waidah ismail - Academia.edu (original) (raw)
Papers by waidah ismail
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)
This paper highlighted a prediction scoring of difficulty modes in Medical Interactive Recovery A... more This paper highlighted a prediction scoring of difficulty modes in Medical Interactive Recovery Assistant (MIRA) exergames based on Kinect-based Rehabilitation Gaming System (RGS) for rehabilitation patients. The case study uses 19 rehabilitation patients with different lower limb limitations caused by stroke, traumatic brain injury (TBI) and spinal cord injury (SCI). MIRA exergames consists of three difficulty modes which are easy, medium and hard. Currently, physiotherapist will decide on difficulty mode based on the patients’ improvement and most of the time they will used the default setting for every patient playing exergames. Thus, this study proposed a new prediction scoring using k-means clustering algorithm to help suggesting the difficulty mode of the game. K-means clustering also is used to find the benchmarks of the patients’ history. The performance of the K-Mean algorithm is to make sure the patients are comfortable with their weakness side as suggested.
2017 International Conference on Research and Innovation in Information Systems (ICRIIS), 2017
This paper proposes an organization's perspective of the business-to-customer (B2C) e-Commerc... more This paper proposes an organization's perspective of the business-to-customer (B2C) e-Commerce system implementation framework in Malaysian fashion and apparel business. The framework was developed based upon two in-depth case studies which were conducted in two fashion and apparel business in Malaysia. From the cross-cases, ten implementation factors (with its characteristics) that pertinent to the stages of Kotter's model have emerged. This includes factors of financial structure, e-Commerce compatibility, marketing strategy, customer analysis, e-Commerce relative advantages, rewards, e-Commerce maintenance, employee training, and e-Commerce re-engineering. Additionally, three implementation actors - e-Commerce champion, system moderator and vendor, involved in the respective stages of the implementation process. Finding of this study suggests that all the ten factors and the three implementation actors are the ingredients that organizations should not be overlooked when B...
Journal of theoretical and applied information technology, 2016
Taking into consideration a complexity of EDMS implementation process which involves a combinatio... more Taking into consideration a complexity of EDMS implementation process which involves a combination of technological, organizational and users factors, this study explores how EDMS implementation factors can be ranked through these dimensions. This paper begins with an examination of the literature on EDMS implementation studies where a conceptual framework has been derived. The study then adopts the TOPSIS method as the analytical tool that tackles the issue in prioritizing the most desirable factors influencing EDMS implementation project. From the results, the top management support, budgetary, strategic planning, staff training, awareness, resistance to change, IT implementation team, ICT infrastructure, security and privacy/trust, and collaboration are the top-ten important factors for Iraqi government organizations to implement EDMS applications. This paper draws on the research results for implications of IT managerial practice, and then suggests some empirical tactics in orde...
IntelliRehabDS: a physical rehabilitation movements dataset This dataset contains 3D skeleton joi... more IntelliRehabDS: a physical rehabilitation movements dataset This dataset contains 3D skeleton joints positions of 15 patients and 14 healthy persons while performing a few simple exercises. The data was recorded using a Kinect Sensor. Each exercise has been annotated with the movement type along with a label showing if the movement was executed correctly or not. The annotations were carried out independently by two annotators. The dataset is presented as a collection of .csv files, where each file represents one exercise performed by one person. The nomenclature of the files is the following: SubjectID_DateID_GestureLabel_RepetitionNumber_CorrectLabel_Position.txt SubjectID: id uniquely identifying the person performing the exercise DateID: id identifying the session in which the person was recorded GestureLabel: Label identifying the gesture; possible values are from 0 to 8 RepetitionNumber: Each gesture was repeated several times and this shows the repetition number CorrectLabel: ...
Journal of Telecommunication, Electronic and Computer Engineering, 2018
ISO 27001:2013 is the best-known standard providing requirements for information security managem... more ISO 27001:2013 is the best-known standard providing requirements for information security management systems (ISMS). An ISMS is a systematic approach to manage sensitive information through people, processes and IT systems. In a hospital, a patient's individual medical record is highly private and sensitive. This study performed qualitative questionnaire based on the ISO27001:2013 policy. Seven hospitals in Malaysia were involved in this study. This study focus on the Data Center as it contains a high risk server. This study reveals the non-compliance issues among the sampled hospitals in Malaysia. The participation of the hospitals in trainings related to information security awareness and education were still not adequate due to lack of support from the top management. The Malaysian Administrative Modernisation and Management Planning Unit (MAMPU), the Ministry of Health Malaysia and the top management in hospitals in Malaysia play vital roles to educate and ensure the complia...
BACKGROUND Rehabilitation is a term used to describe a range of responses in disabilities that im... more BACKGROUND Rehabilitation is a term used to describe a range of responses in disabilities that improve quality of life. Nowadays, one of the new treatments in rehabilitation is assistive technology by using serious games. This treatment can be a success with sophisticated technologies such as simulators, robotics, and virtual reality OBJECTIVE Meanwhile, motivation and usability are two important factors that focus on user experience. Previous studies suggested that attention, relevance, confidence, and satisfaction for motivation and ease of use, learnability, memorability, and satisfaction for usability are the important attributes for user experience in serious games. The first stage of identifying the user experience model is by exploring the motivation and usability factors that influence serious games for rehabilitation. There are eight relationships that come from eight different attributes in motivation and usability factors of user experience in serious games. METHODS This ...
PLOS ONE, 2018
Image registration of remotely sensed imagery is challenging, as complex deformations are common.... more Image registration of remotely sensed imagery is challenging, as complex deformations are common. Different deformations, such as affine and homogenous transformation, combined with multimodal data capturing can emerge in the data acquisition process. These effects, when combined, tend to compromise the performance of the currently available registration methods. A new image transform, known as geometric mean projection transform, is introduced in this work. As it is deformation invariant, it can be employed as a feature descriptor, whereby it analyzes the functions of all vertical and horizontal signals in local areas of the image. Moreover, an invariant feature correspondence method is proposed as a point matching algorithm, which incorporates new descriptor's dissimilarity metric. Considering the image as a signal, the proposed approach utilizes a square Eigenvector correlation (SEC) based on the Eigenvector properties. In our experiments on standard test images sourced from "Featurespace" and "IKONOS" datasets, the proposed method achieved higher average accuracy relative to that obtained from other state of the art image registration techniques. The accuracy of the proposed method was assessed using six standard evaluation metrics. Furthermore, statistical analyses, including t-test and Friedman test, demonstrate that the method developed as a part of this study is superior to the existing methods.
International Journal of Engineering & Technology, 2018
Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental ... more Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens. The main challenges that face the acceptance and adoption of mobile governmental applications are the privacy and security issues. The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services. This study focuses in investigating the security and privacy requirements of mobile government applications. Many related works are reviewed and discussed to understand the important security requirements of mobile government applications. The main results indicate that effective privacy and security of mobile government applications should be assured so as to enhance the level of adopting and using these applications. The security requirements involve many c...
Advanced Science Letters, 2017
Every now and then, our lives are influenced by the development of technologies and this had chan... more Every now and then, our lives are influenced by the development of technologies and this had changed the perception of business in several ways. Now the world is focusing on wireless devices that can be developed to have exchange of data either using internet or not. Near Field Communication (NFC) is one of the devices that has the capability to securely exchange data with its paired devices and Radio-Frequency Identification (RFID) is developed to broadcast a unique identifying number upon request. This paper concentrates on the security element in the NFC and RFID in the implementation of NFC technology in blood transfusion; to solve the problems of human error and to avoid from transfusing different blood types than the ones actually needed by the patient. The information in the wrist tag should be synchronized with the current hospital system. This NFC technology is also for reducing the use of paper-based documents, consequently promoting green technology. As a result, choosing the NFC or RFID based on the security features is very important for patient identification as well as moving towards green technology.
2016 World Automation Congress (WAC), 2016
Leukemia is a cancer of white blood cells that affect the blood forming cells in the body. Acute ... more Leukemia is a cancer of white blood cells that affect the blood forming cells in the body. Acute Myeloid Leukemia (AML) is a form of leukemia and are caused by replacement of normal bone marrows with leukemic cells, which cause a drop in red blood cells, platelets, and normal white blood cells. Early classification of the subtype of AML cells is necessary for proper treatment management. We classify the subtype based on the features of AML cells, which include the nuclei and cytoplasm. In this paper, we developed an automate method for the nuclei and cytoplasm detection from the blood cells images that are captured as microscope images. In contrast to other methods that focus on identifying the nuclei, we proposed a method based on the color conversion, intensity threshold and gradient magnitude. Our method detected both the nuclei and the cytoplasm at the same time. We test our method on 301 images, which contain 643 AML cells. The accuracy of both nuclei and cytoplasm detection is over 82.9% (increase 17% when was compared with the existent method).
2016 World Automation Congress (WAC), 2016
Panoramic radiographs or dental X-rays are still a prominent tool used by the dentists for dental... more Panoramic radiographs or dental X-rays are still a prominent tool used by the dentists for dental diagnosis. Accurate segmentation and reconstruction of each tooth from panoramic radiographs can play very significant role in early diagnosis and treatment that helps physicians to make a better decision. Panoramic radiographs contain regions outside of the jaw, which make segmentation of teeth very time consuming and complex. Automatic segmentation of jaw is necessary to avoid such complexity and to reduce time. Due to the absence of substantial difference of pixel intensity between different structures and absence of strong edges in panoramic radiographs, segmentation of jaw is still perplexing. In this paper, we use the gradient information to segment the jaw regardless of the position and size of the jaw. Our algorithm for segmentation of jaw has four steps: k-means clustering, detection of points around the jaw (proposed), gradient vector flow (GVF) snakes and correction by making the shape of the segmented area oval. K-means clustering followed by thresholding and detection of points around the jaw (proposed) is used to find suitable points for initialization of the GVF snakes. Then, GVF snakes are initialized with the detected points to segment the jaw. Finally, correction is performed by making the shape of the segmented area oval.
International Journal for Digital Society, 2014
In today's Information and Communication Technology (ICT) environment and with current global eco... more In today's Information and Communication Technology (ICT) environment and with current global economics, Business Continuity Management (BCM) becomes a crucial requirement to the organization. BCM is a managerial activity that identifies potential impacts to the organization caused by the threats. However, BCM is only gets the attention when it is demanded by the regulatory compliance or the stakeholders or customers. The implementation of BCM not only involves the information technology (IT) department, but also the business areas that use the IT services. Therefore, this paper aims to explore and identify the success factors on the execution of business continuity management in the organization particularly in Malaysia. In this study, quantitative analysis has been used to explore the organization employee's view and the importance of these factors towards the successful execution of BCM to the organizations.
BACKGROUND Stroke is one of the leading causes of death and long-term disability worldwide. The p... more BACKGROUND Stroke is one of the leading causes of death and long-term disability worldwide. The primary goal of post-stroke rehabilitation is to maximize the independence of the affected individuals by facilitating both neurological and compensatory functional recoveries in their daily lives. OBJECTIVE The research objective finding the best games settings for MIRA. METHODS This paper presents an integrated study, using multiple linear regression (MLR) and whale optimization algorithm, for optimizing the post-stroke rehabilitation performance using Medical Interactive Rehabilitation Assistant (MIRA). RESULTS Results demonstrated that the developed MLR models for average acceleration and distance were significant, with P=0.018 and P<0.000, respectively. Data from 41 stroke patients revealed that the maximum muscle strength that can be achieved was 2.56 cm/s2 while the maximum distance was 104.83 cm. The results showed that all patients outperformed the optimal average acceleration...
Journal of Software, 2015
International Journal of Scientific & Technology Research, 2015
Database era has been appear during Prophet Muhammad S.A.W. We are using the same concept but onl... more Database era has been appear during Prophet Muhammad S.A.W. We are using the same concept but only deployed in the medical environment with security features which is related to aqli and naqli. The development of a system not only covered the abi lity of the system to be functioned and execute very well but a good and efficient system must be able to communicate with the users and become a user friendly system. This research is about developing Hospital Patient Information System developed for Hematology Ward and Hemato-oncology Laboratory at the Hospital UniversitiSains Malaysia (HUSM) based on the aqli and naqli. It lacks of security in term of data integrity of the system. It will be enhanced in its security features which will be implemented with the data integrity feature and also password encryption to overcome the problems. As a result, an automated calculation of blood series and graph production as for data analysis will be implemented in this system.An approach of agile me...
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS), 2019
Telerehabilitation or known as TeleRehab offers better cost-effectiveness in healthcare service d... more Telerehabilitation or known as TeleRehab offers better cost-effectiveness in healthcare service delivery over distance for patients with disabilities. Most of the TeleRehab studies focused on its benefits, applications, and methods in delivering services. However, there is still a limited number of studies discussing the significance of success/failure factors that influence the healthcare personnel for TeleRehab. The identification of these factors that affect TeleRehab may avert project failure. A systematic review was conducted from five digital databases including ScienceDirect, Scopus, IEEE, Springer, and PubMed. The manual type of searching also conducted. There are 1283 of total potential papers were identified. 735 papers have gone through the inclusive and exclusive criteria, and quality assessment process which leaves 12 papers for further review. The result shows that there are three success factors and nine failure factors that can be considered as important. The success...
Journal of theoretical and applied information technology, 2015
In this paper, classification of brainwave using real world data from Parkinson’s patients is pre... more In this paper, classification of brainwave using real world data from Parkinson’s patients is presented. Emotional model is produced from the classification of brainwave. Electroencephalograph (EEG) signal is recorded on eleven Parkinson’s patients. This paper aim to find the “best” classification for the emotional model in brainwave patterns for the Parkinson’s disease. The work performed based on the two method phases which are using the raw data and preprocessing data. In each of the method, we performed for steps in the sum of the hertz and divided by total hertz. In the pre-processing data we are using statistic mean and standard deviation. We used WEKA Application for the classification with 11 fold validation. As a results, implecart from the classification tree performed the “best” classification for the emotional model for Parkinson Patients. The Simplecart classification result is 84.42% accuracy.
2021 IEEE Symposium on Computers & Informatics (ISCI)
2019 International Conference on Data Mining Workshops (ICDMW), 2019
One of the classical problems in computer vision is the automatic identification of different ges... more One of the classical problems in computer vision is the automatic identification of different gestures or motions from a sequence of frames, captured via cameras or sensors, that usually contain angles or positions of many body joints. A large body of research addressing this problem exists in the literature. However, an interesting variant is not just to identify the gesture, but to decide whether a certain gesture is correctly or incorrectly executed. This can be in the context of physical exercises for rehabilitation in healthcare, robotics, sports, sign language and more. In this work we present our research on the automatic classification of gestures into correct or incorrect categories using the following three different but powerful techniques: convolutional neural networks (CNNs), long short-term memory (LSTM) neural networks and a technique based on rough path theory to extract unique sequences (i.e. path signatures) from gesture data and to use them as inputs to classical ...
Introduction This project focuses mainly on System Development Life Cycle Methodology on how to d... more Introduction This project focuses mainly on System Development Life Cycle Methodology on how to develop software that using the principles in the System Development Life Cycle. In stage of system analysis, we use the Unified Modelling Language (UML). This system provides additional functions like keeping a historical database for future and using GSM Modem as interface to the system for fast communication between the support and the help desk coordinator. Through implementing the system that records the usual problem and links to GSM Modem technologies for “SMS” that will improve the services, reduce cost and educate the users to solve their problem themselves. The support will be resolve as soon as possible since all the problems is been recorded and circulate to the support. The method of information gathering has been selected such as interview and research on the GSM Modem Product. We use the product GSM Module Siemens MC35 for the communication device for “SMS” Functions.
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)
This paper highlighted a prediction scoring of difficulty modes in Medical Interactive Recovery A... more This paper highlighted a prediction scoring of difficulty modes in Medical Interactive Recovery Assistant (MIRA) exergames based on Kinect-based Rehabilitation Gaming System (RGS) for rehabilitation patients. The case study uses 19 rehabilitation patients with different lower limb limitations caused by stroke, traumatic brain injury (TBI) and spinal cord injury (SCI). MIRA exergames consists of three difficulty modes which are easy, medium and hard. Currently, physiotherapist will decide on difficulty mode based on the patients’ improvement and most of the time they will used the default setting for every patient playing exergames. Thus, this study proposed a new prediction scoring using k-means clustering algorithm to help suggesting the difficulty mode of the game. K-means clustering also is used to find the benchmarks of the patients’ history. The performance of the K-Mean algorithm is to make sure the patients are comfortable with their weakness side as suggested.
2017 International Conference on Research and Innovation in Information Systems (ICRIIS), 2017
This paper proposes an organization's perspective of the business-to-customer (B2C) e-Commerc... more This paper proposes an organization's perspective of the business-to-customer (B2C) e-Commerce system implementation framework in Malaysian fashion and apparel business. The framework was developed based upon two in-depth case studies which were conducted in two fashion and apparel business in Malaysia. From the cross-cases, ten implementation factors (with its characteristics) that pertinent to the stages of Kotter's model have emerged. This includes factors of financial structure, e-Commerce compatibility, marketing strategy, customer analysis, e-Commerce relative advantages, rewards, e-Commerce maintenance, employee training, and e-Commerce re-engineering. Additionally, three implementation actors - e-Commerce champion, system moderator and vendor, involved in the respective stages of the implementation process. Finding of this study suggests that all the ten factors and the three implementation actors are the ingredients that organizations should not be overlooked when B...
Journal of theoretical and applied information technology, 2016
Taking into consideration a complexity of EDMS implementation process which involves a combinatio... more Taking into consideration a complexity of EDMS implementation process which involves a combination of technological, organizational and users factors, this study explores how EDMS implementation factors can be ranked through these dimensions. This paper begins with an examination of the literature on EDMS implementation studies where a conceptual framework has been derived. The study then adopts the TOPSIS method as the analytical tool that tackles the issue in prioritizing the most desirable factors influencing EDMS implementation project. From the results, the top management support, budgetary, strategic planning, staff training, awareness, resistance to change, IT implementation team, ICT infrastructure, security and privacy/trust, and collaboration are the top-ten important factors for Iraqi government organizations to implement EDMS applications. This paper draws on the research results for implications of IT managerial practice, and then suggests some empirical tactics in orde...
IntelliRehabDS: a physical rehabilitation movements dataset This dataset contains 3D skeleton joi... more IntelliRehabDS: a physical rehabilitation movements dataset This dataset contains 3D skeleton joints positions of 15 patients and 14 healthy persons while performing a few simple exercises. The data was recorded using a Kinect Sensor. Each exercise has been annotated with the movement type along with a label showing if the movement was executed correctly or not. The annotations were carried out independently by two annotators. The dataset is presented as a collection of .csv files, where each file represents one exercise performed by one person. The nomenclature of the files is the following: SubjectID_DateID_GestureLabel_RepetitionNumber_CorrectLabel_Position.txt SubjectID: id uniquely identifying the person performing the exercise DateID: id identifying the session in which the person was recorded GestureLabel: Label identifying the gesture; possible values are from 0 to 8 RepetitionNumber: Each gesture was repeated several times and this shows the repetition number CorrectLabel: ...
Journal of Telecommunication, Electronic and Computer Engineering, 2018
ISO 27001:2013 is the best-known standard providing requirements for information security managem... more ISO 27001:2013 is the best-known standard providing requirements for information security management systems (ISMS). An ISMS is a systematic approach to manage sensitive information through people, processes and IT systems. In a hospital, a patient's individual medical record is highly private and sensitive. This study performed qualitative questionnaire based on the ISO27001:2013 policy. Seven hospitals in Malaysia were involved in this study. This study focus on the Data Center as it contains a high risk server. This study reveals the non-compliance issues among the sampled hospitals in Malaysia. The participation of the hospitals in trainings related to information security awareness and education were still not adequate due to lack of support from the top management. The Malaysian Administrative Modernisation and Management Planning Unit (MAMPU), the Ministry of Health Malaysia and the top management in hospitals in Malaysia play vital roles to educate and ensure the complia...
BACKGROUND Rehabilitation is a term used to describe a range of responses in disabilities that im... more BACKGROUND Rehabilitation is a term used to describe a range of responses in disabilities that improve quality of life. Nowadays, one of the new treatments in rehabilitation is assistive technology by using serious games. This treatment can be a success with sophisticated technologies such as simulators, robotics, and virtual reality OBJECTIVE Meanwhile, motivation and usability are two important factors that focus on user experience. Previous studies suggested that attention, relevance, confidence, and satisfaction for motivation and ease of use, learnability, memorability, and satisfaction for usability are the important attributes for user experience in serious games. The first stage of identifying the user experience model is by exploring the motivation and usability factors that influence serious games for rehabilitation. There are eight relationships that come from eight different attributes in motivation and usability factors of user experience in serious games. METHODS This ...
PLOS ONE, 2018
Image registration of remotely sensed imagery is challenging, as complex deformations are common.... more Image registration of remotely sensed imagery is challenging, as complex deformations are common. Different deformations, such as affine and homogenous transformation, combined with multimodal data capturing can emerge in the data acquisition process. These effects, when combined, tend to compromise the performance of the currently available registration methods. A new image transform, known as geometric mean projection transform, is introduced in this work. As it is deformation invariant, it can be employed as a feature descriptor, whereby it analyzes the functions of all vertical and horizontal signals in local areas of the image. Moreover, an invariant feature correspondence method is proposed as a point matching algorithm, which incorporates new descriptor's dissimilarity metric. Considering the image as a signal, the proposed approach utilizes a square Eigenvector correlation (SEC) based on the Eigenvector properties. In our experiments on standard test images sourced from "Featurespace" and "IKONOS" datasets, the proposed method achieved higher average accuracy relative to that obtained from other state of the art image registration techniques. The accuracy of the proposed method was assessed using six standard evaluation metrics. Furthermore, statistical analyses, including t-test and Friedman test, demonstrate that the method developed as a part of this study is superior to the existing methods.
International Journal of Engineering & Technology, 2018
Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental ... more Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens. The main challenges that face the acceptance and adoption of mobile governmental applications are the privacy and security issues. The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services. This study focuses in investigating the security and privacy requirements of mobile government applications. Many related works are reviewed and discussed to understand the important security requirements of mobile government applications. The main results indicate that effective privacy and security of mobile government applications should be assured so as to enhance the level of adopting and using these applications. The security requirements involve many c...
Advanced Science Letters, 2017
Every now and then, our lives are influenced by the development of technologies and this had chan... more Every now and then, our lives are influenced by the development of technologies and this had changed the perception of business in several ways. Now the world is focusing on wireless devices that can be developed to have exchange of data either using internet or not. Near Field Communication (NFC) is one of the devices that has the capability to securely exchange data with its paired devices and Radio-Frequency Identification (RFID) is developed to broadcast a unique identifying number upon request. This paper concentrates on the security element in the NFC and RFID in the implementation of NFC technology in blood transfusion; to solve the problems of human error and to avoid from transfusing different blood types than the ones actually needed by the patient. The information in the wrist tag should be synchronized with the current hospital system. This NFC technology is also for reducing the use of paper-based documents, consequently promoting green technology. As a result, choosing the NFC or RFID based on the security features is very important for patient identification as well as moving towards green technology.
2016 World Automation Congress (WAC), 2016
Leukemia is a cancer of white blood cells that affect the blood forming cells in the body. Acute ... more Leukemia is a cancer of white blood cells that affect the blood forming cells in the body. Acute Myeloid Leukemia (AML) is a form of leukemia and are caused by replacement of normal bone marrows with leukemic cells, which cause a drop in red blood cells, platelets, and normal white blood cells. Early classification of the subtype of AML cells is necessary for proper treatment management. We classify the subtype based on the features of AML cells, which include the nuclei and cytoplasm. In this paper, we developed an automate method for the nuclei and cytoplasm detection from the blood cells images that are captured as microscope images. In contrast to other methods that focus on identifying the nuclei, we proposed a method based on the color conversion, intensity threshold and gradient magnitude. Our method detected both the nuclei and the cytoplasm at the same time. We test our method on 301 images, which contain 643 AML cells. The accuracy of both nuclei and cytoplasm detection is over 82.9% (increase 17% when was compared with the existent method).
2016 World Automation Congress (WAC), 2016
Panoramic radiographs or dental X-rays are still a prominent tool used by the dentists for dental... more Panoramic radiographs or dental X-rays are still a prominent tool used by the dentists for dental diagnosis. Accurate segmentation and reconstruction of each tooth from panoramic radiographs can play very significant role in early diagnosis and treatment that helps physicians to make a better decision. Panoramic radiographs contain regions outside of the jaw, which make segmentation of teeth very time consuming and complex. Automatic segmentation of jaw is necessary to avoid such complexity and to reduce time. Due to the absence of substantial difference of pixel intensity between different structures and absence of strong edges in panoramic radiographs, segmentation of jaw is still perplexing. In this paper, we use the gradient information to segment the jaw regardless of the position and size of the jaw. Our algorithm for segmentation of jaw has four steps: k-means clustering, detection of points around the jaw (proposed), gradient vector flow (GVF) snakes and correction by making the shape of the segmented area oval. K-means clustering followed by thresholding and detection of points around the jaw (proposed) is used to find suitable points for initialization of the GVF snakes. Then, GVF snakes are initialized with the detected points to segment the jaw. Finally, correction is performed by making the shape of the segmented area oval.
International Journal for Digital Society, 2014
In today's Information and Communication Technology (ICT) environment and with current global eco... more In today's Information and Communication Technology (ICT) environment and with current global economics, Business Continuity Management (BCM) becomes a crucial requirement to the organization. BCM is a managerial activity that identifies potential impacts to the organization caused by the threats. However, BCM is only gets the attention when it is demanded by the regulatory compliance or the stakeholders or customers. The implementation of BCM not only involves the information technology (IT) department, but also the business areas that use the IT services. Therefore, this paper aims to explore and identify the success factors on the execution of business continuity management in the organization particularly in Malaysia. In this study, quantitative analysis has been used to explore the organization employee's view and the importance of these factors towards the successful execution of BCM to the organizations.
BACKGROUND Stroke is one of the leading causes of death and long-term disability worldwide. The p... more BACKGROUND Stroke is one of the leading causes of death and long-term disability worldwide. The primary goal of post-stroke rehabilitation is to maximize the independence of the affected individuals by facilitating both neurological and compensatory functional recoveries in their daily lives. OBJECTIVE The research objective finding the best games settings for MIRA. METHODS This paper presents an integrated study, using multiple linear regression (MLR) and whale optimization algorithm, for optimizing the post-stroke rehabilitation performance using Medical Interactive Rehabilitation Assistant (MIRA). RESULTS Results demonstrated that the developed MLR models for average acceleration and distance were significant, with P=0.018 and P<0.000, respectively. Data from 41 stroke patients revealed that the maximum muscle strength that can be achieved was 2.56 cm/s2 while the maximum distance was 104.83 cm. The results showed that all patients outperformed the optimal average acceleration...
Journal of Software, 2015
International Journal of Scientific & Technology Research, 2015
Database era has been appear during Prophet Muhammad S.A.W. We are using the same concept but onl... more Database era has been appear during Prophet Muhammad S.A.W. We are using the same concept but only deployed in the medical environment with security features which is related to aqli and naqli. The development of a system not only covered the abi lity of the system to be functioned and execute very well but a good and efficient system must be able to communicate with the users and become a user friendly system. This research is about developing Hospital Patient Information System developed for Hematology Ward and Hemato-oncology Laboratory at the Hospital UniversitiSains Malaysia (HUSM) based on the aqli and naqli. It lacks of security in term of data integrity of the system. It will be enhanced in its security features which will be implemented with the data integrity feature and also password encryption to overcome the problems. As a result, an automated calculation of blood series and graph production as for data analysis will be implemented in this system.An approach of agile me...
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS), 2019
Telerehabilitation or known as TeleRehab offers better cost-effectiveness in healthcare service d... more Telerehabilitation or known as TeleRehab offers better cost-effectiveness in healthcare service delivery over distance for patients with disabilities. Most of the TeleRehab studies focused on its benefits, applications, and methods in delivering services. However, there is still a limited number of studies discussing the significance of success/failure factors that influence the healthcare personnel for TeleRehab. The identification of these factors that affect TeleRehab may avert project failure. A systematic review was conducted from five digital databases including ScienceDirect, Scopus, IEEE, Springer, and PubMed. The manual type of searching also conducted. There are 1283 of total potential papers were identified. 735 papers have gone through the inclusive and exclusive criteria, and quality assessment process which leaves 12 papers for further review. The result shows that there are three success factors and nine failure factors that can be considered as important. The success...
Journal of theoretical and applied information technology, 2015
In this paper, classification of brainwave using real world data from Parkinson’s patients is pre... more In this paper, classification of brainwave using real world data from Parkinson’s patients is presented. Emotional model is produced from the classification of brainwave. Electroencephalograph (EEG) signal is recorded on eleven Parkinson’s patients. This paper aim to find the “best” classification for the emotional model in brainwave patterns for the Parkinson’s disease. The work performed based on the two method phases which are using the raw data and preprocessing data. In each of the method, we performed for steps in the sum of the hertz and divided by total hertz. In the pre-processing data we are using statistic mean and standard deviation. We used WEKA Application for the classification with 11 fold validation. As a results, implecart from the classification tree performed the “best” classification for the emotional model for Parkinson Patients. The Simplecart classification result is 84.42% accuracy.
2021 IEEE Symposium on Computers & Informatics (ISCI)
2019 International Conference on Data Mining Workshops (ICDMW), 2019
One of the classical problems in computer vision is the automatic identification of different ges... more One of the classical problems in computer vision is the automatic identification of different gestures or motions from a sequence of frames, captured via cameras or sensors, that usually contain angles or positions of many body joints. A large body of research addressing this problem exists in the literature. However, an interesting variant is not just to identify the gesture, but to decide whether a certain gesture is correctly or incorrectly executed. This can be in the context of physical exercises for rehabilitation in healthcare, robotics, sports, sign language and more. In this work we present our research on the automatic classification of gestures into correct or incorrect categories using the following three different but powerful techniques: convolutional neural networks (CNNs), long short-term memory (LSTM) neural networks and a technique based on rough path theory to extract unique sequences (i.e. path signatures) from gesture data and to use them as inputs to classical ...
Introduction This project focuses mainly on System Development Life Cycle Methodology on how to d... more Introduction This project focuses mainly on System Development Life Cycle Methodology on how to develop software that using the principles in the System Development Life Cycle. In stage of system analysis, we use the Unified Modelling Language (UML). This system provides additional functions like keeping a historical database for future and using GSM Modem as interface to the system for fast communication between the support and the help desk coordinator. Through implementing the system that records the usual problem and links to GSM Modem technologies for “SMS” that will improve the services, reduce cost and educate the users to solve their problem themselves. The support will be resolve as soon as possible since all the problems is been recorded and circulate to the support. The method of information gathering has been selected such as interview and research on the GSM Modem Product. We use the product GSM Module Siemens MC35 for the communication device for “SMS” Functions.