Displaying publications 41 - 60 of 753 in total

Abstract:
Sort:
  1. Govindasamy P, Del Carmen Salazar M, Lerner J, Green KE
    Front Psychol, 2019;10:1363.
    PMID: 31258502 DOI: 10.3389/fpsyg.2019.01363
    This manuscript reports results of an empirical assessment of a newly developed measure designed to assess apprentice teaching proficiency. In this study, Many Facets Rasch model software was used to evaluate the psychometric quality of the Framework for Equitable and Effective Teaching (FEET), a rater-mediated assessment. The analysis focused on examining variability in (1) supervisor severity in ratings, (2) level of item difficulty, (3) time of assessment, and (4) teacher apprentice proficiency. Added validity evidence showed moderate correlation with self-reports of apprentice teaching. The findings showed support for the FEET as yielding reliable ratings with a need for added rater training.
    Matched MeSH terms: Software
  2. Ong TS, Lee AS, Latif B, Sroufe R, Sharif A, Heng Teh B
    Environ Sci Pollut Res Int, 2023 Mar;30(11):31711-31726.
    PMID: 36454525 DOI: 10.1007/s11356-022-24280-2
    Consistent with the worldwide call to combat environmental degradation concerns and advance sustainable development, there is increasing pressure on organizations to ensure organizational strategies include green initiatives. In this regard, environmental strategic focus is a relevant concept for scholars and business leaders. Underpinned by dynamic capability and stakeholder theory, the present study hypothesizes that ESF derives environmental performance, coordinated by mediating role of green shared vision that strategic environmental planning and decision making. Additionally, the current study employed ISO 14001 and technological capability as moderators between ESF and the green shared vision link. Methodologically, the data for this study was collected from 162 senior managerial officials working in EMS 14,001-accredited manufacturing firms in Malaysia. The data were analyzed with the AMOS 23 software to perform covariance-based structural equation modeling (CB-SEM), and then hierarchical regression analysis and moderated-mediation analysis were applied with SPSS 25. The findings confirmed that ESF is positively linked to environmental performance. The results validate that green shared vision acts as a positive mediator between ESF and environmental performance, in which the creation and sharing of knowledge embedded in a green shared vision serve as enablers to create higher environmental performance. The current study also validates a significant moderating role of ISO 14001 and technological capability between ESF and green shared vision. The study confirms how environmental strategies are integrated into environmental management processes that can serve as a source of dynamic capabilities.
    Matched MeSH terms: Software
  3. Woon LS, Mohd Daud TI, Tong SF
    BMC Med Educ, 2023 Nov 09;23(1):851.
    PMID: 37946151 DOI: 10.1186/s12909-023-04834-9
    BACKGROUND: At the Faculty of Medicine of the National University of Malaysia, a virtual patient software program, DxR Clinician, was utilised for the teaching of neurocognitive disorder topics during the psychiatry posting of undergraduate medical students in a modified team-based learning (TBL) module. This study aimed to explore medical students' learning experiences with virtual patient.

    METHODS: Ten students who previously underwent the learning module were recruited through purposive sampling. The inclusion criteria were: (a) Fourth-year medical students; and (b) Completed psychiatry posting with the new module. Students who dropped out or were unable to participate in data collection were excluded. Two online focus group discussions (FGDs) with five participants each were conducted by an independent facilitator, guided by a questioning route. The data were transcribed verbatim and coded using the thematic analysis approach to identify themes.

    RESULTS: Three main themes of their learning experience were identified: (1) fulfilment of the desired pedagogy (2), realism of the clinical case, and (3) ease of use related to technical settings. The pedagogy theme was further divided into the following subthemes: level of entry for students, flexibility of presentation of content, provision of learning guidance, collaboration with peers, provision of feedback, and assessment of performance. The realism theme had two subthemes: how much the virtual patient experience mimicked an actual patient and how much the case scenario reflected real conditions in the Malaysian context. The technical setting theme entailed two subthemes: access to the software and appearance of the user interface. The study findings are considered in the light of learning formats, pedagogical and learning theories, and technological frameworks.

    CONCLUSIONS: The findings shed light on both positive and negative aspects of using virtual patients for medical students' psychiatry posting, which opens room for further improvement of their usage in undergraduate psychiatry education.

    Matched MeSH terms: Software
  4. Sayeed S, Ahmad AF, Peng TC
    F1000Res, 2022;11:17.
    PMID: 38269303 DOI: 10.12688/f1000research.73613.1
    The Internet of Things (IoT) is leading the physical and digital world of technology to converge. Real-time and massive scale connections produce a large amount of versatile data, where Big Data comes into the picture. Big Data refers to large, diverse sets of information with dimensions that go beyond the capabilities of widely used database management systems, or standard data processing software tools to manage within a given limit. Almost every big dataset is dirty and may contain missing data, mistyping, inaccuracies, and many more issues that impact Big Data analytics performances. One of the biggest challenges in Big Data analytics is to discover and repair dirty data; failure to do this can lead to inaccurate analytics results and unpredictable conclusions. We experimented with different missing value imputation techniques and compared machine learning (ML) model performances with different imputation methods. We propose a hybrid model for missing value imputation combining ML and sample-based statistical techniques. Furthermore, we continued with the best missing value inputted dataset, chosen based on ML model performance for feature engineering and hyperparameter tuning. We used k-means clustering and principal component analysis. Accuracy, the evaluated outcome, improved dramatically and proved that the XGBoost model gives very high accuracy at around 0.125 root mean squared logarithmic error (RMSLE). To overcome overfitting, we used K-fold cross-validation.
    Matched MeSH terms: Software
  5. Naher H, Abdullah FA, Akbar MA
    PLoS One, 2013;8(5):e64618.
    PMID: 23741355 DOI: 10.1371/journal.pone.0064618
    The generalized and improved (G'/G)-expansion method is a powerful and advantageous mathematical tool for establishing abundant new traveling wave solutions of nonlinear partial differential equations. In this article, we investigate the higher dimensional nonlinear evolution equation, namely, the (3+1)-dimensional modified KdV-Zakharov-Kuznetsev equation via this powerful method. The solutions are found in hyperbolic, trigonometric and rational function form involving more parameters and some of our constructed solutions are identical with results obtained by other authors if certain parameters take special values and some are new. The numerical results described in the figures were obtained with the aid of commercial software Maple.
    Matched MeSH terms: Software*
  6. Yang TY, Dehghantanha A, Choo KK, Muda Z
    PLoS One, 2016;11(3):e0150300.
    PMID: 26982207 DOI: 10.1371/journal.pone.0150300
    Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files.
    Matched MeSH terms: Software*
  7. Idbeaa T, Abdul Samad S, Husain H
    PLoS One, 2016;11(3):e0150732.
    PMID: 26963093 DOI: 10.1371/journal.pone.0150732
    This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.
    Matched MeSH terms: Software*
  8. Lim YC, Cheong SK
    Malays J Pathol, 1992 Jun;14(1):13-7.
    PMID: 1469912
    A system for computerising histopathology records developed in-house using dBASE IV on IBM-compatible microcomputers in a local area network is described. The software package uses a horizontal main menu bar with associated pull-down submenus as interface between the machine and the user. It is very easy to use. The package provides options for selecting databases by years, entering/editing records, browsing data, making multi-characteristics searches/retrievals, printing data, and maintaining databases that includes backing-up and repairing corrupted databases.
    Matched MeSH terms: Software*
  9. Mohamad Arif J, Ab Razak MF, Awang S, Tuan Mat SR, Ismail NSN, Firdaus A
    PLoS One, 2021;16(9):e0257968.
    PMID: 34591930 DOI: 10.1371/journal.pone.0257968
    The evolution of malware is causing mobile devices to crash with increasing frequency. Therefore, adequate security evaluations that detect Android malware are crucial. Two techniques can be used in this regard: Static analysis, which meticulously examines the full codes of applications, and dynamic analysis, which monitors malware behaviour. While both perform security evaluations successfully, there is still room for improvement. The goal of this research is to examine the effectiveness of static analysis to detect Android malware by using permission-based features. This study proposes machine learning with different sets of classifiers was used to evaluate Android malware detection. The feature selection method in this study was applied to determine which features were most capable of distinguishing malware. A total of 5,000 Drebin malware samples and 5,000 Androzoo benign samples were utilised. The performances of the different sets of classifiers were then compared. The results indicated that with a TPR value of 91.6%, the Random Forest algorithm achieved the highest level of accuracy in malware detection.
    Matched MeSH terms: Software*
  10. Khalid H, Mekhilef S, Siddique MD, Wahyudie A, Ahmed M, Seyedmahmoudian M, et al.
    PLoS One, 2023;18(1):e0277331.
    PMID: 36638108 DOI: 10.1371/journal.pone.0277331
    Most silicon carbide (SiC) MOSFET models are application-specific. These are already defined by the manufacturers and their parameters are mostly partially accessible due to restrictions. The desired characteristic of any SiC model becomes highly important if an individual wants to visualize the impact of changing intrinsic parameters as well. Also, it requires a model prior knowledge to vary these parameters accordingly. This paper proposes the parameter extraction and its selection for Silicon Carbide (SiC) power N-MOSFET model in a unique way. The extracted parameters are verified through practical implementation with a small-scale high power DC-DC 5 to 2.5 output voltage buck converter using both hardware and software emphasis. The parameters extracted using the proposed method are also tested to verify the static and dynamic characteristics of SiC MOSFET. These parameters include intrinsic, junction and overlapping capacitance. The parameters thus extracted for the SiC MOSFET are analyzed by device performance. This includes input, output transfer characteristics and transient delays under different temperature conditions and loading capabilities. The simulation and experimental results show that the parameters are highly accurate. With its development, researchers will be able to simulate and test any change in intrinsic parameters along with circuit emphasis.
    Matched MeSH terms: Software*
  11. Iqbal J, Ahmad RB, Khan M, Fazal-E-Amin, Alyahya S, Nizam Nasir MH, et al.
    PLoS One, 2020;15(4):e0229785.
    PMID: 32271783 DOI: 10.1371/journal.pone.0229785
    Software development outsourcing is becoming more and more famous because of the advantages like cost abatement, process enhancement, and coping with the scarcity of needed resources. Studies confirm that unfortunately a large proportion of the software development outsourcing projects fails to realize anticipated benefits. Investigations into the failures of such projects divulge that in several cases software development outsourcing projects are failed because of the issues that are associated with requirements engineering process. The objective of this study is the identification and the ranking of the commonly occurring issues of the requirements engineering process in the case of software development outsourcing. For this purpose, contemporary literature has been assessed rigorously, issues faced by practitioners have been identified and three questionnaire surveys have been organized by involving experienced software development outsourcing practitioners. The Delphi technique, cut-off value method and 50% rule have also been employed. The study explores 150 issues (129 issues from literature and 21 from industry) of requirements engineering process for software development outsourcing, groups the 150 issues into 7 identified categories and then extricates 43 customarily or commonly arising issues from the 150 issues. Founded on 'frequency of occurrence' the 43 customarily arising issues have been ranked with respect to respective categories (category-wise ranking) and with respect to all the categories (overall ranking). Categories of the customarily arising issues have also been ranked. The issues' identification and ranking contribute to design proactive software project management plan for dealing with software development outsourcing failures and attaining conjectured benefits of the software development outsourcing.
    Matched MeSH terms: Software*
  12. Mohamed Moubark A, Ali SH
    ScientificWorldJournal, 2014;2014:107831.
    PMID: 25197687 DOI: 10.1155/2014/107831
    This paper presents a new practical QPSK receiver that uses digitized samples of incoming QPSK analog signal to determine the phase of the QPSK symbol. The proposed technique is more robust to phase noise and consumes up to 89.6% less power for signal detection in demodulation operation. On the contrary, the conventional QPSK demodulation process where it uses coherent detection technique requires the exact incoming signal frequency; thus, any variation in the frequency of the local oscillator or incoming signal will cause phase noise. A software simulation of the proposed design was successfully carried out using MATLAB Simulink software platform. In the conventional system, at least 10 dB signal to noise ratio (SNR) is required to achieve the bit error rate (BER) of 10(-6), whereas, in the proposed technique, the same BER value can be achieved with only 5 dB SNR. Since some of the power consuming elements such as voltage control oscillator (VCO), mixer, and low pass filter (LPF) are no longer needed, the proposed QPSK demodulator will consume almost 68.8% to 99.6% less operational power compared to conventional QPSK demodulator.
    Matched MeSH terms: Software*
  13. Doroodgar F, Abdur Razzaque M, Isnin IF
    Sensors (Basel), 2014;14(3):5004-40.
    PMID: 24618781 DOI: 10.3390/s140305004
    Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.
    Matched MeSH terms: Software*
  14. Firdaus-Raih M, Hamdani HY, Nadzirin N, Ramlan EI, Willett P, Artymiuk PJ
    Nucleic Acids Res, 2014 Jul;42(Web Server issue):W382-8.
    PMID: 24831543 DOI: 10.1093/nar/gku438
    Hydrogen bonds are crucial factors that stabilize a complex ribonucleic acid (RNA) molecule's three-dimensional (3D) structure. Minute conformational changes can result in variations in the hydrogen bond interactions in a particular structure. Furthermore, networks of hydrogen bonds, especially those found in tight clusters, may be important elements in structure stabilization or function and can therefore be regarded as potential tertiary motifs. In this paper, we describe a graph theoretical algorithm implemented as a web server that is able to search for unbroken networks of hydrogen-bonded base interactions and thus provide an accounting of such interactions in RNA 3D structures. This server, COGNAC (COnnection tables Graphs for Nucleic ACids), is also able to compare the hydrogen bond networks between two structures and from such annotations enable the mapping of atomic level differences that may have resulted from conformational changes due to mutations or binding events. The COGNAC server can be accessed at http://mfrlab.org/grafss/cognac.
    Matched MeSH terms: Software*
  15. Falatoonitoosi E, Ahmed S, Sorooshian S
    ScientificWorldJournal, 2014;2014:103846.
    PMID: 24693224 DOI: 10.1155/2014/103846
    Decision-Making Trial and Evaluation Laboratory (DEMATEL) methodology has been proposed to solve complex and intertwined problem groups in many situations such as developing the capabilities, complex group decision making, security problems, marketing approaches, global managers, and control systems. DEMATEL is able to realize casual relationships by dividing important issues into cause and effect group as well as making it possible to visualize the casual relationships of subcriteria and systems in the course of casual diagram that it may demonstrate communication network or a little control relationships between individuals. Despite of its ability to visualize cause and effect inside a network, the original DEMATEL has not been able to find the cause and effect group between different networks. Therefore, the aim of this study is proposing the expanded DEMATEL to cover this deficiency by new formulations to determine cause and effect factors between separate networks that have bidirectional direct impact on each other. At the end, the feasibility of new extra formulations is validated by case study in three numerical examples of green supply chain networks for an automotive company.
    Matched MeSH terms: Software*
  16. Khalid R, Nawawi MK, Kawsar LA, Ghani NA, Kamil AA, Mustafa A
    PLoS One, 2013;8(4):e58402.
    PMID: 23560037 DOI: 10.1371/journal.pone.0058402
    M/G/C/C state dependent queuing networks consider service rates as a function of the number of residing entities (e.g., pedestrians, vehicles, and products). However, modeling such dynamic rates is not supported in modern Discrete Simulation System (DES) software. We designed an approach to cater this limitation and used it to construct the M/G/C/C state-dependent queuing model in Arena software. Using the model, we have evaluated and analyzed the impacts of various arrival rates to the throughput, the blocking probability, the expected service time and the expected number of entities in a complex network topology. Results indicated that there is a range of arrival rates for each network where the simulation results fluctuate drastically across replications and this causes the simulation results and analytical results exhibit discrepancies. Detail results that show how tally the simulation results and the analytical results in both abstract and graphical forms and some scientific justifications for these have been documented and discussed.
    Matched MeSH terms: Software*
  17. Shardiwal RK, Sohrab SS
    Int J Bioinform Res Appl, 2010;6(3):223-9.
    PMID: 20615831
    Relative Synonymous Codon Usage (RSCU) and Relative Adaptiveness of a Codon (RAC) table bias importance in gene expression are well documented in the literature. However, to improve the gene expression we need to figure out which codons are optimal for the expression in order to synthesise an appropriate DNA sequence. An alternative to the manual approach, which is obviously a tedious task, is to set up software on your computer to perform this. Though such kinds of programs are available on the internet, none of them are open-source libraries. Here, one can use our Perl program to do his or her task more easily and efficiently. It is free for everyone.
    Matched MeSH terms: Software*
  18. Babar MI, Ghazali M, Jawawi DN, Bin Zaheer K
    PLoS One, 2015;10(3):e0121344.
    PMID: 25799490 DOI: 10.1371/journal.pone.0121344
    Value-based requirements engineering plays a vital role in the development of value-based software (VBS). Stakeholders are the key players in the requirements engineering process, and the selection of critical stakeholders for the VBS systems is highly desirable. Based on the stakeholder requirements, the innovative or value-based idea is realized. The quality of the VBS system is associated with the concrete set of valuable requirements, and the valuable requirements can only be obtained if all the relevant valuable stakeholders participate in the requirements elicitation phase. The existing value-based approaches focus on the design of the VBS systems. However, the focus on the valuable stakeholders and requirements is inadequate. The current stakeholder identification and quantification (SIQ) approaches are neither state-of-the-art nor systematic for the VBS systems. The existing approaches are time-consuming, complex and inconsistent which makes the initiation process difficult. Moreover, the main motivation of this research is that the existing SIQ approaches do not provide the low level implementation details for SIQ initiation and stakeholder metrics for quantification. Hence, keeping in view the existing SIQ problems, this research contributes in the form of a new SIQ framework called 'StakeMeter'. The StakeMeter framework is verified and validated through case studies. The proposed framework provides low-level implementation guidelines, attributes, metrics, quantification criteria and application procedure as compared to the other methods. The proposed framework solves the issues of stakeholder quantification or prioritization, higher time consumption, complexity, and process initiation. The framework helps in the selection of highly critical stakeholders for the VBS systems with less judgmental error.
    Matched MeSH terms: Software*
  19. Abu Hassan MA, Kamaruddin MI, Pharo HJ
    Acta Vet Scand Suppl, 1988;84:110-2.
    PMID: 3232593
    Matched MeSH terms: Software*
  20. Mohi-Aldeen SM, Mohamad R, Deris S
    PLoS One, 2020;15(11):e0242812.
    PMID: 33253281 DOI: 10.1371/journal.pone.0242812
    Path testing is the basic approach of white box testing and the main approach to solve it by discovering the particular input data of the searching space to encompass the paths in the software under test. Due to the increasing software complexity, exhaustive testing is impossible and computationally not feasible. The ultimate challenge is to generate suitable test data that maximize the coverage; many approaches have been developed by researchers to accomplish path coverage. The paper suggested a hybrid method (NSA-GA) based on Negative Selection Algorithm (NSA) and Genetic Algorithm (GA) to generate an optimal test data avoiding replication to cover all possible paths. The proposed method modifies the generation of detectors in the generation phase of NSA using GA, as well as, develops a fitness function based on the paths' prioritization. Different benchmark programs with different data types have been used. The results show that the hybrid method improved the coverage percentage of the programs' paths, even for complicated paths and its ability to minimize the generated number of test data and enhance the efficiency even with the increased input range of different data types used. This method improves the effectiveness and efficiency of test data generation and maximizes search space area, increasing percentage of path coverage while preventing redundant data.
    Matched MeSH terms: Software*
Filters
Contact Us

Please provide feedback to Administrator ([email protected])

External Links