Browsing by Author "Jali, MZ"
Now showing 1 - 15 of 15
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication A Classification on Brain Wave Patterns for Parkinson's Patients Using WEKA(Springer-Verlag Berlin, 2015) ;Mahfuz, N ;Ismail, W ;Noh, NA ;Jali, MZ ;Abdullah, Dbin Nordin, MJIn this paper, classification of brain wave using real-world data from Parkinson's patients in producing an emotional model is presented. Electroencephalograph (EEG) signal is recorded on eleven Parkinson's patients. This paper aims to find the "best" classification for brain wave patterns in patients with Parkinson's disease. This work performed is based on the four phases, which are first phase is raw data and after data processing using statistical features such as mean and standard deviation. The second phase is the sum of hertz, the third is the sum of hertz divided by the number of hertz, and last is the sum of hertz divided by total hertz. We are using five attributes that are patients, class, domain, location, and hertz. The data were classified using WEKA. The results showed that BayesNet gave a consistent result for all the phases from multilayer perceptron and K-Means. However, K-Mean gave the highest result in the first phase. Our results are based on a real-world data from Parkinson's patients. - Some of the metrics are blocked by yourconsent settings
Publication A Perception Model of Spam Risk Assessment Inspired by Danger Theory of Artificial Immune Systems(Elsevier Science BV, 2015) ;Zainal, KJali, MZThis present paper relates Danger Theory of Artificial Immune Systems, which has been introduced by Polly Matzinger in 1994 with the application in risk assessment. As to relate the concept of Danger Theory in risk assessment, a situation of determination severity level for detected Short Messaging Service (SMS) spam is applied. However, further testing is needed as to demonstrate the explained concept. Danger Model that based on the idea of the immune system is appear to be suitable as the fundamental principles and the most generic available solution as to assimilate its theory into the risk assessment environment especially that involve severe or hazardous impacts. (C) 2015 The Authors. Published by Elsevier B.V. - Some of the metrics are blocked by yourconsent settings
Publication An Integrated Success Adoption Model for Examining E-Learning Among Adult Workers in Jordan(IEEE, 2014) ;Al Zoubib, AISJali, MZResearching about adult workers' adoption reflected to organisation and individual in developing countries are needed due to obtaining better and bridge the gap. In addition, previous empirical studies that conducted on e-learning have shown low adoption rate among e-learners in Jordan. This study aimed to examine factors such as relative advantage, compatibility, complexity, information quality, system quality and service quality that drive adult workers in adopting e-learning system in their learning process. In other words, there is a weakness in applying e-learning implementation in Jordanian government universities. As a result, the Ministry of Higher Education in Jordan needs to have guidelines to help higher learning institutions to implement e-learning successfully and efficiently. A total of 502 adult workers currently pursuing their study at Arab Open University in Jordan were selected to be the sample for this study. Questionnaire was employed as the data collection approach for the present study. The findings revealed that five predictor variables, namely relative advantage, complexity, information quality, system quality and service quality were the most significant factor influencing e-learning adoption. This research has provided new knowledge with regard to e-learning through the development of an e-learning adoption model. Practical contribution includes insights into the factors and causes deterring e-learner from adopting e-learning in their learning process. - Some of the metrics are blocked by yourconsent settings
Publication Educating Users to Generate Secure Graphical Password Secrets: An Initial Study(IEEE, 2013) ;Fatehah, MD ;Jali, MZ ;Wafa, MKAnuar, NBThe username/password combination is still the most widely used method albeit various user authentication techniques have been introduced. Numerous studies have been conducted to investigate the scheme and it could be summarized that despite it weaknesses, it is the most favourable scheme. Thus, to reduce the weakness, authenticating users with image or pictures (i.e. graphical password) is proposed as one possible alternative as it was claimed that pictures were easy to remember, easy to use and has considerable security. This paper presents a study carried out to investigate initial user's performance and feedback towards the use of hybrid graphical methods (i.e. combining two graphical methods) as a method of authentication. Initially, a survey was conducted to identify participants' drawing patterns as their secret using paper-based method, and then the graphical software prototype was developed and pilot tested by selected participants. Overall, the pilot test on the prototype showed positive results as participants enjoyed using it and able to register within tolerable time. - Some of the metrics are blocked by yourconsent settings
Publication Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era(Iop Publishing Ltd, 2018) ;Ali, FABJali, MZThe development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization's business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations. - Some of the metrics are blocked by yourconsent settings
Publication Integrated Mobile Spain Model Using Artificial Immune System Algorithms(Univ Utari Malaysia-Uum, 2014) ;Sulaiman, NFJali, MZThe unique and complex of Biology Immune System (BIS) gives inspiration to scientists to develop new theory in computational area known as the Artificial Immune System (AIS), and this theory uses by researchers to solve real world problems. This paper aims to understand the BIS with AIS, and later discuss a relationship between them in identifying text 'SPAM' messages. To achieve this, four types of algorithms are explained; namely Immune Network Theory, Negative Selection, Clonal Selection and Danger Theory. This paper is expected to present details explanation about the intersection between BIS and AIS and highlights the use of AIS to identify text 'SPAM' messages - Some of the metrics are blocked by yourconsent settings
Publication Intelligent Examination Timetabling System Using Hybrid Intelligent Water Drops Algorithm(Univ Utari Malaysia-UUM, 2015) ;AlDeeb, BA ;Norwawi, NM ;Al-Betar, MAJali, MZThis paper proposes Hybrid Intelligent Water Drops (HIWD) algorithm to solve Tamhidi programs uncapacitated examination timetabling problem in Universiti Sains Islamic Malaysia (USIM). Intelligent Water Drops algorithm (IWD) is a population-based algorithm where each drop represents a solution and the sharing between the drops during the search lead to better drops. The results of this study prove that the proposed algorithm can produce a high quality examination timetable in shorter time in comparison with the manual timetable. - Some of the metrics are blocked by yourconsent settings
Publication Investigating the Viability of Multifactor Graphical Passwords for User Authentication(Taylor & Francis Inc, 2014) ;Jali, MZ ;Furnell, SMDowland, PSAuthentication using images (i.e., graphical passwords) is claimed to be one of the alternatives for overcoming weaknesses in the traditional username and password authentication. This paper reports on the study to explore the feasibility of combining two graphical password methods for better security. A graphical password prototype scheme, the Enhanced Graphical Authentication System (EGAS), was developed (which combines the methods of clicking on the image (i.e., click-based) and selecting a series of images (i.e., choice-based). The EGAS was tested by 30 participants randomly chosen from the authors' university and two evaluations were made; namely user performance of the combined method and the feasibility of authentication strategies toward the introduced method itself. From both evaluations, it is found that positive results have been obtained, which suggest that these methods could be combined together effectively without giving impediment to users. - Some of the metrics are blocked by yourconsent settings
Publication Markov-modulated Bernoulli-based Performance Analysis for BLUE Algorithm under Bursty and Correlated Traffics(IEEE, 2014) ;Saaidah, AM ;Jali, MZ ;Marhusin, MFAbdel-Jaber, HIn this study, the discrete-time performance of BLUE algorithms under bursty and correlated traffics is analyzed using two-state Markov-modulated Bernoulli arrival process (BLUE-MMBP-2). A two-dimensional discrete-time Markov chain is used to model the BLUE algorithm for two traffic classes, in which each dimension corresponds to a traffic class and the parameters of that traffic class. The MMBP is used to replace the conventional and widely-used Bernoulli process (BP) in evaluating and proposing analytical models based on the BLUE algorithm. The BP captures neither the traffic correlation nor the burstiness. The proposed approach is simulated, and the obtained results are compared with that of the BLUE-BP, which can modulate a single traffic class only. The comparison is performed in terms of mean queue length (mql), average queuing delay (D), throughput, packet loss, and dropping probability (DP). The results show that during congestion, particularly heavy congestion under bursty and correlated traffics, the BLUE-MMBP-2 algorithm provides better mql, D, and DP than the BLUE-BP. - Some of the metrics are blocked by yourconsent settings
Publication Password Recovery Using Graphical Method(Springer-Verlag Berlin, 2015) ;Kharudin, WM ;Din, NFMJali, MZAuthentication with images or better known as graphical password is gaining its recognition as an alternative method to authenticate users, for it is claimed that images or pictures are easier to use and remember. The same method can be applied to password recovery, with the purpose to ease the process of users in regaining their account in case of forgotten passwords. A total of 30 participants were asked to use a prototype implementation of graphical password recovery and provide feedbacks. The data gained were analyzed in terms of attempts, timing, pattern, and user feedback. Overall, it was found that participants had no problem in using graphical password recovery despite they were new to it. Most of them preferred the choice-based method, even though they agreed that it provided less security. Graphical recovery has potential to be used more widely in current technology, although more works need to be done to balance the issues of usability and security. - Some of the metrics are blocked by yourconsent settings
Publication Quantitative Metric For Ranking Web Accessibility Barriers Based On Their Severity(Univ Utara Malaysia Press, 2017) ;Abuaddous, HY ;Jali, MZBasir, NWeb accessibility aims at providing disabled users with a barrier-free user experience so they can use and contribute to the Web more effectively. However, not all websites comply with WCAG 2.0 which results in Web accessibility barriers in websites. Thus, assistive technologies such as screen readers would not be able to interpret the presented contents on the monitor due to these barriers and this will contribute to making websites inaccessible to disabled users. This paper proposed an innovative metric that assigns measurable weight to each identified barrier based on its severity and impacts on the accessibility level, and then ranks the barriers accordingly. Following, Web developers can fix the highly ranked severe barriers instead of wasting time in studying and fixing less severe types of barriers that may rarely occur. An experiment was conducted to check the metric validity. We found the metric was valid and thereby we suggested the usage of the metric as a valid scientific measurement. - Some of the metrics are blocked by yourconsent settings
Publication Study Of The Accessibility Diagnosis On The Public Higher Institutions Websites In Malaysia(Univ Utari Malaysia-Uum, 2013) ;Abuaddous, HY ;Jali, MZBasir, NUniversity web pages play a central role in the activities of all students. In order to assess the current state of university web site accessibility, we performed an automated evaluation of the home pages of 20 Public Higher Educational Institutions of Malaysia. Two experiments were made in 2012 and 2013 to see if there is a significant change in the results. Three Online Automated tools were used along the two experiments to see the differences between numbers of accessibility issues discovered by each tool. The results showed significant issues and no big improvements have been made to the websites from 2012 to 2013. - Some of the metrics are blocked by yourconsent settings
Publication The Design and Development of Spam Risk Assessment Prototype: In Silico of Danger Theory Variants(Science & Information Sai Organization Ltd, 2017) ;Zainal, KJali, MZNow-a-days, data is flowing with various types of information and it is absolutely enormous and moreover, it is in unstructured form. These raw data is meaningless unless it is processed and analyzed to retrieve all the valuable and meaningful information. In this paper, a design and principal functionalities of the system prototype is introduced. A process of information retrieval by applying the text mining with Artificial Immune System (AIS) is proposed to discover the possible level of severity for a Short Messaging Service (SMS) spam. This is expected to be a potential tool in retrieving an implicit danger that a spam might impact to the recipients. Furthermore, the development of this tool can be considered as an emergence of another data mining tool that also exceedingly possible to be embedded with another existing tool. - Some of the metrics are blocked by yourconsent settings
Publication The Significant Effect of Feature Selection Methods in Spam Risk Assessment Using Dendritic Cell Algorithm(IEEE, 2017) ;Zainal, KJali, MZThe vast amount of online documentation and the thriving of Internet especially mobile technology have caused a crucial demand to handle and organize unstructured data appropriately. An information retrieval or even knowledge discovery can be enhanced when a proper and structured data are available. This paper studies empirically the effect of pre-selected term weighting schemes, namely as Term Frequency (TF), Information Gain Ratio (IG Ratio) and Chi-Square (CHI2) in the assessment of a threat's impact loss. This feature selection method then further fed in conjunction with the Dendritic Cell Algorithm (DCA) as the classifier to measure the risk concentration of a spam message. The final outcome of this research is very much expected to be able in assisting people to make a decision once they knew the possible impact caused by a particular spam. The findings showed that TF is the best feature selection methods and well suited to be demonstrated together with the DCA, resulted with high accuracy risk classification rate. - Some of the metrics are blocked by yourconsent settings
Publication Wabs: A Web Accessibility Barrier Severity Metric(Univ Utari Malaysia-UUM, 2015) ;Abuaddous, HY ;Jali, MZBasir, NA novel metric for quantitatively measuring the severity of websites barriers that limit the accessibility for disabled people is proposed. The metric is based on the Web Content Accessibility Guidelines (WCAG 2.0), which is the most adopted voluntary web accessibility standard internationally that can be tested automatically. The proposed metric is intended to rank the accessibility barriers based on their severity rather than the total conformance to priority levels. Our metric meets the requirements as a measurement for scientific research. An experiment is conducted to assess the results of our metric and to reveal the commonplace violations that persist in websites and affect disabled people interacting with the web.