Displaying all 7 publications

Abstract:
Sort:
  1. Rasheed W, Neoh YY, Bin Hamid NH, Reza F, Idris Z, Tang TB
    Comput Biol Med, 2017 10 01;89:573-583.
    PMID: 28551109 DOI: 10.1016/j.compbiomed.2017.05.005
    Functional neuroimaging modalities play an important role in deciding the diagnosis and course of treatment of neuronal dysfunction and degeneration. This article presents an analytical tool with visualization by exploiting the strengths of the MEG (magnetoencephalographic) neuroimaging technique. The tool automates MEG data import (in tSSS format), channel information extraction, time/frequency decomposition, and circular graph visualization (connectogram) for simple result inspection. For advanced users, the tool also provides magnitude squared coherence (MSC) values allowing personalized threshold levels, and the computation of default model from MEG data of control population. Default model obtained from healthy population data serves as a useful benchmark to diagnose and monitor neuronal recovery during treatment. The proposed tool further provides optional labels with international 10-10 system nomenclature in order to facilitate comparison studies with EEG (electroencephalography) sensor space. Potential applications in epilepsy and traumatic brain injury studies are also discussed.
    Matched MeSH terms: Automatic Data Processing/methods*
  2. Kamaludin H, Mahdin H, Abawajy JH
    PLoS One, 2018;13(3):e0193951.
    PMID: 29565982 DOI: 10.1371/journal.pone.0193951
    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.
    Matched MeSH terms: Automatic Data Processing/methods
  3. Anisi MH, Abdullah AH, Razak SA, Ngadi MA
    Sensors (Basel), 2012 03 27;12(4):3964-96.
    PMID: 23443040 DOI: 10.3390/s120403964
    Recent years have witnessed a growing interest in deploying large populations of microsensors that collaborate in a distributed manner to gather and process sensory data and deliver them to a sink node through wireless communications systems. Currently, there is a lot of interest in data routing for Wireless Sensor Networks (WSNs) due to their unique challenges compared to conventional routing in wired networks. In WSNs, each data routing approach follows a specific goal (goals) according to the application. Although the general goal of every data routing approach in WSNs is to extend the network lifetime and every approach should be aware of the energy level of the nodes, data routing approaches may focus on one (or some) specific goal(s) depending on the application. Thus, existing approaches can be categorized according to their routing goals. In this paper, the main goals of data routing approaches in sensor networks are described. Then, the best known and most recent data routing approaches in WSNs are classified and studied according to their specific goals.
    Matched MeSH terms: Automatic Data Processing/methods*
  4. Onwuegbuzie IU, Abd Razak S, Fauzi Isnin I, Darwish TSJ, Al-Dhaqm A
    PLoS One, 2020;15(8):e0237154.
    PMID: 32797055 DOI: 10.1371/journal.pone.0237154
    Data prioritization of heterogeneous data in wireless sensor networks gives meaning to mission-critical data that are time-sensitive as this may be a matter of life and death. However, the standard IEEE 802.15.4 does not consider the prioritization of data. Prioritization schemes proffered in the literature have not adequately addressed this issue as proposed schemes either uses a single or complex backoff algorithm to estimate backoff time-slots for prioritized data. Subsequently, the carrier sense multiple access with collision avoidance scheme exhibits an exponentially increasing range of backoff times. These approaches are not only inefficient but result in high latency and increased power consumption. In this article, the concept of class of service (CS) was adopted to prioritize heterogeneous data (real-time and non-real-time), resulting in an optimized prioritized backoff MAC scheme called Class of Service Traffic Priority-based Medium Access Control (CSTP-MAC). This scheme classifies data into high priority data (HPD) and low priority data (LPD) by computing backoff times with expressions peculiar to the data priority class. The improved scheme grants nodes the opportunity to access the shared medium in a timely and power-efficient manner. Benchmarked against contemporary schemes, CSTP-MAC attained a 99% packet delivery ratio with improved power saving capability, which translates to a longer operational lifetime.
    Matched MeSH terms: Automatic Data Processing/methods*
  5. Hassan A, Ibrahim F
    J Digit Imaging, 2011 Apr;24(2):308-13.
    PMID: 20386951 DOI: 10.1007/s10278-010-9283-8
    This paper presents the development of kidney TeleUltrasound consultation system. The TeleUltrasound system provides an innovative design that aids the acquisition, archiving, and dissemination of medical data and information over the internet as its backbone. The system provides data sharing to allow remote collaboration, viewing, consultation, and diagnosis of medical data. The design is layered upon a standard known as Digital Imaging and Communication in Medicine (DICOM). The DICOM standard defines protocols for exchanging medical images and their associated data. The TeleUltrasound system is an integrated solution for retrieving, processing, and archiving images and providing data storage management using Structured Query Language (SQL) database. Creating a web-based interface is an additional advantage to achieve global accessibility of experts that will widely open the opportunity of greater examination and multiple consultations. This system is equipped with a high level of data security and its performance has been tested with white, black, and gray box techniques. And the result was satisfactory. The overall system has been evaluated by several radiologists in Malaysia, United Arab Emirates, and Sudan, the result is shown within this paper.
    Matched MeSH terms: Automatic Data Processing/methods*
  6. Ramlan EI, Zauner KP
    Biosystems, 2011 Jul;105(1):14-24.
    PMID: 21396427 DOI: 10.1016/j.biosystems.2011.02.006
    Despite an exponential increase in computing power over the past decades, present information technology falls far short of expectations in areas such as cognitive systems and micro robotics. Organisms demonstrate that it is possible to implement information processing in a radically different way from what we have available in present technology, and that there are clear advantages from the perspective of power consumption, integration density, and real-time processing of ambiguous data. Accordingly, the question whether the current silicon substrate and associated computing paradigm is the most suitable approach to all types of computation has come to the fore. Macromolecular materials, so successfully employed by nature, possess uniquely promising properties as an alternate substrate for information processing. The two key features of macromolecules are their conformational dynamics and their self-assembly capabilities. The purposeful design of macromolecules capable of exploiting these features has proven to be a challenge, however, for some groups of molecules it is increasingly practicable. We here introduce an algorithm capable of designing groups self-assembling of nucleic acid molecules with multiple conformational states. Evaluation using natural and artificially designed nucleic acid molecules favours this algorithm significantly, as compared to the probabilistic approach. Furthermore, the thermodynamic properties of the generated candidates are within the same approximation as the customised trans-acting switching molecules reported in the laboratory.
    Matched MeSH terms: Automatic Data Processing/methods*
  7. Kamel NS, Sayeed S, Ellis GA
    IEEE Trans Pattern Anal Mach Intell, 2008 Jun;30(6):1109-13.
    PMID: 18421114 DOI: 10.1109/TPAMI.2008.32
    Utilizing the multiple degrees of freedom offered by the data glove for each finger and the hand, a novel on-line signature verification system using the Singular Value Decomposition (SVD) numerical tool for signature classification and verification is presented. The proposed technique is based on the Singular Value Decomposition in finding r singular vectors sensing the maximal energy of glove data matrix A, called principal subspace, so the effective dimensionality of A can be reduced. Having modeled the data glove signature through its r-principal subspace, signature authentication is performed by finding the angles between the different subspaces. A demonstration of the data glove is presented as an effective high-bandwidth data entry device for signature verification. This SVD-based signature verification technique is tested and its performance is shown to be able to recognize forgery signatures with a false acceptance rate of less than 1.2%.
    Matched MeSH terms: Automatic Data Processing/methods*
Filters
Contact Us

Please provide feedback to Administrator ([email protected])

External Links