Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
207 result(s) for "Ghazali, Osman"
Sort by:
Enhancing mobile e-book usability for the visually impaired: A novel model validated via the fuzzy delphi method
Current usability evaluation models for e-books do not adequately address the needs of the visually impaired, as they require customisation to effectively evaluate these applications, considering the unique accessibility requirements of the visually impaired and the distinct features of e-books. This study presents a structured three-phase approach to developing a usability evaluation model specifically designed for mobile e-book applications used by the visually impaired. The first phase involved gathering requirements through a literature review and online survey. The second phase focused on verifying the proposed model using the Fuzzy Delphi Method. The final phase involved consolidating the verified measurements to establish the usability evaluation model. Five usability factors were identified: accessibility, satisfaction, effectiveness, learnability, and efficiency. The inclusion of accessibility ensures that the needs of the visually impaired are addressed. Besides, 31 usability metrics were validated through FDM. The findings confirm the applicability of the proposed model by demonstrating systematic expert agreement on the identified factors and metrics. The Fuzzy Delphi Method validates 31 usability metrics, thereby strengthening the reliability and applicability of HCI and accessibility research. This model promotes inclusive technology development, supporting the creation of usable and empowering e-book applications for users who are visually impaired.
Citizens' E-participation through E-government services: a systematic literature review
Given the multidimensional nature of e-participation, current studies in this field are fragmented, under-theorized, and dispersed. Understanding the primary issues under investigation is challenging, particularly for early career researchers. Despite citizens' widespread use of e-government services, government agencies still face several challenges, particularly in providing feedback on the quality and effectiveness of these services. The existing challenges related to e-government services and citizens' e-participation provide avenues for important research opportunities. Accordingly, the purpose of this systematic review is to (i) determine the problems and obstacles faced by citizens' e-participation as end users of e-government services, (ii) determine the multidisciplinary elements that contribute to the success of e-participation in e-government services, and (iii) propose future research avenues. Following PRISMA 2020 guidelines, this systematic review is conducted by combining two methods: Kitchenham & Charters and Webster & Watson, focusing on studies from the period between 2010 and 2022. The findings show that while existing research models are helpful, their primary focus is on technical and political factors. Hence, a focus on psychological and social aspects is necessary, which could assist in providing a sound understanding of users' experiences of using the different e-participation tools set by governments. This review provides a comprehensive synthesis of global e-participation challenges and success factors and presents a theoretical basis for future research endeavours.
STATISTICALLY CONTROLLED ROBUST TRUST COMPUTING MECHANISM FOR CLOUD COMPUTING
Quality of service plays an important role in making distributed systems. Users prefer service providers who meet the commitments specifi ed in the Service Level Agreements to these who violate them. Cloud computing has been the recent entrant to the distributed system market and has revolutionized it by transforming the way the resources are accessed and paid for. Users can access cloud services including hardware, development platform and applications and pay only for the usage similar to the other utilities. Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specifi ed in the Service Level Agreements. Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions. Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported. This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresisbased algorithm. Hence the proposed mechanism can protect the trust scores from changes due to momentary fl uctuations in system performances. The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.  
A real-time hypertext transfer protocol intrusion detection system on web server
Keywords: Cyber attack HTTP IDS Intrusion OWASP ZAP Telegram Bot ABSTRACT Behind the rapid development of the internet in today's era, various types of crime are also targeting vital players in the internet industry. [...]the researcher proposes a solution in the form of a Keris, namely the hypertext transfer protocol (HTTP) intrusion detection system (IDS) that runs on the server where our website is running. Intrusion detection systems (IDS) are security tools that use sophisticated techniques to secure computer networks from illegal access or ongoing intrusions that have already occurred. [...]cybersecurity requires a robust IDS design, which can overcome ethical testing in real-time and large-scale hacking [9]. HTTP-IDS collects logs from web servers and analyzes them using algorithms that can detect patterns that are abnormal or do not comply with specified standards. In that case, the system will send a warning notification to the system admin about an intrusion attempt on the web server. 2.2.Use of web server logs on the intrusion process Web servers include several parts that control how web users access hosted files.
IMPLEMENTATION AND VALIDATION OF AN ADAPTIVE FECMECHANISM FOR VIDEO TRANSMISSION
This research focuses on investigating the FEC mechanism as an error recovery over a wireless network. The existing adaptive FEC mechanism faces a major drawback, which is the reduction of recovery performance by injecting too many excessive FEC packets into the network. Thus, this paper proposes the implementation of an enhanced adaptive FEC (EnAFEC) mechanism for video transmission together with its validation process. There are two propositions in the EnAFEC enhancement, which include block length adaptation and implementation, and suitable smoothing factor value determination. The EnAFEC adjusts the FEC packets based on the wireless network condition so that excessive FEC packets can be reduced. The proposed enhancement is implemented in a simulation environment using the NS-2 network simulation. The simulation results show that EnAFEC generates less FEC packets than the other types of adaptive FEC (EAFEC and Mend FEC). In addition, a validation phase is also conducted to verify that the proposed enhancement is functioning correctly, and represents a real network situation. In the validation phase, the results obtained from the simulation are compared to the outputs of the other adaptive FEC mechanisms. The validation results show that the mechanism is successfully implemented in NS2 since the number of packet loss falls under the overlapping confidence intervals.  
Age Group Classification using Convolutional Neural Network (CNN)
Age group classification is a complex task that is used to classify facial images or videos into predetermined age categories. It is an important task due to its numerous applications such as health, security, authentication system, recruitment, and also in intelligent social robots. Convolutional Neural Network (CNN) has recently shown excellent performance in analysing human face images and videos. This paper proposed an age group classification task using CNN that trained and tested with an All-Age Face (AAF) dataset. FaceNet deep learning model that uses CNN was applied in this study to compute a 128-d embedding that quantifies the face of the age group. The experiment included two age groups: Adolescence and Mature Adulthood. The proposed age group classification model achieved 84.90% accuracy for the training images and 85.12% accuracy for the test images. The experimental results showed that CNN is capable of achieving competitive classification accuracy throughout two age groups in the AAF dataset with unbalanced data distribution.
SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed Mobile Applications
Fueled by the wide interest for achieving rich-storage services with the lowest possible cost, cloud computing has emerged into a highly desired service paradigm extending well beyond Virtualization technology. The next generation of mobile cloud services is now manipulated more and more sensitive data on VM-based distributed applications. Therefore, the need to secure sensitive data over mobile cloud computing is more evident than ever. However, despite the widespread release of several cloud simulators, controlling user’s access and protecting data exchanges in distributed mobile applications over the cloud is considered a major challenge. This paper introduces a new NetworkCloudSim extension named SecNetworkCloudSim, a secure mobile simulation tool which is deliberately designed to ensure the preservation of confidential access to data hosted on mobile device and distributed cloud’s servers. Through high-level mobile users’ requests, users connect to an underlying proxy which is considered an important layer in this new simulator, where users perform secure authentication access to cloud services, allocate their tasks in secure VM-based policy, manage automatically the data confidentiality among VMs and derive high efficiency and coverage rates. Most importantly, due to the secure nature of proxy, user’s distributed tasks can be executed without alterations on different underlying proxy’s security policies. We implement a scenario of follow-up healthcare distributed application using the new extension.
SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed Mobile Applications
Fueled by the wide interest for achieving rich-storage services with the lowest possible cost, cloud computing has emerged into a highly desired service paradigm extending well beyond Virtualization technology. The next generation of mobile cloud services is now manipulated more and more sensitive data on VM-based distributed applications. Therefore, the need to secure sensitive data over mobile cloud computing is more evident than ever. However, despite the widespread release of several cloud simulators, controlling user's access and protecting data exchanges in distributed mobile applications over the cloud is considered a major challenge. This paper introduces a new NetworkCloudSim extension called SecNetworkCloudSim, a secure mobile simulation tool that is deliberately designed to ensure the preservation of confidential access to data hosted on the mobile device and distributed cloud's servers. Through high-level mobile users' requests, users connect to an underlying proxy, which is considered an important layer in this new simulator, where users perform secure authentication access to cloud services, allocate their tasks in secure VM-based policy, manage automatically the data confidentiality among VMs and derive high efficiency and coverage rates. Most importantly, due to the secure nature of proxy, user's distributed tasks can be executed without alterations on different underlying proxy's security policies. We implement a scenario of follow-up healthcare distributed application using the new extension
ACCESS CONTROL LIST CONFIGURATION TO BLOCK ANTI CENSORSHIP SOFTWARE IN HIGHER EDUCATION INSTITUTIONS IN MALAYSIA
Anti-censorship software was originally developed to fight internet censorship in China. A anti-censorship software such as UltraSurf, Freegate, Gpass, GTunnel and FirePhoenix became popular with stubborn users who used the Internet for their own purposes and disobeyed the organization’s policies. Statistics show that Facebook, and YouTube are ranked as the most popular websites used by college students in Malaysia. Since they are widely used by users in the local area network to bypass firewall policies, they have become a threat to the LAN organization. Hence, it causes a problem for network administrators who manage internet utilisation and enforce internet policies. For an organisation, uncontrolled internet usage leads the open system to be vulnerably to viruses, backdoor, non-productivity activities and slow internet connections. Thus, this study proposes a strategy to filter and block traffic created by anti-censorship software in LAN. The method used in this project is the “design computer security experiment”. Therefore, this project will guide the network administrator to control internet utilisation, protect the organisation’s LAN and carry out the implementation of the internal organization’s internet policies. As a result, this paper has proposed a strategy to block the UltraSurf anti-censorship software. The proposed strategy was tested in several public and private higher education institutions.  
Research gaps based virtualization in mobile cloud computing
Recently, mobile computing is known as a fast-growing utilization of people's daily life. However, the main is the limited mobile devices’ resources such as processing capability, storage space and battery life. With the development of cloud computing, mobile devices’ resources are improved with the help of cloud services, which resulted an emerged technology named Mobile Cloud Computing (MCC). Although the MCC has several advantages for mobile users, it is also challenged by many critical issues like security and privacy of the mobile user's data that offloaded on the cloud’ servers and processed on the virtual machines (VMs). In virtualization, various investigations showed that malicious users are able to break down the cloud security methods by spreading their VMs in order to alter or violate the user sensitive data that executed on cloud’ VMs. This paper deeply analyzes the recent MCC based virtualization approaches and methods by criticizing them. We found out that no approach protects the data from being stolen while distributed VMs that deployed on different cloud servers exchanging data. Hence, the paper provides practical gaps related to virtualization in MCC and future perspectives.