The tremendous increased of municipal solid waste (MSW) generation in most major cities in Malaysia is observed as a main issue recently. This paper reviews the MSW management comprises many issues arises from the past two decades till the present scenario. It briefly discussed the latest definition of the solid waste based on the Solid Waste and P
This paper proposes an equilibrium computation method using linguistic variables based on the conflicting bifuzzy sets. The linguistic terms were defined and associated with the triangular fuzzy number as well as the labeling system in the early stages. Then, the negation operator was introduced and the bifuzzy approaches were employed to derive th
AIM: To determine the learning curves for antegrade double-balloon enteroscopy (aDBE) and retrograde DBE (rDBE) by analyzing the technical success rates. METHODS: A retrospective analysis in a tertiary referral center. This study reviewed all cases from June 2006 to April 2011 with a target lesion in the small-bowel identified by either capsule end
Medical error taxonomies are used to report and analyse patient safety incidents. Medical error taxonomies can be generic or domain-specific. In comparing generic and domain-specific medical error taxonomies, the literature compares the information both type of taxonomies classify. There is little evidence the taxonomies have been compared in terms
The process of retrieving desired images from a large collection is widely used in applications of computer vision. In order to improve the retrieval performance an efficient and accurate system is required. Retrieving images based on the content i.e. color, texture, shape etc is called content based image retrieval (CBIR). The content is actually
Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver’s side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered
In this paper we present the experimental implementation of dynamic spectrum access (DSA) algorithm using universal software radio peripheral (USRP) and GNU Radio. The setup contains two primary users and two cognitive radios or secondary users. One primary user is fixed and the other is allowed to change its position randomly. Depending upon the p
Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID’s tag. One of the common lightweight block ciphers is PRESENT. In this pa