
Abdul azim abdul ghaniUniversiti Putra Malaysia | UPM · Department of Software Engineering and Information Systems
Abdul azim abdul ghani
PhD
About
210
Publications
132,308
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,866
Citations
Introduction
Additional affiliations
May 1985 - present
Publications
Publications (210)
The manoeuvrability of single-propeller vessels is essential in maritime activities, especially in narrow waterways. The "wheel over point," a crucial characteristic for manoeuvring, guarantees secure and effective navigation. This study examines the theoretical and practical ramifications of the subject, with a focus on contemporary technological...
This paper is an initial review of literature, investigating qualitative research, to show its relevance in information system disciplines. Qualitative research involves the use of qualitative data, such as interviews, documents, and participant observation data, to understand and explain social phenomena. Qualitative research can be found in many...
This paper presents a Web-based Conference Management System framework that is intended to support multiple conferences and facilitate the conference management starting from the conference preparation until the attendance tracking process during conference day. The framework derived from the analysis of several web-based related applications. The...
The difficulty of defining and capitalizing the knowledge in an organization from the business data captured in text files. These text files defined as unstructured document that is without a specific format example, plain text. Hence, this paper presents an Interrogative Knowledge Identification framework to identify unstructured documents that en...
Angelman syndrome (AS) is one of the common genetic disorders that could emerge either from a 15q11–q13 deletion or paternal uniparental disomy (UPD) or imprinting or UBE3A mutations. AS comes with various behavioral and phenotypic variability, but the acquisition of subjects for experiment and automating the landmarking process to characterize fac...
An intrusion detection system (IDS) is an active research topic and is regarded as one of the important applications of machine learning. An IDS is a classifier that predicts the class of input records associated with certain types of attacks. In this article, we present a review of IDSs from the perspective of machine learning. We present the thre...
Increasing demand for open-source software (OSS) has raised the value of efficient selection in terms of quality; usability is an essential quality factor that significantly affects system acceptability and sustainability. Most large and complex software packages partitioned across multiple portals and involve many users — each with their role in t...
Although customization plays a significant role in the provision of software as a service (SaaS), delivering a customizable SaaS application that reflects the tenant’s specific requirements with acceptable level of quality is a challenge. Drawing on a pr-developed software customization model for SaaS quality, two fundamental objectives of this stu...
Context
A plethora of models are available for open-source software (OSS) usability evaluation. However, these models lack consensus between scholars as well as standard bodies on a specific set of usability evaluation criteria. Retaining irrelevant criteria and omitting essential ones will mislead the direction of the usability evaluation.
Object...
Component-based software system (CBSS) must be designed and implemented not only to meet the current customers’ requirements, but also to be receptive to future changes. Therefore, most often, one or more components of the system may need to be changed. Usually, designers do not exactly know what the future state looks like. The need for change con...
Data fusion is a fundamental research topic especially in the Internet of Things (IoT). A massive quantity of data is increasingly being generated by heterogeneous sensors which make data integration more difficult. A noticeable body of research has attempted to mitigate the incompatibility between the collected data to facilitate meaningful data i...
Despite the benefits of standardization, the customization of Software as a Service (SaaS) application is also essential because of the many unique requirements of customers. This study, therefore, focuses on the development of a valid and reliable software customization model for SaaS quality that consists of (1) generic software customization typ...
The composition mechanisms and interactions of current component models are mostly base on port or function calls from other components. However, in both styles, the number of interactions that depend on the number of ports and method calls may increase dramatically. Hence, to avoid such complexity of composing components and coordination of the in...
Existing stream data learning models with limited labeling have many limitations, most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data, which is called concept drift. Hence, the algorithm must overcome the problem of dynamic update in the internal parameters or countering the concept drift. Howe...
One of the most pertinent applications of image analysis is face recognition and one of the most common genetic disorders is Down syndrome (DS), which is caused by chromosome abnormalities in humans. It is currently a challenge in computer vision in the domain of DS face recognition to build an automated system that equals the human ability to reco...
Background:
Landmark-based approaches of two- or three-dimensional coordinates are the most widely used in geometric morphometrics (GM). As human face hosts the organs that act as the central interface for identification, more landmarks are needed to characterize biological shape variation. Because the use of few anatomical landmarks may not be su...
Background
The application of three-dimensional scan models offers a useful resource for studying craniofacial variation. The complex mathematical analysis for facial point acquisition in three-dimensional models has made many craniofacial assessments laborious.
Method
This study investigates three-dimensional (3D) soft-tissue craniofacial variati...
Sexual dimorphism in Homo-sapiens is a phenomenon of a direct product of evolution by natural selection where evolutionary forces acted separately on the sexes which brought about the differences in appearance between male and female such as in shape and size. Advances in morphometrics have skyrocketed the rate of research on sex differences in hum...
Over the years, neuroscientists and psychophysicists have been asking whether data acquisition for facial analysis should be performed holistically or with local feature analysis. This has led to various advanced methods of face recognition being proposed, and especially techniques using facial landmarks. The current facial landmark methods in 3D i...
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. Second approach...
Background:
Expression in H-sapiens plays a remarkable role when it comes to social communication. The identification of this expression by human beings is relatively easy and accurate. However, achieving the same result in 3D by machine remains a challenge in computer vision. This is due to the current challenges facing facial data acquisition in...
Test case prioritization (TCP) is a software testing technique that finds an ideal ordering of test cases for regression testing, so that testers can obtain the maximum benefit of their test suite, even if the testing process is stop at some arbitrary point. The recent trend of software development uses OO paradigm. This paper proposed a cost-cogni...
SQL injection vulnerabilities have been predominant on database-driven web applications since almost one decade. Exploiting such vulnerabilities enables attackers to gain unauthorized access to the back-end databases by altering the original SQL statements through manipulating user input. Testing web applications for identifying SQL injection vulne...
This paper proposes a usability measurement forevaluating mobile applications. The measurement incorporates usability viewpoint of both, usability specialist and non-usability expert. The resulting usability measurements were validated through a survey of 113 industrial practitioners in Malaysia. Cronbach alpha of .952 reveals that the survey respo...
In software engineering, formal methods allow the design,
modelling and verification of hardware and software systems.
Formal methods introduce preciseness, remove ambiguity in
specifications, and support the verification of requirements
and design properties. Methods and approaches are needed to
manage the formal models and handle their complexity...
Due to the benefits of networks coexistence, it is common nowadays to equip mobile phones with two types of network interfaces: LTE and 802.11ac. However, using the same 5GHz bandwidth by 802.11ac and LTE in unlicensed spectrum, along with the structural differences of the two networks, result in multiple coexistence limitations and implementation...
Software as a Service (SaaS) is widely used and depended on by a wide range of applications. Considering this, the SaaS should capacitate itself to offer service to a large number of customers having their own specific requirements, without encountering software quality problems. Therefore, several researchers delved into the SaaS customization, an...
The increase in the number of open source software (OSS) users have drawn attention to improving usability. Usability is a clear concept that encompassing both task and user characteristics as well as functionality. Usability is an essential factor that affects user acceptance and OSS sustainability which is considered the key to the success of OSS...
Software needs to deliver acceptable levels of quality, whilst meeting the functional demands of users. This need is gaining more consideration in Enterprise Resource Planning (ERP) and multi-tenant software. This study investigated the effect of software customization on external quality attributes via four pertinent primary studies, which were su...
In response to the growing demand for higher quality Voice over IP (VoIP) communication, there are multiple high-speed access links, including Wi-Fi and Long Term Evolution (LTE) for the mobile end-users. The combination of the access links provides a hybrid network environment in which the end-users can switch from one to another, whichever provid...
Students with dyslexia are described as regularly having difficulty in language processing skills such as phonology, spelling, reading, and/ or writing. This difficulty is not only affecting their learning but may reflect their engagement behaviour in class. As an intervention, traditionally teacher will assess the student and assign them to a desi...
One of the crucial factors that can influence user preferences of software is usability. It assesses the extent of which software able to facilitate user and use the software easily and effectively. Typically, usability requirements are specified at the design stage of software development due to its characteristic that is subjective in nature an...
Cognitive-Behaviour Intervention (CBI) is designed as a suitable intervention for students by identifying cognitive as well as behaviour conditions. Through CBI, the students' learning goals are easier to establish, and the skills related to particular conditions can be developed. Current dyslexia’s learning interventions were mostly developed to...
As a reliable protocol, TCP protocol configuration requires many parameters to be set before the actual packet transmissions happen. However, the TCP parameters need to be changed from the initial fixed default values to suit the network requirements since it is utilized on many dissimilar mobile networks, including the LTE cellular and the 802.11a...
GA-based regression test prioritization have ordered test cases by computing fitness value based on the number of affected faults in the coverage information, but most of the researchers use the same severity of faults even if a fault was executed by the previous test case. There have been very little evaluations of the GA-based regression test pri...
Reverse Engineering is the process of revealing hidden code from class file. It converts garbage to readable English text. The main purpose of Reverse Engineering is to uncover the hidden code when the documentation is poor, missing source file, and developer is no longer available to provide the original code source file. Hacker uses Reverse Engin...
Regression testing performed to provide confidence on the newly or updated software system is a resource consuming process. To ease this process, various techniques are developed. One such technique, test case prioritization, orders test cases with respect to the goals such that the most important test case in achieving those goals is scheduled ear...
The key feature of SaaS application is that it addresses the needs of many different customers using only one software, rather than multiple developments and versions, a concept known as multi-tenancy. However, it typically results in a one-size-fits-all approach and the application only fulfills the requirements that are generic to all tenants. Th...
Software as a Service has become a common model for various business applications. Increasingly, software application development companies have followed this model in delivering their software to their customers. SaaS delivery model is a multi-tenant model which reduces operational cost by increasing the resource sharing of one instance of applica...
The load-based features of the traffic particularly in resource-limited wireless systems, including LTE and 802.11ac, are among the primary factors that any changes in their values can directly affect the efficiency of the networks. Keeping in mind the fact that proper selection of the parameters is very crucial for performance optimisation of the...
Graph-based representations of programs such as control flow graph or dependence graph have been used to support program analysis tasks such as program comprehension and software maintenance. However, in the case of Aspect-Oriented Programming (AOP), such graph representations individually is not enough to represent the features of aspect-oriented...
The motivation of this paper is that the measurement based on the flow of information connecting software components can be used to evaluate component-based software system dependency. The ability to measure system dependency implies the capability to locate weakness in the system design and to determine the level of software quality. In this paper...
Student engagement is one of the most important elements in a likelihood of school failure or dropout. Therefore, it is vital to measure the student engagement as quickly as possible and as often as possible to prevent it occurred in a prolonged situation. There a few ways to assess the engagement that includes self-reporting, teachers rating, inte...
In component-based development (CBD), composing components and controlling the interactions among them is not a trivial task. The composition and interaction styles in the current state-of-the-art component-based models mostly are port-to-port connection or method-call based. However, both styles confer complex patterns, since the number of interac...
UML-B is a graphical front-end formal modelling language of the formal method Event-B. UML-B models semantics are given by the corresponding generated Event-B. Identifying similarities between models has several benefits such as model comparison, integration and evolution. Several matching and comparison methods have been done in the context of mod...
Education barriers are synonym with people with dyslexia life experience. People with dyslexia encounter barriers such as in academic related areas, mistreated with negative reaction on their behaviour and limitation to acquire a suitable support to overcome the barriers. Therefore, this work focus on giving the support to help students with dyslex...
The major aim of artificial general intelligence’s (AGI) is to allow a machine to perform general intelligence tasks similar to human counterparts. Hypothetically, this general intelligence in a machine can be achieved by establishing cross-domain optimization and learning machine approaches. However, contemporary artificial intelligence (AI) capab...
In this paper, we provide a study of tangible interaction (TI) based on theories and related works for dyslexic children. The study is an attempt to investigate TI for dyslexic children in learning Malay language in Malaysia primary schools. TI has tremendous contribution in supporting dyslexic children to enhance their way of learning process. How...
The objective of this research is to provide public society and web developers with a higher level of awareness on web accessibility is- sues in Malaysian websites. The finding is extremely crucial to avoid discrimination among the disable community to use Information and Communication Technologies (ICT) in their daily lives. Accessibility evaluati...
Aspect-oriented programming (AOP) is a programmatic methodology to handle better modularized code by separating crosscutting concerns from the traditional abstraction boundaries. Automated testing, as one of the most demanding needs of the software development to reduce both human effort and costs, is a delicate issue in testing aspect-oriented pro...
In recent times, online game play has become a food for thought to concerned individuals, researchers and authorities of various countries due to its excessive and addictive usage. Although, various government have taken certain measures such as shutting down internet cafe at certain hours of the day, censoring the most brutal, offensive and aggres...
This study proposed a model for usability evaluation in view of smartphone characteristic, user interface design and context of use approach. A set of mobile related bibliographic has been reviewed. In addition, 3 usability features, 11 usability criteria and 33 UI elements have been identified. Finally, a set of 84 checklist items has resulted and...
The cost-efficiency with which customers are able to use remote software resources can be reduced by maximizing the number of customers capable of accessing each instance of an application, a concept known as the Software as a Service (SaaS) model. Further to incorporating the general requirements of cloud computing, it is essential that SaaS syste...
The cost-efficiency with which customers are able to use remote software resources can be reduced by maximizing the number of customers capable of accessing each instance of an application, a concept known as the Software as a Service (SaaS) model. Further to incorporating the general requirements of cloud computing, it is essential that SaaS syste...
Component-based software development (CBSD) is an alternative approach to constructing
software systems that offers numerous benefits, particularly in decreasing the complexity of system design.
However, deploying components into a system is a challenging and error-prone task. Model-checking is one
of the reliable methods to systematically analyze...
The cost-efficiency with which customers are able to use remote software resources can be reduced by maximizing the number of customers capable of accessing each instance of an application, a concept known as the Software as a Service (SaaS) model. Further to incorporating the general requirements of cloud computing, it is essential that SaaS syste...