The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Clustering is one of the most common automated image segmentation techniques used in many fields including machine learning, pattern recognition, image processing, and bioinformatics. Recently many scientists have performed tremendous research in helping the hematologists in the issue of segmenting the blood cells in the early of prognosis. This paper aims to segment the blood cell images of patients...
Patients with liver disease continue to increase and the symptoms of the disease is difficult to detect. Therefore many people suffer from liver damage but they feel healthy, it causes many medical practitioners to often fail to detect the disease. Failure to detect can mislead to improper medication and medical treatment. Therefore accurate detection is necessary to help the medical practitioner...
Performing hajj and umrah is one of the five pillars of Islam. The ritual involves many rules and procedures, and to remember all these rules and procedures usually poses a problem for pilgrims. The advancement of IT can provide a solution to the problem mentioned above. Hence, we apply the Internet and smart phone technologies to develop the M - Umrah application for users. The target users of this...
Ageing populations are turning to technology in greater numbers than ever. New technology is being designed to help older people live independently for longer. Despite the usefulness of mobile phones especially older people, the current problems with its complex features and interface designs have intimidated some older people users from using the device. The authors wished to explore exposure to...
The scenario of rapid development in Information Communication Technology and the increasing population of older people in this twenty-first century has urged more Human Computer Interaction researchers to endeavor study pertaining how technology can assist older people in their lives. Older adult generally experience some significant changes as they grow older including physical, cognitive and behavioral...
Considering that very few studies have actually addressed the aspect of trust with all the three categories of trustee i.e. the retail banks, the mobile telecommunication provider and the mobile telephone in one single study, this study attempts to address this gap. In addition the study also seeks to investigate the impact of mobile banking utilization on satisfaction and loyalty. Adopting a survey...
Android applications or apps are taking the smart phones industry to a new level. Smart phone users can do most of their everyday tasks using the various types of applications offered in the Android Play Store. Generally, prior to installation of the apps, users need to agree on the permissions requested by the apps, they are not given any other option. Essentially, users may not aware on some security...
Children with Dyslexia are having language learning disorder and makes them difficult mastering the skill to read, spell and write. Although their cognitive capability is adequate, they faced difficulty in learning to read via conventional instruction approach. This paper presents a mobile application known as 'Dyslexia Baca' specifically developed to help dyslexic children to recognize and distinguish...
Traditional network level firewalls, based on port and IP addresses, are inadequate for dealing with the development of applications and protocols that do not follow the conventions of port services established by IANA (Internet Assigned Numbers Authority). Therefore firewalls capable of accurately classifying and filtering connections based on application information are needed. This paper studies...
There are several Optical Character Recognition (OCR) mobile applications on the market running on mobile devices, both android and iOS (iPhone, iPad, iPod) platforms. The limitations of mobile device processor hinder the possible execution of computationally intensive applications that need less time of process. This paper proposes a framework of Optical Character Recognition (OCR) on mobile device...
With the development of ubiquitous computing, smart home nowadays are becoming popular and more widely used by people especially for those who really need the ease of living. Today, the rapid development of smartphone also has become useful for smart home in which the device can be used to remotely control the smart home technologies. However, the security of the devices and the communication among...
This paper reports on qualitative findings that have been obtained from a study about mobile phone usage by Malaysian older people. The information has been classified into various categories such as usage, difficulties encountered with the physical interface of the mobile phone, functions complexity, cost, language related issues, ideal phone and etc. In this study, two similar experiments were carried...
Mobile Ad Hoc Network is a collection of mobile nodes without the assistance of any centralized structures. The network is divided into clusters, each cluster has a clusterhead, which is used to distribute service and route packets in his cluster. Due to the variance between the node's levels of activity, the network may possess either highly loaded or lightly loaded clusterheads. This may degrade...
Work in indoor positioning so far broadly relies on either signal propagation models or location fingerprinting. The former approach has inherent modelling complexity as a result of intervening walls and movement in the environment which, impacts the accuracy of such models. The latter approach on the other hand, is acclaimed to give better accuracy. However, for it to be used, an added overhead of...
Polymorphic worms are considered as the most dangerous threats to the Internet security, and the danger lies in changing their payloads in every infection attempt to avoid the security systems. In this paper, we propose an accurate signature generation system for zero-day polymorphic worms. We have designed a novel Double-honeynet system, which is able to detect zero-day polymorphic worms that have...
The evolution of packet capture technology has made substantial advances in packet capture whereby both software and hardware solutions have been designed to optimize packet capture performance. Packet capture is the process of capturing data packets across a computer network. Packet capture has become more challenging with the advent of fast speed networks. The complexity of capturing in high packet...
In the recent years, hundreds to thousands of people have been killed in many calamities across Asian region, such as tsunami, floods, earthquake and so on. These natural disasters have become great challenges, particularly to those developing countries as many are lacking of an efficient disaster management system and disaster recovery plan that will help in times of need. Among the common challenges...
Wide spread of network equipped devices tempted the researchers to direct their efforts towards developing new technologies and applications that contribute in enhancing data transmission over Mobile Ad Hoc Networks (MANET). Routing technologies are considered the most challenging part in the ad hoc technology due to dynamic nature of wireless networks. These protocols affect the whole network performance...
The endless transformation of technological innovation requires greater collaboration of Information Communication and Technology (ICT) in various areas especially in public sectors. Many attempts have been made in improving the quality of E-Government services, one of it is adopting the cloud computing technology. Successful-implementation of cloud computing technology can benefit the public sector...
The primary purpose of this study was to provide validity evidence for the items used to measure the intention to use an Online Discussion Site (ODS). Seventy seven students participated in this study. The extended Technology Acceptance Model (TAM) model was adapted for this study. With the use of the Rasch analysis, the item validity in extended TAM model was evaluated. There are a few aspects of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.