Search results for: Mohd Izani Mohamed Rawi Izani
2094 Extraction of Compound Words in Malay Sentences Using Linguistic and Statistical Approaches
Authors: Zamri Abu Bakar Zamri, Normaly Kamal Ismail Normaly, Mohd Izani Mohamed Rawi Izani
Abstract:
Malay noun compound are phrases that consist of two or more nouns. The key characteristic behind noun compounds lies on its frequent occurrences within the text. Therefore, extracting these noun compounds is essential for several domains of research such as Information Retrieval, Sentiment Analysis and Question Answering. Many research efforts have been proposed in terms of extracting Malay noun compounds using linguistic and statistical approaches. Most of the existing methods have concentrated on the extraction of bi-gram noun+noun compound. However, extracting noun+verb, noun+adjective and noun+prepositional is challenging due to the difficulty of selecting an appropriate method with effective results. Thus, there is still room for improvement in terms of enhancing the effectiveness of compound word extraction. Therefore, this study proposed a combination of linguistic approach and statistical measures in order to enhance the extraction of compound words. Several preprocessing steps are involved including normalization, tokenization, and stemming. The linguistic approach that has been used in this study is Part-of-Speech (POS) tagging. In addition, a new linguistic pattern for named entities has been utilized using a list of Malays named entities in order to enhance the linguistic approach in terms of noun compound recognition. The proposed statistical measures consists of NC-value, NTC-value and NLC value.Keywords: Compound Word, Noun Compound, Linguistic Approach, Statistical Approach
Procedia PDF Downloads 3502093 Low Back Pain among Nurses in Penang Public Hospitals: A Study on Prevalence and Factors Associated
Authors: Izani Uzair Zubair, Mohd Ismail Ibrahim, Mohd Nazri Shafei, Hassan Merican Omar Naina Merican, Mohamad Sabri Othman, Mohd Izmi Ahmad Ibrahim, Rasilah Ramli, Rajpal Singh Karam Singh
Abstract:
Nurses experience a higher prevalence of low back pain (LBP) and musculoskeletal complaints as compared to other hospital workers. Due to no proper policy related to LBP, the job has exposed them to the problem. Thus, the current study aims to look at the intensity of the problem and factors associated with development of LBP. Method and Tools: A cross sectional study was carried out among 1292 nurses from six public hospitals in Penang. They were randomly selected and those who were pregnant and have been diagnosed to have LBP were excluded. A Malay validated BACK Questionnaire was used. The associated factors were determined by using multiple logistic regression from SPSS version 20.0. Result: Most of the respondents were at mean age 30 years old and had mean working experience 86 months. The prevalence of LBP was identified as 76% (95% CI 74, 82). Factors that were associated with LBP among nurses include lifting a heavy object (OR2.626 (95% CI 1.978, 3.486) p =0.001 and the estimation weight of the lifted object (OR1.443 (95% CI 1.056, 1.970) p =0.021. Conclusion: Nurses who practice lifting heavy object and weight of the object lifted give a significant contribution to the development of LBP. The prevalence of the problem is significantly high. Thus, a proper no weight lifting policy should be considered.Keywords: low back pain, nurses, Penang public hospital, Penang
Procedia PDF Downloads 4862092 Cubic Trigonometric B-Spline Approach to Numerical Solution of Wave Equation
Authors: Shazalina Mat Zin, Ahmad Abd. Majid, Ahmad Izani Md. Ismail, Muhammad Abbas
Abstract:
The generalized wave equation models various problems in sciences and engineering. In this paper, a new three-time level implicit approach based on cubic trigonometric B-spline for the approximate solution of wave equation is developed. The usual finite difference approach is used to discretize the time derivative while cubic trigonometric B-spline is applied as an interpolating function in the space dimension. Von Neumann stability analysis is used to analyze the proposed method. Two problems are discussed to exhibit the feasibility and capability of the method. The absolute errors and maximum error are computed to assess the performance of the proposed method. The results were found to be in good agreement with known solutions and with existing schemes in literature.Keywords: collocation method, cubic trigonometric B-spline, finite difference, wave equation
Procedia PDF Downloads 5402091 A Boundary Fitted Nested Grid Model for Tsunami Computation along Penang Island in Peninsular Malaysia
Authors: Md. Fazlul Karim, Ahmad Izani Md. Ismail, Mohammed Ashaque Meah
Abstract:
This paper focuses on the development of a 2-D Boundary Fitted and Nested Grid (BFNG) model to compute the tsunami propagation of Indonesian tsunami 2004 along the coastal region of Penang in Peninsular Malaysia. In the presence of a curvilinear coastline, boundary fitted grids are suitable to represent the model boundaries accurately. On the other hand, when large gradient of velocity within a confined area is expected, the use of a nested grid system is appropriate to improve the numerical accuracy with the least grid numbers. This paper constructs a shallow water nested and orthogonal boundary fitted grid model and presents computational results of the tsunami impact on the Penang coast due to the Indonesian tsunami of 2004. The results of the numerical simulations are compared with available data.Keywords: boundary fitted nested model, tsunami, Penang Island, 2004 Indonesian Tsunami
Procedia PDF Downloads 3232090 Prediction of Changes in Optical Quality by Tissue Redness after Pterygium Surgery
Authors: Mohd Radzi Hilmi, Mohd Zulfaezal Che Azemin, Khairidzan Mohd Kamal, Azrin Esmady Ariffin, Mohd Izzuddin Mohd Tamrin, Norfazrina Abdul Gaffur, Tengku Mohd Tengku Sembok
Abstract:
Purpose: The purpose of this study is to predict optical quality changes after pterygium surgery using tissue redness grading. Methods: Sixty-eight primary pterygium participants were selected from patients who visited an ophthalmology clinic. We developed a semi-automated computer program to measure the pterygium fibrovascular redness from digital pterygium images. The outcome of this software is a continuous scale grading of 1 (minimum redness) to 3 (maximum redness). The region of interest (ROI) was selected manually using the software. Reliability was determined by repeat grading of all 68 images and its association with contrast sensitivity function (CSF) and visual acuity (VA) was examined. Results: The mean and standard deviation of redness of the pterygium fibrovascular images was 1.88 ± 0.55. Intra- and inter-grader reliability estimates were high with intraclass correlation ranging from 0.97 to 0.98. The new grading was positively associated with CSF (p<0.01) and VA (p<0.01). The redness grading was able to predict 25% and 23% of the variance in the CSF and the VA respectively. Conclusions: The new grading of pterygium fibrovascular redness can be reliably measured from digital images and show a good correlation with CSF and VA. The redness grading can be used in addition to the existing pterygium grading.Keywords: contrast sensitivity, pterygium, redness, visual acuity
Procedia PDF Downloads 5132089 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware
Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.Keywords: digital forensic, detection, eradication, targeted attack, malware
Procedia PDF Downloads 2742088 The Islamic Advertising Standardisation Revisited of Food Products
Authors: Nurzahidah Haji Jaapar, Anis Husna Abdul Halim, Mohd Faiz Mohamed Yusof, Mohd Dani Muhamad, Sharifah Fadylawaty Syed Abdullah
Abstract:
The growing size of Muslim is recognised with significant increasing of purchasing power in the market. The realm of trade and business has embedded religious values as the new market segments are emerging in offering food products to meet needs and demands of Muslim consumer. The emergence of new market in food industry, advertising is charged with all sort of negative effects includes promoting controversial unsafety and harmful products, wasteful spending and exploiting women and kids. Therefore, this research attempts to examine between previous examinations of advertising standardisation in ancient era and current practices in the market. This paper is based on content analysis of the literature. The results show that there are a bridge gap between the implementation of practices as the advent in industrial 4.0 in using digital advertising by food industry. Thus, this paper is able to recognize the differences between two era and significant in determining the best practices in advertising by following Islamic principles.Keywords: Islamic advertising, unethical advertising, ethical advertising, Islamic principles
Procedia PDF Downloads 1482087 Physician and Theologian: An Analysis of Ibn Rabban’s Approach on Sīra Nabawiyya
Authors: Ahmad Sanusi Azmi, Amiruddin Mohd Sobali, Zulhilmi Mohamed Nor, Mohd Yusuf Ismail, Amran Abdul Halim
Abstract:
The non-Muslim communities’ reactions to the denials of the prophethood of Muḥammad in the ninth century created an impact on the development of Islamic prophetology. Vigorous refutations from non-Muslim community, specifically the Jews, Christians and Brahmins urged Muslims to develop a solid mechanism in defense of the status of their beloved prophet. One of the works that has been recognized as an apparatus to defend the Prophet Muḥammad veracity is al-Dīn wa al-Dawla composed by Ibn Rabban, a physician of the Caliph’s court. This study analyses the novelty of his approaches in exploring Sīra Nabawiyya and defending the prophethood of Muḥammad. The study employed a descriptive, comparative and critical approach where it analyses and extracts the author original approach in explaining the legitimacy of Muḥammad’s prophethood and enlightening the Prophet’s biography. The study in its finding argues that most of Ibn Rabban arguments in this work are actually developed from the foundations of Biblical scripture. His style of interpreting Biblical passages indicates a possible dependence on Ibn al-Layth’s letter. However, the way in which he presents Qur’ānic references seems not to be in accordance with Ibn al-Layth’s perspective. This is where the novelty of his approach is distinguished. As a result, the study also affirms that Ibn Rabban imposes his own standards of selection and interpretation of Qur’ānic verses when he applies it as reference to the Prophet life.Keywords: Sīra Nabawiyya, Ibn Rabban, al-Dīn wa al-Dawla, Christian, Dalāil Nubuwwa
Procedia PDF Downloads 3312086 The Effect of Drug Prevention Programme Based On Cognitive-Behavioral Therapy (CBT) and Multidimensional Self Concept Module Towards Resiliency and Aggression Among At-Risk Youth in Malaysia
Authors: Mohammad Aziz Shah Mohamed Arip, Aslina Ahmad, Fauziah Mohd Sa'ad, Samsiah Mohd Jais, Syed Sofian Syed Salim
Abstract:
This experimental study evaluates the effect of using Cognitive-Behavioral Therapy (CBT) and Multidimensional Self-Concept Model (MSCM) in a drug prevention programme to increase resiliency and reduce aggression among at-risk youth in Malaysia. A number of 60 (N=60) university students who were at-risk of taking drugs were involved in this study. Participants were identified with self-rating scales, Adolescent Resilience Attitude Scale (ARAS) and Aggression Questionnaire. Based on the mean score of these instruments, the participants were divided into the treatment group, and the control group. Data were analyzed using t-test. The finding showed that the mean score of resiliency was increased in the treatment group compared to the control group. It also shows that the mean score of aggression was reduced in the treatment group compared to the control group. Drug Prevention Programme was found to help in enhancing resiliency and reducing aggression among participants in the treatment group compared to the controlled group. Implications were given regarding the preventive actions on drug abuse among youth in Malaysia.Keywords: drug prevention programme, cognitive-behavioral therapy (CBT), multidimensional self concept model (MSCM), resiliency, aggression, at-risk youth
Procedia PDF Downloads 7242085 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation
Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques
Procedia PDF Downloads 2862084 A New Modification of Nonlinear Conjugate Gradient Coefficients with Global Convergence Properties
Authors: Ahmad Alhawarat, Mustafa Mamat, Mohd Rivaie, Ismail Mohd
Abstract:
Conjugate gradient method has been enormously used to solve large scale unconstrained optimization problems due to the number of iteration, memory, CPU time, and convergence property, in this paper we find a new class of nonlinear conjugate gradient coefficient with global convergence properties proved by exact line search. The numerical results for our new βK give a good result when it compared with well-known formulas.Keywords: conjugate gradient method, conjugate gradient coefficient, global convergence
Procedia PDF Downloads 4622083 Towards Integrating Statistical Color Features for Human Skin Detection
Authors: Mohd Zamri Osman, Mohd Aizaini Maarof, Mohd Foad Rohani
Abstract:
Human skin detection recognized as the primary step in most of the applications such as face detection, illicit image filtering, hand recognition and video surveillance. The performance of any skin detection applications greatly relies on the two components: feature extraction and classification method. Skin color is the most vital information used for skin detection purpose. However, color feature alone sometimes could not handle images with having same color distribution with skin color. A color feature of pixel-based does not eliminate the skin-like color due to the intensity of skin and skin-like color fall under the same distribution. Hence, the statistical color analysis will be exploited such mean and standard deviation as an additional feature to increase the reliability of skin detector. In this paper, we studied the effectiveness of statistical color feature for human skin detection. Furthermore, the paper analyzed the integrated color and texture using eight classifiers with three color spaces of RGB, YCbCr, and HSV. The experimental results show that the integrating statistical feature using Random Forest classifier achieved a significant performance with an F1-score 0.969.Keywords: color space, neural network, random forest, skin detection, statistical feature
Procedia PDF Downloads 4612082 Cryptocurrency Forensics: Analysis on Bitcoin E-Wallet from Computer Source Evidence
Authors: Muhammad Nooraiman bin Noorashid, Mohd Sharizuan bin Mohd Omar, Mohd Zabri Adil bin Talib, Aswami Fadillah bin Mohd Ariffin
Abstract:
Nowadays cryptocurrency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The cryptocurrency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin cryptocurrency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.Keywords: cryptocurrency, bitcoin, digital wallet, digital forensics
Procedia PDF Downloads 3392081 Cytochrome B Marker Reveals Three Distinct Genetic Lineages of the Oriental Latrine Fly Chrysomya megacephala (Diptera: Calliphoridae) in Malaysia
Authors: Rajagopal Kavitha, Van Lun Low, Mohd Sofian-Azirun, Chee Dhang Chen, Mohd Yusof Farida Zuraina, Mohd Salleh Ahmad Firdaus, Navaratnam Shanti, Abdul Haiyee Zaibunnisa
Abstract:
This study investigated the hidden genetic lineages in the oriental latrine fly Chrysomya megacephala (Fabricius) across four states (i.e., Johore, Pahang, Perak and Selangor) and a federal territory (i.e., Kuala Lumpur) in Malaysia using Cytochrome b (Cyt b) genetic marker. The Cyt b phylogenetic tree and haplotype network revealed three distinct genetic lineages of Ch. megacephala. Lineage A, the basal clade was restricted to flies that originated from Kuala Lumpur and Selangor, while Lineages B and C, comprised of flies from all studied populations. An overlap of the three genetically divergent groups of Ch. megacephala was observed. However, the flies from both Kuala Lumpur and Selangor populations consisted of three different lineages, indicating that they are genetically diverse compared to those from Pahang, Perak and Johore.Keywords: forensic entomology, calliphoridae, mitochondrial DNA, cryptic lineage
Procedia PDF Downloads 5122080 Changes in Religious Belief after Flood Disasters
Authors: Sapora Sipon, Mohd Fo’ad Sakdan, Che Su Mustaffa, Najib Ahmad Marzuki, Mohamad Sukeri Khalid, Mohd Taib Ariffin, Husni Mohd Radzi, Salhah Abdullah
Abstract:
Flood disasters occur throughout the world including Malaysia. The major flood disaster that hit Malaysia in the 2014-2015 episodes proved the psychosocial and mental health consequences such as vivid images of destruction, upheaval, death and loss of lives. Flood, flood survivors reported that flood has changed one looks at their religious belief. The main objective of this paper is to investigate the changes in religious belief after the 2014-2015 Malaysia flood disaster. The total population of 1300 respondents who experienced the 2014-2015 Malaysia flood were surveyed a month after the disaster. The questionnaires were used to measure religiosity and stress. The results provide compelling evidence that religion played an important role in the lives of Malaysia flood disasters’ survivor where more than half of the respondents (>75%) experiencing the strengthening of their religious belief. It was also reported the victims’ strengthening of their religious belief proved to be a powerful factor in reducing stress in the aftermath of the flood.Keywords: religious belief, flood disaster, humanity, society
Procedia PDF Downloads 4062079 Assessing Economic Losses Of 2104 Flood Disaster: A Case Study on Dabong, Kelantan, Malaysia
Authors: Ahmad Hamidi Mohamed, Jamaluddin Othman, Mashitah Suid, Mohd Zaim Mohd Shukri
Abstract:
Floods are considered an annual natural disaster in Kelantan. However, the record-setting flood of 2014 was a 'tsunami-like disaster'. A study has been conducted with the objectives to assess the economic impact of the flood to the resident of Dabong area in Kelantan Darul Naim, Malaysia. This area was selected due to the severity during the flood. The impacts of flood on local people were done by conducting structured interviews with the use of questionnaires. The questionnaire was intended to acquire information on losses faced by Dabong residence. Questionnaires covered various areas of inconveniences suffered with respect to health effects, including illnesses suffered, their intensities, duration and their associated costs. Loss of productivity and quality of life was also assessed. Inquiries were made to Government agencies to obtain relevant statistical data regarding the loss due to the flood tragedy. The data collected by giving formal request to the governmental agencies and formal meetings were done. From the study a staggering amount of losses were calculated. This figure comes from losses of property, Farmers/Agriculture, Traders/Business, Health, Insurance and Governmental losses. Flood brings hardship to the people of Dabong and these losses of home will cause inconveniences to the society. The huge amount of economic loss extracted from this study shows that federal and state government of Kelantan need to find out the cause of the major flood in 2014. Fast and effective measures have to be planned and implemented in flood prone area to prevent same tragedy happens in the future.Keywords: economic impact, flood tragedy, Malaysia, property losses
Procedia PDF Downloads 2692078 Triangular Geometric Feature for Offline Signature Verification
Authors: Zuraidasahana Zulkarnain, Mohd Shafry Mohd Rahim, Nor Anita Fairos Ismail, Mohd Azhar M. Arsad
Abstract:
Handwritten signature is accepted widely as a biometric characteristic for personal authentication. The use of appropriate features plays an important role in determining accuracy of signature verification; therefore, this paper presents a feature based on the geometrical concept. To achieve the aim, triangle attributes are exploited to design a new feature since the triangle possesses orientation, angle and transformation that would improve accuracy. The proposed feature uses triangulation geometric set comprising of sides, angles and perimeter of a triangle which is derived from the center of gravity of a signature image. For classification purpose, Euclidean classifier along with Voting-based classifier is used to verify the tendency of forgery signature. This classification process is experimented using triangular geometric feature and selected global features. Based on an experiment that was validated using Grupo de Senales 960 (GPDS-960) signature database, the proposed triangular geometric feature achieves a lower Average Error Rates (AER) value with a percentage of 34% as compared to 43% of the selected global feature. As a conclusion, the proposed triangular geometric feature proves to be a more reliable feature for accurate signature verification.Keywords: biometrics, euclidean classifier, features extraction, offline signature verification, voting-based classifier
Procedia PDF Downloads 3772077 An Improved Genetic Algorithm for Traveling Salesman Problem with Precedence Constraint
Authors: M. F. F. Ab Rashid, A. N. Mohd Rose, N. M. Z. Nik Mohamed, W. S. Wan Harun, S. A. Che Ghani
Abstract:
Traveling salesman problem with precedence constraint (TSPPC) is one of the most complex problems in combinatorial optimization. The existing algorithms to solve TSPPC cost large computational time to find the optimal solution. The purpose of this paper is to present an efficient genetic algorithm that guarantees optimal solution with less number of generations and iterations time. Unlike the existing algorithm that generates priority factor as chromosome, the proposed algorithm directly generates sequence of solution as chromosome. As a result, the proposed algorithm is capable of generating optimal solution with smaller number of generations and iteration time compare to existing algorithm.Keywords: traveling salesman problem, sequencing, genetic algorithm, precedence constraint
Procedia PDF Downloads 5582076 Studies on Induction of Cytotoxicity Through Apoptosis In Ovarian Cancer Cell Line (CAOV-3) by Chloroform Extract of Artocarpus Kemando Miq
Authors: Noor Shafifiyaz Mohd Yazid, Najihah Mohd Hashim, Hapipah Mohd Ali, Syam Mohan, Rosea Go
Abstract:
Artocarpus kemando is a plant species from Moraceae family. This plant is used as household utensil by the local and the fruits are edible. The plants’ bark was used for the extraction process and yielded the chloroform crude extract which was used to screen for anticancer potential. The cytotoxic effect of the extract on CAOV-3 and WRL 68 cell lines were determined using 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide or MTT assays. Qualitative AO/PI assay was performed to confirm the apoptosis and necrosis process. Meanwhile, the measurement of cell loss, nuclear morphology, DNA content, cell membrane permeability, mitochondrial membrane potential changes and cytochrome c release from mitochondria were detected through cytotoxicity 3 assay. In MTT assay, A. kemando inhibited 50% growth of CAOV-3 cells at 27.9 ± 0:03, 20.1± 0:03, 18.21± 0:04 µg/mL after 24, 48 and 72 hour, respectively. The morphology changes can be seen on CAOV-3 with a production of cell membrane blebbing, cromatin condensation and apoptotic bodies. Evaluation of cytotoxicity 3 on CAOV-3 cells after treated with extract resulting loss of mitochondrial membrane potential and release of cytochrome c from mitochondria. The results demonstrated A. kemando has potentially anticancer agent, particularly on human ovarian cancer.Keywords: anticancer, Artocarpus kemando, ovarian cancer, cytotoxicity
Procedia PDF Downloads 5502075 The Effect of Second Victim-Related Distress on Work-Related Outcomes in Tertiary Care, Kelantan, Malaysia
Authors: Ahmad Zulfahmi Mohd Kamaruzaman, Mohd Ismail Ibrahim, Ariffin Marzuki Mokhtar, Maizun Mohd Zain, Saiful Nazri Satiman, Mohd Najib Majdi Yaacob
Abstract:
Background: Aftermath any patient safety incidents, the involved healthcare providers possibly sustained second victim-related distress (second victim distress and reduced their professional efficacy), with subsequent negative work-related outcomes or vice versa cultivating resilience. This study aimed to investigate the factors affecting negative work-related outcomes and resilience, with the triad of support; colleague, supervisor, and institutional support as the hypothetical mediators. Methods: This was a cross sectional study recruiting a total of 733 healthcare providers from three tertiary care in Kelantan, Malaysia. Three steps of hierarchical linear regression were developed for each outcome; negative work-related outcomes and resilience. Then, four multiple mediator models of support triad were analyzed. Results: Second victim distress, professional efficacy, and the support triad contributed significantly for each regression model. In the pathway of professional efficacy on each negative work-related outcomes and resilience, colleague support partially mediated the relationship. As for second victim distress on negative work related outcomes, colleague and supervisor support were the partial mediator, and on resilience; all support triad also produced a similar effect. Conclusion: Second victim distress, professional efficacy, and the support triad influenced the relationship with the negative work-related outcomes and resilience. Support triad as the mediators ameliorated the effect in between and explained the urgency of having good support for recovery post encountering patient safety incidents.Keywords: second victims, patient safety incidents, hierarchical linear regression, mediation, support
Procedia PDF Downloads 1072074 A Review on Light Shafts Rendering for Indoor Scenes
Authors: Hatam H. Ali, Mohd Shahrizal Sunar, Hoshang Kolivand, Mohd Azhar Bin M. Arsad
Abstract:
Rendering light shafts is one of the important topics in computer gaming and interactive applications. The methods and models that are used to generate light shafts play crucial role to make a scene more realistic in computer graphics. This article discusses the image-based shadows and geometric-based shadows that contribute in generating volumetric shadows and light shafts, depending on ray tracing, radiosity, and ray marching technique. The main aim of this study is to provide researchers with background on a progress of light scattering methods so as to make it available for them to determine the technique best suited to their goals. It is also hoped that our classification helps researchers find solutions to the shortcomings of each method.Keywords: shaft of lights, realistic images, image-based, and geometric-based
Procedia PDF Downloads 2772073 Severity Index Level in Effectively Managing Medium Voltage Underground Power Cable
Authors: Mohd Azraei Pangah Pa'at, Mohd Ruzlin Mohd Mokhtar, Norhidayu Rameli, Tashia Marie Anthony, Huzainie Shafi Abd Halim
Abstract:
Partial Discharge (PD) diagnostic mapping testing is one of the main diagnostic testing techniques that are widely used in the field or onsite testing for underground power cable in medium voltage level. The existence of PD activities is an early indication of insulation weakness hence early detection of PD activities can be determined and provides an initial prediction on the condition of the cable. To effectively manage the results of PD Mapping test, it is important to have acceptable criteria to facilitate prioritization of mitigation action. Tenaga Nasional Berhad (TNB) through Distribution Network (DN) division have developed PD severity model name Severity Index (SI) for offline PD mapping test since 2007 based on onsite test experience. However, this severity index recommendation action had never been revised since its establishment. At presence, PD measurements data have been extensively increased, hence the severity level indication and the effectiveness of the recommendation actions can be analyzed and verified again. Based on the new revision, the recommended action to be taken will be able to reflect the actual defect condition. Hence, will be accurately prioritizing preventive action plan and minimizing maintenance expenditure.Keywords: partial discharge, severity index, diagnostic testing, medium voltage, power cable
Procedia PDF Downloads 1852072 Sudan’s Approach to Knowledge Management in Disaster Management
Authors: Mohamed Abdalla Elamein Boshara, Peter Charles Woods, Nour Eldin Mohamed Elshaiekh
Abstract:
Knowledge Management has become very important for Disaster Management response and planning. This paper proposes the implementation of a Knowledge Management System with a sustainable data collection mechanism for reliable and timely information management to support decision makers in making the right decisions in the timely manner.Keywords: knowledge management, disaster management, incident tracking, web application
Procedia PDF Downloads 7792071 Microwave-Assisted Synthesis of Silver Nanoparticles from Dioscorea Deltoidea Callus Extract and Evaluation of Its Antimicrobial Activity
Authors: Mujeeb Mohd, Aqil Mohd, A. K. Najmi, Akhtar MMohd, Vasim Mohd
Abstract:
Dioscorea deltoidea belongs to the Dioscoreaceae family, is usually found in the north-western Himalayas and some other parts of the world up to an altitude of 1000–3000 m. D. deltoidea commonly known as yam and is an extensively used medicinal plant in the indigenous system of medicine. It has been reported to contain dioscine a steroidal glycoside in higher concentration. In the present investigation, silver nanoparticles (AgNPs) have been synthesized by a simple, efficient, environmentally benevolent and economic microwave-assisted method. Callus culture of D. deltoidea was developed and maintained on Murashige and skooge basal medium supplemented with different combination and concentration of plant growth regulators. Aqueous extract of callus culture was used as the reducing and stabilizing agent. The synthesized nanoparticles have been characterized by UV–Vis spectroscopy, Fourier transform infrared spectroscopy (FT-IR), transmission electron microscopy (TEM), scanning electron microscopy (SEM) and X-ray diffraction (XRD analysis. The presence of a characteristic surface plasmon resonance (SPR) absorption band at 430 nm in UV–Vis reveals the reduction of silver metal ions into silver nanoparticles. Whereas FTIR analysis was performed to probe the possible functional group involved in the synthesis of AgNPs. Further extract and AgNPs were evaluated for antimicrobial activity against different pathogenic microorganisms.Keywords: antimicrobial, Dioscorea deltoidea, microwave, silver, nanoparticles
Procedia PDF Downloads 2662070 Effects of Viscous Dissipation on Free Convection Boundary Layer Flow towards a Horizontal Circular Cylinder
Authors: Muhammad Khairul Anuar Mohamed, Mohd Zuki Salleh, Anuar Ishak, Nor Aida Zuraimi Md Noar
Abstract:
In this study, the numerical investigation of viscous dissipation on convective boundary layer flow towards a horizontal circular cylinder with constant wall temperature is considered. The transformed partial differential equations are solved numerically by using an implicit finite-difference scheme known as the Keller-box method. Numerical solutions are obtained for the reduced Nusselt number and the skin friction coefficient as well as the velocity and temperature profiles. The features of the flow and heat transfer characteristics for various values of the Prandtl number and Eckert number are analyzed and discussed. The results in this paper is original and important for the researchers working in the area of boundary layer flow and this can be used as reference and also as complement comparison purpose in future.Keywords: free convection, horizontal circular cylinder, viscous dissipation, convective boundary layer flow
Procedia PDF Downloads 4382069 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation
Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin
Abstract:
The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.Keywords: ISMS success factors, IT project management, IS success, information security
Procedia PDF Downloads 3142068 Thermal Properties of Chitosan-Filled Empty Fruit Bunches Filter Media
Authors: Aziatul Niza Sadikin, Norasikin Othman, Mohd Ghazali Mohd Nawawi, Umi Aisah Asli, Roshafima Rasit Ali, Rafiziana Md Kasmani
Abstract:
Non-woven fibrous filter media from empty fruit bunches were fabricated by using chitosan as a binder. Chitosan powder was dissolved in a 1 wt% aqueous acetic acid and 1 wt% to 4 wt% of chitosan solutions was prepared. Chitosan-filled empty fruit bunches filter media have been prepared via wet-layup method. Thermogravimetric analysis (TGA) was performed to study various thermal properties of the fibrous filter media. It was found that the fibrous filter media have undergone several decomposition stages over a range of temperatures as revealed by TGA thermo-grams, where the temperature for 10% weight loss for chitosan-filled EFB filter media and binder-less filter media was at 150oC and 300oC, Respectively.Keywords: empty fruit bunches, chitosan, filter media, thermal property
Procedia PDF Downloads 4492067 An Accurate Computation of 2D Zernike Moments via Fast Fourier Transform
Authors: Mohammed S. Al-Rawi, J. Bastos, J. Rodriguez
Abstract:
Object detection and object recognition are essential components of every computer vision system. Despite the high computational complexity and other problems related to numerical stability and accuracy, Zernike moments of 2D images (ZMs) have shown resilience when used in object recognition and have been used in various image analysis applications. In this work, we propose a novel method for computing ZMs via Fast Fourier Transform (FFT). Notably, this is the first algorithm that can generate ZMs up to extremely high orders accurately, e.g., it can be used to generate ZMs for orders up to 1000 or even higher. Furthermore, the proposed method is also simpler and faster than the other methods due to the availability of FFT software and/or hardware. The accuracies and numerical stability of ZMs computed via FFT have been confirmed using the orthogonality property. We also introduce normalizing ZMs with Neumann factor when the image is embedded in a larger grid, and color image reconstruction based on RGB normalization of the reconstructed images. Astonishingly, higher-order image reconstruction experiments show that the proposed methods are superior, both quantitatively and subjectively, compared to the q-recursive method.Keywords: Chebyshev polynomial, fourier transform, fast algorithms, image recognition, pseudo Zernike moments, Zernike moments
Procedia PDF Downloads 2642066 Comparison of Corneal Curvature Measurements Conducted with Tomey AO-2000® and the Current Standard Biometer IOL Master®
Authors: Mohd Radzi Hilmi, Khairidzan Mohd Kamal, Che Azemin Mohd Zulfaezal, Ariffin Azrin Esmady
Abstract:
Purpose: Corneal curvature (CC) is an important anterior segment parameter. This study compared CC measurements conducted with two optical devices in phakic eyes. Methods: Sixty phakic eyes of 30 patients were enrolled in this study. CC was measured three times with the optical biometer and topography-keratometer Tomey AO-2000 (Tomey Corporation, Nagoya, Japan), then with the standard partial optical coherence interferometry (PCI) IOL Master (Carl Zeiss Meditec, Dublin, CA) and data were statistically analysed. Results: The measurements resulted in a mean CC of 43.86 ± 1.57 D with Tomey AO-2000 and 43.84 ± 1.55 D with IOL Master. Distribution of data is normal, and no significance difference in CC values was detected (P = 0.952) between the two devices. Correlation between CC measurements was highly significant (r = 0. 99; P < 0.0001). The mean difference of CC values between devices was 0.017 D and 95% limit of agreement was -0.088 to 0.12. Duration taken for measurements with the standard biometer IOL Master was longer (55.17 ± 2.24 seconds) than with Tomey AO-2000 (39.88 ± 2.38 seconds) in automatic mode. Duration of manual measurement with Tomey AO-2000 in manual mode was the shortest (28.57 ± 2.71 seconds). Conclusion: In phakic eyes, CC measured with Tomey AO-2000 and IOL Master showed similar values, and high correlation was observed between these two devices. This shows that both devices can be used interchangeably. Tomey AO-2000 is better in terms of faster to operate and has its own topography systems.Keywords: corneal topography, corneal curvature, IOL Master, Tomey AO2000
Procedia PDF Downloads 3862065 Level Set and Morphological Operation Techniques in Application of Dental Image Segmentation
Authors: Abdolvahab Ehsani Rad, Mohd Shafry Mohd Rahim, Alireza Norouzi
Abstract:
Medical image analysis is one of the great effects of computer image processing. There are several processes to analysis the medical images which the segmentation process is one of the challenging and most important step. In this paper the segmentation method proposed in order to segment the dental radiograph images. Thresholding method has been applied to simplify the images and to morphologically open binary image technique performed to eliminate the unnecessary regions on images. Furthermore, horizontal and vertical integral projection techniques used to extract the each individual tooth from radiograph images. Segmentation process has been done by applying the level set method on each extracted images. Nevertheless, the experiments results by 90% accuracy demonstrate that proposed method achieves high accuracy and promising result.Keywords: integral production, level set method, morphological operation, segmentation
Procedia PDF Downloads 316