Browsing by Author "Ismail S."
Now showing 1 - 8 of 8
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication An assessment on the password practices among students(Asian Research Publishing Network (ARPN), 2014) ;Jali M.Z. ;Ismail S. ;Abdullah Z.H.Universiti Sains Islam Malaysia (USIM)User authentication can be defined as the process of proving the user's identity. Three typical categories of user authentication are based on users' knowledge (i.e. PIN and Passwords), users' possession (i.e. Smart Card and Token) and users' characteristics (i.e. Iris and typing pattern). This paper presents an extensive review related to password-based authentication and then reports the latest experimental study conducted to evaluate the password practices among students within the authors' institution. Participants within the study were given a scenario where their accounts were hacked and straightforwardly, they were asked to create new passwords according to three conditions; namely C1 (i.e. having at least one upper, lower, number and special character), C2 (i.e. contains at least three words) and C3 (i.e. combination of C1 and C2 respectively). After a week time, they were again invited to participate by writing down their passwords to investigate memorability. Overall, the study managed to recruit 380 students, having a total of 1140 passwords. From the analysis covering password memorability, password creation and password perception, it could be reported that the three tested conditions have both positive and negative outcomes, thus authors suggest that 'a second look' should be considered if these conditions to be implemented in real setting. � 2005 - 2014 JATIT & LLS. All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication A framework for a multi-layered security of an automated programming code assessment tool(Science Publications, 2015) ;Marhusin M.F. ;Kafli M.F.Z. ;Sulaiman R. ;Ismail S. ;Abdullah Z.H. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Kebangsaan Malaysia (UKM)In a learning environment, a low student-lecturer ratio is considered a practical solution by many educational institutions. However, the number of students in information technology is increasing every year. This could lead to a significant increase in the workload of lecturers, who need to evaluate assignments, quizzes and projects. Hence, it is desirable that an automated assessment tool is used to lessen their workload. In the era where mobile devices are getting popularity, the high demand to execute suitable quality code is there and the cost is on the processing power of the CPU which has a direct implication on the power source or the battery used. With various implementations of cryptography algorithms available, many of them could satisfy different level of needs. In this research, we introduce the architecture for a multi-layered security of automated assessment of programming code. First, we review the existing research studies in the area. We describe the features of the tool, as part of a complex elearning environment. We also discuss the implementation of security, to protect data transmission and storage used by the tool. Challenges the system might face and the potential solutions, are also described. 2015 The Mohd Fadzli Marhusin, Muhammad Firdaus Zul Kafli, Rossilawati Sulaiman, Shaharudin Ismail and Zul Hilmi Abdullah. - Some of the metrics are blocked by yourconsent settings
Publication Physicochemical properties and acceptability study of high energy cereal bar made from Malaysian puff glutinous rice with halal ingredients(Josip Juraj Strossmayer University of Osijek, Faculty of Food Technology Osijek, 2013) ;Hassan C.Z. ;Jamal A.F. ;Kal-kausar M.A. ;Ismail S. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Cereal bar is sweet, nutritious food due to rich content of protein, lipids, and carbohydrates. The aim of this study is to develop some formulation of cereal bar using puff glutinous rice with different binding agent; which is glucose syrup, brown sugar and honey. The dried ingredient were added with the puff glutinous rice as well as binding agent with different ratio. The cereal bar was evaluated for texture analysis, proximate value, water activity and sensory evaluation. From the result, there is no significance difference on the proximate value and water activity. Moreover, it is found that the CB 1 formulation (ratio syrup glucose to honey 1:2) has the best result in texture analysis due to its hardness and adhesiveness. However, during the sensory evaluation, the cereal bar formulate with honey to brown sugar 3:3 had the highest value on consumer acceptance. - Some of the metrics are blocked by yourconsent settings
Publication Prevalence and predictors of pap smear practice among staff of a Public University in Nilai, Negeri Sembilan(Faculty of Medicine and Health Sciences, 2017) ;Mohd Razi N.A. ;Manaf R.A. ;Ismail S. ;Faculty of Medicine and Health Sciences ;Universiti Putra Malaysia (UPM)Universiti Sains Islam Malaysia (USIM)Introduction: The practice of Pap smear has long been an issue worldwide especially in the developing countries. Malaysia National Health and Morbidity Survey IV reported an uptake of 12.8% in 2011. It was found that Malay women has the lowest prevalence of uptake compared to other major ethnicities in the country. The objective of this study is to determine the prevalence of Pap smear practice and its predictors among staff in a public university with majority of Malay ethnicity. Methodology: A cross-sectional study was conducted among female staff in a public university in Nilai, Negeri Sembilan using a self-administered and validated questionnaire. All female staff from the seven faculties and the library were invited to participate. Data were analysed using SPSS version 22 for descriptive and inferential statistics, whereby Multiple Logistic Regression were performed to identify the predictors. Results: One-hundred-and eighty-seven respondents participated this study. The prevalence of Pap smear practice was 65.2%, of which, two-thirds (65.6%) had done it within the past three years. Predictors of the practice were higher parity, attending annual medical check-up, husband's support and positive attitude towards the test. Conclusion: The prevalence of Pap smear uptake among this population is higher than other studies in Malaysia, however, not all of them have done it regularly within 3 yearly interval as suggested by the World Health Organisation. � 2017 Faculty of Medicine and Health Sciences. All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication A study on the performances of danger theory and negative selection algorithms for mobile spam detection(American Scientific Publishers, 2017) ;Sulaiman N.F. ;Jali M.Z. ;Abdullah Z.H. ;Ismail S. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Spamming activities using text messages on mobile phone are widely spreading, as in line with the development of technology for mobile phones. This phenomenon has contributed a major threat that impacts the usability of messages. Even though many techniques have been proposed and introduced for detecting these ‘unwanted’ messages, all those efforts still cannot bring this problem to an end. The major challenges in detecting and filtering spam messages today are ineffective solution to deal with strains of spam messages because of the variety content of messages and the attitude of users themselves. This paper aims to view the performance of Artificial Immune System (AIS) algorithms inspired from the ideology of Biology Immune System (BIS) in human body for detecting spam messages on mobile phone. Two types of AIS algorithms were used; Danger Theory (DT) and Negative Selection (NS). Their performances were measured and compared in terms of effectiveness, efficiency and Receiver Over Characteristic (ROC) area, tested on WEKA using three different datasets. From our conduction of experiments, generic Negative Selection algorithm performs bette - Some of the metrics are blocked by yourconsent settings
Publication Supersingular integral equations of the first kind and its approximate solutions(American Institute of Physics Inc., 2020) ;Eshkuvatov Z.K. ;Kammuji M. ;Ismail S.Long N.M.A.N.In this note, we consider a supersingular integral equations (SuperSIEs) of the first kind on the interval [-1,1] with the assumption that kernel of the hypersingular integral is constant on the diagonal of the domain D = [-1,1]×[-1,1]. Projection method together with Chebyshev polynomials of the first, second, third and fourth kinds are used to find bounded, unbounded and semi-bounded solutions of SuperSIEs respectively. Exact calculations of singular integrals for Chebyshev polynomials allow us to obtain high accurate approximate solution. Gauss- Chebyshev quadrature formulas are used for high accurate computations of regular kernel integrals. Two examples are provided to verify the validity and accuracy of the proposed method. Comparisons with other methods are also given. Numerical examples reveal that approximate solutions are exact if solution of SuperSIEs is of the polynomial forms with corresponding weights. It is worth to note that proposed method works well for large value of node points and errors are drastically decreases. © 2020 Author(s). - Some of the metrics are blocked by yourconsent settings
Publication User's awareness survey on 1CITIZEN program in Universiti Sains Islam Malaysia (USIM)(Asian Research Publishing Network, 2015) ;Ismail S. ;Abdullah Z.H. ;Mohd Alwi N.H. ;Jali M.Z.Universiti Sains Islam Malaysia (USIM)The Malaysia government educates the digital etiquette among teenagers, especially the tertiary education, through a special awareness training program named 1CITIZEN Program. The main objective of the program is to foster national unity via appropriate use of technology. It inspires Netizen to become critical thinkers that understand the ethical consequences of online behavior. Universiti Sains Islam Malaysia (USIM) conducted two survey research – pre and post training sessions - among the participants of the 1CITIZEN Program of the Faculty of Science and Technology, in order to know their level of knowledge related to digital etiquette. This paper discusses the results of the survey research related to the topic of information security. Overall, the findings indicated higher percentage of the participants have either “Knowledgeable and able to clarify well” or “Competent and can put to practice fully” about the related topics in information security after attending the training program, means the participants have better knowledge of the information security compared to their previous knowledge. - Some of the metrics are blocked by yourconsent settings
Publication Users' perspective on ICT infrastructure in a higher learning institution(International Business Information Management Association, IBIMA, 2008) ;Alwi N.H.M. ;Azizan N. ;Ismail S. ;Seman K.Universiti Sains Islam Malaysia (USIM)Information and Communication Technology (ICT) has been created to simplify human tasks. Nowadays, ICT is becoming more widely used by higher learning institutions to support their academic activities particularly in teaching and research. Users play an important role in any situation; therefore a study to evaluate the ICT infrastructure was conducted in a public university in Malaysia known as the Islamic Science University of Malaysia (USIM). The study was conducted to gather information from the users of the ICT facilities. This paper will discuss findings of the study in terms of the computer functions, system services, training and the ICT maintenance from the users' perspective. An evaluation of current ICT infrastructure was needed in order to understand how users and the organization could best benefit from services provided. The results indicate that ICT needs to be improved to ensure that more benefits can be gained.