Browsing by Author "Sakinah Ali Pitchay"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Discovering Austim Child Potential Using Autism Parenting Application(Institute of Research and Journals, 2018) ;Aslina Baharum ;Sakinah Ali Pitchay ;Rozita Ismail ;Emelia Abdul Rahim ;Suhaida HalmyA. Bhanupriya Naidu A/P AnathanAutism have become prevalent disorder among children nowadays. Parents with autism kid having higher level of stress among other parents. There is some remarkable skill in autism kid that by discovering the skill can make parents to have a better approach or better parenting toward their kid. The objective of the study is to identify the remarkable skills among autism children using qualitative method and to identify the features of suitable mobile app to help parent determine the remarkable skills using content analysis and literature review. Two main remarkable skill focusses in this study were rote memory and spatial visual. A study was carried out to produce a mobile application (prototype) for autism parents to discover their child's remarkable skills. Prototyping methodology was employed. The application is expected to help parents to discover their kid's remarkable skill. - Some of the metrics are blocked by yourconsent settings
Publication Enhancing Cyber-attacks Awareness Via Mobile Gamification Techniques(Asian Scholars Network, 2022) ;Sakinah Ali Pitchay ;Anis Syahira Suhaimi ;Najwa Hayaati Mohd Alwi ;Farida RidzuanAzni Haslizan Ab HalimNowadays, the changes in online behavior make data privacy extremely relevant which requires a suitable approach for raising cyber-attacks awareness. Every generation is constantly relying on the cyber world to run their life and they often are lacking in knowledge on security, which exposes them to attackers. Gamification techniques is chosen to be implemented in this research as the use of gamification are increasingly used in education to improve learner’s motivation and engagement. This research introduces a cyber-attacks awareness via mobile gamification techniques known as CYBERPOLY. This quiz-based game combined with the board game concept assists in increasing cyber-attacks awareness and reduces the incidents report and victim risk of any cyber traps. CYBERPOLY promotes Naqli (Revealed knowledge) and Aqli (Rational knowledge) (iNAQ) via board game where users can learn a few Arabic terms that are related to Muslim life such as Tawakkal (hibah, infaq, waqaf, qard, sedeqah), Ta’alim, Iktikaf, Muhasabah. CYBERPOLY offers password complexity indicator feature while offering portability, accessibility, off-line service (anytime, anywhere) and fun learning. It provides four levels of interactive quiz which are beginner, moderate, advanced, and professional that implement the Bloom’s Taxonomy keyword for more effective learning process. The user will be rewarded with score by earning their own money via security awareness quiz that will be used later as their initial salary to begin the board game. The game will end when the player’s money balance reached negative. Thus, this game is mainly developed to educate netizen about cyber-attacks in fun and interactive. Based on the end user feedbacks of functional testing and security authentication, the results show that CYBERPOLY has huge potential as an education tool on cultivating cyber-attacks awareness for digital society. For future planning, the additional scope can be expanded by creating more quiz questions according to specific cyberattack topics, add multiplayer game mode, made available for the iOS platform and save the game result for monitoring the learning performance of each user. - Some of the metrics are blocked by yourconsent settings
Publication Indexing Android Mobile Malware(Medwell Journals, 2016) ;Intan Nurfarahin Ahmad ;Farida Ridzuan ;Madihah Mohd SaudiSakinah Ali PitchayThe increasing number of smartphones users have resulted in highly distributed applications that allow users to access information and resources from all over the world. With the advancement of technology, the attacker had created more sophisticated techniques that gave negative impacts to the smartphone users. Moreover, current techniques in mobile malware classification and detection having difficulties to detect the new advanced malware exploitation and threats. Therefore, an efficient mobile malware classification and detection technique are needed. In this research study, a new mobile malware classification and detection technique have been developed and evaluated. Based on the evaluation conducted, the result showed that the current mobile malware available in market is using different technique to avoid from being detected. Therefore in this research study, a way forward to detect such mobile malware is further discussed. Furthermore, the developed mobile malware classification and detection is used as the input for the indexing android mobile malware a framework for indexing android mobile malware also is documented in this research study. - Some of the metrics are blocked by yourconsent settings
Publication Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm(Indonesian Journal of Electrical Engineering and Computer Science, 2022) ;Bashar Izzeddin Issa Aljidi ;Sundresan PerumalSakinah Ali PitchayThe emphasis on data protection is improved in particular with respect to the transmission protocols utilized. Different research on numerous data protection areas such as authentication, encryption, hiding of data and validation were performed. In addition, a cybersecurity standard, such as IP-SEC, and secure sockets layer (SSL), were introduced to solve privacy infringement problems by applying encryption, authorization and protection to data exchanged and data stored in the cloud. This study suggests a new steganography algorithm, a data protection tool used to conceal massive amounts of data from graphic and statistic attacks in color images. The proposed algorithm is a multi-level steganography modified deep hiding/extracting technique (MDHET), which implements a selected least signified bit (SLSB) for color picture dispersal of the information. In addition, an accurate pixel location randomization feature has been applied. After MDHET, the predicted results will effectively conceal data up to 6 bpp (bit per pixel) with high safety levels by improving the quality of images. In addition, MDHET can be useful for encoding a deep series of images into one in which the testing procedure is carried out using regular reference images used in color image processing and compression analysis from different institutions. - Some of the metrics are blocked by yourconsent settings
Publication Single-frame Image Recovery using a Pearson type VII MRF(Elsevier, 2012) ;Ata KabanSakinah Ali PitchayCompressive imaging and image super-resolution aim at recovering a high-resolution scene from its compressed or low resolution measurements. The main difficulty lies with the ill-posedness of the problem, and there is no consensus as to how best to formulate image models that can both impose smoothness and preserve the edges in the image. Here we develop a new image prior based on the Pearson type VII density integrated with a Markov Random Field model, which has desirable robustness properties. We develop a fully automated hyperparameter estimation procedure for this approach, which makes it advantageous in comparison with alternatives. Our recovery algorithm, although very simple to implement, it achieves statistically significant improvements over previous results in under-determined problem settings, and it is able to recover images that contain texture. - Some of the metrics are blocked by yourconsent settings
Publication Systematic Literature Review On It Asset Management Framework In Security Operation Center(KUIS, 2022) ;A’in Hazwani Ahmad Rizal ;Sakinah Ali PitchayYau Ti DunEach successful cyber incident cost $4.24 million per incident on average in 2021 which impacted the company's reputation, (IBM, 2022). The growing cybersecurity threats have affected business environments in all different sectors, especially in the IT landscape. Deploying a Security Operation Center (SOC) either in-house or outsourced concepts would be one of the mitigations to prevent cybercriminals. SOC operates in a huge team that relies on people, processes, and technology. However, 60% of Malaysian cybersecurity technologies are currently deploying outdated versions according to the latest findings, (Digital News Asia, 2022) and there is an inadequate tool used in SOC environments. Moreover, there is still a gap in the SOC framework used in maintaining the quality of technology, especially IT assets, (John Burke, 2020). This paper aims to analyze the state-of-the-art IT asset management policy used globally via a comparative study. It employs qualitative research on the literature surveys for SOC's existing IT asset management. The findings from the analysis show that existing frameworks are inadequately guided especially in maintaining the IT assets' quality which is aligned with the current technology. By proposing an improved policy in IT asset management in SOC, the cybersecurity threat prevention and identification process could be improved. Thus, this paper will help in identifying a comprehensive IT asset management in SOC and the total cost damage which aligns with governance’s initiative nation cybersecurity strategy for 2020-2024 - Some of the metrics are blocked by yourconsent settings
Publication A Systematic Review Analysis For Quran Verses Retrieval(Medwell Journals, 2016) ;Muhammad Afifi Mohamad Safee ;Madihah Mohd Saudi ;Sakinah Ali PitchayFarida RidzuanNow a days, a proper method for presenting information is crucial due to the increase of mass volume and complexity of information. As for Muslim, Quran is referred as one of the main resources for guidance and reference for their daily life. Currently, there are many methods have been used for Quran verses retrieval. However, there is still lack of studies on the scientific way for Quran verses retrieval. As a consequence, it is quite hard to obtain accurate information and might lead to wrong information being retrieved. Therefore, this study investigates and evaluates the strengths and weaknesses of existing works. Furthermore, a case study on a new Quran ontology alignment model by integrating the upper ontology (Quran corpus) and domain ontology (general medical) for Quran verses extraction is discussed in this study. Based on the findings, ontology remodeling is required to fix the inconsistency of the ontology by integrating ontology alignment technique and fuzzy algorithm.