Abdullah Mohd ZinNational University of Malaysia | ukm · Faculty of Information Science and Technology
Abdullah Mohd Zin
PhD Computer Science University of Nottingham, UK
About
148
Publications
48,718
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
873
Citations
Additional affiliations
August 1983 - present
Publications
Publications (148)
Programming is a difficult subject that requires high analytical skills to comprehend students. Various strategies are introduced to improve difficulties in learning programming for students. This study examined four flipped classroom frameworks and was triangulated with the findings of document analysis from 44 articles related to flipped classroo...
To uncover the insight behind the data, a comprehensive analysis is needed. Exploratory Data Analysis (EDA) is one of practical data analysis that will guide how to reveal any hidden information in the data. By doing EDA, any pattern and issue in the data will be seen and eventually will lead the hypothesis. To do EDA, besides any basic statistic i...
The manufacturing sector indubitably holds great significance to the development of the global economy, whereby innovative methods have been brought forward to implement new technologies including robotics and automation in the sector. However, regardless of the robots' benefits to productivity and the effectiveness of management, the circumstances...
Modern organizations are facing increasing labor costs and a lack of human resource, which has encouraged them to invest in robots, particularly as robots do not demand raises and can work 24/7. They are able to perform tasks that humans are unable to, like working in challenging conditions and achieving feats with accuracy. This paper aims to iden...
Without a doubt, robotics has a crucial role to play in industrial firms, and in turn, in the overall economic development. Robotics and automation can hold the key to industrial companies' progress and as such, for the industry to be enhanced, new technologies have to be adopted for increased productivity. In effect, the adoption of new technologi...
The term "block" in Block-Based Software Development (BBSD) refers to a software component that has the characteristics of reusable, composition, customizable and configurable. Based on the principles of component-based software development and end-user development, the objective of BBSD is to allow non-programmer known as end-user to build a new a...
Computer Science students are expected to acquire good programming skills. Both students and instructors accept that learning programming for first-year college students is fairly difficult. To assist students to achieve this goal, instructors will have to adopt a suitable design for programming courses. This paper reports on the design of a Comput...
Computer programming requires skills in designing algorithms, understanding syntax, writing programs, as well as the ability to correct errors in order to produce good programs. These skills can be developed through much practice on a continuous basis. The students' proficiency in programming is measured by the number of exercises that can be solve...
Feature selection in network-level behavioural analysis studies is used to represent the network datasets of a monitored space. However, recent studies have shown that current behavioural analysis methods at the network-level have several issues. The reduction of millions of instances, disregarded parameters, removed similarities of most of the tra...
Anomaly-based network intrusion detection systems (A-NIDS) are an important and essential defence mechanism against network attacks. However, they generate a high volume of alarms that can be mixed with false-positive alarms, which poses a major challenge for these systems. Large amounts of false alarms prevent correct detection and make an immedia...
Computing technology is now moving from ubiquitous computing into advanced ubiquitous computing environment. An advanced ubiquitous environment is an extension of ubiquitous environment that improve connectivity between devices. This computing environment has five major characteristics, namely: large number of heterogeneous devices; new communicati...
Multi-touch technology has shown a rapid rise in popularity over the last few years, being implemented in many devices from interactive walls to interactive tables and from mobile phones to desktop monitors. It has provided users with an extremely intuitive means of interaction with electronic devices through gesture based self-sensing control. The...
Security of information systems is the basic need of the day. In the present world of information technology, survival of a business is possible only through e-commerce and web based applications. With the fast growing businesses and demand of the intelligent systems, security threats and security attacks have also enhanced. This paper discusses la...
Harmony search is an emerging meta-heuristic optimization algorithm that is inspired by musical improvisation processes, and it can solve various optimization problems. Membrane computing is a distributed and parallel model for solving hard optimization problems. First, we employed some previously proposed approaches to improve standard harmony sea...
This paper describes the development of Emulation Network Analyzer (ENA) for heterogeneous services in campus environment. The purpose of this paper is to inform this ENA able to plan and predict network performance. For this purpose, our ENA development is differ from others system such as application and hardware network analyzer. This study focu...
This paper describes the development of Emulation Network Analyzer (ENA) for heterogeneous services in campus environment. The purpose of this paper is to inform this ENA able to plan and predict network performance. For this purpose, our ENA development is differ from others system such as application and hardware network analyzer. This study focu...
Anomaly based intrusion detection system (AIDS) is considered to be a better option than signature based system since it does not require prior knowledge of attack signature before it can be used to detect an intrusion. However managing alarms generated by this system is more difficult than signature-based intrusion detection systems (S-IDSs). This...
A number of previous researchers have discussed the vulnerability of TPM to physical attack and have proposed a number of solutions to solve these issues. Investigation have shown a number of flaws that these solutions suffers from. Trusted Platform Module User Authentication Model (TPM-UAM) is a model that was proposed and evaluated to overcome ma...
This paper describes the development of Emulation Network Analyzer (ENA) for heterogeneous services in campus environment. The purpose of this paper is to inform this ENA able to plan and predict network performance. For this purpose, our ENA development is differ from others system such as application and hardware network analyzer. This study focu...
Information security presents a huge challenge for both individuals and organizations. The Trusted Computing Group (TCG) has introduced the Trusted Platform Module (TPM) as a solution to end-users to ensure their privacy and confidentiality. TPM ha s the role of being the root of trust for systems a nd users by providing protected storage that is a...
Pervasive and sustained cyber attacks against information systems continue to pose a potentially devastating impact. Security of information systems and the networks that connect them is becoming increasingly significant nowadays than before as the number of security incidents steadily climbs. The traditional ways of protection with firewall and en...
Securing digital images is becoming an important concern in today’s information security due to the extensive use of secure images that are either transmitted over a network or stored on disks. Image encryption is the most effective way to fulfil confidentiality and protect the privacy of images. Nevertheless, owing to the large size and complex st...
Membrane computing can represent the structures and behaviors of biological systems while considering their characteristics. This paper proposes a modeling framework for membrane computing in biological systems to provide guidelines when using and experimenting with membrane computing. The framework processes include the biological requirements and...
Block-based Programming approach is an software development approach that makes programming task easier by enabling end user programmers to develop applications by integrating software blocks. In order for block based programming approach to be successful, there is a need for a large number of blocks to be developed in various application domains....
The Block-Based Software Development (BBSD) is a software development approach that enables end users to develop applications by integrating blocks. In order for block based programming approach to be successful, there is a need for a large number of blocks to be developed in various application domains. The BBSD life cycle divided into two parts:...
End-user Programming for the web is currently of interest because Web 2.0 technologies have resulted in a vast array of tools available for mashup making. This paper presents a Systematic Literature Review of EUP for web mashups. Its objective is to outline a comprehensive review and synthesis of the literature related to EUP for web mashups. A Sys...
This study is concerned with the developing criteria
for grading the semantics of UML models. This is achieved by going
through literature and studying the current approaches for grading the
semantics of UML diagrams. This paper concerns wit the ability of
grading the semantics of UML models in the logic of formal
methods, where model checker or th...
Real-time encryption and decryption of digital images stored on end-user devices is a challenging task due to the inherent features of the images. Traditional software encryption applications generally suffered from the expense of user convenience, performance efficiency, and the level of security provided. To overcome these limitations, the concep...
Storytelling is a process of conveying events by words, images and sounds. It has been used in every culture as a means of entertainment, education or for instilling moral values. The power of stoiytelling is now being realized by computer science and software engineering community. It has been argued that storytelling will enable the actual requir...
Lattice Boltzmann Method (LBM) is a widely used method to simulate the computation of fluid dynamics. Its cost effectiveness and computing speed are some of the important reasons why it has become very popular in solving Computational Fluid Dynamics (CFD) applications. However, this method is not practical to be applied for large CFD problems in a...
Membrane computing is a theoretical model of computation that inspired from the structure and functioning of cells. Membrane computing models naturally have parallel structure. Most of the simulations of membrane computing have been done in a serial way on a machine with a central processing unit (CPU). This has neglected the advantage of paralleli...
Digital images are important information often contain high confidential and secret data need to be protected. Due to the growth in the adoption of multimedia technologies, many digital images are being stored on the end user devices. Nevertheless, most of the researches mainly focus on protecting these digital images through transmission and prote...
In recent years, there has been a vast interest in optimal usage of computing resources so that massive data can be processed with minimal cost. The need to use a pool of shared resources in a wide area network that provide elasticity, high capacity of computation and ability to store information on location-independent storages have led to the adv...
This paper presents a method to convert the deterministic, continuous representation of a biological system by ordinary differential equations into a non-deterministic, discrete membrane computation. The dynamics of the membrane computation is governed by rewrite rules operating at certain rates. That has the advantage of applying accurately to sma...
Communication breakdown between customer and developer is one of the issues that affect the software requirements elicitation process. There are various methods currently being used to address this issue, among which are support tools, models, and techniques. However, more often than not, both parties have to move towards a solution that can help t...
Membrane computing can abstract biological structures and behaviors, and formally represent them without disregarding their biological characteristics. However, there is the lack of a proper framework to model and verify biological systems with membrane computing that could act as a guideline for researchers in computational biology or systems biol...
Membrane computing is a field in computer science that is inspired from the structure and the processes of living cells and is being considered as an alternative in solving the limitations in conventional mathematical approaches by taking into consideration its essential features that are of interest for research in systems biology. Advancements in...
Context-aware applications are mobile applications that use settings to provide relevant information and services to users. Technology selection is the process of determining methods, techniques and tools that could fulfill the development requirements of a particular application. Currently, a number of technology selection methods have been propos...
Disaster is an old challenge to the human society, which is continuously presenting new threats to society and its way of life. Thus, it is important for us to find ways to help mitigate these threats and to provide the society with better solutions to cope with disaster. Over the past decades, disasters have also caused damaged to telecommunicatio...
Abstrak bstrak bstrak bstrak bstrak. Kertas ini membincangkan satu pendekatan bagi membangunkan satu peralatan pemarkahan esei secara automatik. Peralatan pemarkahan ini telah diimplementasi dan diintegrasikan ke dalam CMS (Coursework Management System), satu sistem pengurusan kerjakursus yang telah dibangunkan di Universiti Kebangsaan Malaysia. Ke...
This research presents an empirical study on the program comprehension and debugging processes of novice programmers. We provide empirical evidence that the increase exposure to a large number of quality code modification and adaptation in formal teaching is a viable technique for novices to learn program debugging but not for program comprehension...
Customized education is now being seriously considered for children with learning disability such as autism who have serious impairments with social, emotional and communication skills. One of the approaches for providing this type of education is by using highly personalized educational courseware. The aim of this study is to describe the design a...
The capability of membrane computing to deal with distributed and parallel computing models, allows it to characterize the structure and processes of biological systems. With this advantage, membrane computing provides an alternative modelling approach to conventional methods such as ordinary differential equations, primarily in preserving the disc...
Block Based Software Development is a software development approach that supports end-user software development. In this approach, end-users can develop applications by selecting, customizing and combining software blocks. In the current implementation, a block is developed by using the Java programming language and is packaged as a JAR file which...
This paper presents complete network analyzer development for heterogeneous services in a campus environment. The purpose of this study is to define the accuracy of network analyzer development with independent data, real networks and OPNET simulation tools. The tests for network analyzer software are based on traffic and utilization performance. T...
Ligand-Receptor Networks of TGF-beta plays essential role in transmitting a wide range of extracellular signals that affect many cellular processes such as cell growth. However, the modeling of these networks with conventional approach such as ordinary differential equations has not taken into account, the spatial structure and stochastic behavior...
A mashup application is a web application that combines contents from several sources into an integrated web experience A mashup tool is a software tool to assist users in developing web mashup application. Most of these tools are developed by employing end-users development approaches such as scripting, wire, widget, spreadsheet, and Programming b...
The processes in biological systems evolve in discrete and nondeterministic ways. Simulation of conventional models such as ordinary differential equations with continuous and deterministic evolution strategy has disregarded those behaviors in biological systems. Membrane computing which has been applied in a nondeterministic and maximally parallel...
Most of the biological processes such as the processes in liver cell have been modeled by using the approach of ordinary differential equation. Such conventional model has demonstrated drawbacks and limitations primarily in preserving the stochastic and nondeterministic behaviors of biological processes by characterizing them as continuous and dete...
Story telling is a process of conveying events by words, images and sounds. It has been used in every culture as a means of entertainment, education or for instilling moral values. The power of story telling has now been realized by computer science and software engineering community. It has been argued that story telling will enable the actual req...
End-user programming is a term that refers to computer programming carried out by end users who do not necessarily have a background in writing programs in conventional programming languages. There is much interest amongst end-users to be able to write their own programs. In order to support end-user programming, the concept of Block Based Software...
E-commerce is a process of buying, selling, transferring or exchanging products or services via the Internet. It is expected that in the future, more and more business transactions will be carried out through e-commerce. The design of an e-commerce website plays a significant role in attracting potential customers to visit the site. It can also inf...
Membrane computing enriches the model of molecular computing by providing a spatial structure for molecular computation, inspired by the structure of living cell. The fundamental features that are used in this computing model are a membrane structure where objects evolve discretely according to specified evolution rules. The evolution rules are app...
The emerging of Web 2.0 and Web 3.0 technologies allows web users not only authoring and customizing web pages and their content but also integrating the contents of several web sites into one web page. This web integration is called web mashup. There are various End Users Programming development approaches in making mashup such as scripting, dataf...
Eliciting requirements for a system is an important activity in requirement engineering. This process involves communication
between customers and developers. Researchers have identified that poor communication is one of the most common problems in identifying
and defining customer’s requirements. Managing communication is challenging and difficult...
End-user programming refers to programming activities carried out by end users. These end-users can include teachers, accountants, scientists, engineers, parents and all other people who are not trained as programmers. End-user programming is now getting more popular. It was projected that the number of end-user programmers in the US is about 55 mi...
This study was carried out to determine the level of IT utilization in secondary schools in Malaysia. About 125 respondents (100 teachers and 25 administrators) from secondary schools have participated in this study. Two sets of questionnaires were distributed and statistical methods were used to analyze data. The result of the study shows that the...
E-commerce is a process of buying, selling, transferring or exchanging products or services using computer network. Small businesses are now encouraged to explore the use of e-commerce in order to expand their market. However, studies shows that the use of e-commerce among small businesses is still in the early stage. The main barrier to the e-comm...
Problem statement: Membrane computing formalism has provided better modeling capabilities for biological systems in comparison to conventional mathematical models. Model checking could be used to reason about the biological system in detail and with precision by verifying formally whether membrane computing model meets the properties of the system....
Problem statement: Most of the biological systems have been hierarchical in structure with processes interacting between different compartments. Membrane computing formalism has provided modeling capabilities in representing the structure of biological systems. Approach: This study was carried to investigate the modeling of a multi-compartment biol...
Problem statement: The evolution rules of membrane computing have been applied in a nondeterministic and maximally parallel way. In order to capture these characteristics, Gillespies algorithm has been used as simulation strategy of membrane computing in simulating biological systems. Approach: This study was carried to discuss the simulation stra...
This paper presents complete network analyzer development for heterogeneous services in a campus environment. The purpose of this study is to define the accuracy of network analyzer development with independent data, real networks and OPNET simulation tools. The tests for network analyzer software are based on traffic and utilization performance. T...
This paper presents a review of methods, practices, and analysis on performance and challenges of Project Management for ICT projects with regards to accommodating change. Specifically, the main interest of the review is to understand the impact that is brought by the dynamic environment of projects developed today. The dynamic environment is synon...
This paper presents a complete network analyzer development for heterogeneous services in campus environment. The purpose of this study is to define the accuracy of network analyzer development with independent data, real network and OPNET simulation tool. This network analyzer software will test on traffic and utilization generated by the several...
Problem statement: With the expansion of mobile devices, the usage of context-aware mobile applications is becoming very popular. Approach: One of mobile applications that are useful for university students is the university mobile organizer. University Mobile Organizer is a software that acts like an assistant for students in their universities’ a...
Problem statement: Understanding on computer program is a complex cognitive activity. It is ability and also a difficult task especially for novice programmer. The object-oriented languages has widely used in education and industry recently. In programming it is important to have such software which can aid programmers or students to code the progr...
Problem statement: Membrane computing has structural resemblance with the cell structure. This characteristic provides the versatility in the modeling of biological processes. Approach: This study was carried to discuss the membrane computing formalism in modeling biological processes by analyzing two examples: Photosynthesis in chloroplast and Sod...
Children with learning disability such as autism who have serious impairments with social, emotional, and communication skills require a high degree of personalization in using the educational software develop for them. The aim of this paper is to propose block-based software development method and approach that enables the end-users (such as paren...
With appearance of mobile devices such as cell phones, PDAs and smart phones, context-aware applications are becoming increasingly popular. Therefore, developers are always seeking for new and powerful developing tools for context-aware programming. Developers prefer to use fast and convenient development tools that can support all required possibi...
This paper presents a complete network analyzer development for network delay in campus environment. The purpose of this study is to define the accuracy of network analyzer development with independent data, real network and OPNET simulation tool. The network delay will measure based on transmission delay and propagation delay. This network analyze...
This paper presents architecture of software analyzer prototyping for heterogeneous services in campus environment and this software will undergo evaluation process using qualitative approach. For this research, focus groups are being used to develop survey instruments for measuring network administrator satisfaction with software network analyzer....
This paper presents the findings of a survey conducted with the aim of understanding factors that triggers chaos, pattern for chaos and its impact to the environment of ICT based project development. The survey is conducted using two-round Delphi method on a selected pool of experienced project managers who were involved in mega ICT project develop...
Requirements elicitation is a process of seeking, uncovering, acquiring and elaborating requirements for developing a computer-based system. These processes involve communication between customers and developers. Techniques of communication that are normally used includes verbal, written and interpersonal. According to previous researches, there ar...
We present a novel approach for the measurement and estimation of single and multiple links in heterogeneous network environment. We propose an enhanced equation to evaluate the performance of network link via Little Law and Queuing theories (M/M/1 and M/M/m) to improve the evaluation algorithm. To get accuracy results on the performance of traffic...
This paper presents a development of an Emulation Network Analyzer for heterogeneous services in campus environment. We propose a framework and implementation named ENA that models the network behavior of heterogeneous environment. The purpose of this paper is to inform potential tool of analyzing the network in campus environment by providing an o...
The purpose of this paper is to present and describe the representation of an object-oriented programming code in the program understanding system. The program’s representation that has been used and will be discussed is an Object-oriented Control Flow Graph (OO-CFG). OO-CFG was an added version on the notation of the traditional control flow graph...