The results show that the FTG is able to
hold 50N forces without any breaking point being detected as well as
able to maintain its shape, strength and position upon receiving the forces (surpassing the main
objective to lift a 5kg load). |
|
|
Full Text |
|
|
Title: |
A complete investigation of using weighted kernel regression for the
case of small sample problem with noise |
Author (s): |
Zuwairie Ibrahim, Mohd Ibrahim Shapiai, Siti Nurzulaikha Satiman, Mohd
Saberi Mohamad and Nurul Wahidah Arshad |
Abstract: |
Weighted kernel regression (WKR) is a kernel-based regression approach
for small sample problems. Previously, for the case of small sample
problems with noise, we have done preliminary studies which investigated different learning
techniques and different learning functions, separately. In this paper,
a complete investigation of using WKR for the case of noisy and small training samples is presented.
Analysis and discussion are provided in detail. |
|
|
Full Text |
|
|
Title: |
Feature-fusion based audio-visual speech recognition using lip geometry
features in noisy environment |
Author (s): |
M. Z. Ibrahim, D. J. Mulvaney and M. F. Abas |
Abstract: |
Humans are often able to compensate for noise degradation and
uncertainty in speech information by augmenting the received audio with
visual information. Such bimodal perception generates a rich combination of information that can be used
in the recognition of speech. However, due to wide variability in the
lip movement involved in articulation, not all speech can be substantially improved by
audio-visual integration. This paper describes a feature-fusion
audio-visual speech recognition (AVSR) system that extracts lip geometry from the mouth region using a
combination of skin color filter, border following and convex hull, and
classification using a Hidden Markov Model. The comparison of the new approach with conventional
audio-only system is made when operating under simulated ambient noise
conditions that affect the spoken phrases. The experimental results demonstrate that, in the
presence of audio noise, the audio-visual approach significantly
improves speech recognition accuracy compared with audio-only approach. |
|
|
Full Text |
|
|
Title: |
A computational method for protein domain prediction by using double
stage neural network |
Author (s): |
U. H. Kalsum, Nazri Mohd Nawi and Shahreen Kasim |
Abstract: |
Protein domains are basic unit of protein structure that can develop its
self by using its own shape and their own function. Protein domain
prediction is important for multiple reasons, which include predicting the protein function in order
to manufacture new protein with new function. However, there are several
issues that need to be addressed in protein domain prediction which the protein domain can
exist in more than one categories of single or multiple domain.
Therefore, this study proposed a computational method to predict protein domain using double stage neural
network in order to handle these issues. The proposed computational
method consists of three phases: dataset generating, profile descriptor for PDP and
classification. The pre-processing phase involves datasets generation,
splitting protein sequence into subsequence, perfume multiple sequence alignment (MSA) and extracting
the MSA. All these process are introduce in order to increase the domain
signal. The profile descriptor for PDP phase used several measures such as entropy,
correlation, protein sequence termination, contact profile, physio-chemical
properties and intron-exon boundaries to generate protein structure information in order to show
clear domain signal. The classification phase involves classification by
double stage neural network (DNN) and performance evaluation. The performance of the
proposed method is evaluated in terms of sensitivity, specificity and
accuracy on single domain and multiple-domain using dataset SCOP 1.75. The results showed that the
proposed method achieved better results compared with single neural
network (SNN) in single domain and multi domain predictions. |
|
|
Full Text |
|
|
Title: |
MLPSO: Multi-leader particle swarm optimization for multi-objective
optimization problems |
Author (s): |
Zuwairie Ibrahim, Kian Sheng Lim, Salinda Buyamin, Siti Nurzulaikha
Satiman, Mohd Helmi Suib, Badaruddin Muhammad, Mohd Riduwan Ghazali,
Mohd Saberi Mohamad and Junzo Watada |
Abstract: |
The particle swarm optimization (PSO) algorithm, which uses the best
experience of an individual and its neighborhood to find the optimum
solution, has proven useful in solving various optimization problems, including multi-objective
optimization (MOO) problems. In MOO problems, existing multi-objective
PSO algorithms use one or two leaders to guide the movement of every particle in a search space.
This study introduces the concept of multiple leaders to guide the
particles in solving MOO problems. In the proposed Multi-Leader PSO (MLPSO) algorithm, the
movement of a particle is determined by all leaders that dominate that
particle. This concept allows for more information sharing between particles. The performance of the
MLPSO is assessed by several benchmark test problems, with their
convergence and diversity values are computed. Solutions with good convergence and diversity prove
the superiority of the proposed algorithm over MOPSOrand algorithm. |
|
|
Full Text |
|
|
Title: |
Fuzzy logic technique for congestion line identification in power system |
Author (s): |
Mohd Ali N.Z and I. Musirin, H. Abdullah and S. I. Suliman |
Abstract: |
Congestion problem is a significant issue in power system due to the
increasing demand in this vicinity. Failure in properly managing the
issue may lead to insecure power delivery to the consumer. Flexible Alternating Current
Transmission (FACTs) can be a possible solution for the compensating
purposes. This requires proper decision making so that proper sizing can be identified which in turns
reducing monetary losses. This paper presents fuzzy logic technique for
congested line identification as a decision tool. A pre-developed line voltage
stability index, termed as fast voltage stability index (FVSI) is chosen
as the incorporating instrument in this study. A sensitivity analysis equation is formulated
termed as Fuzzy Congestion Index (FCI). Validation was conducted using
the IEEE 30-Bus Reliable Test System (RTS). Results from the study revealed that the proposed
technique managed to correctly identify the congested line. FCI was
compared FVSI, indicating that the proposed technique revealed the suitability for identifying the
congested line. This technique is also feasible for further
implementation in larger and practical system. |
|
|
Full Text |
|
|
Title: |
Inverse definite overcurrent relay discrimination algorithm and its
application in industrial power systems |
Author (s): |
Noor Zaihah Jamal, Omar Aliman and Mohd Herwan Sulaiman |
Abstract: |
In a normal electrical network, it is crucial to design a system
complete with protection to prevent any abnormalities or fault
occurrence to disturb the whole source of electrical to be shut down. Only a portion of effected area should be
closed and fault duration at high current value should be closely
monitored. Overcurrent protection device discrimination play vital roles to ensure protective
relay will react accordingly. This paper introduces a systematic
overcurrent discrimination algorithm which is based on standard formulation and constant value by
IEC 60255-4 and IEEE Std C37.112-1996. The proposed algorithm has been
tested to an 11kV industrial power system. Two bus data have been tested and the tests
result of the network was studied, analysed and discussed. The algorithm
has proven successfully fulfilled the discrimination requirement. |
|
|
Full Text |
|
|
Title: |
Ultraviolet plasma for cyanobacteria treatment application |
Author (s): |
Ahmad Nazri Dagang, Nur Izzati Azmanshah and Nor Azman Kasan |
Abstract: |
Plasma has been used widely in health and science application as
deactivator agent. One of the plasma applications in health is in water
treatment. The study was focused on generating ultraviolet (UV) plasma to substitute the method
of chlorination in water treatment due to harmful effect of chlorination
toward living things. UV plasma was successfully generated via Dielectric Barrier Discharge (DBD)
in mercury-free electrodeless discharge tubes filled with non-toxic
element such as argon and nitrogen gases. This is an alternative material as most of
commercially available UV lamp is the one from mercury radiation, and
mercury is known as a toxic material. Other than that, by using DBD as one type of electrodeless
discharge (without internal electrode), the lamp lifetime can be
improved as there is no chemical reaction between the electrodes and filling material as being applied in
conventional type of discharge lamp. The study is conducted to observe
the effectiveness of UV plasma radiation as an agent in deactivating cyanobacteria (Oscillatoria
sp.) in a fresh water ecosystem. The effect of UV radiation on
cyanobacteria (Oscillatoria sp.) was qualitatively observed. The UV plasma that produced need to
meet the effective range of UV radiation which is thought at wavelength
between 200 nm and 400 nm, and has higher intensity in order to help in deactivate the
cyanobacteria (Oscillatoria sp.) effectively. The effect of UV plasma
exposed towards the algae of cyanobacteria (Oscillatoria sp.) is studied morphologically at certain
period of exposure. Experimental results showed that the UV plasma using
mercury-free material give well-higher intensity and affect the most in deactivation of
cyanobacteria (Oscillatoria sp.) compared to mercury-based lamp. |
|
|
Full Text |
|
|
Title: |
Development of touch screen operated electric wheelchair for dwarfism
community |
Author (s): |
Zailini M. A, Gan L. M. and M. F. Abas |
Abstract: |
Current mass production Electric Powered Vehicle (EPW) only caters for
X-axis and Y-axis movement only. A Z-axis EPW available in the market is
used to provide a stand-up position function and does not cater for elevation in a sitting
position. The sitting position elevation function in an EPW is needed
for a dwarfism student to access common table in a classroom. This paper will detail out the
development of a sitting position elevation function EPW which will be
known as ZUMP 4. A development of EPW for the X-axis, Y-axis and Z-axis movement are
modeled through 16 I/O PLC system applications. This ZUMP 4 is
developed for the dwarfism community with body height weakness suitable for in house and outdoor usage. For
this reasoning, a capability of 24V BLDC motor with reduction gear and
in order to support forward, backward, turning right or turning left. For this buggy, AC
Asynchronous Machine (0.5HP) supplied with single phase voltage and ball
screw concepts have been applied to support the elevation function. More specifically, the
application of touch screen as medium concept for an input signal of the
system to move the wheelchair in this multi direction is an added function to provide ease
of maneuvering. The integration and fabrication process of mechanical
system, electrical and control system are done to get the best design that can suit the actual
application for Zull Hanif Abdul Halim, a dwarfism student in UMP. As
far as the author’s knowledge, this type of EPW has not been developed yet. |
|
|
Full Text |
|
|
Title: |
HF-Fuzzy logic based mobile robot navigation: A solution to finite
escape time |
Author (s): |
Hamzah Ahmad and Nur Aqilah Othman |
Abstract: |
This paper deals with H8 Filter (HF)-Fuzzy logic based mobile robot
localization and mapping as an approach to prevent the Finite Escape
Time (FET) problem in HF. The FET problem has been limiting the HF capabilities in estimation for
decades and has been one of the important aspects to be considered to
ensure HF performs well during mobile robot observations. The proposed technique
focuses on the
HF innovation stage by including very few Fuzzy Logic rules, and fuzzy
sets. The design is generally divided into two stages; firstly, the analysis of HF
innovation characteristics and then the implementation of Fuzzy Logic
technique into the system. The analysis also presents the preliminary study on different membership
functions to discover the best possible technique to combine with HF
based mobile robot localization. The simulation results proved that Fuzzy Logic can be used
to avoid the FET from occurred while at the same time improving the
estimation of both mobile robot and landmarks. |
|
|
Full Text |
|
|
Title: |
A new technique for maximum load margin estimation and prediction |
Author (s): |
Nur Fadilah Ab. Aziz, Titik Khawa Abdul Rahman, Zuhaila Mat Yasin and
Zuhaina Zakaria |
Abstract: |
This paper presents the application of Fast Artificial Immune System (FAIS)
for maximum load margin estimation and hybrid Fast Artificial Immune
Support Vector Machine (FAISVM) for maximum load margin prediction. The newly developed
techniques are marked by its significant fast computation time. A new
developed index, Voltage Stability Condition Indicator (VSCI) was used as the fitness function
for FAIS and FAISVM in order to evaluate the stability condition of load
bus in the system. In FAIS, various mechanisms techniques of AIS were investigated and
intensive comparisons were made in order to obtain the best
implementation of AIS for maximum load margin estimation. The mechanisms were investigated and compared on
three main AIS principles; cloning, mutation and selection. In addition,
FAISVM is another new hybrid technique developed for maximum load margin prediction that
integrates the application of FAIS and Support Vector Machine (SVM). For
validation, FAISVM was compared with Evolutionary Support Vector Machine (ESVM) that uses
Evolutionary Programming (EP) as the search algorithm. Based on the
results, it shows that FAISVM outperforms ESVM with a higher accuracy prediction value. |
|
|
Full Text |
|
|
Title: |
Exploration of unknown environment with
Ackerman mobile robot using
robot operating system (ROS) |
Author (s): |
M.S. Hendriyawan Achmad, Nur Afzan Murtdza, Nor Anis Aneza Lokman, Mohd
Razali Daud, Saifudin Razali and Dwi Pebrianti |
Abstract: |
In this paper, authors present a series of work in order to explore
unknown environment consists of path and obstacles with the Ackerman
model of wheeled mobile robot (car-like). Robot operating system (ROS) is used as a basic operation
platform to handle the entire of operation, such as sensor interfacing,
2D/3D mapping, and path planning. ROS is an open source framework and huge constructions consist
of methods. The Ackerman mobile robot is a car-like robot as commonly
sees, and techniques that have been done in this experiment can be applied to the commercial
vehicles as a part of autonomous navigation system which is emerge as
big issue nowadays. In this work, we had composed robust existing methods to solve the mapping
problem with Ackerman mobile robot. It was concluded that the
performance of the proposed work is robust for large mapping within unknown construction building. |
|
|
Full Text |
|
|
Title: |
MOBITOP: Interactions employed by users when using a collocated
Ad-Hoc
collaboration application |
Author (s): |
Ong Beng Liang, Teo Rhun Ming, Noris Mohd Norowi, Evi Indriasari Mansor,
Prasenjit Dey and Izdihar Jamil |
Abstract: |
This paper presents a Collocated Ad-hoc Collaboration (CAC) application
-- the MobiTop system which is a multi-mobile system that allows users
to come together with their mobile devices in an ad-hoc manner, and integrates together as one
seamless display surface with multi-touch capabilities. It has
transformed the society into a more hands-on environment with the innovation of this system. Our
findings show that users tend to settle and compromise when working
collaboratively, for instance setting with an inverted orientation of the screen rather than
dynamically positioning themselves around the MobiTop system.
Consequently, users tend to draw an 'upside-down' object orientated towards other users rather than towards
themselves. Several reasons contributed towards this form of interaction
are such as the complexity of the objects, the bezel on the tablet and group-like
behavior. With this understanding, we believe that MobiTop system can
provide the next step in the evolution of collaboration beyond the expensive tabletops systems for
the society. |
|
|
Full Text |
|
|
Title: |
A proposed framework for standardizing information technology
professional skills and evaluation schema for new IT employees |
Author (s): |
Mohanad Adam, Nor Zairah Ab Rahim and Suraya Miskon |
Abstract: |
Educational and training institutions must restructure themselves to
better prepare the arriving new workforce. Nowadays, hiring the right IT
candidate and assign them to the proper position is becoming more of a challenge to companies &
business owners. One effective tool for restructuring the hiring process
is standardizing IT skills set. This paper will shed some lights on some of the IT skills
evaluation elements. Therefore, related cases have been selected &
studied to determine some the main elements affecting IT skills evaluation. Thus the proposed
framework came to existence. The Impact of an IT skill standardized
framework will create a common base framework for educators, industry, and other stakeholders to develop
jointly the educational and training tools necessary to prepare students
and current workers for today’s workplace challenges as well as those that lie ahead. |
|
|
Full Text |
|
|
Title: |
Research study on enhancing the service quality of interactive health
portals: The cognitive to action theory perspective |
Author (s): |
Saman Foroutani, Noorminshah A. Iahad and Azizah Abdul Rahman |
Abstract: |
Currently, Interactive Health Portals (IHPs) are considered to be
suitable mediums for interaction between patients and physicians. In
fact, as health care organizations apply more effective levels of electronic service quality
(e-SQ), more patients have been using the IHP technology. However,
developing countries are still falling behind developed countries in regards to this technology
trend. Indeed, developing countries should establish a comprehensive
approach to applying e-SQ, which will consequently result in a gradual increase of patients’
attraction, trust and loyalty to the system. Therefore, by utilizing the
relevance of the cognitive, affective, cognitive and action theories as the theoretical models of
loyalty, the researchers have proposed a framework of a research agenda
within the IHP discipline. |
|
|
Full Text |
|
|
Title: |
Risk assessment model for organizational information security |
Author (s): |
Balla Moussa Dioubate, Nurul Nuha Abdul Molok, Shuhaili Talib and Abu
Osman Md. Tap |
Abstract: |
Information security risk assessment (RA) plays an important role in the
organization’s future strategic planning. Generally there are two types
of RA approaches: quantitative RA and qualitative RA. The quantitative RA is an objective
study of the risk that use numerical data. On the other hand, the
qualitative RA is a subjective evaluation based on judgment and experiences which does not
operate on numerical data. It is difficult to conduct a purely
quantitative RA method, because of the difficulty to comprehend numerical data alone without a
subjective explanation. However, the qualitative RA does not necessarily
demand the objectivity of the risks, although it is possible to conduct RA that is purely qualitative
in nature. If implemented in silos, the limitations of both quantitative
and qualitative methods may increase the likelihood of direct and indirect losses of an
organization. This paper suggests a combined RA model from both
quantitative and qualitative RA methods to be used for assessing information security risks. In order to
interpret and apply the model, a prototype of RA for information
security risks will be developed. This prototype will be evaluated by information security risk
management experts from the industry. Feedback from the experts will be
used to improve the proposed RA model. The implementation of an appropriate model ensures a
successful RA method and prevent the organization from the natural and
causal risks that are related to securing information assets. |
|
|
Full Text |
|
|
Title: |
An initial model for telemedicine adoption in developing countries |
Author (s): |
Kayode I. Adenuga, Noorminshah A. Iahad and Suraya Miskon |
Abstract: |
Telemedicine has proven to be a success in some developed countries.
This assumption has been backed by over 12,000 reviewed articles which
have been published during the past 25 years. Unfortunately, despite being a useful and thriving
area of Information Systems research, Telehealth has not been fully
implemented in the developing countries owing to several factors which have militated against it. In
this paper, we adapted to using combinational approaches and guidelines
to provide a systematic way to establish factors affecting telemedicine adoption for health
workers and establish suitable theoretical model for telemedicine
adoption. Although there are a quite number of guidelines for conducting such reviews in other research
fields, few entirely meet the unique needs of Information Systems
research. In response to this shortage of guidelines, we present here the attributes and
significance of telemedicine adoption model in the context of IS domain.
The outcome of the study is expected to establish a suitable theoretical model that will investigate
the obvious barrier affecting telemedicine implementation and provide
recommendation for health care providers. |
|
|
Full Text |
|
|
Title: |
Business process based requirements modeling of radiological trauma
triage capacity planning framework |
Author (s): |
Amy Hamijah binti Ab. Hamid, Mohd Zaidi Abd Rozan, Safaai Deris, Roliana
Ibrahim, Anita Abd. Rahman, Ali Selamat, Wan Saffiey Wan Abdullah and
Muhd Noor Muhd Yunus |
Abstract: |
Prior investigations indicated that Malaysian radiation and nuclear emergency plan stakeholders were not satisfied of having two-quarter of organizational issues in organizing and managing the indicated disaster scenario. Therefore, any organizational enhancement and improvement along the current radiation and nuclear emergency plan will give a positive and immediate impact on the public acceptance of the localized nuclear power program implementations. The policies and procedure issues must not be considered lightly because it may affect public adoption even though the nation has compromised on it for social and economic development. Moreover, any defect in the managerial and organizational structure might be a hindrance to the nuclear safety regulatory assurance. The structure of the respective emergency planning framework had to be tested and validated thoroughly in a structured manner to overcome this problem. This study proposed a hypothesis to build a current regulatory framework through empirical interpretive case study and computer simulation development. The hypothesis of the research framework was found to be useful and significantly accepted as it is interdependent and correlated with statistical measures and supported with the demonstrations of the agent based social simulation prototype. It has the potential to develop a structured and thorough emergency planning framework by interpreting and integrating mixed-method analyses and models through information systems theoretical lenses. Most probably, future works may imply them as strategized, condensed, concise, and comprehensive public disaster preparedness and response guidelines, and to be physically deemed as a useful and effective computer simulation. |
|
|
Full Text |
|
|
Title: |
A measurement model of risk perception in internet banking based on
Malaysian context |
Author (s): |
Normalini Md Kassim and T. Ramayah |
Abstract: |
Internet banking risks continue to intensify as accessibility to banking
transactions around the world expands. Banks in Malaysia are faced with
among the largest number of cyber-threats in the world. Considering these factors, the
understanding of internet banking risks is important to enable banks to
develop appropriate counter-measures. However, studies on internet banking in Malaysia have
not examined risk factors in a comprehensive manner. Therefore, the
purpose of this study was to test a measurement model for perceived risk in Internet banking using
structural equation modeling analysis. This study extends the Technology
Acceptance Model by incorporating seven risk constructs into the model to understand the
impact of risks on intention to use internet banking in Malaysia. The
survey method was used in the study and the data collection instruments were questionnaires, which
were distributed through the drop-off and pick-up (DOPU) technique, to
bank branch managers. The purposive sampling technique was employed to determine the
respondents, individuals using Internet banking services in Peninsular
Malaysia. A total of 413 questionnaires were analyzed using Structural Equation Modeling (SEM)
with the Analysis of Moment Structures (AMOS) software. The results
clearly indicate that perceived risk dimensions are strong determinants of intention to use
internet banking. Furthermore, the seven dimensional measure of
perceived risk is supported by acceptable fit indices. All dimensions showed modest but not high
intercorrelations, as such, a second order measure of risk was ruled
out. The distinctiveness of different risk measures were confirmed by the satisfactory discriminant
validity assessment. This research draws together the key risk factors
that need to be addressed by internet banking providers in Malaysia to ensure effective
adoption and highlights the need to use risk as a multi-dimensional
measure in future internet banking studies. |
|
|
Full Text |
|
|
Title: |
Evaluating the level of knowledge management capability in medical
tourism industry of Malaysia |
Author (s): |
Sajjad Shalikar, NorZairah Ab. Rahim and Sakineh Jafari |
Abstract: |
The aim of this study was to evaluate the current level of knowledge
management capabilities in Medical Tourism industry of Malaysia in
compare with desirable level. The study was descriptive. Statistical population were Malaysian
Healthcare Travel Council (MHTC) center of Malaysia, Medical Tourism
Center of KPJ (Kumpulan Perubatan Johor) and Gleneagles Hospitals. Participants were 200 of managers and
employees who were selected using random sampling method. All of them
have completed the knowledge management capabilities scale. Data were analyzed by SPSS
software and one-sample T-test. The results of the analysis showed that
Knowledge Management Capabilities and its dimensions (Lessons Learned, Expertise and
Knowledge Documents) have been assessed above the acceptable level (Q2)
in the Medical Tourism industry of Malaysia. But they have been evaluated below desirable level (Q3) in
the Malaysian Health Tourism. Finally, the results show that there are
positive and significant relationship between knowledge management capabilities and Lessons
Learned, Expertise and Knowledge Documents. |
|
|
Full Text |
|
|
Title: |
Research topics recommendation system for novice researchers |
Author (s): |
Mohammad Mahbub Alam and Maizatul Akmar Ismail |
Abstract: |
Recently, recommender systems (RSs) are making great stride in academic
arena for researchers. There exist some true potential for recommender
systems to assist novice researchers in instigating their preliminary activities. Providing
personalized recommendation on research topics is of great help for
beginners to enter the area of their research interest. To select a suitable topic is one of the most
common difficulties faced by novice researchers. As a result, in most of
the cases, they ended up with futile endeavor after spending substantial amount of time and
effort. In this paper, we present a model for RS that will recommend
novice researchers a list of active topics in their chosen field of research. Two bibliometric
measures – citation count and yearly publication rate are applied in the
recommendation process. In the core of this proposed model is the usage of these two measures to
identify active and inactive research topics. The ultimate goal of this
study is to assist novice researchers in taking early decision on research topic by recommending
them active research topics. |
|
|
Full Text |
|
|
Title: |
A review of threat modeling and its hybrid approaches to software
security testing |
Author (s): |
Habeeb Omotunde and Rosziati Ibrahim |
Abstract: |
As organizations seek to fulfill their objectives in the 21st century,
they have come to immensely depend on reliable and secure software as a
core component of their organizational asset to achieve their set goals. Irrespective of the
size, nature or sector of these firms, securing the software asset has
gained momentum given major software security issues in the form of incessant cyber-attacks to
sensitive and confidential data which could bring huge losses to both
the organization and her customers. However, a critical approach to defending the organization’s
software infrastructure is anticipating the nature of the exploits from
the attacker’s perspective before they occur and strategizing mitigation plans in order
to prevent these attacks from being successful. This is called Threat
Modeling. The objective of this paper is to identify existing challenges in this research field
and establish the grounds for a credible research activity therefore the
researchers present a review of literatures on threat modelling activities overs the years and
the subsequent hybrids developed to cater for the weaknesses of the
techniques used. It was discovered that software applications suffered from analysis paralysis
due to over-specification of security requirements while using hybrid
threat modeling techniques. Furthermore, we discuss briefly our proposed approach to
using hybrid threat modeling using a set of coherent modeling techniques
in tackling a particular security vulnerability plaguing web applications while avoiding analysis
paralysis. |
|
|
Full Text |
|
|
Title: |
A strategy to develop the computerized framework for
implementation of OBE in University Kuala Lumpur |
Author (s): |
Shamsul Anuar Mokhtar, Zulfadli and Siti Mashitah Shamsul Anuar |
Abstract: |
Implementation of Outcomes Based Education (OBE) on Higher Education is
a requirement by Malaysian Qualification Agency (MQA), one important
aspect of the approach is measurement of learning outcomes attainment which is called Course
Learning Outcomes (CLO) and Program Learning Outcomes (PLO). CLO
measurement is key to analyzing student and course attainment in each semester, further it will be an
essential component to assess and evaluate the attainment of a programme.
Implementation of OBE providing a more complicated way to measure learning outcomes. Since the
curriculum changes to the OBE approach which is required by the
education authorities of Malaysia has made campuses develop an OBE framework. The framework is a
model which is used to assist in a comprehensive implementation of OBE
according to the principles contained in the approach. The framework covers not only
theoretical aspects but also includes aspects of IT, to build a
computerized framework that can be applied, it needs the right strategy which is should be validation by
experts. This paper discuss about authors experiences of implementing
the strategy to be used to develop the computerized framework in order to provide suitable ways for
Higher Education to implement OBE approach. Strategy used involves
several phases and more detailed description, each phase giving a certain contribution to the
development of computerized framework. Explanation equipped with some
figures that are conceptually clearer and easier to understand. |
|
|
Full Text |
|
|
Title: |
A comparative study for risk analysis tools in information security |
Author (s): |
A. Y. Zabawi, R. Ahmad and S. F. Abdul-Latip |
Abstract: |
Identifying potential information security risk is a challenging task.
This is due to the evolution of Information Communication Technology in
daily business which may introduce possible digital threats. Many studies have attempted to
develop risk analysis tools, yet it is unable to produce the best
factors for information security threats. Failure in identifying various types of information security
risks will affect the development of effective countermeasure. It has
been highlighted in many studies that conventional techniques used to analyze risks can be
divided into two categories known as quantitative and qualitative
methods. The limitation of the tools introduced in previous research which provide insufficient
information may consequently contribute to threat in information
security. In addition, the rapid growth of the Internet technology may also increase possible threats to
information security. The main focus of this study is to compare the
risk analysis tools available in the market, identify their method and summarize their
factors. A comparative analysis covers performance of analysis and
security services. The result shows that current information security risk analysis tools introduced
various types of risk factors. None of the tools however can consider
qualitative and quantitative data in parallel. It is believed that qualitative
information could increase the dimension of risk factors and produce
better accuracy in the analysis. Further investigation is highly required to solve the outlined issue.
This paper describes different approaches in several risk analysis
tools, which methods are used in different steps and presents the risk factors identified by previous
selections of studies. |
|
|
Full Text |
|
|
Title: |
Non-linear and linear postulations of technology adoption determinants |
Author (s): |
S. A. Salim, D. Sedera and S. Sawang |
Abstract: |
Using polynomial regression and response surface analysis to examine the
non-linearity between variables, this study demonstrates that better
analytical nuances are required to investigate the relationships between constructs when the
underlying theories suggest non-linearity. By utilising the Theory of
Planned Behaviour (TPB), Ettlie’s adoption stages as well as employing data gathered from 162
owners of Small and Medium-sized Enterprises (SMEs), our findings reveal
that subjective norms and attitude have differing influences upon behavioural intention in both
the evaluation and trial stages of the adoption. |
|
|
Full Text |
|
|
Title: |
A pilot study of using diaries method for collecting spiritual
experiences data among older adults |
Author (s): |
Nahdatul Akma Ahmad, Azaliza Zainal, Fariza Hanis Abdul Razak and Wan
Adilah Wan Adnan |
Abstract: |
The increasing number of aging populations worldwide versus vast
developments in mobile technology creates questions on how older adults
adapt and apply mobile technology in their daily life. As older adults
is said to be more spiritually inclined, thus, mobile spiritual
applications can work as medium of serving the older adults spiritual
needs. A lot of HCI work still need to be done to ensure the development
of spiritual apps is tailored to older adults needs. Therefore, the
objective of this study is to evaluate, from an older adult’s
perspective, the most workable diary design to collect spiritual
experiences data by using an Android mobile application known as Quran
Bahasa Melayu. Older adult participants were selected based on snowball
sampling technique to use mobile spiritual application’s using a tablet
PC for seven consequent days. The participants were asked to fill up
three different types of diary which are daily diary, structured diary
and also 3E diary to find out the diary design that works well with
older adults. Daily diary appears to be a good tool in describing older
adult daily activities in detail, while structured diary fails to
achieve any target. 3E diary manages to record very rich data pertaining
older adults feeling, emotions and experiences in terms of facial
expressions from the drawing and written text. Therefore, this case
study suggests that 3E diary is the most workable diary design in
capturing spiritual experiences data among group of older adults while
engaging mobile spiritual applications and interview method could be
used as complement method to the diary. |
|
|
Full Text |
|
|
Title: |
The different perceptions of factors that influence user satisfaction
among mobile communication subscribers: Study in Kuwait |
Author (s): |
Tami H. Alzabi and Asadullah Shah |
Abstract: |
Mobile phone related services are growing tremendously all around the
world including Kuwait. Due to limited population and multiple service
providers, there is enormous competition among major telecommunication service providers in
Kuwait. There are three major companies operating simultaneously in the
country. In such a highly competitive environment the major telecommunication service
provides need to focus upon services they provide to the user in order
to survive. User satisfaction is one apex gadget that can hold company on its user segment longer and
sustainable. There is no such study available so far that looked in to
this aspect user satisfaction, satisfaction plays an essential role for maintaining old
clients and attract new ones. According to an estimate the population of
Kuwait is more 4 million and the number of service subscriptions is 6.269 million.
Meaning each user, on average has 1.5 subscriptions. Currently all three
service providers namely (Zain, Ooredoo, and Viva) have online services that provide instant
services to their customers, such as paying bills and checking details,
new promotions and downloading media, and access to the social networks. In this research a
multidimensional model, consisting of three aspect; information quality,
system quality, and service quality is proposed and telecom service user’s satisfaction is
measured. In this regards the data was collected from three different
segments of the population, the users working in banking sector, university students,
and oil sector employees in Kuwait. Considering that these employees are
the potential users who are clients of telecommunications service providers and experiencing
user online services. The analysis shows some differences among
different users and satisfaction for different services from all three service providers and results are
reported in detail in result sections. |
|
|
Full Text |
|
|
Title: |
Regression analysis on e-assessment acceptance by lecturers from
security perspective |
Author (s): |
Kavitha Thamadharan, Nurazean Maarop, Ganthan Narayana Samy, Rasimah Che
Mohd Yusoff, Rosmah Ali, Yazriwati Yahya and Roslina Ibrahim |
Abstract: |
The role of technology in education system has enriched the teaching and
learning process, be it from preschool to higher universities education.
The development of online education systems such as e-learning and e-assessment provide
many advantages to the users especially the flexibility in teaching and
learning. The online education system has the capability to improve the quality of delivery
education. However, security risks have been the major weakness in the
acceptance of technology in education field which limits the user acceptance of the online
education system. Even though there are other studies providing
solutions for identified security threats in online education usage, there is no particular model which
addresses the factors that influences the acceptance of e-assessment
system by lecturers from security perspective. The aim of this study is to explore security
aspects of e-assessment in regard to the acceptance of technology by
lecturers. A conceptual model of secure acceptance of e-assessment is proposed considering both human
and perceived security aspects. The data for this study was collected
through online survey and paper-based survey. The conceptual model is analyzed using multiple
regressions to identify the predictive power between dependent variable
and independent variable. The final result of this study demonstrates how security factors
influence lecturers’ attitudes towards the acceptance of e-assessment
from security perspective with a strong significant contribution to the e-assessment acceptance by
lecturers. This study will be useful in providing more insightful
understanding regarding the factors that influence the lecturers’ acceptance of e-assessment system from
security perspective. |
|
|
Full Text |
|
|
Title: |
Evaluation of Islamic websites’ content reliability |
Author (s): |
Rasheed Mohammad Nassr, Murni Mahmud and Mansur Aliyu |
Abstract: |
Internet is an open platform for anyone to publish and share information
without being subjected to the authenticity of information. For Muslims,
religious information
crucially should be reliable due to the very reason that many Muslims
consider the Internet as a source in getting Islamic knowledge.
Unfortunately, the assessment on reliability of the information provided by the Internet is complex. The
huge amounts of data available and lack of knowledge among Muslims
contribute to the users’ incapability to recognize existences of unreliable information. Focusing
on the reliability of information, this paper presents a software
prototype, which uniquely automates and processes the reliability evaluation through inspections
of references and scholars that are cited in the Islamic websites. Those
references indicate that the Islamic websites derived their information from reliable
religious sources. |
|
|
Full Text |
|
|
Title: |
Theoretical model for green information technology adoption |
Author (s): |
Shahla Asadi, Ab Razak Che Hussin, Halina Mohamed Dahlan, Elaheh
Yadegaridehkordi |
Abstract: |
Currently, Green Information Technology (IT) has become an active
research field in the information system discipline. Green IT adoption
is one of the most used approaches for organizations to handle the current environmental issues.
In the Green IT adoption studies, decision makers’ intention to Green IT
adoption have been ignored. While decision makers make decisions, few studies have
considered this issue. The lack of a theoretical framework for Green IT
adoption based on decision maker's intention in the organizations is considered as a main gap in
the Green IT literature. In this regard, a research framework was
developed through integrating two theories, Theory of Planned Behavior (TPB) and Norm Activation
Theory (NAT). This study contributes to existing knowledge in the field
of information systems, monitoring the decision maker's intention for the adoption of Green IT
and sustainability through the development of a theoretical framework
that identifies the key factors for the adoption of green information technology. |
|
|
Full Text |
|
|
Title: |
A theoretical extension and empirical investigation for continuance use
in social networking sites |
Author (s): |
Mohana Shanmugam, Yusmadi Yah Jusoh, Rozi Nor Haizan Nor and Marzanah A.
Jabar |
Abstract: |
Social commerce is a relatively new stream mediated by the proliferation
of Social Networking Sites (SNSs) and the popularity of social media.
The social commerce wave has opened up vast opportunities in emerging markets through online
communities’ participation. Knowledge sharing and learning through
online communities are made possible with the active collaboration and interaction among groups of
individuals. This study investigates on the role of social media in
facilitating online communication of consumers through related theories and constructs,
leading to online social support. A conceptual model integrating
constructs of the Theory of Planned Behavior (TPB), Social Support Theory (SST), perceived value and
satisfaction is developed to augment our understanding on the
continuance participation from the intention and behavioral perspectives. The study therefore
introduces a continuance participation model that integrates the
emotional and informational constructs from the SST, TPB, perceived value and satisfaction in SNSs to establish
a theoretical foundation for the study of continuance participation in
online communities. A survey conducted on users of SNSs with a total of 285 final respondents
empirically tests the continuance model constructs with ten hypotheses
using Structural Equation Modelling (SEM) approach and Partial Least Square (PLS) methods
to which all nine theorized hypotheses are achieved. The results
indicate that social interaction through social support has an intense influence on perceived
value and satisfaction resulting in an increased continuance
participation intention and behavior in online communities. Additionally, the model reveals that the
constructs perceived behavioural control, subjective norms, and attitude
from the Theory of Planned Behaviour alongside with Social Support constructs, satisfaction
and a perceived value construct significantly influence online
communities’ continuance participation intention and behaviour. This paper also seeks to
enlighten our knowledge on online communities and tap into the social
commerce capabilities particularly looking into continuance participation from the intention
and behavioral perspectives. The findings of this study contributes to
the social commerce school of thought by theoretically developing research in online
communities by proposing social constructs from a social psychology
theory in increasing our understanding on continuance model. The theoretical base of this study
is the primary contribution of this research. In addition, it
complements the minority theoretical background that surfaces in the area of social commerce
distinctly looking at online communities. |
|
|
Full Text |
|
|
Title: |
A pre-hospital emergency response framework for better work coordination |
Author (s): |
Erfan Aghasian, Alex Tze Hiang Sim and Jee Mei Hee |
Abstract: |
Coordination is a significant factor for any emergency medical team in delivering an effective and efficient service to its community. Despite the perceived importance on coordination, there is a lack of studies on its role in most pre-hospital emergency responses. In this research, we observed and studied the process flow of an often-crowed medical center for about a year. Towards the end, we suggested a framework involving the paramedics, nurses and technicians. The framework is later tested if it could reduce the patient treatment time in emergency cases. Hence, a survey study involving paramedics and technicians was conducted to evaluate the feasibility of our proposed framework where authors studied the effect after applying the framework. Only responses completed with pre-hospital care time were analyzed for the total time differences. Interviews were extended to the experts to further confirming the validity of this framework. As a result, 400 dispatches for pre-hospital care treatment were analyzed. Among these, 200 pre-hospital cases were compared to the remaining 200 cases after grouping the data following N-X-O design. It is found that there are statistically significant differences between the two groups. Interview reviewed that the treatment time become better and better services deliver to the patients. It could be conclude that the proposed framework could help the paramedics to deliver a faster service to patients. This conformed to our earlier hypothesis about coordination. The coordination as suggested in the PRIER framework is rare but generally useful for any emergency medical center where paramedics aimed to take faster and appropriate actions on surviving patients. This helps to conclude that a framework based on Information and Communication Technology (ICT) could improve a service quality for better coordination. |
|
|
Full Text |
|
|
Title: |
Exploring students perceptions of teaching, social, cognitive presences,
effectiveness for teamwork and learning outcomes |
Author (s): |
Alimatu-Saadia Yussiff, Wan Fatimah Wan Ahmad and Emy Elyanee Mustapha |
Abstract: |
The three elements of the Community of Inquiry (CoI) Model which is
known as teaching, social and cognitive presences can lead to successful
educational experiences in a computer mediated online environment. However, current research has
shown mixed-findings and little empirical evidences in supporting these
elements leads to deep and meaningful learning outcomes. This study aims at investigating the
relationships among students’ perceptions of CoI elements, effectiveness
for teamwork and students learning outcomes through pre-post-tests. Experimental research
design consisting of experimental and control groups were conducted
through the use of an e-collaboration environment and traditional-in-class-collaboration
respectively by the two groups. Data was collected using CoI and
effectiveness questionnaires, pre-test and post-test questions. The results from multiple regression and
correlation analyses show that the values of the Pearson’s correlation
of five variables, R and R2 are positive and statistically significant. These results confirmed
the statistical relationship among the five variables to be positive and
significant. The results also demonstrated that the linear combination of the four
predictors’ variables strongly predicts the learning outcomes. These
results have confirmed the relationship among the three elements of CoI, effectiveness for teamwork
and student’s learning outcomes. |
|
|
Full Text |
|
|
Title: |
A semantic web based framework for preschool cognitive skills tutoring
system |
Author (s): |
Muhammad Azeem Abbas, Wan Fatimah Wan Ahmad and Khairul Shafee Kalid |
Abstract: |
Intelligent tutoring system (ITS) is a contribution of the artificial
intelligence domain, which supports the pedagogical activities. The
development of a constructive intelligent tutoring system following psychology, intelligence,
interactivity, creativity and personalization for any real domain is
highly complex. To address this complexity, a semantic web based framework, called MySekolah was
presented in this paper. The proposed framework comprise of integrated
set of models using ontologies i.e. domain model, student model, assessment and expert models. The goal
of the proposed framework is to provide an overall structure for the
construction of an intelligent tutoring system. More specifically, to model the domain
knowledge and generate learning contents through the use of expert based
reasoning technique. As a sample, modeling of the preschool cognitive skills is demonstrated. A
prototype application is developed to validate the framework. Finally,
evaluation shows the correctness of the cognitive skills learning content generated from the
modeled ontology. |
|
|
Full Text |
|
|
Title: |
The role of SME’s frontlines in mobile advertising based on consumer
attitude |
Author (s): |
Hatem S. Y. Nabus and Ab Razak Che Hussin |
Abstract: |
Information technology (IT) formed the commerce and the marketing
strategy for the companies. One side of the marketing that is affected
by IT is the advertising. Short Messaging Service (SMS) is one of the channels that is using for
marketing. It is becoming important to reach the possible customers via
mobile phones. The attitude towards mobile advertising strongly depends on the message
characteristics. Therefore, too much work needs to be performed
concerning the advertising by using SMS to make it more attractive, creative and effective. The lack of
studies which give rich knowledge about the role of the frontlines in
SMS messaging and how can affect the consumer attitude toward mobile advertising is very
remarkable. This study reviewed the existing factors that affecting the
consumer attitude towards mobile advertising, and proposed a research model regarding the factors that
affect the SMS’s frontlines in mobile advertising based on consumer
attitude. This model was based on systematically analyzing and extracting all the factors
affecting the attitude towards mobile advertising and then developed the
model according to these models and the understanding of the researcher from the literature. To
effectively evaluate the research model, a quantitative research was
adopted. Data was collected by survey questionnaires from 153 respondents. The SmartPLS
tool was used for data analysis. In sum, the results of this research
show that all factors have a significant impact on the attitude towards mobile advertising in the
domain of SMS’s frontline. The proposed model will be beneficial to the
marketers and researchers by understanding the main factors influencing the consumer
attitude towards mobile advertising concerning the frontlines of the SMS.
Moreover, it will encourage more researchers in this field to uncover the lacks and find
the better solutions. |
|
|
Full Text |
|
|
Title: |
Analyzing log in big data environment: A review |
Author (s): |
Marlina Abdul Latib, Saiful Adli Ismail, Haslina Md Sarkan and Rasimah
Che Mohd Yusoff |
Abstract: |
Log Analysis is a crucial process in most system and network activities
where log data is used for various reasons such as for performance
monitoring, security auditing or even for reporting and profiling. However, as years passed
by, the volume of log data increases along with the size of the system
as well as the number of users involved. Traditional or existing log analyzer tools are not able
to handle the massive amount of data. Therefore, Big Data is the
solution to overcome this issue. The main purpose of this paper is to present a review of log file
analysis in Big Data environment based on previous research works. This
paper also highlights the characteristics of Big Data as well as Hadoop Framework that has
been widely used as Big Data application. Results from the papers
reviewed shows that majority researchers applied MapReduce as the main component of Hadoop for
analyzing the log files and HDFS as the data storage. Previous
researchers have also used other tools and algorithms together with the Hadoop Framework for analysis purposes.
The findings of this paper will provide a comprehensible review of
Hadoop usage performance in analyzing different types of log files and recommend understandable
results for end users to use in future work. |
|
|
Full Text |
|
|
Title: |
Structuring knowledge on house price volatility through a metamodel |
Author (s): |
Aishah Abdullah, Siti Hajar Othman and Muhammad Najib Razali |
Abstract: |
House Price (HP) valuation involves highly complex decision making. This
requires collaborating with other parties to plan and organize
activities and gathering knowledge from various sources that are distributed across time, space
and people. In other words, not all situational knowledge is immediately
available and no one person is positioned to make all the decisions. To gather the knowledge
of HP systematically, observations were made, but we found that the
utilization of the information system model for house price volatility domain is still
limited. This paper suggests a unified way to gather the knowledge of
House Price Volatility (HPV) in the form of a metamodel. Through the metamodelling technique, an
artifact called a ‘metamodel’ is produced; it is capable of gathering
and generalizing all house price determinant concepts and their relationships. Particularly for
this House Price Volatility domain, the House Price Volatility Metamodel
(HPVM) is developed by using a Design Science Research methodology. By combining the
qualitative and quantitative method, the 8-Step of Metamodelling
Creation Process and content analysis method was adopted in this research. In this paper, we are presenting
the HPVM as a way to gather the information of HPV. The metamodel
developed in this paper is validated by using in a case study: House Price in Penang State. The
validation found that the HPVM can be applied in the Penang’s current
house price determinant. It is believed that the HPVM would benefit many housing authorities such as
government, investors, economists, buyers and practitioners. HPMV can
widen the views of housing authorities regarding their investment activities and enhance
their vision when making decisions on policies involving house price
volatility. Representing HPVM in the Unified Modeling Language (UML)-based diagram and
transferring the domain information is easier nowadays, as many
practitioners are familiar with the language. |
|
|
Full Text |
|
|
Title: |
Applying thematic analysis in discovering public E-service
sustainability criteria |
Author (s): |
Haslinda Sutan Ahmad Nawi, Othman Ibrahim1 and Azizah Abdul Rahman |
Abstract: |
Thematic analysis is lack of attention, yet widely used qualitative
analytic method within information systems study. It is a process of
sifting and arranging data obtained from interview transcripts, field notes and other material
collected to increase the understanding of the data to enable the
presentation of what have been discovered. In this paper, the investigators outline what thematic
analysis is and provide clear guidelines to those wanting to start
thematic analysis or conduct it in a more deliberate and rigorous way. Memoing was also discussed where
it serves to assist the investigators in making conceptual leaps from
raw data to those abstractions that explain research phenomena in the context of study.
The analysis concludes with fourteen elements identified within three
major dimensions: institutional; technological; and environmental. Apart from that, this
paper also concludes by supporting thematic analysis as a useful and
flexible method for qualitative research in and beyond information systems study. |
|
|
Full Text |
|
|
Title: |
Bringing order in segments for a robust network in mobile services |
Author (s): |
Abdulfattah Muhyiddeen, R. Mohd Nor and M. M. Hafizur Rahman |
Abstract: |
Common overlay network arranges nodes in a particular topology such as a
ring, a tree or a hyper-tree on top of its’ physical network and takes
advantage of its structure to improve network efficiency. The structured overlay network
may provide efficient routing but the constructed structured network may
not consider physical proximity in the physical network. The construction of any structured
network requires nodes to be topologically sorted. Topologically sorting
nodes is not a difficult task, however, to keep nodes in a correct state where transient faults
exist like the overlay network created on top of the mobile network can
be daunting. In this paper, we introduce an algorithm to improve the performance of an
overlay network by ensuring physical proximity. Furthermore, the
linearized nodes will self-stabilize to a correct state as soon as the transient fault stops. A segment based
self-stabilizing linearizing algorithm that creates a linear overlay
network (topologically sorting) over the mobile network is proposed. |
|
|
Full Text |
|
|
Title: |
A preliminary study on learning orientation, information technology
infrastructure flexibility and agility |
Author (s): |
Noor Hafizah Hassan, Noreen Izza Arshad and Emy Elyanee Mustapha |
Abstract: |
Of late, information technology (IT) is considered as a key component in
every organization. Improving IT competence to become agile and retain
its competitive advantage is an important part of any organization's strategy.
Organization Integration of IT and learning is very crucial. Continuous
learning enables organizations to enhance their performance. Learning Orientation (LO) is a pillar of
strength in every organization. LO is also a vital part in
organizational learning, which explains organisation’s values of learning culture, shared goals and
sharing knowledge. The research issue highlighted in prior studies
emphasised on the link that relates organizational performance, competitive advantage, and agility.
Agility refers to the response characteristic of the organization, which
implies organisations’ quick response internally and externally and capability to gain an
advantage in cost and time. Consequently, the aims of this research are
to investigate the relationship of LO, IT Infrastructure Flexibility (ITIF) and
organizational agility in the context of Malaysian organizations.
Specifically, this paper discusses the pilot study procedures conducted and findings from surveys. Data
collected from 50 participants were analyzed statistically using SPSS
23.0 and SmartPLS 3.0. The results indicated that the research instruments are reliable and valid
for a larger sample size. The descriptive statistics also show the
existence of a learning culture and IT capability in Malaysia in enhancing
organizational
responsiveness. |
|
|
Full Text |
|
|
Title: |
A systematic review of factors affecting the adoption of cloud computing
for e-government implementation |
Author (s): |
Muntasser A. Wahsh and Jaspaljeet Singh Dhillon |
Abstract: |
e-Government refers to the use of information and communication
technology by the government agencies to electronically deliver their
services to citizens. Despite the huge benefits and synergies it grants to governments and societies, many
obstacles and challenges arise in the successful implementation of
e-Government, especially, in the developing countries. Cloud computing is a promising technology
that has been proposed to overcome the challenges to implement
e-Government. This paper systematically reviews factors that affect the adoption of cloud
computing for e-Government and public sectors. Salient factors based on their
frequencies were identified. Related studies found in different
databases such as IEEE Xplore, Emerald, and Science Direct were identified for the review. On the whole,
fifty-nine factors were identified and the results show that the
following seven factors appear most frequently: compatibility, relative
advantage, complexity, top management support, security, trust, and technology readiness. Most of
the influential factors are seen to be related to technology. This
review will be useful to decision makers in governments and public sectors who intend to leverage
on cloud computing to overcome the challenges they face in implementing
e-Government successfully. |
|
|
Full Text |
|
|
Title: |
Web 2.0 collaborative tools for SMEs: A survey |
Author (s): |
Suleiman Abdulrahman, Mohd Zaidi Abd Rozan |
Abstract: |
Organizations today operate in a complex, unpredictable, competitive and
global business environment. These demand utilizing Internet-based tools
to support more collaborative activities and allow the integration of business processes
and the sharing of information. It is often that large organizations
have more financial and technical resources compared to Small and Medium Enterprises (SMEs) to
leverage the availability of free web 2.0 collaborative tools. Web 2.0
tools provide an efficient and accessible means of encouraging and supporting team
members working together on shared objectives. This study investigates
twenty available web 2.0 collaborative tools that illustrate different way of collaboration and
different set of features. We then organize these features by four major
function categories: communication, information sharing, electronic calendar and project
management, in order to identify which of the collaborative tools would
be suitable for a particular organization. Specifically, this study will increase SMEs to
be aware what the current available Web 2.0 collaborative tools have to
offer and also help them in selecting the right tools based on their organizational needs. |
|
|
Full Text |
|
|
Title: |
Mobile network operators’ needs in collaborative mobile money service
provision |
Author (s): |
Azza Z. Karrar and Azizah Abdul Rahman |
Abstract: |
Recently, the developing countries are considering the development of
mobile money ecosystems that supports more inclusive financial systems
to overcome the high financial exclusion of their population. Such ecosystems can be enabled
by facilitating the collaboration between diverse stakeholders from
different sectors: financial, telecommunication, regulatory bodies and IT service
providers. This development of mobile money ecosystem emphasized on the
identification of main stakeholders’ needs and conflicting interests. The aim of this paper is
to understand mobile network operator’s needs when participating in
collaborative mobile money ecosystem. The Sudanese national mobile money project was used as case
study in this research. Qualitative interpretive interviews were
conducted to collect data from different stakeholders in different sectors in Sudan. The data was
analyzed using qualitative data analysis approach. The results of the
analysis focus on representing the multiple perspectives of stakeholders on each mobile network
operators’ (MNO) need. Findings contribute toward better understanding
to the mobile money ecosystem in Sudan from MNOs’ perspective. This understanding can facilitate
building successful value propositions between mobile money stakeholders
which can results in better financial services. |
|
|
Full Text |
|
|
Title: |
Evaluating a visual tool for systematic data collection and analysis for
design students |
Author (s): |
Madihah Sheikh Abdul Aziz, Gitte Lindgaard and TW Allan Whitfield |
Abstract: |
In creating a successful product it is important to understand
consumers’ perceptions of a product early in the design process. Often,
design students lack the necessary data collection and user testing skills to support effective
design decision-making. Consequently, their products might not be
acceptable to the intended consumers and are thus likely to fail in the marketplace. For design
students to acquire those skills, design curricula should incorporate
statistical courses teaching the concepts of data and user testing. We addressed this challenge by
developing an automated tool named DACADE, assisting design students to
systematically collect and analyze data. This paper reports the user acceptance study of DACADE
designed to determine its level of user satisfaction and aesthetic
appeal. The results confirmed a need for a formal introduction to systematic sampling,
collection of performance data as well as of opinion data, data
analysis, interpretation, and application of statistics to product design. |
|
|
Full Text |
|
|
Title: |
A comparative study on IT outsourcing models for Malaysian SME's
E-business transformation |
Author (s): |
Syazwani Mohd Sabri, Rosnafisah Sulaiman, Azhana Ahmad and Alicia YC
Tang |
Abstract: |
Today business state has become more dynamic and venturing into
e-business is one of business requirements that promote business
efficiency and opportunities. This has also affected the SMEs which are known to have limitations in terms of
resources and skills to develop in-house IT applications. Information
Technology Outsourcing (ITO) could be one of the solutions to accelerate the adoption process
among the SMEs. Thus, the aim of this research is to investigate the
factors affecting the decision to deploy ITO services among the Malaysian SMEs for e-Business
implementation. A qualitative approach is used to explore the level of
awareness, potential and implication of implementing the ITO among the SMEs. The focus of this
study is companies that within Halal Industries. This paper discusses
the comparative study on existing e-business and ITO models and current practices to identify
factors and research gaps in this area. Findings from this comparative
study are the reference model and the factors to being considered for this research. The
considered factors will be used to construct data instruments and as a
basis for the proposed model for this research. |
|
|
Full Text |
|
|
Title: |
A conceptual framework for the implementation process of enterprise
application integration (EAI) in Government |
Author (s): |
Fatma Mohammed Al-Balushi, Mahadi Bahari and Azizah Abdul Rahman |
Abstract: |
Although there have been several studies on Enterprise Application Integration (EAI) in recent years, they only focus upon the initial phase of the implementation process. The implementation literature indicates that there are scant studies regarding the EAI implementation process as a whole. Therefore, this paper fills this gap by presenting a conceptual framework for the implementation process of EAI. The paper not only consolidates, but also extends the existing literature on the technology implementation process for complex organization-wide technologies. Based on a content analysis of the reviewed literature, this paper identifies thirty (30) factors contributing to the implementation process of EAI. These factors are categorized based on the Technology, Organizational and Environmental (TOE) Model. The factors subsequently were mapped to the Lewin’s Change Model, to outline the structure of EAI implementation process framework. The proposed conceptual framework contributes to the understanding of the EAI implementation process, which may support practitioners in implementing the EAI technology in their organizations. |
|
|
Full Text |
|
|
Title: |
Correlation between precursor emotion and human stress by using EEG
signals |
Author (s): |
Norzaliza Md Nor and Sheikh Hussain Shaikh Salleh |
Abstract: |
Stress is an emergency mode of the body’s reaction caused by the physical and mental pressure. Stress could also happen among teacher since they have abundance of work in school. In this experiment, the teacher has been given a task to teach students with the new developed technology. Thus, in order to identify either the teacher managed to uphold the task, we conduct an experiment to analyze the stress level of the teacher. Analyzing and understanding human stress has motivated many electroencephalograms (EEG) based studies in this area. As it has been used in many researches on human emotions before, EEG machine will be able to gather the brain signals more accurately than merely guessing the emotion state of the respondents by just looking at them. However, not many researches use EEG as a tool in understanding mental stress, even though EEG device is portable and inexpensive as compared to other devices. This research aims to understand the pattern/signatures of EEG signal for human stress. The study begins by conducting two experiments; first experiment is profiling the subject with the basic emotions - happy, calm, fear and sad, and the second experiment will be inducing stress by answering the Depression Anxiety Stress Scale (DASS21). Ten healthy participants (five males and five females) are recruited for the study. For feature extraction, Mel Frequency Cepstral Coefficients MFCC will be used in this analysis. Then, we use the features to recognize the emotion of the subjects by using multi layer perceptron (MLP) as classifier. The result shows that there is correlation between precursor emotion and human stress. Then, the subject is having stress based on DASS21 and EEG signals that has been analyzed. Research result of this study can be beneficial to draw a clearer relationship between basic emotions and stress; thereby it can develop a better healing process to tackle mental stress in future. |
|
|
Full Text |
|
|
Title: |
BEDRUNN3R: An intelligent running alarm clock |
Author (s): |
Lee Kien Ee, Norshuhani Zamin, Izzatdin Abdul Aziz, Nazleeni Samiha
Haron, Mazlina Mehat and Norzatul Natrah Ismail |
Abstract: |
The conventional alarm clocks have been serving their purpose to mankind since their inception, to wake people up every single morning. However, the rates of oversleeping are still on the rise and people are having trouble waking up in the morning even with the use of alarm clocks. The snooze button that is available on all conventional alarm clocks provide user with more sleep but at a cost of deteriorating their quality of health and exacerbating sleep inertia at the same time. The objective of this paper is to study the problems associated with sleep that are often faced by people and to develop an intelligent moving alarm clock that implements the application of Artificial Intelligence. The Hypothetico-Deductive method will be used as the research methodology while the development will be following the Rapid Application Development (RAD) model. The developed prototype is tested against conventional alarm clocks and has shown significant improvements in the percentages of oversleeping and snoozing. Recommendations for continuation and future work of this paper are also included. |
|
|
Full Text |
|
|
Title: |
Roadside worker detection and alert system using RFID |
Author (s): |
Siti Nur Izzaty Binti Norizan, Izzatdin Bin Abdul Aziz, Nazleeni Samiha
Haron, Jafreezal Jaafar, Norzatul Natrah Ismail and Mazlina Mehat |
Abstract: |
The project proposes a prototype system to alert drivers of the existence of roadside workers in order to reduce road accident rate involving roadside workers. High fatality rate involving roadside workers can be reduced by pre-alerting the drivers at a safe distance. A distance alert system is proposed to meet the need of alerting the drivers earlier to prevent accidents. Radio Frequency Identification (RFID) technology is used to indicate the existence of roadside workers and alert the drivers. The prototype system had been developed to clearly show and demonstrate the idea of giving alert to the driver on the existence of the roadside worker. In order for the prototype system to work effectively, RFID reader has to detect RFID tag and transfer the signal to a buzzer. The buzzer informs to the driver of the existence of nearby roadside workers for them to stay alert, and slows down, or change path if necessary. The objectives of this project are to study the implementation of Radio Frequency Identification (RFID) as a simulator in detecting workers at the roadside of a highway and to develop a prototype system that can notify the driver on the presence of the worker at the highway. The significance this project; is to save lives by providing sufficient reaction time for drivers to safely avoid roadside workers. |
|
|
Full Text |
|
|
Title: |
Pre-flood warning system based on user mobility |
Author (s): |
Fateen Atiqah Mastor, Izzatdin A Aziz, Nazleeni SamihaHaron, Jafreezal
Jaafar, Norzatul Natrah Ismail and Mazlina Mehat |
Abstract: |
The occurrence of flood causes millions of Ringgit in damages, along with the loss of life and property, and the devastation of agricultural and livestock. Therefore, an effective pre-flood warning system must be developed to mitigate flood losses and lessen the flood effects. However, when developing a warning system for flood disaster, limited communication during the occurrence of floods and the availability of electricity supplies should be taken into account. Thus, this paper proposes a conceptual framework with three (3) main stages: monitor water level, alert flood victims on flood danger status and inform flood victims to relocate to the nearest relief centre with regards to their mobility. This is done by leveraging on the Mobile Telephone Switching Office (MTSO), where warning SMS is broadcasted only to the cellular numbers logged at the affected base station. A system architecture has been designed and a prototype system is developed. The prototype system is made up of a medium sized aquarium tank, a hand pump, HC-SR04 ultrasonic sensor, Arduino UNO R3 and IComsat GSM shield. To validate the proposed prototype system, an experiment with controlled water rising effect is conducted in a lab scale setup. The results prove that the proposed prototype system is reliable as it is able to measure water level accurately and broadcast warning SMS immediately to flood victims. Thus, by having an effective real time pre-flood warning system, immediate action can be carried out in order to save lives and minimize the damages caused by flood disaster.
|
|
|
Full Text |
|
|
Title: |
The challenges of human factors for implementation of information
systems in the healthcare |
Author (s): |
Nur Faizah Ab Aziz and Noor Azizah Mohamadali |
Abstract: |
Healthcare Information Systems (HIS) play an important roles in helping
to coordinate activities across units within hospitals through fast
access to patients' electronic records. HIS is an initiative taken by
Malaysian government to resolve several issues such as increasing number
of patients who are in needs of treatment, increasing waiting time for
receiving medication etc. HIS adoption is increasing globally, including
Malaysia. Malaysia begin to adopt HIS in 1999 which covers both clinical
and non-clinical information system. Since its introduction, hospitals
are facing with various challenges to achieve objective of its adoption.
Understanding factors that detain the success of HIS implementation is a
central concern of Healthcare Informatics. Among others, human factors
or HIS users (medical practitioners) is one of the issues that important
to be considered as they play a significant role in influencing the HIS
adoption in hospitals. Human factors are essential in identifying human
constraint and needs when interacting with the system for improving work
effectiveness and productivity. Any issue encounters by medical
practitioners need to be identified earlier to avoid failure of use once
the system is launched. Failure of interaction effectively between human
and technology might lead to medical errors. Thus, the aim of this study
is to provide a review of challenges associated with human factor
through the adoption of information system in hospital and to suggest
strategies to tackle or minimize issues associated with human factors.
Based on the term “Hospital Information System”, “Electronic Health
Record”, and “human factor”, articles were retrieved from electronic
journal databases using a systematic search techniques. Some inclusive
and exclusive criteria such as year of publication, writing language
etc. were applied. Based on study, there are constraints on human
factors with the adoption of information system in hospital. This paper
provides view on human-related issues that are important to be addressed
in the implementation of information system. |
|
|
Full Text |
|
|
Title: |
A multi-dimensional database model for research performance analysis |
Author (s): |
Fatin Shahirah Zulkepli, Roliana Ibrahim, Aryati Bakri, Nor Hawaniah
Zakaria, Haza Nuzly Abdull Hamed and Hazimah Khalid Mohd Aizaini Maarof |
Abstract: |
Business Intelligence (BI) system mix operational data with analytical tools to represent descriptive and complicated data to groups of decision maker. BI aim to enhance the features and accuracy of data to the decision making process. Nowadays, BI are widely applied in industry as BI aid in decision making and strategic planning. In order to achieve that, BI pulls and gathers information from variety sources of information systems. To make BI data meaningful, a conceptual dimensional database is needed to represent all data stored in one particular BI. Multi-dimensional database (MDB) is one type of database which possessed ability to process database rapidly so the results can be generated in no time. MDB also optimized the functionalities of data warehouse. Although business intelligence and MDB is broadly used in business institutions, research related about them is limited especially in academic performance area. Therefore, this research study aim to develop a BI framework for online reporting system. Hence, the objective of this paper is to review and discuss the relationship of BI with MDB for Universiti Teknologi Malaysia (UTM) research performance. In the future, this research study expected to propose a data model of online reporting system for upper management dashboard. |
|
|
Full Text |
|
|
Title: |
Automatic WLAN fingerprint radio map generation for accurate indoor
positioning based on signal path loss model |
Author (s): |
Iyad H Alshami, Noor Azurati Ahmad and Shamsul Sahibuddin |
Abstract: |
The first step in developing a ubiquitous environment, in which the user can interact with any available electronic device, is the existence of an accurate indoor positioning system. WLAN-based indoor positioning system is considered as one of the best choices for indoor positioning due to its low cost, simple configuration and high accuracy. Although the WLAN Received Signal Strength fingerprinting method is the most accurate positioning method, the offline phase of this method known as radio map creation is a time consuming process. On the other hand, in dynamically changing environments, this radio map will be outdated and this will reduce the positioning accuracy. In this paper the Multi-Wall signal path loss model will be used to automatically generate the radio map based on the knowledge of the environment layout. The results of the experiment show that the indoor positioning by using the generated radio map can achieve high accuracy with average distance error reaching up to 1.2m. This promising results means that an accurate indoor positioning system can be easily developed with time saving features.
|
|
|
Full Text |
|
|
Title: |
Preserving user privacy with anonymous authentication in cloud computing |
Author (s): |
Mohd Izuan Mohd Saad, Kamarularifin Abd Jalil and Mazani Manaf |
Abstract: |
Cloud computing offers its flexibility and dynamic nature in terms of its access to resources anytime and anywhere. All data and other resources in cloud storage are managed and controlled by the Cloud Service Provider. They provide security and ensure that the data is protected and free from any vulnerability. However, providing privacy through authentication mechanism is a big challenge. Most of the current authentication schemes rely on trusted third party to identify and verify user’s credential which can lead to transparency issue. In order to ensure for a secured transaction, they have to preserve user’s privacy from being exposed. The reveal information of user’s credential will make it easier for attacker to gain the information for accessing to classified data. They can intercept and manipulate user’s identity to gain access to sensitive data of user in the cloud storage. This issue can be solved by introducing anonymity features in the authentication scheme by hiding the user’s information as well as to protect the user’s identity from getting abused. Anonymity will protect user’s identity by hiding the real users’ identity during the authentication process especially when users have to deal with third party in their communication. The threat does not only come from external attacker but also comes from internal party who has full authority access to the server. This paper proposed an anonymous authentication scheme which is a combination of password-based authentication and anonymity feature in order to preserve user’s privacy without involving the trusted third party during the authentication process. As a result, it can guarantee a secured transaction with anonymity features to protect user’s privacy. This paper also presents the description of data privacy and security which can influence user’s trust in using cloud services. Security analysis descriptions of possible attacks to the proposed scheme are also presented in this paper. The Secure Remote Password (SRP) protocol is used for this project with some enhancement to algorithm. In the future, the proposed scheme will be tested with some of the possible attack threats to prove that it is secured against the attack. The significant of this research is to preserve user’s privacy with anonymous password-based authentication in the cloud environment without any requirement to trusted third party which can resist from vulnerability to attacks. |
|
|
Full Text |
|
|
Title: |
Exploring the common factors influencing electronic document management
systems (EDMS) implementation in Government |
Author (s): |
Haider Abdulkadhim, Mahadi Bahari, Aryati Bakri and Haslina Hashim |
Abstract: |
Many governments today have implemented Electronic Document Management Systems (EDMS). The employment of EDMS systems has increased the operational (e.g. document storage and retrieval, auditing, workflow facilities, searching and publishing) effectiveness of governments on daily basis. However, not many studies had been undertaken into the implementation process of EDMS in the government context. Given the complexity of the process of EDMS implementation which involves a combination of technological, organizational and users factors, it is now of vital importance to look from the literature to see if there are common factors that may influence the EDMS implementation projects in government. Based on the content analysis approach, this paper investigates the development of EDMS implementation studies. This study shows that there are fourteen (14) common factors found from the existing studies related to the EDMS implementation process. The identification of these factors, particularly, helpful for further research on EDMS related issues, since this study demonstrates that there are enormous amounts of factors influencing EDMS implementation available in the literature with non division of factors (i.e., technological, organizational and users factors) more dominant to one another.
|
|
|
Full Text |
|
|
Title: |
Software manipulative techniques of protection and detection: A review |
Author (s): |
M. A. Ibrahim, Z. Shukur, N. Zainal and Abdo A. A. Al-Wosabi |
Abstract: |
Over the last decade, many studies have been conducted concerning the protection of software. Software piracy, tampering and stealing became the major concern of various parties such as software developers, suppliers, traders and consumers. This paper summarizes some of the related methods in software security such as steganography, obfuscation and cryptography. Also some of the most applicable techniques in securing software from manipulation such as software watermarking, fingerprinting and software birthmarking are reviewed in this paper. |
|
|
Full Text |
|
|
Title: |
A multimodal interaction for map navigation and evaluation study of its
usability |
Author (s): |
Nor Azman Ismail and Yee Yong Pang |
Abstract: |
To meet the challenges of ubiquitous computing and an increasingly map
usage population; researchers have been trying to break away from the
traditional modes of interaction. Over the past decade years, researches in this domain
suggest that Multimodal User Interfaces (MUI) now provide maturity and
affordable opportunities, which may be appropriate for society transformation on the interaction
styles. We have developed a MUI prototype application, called MapNI, to
help users carrying out everyday activities such as navigating a map. MapNI use user-defined
hand gestures to perform a different range of tasks via a map navigation
interface. This paper describes the MapNI development and reports its usability evaluation. We
conclude that this inclusive technology offers some potential to improve
the independence and quality of life of society, although there remain significant challenges
to be overcome. |
|
|
Full Text |
|
|
Title: |
Perceived benefits, privacy risks and the used of privacy strategies on
facebook: An explorative study |
Author (s): |
Siti Zainab Ibrahim and Maslin Masrom |
Abstract: |
This explorative study aims to gain insight about which privacy settings
and features on Facebook interfaces are commonly used by Facebook users,
and how perceived benefits and privacy risks for personal information disclosure on
Facebook influences privacy strategies used on the site. Online survey
was used to gather user data. Analysis of the survey data revealed the privacy strategies on Facebook
were most commonly used for managing profile visibility, networking
boundaries, and privacy awareness. Using a point-biserial correlation analysis, the results
demonstrated significant relations between the types of privacy
strategies used on Facebook and the types of perceived benefits experienced from using Facebook. Significant
relations were also observed between the types of privacy strategies and
the types of concerns for privacy risks on Facebook. Hence, when the goal of Facebook is to
empower users for protecting their privacy, it is important to
understand how users make disclosure decisions with the help of these privacy settings and
features on user interfaces. This paper concludes with remarks on the
importance of understanding users attitudes in educating them about privacy protection in social
applications. |
|
|
Full Text |
|
|
Title: |
An investigation of motion tracking for
Solat movement with dual sensor
approach |
Author (s): |
Nor Azrini Jaafar, Nor Azman Ismail and Yusman Azimi Yusoff |
Abstract: |
Motion tracking has generated interest in field of computer vision
because it has wide range of potential applications. In this paper, we
investigate the motion tracking for solat movement which is unexplored area, by using dual
Kinect sensors from Microsoft Corporation. Solat in Islam is a part of
communication with Allah SWT to fulfil the purpose of human creation and existence. Current
technology and knowledge in Human Computer Interaction can improve the
relationship between human and God by performing solat perfectly with the assist of computer. To
achieve the goal, two Kinect sensors are placed at a pre-defined
position and angle to obtain multiple views in single space. The system gets the skeleton information
from Kinect Software Development Kit. From the skeleton information
provided, the important joint that has significant movement during Solat activity have been
selected for the training and testing process. All the movements
recorded have been classified using Hidden Markov Model function and stored into database. The system
was tested against the trained database and reliable accuracy was
recorded. The outcome from this investigation, a new frontier way of learning in
Solat can be
developed. |
|
|
Full Text |
|
|
Title: |
Student behavior analysis using self-organizing map clustering technique |
Author (s): |
Umi Farhana Alias, Nor Bahiah Ahmad and Shafaatunnur Hasan |
Abstract: |
E-learning is the resulting product from the evolution of internet
technology. It acts as a medium of learning virtually without limitation
of time and space and the need for teachers to be present physically. Currently, Moodle which is a
learning management system has become an important medium to deliver
e-learning easily by providing customized tool for educators to deploy learning materials in
various forms, provide online discussion forum, online quizzes, online
assignments and online activities among students. Moodle capture the student s interactions and
activities while learning on-line using the log files. The data stored
in the log files contain meaningful information such as the student s behavior,
preferences and knowledge level. This information is very useful for
educators to analyze the student s characteristics in order to improve the teaching methods. In addition,
the student s progress can be improved by overcome the problem of
one-size-fits-all and also to improve student learning experienced while using the system. In this
paper, the student s action and behavior while using e-learning system
are analyzed in order to identify the significant pattern of the student s behavior using
Self-Organizing Map (SOM) clustering technique. The ability of SOM to
analyze large amounts of data with variety types of variables and with better visualization of the
result give an advantage to this technique. The experiment shows that
unsupervised learning using SOM is able to identify several clusters from the student s behavior by
visualization of high dimensional data into two-dimensional (2-D) space. |
|
|
Full Text |
|
|
Title: |
Putting the tactile feedback to Quranic verses and Tajweed rules |
Author (s): |
Suziah Sulaiman, Dayang Rohaya Awang Rambli and Fatin Shamimi Mohd Zuki |
Abstract: |
Technology has enabled many physical books including Al-Quran to be
presented in a software form. The digitized holy book comes with a
complete colour-coded to assist readers read correctly without having to memorize each letter that forms
the Tajweed rules. Unfortunately, those with visual impairment are not
able to enjoy fully such a feature because there are not many systems that could support the
readers different reading capabilities. Accessibility with regards to
information visualization representing the colour-coded Tajweed codes using sensory
modalities other than vision is the issue in question. This paper
investigates whether by providing tactile feedback to the Quranic verses together with the
Tajweed rules could add value to these readers. An interview and,
observation on visually impaired readers learning Al-Quran were conducted to understand and capture the
design requirements. The initial study findings revealed that those with
low vision and very new to reading Al-Quran Braille are in favour of the prototype while the
more experienced readers did not find the tactile Tajweed rules
necessary. These findings led to the development of a prototype using Braille-line 20. The prototype
incorporates tactile feedback into the Al-Quranic Braille and the
associated Tajweed rules. A user testing was conducted with a group of visually impaired people to elicit
their opinions on the prototype. The study findings signal for the
prototype having potential as a promising learning tool. |
|
|
Full Text |
|
|
Title: |
Exploring older people's experience with augmented reality (AR)
applications |
Author (s): |
S. A. Malik, M. Azuddin, L. M. Abdullah and M. Mahmud |
Abstract: |
Latest development of mobile technology has opened another opportunity
for augmented reality to be implemented in the mobile device platform.
Mobile augmented reality enhances mobile users experience by combining computer generated images
in real environment. There have been limited studies which investigate
the use of augmented reality among older people. This pilot study aims to explore older
people s experience in terms of attitude and potential barriers when
they are interacting with augmented reality applications. Qualitative methods including interview,
focus groups and observation were used to understand their experiences
with augmented reality applications. Results indicated that, there were some barriers faced by
older people in engaging augmented reality applications such as AR
interface and interaction style, and familiarity with AR applications. Result showed that, they
found AR applications could be beneficial for certain occasions or
conditions like people in remote areas such as for outdoor and disabled users of mobile
applications. |
|
|
Full Text |
|
|
Title: |
MyGeo-Explorer: A semantic search tool for querying geospatial
information |
Author (s): |
Subashini Panchanathan, Abba Lawan and Abdur Rakib |
Abstract: |
We propose a semantic search approach for geospatial information systems
to resolve the issue of semantic heterogeneity in metadata catalogues.
Using the Malaysian geospatial data infrastructure service portal, MyGDI Explorer, as a
comparative case study, a semantic search tool developed in this work is
based on the model-view-controller (MVC) approach, which comprises three major components, an
ontology component modeled using the Malaysian Geospatial Standard (MS
1759) as a domain, a java-based middleware component using Apache-Jena API and a query-based
semantic search engine developed in Java EE. In this paper, we present
MyGeo-Explorer, a web application coupled with a semantic search engine for exploring
geospatial information and illustrate the use of the tool with some
common usage scenarios. We show how ontology-based semantic search provides more relevant search results as
compared to traditional keyword search and helps to deal with the
problems of semantic heterogeneity inherent in keywords definition. |
|
|
Full Text |
|
|
Title: |
3D imaging techniques in documentation of cultural assets in Malaysia |
Author (s): |
Harlina Md Sharif Hazman Hazumi and Nurfarhanah Saedin |
Abstract: |
Despite worldwide rapid development in 3D imaging technologies,
documentation of 3D cultural assets in Malaysia is still very much
reliant upon conventional techniques. There is very little progress towards exploring new methods
or advanced technologies to convert 3D cultural assets into 3D visual
representation and visualization models that are easily accessible for information sharing.
Shortage of expertise in many levels of digital practice and general
perception that 3D digital documentation is costly and requiring high investments further
hampers digitization efforts. In recent years, however, advent of
computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by
using image sequences from digital cameras, which are then processed by
web services and freeware applications. This paper presents an initial stage in an exploratory
study that investigates the potentials of using CV automated image-based
open-source software and web services to reconstruct and replicate cultural assets. By selecting
an intricate wooden boat, Petalaindera, this study attempts to evaluate
the efficiency of CV systems and their suitability to be adopted in digital heritage practice
in Malaysia. By presenting a brief overview of previous 3D digital
documentation efforts undertaken in the field of cultural heritage (CH) in Malaysia, the final
aim of this study is to compare the visual accuracy of 3D models
generated by CV system, and 3D models produced by terrestrial long-range scanner and structured
white light systems. The final objective is to explore cost-effective
methods that could provide fundamental guidelines on the best practice approach for digital
heritage in Malaysia. |
|
|
Full Text |
|
|
Title: |
Enhancement of confidentiality and integrity during big data
transmission using a hybrid technique |
Author (s): |
Shiladitya Bhattacharjee, Lukman Bin Ab. Rahim and Izzatdin B. A. Aziz |
Abstract: |
The most fundamental issues of any data transmission over the internet
are maintaining its confidentiality and integrity. The data integrity
may suffer due to unauthentic interferences or various transmission errors. These issues
increase when the transmitted file size is extremely large. Many
researches have been performed to address these issues individually. However, there is no integrated
technique being suggested in previous researches to address both these
issues in big data transmission system. Therefore, we have proposed a new error control
technique and a unique LSB (Least Significant Bit) based audio
steganography technique and combined them to develop a hybrid technique. The proposed control
technique is designed to remove all discrete or continuous data errors
and to provide a backup system for accidental data loss. The proposed steganography technique is
developed to offer high confidentiality, protect various security
attacks and to enhance robustness against various errors. The result section shows its capacity to produce
robustness against various errors in terms of signal to noise ratio,
uncorrectable error rate and percentage of data loss. The confidentiality level is shown by
calculating frequency and amplitude difference between the original and
stego samples. Its capacity to protect various attacks has been tested by calculating entropy
values. All tests are performed in wireless environment using different
types and different sizes of input files. |
|
|
Full Text |
|
|
Title: |
Identifying the basis of auditory similarity in concatenative sound
synthesis users: a study between musicians and non-musicians |
Author (s): |
Noris Mohd Norowi, Eduardo Reck Miranda and Hizmawati Madzin |
Abstract: |
This paper identifies the basis of auditory similarity in concatenative
sound synthesis users. Concatenative sound synthesis (CSS) system is an
existing approach to create new sounds based on a user supplied audio query. Typically, the
audio is synthesised based on the least distance between the query sound
unit and the available sound units in the database. However, sounds synthesised through this
approach often times result in a mediocre level of satisfaction within
the users as confusion between various audio perception attributes during the CSS system s
matching process causes mismatches to occur. This study aims to
determine the dominant perceptual attribute that humans base their judgment of sound similarity on. The
study also looks at two categories of CSS system s users: musicians and
non-musicians, and observes whether there is a significant difference in the subjective
judgments between the two groups with regards to sound similarity.
Thirty-eight participants were subjected to the listening test, where six pairwise comparisons from
four different audio perceptual attributes (melody, timbral, tempo and
loudness) were compared. In general, it was found that the majority of users in the Musicians group
(73.3%) based their sound similarity on timbre attribute, whilst the
majority of the users in the Non-musicians group (78.3%) based their sound similarity on the
melody attribute. This information may be used to help CSS system cater
to the expectations of its users and generate the sounds with the closest matching audio perceptual
attribute accordingly. |
|
|
Full Text |
|
|
Title: |
Web user interface: local websites versus users mental model pattern for
ASEAN |
Author (s): |
Aslina Baharum and Azizah Jaafar |
Abstract: |
Even though there is a great development of mobile application nowadays,
a web-based platform is still the necessary development for accessing
information. The web interface is an important part of a web structure or web layout of a
website which captures the users eyes at first glance, whether it is
appealing and expected or not. Do the developers or designers develop the web user interface (UI)
based on users mental model pattern (uMMp)? Or do they realize that
experienced and knowledgeable users may have an expected look of the layout or in
particular, the localization of the web objects? Every user may have
different expectations of the same website, but it may be significantly different when compared to
users from other countries. This study will compare and identify the
ASEAN uMMp UI with the UI of popular websites in the Association of Southeast Asian Nations (ASEAN).
The aim of the study is to prove that the users may have created their
own mental model pattern when looking at a website. This result can hopefully inspire other
designers or researchers of the usefulness of web development based on
uMMp for web design development improvement in the future. |
|
|
Full Text |
|
|
Title: |
A correlation analysis between sentimental comment and numerical
response in students feedback |
Author (s): |
Phuripoj Kaewyong, Anupong Sukprasert, Naomie Salim and Fatin Aliah
Phang |
Abstract: |
This paper aims to study a qualitative measuring of students comments
using sentiment analysis to teacher evaluation and investigate its
qualitative analysis. A small dataset of students feedbacks was collected from the public website and
was utilized in the experimental. We performed the lexicon based
sentiment analysis to identify sentiment word and determine overall sentiment polarity of
students comment into positive and negative classes based on Opinion
Lexicon automatically. A comparison between overall sentiment scores and numerical response
scores of teacher evaluation aspects were evaluated and plotted into
graphs in order to compare the relationship between each pair of two variables. Especially, we applied
the statistical techniques using Pearson s correlation and Spearman s
rank to confirm these visual correlation results. The experimental results suggested that
there is a significant correlation between overall sentiment scores from
its qualitative analysis and numerical response scores of teacher evaluation aspects. Based on
this, it might be possible to convert from qualitative to quantitative
type of teacher evaluation by performing lexicon based sentiment analysis. |
|
|
Full Text |
|
|
Title: |
Implementation issues affecting the business intelligence adoption in
public University |
Author (s): |
Ahmad Fadhil Yusof, Suraya Miskon, Norasnita Ahmad, Rose Alinda Alias,
Haslina Hashim, Norris Syed Abdullah, Nazmona Mat Ali and Mohd Aizaini
Maarof |
Abstract: |
Today, the education sector has become fiercely competitive in
recruiting students from across the country and around the world.
Anecdotal evidence suggests that universities are good candidates for Business intelligence (BI). BI is
the process of gathering correct information in the correct format at
the correct time; and delivering the results for decision-making purposes. It also has a
positive impact on business operations, tactics, and strategies in the
enterprises. There have been numerous reports of BI benefits in private and public sector. Yet,
issues influencing BI implementation in a public university could be so
numerous that they may affect the effectiveness of a BI implementation. Thus, this paper
discusses issues faced by public university in implementing Business
Intelligence System. Interviews were conducted with the head of the university divisions and faculties
representatives to elicit their opinion regarding issues faced in
managing university data. Data were collected and analyzed using NVivo 10. There are eight main
issues identified from the interviewees and these will be used as the
foundation in developing a BI system in the university, suggesting important implications for
practice and further research. |
|
|
Full Text |
|
|
Title: |
A business intelligence framework for
Higher Education Institutions |
Author (s): |
Nur Ain Zulkefli, Suraya Miskon, Haslina Hashim, Rose Alinda Alias,
Norris Syed Abdullah, Norasnita Ahmad, Nazmona Mat Ali, and Mohd Aizaini
Maarof |
Abstract: |
Stakeholders are progressively measuring the success of Higher Education
Institutions (HEIs) in terms of graduation rates. Today, HEIs are under
intense pressure to not only recruit students who have the potential to graduate on time,
but also to detect and provide at-risk students with necessary remedial
measures. However, most top management has difficulty in accessing data in their organization as
the number of data increases continuously. Business Intelligence (BI) is
one of the tools used widely to help organizations such as HEI to access and manage huge
volumes of data. The features provided in BI tools enable managers to
make accurate and effective decisions at the appropriate time and in the right format. Through
systematic literature review (SLR), this paper discusses formulation of
Business Intelligence framework for deploying solutions in HEIs that guides current practice
and for the future research. |
|
|
Full Text |
|
|
Title: |
Applying the principles of interpretive field research:
as example of an IS case study on shared services |
Author (s): |
Suraya Miskon, Wasana Bandara and Erwin Fielt |
Abstract: |
All sound research commence with the selection of a research paradigm.
The chosen research paradigm is significant in shaping the researcher s
perspectives of the world and it is a vital step in any study s research design. There are
different paradigms that IS researchers can choose from; amongst which
the interpretive paradigm is growing in acceptance.. Though interpretive research has
emerged as an important strand in Information Systems (IS), guidelines
on how to conduct interpretive research and how to evaluate them have been scarce. Klein
and Myers presented seven principles with examples for each from three
case examples. While these principles are much valued, there is a lack of support for novice
researchers on how to embed these principles in an overall research
design, which could help with the aid of a detailed example that has done so. Thus, this paper
aims to address this gap, and presents how Klein and Myers s principles
were applied within an example study that investigated shared services in the Malaysian Higher
Education context. The example study adopted the interpretive paradigm
as the most suited approach that fitted their research questions and goals. More details
about the selection and adoption of the Klein and Myers s guidelines in
the context of the shared services research case study are presented in the paper. |
|
|
Full Text |
|
|
Title: |
Gamification in
online collaborative learning for programming courses: A literature
review |
Author (s): |
Shahdatunnaim Azmi,
Noorminshah A. Iahad and Norasnita Ahmad |
Abstract: |
The
popularity of computer science education triggered a dramatic rise in
the number of tertiary institutions offering computer science courses.
Nevertheless, many employers complain that graduates do not have the
required skills. Lately, the higher education sector has faced a
continuous decrease in the number of students choosing to study computer
science courses, and some of the reasons for this rejection are related
to the difficulties in mastering computer science skills. As core
subjects in a computer science major, programming language subjects play
an important role in successful tertiary computer science education. The
embedding of gamification in programming courses has been identified as
a potential technique that could maximize student participation and have
a positive impact on learning. This research aims to provide an overview
of how the embedding of gamification in online collaborative learning
can enhance participation among novice programming students. The main
findings from this review include the identification of the important
participation elements for programming students in the online
collaborative learning environment, a list of game elements embedded in
online collaborative learning to facilitate participation among
programming students, and suggestions regarding suitable gamification
approaches for programming courses. |
|
|
Full Text |
|
|
Title: |
The relationship of
physicality and its underlying mapping |
Author (s): |
Masitah Ghazali, Alan
Dix and Kiel Gilleade |
Abstract: |
We
understand how physical things work from our experience interacting with
them. The cause-effect mapping instills our knowledge of interaction. We
extend our knowledge of physical interactions when interacting with
computing devices, especially when we do not have prior experience with
those devices. But, the mapping of interaction in the digital world is
not as straightforward as in the physical world. It is unclear how far
the rules of physicality hold in the computing realm when the level and
kind of feedback is not necessarily the same with physical effort? How
do we cope when the underlying mapping is incoherent in relation to the
physical control? In this paper, we report a study on Cruel Design. Its
objectives are: i) to investigate the role of physicality in the
physical-logical interaction, and ii) to observe the behaviors of users
as incoherent mappings occur. Four conditions to illustrate the
different design of mappings were presented to users. From the findings,
the physical condition plays a more dominant role than having to
remember the correct mapping of the logical states, and, inverting an
action on the same controller (regardless the type of mapping) is the
natural reaction to overshoot. |
|
|
Full Text |
|
|
Title: |
Stakeholders’ view on MOOCs sustainability in Malaysian higher
education: A preliminary study |
Author (s): |
Nor Fadzleen Sa don, Rose Alinda Alias and Naoki Ohshima |
Abstract: |
The emergence of Massive Open Online Courses (MOOCs) has revolutionized
the global higher education due to policy innovation towards learning
accessibility,
heterogenous participation with low or zero cost imposed on end-users.
In the context of Malaysian higher education, the Ministry of Higher
Education has launched
Malaysia MOOC, the first country in the world to implement
government-initiated MOOCs for all public universities. The ministry
allocates RM500 million for all public
universities to offer the MOOC, under the 2016-2020 Eleventh Malaysia
Plan. Nonetheless, there is yet study published specifically on MOOCs
sustainability in Malaysian
higher education. Hence, this paper aims to gauge MOOCs stakeholders’
view on MOOCs sustainability via interviews conducted with ten
interviewees who are the primary
stakeholders of the Malaysia MOOCs initiative. Four main factors, three
constructs and nine elements for MOOCs sustainability in Malaysian
higher education have been
identified via synthesis of meta-analysis and stakeholders’ view. The
findings of this research are hoped to be useful as future reference to
policy makers,
practitioners and researchers. |
|
|
Full Text |
|
|
Title: |
Designing of a basic Arabic sound learning courseware using
outcome/change matrix |
Author (s): |
Siti Nazirah Bt. Muhamad Zainuldin, Aryati Bt. Bakri, Nor Hawaniah Bt.
Zakaria, Normal Mat Jusoh and Ng Kien Heng |
Abstract: |
Nowadays, early childhood education becomes a trend in parenting to
optimize the children brain development. It is proven to
be important as a child’s
brain is experiencing a rapid development during this period. It is
important to be able to recognize Arabic letters, in particular to the
Moslems; without this it
will be difficult for them to perform their daily rituals such as
reading the Quran and performing Solah (prayer). Thus it is important to
begin introducing and
teaching the Arabic language at the early age. However, teaching Arabic
language to young children is difficult as they usually have a limited
focus time. The
objective of this paper is to design the outcome/change matrix that
contains motivational elements for early childhood learning. An Arabic
learning courseware that
includes the identified component in the outcome/change matrix was
developed. The courseware was tested among the children between 18 to 36
months old. The post test,
pre test and observation were conducted to evaluate the courseware. The
finding shows there is significant improvement among the children in
recognizing the Arabic
basic sound. It’s also proven the courseware is able to motivate and
simulate the children’s cognitive and sensory development. |
|
|
Full Text |
|
|
Title: |
A comparison of people counting techniques via video scene analysis |
Author (s): |
Poo Kuan Hoong, Ian K. T. Tan and Chai Kai Weng |
Abstract: |
Real-time human detection and tracking from video surveillance footages
is one of the most active research areas in computer vision and pattern
recognition. This is
due to the widespread application from being able to do it well. One
such application is the counting of people, or density estimation, where
the two key components
are human detection and tracking. Traditional methods such as the usage
of sensors are not suitable as they are not easily integrated with
current video surveillance
systems. As video surveillance systems are currently prevalent in most
places, using vision based people counting techniques will be the
logical approach. In this
paper, we compared the two commonly used techniques which are Cascade
Classifier and Histograms of Gradients (HOG) for human detection. We
evaluated and compared these
two techniques with three different video datasets with three different
setting characteristics. From our experiment results, both Cascade
Classifier and HOG
techniques can be used for people counting to achieve moderate accuracy
results. |
|
|
Full Text |
|
|
Title: |
A framework on cloud technology in facilitating design learning |
Author (s): |
Nur Aziemah Mohamad, Khairul Anwar Mohamed Khaidzir and Roliana Ibrahim |
Abstract: |
Nowadays, the technology has evolved and its advancement has affected
the learning field. People opted to use the cloud technology as it can
cater the communication
between the instructor and students. In this study, the focused learning
field is architectural design learning. Design has a vast disciplines
and it is often related
to the architecture domain. It comes with three distinct features which
are propose, critique and iterate. Hence, communication between
instructor and students is
crucial in order to get the best design. Most of the types of
communication occurred during the critique session. Currently, the
instructor found out that it is hard
to intervene with the students design during the personal critique
session. Thus, cloud technologies can act as a scaffolding tool during
the design process. To
achieve this study, a proposal on cloud-based design studio to
facilitate the communication between instructor and students is done. An
in-class observation has been
done to see how the cloud technology can fit in facilitating the design
process. By adapting the cloud technology in design learning, it gives
opportunity for the
instructor and students to communicate among each other while improving
the design virtually in real-time. |
|
|
Full Text |
|
|
Title: |
Integrating IoT devices into a mobile application for elderly who live
alone |
Author (s): |
Wahidah Husain, Siti Aishah Mohd Zain, Nur Aini Abdul Rashid and Amirah
Mohamed Shahiri |
Abstract: |
Nowadays, the populations of elderly persons who live alone are
increasing worldwide. As we all know, the elderly need more support and
need someone to regularly take
care of them. The situation become worst for elderly who have health
problem that needs to be monitored frequently. Therefore, the main
objective of this study is to
propose a mobile application known as HomeAlone for helping the elderly
manage their daily activities easily and independently. The application
is developed on android
platform combined with Internet of Things (IoT) sensor devices. The
Arduino Uno board will be used as the platform that will connect the
sensor devices to the
internet. HomeAlone primary concern focuses on the monitoring of the
security intruders outside the house and the condition of the main
entrance door of the house. The
health of the elderly can be monitored using pulse, body temperature and
blood pressure sensors. Besides that, the movement of the elderly also
can be monitored by
using motion sensor which can detect the actual condition of the elderly
inside the house. By using this application, the elderly can live more
safely and
independently and can also relief the worries of the caretakers. |
|
|
Full Text |
|
|
Title: |
Eye blinks removal in single-channel EEG using Savitzky-Golay referenced
adaptive filtering: A comparison with independent component analysis (ICA)
method |
Author (s): |
Faridah Abd Rahman and Mohd Fauzi Othman |
Abstract: |
Eye blink artifact is one of the major problems in electroencephalograph
(EEG) signals which mainly affected a frontal channel. A frontal channel
often involved in
recent applications of portable EEG devices which require a real time
processing including for artifact removal. In this paper, we proposed a
new referencing method in
adaptive filtering for eye blinks removal of a single-channel EEG. The
proposed method adopts Savitzky-Golay (SG) filter to extract the blink
components from noisy EEG
signals. The extracted component is then employed in adaptive filter as
a reference input. We implemented adaptive neural fuzzy inference system
(ANFIS) algorithm in
adaptive filtering for the blink removal process. The reliability of the
proposed method is demonstrated on real EEG dataset. By using the signal
to noise ratio (SNR),
mean squared error (MSE) and correlation coefficient as performance
indicators, the proposed method is compared to independent component
analysis (ICA), one of the
widely accepted methods for artifact removal. The results show a low
correlation between a corrected signal and a measured electrooculograph
(EOG) signal, which
indicates its efficiency in estimating and removing the blinks from the
measured EEG signals. The results also demonstrate an improved
performance compared to conventional ICA method. |
|
|
Full Text |
|
|
Title: |
The influence of information system success factors towards user
satisfaction in Universiti Teknikal Malaysia Melaka |
Author (s): |
Yusri Arshad, M. Azrin and Siti Nor Afiqah |
Abstract: |
The aim of this study is to investigate the influence of information
system (IS) success factors towards the user satisfaction in UTeM. In
the last few decade, the
process of linking the information system (IS) with user satisfaction
has been currently taking concern in IS research. This knowledge is
valuable as it can help in
the development of better methods for IS in future and evaluating their
impacts on the individual and organization. The rapid changes in
information technology (IT)
and business environment have challenged the Universities capabilities
in planning the appropriate information systems strategies for their
organizations. The
increased number of user population in the Malaysian Public Universities
shows a clear need of improvement in the strategic information system
planning used. The main
objective of this study is 1) the important factors contributing towards
Information system success; 2) to determine IS success factors
influencing user satisfaction
at UTeM; and 3) to determine the most relevant IS success factors that
influences the user satisfaction such as System quality, information
quality, service quality
and system use. The study adopted quantitative method to collect data
and analysis, where 100 respondents from UTeM were chosen to answer the
questionnaire survey
regarding their satisfaction towards the said factors. From the result,
there is a positive relationship between the four factors with the user
satisfaction. In order
to develop the high user satisfaction, the information system department
of UTeM should look into the entire factor that has significantly
influenced the user satisfaction. It is also recommended that an extensive research is done
to other organizations in Malaysia. |
|
|
Full Text |
|
|
Title: |
Business intelligence system adoption theories in SMEs: A literature
review |
Author (s): |
Nurlydia Natasha Md Hatta, Suraya Miskon, Nazmona Mat Ali, Norris Syed
Abdullah, Norasnita Ahmad, Haslina Hashim, Rose Alinda Alias and Mohd
Aizaini Maarof |
Abstract: |
Today, business intelligence system (BIS) is universally considered as
an essential tool to aid business decision making process. There is
consensus that BIS has
significant effects on predicting current and prospective views of
business operations. These effects will only be realized if, and when,
BIS are widely spread and
used. An imperative study of BIS adoption theories is crucial in order
to understand the determinants of BIS adoption. Previous studies on the
BIS adoption theories in
the global Small Medium Enterprise (SME) are limited. To fill the gap,
this study is aimed to study the BIS adoption theories as reported by
prior researchers and
propose the BIS adoption model for SME in Malaysia. Through systematic
literature review (SLR), this paper discusses two prominent models being
adopted in SMEs. These
two prominent models; diffusion of innovation (DOI) theory, and the
technology, organization, and environment (TOE) framework are discussed
in details in this paper.
This paper also makes recommendations for future research. |
|
|
Full Text |
|
|
Title: |
Understanding factors influencing user experience of interactive
systems: A literature review |
Author (s): |
Ahsanullah, Suziah Sulaiman, Ahmad Kamil Bin Mahmood and Muzafar Khan |
Abstract: |
In recent years, the notion of User Experience (UX) has gained a greater
attention among HCI researchers in academia and industry. Due to its
importance, several
frameworks and models have been proposed to design and assess UX of
interactive systems. These models guide to improve the design and help
to determine the quality of
interactive systems, products and services. UX is highly subjective,
dynamic, and context dependent; it evolves during the interaction with
the system. Different
factors collectively influence UX and present a challenging task to
define, model, measure and validate it. The less attention is paid to
understand and underline
these factors; this paper is an attempt to understand and underline the
core UX factors based on literature review. These factors make UX more
complex, diverse and
vague in nature. It is recommended to incorporate the management aspect
in UX process that may help to overwhelming the issues of complexity,
diversity and vagueness. |
|
|
Full Text |
|
|
Title: |
The heuristic evaluation on the internet safety guideline for primary
school students |
Author (s): |
Masliza Mohd Yunus, Norziha Megat Mohd. Zainuddin, Nurazean Maarop ,Roslina
Ibrahim, Rasimah Che Mohd Yusoff, Ganthan Narayan Samy and Wan Azlan Wan
Hassan |
Abstract: |
Nowadays, the use of Internet is becoming more important in teaching and
learning at school. A preliminary study shows that even though Internet
has many benefits, it
also exposes users to danger, especially concerning online
communication. The objective of this research is to develop an Internet
safety guideline in order to curb
cybercrime, especially for students in primary schools. Expert
evaluation has been used in this study. It has been chosen because of
its ability to identify more
problems. An interview with six experts was conducted in validating the
guideline. Several comments were obtained. The findings have showed that
the experts’ comments
are helpful in improving the guideline and the result of the Content
Validity Index is acceptable. Hence, it is hoped that the Internet
safety guideline developed can
benefits or provide awareness for primary school students and teachers
in the process of giving or getting any information through the
Internet. Therefore, this study
provides primary school students with a guideline in accessing the
Internet safely. This is important for them in expanding their knowledge
and thus, be successful in
their study. |
|
|
Full Text |
|
|
Title: |
Purify noisy data from annotated images using montylingua and control
redundant term |
Author (s): |
Rooh Ullah, Jafreez Jaafar and Abas B. Md. Said |
Abstract: |
Dynamic growths in the field of digital data and new techniques (manual
and automatic) are introduced to tag images. Tagging of an object within
the image is labeled
in different terms base on the user perception. LabelMe is the image
datasets that give a user online access to labeled object through by
webtool. However, there are
a number of noisy terms and errors found in the annotated list.
Nevertheless, sometime a user tags the same objects with repeated terms.
It requires to pruning the
dataset from errors, noisy keywords and reduces to one instance term.
This paper uses Montylingua for two purposes. First, it converts the tag
term into base form.
Second it purifies the irrelevant terms from the list. Next reduce the
repeated terms into one instance and display their total count of
occurrence. An experiment
work, it shows that the purified list of the tagging has successfully
removed from the annotated images. The result depicts through tagging
ratio as well as degree of
retrieval for effective achieved. |
|
|
Full Text |
|
|
Title: |
Factors affecting knowledge sharing on innovation in the Higher
Education Institutions (HEIs) |
Author (s): |
Mohammad Mozammel Haque, Abd. Rahman Ahlan and Mohamed Jalaldeen Mohamed
Razi |
Abstract: |
It is believed that Information and Communication Technology (ICT) can
enhance Knowledge Sharing (KS) with the integration of individual and
organizational factors. As
a relatively new field of research, studies on KS based on Information
Systems (IS) in developed countries is also on the increase.
Unfortunately, KS research in the
Higher Education Institutions (HEIs) in developing countries is mostly
found to be given trivial considerations. It is even rare to find
conceptual research model for
KS in HEIs in developing countries that integrate individual,
organizational and technological antecedent factors together. Therefore,
the objectives of this paper are
twofold: (i) to explore the best conceptual KS research frameworks based
on existing research models in HEIs; and also (ii) to propose a research
model that can help
explain better the nature of KS in HEIs. The methodology of this study
is subjective/argumentative research i.e. idea generation in IS. The
proposed research model has
been built on the basis of IS theories and from the review of extant KS
literature. The study reveals the antecedents and incorporates in the
proposed research models
which are: perceived self-efficacy for higher education and training,
perceived leadership, social network, perceived ICT tools and
technology, perceived
organizational rewards, perceived organizational climate and perceived
organizational trust. The paper explains the antecedents, relevance and
theoretical
applicability for the integration of the three theories in KS research
for HEIs. The finding of this study reveals that the proposed KS
research model seems better
compare to other existing KS research framework in HEIs in developing
countries. The study also reveals that the IS theories integration with
ICT technology can explain better for KS research. |
|
|
Full Text |
|
|
Title: |
Digital health informatics to monitor the quality of individual
placement and support model of supported employment (IPS-SE) services in
Malaysia |
Author (s): |
Bin Ismail Ishak, Normal Mat Jusoh, Jasmy Yunus and Abdul Kadir Abu
Bakar |
Abstract: |
There is overwhelming evidence which shows that individual placement and
support model of supported employment (IPS-SE) do help in the recovery
of mentally ill
clients. Presently, IPS-SE implementation is adhoc and non-integrated in
nature. Employment services are segregated. On such developmental
trajectory, it will be
difficult to sustain quality implementation of IPS-SE. This has
motivated the Director of Hospital Permai JB Johor to work with
Universiti Teknologi Malaysia (UTM)
Faculty of Computing to develop a system of digital health informatics
via Permai Virtual Hospital Network (DHI-PVHN). Using DHI-PVHN, it will
be possible to (a) have
a clear and current view of the impact of mental illness on labour force
activity, (b) effectively integrate vocational assistance with mental
treatment and care, (c)
produce accurate financial planning which will make implementation of
IPS-SE a sustainable endeavour, and (d) strengthen the intensity and the
continuity of
individualized help in IPS-SE. This paper describes the DHI-PVHN user
centred design pilot project carried out two years ago and describe the
criteria used and the
theory behind the use of the criteria. The pilot project has indicated
that Hospital Permai JB Johor and Hospital Alor Star Kedah have
implemented IPS-SE well. Success
in the implementation of IPS-SE depends on the relative potential
employment opportunity at the locality of the IPS-SE service provider.
It also depends on certain management constraints of the IPS-SE service provider. |
|
|
Full Text |
|
|
Title: |
Information technology capability as predictor of organizational
intelligence in Libyan oil and gas companies |
Author (s): |
Haryani Haron and Hadya S. Hawedi |
Abstract: |
The Libyan oil and gas companies are in dispersed locations, which
necessitate an efficient and effective management system to improve
their competitiveness. They
need to pool resources in the organization to create organizational
intelligence as to be competitive. Organizational intelligence is
organizational practices which
are influenced IT capability. The objective of the study is to
investigate how IT capability influences organizational intelligence in
the Libyan oil and gas
companies. A quantitative research method based on survey questionnaire
was used to collect numerical data that were statistically analyzed
using descriptive and
inferential statistics based on Statistical Package of Social Science (SPSS)
software and AMOS module. A total of 163 managers in the Libyan oil and
gas companies were
randomly selected as the respondents. The result of the analysis showed
that IT capability and organizational intelligence has a significant
correlation and a
predictor of OI with the value of p=0.05 and B=1.562. This study
contributes towards new knowledge through the insights from the role of
IT capability in influencing
organizational intelligence in the context of Libyan oil and gas
companies. The predictor’s model of IT capability contributes towards
better decision making where the oil and gas companies management can decide on their investment for
their companies in the future in order to increase their organizational
intelligence. |
|
|
Full Text |
|
|
Title: |
Website evaluation measures, website user engagement and website
credibility for municipal website |
Author (s): |
Farrah Diana Saiful Bahry, Maslin Masrom and Mohamad Noorman Masrek |
Abstract: |
This paper attempts to explore website evaluation measures specifically
for information driven website such Municipal electronic government
website toward website
credibility and user engagement. Despite overwhelming of information
source in online environment, the role of government website as a
prominent government information
provider becomes less preferred. Even, rapid development and continuous
assessment been done by the government bodies to enhance and make
utilize their website by the
users, issues such usability problem, low popularity ranking and less
user engagement still been reported. Therefore, the first part of this
article reviews on
existing assessment measures for websites done by scholars and also by
practitioners. Then, in the second part of this article presents some
finding on self evaluation
of ten municipal website around Klang valley, Malaysia in term of
popularity ranking and user engagement measure (bounce rate, Daily
Pageviews per Visitor, and Daily
Time on Site). Through related literatures reviewed, less study done
previously includes overall or multiple measures for evaluation of
information driven website.
Estimation result of popularity ranking and user engagement percentage
among municipal website also shows that there is still need some
improvement to make the gateway of Malaysia electronic government become more favorable and engaging. |
|
|
Full Text |
|
|
Title: |
A systematic literature review of factors influencing acceptance on
mixed reality technology |
Author (s): |
C. M. Y. Rasimah, M. Nurazean, M. D. Salwani, M. Z. Norziha and I.
Roslina |
Abstract: |
Mixed Reality (MR) is amongst the potential technologies that have
attracted attention recently. The MR environment is unique since it
combines real and virtual
objects, interactive in real time and registered in 3 dimension. Even
though proponents of MR put forward many advantages of MR, but there are
still lack of studies on
the users’ acceptance of the MR technology. Understanding the factors
influencing users’ acceptance on the MR technology especially in
education helps the developers
to produce useful MR applications. The aim of this study is to identify
the factors that determine users’ acceptance of MR application. A
Systematic Literature Review
(SLR) was carried since it uses a more rigorous and well-defined
approach to reviewing the research evidence relevant to the study.
Initially, 336 papers were
retrieved by a manual search in six databases and 26 primary studies
were finally included. Consequently, 27 factors were identified and
analyzed. The findings have
revealed that there are four types of factors that can be used to
examine the acceptance of MR: productivity-oriented; entertainment
dimensions; users personal background and overall system evaluation. |
|
|
Full Text |
|
|
Title: |
Decision neuroscience modeling of motivation for application in the
rehabilitation of people with mental disabilities |
Author (s): |
Bin Ismail Ishak, Normal Mat Jusoh, Jasmy Yunus and Abdul Kadir Abu
Bakar |
Abstract: |
Early this century, psychologists such as Linda Bartoshuk, Daniel
Kahneman, Elizabeth Loftus and George Miller started to contribute to
the cognitive school of
psychology by delving into learning, memory and judgment. This has
brought about the advancement of the field of decision neuro-science. In
fact, Daniel Kahneman won
the Nobel Prize in economics for his idea on psychological decision
making and a system based model of psychological motivation. Thus
studies on decision neuroscience
was born driving a new thinking in knowledge information system and
information system as a whole. Use of decision neuroscience concept is
needed to solve the problem
of conventional decision making theories in psychology as it has been
found to be inadequate to explain human decision making process to
predict selection of beliefs
or a course of action. This paper proposes a decision neuroscience model
(knowledge information system model) which has been named Positive
Affective Cognitive
Motivational State (PACMS) which can be used to predict decision making
process and motivational drive of mentally ill clients. The proposed
model emulates human
biological system. It provides better predictive abilities and performs
better than the decision making theory model first suggested by Roe,
Busemeyer and Townsend
[1]. Quantitative tests were carried out to investigate the outcome of
the proposed decision neuroscience model using the data from mentally
ill clients undergoing
supported employment under the care of Hospital Permai JB Johor
Malaysia. Two groups of mentally ill clients were compared. These groups
were selected according to
their responses of Action Decision Making Behaviour Selection (ADMBS)
and Spatial Attention Target Tracking Language Understanding (SATTLU).
The result has shown that
motivation in any human behaviour change can be explained in terms of
decision neuroscience by considering that motivation is a two part
process consisting of a
process of positive affective decision making followed by a cognitive
process. PACMS is a system model for decision making and motivation
which can be the basis of an
embedded system mountable on any knowledge information system. Further
work is ongoing to study how the excitation from the senses of touch,
ordor, sound and vision as well as the excitation from the eye, limbs and mouth can be used to
drive the Behaviour Planner which is responsible for making some form of
decision. |
|
|
Full Text |
|
|
Title: |
An improved density based k-Means algorithm |
Author (s): |
Kabiru Dalhatu and Alex Tze Hiang Sim |
Abstract: |
Clustering is a fundamental unsupervised data mining technique which is
loosely defined as a process of arranging data objects into clusters
based on similarity
measures, k-Means is one of the most renowned clustering algorithm used
across different domains, however k-Means suffers from multiple
limitations with its results
negatively affected by the presence of outliers. As a result of this
limitation, k-Means algorithm has a series of its improvement algorithms
among them is Outlier
Detection Based on Density Approach k-means algorithm (ODBD-k-Means
algorithm). Although this algorithm has better outlier detection
accuracy, different results was
given with different execution, this usually affect its clustering
accuracy. In this paper, an improved algorithm was proposed to overcome
the limitation of ODBD-k-Means algorithm. To denote the accuracy of the proposed Improved Density
Based k-means algorithm (IDB-k-Means algorithm), an evaluation test was
conducted using three different real-world datasets from UCI repository. Our experimental
results shows that IDB-k-Means algorithm outperformed ODBD-k-Means
algorithm in both the clustering and outlier detection accuracy. |
|
|
Full Text |
|
|
|
|
|
|