Browsing by Type "Conference Paper"
Now showing 1 - 20 of 243
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication A Conceptual Model of Hybrid Monitoring Rehabilitation Progress of Stroke Patients: A Case Study of a Public Tertiary Hospital in Malaysia(Institute of Electrical and Electronics Engineers Inc., 2019) ;Ismail W. ;Zamin N. ;Hanafi M.H. ;Mohamad A.H. ;Islamic Science Institute ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM) ;Universiti Sains Malaysia (USM)Universiti Kuala Lumpur (UniKL)Rehabilitation in healthcare systems provides therapy and training to restore quality life after certain illness, addiction or accident. Currently, there is a significant unmet need for rehabilitation services, and it is frequently undervalued in the health system. As populations age and the prevalence of noncommunicable diseases and injuries increases, and the demand for rehabilitation grows, strengthening rehabilitation in health systems becomes ever more paramount. Conventional rehabilitation service can be costly and time consuming to people not living near the rehabilitation centres. Often people with lower income who live in rural areas refuse rehabilitation services due to the logistic issue. On the other hand, in urban areas, most people are too busy with their daily activities and unable to keep their therapy schedule consistently. In consequence, patients do not enjoy the actual benefit of rehabilitation because of a certain limitation such as cost and time. These limitations can be surpassed by putting telerehabilitation, an emerging area of performing rehabilitation medical treatment with the use of technology from a distance into practice. Scientific studies of telerehabilitation in the current literature are discussing primarily in the area of readiness, technologies, and illnesses such as children autism and heart failure. However, there is limited evidence about telerehabilitation service for stroke patients, concentrating on the pre-implementation and implementation stages, which makes this paper viable and significant, potentially for telerehabilitation implementation in Malaysia. This paper proposes a new conceptual model of hybrid telerehabilitation that combines several technological principles, such as cloud, virtual reality, and computer-based system. The model was derived based on a study of a public tertiary hospital in Malaysia. The current traditional system was investigated and discussed. A new telerehabilitation model is proposed to widen the access for rehabilitation to patients of all ages. � 2019 IEEE.1 - Some of the metrics are blocked by yourconsent settings
Publication A Dip Test Strip Based on Immobilized Pararosaniline for Detection of Formalin Adulteration in Tofu(American Institute of Physics Inc., 2018) ;Kuswandi B. ;Riskyna A. ;Ahmad M. ;Faculty of Science and Technology ;University of JemberUniversiti Sains Islam Malaysia (USIM)A sensitive dip test strip for detection of formalin (HCHO) in tofu samples based on immobilized pararosaniline (PR) has been developed. The test strip has been fabricated by immobilizing PR reagent on filter paper. By using image color analysis (ImageJ) as the average of ?RGB value as color sensor response, the analytical parameters are obtained from an area of the sensing zone of the test strip using digital output of the color scanner. By using this scanometric method, it is possible to determine HCHO as low as 0.05 mg/L with the concentration range of 2-80 mg/L and the response time of 3 minutes. The reproducibility was found to be 8.04% (RSD) for good recovery. The test strip has been successfully applied to detect formaldehyde in tofu samples, and the results show in good agreement with the Nash method using UV/vis spectrophotometry.6 16 - Some of the metrics are blocked by yourconsent settings
Publication A first principle study of band structure of tetragonal barium titanate(American Institute of Physics Inc., 2017) ;Razak N.A.A. ;Zabidi N.A. ;Rosli A.N. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Pertahanan Nasional Malaysia (UPNM)Barium titanate (BaTiO3) is a perovskite crystal structure and it is well known to have many potential applications in microelectronic industry due to its high capabilities to enhance the performance of the capacitors and other energy storage devices. BaTiO3 has been reported to have a wide band gap around 3.4 eV from previous experimental studies. In theoretical studies, the analysis of the band structure of perovskite type of materials still under investigation due to high disagreement with the experimental result. The objective of this research is to investigate the band gap of the tetragonal BaTiO3 calculated using generalized gradient approximation (GGA) and hybrid functional (HSE03) with various pseudopotential methods performed by CASTEP module. The calculation using GGA show underestimation of energy band gap. However, the band gap calculated using HSE03 approximation shows an agreement with the experimental result. � 2017 Author(s).3 - Some of the metrics are blocked by yourconsent settings
Publication A framework for evaluating QinU based on ISO/IEC 25010 and 25012 standards(Institute of Electrical and Electronics Engineers Inc., 2016) ;Nwasra N. ;Basir N. ;Marhusin M.F. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Quality-in-Use (QinU) is one of the most important quality aspects of a web application, which represent users' viewpoint. Measuring QinU gives a strong indicator on the success of web applications. In addition, it has been used frequently to evaluate the overall quality of web applications. There are many studies in QinU that enriched the science of web engineering. However, contributions of these studies were dispersed and usually address a certain aspect of QinU. This study attempts to gather and improve the best contributions of the previous studies in a conceptual framework to evaluate QinU based on ISO/IEC 25010 and 25012 standards. The outcome is a proposed framework, which will demonstrate the procedural flow between different stakeholders (Decision-maker, Evaluator, Developer and End-user). This procedural flow affects the evaluation process of web application quality. Furthermore, the framework demonstrates the process of measuring QinU attributes by implementing the proposed Quality-in-Use Evaluation Model (QinUEM). The future works are to evaluate the Quality-in-Use of several web applications using the proposed conceptual framework and test the results using quantitative and qualitative methods. � 2015 IEEE.1 - Some of the metrics are blocked by yourconsent settings
Publication A method to measure the efficiency of phishing emails detection features(IEEE Computer Society, 2014) ;Al-Daeef M.M.; ; ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Phishing is a threat in which users are sent fake emails that urge them to click a link (URL) which takes to a phisher's website. At that site, users' accounts information could be lost. Many technical and non-technical solutions have been proposed to fight phishing attacks. To stop such attacks, it is important to select the correct feature(s) to detect phishing emails. Thus, the current work presents a new method to selecting more efficient feature in detecting phishing emails. Best features can be extracted from email's body (content) part. Keywords and URLs are known features that can be extracted from email's body part. These two features are very relevant to the three general aspects of email, these aspects are, email's sender, email's content, and email's receiver. In this work, three effectiveness criteria were derived based on these aspects of email. Such criteria were used to evaluate the efficiency of Keywords and URLs features in detecting phishing emails by measuring their Effectiveness Metric (EM) values. The experimental results obtained from analyzing more than 8000 ham (legitimate) and phishing emails from two different datasets show that, relying upon the URLs feature in detecting phishing emails will predominantly give more precise results than relying upon the Keywords feature in a such task. � 2014 IEEE.4 - Some of the metrics are blocked by yourconsent settings
Publication A New Android Botnet Classification for GPS Exploitation Based on Permission and API Calls(Springer Verlag, 2018) ;Yusof M.; ; ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)The target of botnet attacks has shifted from the personal computers to smartphones and mobile devices due to computational power and functionality of the mobile devices. Mobile botnet is a network consists of compromised mobile devices controlled by a botmaster through a command and control (C&C) network. Nowadays mobile botnets attacks are increasingly being used for advanced political or financial interest. Due to its popularity amongst the mobile operating system, Android has become the most targeted platform by the mobile botnets. The popularity of Android attracts the attackers to develop malicious applications with the botnet capability to hijack users devices. In this paper, a new Android botnet classification based on GPS exploitation based on permissions and API calls is proposed using feature selection. The training was carried out using malware dataset from the Drebin and tested using 800 mobile apps from the Google Play store. The experiment was conducted using static analysis and open source tools in a controlled lab environment. This new classification can be used as a reference for other researchers in the same field to secure against GPS exploitation from Android botnet attacks. Springer International Publishing AG 2018.4 - Some of the metrics are blocked by yourconsent settings
Publication A new mobile botnet classification based on permission and API calls(Institute of Electrical and Electronics Engineers Inc., 2017) ;Yusof M.; ; ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. This classification is developed using static analysis in a controlled lab environment and the Drebin dataset is used as the training dataset. 800 apps from the Google Play Store have been chosen randomly to test the proposed classification. As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. This new classification can be used as the input for mobile botnet detection for future work, especially for financial matters. 2017 IEEE.3 - Some of the metrics are blocked by yourconsent settings
Publication A new mobile Malware classification for camera exploitation based on system call and permission(Newswood Limited, 2017); ;Zahari L.H.; ; ; ; ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Currently, there are many attacks and exploitation to Android smartphones by the attackers all over the world. These attacks are based on profit and caused loss of money and productivity to the victim. This exploitation can be done via camera, SMS, call, audio, image or location exploitation by attacking the system call, permission or API inside the Android smartphone. Therefore, this paper presents 32 mobile malware classification based on system call and permission to detect camera exploitation for Android smartphone. The experiment was conducted in a controlled lab environment, by applying reverse engineering with 5560 training dataset from Drebin, where both static and dynamic analyses were used to identify and extract the permission and system call from the mobile applications (apps). These 32 classification have been evaluated with 500 mobile apps from Google Play Store and 19 mobile apps matched with the classification. This new classification can be used as the database and input for the development of new mobile malware detection model for camera exploitation. Copyright International Association of Engineers.5 36 - Some of the metrics are blocked by yourconsent settings
Publication A new mobile malware classification for SMS exploitation(Springer Verlag, 2017) ;Zaizi N.J.M.; ;Khailani A. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Mobile malware is ubiquitous in many malicious activities such as money stealing. Consumers are charged without their consent. This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. The proposed system calls classification is evaluated and tested using applications from Google Play Store. This research focuses on Android operating system. The experiment was conducted using Drebin dataset which contains 5560 malware applications. Dynamic analysis was used to extract the system calls from each application in a controlled lab environment. This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. The classification has been evaluated in 500 applications and 126 applications have been identified to contain malware. � Springer International Publishing AG 2017.7 - Some of the metrics are blocked by yourconsent settings
Publication A new SMS spam detection method using both Content-Based and non Content-Based features(Springer Verlag, 2016) ;Sulaiman N.F. ;Jali M.Z.Universiti Sains Islam Malaysia (USIM)SMS spamming is an activity of sending �unwanted messages� through text messaging or other communication services; normally using mobile phones. Nowadays there are many methods for SMS spam detection, ranging from the list-based, statistical algorithm, IP-based and using machine learning. However, an optimum method for SMS spam detection is difficult to find due to issues of SMS length, battery and memory performances. Hoping to minimize the aforementioned problems, this paper introduces another detection variance that is based on common characters used when sending SMS (i.e. numbers and symbols), SMS length and keywords. To verify our work, the proposed features were stipulated into five different algorithms and then, tested with three different datasets for their ability to detect spam. From the conduct of experiments, it can be suggested that these three features are reasonable to be used for detecting SMS spam as it produced positive results. In the future, it is anticipated that the proposed algorithm will perform better when combined with machine learning techniques. � Springer International Publishing Switzerland 2016.3 - Some of the metrics are blocked by yourconsent settings
Publication A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing(Institute of Electrical and Electronics Engineers Inc., 2016); ;Alhiagem W.A.A.; ; ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Individual user and organizations benefit from cloud computing services, which allow permanent online storage of files. The problem occurs when companies store highly confidential documents in cloud servers. Therefore, this paper aims to introduce a backbone structure for a cloud storage system where the security and personal privacy is highly maximized. It is very obvious that cloud computing servers are highly protected against unauthorized access, but in some cases these files stored can be accessible by the maintenance staffs. Fully protection is needed to ensure that the files stored in the server are only accessible to owners. This paper proposes a system that will employ Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES) combination encryption process using USB device. The files may be accessed in the cloud but all the files will remain encrypted till the USB device is plugged into the computer. The point of applying such method is to fully protect the files and avoid using one single password. The randomly generated passkeys are very complex combinations thus user will not be able to fully memorize them. The proposed system will detect the USB that contains the private-key used for the files to be downloaded from the cloud. � 2015 IEEE.3 - Some of the metrics are blocked by yourconsent settings
Publication A review of Client-Side toolbars as a User-Oriented Anti-Phishing solution(Springer Verlag, 2016) ;Al-Daeef M.M.; ; Universiti Sains Islam Malaysia (USIM)Phishing is a cybercrime in which, Internet users are delivered, commonly through emails, to simulated websites where they could be lured to disclose their personal information for attackers’ benefit. Phishing attacks were increased about 60% in the second half of 2013 over what was seen in first half of the same year. Although the number of proposed anti-phishing solutions, phishers still able to bypasses anti-phishing systems, in many cases, through users’ inattention behaviour. Therefore, phishing becomes a layered problem that require addressing issues at both of technical and non-technical (human) layers. Numerous of client-side toolbars were proposed as a technical solution to combat phishing attacks at user’s layer. Anti-phishing toolbars however, still unable to completely protect users from phishing attacks. This paper has reviewed theses toolbars to provide a clear understanding about their performance and limitation points. Such a review is required to draw clear directions of future solutions to alliviate these limitations.2 - Some of the metrics are blocked by yourconsent settings
Publication A review of feature extraction optimization in SMS spam messages classification(Springer Verlag, 2016) ;Zainal K. ;Jali M.Z. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Spam these days has become a definite nuisance to mobile users. Provision of Short Messages Services (SMS) has been intruded, in line with an advancement of mobile technology by the emergence of SMS spam. This issue has not only cause distressing situation but also other serious threats such as money loss, fraud, and false news. The focus of this study is to excavate the features extraction in classifying SMS spam messages at users� end. Its objective is to study the discriminatory control of the features and considering its informative or influence factor in classifying SMS spam messages. This study has been conducted by gathering research papers and journals from numerous sources on the subject of spam classification. The discovery offers a motivational effort for further execution in a wider perspective of combating spam such as measurement of spam�s risk level. � Springer Nature Singapore Pte Ltd. 2016.2 - Some of the metrics are blocked by yourconsent settings
Publication A Review of Skew Detection Techniques for Document(Institute of Electrical and Electronics Engineers Inc., 2016) ;Al-Khatatneh A.; ;Al-Qudah M. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Kebangsaan Malaysia (UKM)Skew detection and correction of documents is a problematic step in document image analysis. Many methods have been proposed by researchers for estimating the angle at which a document image is rotated (document skew) in binary image documents. Therefore, this paper aims to evaluate the most frequently skew detection techniques cited in the literature which are (i) Projection Profile Analysis (PP), (ii) Hough Transform (HT) and (iii) Nearest Neighbour (NN). This study points out the weaknesses and the strengths of each method and compares the performance of these methods in term of speed and accuracy. The evaluation result shows that in term of speed, the NN technique achieves the fastest time. However, NN performs poorly for the accuracy estimation. PP gives the best angle estimation even though it takes the longest time to execute. Hence, this finding can be used as the basis evaluation review for image analysis researchers in improving the existing technique of skew detection and recommend algorithm with a better accuracy in a shorter time. 2015 IEEE.3 - Some of the metrics are blocked by yourconsent settings
Publication A robust ridge regression approach in the presence of both multicollinearity and outliers in the data(American Institute of Physics Inc., 2017) ;Shariff N.S.M. ;Ferdaos N.A. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Multicollinearity often leads to inconsistent and unreliable parameter estimates in regression analysis. This situation will be more severe in the presence of outliers it will cause fatter tails in the error distributions than the normal distributions. The well-known procedure that is robust to multicollinearity problem is the ridge regression method. This method however is expected to be affected by the presence of outliers due to some assumptions imposed in the modeling procedure. Thus, the robust version of existing ridge method with some modification in the inverse matrix and the estimated response value is introduced. The performance of the proposed method is discussed and comparisons are made with several existing estimators namely, Ordinary Least Squares (OLS), ridge regression and robust ridge regression based on GM-estimates. The finding of this study is able to produce reliable parameter estimates in the presence of both multicollinearity and outliers in the data. � 2017 Author(s).1 - Some of the metrics are blocked by yourconsent settings
Publication A similarity precision for selecting ontology component in an incomplete sentence(Springer Verlag, 2018) ;Heng F.N.R. ;Deris M.M. ;Basir N. ;Universiti Sains Islam Malaysia (USIM)Universiti Tun Hussein Onn Malaysia (UTHM)Most of the existing methods focus on extracting concepts and identifying the hierarchy of concepts. However, in order to provide the whole view of the domain, the non-taxonomic relationships between concepts are also needed. Most of extracting techniques for non-taxonomic relation only identify concepts and relations in a complete sentence. However, the domain texts may not be properly presented as some sentences in domain text have missing or unsure term of concepts. This paper proposes a technique to overcome the issue of missing concepts in incomplete sentence. The proposed technique is based on the similarity precision for selecting missing concept in incomplete sentence. The approach has been tested with Science corpus. The experiment results were compared with the results that have been evaluated by the domain experts manually. The result shows that the proposed method has increased the relationships of domain texts thus providing better results compared to several existing method. � 2018, Springer International Publishing AG.3 - Some of the metrics are blocked by yourconsent settings
Publication A systematic review analysis of root exploitation for mobile botnet detection(Springer Verlag, 2016) ;Hashim H.A.-B.; ; Universiti Sains Islam Malaysia (USIM)Nowadays, mobile botnet has become as one of the most dangerous threats for smartphone. It has the capabilities of committing many criminal activities, such as remote access, Denial of Service (DoS), phishing, spreading malwares, stealing information and building mobile devices for illegitimate exchange of information and it is crucial to have an efficient mobile botnet detection mechanism. Therefore, this research paper presents a systematic review analysis of root exploitation for mobile botnet detection and a proof of concept how the mobile botnet attacks. This proof of concept includes analysis of mobile botnet sample using reverse engineering technique and static analysis. Springer International Publishing Switzerland 2016.1 - Some of the metrics are blocked by yourconsent settings
Publication A Systematic review on digital technology for enhancing user experience in museums(Springer Verlag, 2018) ;Mohd Noor Shah N.F. ;Ghazali M. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Teknologi Malaysia (UTM)This paper presents a review on using digital technology (DT) for enhancing visitors� user experiences in museums. The user experience (UX) is one of the key aspects of human-computer interaction between human and technology. Studies have found that using digital technology can enhance user experience in visiting museums, however, more research need to be conducted about what user needs and expects from the technology. The results of the study show, there are many types of digital technology for enhancing user experience in museums that had been developed, but an understanding of the user expectation will be the main key point to develop better-design digital technology applications. � 2018, Springer Nature Singapore Pte Ltd.9 - Some of the metrics are blocked by yourconsent settings
Publication A user-orientated electronic laboratory notebook for retrieval and extraction of provenance information for EUROCHAMP-2(2011) ;Zaki Z.M. ;Dew P.M. ;Haji M.H. ;Lau L.M.S. ;Rickard A. ;Young J. ;University of LeedsUniversiti Sains Islam Malaysia (USIM)This research is concerned with the design and evaluation of an Electronic Laboratory Notebook (ELN) for the simulation of chemical processes. It provides quality provenance information for scientists wishing to compare simulation runs with in vitro experimental data. The research is grounded in the EUROCHAMP-2 community. The community uses a benchmark Master Chemical Mechanism (MCM) in order to undertake their model simulations. The goal is to ensure that, for each atmospheric chamber experiment, a computational model is evaluated/developed using the MCM. This paper builds on earlier research on an ELN for this community. The main contributions are: (1) a re-engineered ELN co-developed by EUROCHAMP-2 chemists and computer scientists where the focus is to enable community scientists to capture and extract useful provenance information, (2) a novel Inline Provenance Node Navigator (IPNav) is provided which enables a modeller to navigate through the trail of the runs as a simulation is created, and (3) the results of an initial user evaluation of the ELN undertaken with two practising modellers. � 2011 IEEE.3 - Some of the metrics are blocked by yourconsent settings
Publication Ab initio calculation of vibrational frequencies of ZnSe and the Raman spectra(American Institute of Physics Inc., 2014) ;Rosli A.N. ;Zabidi N.A. ;Kassim H.A. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM) ;Universiti Pertahanan Nasional Malaysia (UPNM)University of Malaya (UM)The single layer of ZnSe has been studied to understand the structure using density functional theory. The vibrational frequencies of several cluster of ZnSe have been calculated when the Kohn-Sham equation solved at the ground state energy. We have done the calculation for 34 models of ZnSe clusters but only the stable molecules will be discussed. The bond length, Fermi energy and binding energy of ZnSe clusters have been calculated. The experimental result of single layer of ZnSe shown by Nesheva et. al. using different thickness of layers until 1?m [1]. The Raman spectra of ZnSe shown several peak for different thickness. In this paper, we will show the comparison of our calculated result with the experimental Raman spectra to show the existent of cluster. � 2014 AIP Publishing LLC.5