Browsing by Author "Nurlida Basir"
Now showing 1 - 10 of 10
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Comparative Study Of Quality Models(International Scientific Academy of Engineering & Technology, 2016) ;Abdulhakim.Elmoawe Dreheeb ;Nurlida BasirNorasikin FabilSoftware is now used in almost every business application. Software quality has emerged as pivotal aspects of any software development process. Quality of software depends on the process followed during its development. Software quality is having multi-dimensional content which may be distinguished and measured easily. To be specific, with the idea of determining the multidimensional content in a more exact pattern various qualitative models have been presented by virtue of which different aspects of this matter have been attempted to be investigated properly. Quality is considered a crucial issue for education in general, and for e-learning in particular. Factors affecting the quality of software are identified from among the quality models, on the basis of the most common, crucial and critical ones. These quality characteristics could be used to reflect the quality of the software product from the view of the users. Selecting which one of the quality models to use is a real challenge; in this paper we will discuss the contents of the following quality models: include but are not limited to McCall, Boehm, FURPS, Dromey, QMOOD, ISO 9216 and etc. Which, this paper describes about software quality, affecting quality of software, different software quality models and its comparative study. - Some of the metrics are blocked by yourconsent settings
Publication Countermeasures of Unintentional Insider Threats: A Systematic Review(Penerbit USIM, Universiti Sains Islam Malaysia, 2020-12-25) ;Zainab A.A.Abdelsadeq ;Nurlida Basir ;Syaril Nizam OmarNur Fatin Nabila Binti Mohd Rafei HengThe majority of the organizations see technical controls as the solution to their problems around information security. Moreover, it was obviously proved with providing all of these technological techniques that errors of human are not avoidable Unintentional Insider Threats (UIT) are the biggest insider risk of all, which defined as an employee former/current, business partner or contractor who had/ has access authority to the network, system or data of an organization and who, without malicious intent, damages the organization's information or information systems through action or inaction. Thus the objective of this paper is to; determine the countermeasures of UITs have been reported in the literature. This paper achieves a structured literature review of a wide collection of existing literature on UITs countermeasures. The review of literature identified a group of significant countermeasures against UITs which Can be used for improve organizations’ security policy for reducing and minimizing reducing the risks connected to UITs. - Some of the metrics are blocked by yourconsent settings
Publication Interactive Courseware: Quranic Verses On The Integration Of Naqli And Aqli Knowledge(International Scientific Academy of Engineering & Technology (ISAET), 2016) ;Mohamed Akhiruddin Ibrahim ;Adnan Mohamed Yusuf ;Mohd Zohdi Mohd Amin ;Nurlida Basir ;Nurazzuwin AdenanNurul Atika AzmanThis research is an interactive courseware called “Quranic Verses on The Integration of Naqli and Aqli Knowledge”. This courseware is developed to facilitate users especially among students to fully understand about sciences knowledge in Quran and will expose the miracle of the Quran with interactive ways. The targets of this courseware are for all ages that learn about sciences knowledge in the Quran especially students who are learning about this knowledge, lecturers who are teaching their students on this knowledge, scientist, researcher and others. This courseware consists of Quranic verses and their meanings. This courseware provided 15 categories of knowledge and its meaning in Quran from Surah al-Baqarah to Surah al-Naas. Moreover, this courseware also combines the notes and the verses of Quran that are in audio and interactive images forms which is the most effective tool to attract the user to use this courseware. This courseware is developed by using Adobe Flash Player Cs6 as the main platform and some other software is used to support in developing this project. “Interactive Courseware: Quranic Verses on The Integration of Naqli and Aqli Knowledge” is a courseware that is easy to learn and interactive. We hope that with the development of this courseware, it can assist all people especially the Muslims who would like to learn about this knowledge in understanding the verses of Quran and the science knowledge in Quran in easier way as well as it could be as one of teaching tool for lecturers to teach their students on this knowledge. We also hope with this interactive courseware to be applied, it will expose the miracle of theQuran to the world and introduce the science knowledge that has been in the Quran since its existence. - Some of the metrics are blocked by yourconsent settings
Publication Iot-based Heart Signal Processing System for Driver Drowsiness Detection(Tecno Scientifica Publishing, 2023) ;Yunidar Yunidar ;Melinda Melinda ;Khairani Khairani ;Muhammad IrhamsyahNurlida BasirTraffic accidents often result in loss of life and significant economic losses. Indonesia's high number of traffic accidents indicates the need for effective solutions to overcome this problem. Developing a drowsiness detection device is one effort that can be made to reduce accidents caused by drowsy drivers. The data obtained in this study used driver heart rate data. The drowsiness detection tool was developed using the Wemos D1 Pro Esp8266 microcontroller and MAX30102 sensor. Testing was carried out on 25 subjects under two conditions: 'Drowsy' and 'Normal.' The driver's level of drowsiness is determined based on the heart rate measured by the detection device. The Blynk application is used as a visual interface to provide notifications via smartphone if the driver is drowsy. The accuracy of the drowsiness detection tool was compared with the results obtained from the Pulse Oximeter. This research shows that the drowsiness detection tool using the Wemos D1 Pro Esp8266 microcontroller and MAX30102 sensor has an accuracy of around 98% when compared with the pulse oximeter. The Blynk application successfully sends notifications precisely when the driver is drowsy. This study highlights the potential of drowsiness detection devices to improve traffic safety and reduce accidents caused by drowsy drivers. - Some of the metrics are blocked by yourconsent settings
Publication Knowledge-based expert system for predictive classification of main specific learning disabilities(University of El Oued, 2018) ;R. M. Rasli ;N. A. A. Aziz ;S. A. Salim ;F. M. Razali ;N. M. NorwawiNurlida BasirConventional or the automation of computer-based screening and diagnosis is part of the methods that can assist to identify and detect these problematic students. However, several limitation or constraints have been identified leading towards the design and development of an innovative rapid web-oriented knowledge-based expert systems for predictive classification of five main types of specific learning disabilities namely dyslexia, dysgraphia, dyscalculia, dyspraxia and Attention Deficit Disorder/Attention Deficit Hyperactivity Disorder (ADD/ADHD). The result is displayed in a graphical form (chart and table) to make ease of understanding. This study is beneficial for parents, special education teachers, organizations and researchers by providing an alternative to the exclusion of redundant test and time saving for early screening of specific learning disabilities. - Some of the metrics are blocked by yourconsent settings
Publication Performance Of Shufflenet And Vgg-19 Architectural Classification Models For Face Recognition In Autistic Children(INSIGHT - Indonesian Society for Knowledge and Human Development, 2023) ;Melinda Melinda ;Maulisa Oktiana ;Yudha Nurdin ;Indah Pujiati ;Muhammad IrhamsyahNurlida BasirThis study discusses the face recognition of children with special needs, especially those with autism. Autism Spectrum Disorder (ASD) is a complex neurodevelopmental disorder that affects social skills, ways of interacting, and communication disorders. Facial recognition in autistic children is needed to help detect autism quickly to minimize the risk of further complications. There is extraordinarily little research on facial recognition of autistic children, and the resulting system is not fully accurate. This research proposes using the Convolution Neural Network (CNN) model using two architectures: ShuffleNet, which uses randomization channels, and Visual Geometry Group (VGG)-19, which has 19 layers for the classification process. The research object used in the face recognition system is secondary data obtained through the Kaggle site with a total of 2,940 image data consisting of images of autism and non-autism. The faces of autistic children are visually difficult to distinguish from those of normal children. Therefore, this system was built to recognize the faces of people with autism. The method used in this research is applying the CNN model to autism face recognition through images by comparing two architectures to see their best performance. Autism and non-autism data are grouped into training data, 2,540, and test data, as much as 300. In the training stage, the data was validated using validation data consisting of 50 autism image data and 50 non-autism image data. The experimental results show that the VGG-19 has high accuracy at 98%, while ShuffleNet is 88%. - Some of the metrics are blocked by yourconsent settings
Publication A review on teacher training's drawbacks, barriers and challenges: Conventional to digital technology transition(University of El Oued, 2018) ;R. M. Rasli ;N. A. M. Zulkefli ;N. A. A. Azizir ;F. M. Razali ;S. A. Salim ;N. M. NorwawiNurlida BasirEducation either formal or informal plays an important role to help the masses to acquire the necessary knowledge and skills. Teachers training programs have to be periodically reviewed and revamped (if necessary) to help produce competent teachers who are excellent in content, pedagogical and technological knowledge. Studies shown that such training is lacking due to several barriers (administration, organization, communication and self-related), drawbacks and challenges which are faced by pre-service teachers in their teaching practice during practicum in actual classrooms. It also elaborates the various importance technologies notably Web 2.0 that can be implemented to help improve the current teaching practice in coping with the teaching demands in the classroom. With proper technology integration, learning can take place more efficiently and effectively, ultimately lead to better nation building. - Some of the metrics are blocked by yourconsent settings
Publication Tacit requirements elicitation framework(Asian Research Publishing Network, 2015) ;Nurlida Basir ;Salam R.A. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Requirements engineering (RE) is an integral and fundamental part of software development life cycle (SDLC). The most cited reason for software failure is the inability to fully capture and implement the exact user requirements in a timely, operationally and financially expected manner. Requirements can be categorized into two types; explicit and tacit. Explicit requirements usually expressed clearly and well-identified requirements in which the system must perform. In contrast, tacit requirements are considered as hidden or embedded requirements that incapability of getting such may caused a software failure. The importance of tacit requirements in requirements engineering (RE) has been acknowledged widely as characteristics for developing projects in software engineering (SE). Therefore, the aim of this paper is to construct a framework for tacit requirement elicitation process. The framework is design based on the integration of the tacit knowledge elicitation process of Nonaka and Takeuchi model with the tacit requirements elicitation process. � 2006-2015 Asian Research Publishing Network (ARPN). - Some of the metrics are blocked by yourconsent settings
Publication The Effect Of Power Spectral Density On The Electroencephalography Of Autistic Children Based On The Welch Periodogram Method(LPPM Institut Teknologi Telkom Purwokerto, 2023) ;Melinda Melinda ;I Ketut Agung Enriko ;Muhammad Furqan ;Muhammad Irhamsyah ;Yunidar YunidarNurlida BasirAutism spectrum disorder is a serious mental disorder affecting social behavior. Some children also faceintellectual delay. In people with autism spectrum disorder, the signals detected have abnormalities compared to normalpeople. This can be a reference in diagnosing the disorder with electroencephalography. This study will analyze the effect ofpower spectral density on the electroencephalography of autistic children and also compare it with the power spectral densityvalue on the electroencephalography of normal children using the Welch periodogram method approach. In the preprocessingstage, the independent component analysis method will be applied to remove artifacts, and a finite impulse response filter toreduce noise in the electroencephalography signal. The study results indicate differences in the power spectral density valuesobtained in the autistic and normal electroencephalography signals. The power spectral density value obtained in the autisticelectroencephalography signal is higher than the normal electroencephalography signal in all frequency sub-bands. From thestudy results, the highest power spectral density value obtained by the autistic electroencephalography signal is in the deltasub-band, which is 54.06 dB/Hz, while the normal electroencephalography signal is only 33.14 dB/Hz at the same frequencysub-band. And in the Alpha and Beta sub-bands, the normal electroencephalography signal increases the power spectraldensity value, while in the autistic electroencephalography signal, the power spectral density value decreases in the Alphaand Beta sub-bands. In addition, finite impulse response and independent component analysis methods can also reduce noiseand artifacts contained in autistic and normal electroencephalography signals - Some of the metrics are blocked by yourconsent settings
Publication Web Accessibility Challenges(The Science and Information (SAI) Organization Limited, 2016) ;Hayfa.Y.Abuaddous ;Mohd Zalisham JaliNurlida BasirDespite the importance of web accessibility in recent years, websites remain partially or completely inaccessible to certain sectors of the population. This is due to several reasons, including web developers’ little or no experience in accessibility and the lack of accurate information about the best ways to quickly and easily identify accessibility problems using different Accessibility Evaluation Methods (AEMs). This paper surveys accessibility literature and presents a general overview of the primary challenges of accessibility barriers on websites. In this sense, we critically investigate main challenges forms related to accessibility including standards and guidelines (WCAG 2.0), during website’s design and development and during evaluation. Finally, a set of recommendations such as enforcing accessibility legislations are presented to overcome some challenges. Keywords—component; Website Accessibility; Disabilities; Accessibility challenges; WCAG 2.0; Accessibility automated tools