Browsing by Author "Md Norwawi N."
Now showing 1 - 6 of 6
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach(2012) ;Dalbouh H.A. ;Md Norwawi N. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Hierarchical clustering algorithms take an input of pairwise data-item similarities and output a hierarchy of the data-items. This paper presents bidirectional agglomerative hierarchical clustering algorithm to create a bottom-up hierarchy, by iteratively merging the closest pair of data-items into one cluster. The result is a rooted AVL tree. The n leafs correspond to input data-items that need to n/2 or n/2+1 steps to merge into one cluster, correspond to groupings of items in coarser granularities climbing towards the root. As observed from the time complexity and number of steps needed to cluster all data points into one cluster perspective, the performance of the bidirectional agglomerative algorithm using tree data structure is better than the current agglomerative algorithms. Analysis on the experimental results indicates that the improved algorithm has a higher efficiency than previous methods. � 2012 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Intelligent decision support model based on neural network to support reservoir water release decision(2011) ;Wan Ishak W.H. ;Ku-Mahamud K.R. ;Md Norwawi N. ;Faculty of Science and Technology ;Universiti Utara Malaysia (UUM)Universiti Sains Islam Malaysia (USIM)Reservoir is one of the emergency environments that required fast an accurate decision to reduce flood risk during heavy rainfall and contain water during less rainfall. Typically, during heavy rainfall, the water level increase very fast, thus decision of the water release is timely and crucial task. In this paper, intelligent decision support model based on neural network (NN) is proposed. The proposed model consists of situation assessment, forecasting and decision models. Situation assessment utilized temporal data mining technique to extract relevant data and attribute from the reservoir operation record. The forecasting model utilize NN to perform forecasting of the reservoir water level, while in the decision model, NN is applied to perform classification of the current and changes of reservoir water level. The simulations have shown that the performances of NN for both forecasting and decision models are acceptably good. � 2011 Springer-Verlag. - Some of the metrics are blocked by yourconsent settings
Publication Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology(Institute of Electrical and Electronics Engineers Inc., 2015) ;Perumal S. ;Md Norwawi N. ;Raman V. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Sains Malaysia (USM)The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, internet of things (IoT) is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices including smart objects, is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid. The main research challenge in Internet of things (IoT) for the forensic investigators is based size of the objects of forensic interest, relevancy, blurry network boundaries and edgeless networks, especially on method for conducting the investigation. The aim of this paper is to identify the best approach by designing a novel model to conduct the investigation situations for digital forensic professionals and experts. There was existing research works which introduce models for identifying the objects of forensics interest in investigations, but there were no rigorous testing for accepting the approach. Currently in this work, an integrated model is designed based on triage model and 1-2-3 zone model for volatile based data preservation. � 2015 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Modelling of human expert decision making in reservoir operation(Penerbit UTM Press, 2015) ;Wan Ishak W.H. ;Ku-Mahamud K.R. ;Md Norwawi N. ;Universiti Utara Malaysia (UUM)Universiti Sains Islam Malaysia (USIM)Reservoir is one of the structural approaches for flood mitigation and water supply. During heavy raining season, reservoir operator has to determine fast and accurate decision in order to maintain both reservoir and downstream river water level. In contrast to less rainfall season, the reservoir needs to impound water for the water supply purposes. This study is aimed to model human expert decision making specifically on reservoir water release decision. Reservoir water release decision is crucial as reservoir serve multi purposes. The reservoir water release decision pattern that comprises of upstream rainfall and current reservoir water level has been form using sliding window technique. The computational intelligence method called artificial neural network was used to model the decision making. � 2015 Penerbit UTM Press. All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication Pattern discovery using k-means algorithm(Institute of Electrical and Electronics Engineers Inc., 2014) ;Mohammed Ahmed A. ;Wan Ishak W.H. ;Md Norwawi N. ;Alkilany A. ;Faculty of Science and Technology ;Sebha University Libya ;Universiti Utara Malaysia (UUM)Universiti Sains Islam Malaysia (USIM)Student's placement in industry for the industrial training is difficult due to the large number of students and organizations involved. Further the matching process is complex due to the various criteria set by the organization and students. This paper will discuss the results of a pattern extraction process using a clustering algorithm that is k-means. The data use consists of Bachelor of Information Technology and Bachelor in Multimedia students of Universiti Utara Malaysia from the year 2004 till 2005. The experiments were conducted using undirected data and directed data. The pattern extracted gave information on the previous matching process done by the university. � 2014 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Systematic review of web application security development model(Kluwer Academic Publishers, 2013) ;Musa Shuaibu B. ;Md Norwawi N. ;Selamat M.H. ;Al-Alwani A. ;Yanbu University College ;Universiti Sains Islam Malaysia (USIM)Universiti Putra Malaysia (UPM)In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security development models used to secure the web application layer, the security approaches or techniques used in the process, the stages in the development model in which the approaches or techniques are emphasized, and the tools and mechanism used to detect vulnerabilities. The study extracted 499 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Google-Scholar, Science Direct, Scopus, Springer Link and ISI Web. After investigation, only 43 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one development model is referred to as a standard or preferred model for web application development. However, agile development models seem to have gained more attention, probably due to the multiple stakeholders that are involved in discussing security viewpoints, rather than a few members of the development team. It appears also that there is consistency in the use of the threat-modeling technique, probably due to its effectiveness in dealing with different kinds of vulnerabilities. � 2013, Springer Science+Business Media Dordrecht.