Browsing by Author "Ismail R."
Now showing 1 - 16 of 16
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication A non-surgical management of delayed diagnosis of an oesophageal perforation due to ingestion of okra: A case report(Universiti Putra Malaysia Press, 2020) ;Ismail R. ;Mahamad U.A.Marwan A.A.Oesophageal perforation is a not uncommon condition, yet it carries a high mortality rate and has been observed as the most grievous trauma to the digestive tract. Common causes include iatrogenic instrumentation, foreign-body swallowing, and physical injury. This report highlighted a case of oesophageal perforation complicated by formation of proximal descending aorta pseudoaneurysm as a result of okra ingestion. The patient was successfully treated with conservative treatment. The possible mechanism of oesophageal rupture, diagnosis, treatment, and other complication will be further discussed. � 2020 UPM Press. All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication A rare case of disseminated sarcoidosis presenting with neurosarcoidosis: A case report(Universiti Putra Malaysia Press, 2020) ;Sukur N.A. ;Sahari N.S. ;Marwan A.Z.Ismail R.Sarcoidosis is characterized by formation of inflammatory granulomas affecting all over the body, with pulmonary predilection (1). Neurosarcoidosis is a rare but potentially dangerous manifestation of sarcoidosis. We report a case of disseminated sarcoidosis presenting with a neurological diagnostic dilemma. Worsening mediastinal lymphadenopathy, together formation of lung and liver nodules making a sarcoidosis diagnosis favourable. Histology from these lesions showed non-caseating granulomatous inflammation. She was treated as a rare case of disseminated sarcoidosis. To date, there is no specific or clear guideline on the management of disseminated sarcoidosis. � 2020 UPM Press. All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication Application of OASys approaches for dates ontology(Institute of Electrical and Electronics Engineers Inc., 2017) ;Tawil S.F.M. ;Ismail R. ;Wahid F.A. ;Norwawi N.M. ;Mazlan A.A. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Ontology as a knowledge representation have contributed in providing the platform for sharing the common ideas and understanding among the members of similar domain. Ontology has a tree structure to ease the presentation of information for the users. This paper presents the building of Dates ontology by using the OASys approaches. The Dates ontology is focusing on the Dates' attributes, the developing stages, defect and diseases of dates, health benefits, its compositions, and the Dates chain of operation. Formation of this Dates ontology can be used to answer user queries, integrate data to other applications as well as expand the ontology. � 2016 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Assessing the status of library information systems security(2013) ;Ismail R. ;Zainab A.N. ;Universiti Sains Islam Malaysia (USIM)University of Malaya (UM)This study proposes an instrument to assess the current information system security status in libraries. The instrument is based on a model named LISSAM (library information systems security assessment model), which comprises five components: technological security foundation, information security policy, procedures and control, administrative tools, methods, and awareness creation. The instrument was pilot-tested with 50 respondents responsible for information systems or information technology in their libraries. All components received Cronbach alpha scores of <0.60 and were found to be reliable and acceptable. Findings revealed that over 95% of libraries have a high level of technological implementation but 54% scored poorly on organizational measures, especially on the lack of security policies, procedures, and user training. High scores on technological implementation were found to be correlated to sufficient financial support and early information and computer technology adoption. � The Author(s) 2013. - Some of the metrics are blocked by yourconsent settings
Publication Central airway obstruction tumour debulking using rigid bronchoscopy and cryotherapy: A case report(Universiti Putra Malaysia Press, 2020) ;Chew W.H. ;Marwan A.Z. ;Daut U.N. ;Ismail R. ;Nasaruddin M.Z.Rahman J.A.A.Sarcomas usually frequented in the head and neck region of young adults. Trachea is a rare site, and due to scarce clinical data, its clinical outcome is unclear. We reported a case of 60-year old patient presented with progressive worsening shortness of breath, cough, and progressive worsening dysphagia. Computer tomography scan revealed extensive 2 lobulated soft tissue lesions within and surrounding the trachea at the T4 level. Rigid bronchoscopy with mass cryo-debulking was performed and ultimately synovial sarcoma was diagnosed. Shortness of breath was completely relieved post-procedure. � 2020 UPM Press. All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication Comparative Study of Icon Design for Mobile Application(Institute of Physics Publishing, 2020) ;Kamarulzaman N.A. ;Fabil N. ;Zaki Z.M.Ismail R.Icons are widely used in mobile applications as visual displays that can assist the acquisition and understanding of information. An icon creates better visual perception with the ability to communicate meaning. Icon design is an approach of designing a graphic icon that can express a specific meaning. Icon design principles and elements are considered as major factors for mobile user interface that would lead to higher icon usability and acceptance of mobile applications. The study is undertaken to conduct a systematic review of published scientific literature on icon design elements for mobile applications. The chosen articles were published between 2014 and 2019, with full text provided and written in the English language. The electronic databases used were Google Scholar, Scopus, ProQuest, and Research Gate. Other sources include secondary data through books and web pages. The search terms used were "mobile icon design", "mobile icon design principle", "mobile icon design element"and "apps icon design". The outcomes of this paper are a comparative study and proposed elements for icon design that will contribute to the field of icon design for mobile application. The proposed elements for icon design consist of recognizable, colour, simple, semantics, familiarity, shape, aesthetic, consistency, uniqueness and concreteness. These proposed elements for icon design can assist designers and researchers in designing icons for mobile application that would improve user experience by enhancing the meaning of icons to users. � Published under licence by IOP Publishing Ltd. - Some of the metrics are blocked by yourconsent settings
Publication Demuse: Releasing stress using music mobile application(Little Lion Scientific, 2018) ;Baharum A. ;Pitchay S.A. ;Ismail R. ;Fabeil N.F. ;Rusli N.M. ;Bahar I.A.A. ;Faculty of Science and Technology ;Universiti Malaysia Sabah (UMS) ;Universiti Sains Islam Malaysia (USIM)Universiti Tenaga Nasional (UNITEN)It can be seen that, conflicts, negative revolution, suicides, and other crimes becoming more common worldwide. Several studies and investigations have been conducted due to this case. Thus, it has been found that one of the root cause is stress, especially among the youth. Although stress can improve work performance and awareness for those who can manage it properly, however if someone is unable to cope with the stressful situation when it becomes excessive, the reaction might be disastrous. In tackling this unfavourable situation, several lifestyle changes have been prescribed such as listening to music, physical activities, doing desired activities, surfing, and others. This study uses the power of music to reduce stress. A mobile application named as �DeMuse� was developed and in its development, Mobile-D step-by-step methodology was applied. At explore phase, a number of existing applications have been compared. At the second phase, the initialize stage, a quantitative analysis was carried out to study the music and mood categories respectively. During the third and fourth phases, which were Productionize and Stabilise, the completion of Data Flow Diagram and Entity Relationship Diagram were established based on the quantitative analysis done. In the final phase, the System Test and Fix, the prototype were reviewed by 148 potential users. DeMuse showed to be one of the alternative ways to relieve stress. From this finding, DeMuse highlight the main feature which is the music and mood categories. In conclusion, DeMuse is a valid mobile apps that could be used to help reduce stress of its user. With this app, it hopes greatly to help in decreasing and eliminating the tension, dissatisfaction, and others negative feelings of users in their daily life. � 2005 � on going JATIT & LLS. - Some of the metrics are blocked by yourconsent settings
Publication An Early Warning System for Reservoir Water Release Operation Using Agent-Based Negative Selection Model(Institute of Physics Publishing, 2020) ;Doi S.M.C. ;Norwawi N.M.Ismail R.An early warning system is one of the best solutions for flood management. It enhances the reservoir floodgate operation, flood proofing, flood insurance, and flood plain zoning processes. The timeline and accuracy of the decision to open the reservoir gate are critical. Any delay might damage the dam caused by the excess water, leading to flash flood to the surrounding areas. Consequently, huge losses could be incurred, such as the loss of lives, properties, and financial ruins. At this point, the reservoir floodgate operator would sometimes be hesitant to make an early decision due to inconsistency in getting heavy rainfall data readings, which are under manual control. Therefore, this paper proposes the use of an autonomous agent-based system based on the Artificial Immune Systems (AIS). This system would immediately send readings to the reservoir operator so that gradual release of water from the reservoir can be done to prevent it from bursting. This task requires a certain level of experience and expertise in decision making to ensure no water shortage due to the volume of water to be released. This proposed early warning system is based on the immune negative selection and intelligent agent to monitor the changes in the reservoir water level. This autonomous early detection mechanism can support the domain expert's job to recognise the threats early on, which is required to improve the monitoring procedure. � Published under licence by IOP Publishing Ltd. - Some of the metrics are blocked by yourconsent settings
Publication Evaluating usability for mobile application: A MAUEM approach(Association for Computing Machinery, 2017) ;Saleh A. ;Ismail R. ;Fabil N. ;Faculty of Science and Technology ;Aqaba University of TechnologyUniversiti Sains Islam Malaysia (USIM)Many traditional usability metrics were purposely created for desktop computer applications and may not be directly applicable to mobile device applications. Usability metrics refer as means of measuring or evaluating the usability factors, attributes and related measurable criteria corresponding to usability attributes. The objectives of this paper were to evaluate the usability attributes and metrics of mobile device applications by using the unsupervised usability evaluation tool. Subjective and objective measurements were used to clarify the usability metrics collected in the log file which are generated by the unsupervised usability tool. The proposed Mobile Application Usability Evaluation Metrics (MAUEM) model can provides guidance on how and what to measure for each usability attribute which could lead to a complete usability evaluation for a mobile application. � 2017 Association for Computing Machinery. - Some of the metrics are blocked by yourconsent settings
Publication Horn clause techniques in rehabilitation clinic for return to work(Blue Eyes Intelligence Engineering and Sciences Publication, 2019) ;Amr R.M.-N.A. ;Ismail W. ;Zakaria L.Q. ;Zaizi N.J.M. ;Ismail R. ;Bahari M. ;Yusof M.M. ;Islamic Science Institute ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Kebangsaan Malaysia (UKM)Rehabilitation therapy aims to enable disabled patients to maintain optimal functioning upon achieving return-to-work (RTW) approval. The Berg Balance Scale (BBS) is a benchmark for activity accomplishment featured in the International Classification of Functioning, Disability and Health Framework (ICF). The ICF is used by physiotherapist (PT) and occupational therapist (OT) to determine the functional mobility of disabled patient. Conventionally, practitioners measure, record, and analyze assessment results manually which resulting in difficulty in predicting patient progression. The large data volume involved in the RTW process requires synthesize and reasoning for decision making purposes. Thus, there is a need to identify an efficient reasoning technique to facilitate the decision making process. This study highlights the use of Horn Clause in decision tree to assist medical doctor in assessing improvement of RTW approved patient based on the BBS assessment. The Horn Clause is one of the fundamental reasoning techniques applied in various domains including healthcare. The next phase of this study is to test the efficiency of the Horn Clause reasoning based on patient’s stroke recovery and spinal cord injury. - Some of the metrics are blocked by yourconsent settings
Publication Information systems security in special and public libraries: An assessment of status(Univ Malaya, Fac Computer Science & Information Tech, 2011) ;Ismail R. ;Zainab A.N. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)University of Malaya (UM)Explores the use of an assessment instrument based on a model named library information systems security assessment model (LISSAM) to assess the ISS status in special and public libraries in Malaysia. The study aims to determine the implementation status of technological and organizational components of the LISSAM model. An implementation index as well as a scoring tool is presented to assess the IS safeguarding measures in a library. Data used was based on questionnaires distributed to a total of 50 individuals who are responsible for the information systems (IS) or IT in the special and public libraries in Malaysia. Findings revealed that over 95% of libraries have high level of technological implementation but 54% were fair poorly on organizational measures, especially on lack of security procedures, administrative tools and awareness creation activities. - Some of the metrics are blocked by yourconsent settings
Publication Measuring usability: Importance attributes for mobile applications(American Scientific Publishers, 2017) ;Saleh A.M. ;Ismail R. ;Fabil N. ;Norwawi N.M. ;Abdul Wahid F. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)This research aims to analyze the importance and relationships between the usability attributes for mobile application. The usability attributes were grouped into nine (9) factors such as efficiency, effectiveness, learnability, memorability, errors, satisfaction, cognitive workload, simplicity, and interruptibility. A total of 411 useable questionnaires form the basis of analysis. The results revealed that Errors (Mean = 3.82) was the most important usability attribute for mobile application and there was a significant correlation between satisfaction and errors, (r = .591, n = 411, p <.01). The numbers of navigational errors can potentially effects on user performance, user progress and user perception toward mobile applications. Many respondents also agreed that the higher satisfaction (Mean = 3.75), the more simple interface (Mean = 3.72), and the less cognitive workload attribute (Mean = 3.71) may enhance the level of usability of mobile application. Interestingly, satisfaction was found correlated with cognitive load (r = .553, n = 411, p <.01) and learnability was found correlated with memorability (r = .480, n = 411, p <.01). This study contributed in providing an insight into the importance and relationships between usability attributes which can be applied in usability measurement for mobile applications. � 2017 American Scientific Publishers All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication Mobile government applications based on security and privacy: A literature review(Science Publishing Corporation Inc, 2018) ;Al-Sherideh A.S. ;Ismail R. ;Wahid F.A. ;Fabil N. ;Ismail W. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens. The main challenges that face the acceptance and adoption of mobile governmental applications are the privacy and security issues. The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services. This study focuses in investigating the security and privacy requirements of mobile government applications. Many related works are reviewed and discussed to understand the important security requirements of mobile government applications. The main results indicate that effective privacy and security of mobile government applications should be assured so as to enhance the level of adopting and using these applications. The security requirements involve many considerations such as the hardware characteristics, software characteristics, and communication characteristics. This article mainly gives better understanding of security requirements of mobile government applications. � 2018 Authors. - Some of the metrics are blocked by yourconsent settings
Publication Readiness of Information Security Management Systems (ISMS) policy on hospital staff using e-patuh system(Universiti Teknikal Malaysia Melaka, 2018) ;Ismail W. ;Alwi N.H.M. ;Ismail R. ;Bahari M. ;Zakaria O. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM) ;Universiti Teknologi Malaysia (UTM)Universiti Pertahanan Nasional Malaysia (UPNM)ISO 27001:2013 is the best-known standard providing requirements for information security management systems (ISMS). An ISMS is a systematic approach to manage sensitive information through people, processes and IT systems. In a hospital, a patient's individual medical record is highly private and sensitive. This study performed qualitative questionnaire based on the ISO27001:2013 policy. Seven hospitals in Malaysia were involved in this study. This study focus on the Data Center as it contains a high risk server. This study reveals the non-compliance issues among the sampled hospitals in Malaysia. The participation of the hospitals in trainings related to information security awareness and education were still not adequate due to lack of support from the top management. The Malaysian Administrative Modernisation and Management Planning Unit (MAMPU), the Ministry of Health Malaysia and the top management in hospitals in Malaysia play vital roles to educate and ensure the compliance of ISO 27001:2013. 2018 Universiti Teknikal Malaysia Melaka. All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication Sex estimation from reconstructed scapula models using discriminant function analysis in the Malaysian population(Taylor and Francis Ltd., 2019) ;Omar N. ;Mohd Ali S.H. ;Shafie M.S. ;Nik Ismail N.A. ;Hadi H. ;Ismail R. ;Mohd Nor F. ;Faculty of Medicine and Health Sciences ;Universiti Kebangsaan Malaysia Medical CentreUniversiti Sains Islam Malaysia (USIM)Scapulae have been widely studied for its potential in differentiating sex in skeletal remains, especially when traditionally used sexually dimorphic bones were not available. The present work aimed to investigate sexual dimorphism of scapulae, and to develop and validate the population-specific metric standards of the Malaysian population using three-dimensional (3D) computed tomographic (CT) scapula models. Each scapula was measured for five variables with a digital caliper and analysed for independent T-test and discriminant analysis, where a leave-one-out cross-validation was applied. Moreover, a set of different samples (hold-out sample) was used to validate the established discriminant functions (DF). Consequently, all measurements showed significant differences between males and females (p < 0.001) and morphological breadth was discovered as the most sexually dimorphic scapulae measurements. Six DFs with classification accuracy ranging from 84.4% to 93.1% were generated. From the functions, stepwise DF predicted the highest classification accuracy. Additionally, the stepwise DF exhibited 95% classification accuracy when tested on the hold-out sample compared to univariate DFs which showed 82.5�92.5% accuracy. In conclusion, the virtual 3D scapulae models were sexually dimorphic, and the discriminant functions were significant in identifying skeletonized remains using scapulae bone in the Malaysian population. � 2019, � 2019 Australian Academy of Forensic Sciences. - Some of the metrics are blocked by yourconsent settings
Publication Simulation of Agent-Based Negative Selection Model (ABNSM) for Reservoir Water Level Monitoring(Institute of Physics Publishing, 2020) ;Doi S.M.C. ;Norwawi N.M. ;Ismail R. ;Wahab M.H.A.Idrus S.Z.S.Reservoir water level monitoring is an important process during heavy or light rainfall to determine the volume of reserved water. Mistakes in data recording by the dam operator can lead to disasters. Data from different gauging stations are collected to determine whether to release water in the dam or not. The decision to release water is critical because it can affect the volume of water left in the dam for both drought and flood seasons. Constant water level monitoring is difficult because of the changes in water level. To overcome this issue, intelligent agent-based architecture is proposed for reservoir water level monitoring by imitating the artificial immune system. This paper presents the agent technology where agents communicate with each other concurrently by sending online data from different gauging stations to the main reservoir. One of the techniques in the artificial immune system is known as negative selection and this technique has been chosen as a water level monitoring model. � Published under licence by IOP Publishing Ltd.