33 results on '"Khaironi Yatim Sharif"'
Search Results
2. Novel Multi Security and Privacy Benchmarking Framework for Blockchain-Based IoT Healthcare Industry 4.0 Systems
- Author
-
Sarah Qahtan, Khaironi Yatim Sharif, A. A. Zaidan, H. A. Alsattar, O. S. Albahri, B. B. Zaidan, Hazura Zulzalil, M. H. Osman, A. H. Alamoodi, and R. T. Mohammed
- Subjects
Control and Systems Engineering ,Electrical and Electronic Engineering ,Computer Science Applications ,Information Systems - Published
- 2022
- Full Text
- View/download PDF
3. Novel Multi-Perspective Usability Evaluation Framework for Selection of Open Source Software Based on BWM and Group VIKOR Techniques
- Author
-
Khaironi Yatim Sharif, Hazura Zulzalil, B. B. Zaidan, Kareem Abbas Dawood, A. A. Zaidan, and Abdul Azim Abdul Ghani
- Subjects
Computer science ,business.industry ,media_common.quotation_subject ,020206 networking & telecommunications ,020302 automobile design & engineering ,Usability ,02 engineering and technology ,Benchmarking ,Multi perspective ,Software ,0203 mechanical engineering ,Decision matrix ,Factor (programming language) ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science (miscellaneous) ,Quality (business) ,Software engineering ,business ,computer ,Selection (genetic algorithm) ,media_common ,computer.programming_language - Abstract
Increasing demand for open-source software (OSS) has raised the value of efficient selection in terms of quality; usability is an essential quality factor that significantly affects system acceptability and sustainability. Most large and complex software packages partitioned across multiple portals and involve many users — each with their role in the software package; those users have different perspectives on the software package, defined by their knowledge, responsibilities, and commitments. Thus, a multi-perspective approach has been used in usability evaluation to overcome the challenge of inconsistency between users’ perspectives; the inconsistency challenge would lead to an ill-advised decision on the selection of a suitable OSS. This study aimed to assist the public and private organizations in evaluating and selecting the most suitable OSS. The evaluation of the OSS software packages to choose the best one is a challenging task owing to (a) multiple evaluation criteria, (b) criteria importance, and (c) data variation; thus, it is considered a sophisticated multi-criteria decision making (MCDM) problem; moreover, the multi-perspective usability evaluation framework for OSS selection lacks in the current literature. Hence, this study proposes a novel multi-perspective usability evaluation framework for the selection of OSS based on the multi-criteria analysis. Integration of best-worst method (BWM) and VIKOR MCDM techniques has been used for weighting and ranking OSS alternatives. BWM is utilized for weighting of evaluation criteria, whereas VIKOR is applied to rank OSS-LMS alternatives. Individual and group decision-making contexts, and the internal and external groups aggregation were used to demonstrate the efficiency of the proposed framework. A well-organized algorithmic procedure is presented in detail, and a case study was examined to illustrate the validity and feasibility of the proposed framework. The results demonstrated that BWM and VIKOR integration works effectively to solve the OSS software package benchmarking/selection problems. Furthermore, the ranks of OSS software packages obtained from the VIKOR internal and external group decision making were similar; the best OSS-LMS based on the two ways was ‘Moodle’ software package. Among the scores of groups in the objective validation, significant differences were identified; this indicated that the ranking results of internal and external VIKOR group decision making were valid, which pointed to the validation of the framework.
- Published
- 2021
- Full Text
- View/download PDF
4. Current Software Defect Prediction: A Systematic Review
- Author
-
Yahaya Zakariyau Bala, Pathiah Abdul Samat, Khaironi Yatim Sharif, and Noridayu Manshor
- Published
- 2022
- Full Text
- View/download PDF
5. Using Ontology-Centric Knowledge Integration Framework as a Foundation to Innovative Problem-Solving
- Author
-
Mahmoud E. Said, Marzanah A. Jabar, Fatimah Sidi, and Khaironi Yatim Sharif
- Published
- 2022
- Full Text
- View/download PDF
6. Knowledge Simplification: A Conceptual Framework
- Author
-
Mahmoud E. Said, Marzanah A. Jabar, Khaironi Yatim Sharif, and Fatimah Sidi
- Published
- 2022
- Full Text
- View/download PDF
7. From Monolith to Microservices: A Semi-Automated Approach for Legacy to Modern Architecture Transition using Static Analysis
- Author
-
Mohd Hafeez Osman, Cheikh Saadbouh, Khaironi Yatim Sharif, and Novia Admodisastro
- Subjects
General Computer Science - Published
- 2022
- Full Text
- View/download PDF
8. Enhancement of Study Motivation Model by Introducing Expectancy Theory
- Author
-
Khaironi Yatim Sharif, Phan Xuan Tan, Eiji Kamioka, and HyunKi Min
- Subjects
Expectancy theory ,Punishment (psychology) ,media_common.quotation_subject ,ComputingMilieux_COMPUTERSANDEDUCATION ,Passion ,Positive attitude ,Construct (philosophy) ,Psychology ,Social psychology ,media_common ,Educational systems ,Test (assessment) - Abstract
Educational systems aim to help students discover their talents and develop a passion for learning. Hence, it is supposed that the education systems facilitate the efforts to motivate students. Hence, it is crucial to model students’ motivation to develop such a motivation in a concerned educational system. However, to date, there are limited number of works reporting on motivation model in this area. In this light, most of previous works have showed that students are evaluated only by the students’ test scores, not by students’ attitudes or behaviors. On the other hand, companies have modeled the motivation based on employees’ behaviors as explained by “Expectancy Theory” and have implemented it into a system called “Reward and Punishment”. In fact, the implementation at companies has shown a great influence in improving employees’ skills as they are motivated by all other employees. Hence, this research focused on modeling students’ motivation by students’ attitudes or behaviors. The reward and punishment are then used to comprehend this model. Thus, rather than by test scores, students will be evaluated by students’ attitudes toward positive attitudes rather than negative attitudes. It is expected that appropriate reward and punishment for modeling motivation will improve students’ motivation. For this reason, this paper proposed to construct an evaluation criterion by modeling students’ motivation towards positive attitudes and behaviors. Students’ attitudes will be evaluated and formulated into a motivation model. This model then will be tested in a normal existing classroom with a scenario using reward and punishment. Applying reward and punishment to existing classroom systems is expected to motivate students in improving their attitudes and behaviors.
- Published
- 2020
- Full Text
- View/download PDF
9. N/A and Signature Analysis for Malwares Detection and Removal
- Author
-
Khaironi Yatim Sharif, Ahmad Ridha Jawad, and Ammar Khalel Abdulsada
- Subjects
Software_OPERATINGSYSTEMS ,Multidisciplinary ,business.industry ,Computer science ,Windows Registry ,Trojan horse ,computer.software_genre ,Signature (logic) ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Software ,Malware ,Data mining ,business ,computer - Abstract
Objectives: This study aimed to design an application that effectively scans, detects, and removes malware based on their signatures and behaviours. Methods/Statistical analysis: The rapid growth in the number and types of malware poses high security risks despite the numerous antivirus softwares with Signature-Based Detection (SBD) method. The SBD method depends on the signatures or malware names that are available in the algorithm database. Findings: Malware is a type of malicious software that poses security threats to the targeted system, resulting in information loss, resource abuse, or system damage. The antivirus software is one of the most commonly used security tools to detect and remove malware. However, the malware defences should focus on the malware signatures since there is no universal way of recognising all malware. Therefore, this study suggested N/A detection technique as the dynamic method (behaviour-based detection method) that depends on the Windows Registry (system database). Both static and dynamic detection methods were assessed in this study. Based on the experimental outcomes, SBD method detected and removed most of malware (only known viruses). Application/Improvements: Meanwhile, the N/A detection method detected and removed all injected malware (known and unknown Trojan horse) within a relatively low running time. Keywords: Dynamic Method, Malicious Software, Malware Detection, Signature Analysis, Static Method
- Published
- 2019
- Full Text
- View/download PDF
10. Determinants of glycaemic control among type 2 diabetes mellitus patients in Northern State of Kedah, Malaysia: a cross-sectional analysis of 5 years national diabetes registry 2014-2018
- Author
-
Mohd Rohaizat Hassan, Mohd Nazrin Jamhari, Norhizan Ismail, Mohammad Saffree Jeffree, Norfazilah Ahmad, Mohd'Ammar Ihsan Ahmad Zamzuri, Shahrul Bariyah Ahmad, Khaironi Yatim Sharif, Firdaus Hayati, Syed Sharizman Syed Abdul Rahim, Muhammad Sufri Muhammad, and Azmawati Mohammed Nawi
- Subjects
Blood Glucose ,Male ,medicine.medical_specialty ,obesity ,Waist ,Cross-sectional study ,Overweight ,Body Mass Index ,Diabetes ,glycaemic control ,type 2 DM ,waist circumference ,Diabetes mellitus ,Internal medicine ,medicine ,Humans ,Registries ,Life Style ,Aged ,Glycated Hemoglobin ,medicine.diagnostic_test ,business.industry ,Research ,Malaysia ,Type 2 Diabetes Mellitus ,nutritional and metabolic diseases ,General Medicine ,Middle Aged ,medicine.disease ,Obesity ,Lipids ,Cross-Sectional Studies ,Diabetes Mellitus, Type 2 ,Female ,medicine.symptom ,Lipid profile ,business ,Body mass index - Abstract
Introduction:type 2 diabetes mellitus has become a global public health crisis. The increment in the cases has contributed significantly to the parallel increase in the prevalence of overweight and obesity. This paper aimed to analyse the relationship between lipid profile, waist circumference and body mass index (BMI) with the glycaemic control of the diabetes patients in Kedah. Methods:a cross-sectional study was conducted, using the Kedah audit samples data extracted from the National Diabetes Registry (NDR) from the year 2014 to 2018. A total of 25,062 registered type 2 diabetes mellitus patients were selected using the inclusion and exclusion criteria from the registry. Only patients with complete data on their HbA1C, lipid profile, waist circumference and BMI were analysed using SPSS version 21. Results:the means for the age, BMI and waist circumference of the samples were 61.5 (±10.85) years, 27.3 (±5.05) kg/m2and 89.46 (±13.58) cm, respectively. Poor glycaemic control (HbA1c>6.5%) was observed in 72.7% of the patients, with females having poorer glycaemic control. The BMI and waist circumference were found to be significantly associated with glycaemic control (P
- Published
- 2021
11. Mapping and Analysis of Open Source Software (OSS) Usability for Sustainable OSS Product
- Author
-
A. A. Zaidan, Hazura Zulzalil, Abdul Azim Abd Ghani, B. B. Zaidan, Kareem Abbas Dawood, and Khaironi Yatim Sharif
- Subjects
Knowledge management ,General Computer Science ,Computer science ,Usability ,02 engineering and technology ,learnability ,open source software ,Software ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Product (category theory) ,Sustainable development ,business.industry ,Principal (computer security) ,satisfaction ,General Engineering ,020207 software engineering ,sustainability ,Software bug ,efficiency ,Sustainability ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 - Abstract
The increase in the number of open source software (OSS) users have drawn attention to improving usability. Usability is a clear concept that encompassing both task and user characteristics as well as functionality. Usability is an essential factor that affects user acceptance and OSS sustainability, which is considered as the key to the success of the OSS. To some extent, usability is one concern of the larger issue of system acceptability and sustainability. Therefore, usability is an important factor that needs to be considered since the software that is not usable is not going to be sustainable. The objective of this paper is to review researchers' efforts to improve, investigate, and evaluate the usability factor that may affect the OSS acceptability and sustainability and map the research scenery from the articles into a comprehensible structured taxonomy, which would help the researchers to identify different research gaps of this field. A survey of the usability in OSS conducted and 6033 studies identified by a search in four scholarly databases using a query that includes the keywords (usability or learnability or efficiency or satisfaction) and (open source software or OSS). A total of 46 studies are selected. By manually searching in ACM, Springer, and Google Scholar five other studies identified, and thus a total of 51 studies were the final set that includes in this paper. Based on research topics, a taxonomy created and divided into four principal categories which improve OSS usability, analyze OSS usability, evaluate OSS usability, and select and adopt OSS. A comprehensive overview and synthesis of these categories are presented as well. This paper contributes to identifying the possible opportunities and gaps for enabling the participation of interested researchers in this research area. And give possibilities for extending the use of usability research and practices to create more sustainable software. Also, helps in selecting suitable OSS among the alternatives.
- Published
- 2019
- Full Text
- View/download PDF
12. Hybrid Genetic Algorithm for Improving Fault Localization
- Author
-
Abdul Azim Abd Ghani, Khaironi Yatim Sharif, Koh Tieng Wei, Muhammad Luqman Mahamad Zakaria, and Hazura Zulzalil
- Subjects
Health (social science) ,General Computer Science ,Java ,Computer science ,business.industry ,General Mathematics ,Distributed computing ,General Engineering ,Code coverage ,Hardware_PERFORMANCEANDRELIABILITY ,Software maintenance ,Fault (power engineering) ,Education ,General Energy ,Genetic algorithm ,Program slicing ,Local search (optimization) ,State (computer science) ,business ,computer ,General Environmental Science ,computer.programming_language - Abstract
Finding faults in a program correctly is crucial in software maintenance. In this light, many techniques have been proposed such as program slicing, code coverage, program state and mutation analysis. While all these techniques give us good insight on fault localization, but it appears that these techniques are made based on the assumption that the faults are caused by a single fault. However, in a reality, one fault could also possibly caused by multiple faults. This requires a technique which is specifically designed to handle multiple faults. With this regards, application of mutation analysis to localize faults might generate a vast number of mutants. As a result, these will lead to difficulty in choosing important mutants that are capable of localizing faults. Therefore, there is a need for a technique which able to localize a fault effectively with less number of mutants generated. Genetic algorithm (GA) is well known in finding an optimal solution to a problem while local search is capable of removing duplication. Since both had their own advantage, we have combined both techniques to enhance multiple localization of software fault. The result of the experiment shows that our technique able to detect multiple faults in various java programs but there is a need for improvement especially in prioritize fault that occurs simultaneously.
- Published
- 2018
- Full Text
- View/download PDF
13. Stable Vibration-Based Communication Scheme Using Multi-Step ASK and PPM Techniques
- Author
-
Khaironi Yatim Sharif, Eiji Kamioka, and Keishi Usa
- Subjects
Scheme (programming language) ,Computer science ,Smart device ,020206 networking & telecommunications ,02 engineering and technology ,Amplitude-shift keying ,law.invention ,Vibration ,Vibration based ,law ,Ask price ,Pulse-position modulation ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Communication methods ,computer ,computer.programming_language - Abstract
In the information-oriented society, there are increasing needs to conduct data communication with nearby devices/people. In this light, vibration-based communication method was proposed as one of possible communication means between adjacent devices. This method has been expected to provide an intuitive and safe communication by propagating vibration to a receiver device. This study proposes two types of techniques, which are multi-step ASK (Amplitude Shift Keying) with pseudo clock and PPM (Pulse Position Modulation), to achieve a stable vibration-based communication simply using smart device functions. These proposed techniques are then evaluated through some experiments using several types of smart devices. In addition, the effectiveness of the proposed methods is discussed based on the experimental results.
- Published
- 2018
- Full Text
- View/download PDF
14. Online News Veracity Assessment Using Emotional Weight
- Author
-
Khaironi Yatim Sharif, Phan Xuan Tan, Eiji Kamioka, and Fatin Amanina Ahmad Tarmizi
- Subjects
Information retrieval ,Social network ,business.industry ,Information Dissemination ,Feature (machine learning) ,Semantic analysis (knowledge representation) ,Affective science ,Context (language use) ,The Internet ,business ,Psychology ,Focus (linguistics) - Abstract
Trillions of data are being created every day on the Internet due to the growing number of social platforms on the World Wide Web (WWW). Processed data when given in context makes information of any knowledge. However, irresponsible use of the data or misinterpretation of data could be the reasons for false information dissemination. Many researchers from various fields, such as computer science and social science, draw their focus on assessing the veracity of information. There are many techniques to perceive this topic, for instance, social network behaviour, and semantic analysis. The common practice is using semantic analysis approach, where the syntactic structure is analysed and polarity of the texts is determined. In this paper, we approach the veracity assessment by using emotion analysis. We identified emotional states conveyed in news content and calculated the weight of each state in each news content. Contrary to popular belief, our finding showed that emotional, or affective states conveyed in false news are varied - positive and negative states. The distinct feature is the weight of the states in news content. Using multi-layer perceptron, we classified the news and achieved 90% accuracy with our collected dataset and 85% using LIAR dataset.
- Published
- 2019
- Full Text
- View/download PDF
15. Towards a unified criteria model for usability evaluation in the context of open source software based on a fuzzy Delphi method
- Author
-
Abdul Azim Abdul Ghani, B. B. Zaidan, A. A. Zaidan, Hazura Zulzalil, Kareem Abbas Dawood, and Khaironi Yatim Sharif
- Subjects
Fuzzy delphi method ,business.industry ,Computer science ,05 social sciences ,050301 education ,020207 software engineering ,Context (language use) ,Usability ,02 engineering and technology ,Open source software ,Computer Science Applications ,Set (abstract data type) ,Software ,0202 electrical engineering, electronic engineering, information engineering ,Metric (unit) ,business ,Software engineering ,0503 education ,Information Systems ,Meaning (linguistics) - Abstract
Context A plethora of models are available for open-source software (OSS) usability evaluation. However, these models lack consensus between scholars as well as standard bodies on a specific set of usability evaluation criteria. Retaining irrelevant criteria and omitting essential ones will mislead the direction of the usability evaluation. Objective This study introduces a three-step method to develop a usability evaluation model in the context of OSS. Method The fuzzy Delphi method has been employed to unify the usability evaluation criteria in the context of OSS. The first step in the method is the usability criteria analysis, which involves redefining and restructuring all collected usability criteria reported in the literature. The second step is fuzzy Delphi analysis, which includes the design and validates the fuzzy Delphi instrument and the utilisation of the fuzzy Delphi method to analyse the fuzziness consensus of experts' opinions on the usability evaluation criteria. The third step is the proposal of the OSS usability evaluation model. Results A total of 124 usability criteria were identified, redefined, and restructured by creating groups of related meaning criteria. The result of the groupings generated 11 main criteria; the findings of the fuzzy Delphi narrowed down the criteria to only seven. The final set of criteria was sent back to the panellists for reconsideration of their responses. The panellists verified that these criteria are suitable in the evaluation of the usability of OSS. Discussion The empirical analysis confirmed that the proposed evaluation model is acceptable in assessing the usability of OSS. Therefore, this model can be used as a reference metric for OSS usability evaluation which will have a practical benefit for the community in public and private organisations in helping the decision-maker to select the best OSS software package amongst the alternatives.
- Published
- 2021
- Full Text
- View/download PDF
16. Enhancement of Study Motivation Model by Introducing Expectancy Theory
- Author
-
Min, Hyun Ki, Xuan, Tan Phan, Khaironi Yatim Sharif, and Kamioka, Eiji
- Published
- 2019
- Full Text
- View/download PDF
17. An empirically-based characterization and quantification of information seeking through mailing lists during Open Source developers’ software evolution
- Author
-
John Collins, Khaironi Yatim Sharif, Nour Ali, Jim Buckley, Chris Exton, and Michael English
- Subjects
World Wide Web ,Documentation ,Information seeking ,Computer science ,Program comprehension ,Information needs ,Context (language use) ,Mailing list ,Software ,Software evolution ,Computer Science Applications ,Information Systems ,Mirroring - Abstract
Context Several authors have proposed information seeking as an appropriate perspective for studying software evolution. Empirical evidence in this area suggests that substantial time delays can accrue, due to the unavailability of required information, particularly when this information must travel across geographically distributed sites. Objective As a first step in addressing the time delays that can occur in information seeking for distributed Open Source (OS) programmers during software evolution, this research characterizes the information seeking of OS developers through their mailing lists. Method A longitudinal study that analyses 17 years of developer mailing list activity in total, over 6 different OS projects is performed, identifying the prevalent information types sought by developers, from a qualitative, grounded analysis of this data. Quantitative analysis of the number-of-responses and response time-lag is also performed. Results The analysis shows that Open Source developers are particularly implementation centric and team focused in their use of mailing lists, mirroring similar findings that have been reported in the literature. However novel findings include the suggestion that OS developers often require support regarding the technology they use during development, that they refer to documentation fairly frequently and that they seek implementation-oriented specifics based on system design principles that they anticipate in advance. In addition, response analysis suggests a large variability in the response rates for different types of questions, and particularly that participants have difficulty ascertaining information on other developer’s activities. Conclusion The findings provide insights for those interested in supporting the information needs of OS developer communities: They suggest that the tools and techniques developed in support of co-located developers should be largely mirrored for these communities: that they should be implementation centric, and directed at illustrating “how” the system achieves its functional goals and states. Likewise they should be directed at determining the reason for system bugs: a type of question frequently posed by OS developers but less frequently responded to.
- Published
- 2015
- Full Text
- View/download PDF
18. How Human Aspects Impress Agile Software Development Transition and Adoption
- Author
-
Abu Bakar Sultan, Khaironi Yatim Sharif, Abdul Azim Abdul Ghani, Hazura Zulzalil, and Taghi Javdani Gandomani
- Subjects
Requirement ,Engineering ,Knowledge management ,Agile usability engineering ,business.industry ,Empirical process (process control model) ,Agile Unified Process ,computer.software_genre ,Grounded theory ,Extreme programming practices ,Lean software development ,business ,computer ,Software ,Agile software development - Abstract
Many software companies are interested in using Agile methods in their software projects. Contrary to traditional software development methods, Agile methods are people oriented. This fact shows the significant role of individuals in these methods. Increasing prevalence of Agile methods forces software companies to consider people related factors as critical issues in adoption and transition to Agile methods and practices. This article focused on human aspects of Agile transformation process by conducting a Grounded Theory study involving 32 Agile experts. The main contribution of this article is identification and classification of diverse human aspects of Agile transformation process. Analyzing collected data showed that human aspects of Agile transformation process can be classified in several categories. While some of them are impediments to change, some others act as change accelerators. At the same time people’s perceptions about change process and incentive factors can shape and form human aspects during the Agile transformation process. Each of these categories encompasses its own factors which have negative or positive effect on change process.
- Published
- 2014
- Full Text
- View/download PDF
19. E-LEARNING READINESS AMONG MEDICAL EDUCATORS IN UNIVERSITI SAINS ISLAM MALAYSIA
- Author
-
Salleha Khalid, Mohd Mokthar, Tengku Amatullah Madeehah Tengku Mohd, Khadijah Hassanah, Suhaila Sanip, Muhammad Shamsir Mohd Aris, and Khaironi Yatim Sharif
- Subjects
Response rate (survey) ,Multidisciplinary ,business.industry ,E-learning (theory) ,Mathematics education ,Information technology ,The Internet ,Islam ,business ,Psychology - Abstract
Recent advances in information technology has made e-learning feasible in many fields of education. Medical education is not any different. This survey is conducted among all the medical educators in Universiti Sains Islam Malaysia (USIM) assessing their readiness and attitudes towards e-learning. A cross-sectional questionnaires assessing the IT skills, Internet usage, attitude, perceived benefits and usage of e-learning among USIM medical lecturers were used. Data gained were then analyzed. The response rate was 92%. Female (56) made majority of the respondents. 44 of the educators aged 25-34 with 56% had teaching experience of
- Published
- 2014
- Full Text
- View/download PDF
20. Open Source Programmers' Information Seeking During Software Maintenance
- Author
-
Jim Buckley, Khaironi Yatim Sharif, and Mohd Rosmadi Mokhtar
- Subjects
World Wide Web ,Documentation ,Empirical research ,Artificial Intelligence ,Computer Networks and Communications ,Computer science ,Information seeking ,Information seeking behavior ,Schema (psychology) ,Program comprehension ,Information needs ,Software maintenance ,Software - Abstract
Problem statement: Several authors have proposed information seeking as an appropriate case study for studying software maintenance and evolution that have provided empirical classifications of information seeking in commercial software evolution settings. Approach: However, there is minimal research in the literature describing the information seeking behavior of Open Source programmers, even though Open Source contexts would seem to exacerbate the information seeking problems to a certain extend; where team members are typically delocalized from each other and they are often forced into asynchronous communication. Results: This study reports on an empirical study that classifies Open-Source programmers' information needs generated through open-coding of questions that appear on developers' mailing lists. Based on the generated Information Seeking Schema (ISS), details of the information sought by programmers on 6 different mailing lists over several years are analyzed and discussed. Conclusion/Recommendations: The result shows several interesting findings that describe the programmers' information needs across the mailing lists. Firstly, there are a similar pattern of information artifact and attribute across all projects. Secondly, majority of the programmers' information seeking concentrated on the systems' implementations. Thirdly, the OS programmers have also shown to be team-oriented and they tended to rely on documentation more than what have previously reported. These results suggest the applicability of the ISS in evaluating OS programmers information seeking.
- Published
- 2011
- Full Text
- View/download PDF
21. Wi-Fi received signal strength-based hyperbolic location estimation for indoor positioning systems
- Author
-
Anvar Narzullaev, Mohd Hasan Selamat, Khaironi Yatim Sharif, and Zahriddin Muminov
- Subjects
Computer Networks and Communications ,Software ,Computer Science Applications ,Information Systems - Published
- 2019
- Full Text
- View/download PDF
22. Wi-Fi Received Signal Strength Based Hyperbolic Location Estimation for Indoor Positioning Systems
- Author
-
Mohd Hasan Selamat, Zahriddin Muminov, Khaironi Yatim Sharif, and Anvar Narzullaev
- Subjects
Computer Networks and Communications ,Calibration (statistics) ,Computer science ,Real-time computing ,Fingerprint (computing) ,Process (computing) ,020206 networking & telecommunications ,02 engineering and technology ,Multilateration ,Signal ,Computer Science Applications ,Sampling (signal processing) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Scale (map) ,Trilateration ,Software ,Information Systems - Abstract
Nowadays, Wi-Fi fingerprinting-based positioning systems provide enterprises the ability to track their various resources more efficiently and effectively. The main idea behind fingerprinting is to build signal strength database of target area prior to location estimation. This process is called calibration and the positioning accuracy highly depends on calibration intensity. Unfortunately, calibration procedure requires huge amount of time and effort, and makes large scale deployments of Wi-Fi based indoor positioning systems non-trivial. In this research we present a novel location estimation algorithm for Wi-Fi based indoor positioning systems. The proposed algorithm combines signal sampling and hyperbolic location estimation techniques to estimate the location of mobile users. The algorithm achieves cost-efficiency by reducing the number of fingerprint measurements while providing reliable location accuracy. Moreover, it does not require any additional hardware upgrades to the existing network infrastructure. Experimental results show that the proposed algorithm with easy-to-build signal strength database performs more accurate than conventional signal strength-based methods.
- Published
- 2019
- Full Text
- View/download PDF
23. Toward using software metrics as indicator to measure power consumption of mobile application: A case study
- Author
-
Abdul Azim Abd Ghani, Ching Kin Keong, Koh Tieng Wei, and Khaironi Yatim Sharif
- Subjects
Profiling (computer programming) ,Engineering ,Source lines of code ,business.industry ,Real-time computing ,Software design ,Cyclomatic complexity ,Energy consumption ,business ,Mobile device ,Software metric ,Efficient energy use - Abstract
Battery capacity of mobile devices is a critical issue for developing green mobile applications. Therefore, energy efficiency has become a major concern nowadays for energyrestricted embedded system such as smartphones and tablets. In industry, it is a challenge for them to develop an energy efficient product while meeting customer expectation. In previous study, there is lack of method that uses software metrics to measure power consumption of mobile applications. In this paper we have identified several software metrics that can be used as indicator to measure mobile application power consumption. The objective of this study is to which identify software metrics is suitable act as indicators to measure power consumption of mobile applications. This can help mobile software designer to measure power used for their mobile applications in the early design phase. In order to prove this concept, we randomly select two open source mobile applications as our case study. The power used of a mobile application is collected by using Trepn Profiler (Power profiling tool for Qualcomm processor CPU). We capture the actual power consumption and estimated power consumption (without calculate Android OS and profiling tool power) with the profiler. There are overall 18 available metrics based on Object-Oriented Metrics. We map the 18 metrics with the power consumption captured by Trepn Profiler. The results shown that McCabe cyclomatic complexity, number of parameters, nested block depth, weighted methods per class, number of overridden method, number of methods, total lines of code and method lines have significant relationship with power consumption of mobile application. Therefore, these eight metrics can be used as the indicator to measure mobile applications' power consumption.
- Published
- 2015
- Full Text
- View/download PDF
24. Towards The Use Of Software Product Metrics As An Indicator For Measuring Mobile Applications Power Consumption
- Author
-
Ching Kin Keong, Koh Tieng Wei, Abdul Azim Abd. Ghani, and Khaironi Yatim Sharif
- Subjects
Battery endurance ,power consumption ,software metrics ,mobile application - Abstract
Maintaining factory default battery endurance rate over time in supporting huge amount of running applications on energy-restricted mobile devices has created a new challenge for mobile applications developer. While delivering customers' unlimited expectations, developers are barely aware of efficient use of energy from the application itself. Thus, developers need a set of valid energy consumption indicators in assisting them to develop energy saving applications. In this paper, we present a few software product metrics that can be used as an indicator to measure energy consumption of Android-based mobile applications in the early of design stage. In particular, Trepn Profiler (Power profiling tool for Qualcomm processor) has used to collect the data of mobile application power consumption, and then analyzed for the 23 software metrics in this preliminary study. The results show that McCabe cyclomatic complexity, number of parameters, nested block depth, number of methods, weighted methods per class, number of classes, total lines of code and method lines have direct relationship with power consumption of mobile application., {"references":["C. Sahin, F. Cayci, J. Clause, F. Kiamilev, L. Pollock, K. Winbladh.\n\"Towards Power Reduction through Improved Software Design\". In\nIEEE Energytech, pages 1 - 6, MAY 2012.","S. Jha., Poorly written apps can sap 30 to 40% of a phone's juice, June\n2011. CEO, Motorola Mobility, Bank of America Merrill Lynch 2011\nTechnology Conference.","Mark D. Syer et al., Revisiting Prior Empirical Findings For Mobile\nApps: An Empirical Case Study on the 15 Most Popular Open-Source\nAndroid Apps, In proceeding of: Proceedings of the 2013 Conference of\nthe Center for Advanced Studies on Collaborative Research, 2013","F.F Chen, J.G Schneider, Y. Yang, J. Grundy, Q. He. \"An Energy\nConsumption Model and Analysis Tool for Cloud Computing\nEnvironments\", in Proceedings of the 1st International Workshop on\nGreen and Sustainable Software (GREENS'12), 2012, pp.45-50.","H. Chen, B. Luo, W. Shi. \"Anole: A Case for Energy-Aware Mobile\nApplication Design\", in Proceedings of the 41st International\nConference on Parallel Processing Workshops (ICPPW'12), 2012,\npp.232-238.","Mark D. Syer, Meiyappan Nagappan, Ahmed E. Hassan, Bram Adams,\nRevisiting prior empirical findings for mobile apps: an empirical case\nstudy on the 15 most popular open-source Android apps, Proceedings of\nthe 2013 Conference of the Center for Advanced Studies on\nCollaborative Research, November 18-20, 2013, Ontario, Canada","J. Bornholt, T. Mytkowicz, K. S. McKinley. The Model Is Not Enough:\nUnderstanding Energy Consumption in Mobile Devices\", in Posters\nSession of Hot Chips: A Symposium on High Performance Chips\n(HC24), 2012.","J. Flinn, M. Satyanarayanan. \"Energy-aware Adaptation for Mobile\nApplications\", in Proceedings of 17th ACM Symposium on Operating\nSystems Principles (SOSP'99), pp.48-63.","L. Luo, W. Wu, D. Di, F. Zhang, Y. Z. Yan, Y. K. Mao. \"A Resource\nScheduling Algorithm of Cloud Computing based on Energy Efficient\nOptimization Methods\", in Proceedings of the IEEE International Green\nComputing Conference (IGCC'12), 2012, pp.1-6.\n[10] L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. P. Dick, Z. M. Mao, L.\nYang. \"Accurate Online Power Estimation and Automatic Battery\nBehavior Based Power Model Generation for Smartphones\", in\nProceedings of the 8th IEEE/ACM/IFIP International Conference on\nHardware/Software Codesign and System Synthesis (CODES+ISSS'10),\n2010, pp.105-114.\n[11] Young-Seol Lee; Sung-Bae Cho, \"An Efficient Energy Management\nSystem for Android Phone Using Bayesian Networks,\" Distributed\nComputing Systems Workshops (ICDCSW), 2012 32nd International\nConference on, vol., no., pp.102, 107, 18-21 June 2012.\n[12] Donohoo, B. K.; Ohlsen, C.; Pasricha, S., \"AURA: An application and\nuser interaction aware middleware framework for energy optimization in\nmobile devices,\" Computer Design (ICCD), 2011 IEEE 29th\nInternational Conference on, vol., no., pp.168,174, 9-12 Oct. 2011\n[13] N. Balasubramanian, A. Balasubramanian, A. Venkatramani. \"Energy\nConsumption in Mobile Phones: A Measurement Study and Implications\nfor Network Applications, in Proceedings of the 9th ACM SIGCOMM\nconference on Internet measurement conference (IMC'09), 2009,\npp.280-293.\n[14] O. Arnold, F. Ritchter, G. Fettweis, O. Blume. \"Power Consumption\nModelling of Different Base Station Types in Heterogeneous Cellular\nNetworks\", in the Proceedings of the Future Network and Mobile\nSummit (FNMS'10), 2010, pp.1-8.\n[15] O. Silvén, K. Jyrkkä. \"Observation on Power-Efficiency Trends in\nMobile Communication Devices\", LNCS 3553, 2005, pp.142-151.\n[16] P. Bartalos, M. B. Blake. \"Green Web Services: Modelling and\nEstimating Power Consumption of Web Services\", in Proceedings of the\nIEEE 19th International Conference on Web Services (ICWS'12), 2012,\npp.178-185.\n[17] Jain, R.; Bose, J.; Arif, T., \"Contextual adaptive user interface for\nAndroid devices,\" India Conference (INDICON), 2013 Annual IEEE,\nvol., no., pp.1,5, 13-15 Dec. 2013\n[18] R. Yamini. \"Power Management in Cloud Computing Using Green\nAlgorithm\", in Proceedings of the IEEE International Conference on\nAdvances in Engineering, Science and Management (ICAESM'12),\n2012, pp.128-133.\n[19] Tan Kiat Wee, Rajesh Krishna Balan, Adaptive display power\nmanagement for OLED displays, Proceedings of the first ACM\ninternational workshop on Mobile gaming, August 13-13, 2012,\nHelsinki, Finland\n[20] R. Kraves, P. Krishnan. \"Application-driven Power Management for\nMobile Communication\", Journal of Wireless Network, Vol.6 Issue 4,\nJuly 2000, pp.263-277.\n[21] S. A. Ahson, M. llyas, \"Cloud Computing and Software Services:\nTheory and Techniques\", CRC Press, Boca Raton, Florida, 2011.\n[22] S. Gűrűn, R. Wolski, T. Sherwood, C. Krints. \"Modelling, Predicting\nand Reducing Energy Consumption in Resource Restricted Computers\",\nPhD Dissertation in Computer Science, University of California, Santa\nBarbara, 2007.\n[23] T. Do, S. Rawshdeh, W, Shi. \"pTop: A Process-level power Profiling\nTool\", in Proceedings of the 2nd Workshop on Power Aware Computing\nand Systems(HotPower'09), 2009.\n[24] T. Pering, Y. Agarwal, R. Want. \"CoolSpots: Reducing the power\nConsumption of wireless Mobile Devices with multiple Radio\nInterfaces\", in Proceedings of the 4th International Conference on\nMobile Systems, Applications and Services (MobiSys'06), 2006 pp.220-\n232.\n[25] Y. Cui, X. Ma, H. Y. Wang, I. Stojmenonic, J. C.Liu. \"A Survey of\nEnergy Efficient Wireless Transmission and Modelling in Mobile Cloud\nComputing\", Journal of Mobile Networks and Applications, Vol.18,\nIssue 1, Feb 2013, pp.148-155.\n[26] Dongwon Kim; Nohyun Jung; Hojung Cha, \"Content-centric display\nenergy management for mobile devices,\" Design Automation\nConference (DAC), 2014 51st ACM/EDAC/IEEE, pp.1,6, 1-5 June\n2014\n[27] Pathania, A.; Qing Jiao; Prakash, A.; Mitra, T., \"Integrated CPU-GPU\npower management for 3D mobile games,\" Design Automation\nConference (DAC), 2014 51st ACM/EDAC/IEEE, pp.1,6, 1-5 June\n2014, doi: 10.1145/2593069.2593151\n[28] Z.X. Liao, W.C. Peng, Y.C. Pan, P.R.Lei. \"On Mining Mobile Apps\nUsage Behavior for Predicting Apps Usage in Smartphones\",\nProceedings of the 22nd ACM international conference on Conference\non information & knowledge management, October 2013.\n[29] Kadjo, D.; Ogras, U.; Ayoub, R.; Kishinevsky, M.; Gratz, P., \"Towards platform level power management in mobile systems,\" System-on-Chip\nConference (SOCC), 2014 27th IEEE International, vol., no.,\npp.146,151, 2-5 Sept. 2014\n[30] C. Brandolese, M.Politec. \"Source-Level Estimation of Energy\nConsumption and Execution Time of Embedded Software\", Proceedings\nof the 11th EUROMICRO Conf. Digital System Design Architectures,\nMethods and Tools (DSD), pp. 115-123, 2008.\n[31] Khairy, A.; Ammar, H.H.; Bahgat, R., \"Smartphone Energizer:\nExtending Smartphone's battery life with smart offloading,\" Wireless\nCommunications and Mobile Computing Conference (IWCMC), 2013\n9th International, vol., no., pp.329,336, 1-5 July 2013\n[32] E. Harjula, O. Kassinen, M. Ylianttila. \"Consumption Model for Mobile\nDevices in 3G and WLAN Networks\", in Proceedings of the 9th IEEE\nConsumer Communication and Networking Conference (CCNC'12),\n2012, pp.532-537.\n[33] A. Papageorgiou, U. Lampe, D. Schuller, R. Steinmetz, A. Bamis.\n\"Invoking Web Services based on Energy Consumption Models:, in\nProceedings of the IEEE 1st International Conference on Mobile\nServices(ICMS'12), 2102, pp.40-47\n[34] C. Thompson, D. Schmidt, H. Tumer, J. White. \"Analyzing Mobile\nApplication Software Power Consumption Via Model-driven\nEngineering\", in Proceedings of the 1st International Conference on\nPervasive and Embedded Computing and Communication\nSystems(PECCS'11), 2011, pp.101-113\n[35] Yi-Wei Ma; Jiann-Liang Chen; Ching-Hesign Chou; Shyue-Kung Lu,\n\"A Power Saving Mechanism for Multimedia Streaming Services in\nCloud Computing,\" Systems Journal, IEEE, vol.8, no.1, pp.219,224,\nMarch 2014\n[36] Nagata, K.; Yamaguchi, S.; Ogawa, H., \"A Power Saving Method with\nConsideration of Performance in Android Terminals,\" Ubiquitous\nIntelligence & Computing and 9th International Conference on\nAutonomic & Trusted Computing (UIC/ATC), 2012 9th International\nConference on, vol., no., pp.578,585, 4-7 Sept. 2012\n[37] Wen-Yew Liang; Ming-Feng Chang; Yen-Lin Chen; Chin-Feng Lai,\n\"Energy efficient video decoding for the Android operating system,\"\nConsumer Electronics (ICCE), 2013 IEEE International Conference on,\nvol., no., pp.344,345, 11-14 Jan. 2013\n[38] Gung-Yu Pan; Lai, B.-C.C.; Sheng-Yen Chen; Jing-Yang Jou, \"A\nlearning-on-cloud power management policy for smart devices,\"\nComputer-Aided Design (ICCAD), 2014 IEEE/ACM International\nConference on, vol., no., pp.376,381, 2-6 Nov. 2014\n[39] Deqian Kong; Tao Qi; Tan Yang; Yidong Cui, \"A dynamic computation\noffloading framework for Android,\" Broadband Network & Multimedia\nTechnology (IC-BNMT), 2013 5th IEEE International Conference on,\nvol., no., pp.134,138, 17-19 Nov. 2013"]}
- Published
- 2015
- Full Text
- View/download PDF
25. Wi-fi fingerprint database construction using Chebyshev wavelet functions
- Author
-
Mohamed Othman, Azamjon Nemadaliev, Khaironi Yatim Sharif, Anvar Narzullaev, and Hasan Selamat Mohd
- Subjects
Approximation theory ,Wavelet ,Calibration (statistics) ,Computer science ,Reference data (financial markets) ,Transmitter ,Point (geometry) ,Function (mathematics) ,Data mining ,computer.software_genre ,Chebyshev filter ,computer ,Algorithm - Abstract
In this research we propose a new approach of constructing Wi-Fi fingerprints database using Chebyshev wavelet functions. Proposed algorithm combines the reference data collection procedure with path-loss prediction. Our algorithm requires only a few samples to be collected in a given region, and thus significantly reduces the calibration time. Next, the collected reference samples are used to construct area specific path-loss prediction function using Chebyshev wavelets. Once we have the path-loss function, we can predict the signal strength values at any point of the target area. One of the advantages of proposed algorithm is that it does not require any detailed information about target area, i.e. location of wireless access points, number of walls (floors, obstructions) between the transmitter and reference points and etc.
- Published
- 2015
- Full Text
- View/download PDF
26. Exploring Facilitators of Transition and Adoption to Agile Methods: A Grounded Theory Study
- Author
-
Abu Bakar Sultan, Taghi Javdani Gandomani, Khaironi Yatim Sharif, Hazura Zulzalil, and Abdul Azim Abdul Ghani
- Subjects
Knowledge management ,Agile usability engineering ,business.industry ,Process (engineering) ,Computer science ,Empirical process (process control model) ,Agile Unified Process ,Grounded theory ,Human-Computer Interaction ,Software ,Artificial Intelligence ,Lean software development ,business ,Agile software development - Abstract
Nowadays, changing development approach from traditional to Agile methods has been considered as a strategic decision for achieving Agile values by most software companies and organizations. Due to its nature, moving to Agile software development and adapting to Agile methods need a long time and enough effort. Thus, organizations are faced with a lot of challenges during the transition and adoption process. Providing facilitators can make transition process easier and faster. Conducting a Grounded Theory study on Agile transformation process, involving 33 Agile experts across 13 different countries showed that Agile transition and adoption needs to be supported by several facilitators. Thus, the main contribution of this article is providing eight major facilitators that should be used by Agile teams to support Agile transition and adoption. Some of these facilitators support team members in doing their jobs and empower them against challenges. Some others help them in dealing with challenges or prevent potential problems before occurrence in Agile transition process. Furthermore, some of these facilitators have positive effects on people and motivate them to adapt with their new behaviors. Agile transition and Adoption will be faster and easier if the more facilitators get involve.
- Published
- 2014
- Full Text
- View/download PDF
27. An Exploratory Study on Managing Agile Transition and Adoption
- Author
-
Hazura Zulzalil, Abdul Azim Abdul Ghani, Khaironi Yatim Sharif, Abu Bakar Sultan, and Taghi Javdani Gandomani
- Subjects
Engineering ,Agile usability engineering ,Knowledge management ,Process management ,Software_GENERAL ,business.industry ,Exploratory research ,Agile Unified Process ,Grounded theory ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Software ,Lean software development ,business ,Software development methods ,Agile software development - Abstract
Software companies are replacing traditional software development methods with Agile methods due to coping with inherent problems of traditional methods. Due to the different nature of traditional and Agile methods, adaptation to Agile methods is not a simple process and needs to be managed in a sustainable way. In recent years, several studies have conducted on investigation of Agile migration journey, but less effort on identifying the serious managerial attentions in Agile transition process. Conducting a Grounded Theory in context of Agile software development, showed various aspects of the transition to be considered in order to having a successful change management process. This paper shows the important role of the emergent managerial attentions on success of Agile transition and adoption process.
- Published
- 2014
- Full Text
- View/download PDF
28. Exploring Key Factors of Pilot Projects in Agile Transformation Process Using a Grounded Theory Study
- Author
-
Abu Bakar Sultan, Hazura Zulzalil, Abdul Azim Abdul Ghani, Taghi Javdani Gandomani, and Khaironi Yatim Sharif
- Subjects
Engineering ,Transformation (function) ,Agile usability engineering ,Process management ,business.industry ,Process (engineering) ,Systems engineering ,Agile Unified Process ,Duration (project management) ,business ,Grounded theory ,Agile software development ,Task (project management) - Abstract
Changing development approach from disciplined to agile methods is an organizational mutation that requires many issues to be considered to increase its chance of success. Selecting an appropriate pilot project as initial project that is going to be done through an Agile method is a critical task. Due to the impact of such a pilot project on successful Agile transformation, understanding its critical factors helps organizations choose the most suitable project to start Agile transition. Conducting a Grounded Theory, showed that organization should considered some key factors of a pilot: Criticality, Duration, Size and Required resources. Besides these factors, the results showed that organization should be aware of the risk of successful pilot project in their next Agile projects. The study also showed that pilot selection mostly is done by Agile coaches or is forced by customer.
- Published
- 2013
- Full Text
- View/download PDF
29. Observation of Open Source programmers' information seeking
- Author
-
Jim Buckley, Khaironi Yatim Sharif, and SFI
- Subjects
Commercial software ,software evolution ,Computer science ,Information seeking ,020207 software engineering ,02 engineering and technology ,Software maintenance ,information seeking ,World Wide Web ,Documentation ,020204 information systems ,Schema (psychology) ,Information seeking behavior ,0202 electrical engineering, electronic engineering, information engineering ,Mailing list ,Software evolution - Abstract
non-peer-reviewed Several authors have proposed information seeking as an appropriate perspective for studying software evolution, and have characterized information seeking empirically in commercial software evolution settings. However, there is little research in the literature describing the information seeking behavior of open source programmers. This work describes a holistic schema for open- source (OS) programmers??? information seeking, generated through open-coding of questions in OS developer mailing lists. It then reports on a study of the JDT mailing list, showing the types of information sought within this group and, for a subset of the data, it characterizes the responses obtained.
- Published
- 2009
- Full Text
- View/download PDF
30. Developing schema for open source programmers’ information-seeking
- Author
-
Jim Buckley and Khaironi Yatim Sharif
- Subjects
JavaBeans ,Java ,business.industry ,Computer science ,Information seeking ,Software maintenance ,computer.software_genre ,Electronic mail ,World Wide Web ,Scripting language ,Schema (psychology) ,Software engineering ,business ,Programmer ,computer ,computer.programming_language - Abstract
Information-seeking has been recognized as a core subtask in software maintenance. While much of the research in this area attempts to identify the information sought by programmers, the work to date has been typically based on pre-defined information types limiting the potential for new information types to arise. Hence, this paper presents a small empirical study on open-source programmer mailing lists, to iteratively refine a schema of the information that programmers seek based exclusively on an analysis of these programmers’ naturalistic communication. Subsequently it places this schema in the context of the existing literature in the area. The analysis was undertaken on information requests in 288 emails, taken from 2 open source project mailing lists; The Java Bean Scripting Framework (BSF)[1] and the Java Development Tool (JDT)[2]. This work produced a preliminary schema of 3 main categories divided into 18 sub categories.
- Published
- 2008
- Full Text
- View/download PDF
31. Machine learning: Tasks, modern day applications and challenges
- Author
-
Aljuaid, L., Wei, K. T., and Khaironi Yatim Sharif
32. Source code analysis extractive approach to generate textual summary
- Author
-
Dawood, K. A., Khaironi Yatim Sharif, and Wei, K. T.
33. A sweet and simple solution for complex wound healing
- Author
-
Khaironi Yatim Sharif, F. Ashraf, Mohammad U. Ahmad, Abdurrahman I. Islim, N. Patel, and R. Asghar
- Subjects
business.industry ,Simple (abstract algebra) ,Medicine ,Surgery ,General Medicine ,business ,Wound healing ,Biomedical engineering - Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.