UPSI Digital Repository (UDRep)
Start | FAQ | About
Menu Icon


Browse by: Year_icon Subject Year_icon Publisher Year_icon Year
Latest addition to the database :
80412019
Article
Menangani kekaburan kemahiran prosedur dan terminologi awal matematik:pendekatan leksis berdasarkan teori prosodi semantik
Anida Sarudin
Tujuan – Kajian ini bertujuan mengenal pasti pedagogi guru awal Matematik dalam kalangan kanak-kanak di Pusat Anak PERMATA Negara (PAPN) dan mengenal pasti sejauh manakah pendekatanleksis berdasarkan Teori Prosodi Semantik dapat menjelaskan kekaburan kemahiran prosedur dan terminologi awal Matematik Metodologi – Kajian ini melibatkan 20 orang guru dan 60 orang 1. Instrumen yang digunakan dalam kajian ini ialah soal selidik dan senarai semak pencerapan dan pemudahcaraan (PdPc). Proses pencerapan PdPc hanya melibatkan 8 orang guru yang terpilih secara rawak. Kajian ini juga mengaplikasikan korpus daripada Pangkalan data Dewan Bahasa dan Pustaka (DBP) untuk meneliti kolokasi kata dan konteks berkaitan leksikal padanan, kumpul, mengasingkan dan banding. Dapatan – Hasil kajian mendapati bahawa PdPc, guru mengajar konsep padanan dengan menjelmakan perkataan cari yang sama, pilih yang sama, sama tak bentuk, sama dengan, dan tarik, manakala konsep kumpul dijelmakan dengan leksikal sepe.....

1080 hits

80422019
Article
Based medical systems for patient
Albahrey, Shihab Ahmed
In medical systems for patient’s authentication, keeping biometric data secure is a general problem. Many studies have presented various ways of protecting biometric data especially finger vein biometric data. Thus, It is needs to find better ways of securing this data by applying the three principles of information security aforementioned, and creating a robust verification system with high levels of reliability, privacy and security. Moreover, it is very difficult to replace biometric information and any leakage of biometrics information leads to earnest risks for example replay attacks using the robbed biometric data. In this paper presented criticism and analysis to all attempts as revealed in the literature review and discussion the proposes a novel verification secure framework based confidentiality, integrity and availability (CIA) standard in triplex blockchain-particle swarm optimization (PSO)-advanced encryption standard (AES) techniques for medical systems patient’s auth.....

2043 hits

80432019
Article
Mobile patient monitoring systems from a benchmarking aspect: challenges, open issues and recommended solutions
Albahrey, Shihab Ahmed
This paper presents comprehensive insights into mobile patient monitoring systems (MPMSs) from evaluation and benchmarking aspects on the basis of two critical directions. The current evaluation criteria of MPMSs based on the architectural components of MPMSs and possible solutions are discussed. This review highlights four serious issues, namely, multiple evaluation criteria, criterion importance, unmeasurable criteria and data variation, in MPMS benchmarking. Multicriteria decision-making (MCDM) analysis techniques are proposed as effective solutions to solve these issues from a methodological aspect. This methodological aspect involves a framework for benchmarking MPMSs on the basis of MCDM to rank available MPMSs and select a suitable one. The benchmarking framework is discussed in four steps. Firstly, pre-processing and identification procedures are presented. Secondly, the procedure of weight calculation based on the best–worst method (BWM) is described. Thirdly, the developmen.....

1860 hits

80442019
Article
Based blockchain-PSO-AES techniques in finger vein biometrics: a novel verification secure framework for patient authentication
Albahrey, Shihab Ahmed
The main objective of this study is to propose a novel verification secure framework for patient authentication between an access point (patient enrolment device) and a node database. For this purpose, two stages are used. Firstly, we propose a new hybrid biometric pattern model based on a merge algorithm to combine radio frequency identification and finger vein (FV) biometric features to increase the randomisation and security levels in pattern structure. Secondly, we developed a combination of encryption, blockchain and steganography techniques for the hybrid pattern model. When sending the pattern from an enrolment device (access point) to the node database, this process ensures that the FV biometric verification system remains secure during authentication by meeting the information security standard requirements of confidentiality, integrity and availability. Blockchain is used to achieve data integrity and availability. Particle swarm optimisation steganography and advanced encryp.....

1642 hits

80452019
Article
Multi-criteria evaluation and benchmarking for active queue management methods: open issues, challenges and recommended pathway solutions
Albahrey, Shihab Ahmed
The evaluation and benchmarking processes of active queue management (AQM) methods are complicated and challenging. Several evaluation criteria/metrics must be considered before an AQM method can yield satisfactory performance using speci¯c metric(s). Further investigations are required to highlight the limitations of how criteria/metrics are determined and how their procedures accord with the evaluation and benchmarking processes of AQM. In this paper, we presented comprehensive insights into the multi-criteria evaluation and benchmarking of AQM methods based on two critical directions. First, current AQM evaluation criteria are collected, analyzed and categorized. Second, these AQM evaluation criteria highlight con°icting issues and benchmarking techniques to identify weak points, and possible solutions are discussed. The ¯ndings of this study are as follows: (1) The limitations and problems of existing AQM evaluation and benchmarking methods, such as multi-evaluation criteria, cr.....

1449 hits

80462019
Article
Comprehensive review and analysis of anti-malware apps for smartphones
Albahrey, Shihab Ahmed
The new and disruptive technologies for ensuring smartphone security are very limited and largely scattered. The available options and gaps in this research area must be analysed to provide valuable insights about the present technological environment. This work illustrates the research landscape by mapping the existing literature to a comprehensive taxonomy with four categories. The frst category includes review and survey articles related to smartphone security. The second category includes papers on smartphone security solutions. The third category includes smartphone malware studies that examine the security aspects of smartphones and the threats posed by malware. The fourth category includes ranking, clustering and classifcation studies that classify malware based on their families or security risk levels. Several smartphone security apps have also been analysed and compared based on their mechanisms to identify their contents and distinguishing features by using several evaluatio.....

1996 hits

80472019
Article
Fault-tolerant mHealth framework in the context of IoT-based real-time wearable health data sensors
Albahrey, Shihab Ahmed
The emerging technology breakthrough of the Internet of Things (IoT) is expected to offer promising solutions for indoor/outdoor healthcare, which may contribute significantly to human health and well-being. In this paper, we investigated the technologies of healthcare service applications in telemedicine architecture. We aimed to resolve a series of healthcare problems on the frequent failures in telemedicine architecture through IoT solutions, particularly the failures of wearable body sensors (Tier 1) and a medical center server (Tier 3). For improved generalisability, we demonstrated an effective research approach, the fault-tolerant framework on mHealth or the so-called FTF-mHealth-IoT in the context of IoT, to resolve essential problems in current investigations on healthcare services. First, we propose a risk local triage algorithm known as the risk-level localization triage (RLLT), which can exclude the control process of patient triage from the medical center by using mHealth .....

2878 hits

80482019
Article
Blockchain authentication of network applications: taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions
Albahrey, Shihab Ahmed
As the first and last line of defence in many cases, authentication is a crucial part of a system. With authentication, any unauthorised access to the system can be prevented. This work maps the research landscape through two means. The first is a comprehensive taxonomy of blockchain technology in authentication over networking. The second is identification of different types of authentication systems under various platforms that use blockchain technology. This work also provides useful and classified information which can enhance the understanding of how various authentication systems can be combined with blockchain technology. In addition, problems associated with this blockchain technology and proposed solutions are surveyed to fulfil the requirements of the network applications. Moreover, this work highlights the importance, capabilities, motivations and challenges of blockchain technology with distinct applications in various fields. Finally, recommendations and future research di.....

1623 hits

80492019
Article
The Importance of Generic Skills for Technical and Vocational Students Employability
Mohd Azlan Mohammad Hussain
Technical and vocational education is no longer a "second class" option in the eye of the community because of its significant role in producing human capital for industries. Hence, consistent efforts have been done by Technical and Vocational Education and Training (TVET) institutions to enhance the students’ skills and capability. Recently, a lot of graduates are unable to secure a job after graduating because of a failure to meet the employer's expectation. The reasons are because employers normally have their preference criteria in recruitment, such as having a good employability skills. Therefore, this concept paper has been developed in order to study the importance of generic skills in improving the employability of Malaysian vocational students. The "CareerEDGE" model have been used to further discuss the relevant generic skills needed by TVET students in Malaysia. In addition, the elements of generic skills that are important to vocational students will be identified then it.....

1387 hits

80502019
Article
Penilaian formatif bahan pengajaran dan pembelajaran bahasa Melayu sebagai bahasa asing di Thailand
Zulkifli Osman
Kajian ini bertujuan melaporkan proses penilaian formatif bahan pengajaran dan pembelajaran Bahasa Melayu sebagai bahasa asing di Thailand berdasarkan model penilaian formatif Tessmer. Kajian ini melibatkan tiga tahap penilaian, iaitu penilaian pakar, maklum balas daripada pensyarah dan pelajar, kumpulan kecil atau rintis, dan kajian lapangan. Tiga pihak terlibat sebagai responden dalam kajian ini, iaitu pakar bidang, pensyarah, dan pelajar. Borang penilaian bahan, komen bersemuka, dokumen pelajar dan bahan yang dibangunkan digunakan sebagai instrumen kajian. Dapatan penilaian pakar, pensyarah dan pelajar menunjukkan bahawa bahan ini perlu disesuaikan dan diperbaiki khususnya dari aspek kandungan, bahan pengajaran dan pedagogi. Dapatan penilaian kumpulan kecil pula mendapati bahawa aspek kandungan, bahan pengajaran, motivasi, pedagogi, kemahiran bahasa dan penilaian sesuai dengan kemampuan pelajar. Dalam penilaian lapangan pula, didapati bahawa aspek penggunaan bahasa, kandungan, ilust.....

804 hits

[ First ] [ Prev ] Page 805 of 1147 [ Next ] [ Last ]
Filter
Loading results...



Specific Period
Loading results...



Top 5 related keywords (beta)

Loading results...



Recently Access Item




Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.