Hafiza Abas

Hafiza Abas
UTM Kuala Lumpur · Razak Faculty of Technology and Informatics

PhD

About

97
Publications
75,868
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
521
Citations
Citations since 2017
73 Research Items
483 Citations
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
Introduction
Ts. Dr. Hafiza Abas serves Universiti Teknologi Malaysia (UTM) as academic staff for twenty years. Today, she is a senior lecturer at the Razak Faculty of Technology and Informatics, UTM Kuala Lumpur. Hafiza Abas has a Ph.D. in Information Science from Universiti Kebangsaan Malaysia (UKM), MSc in Information Technology from Universiti Putra Malaysia (UPM) and BIT (Hons) in Information Technology from Universiti Utara Malaysia (UUM).
Additional affiliations
April 1998 - December 2020
UTM
Position
  • Lecturer
Description
  • Current Subjects: Research Methodology, Physical Security and Access Control, Pentest. Previous Subjects: Multimedia Application Development, Animation Graphic Design, Web

Publications

Publications (97)
Research
Full-text available
This paper discusses the issue in the banking context, where the equilibrium between banking protection risk management and the IoT security threats that any bank will face today must be decided. The recommended solution involves an IoT risk assessment mechanism that quantifies risks based on real threats and combines them with financial regulation...
Conference Paper
Full-text available
Children with Dyslexia are having language learning disorder and makes them difficult mastering the skill to read, spell and write. Although their cognitive capability is adequate, they faced difficulty in learning to read via conventional instruction approach. This paper presents a mobile application known as 'Dyslexia Baca' specifically developed...
Conference Paper
Full-text available
Penyampaian dan penyebaran dakwah melalui teknologi terkini adalah selaras dengan kehendak dan keperluan masyarakat. Apps merupakan salah satu teknologi yang boleh digunakan sebagai alat untuk penyebaran dakwah terutamanya kepada generasi Y dan generasi Z. Gen Y dan gen Z merupakan pengguna tegar kepada teknologi ini. Justeru, jika dakwah tidak dis...
Presentation
Full-text available
1.To develop the model for technology application in Al-Quran recitation evaluation Convert the conventional to technology assist approaches on Al-Quran recitation 2.Digital speech processing (DSP) techniques - automatically identify, classify and recognize the speech of Al-Quran recitation for the function of representation and corrective tasking...
Article
Waste management is one of the serious issues in maintaining the longevity of life. Managing waste in garbage bins not only requires a systematic garbage segregation policy but also a prevention and control mechanism for human behaviour. With the aid of the low-cost-budget Internet of Things (IoT) approach, managing garbage bins for municipal and t...
Article
Full-text available
At present, people in the countryside use a manual agricultural machine for harvesting. This contributes to global warming and agricultural safety problems as manual irrigation increases farmers' time on the farm. The use of manual machinery causes smoke during irrigation, which increases the heating of the earth's surface and thus reduces the gree...
Article
Mobile Assisted Language Learning (MALL) has become a popular topic recently due to the rapid development of mobile devices. The objective of this study is to revalidate game principles via MALL and to obtain consensus and expert opinions on the principles. The study employs the Fuzzy Delphi technique to collect responses from nine English Language...
Article
Full-text available
The healthcare industry has been transitioning from paper-based medical records to electronic health records (EHRs) in most healthcare facilities. However, the current EHR frameworks face challenges in secure data storage, credibility, and management. Interoperability and user control of personal data are also significant concerns in the healthcare...
Article
Full-text available
Mobile Assisted Language Learning (MALL) has become a popular topic recently due to the rapid development of mobile devices. The objective of this study is to revalidate game principles via MALL and to obtain consensus and expert opinions on the principles. The study employs the Fuzzy Delphi technique to collect responses from nine English Language...
Article
Full-text available
In this modern era, medical image sharing has become a routine activity within hospital information systems. Digital medical images have become valuable resources that aid health care systems’ decision-making and treatment procedures. A medical image consumes a significant amount of memory, and the size of medical images continues to grow as medica...
Chapter
Full-text available
The data from biomechanics sensors, together with more complete kinematic, kinetic, and electromyographic data that illuminate how the performance was accomplished [Fernandes et al. 2014], provide key performance outcomes. These devices would use wireless networks to provide reports to a gateway node about the condition of specific body organs. A m...
Book
Full-text available
Buku Teknologi Realiti Terimbuh: Konsep dan Aplikasi mengetengahkan pengetahuan berkaitan teknologi realiti terimbuh (AR) secara terperinci termasuk sejarah permulaan dan perbandingan dengan lain-lain persekitaran maya. Teknologi AR telah diadaptasi dalam semua semua bidang antaranya pendidikan, bahasa, perniagaan, hiburan, dan perubatan. Teknologi...
Article
Full-text available
A peer-to-peer (P2P) decentralized information-sharing network is used to share data and maintain security, privacy, and integrity standards called blockchain. In this case, information sharing and updating require regular simplification. The presented systematic review mainly focuses on the interoperability of electronic health records (EHRs) usin...
Article
Full-text available
A distributed ledger system blockchain proves to be worthy in the domain of healthcare due to its enormous applications and benefits. Peer-to-peer devolved transactions in an allocated way make the blockchain an efficient and modern tool to be utilized in healthcare as a solution to problems and challenges. The traditional healthcare system utilize...
Article
The overall study has been observed within the speech transformation of the Quranic recitation from the speech production to the measurable incorrectness of Al-Quran recitation pronunciations. The proposed methodology has used numerous techniques such as Mel Frequency Cepstral Coefficient (MFCC) features extraction, Gaussian Mix Model-Maximum Likel...
Article
The use of technological speech recognition systems with a variety of approaches and techniques has grown exponentially in varieties of human-machine interaction applications. The assessment for Qur'anic recitation errors based on syllables utterance is used to meet the Tajweed rules which generally consist of Harakaat (prolonging). The digital tra...
Conference Paper
The overall study has been observed within the speech transformation of the Quranic recitation from the speech production to the measurable incorrectness of Al-Quran recitation pronunciations. The proposed methodology has used numerous techniques such as Mel Frequency Cepstral Coefficient (MFCC) features extraction, Gaussian Mix Model-Maximum Likel...
Conference Paper
These days, Content Management Systems (CMS) have been the target for adversaries in the cyber world since they are mostly open-source like Drupal, Joomla and WordPress, where no experts want to address the vulnerabilities due to them having no price tags. This paper aims to review the available and proposed penetration testing approaches and...
Cover Page
Full-text available
Cendekiawan Islam dalam Bidang Sains & Teknologi ini mengandungi 10 bab yang membincangkan pencapaian besar para sarjana dan intelektual Islam serta cabaran yang dihadapi sebagai Tokoh Saintis Muslim. Secara amnya, buku ini mengupas dan mengetengahkan beberapa nama besar sarjana Islam mengikut zaman dalam pelbagai bidang seperti psikologi, sosiolog...
Article
Full-text available
This is a case study using an interactive digital game to teach grammar via Mobile Assisted Language Learning (MALL). The interactive game via MALL is aimed to ease TESL students' fear and trigger their interest in learning grammar. The game uses the Theory of Variation (Marton & Booth) to design the grammar exercises in the game. A survey question...
Article
Physical security and access control as one of the installations should be upgraded to confirm the security and readiness of the asset belong to the group to continue safely. As the quick development in technology offers a boundless defence level for physical security and access control in the office, every organization must offer a passable budget...
Article
Technology development never sleeps, humans creating more high-tech devices for society to use. Swift movement of technology growth has changed the conceptual design of the physical security control, location landscape, human behaviors factor, and perimeter controls are the factors to determine the security posture of the location. Hence, the rise...
Article
Full-text available
The adoption of eLearning in developing countries is rare when a comparison is made against the developed nations. Therefore, this study answered calls from numerous literature demanding for more research to investigate the adoption, usage, and application of eLearning systems and applications in Libyan higher education institutions (LHEIs) to cont...
Article
Two main reasons contributing to the lack of mastery in English grammar by students are their apprehension towards the subject and their difficulty in understanding tenses. To alleviate the fear and trigger learners' interest in learning grammar, an interactive digital board game was designed via MALL targeted at TESL students. This paper aims to e...
Article
Full-text available
Facing the global epidemic prevention and control situation, public information services are an important part of ensuring the smooth operation of the government and the normal life of citizens. Among them, Internet companies assume a significant part in assisting with uncovering epidemiological information, such as the “same journey query” platfor...
Presentation
aplikasi untuk epembelajaran haji dan umrah
Article
The Internet of Things (IoT) has become a prevalent technology in the IT industry. One of the industries that can benefit extensively in this technology is healthcare. However, the healthcare IoT is still under debate with several studies suggesting it is lack of interoperability, security, and too much complexity. Even more, the risk involved in d...
Conference Paper
Full-text available
Abstrak. Al-Quran merupakan kitab suci bagi umat Islam yang digunakan sebagai panduan. Panduan bukan sahaja diperolehi melalui membaca secara bersahaja tanpa memahami makna dan mengamalkan isinya malah perlu ditadabbur (direnung). Namun pengamalan membaca Al-Quran beserta tadabbur amat kurang dititikberatkan pada masyarakat. Negara kini dibelenggu...
Article
Full-text available
Convolutional Neural Network (CNN) models are a type of deep learning architecture introduced to achieve the correct classification of breast cancer. This paper has a two-fold purpose. The first aim is to investigate the various deep learning models in classifying breast cancer histopathology images. This study identified the most accurate models i...
Article
Full-text available
There are many researchers and data analyst in large companies around the world applied Machine Learning (ML) in the various study. ML is a subset of Artificial Intelligence (AI) which play a significant role in analyzing the big data. In general, the Supervised Machine Learning (SML), one type of ML, generates the desired output and makes a predic...
Research
Full-text available
Medical diagnostic imaging or commonly known as DICOM has been developed to meet the needs of manufacturers and users of medical imaging equipment for data interconnection between devices and modality (i.e. medical imaging) on standard networks. The medical data and image that is captured as DICOM data attributes, can be transmitted and processed b...
Article
Medical diagnostic imaging or commonly known as DICOM has been developed to meet the needs of manufacturers and users of medical imaging equipment for data interconnection between devices and modality (i.e. medical imaging) on standard networks. The medical data and image that is captured as DICOM data attributes, can be transmitted and processed b...
Article
The paper aims to identify conceptual framework for Internet of "Educational Things" (IoET) environment that facilitate students' reflective thinking. The framework is using theoretical model of Jigsaw-Based Cooperative Learning Model and Interaction Theory, Mezirow reflective thinking model, ADDIE model and usability model. With implementation of...
Article
Full-text available
Digital medical images have become a vital resource that supports decision-making and treatment procedures in healthcare facilities. The medical image consumes large sizes of memory, and the size keeps on growth due to the trend of medical image technology. The technology of telemedicine encourages the medical practitioner to share the medical imag...
Article
Full-text available
Blockchain technology is a private, secure, trustworthy, and transparent information exchange performed in a decentralised manner. In this case, the coordination and validation efforts are simplified as the records are designed to update regularly and there is no difference in the two databases. This review focuses on how the blockchain addresses s...
Article
Full-text available
There are many researchers and data analyst in large companies around the world applied Machine Learning (ML) in the various study. ML is a subset of Artificial Intelligence (AI) which play a significant role in analyzing the big data. In general, the Supervised Machine Learning (SML), one type of ML, generates the desired output and makes a predic...
Article
Full-text available
Disruptive technology, blockchain is propelling a technological intervention in healthcare due to its unique features and advantages. The healthcare industry is migrating to Health 4.0. Therefore, peer-to-peer (P2P) transactions in a decentralized and distributed manner makes blockchain more lucrative to serve the needs of the healthcare industry o...
Article
Full-text available
The use of the educational mobile app in teaching and learning is getting popular nowadays due to improvement in technology, better accessibility, users’ acceptance and affordances of mobile devices. This paper discusses the conceptual design of Economics mobile app for learning economics terminologies. The app is designed for ubiquitous self-learn...
Article
Full-text available
Mobile applications and devices have played a significant role in boosting global businesses that encompass various domains such as health, education, banking, and transportation. These tools have become indispensable for everyday activities, and its applications have been developing rapidly with diverse features and platforms. However, this has cr...
Article
Full-text available
The main objective of the research is to develop the correction-mapping model for Al-Quran recitation performance evaluation engine. Machine learning and Digital Signal Processing techniques are applied in representing and analyzing the recitation speech signal. Consequently, a form of recitation correction results is derived and formulated for the...
Article
Full-text available
According to the recent development in capabilities of smart mobile devices, their growing penetration rate among students, and the positive impacts of mobile apps on students' motivation and performance, it is possible to take advantage of these devices to design an app for learning Economics. The aim of this project is to develop the Economics mo...
Conference Paper
Full-text available
Mobile applications and devices play significant roles in boosting a global business, which encompasses various domain such as health, education, bank, transport, to mention a few. They become indispensable tools for everyday activities, thus these applications are developed in a very large quantity with a diverse features and platforms. This bring...
Article
Full-text available
The number of students enrolled in Science, Technology, Engineering and Mathematics (STEM) related programs at tertiary level of education and those in science stream at high schools show a declining trend in recent years. This phenomenon is happening globally since at least the past two decades. The nation is moving closer to its Vision 2020 deadl...
Article
Full-text available
The Internet of Things (IoT) brings together devices, sensors, data and the cloud. Unlike a computer or tablet, IoT systems can access specific hardware like lights, sensors and motors. This nurtures the production of various IoT platforms such as Arduino, Raspberry Pi and Microbit to help developers to build both fun and professional projects. Thi...
Article
Full-text available
Information system research methodology, Bahasa: Metodologi Penelitian Sistem Informasi (MPSI), is a mandatory course that must be attended by information system and management student at STMIK Pringsewu. MPSI learning must be conducted effectively to achieve the expected goal. The problem is how to determine MPSI learning effectiveness at STMIK Pr...
Article
Students' weaknesses in learning 3-Dimensional (3D) geometry are mostly associated with their low level of geometric thinking. Although a 3D software has been proposed as a manipulative learning tool, they had difficulties using it. Therefore, a suitable learning strategy should be designed to overcome the problems. The purpose of the study was to...
Article
Full-text available
Road users make vital decisions to safely maneuver their vehicles based on the road markers, which need to be correctly classified. The road markers classification is significantly important especially for the autonomous car technology. The current problems of extensive processing time and relatively lower average accuracy when classifying up to fi...
Article
Full-text available
The transformation of the whole traditional process of Al-Quran Recitation into automated system application could raise the issues of robustness and integrity of recitation and correction quality and acceptance. There are several existing variations especially involve of rhythm, tone and length of recitation for different speaker. Dynamic Time war...
Article
Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authentication and integrity of the data, including MD5...
Article
This study aimed to evaluate the effectiveness of online screencast video integration through the Quick Response code (QR code) as mobile learning (m-learning). In the flipped classroom, the QR code is distributed to the students to access the screencast video as a means of disseminating lecture notes through their mobile devices. A total of 19 in-...
Article
Full-text available
Although mobile phones have been used widely by millennial generation within the age group of 20-34 there is very limited knowledge about their intention to use mobile application. This paper presents descriptive results regarding factors influencing mobile application intention behavior among millennial based on the response of university students...
Article
Full-text available
Malaysian Government agencies are gradually enhancing their ICT infrastructure. The wireless network is one of the important elements in ICT infrastructure since it is famously known for the most vulnerable area of cyber-attacks. Planning a perfect access control and security protection for wireless network is one of the crucial task of network adm...
Presentation
Full-text available
Objektif kajian ini ialah untuk mengetahui reka bentuk apps yang digemari untuk gen Y dan gen Z.
Conference Paper
Full-text available
Apps is one of the latest technologies for dakwah. It is a valuable tool that supports the dakwah process with better personalization, ubiquitous environment and offers a faster service than web sites. The main objective of this research is to develop the model for technology application in the chosen Islam book (Al-Quran Kitab) recitation evaluati...
Book
Kandungan buku ini mengambil kira semua komponen dalam kurikulum mata pelajaran Bahasa Melayu bagi Tahap 1.Ia mengambil kira pendekatan pengajaran Bahasa Melayu sebagai bahasa pertama. Kurikulum ini adalah kurikulum perdana yang sepatutnya difahami oleh semua murid Tahap 1 selepas mereka menamatkan pelajaran di peringkat ini.Bahan dalam Lembaran Ke...
Article
Full-text available
The evolution of Internet of Things (IoT) becomes more prominent and obtrusive in human life. More gadgets are being connected to other gadgets and networks in gathering, collecting and sharing data and information with each other in real time or virtual existence. Nevertheless, security is experiencing more advanced challenges and issues regarding...
Conference Paper
Full-text available
A screencast is a digital video and audio recording of what occurs on a presenter's computer screen, and it can be used to create sophisticated, information-rich multimedia presentations. Previous research shows that the use of screencast as instructional media in the teaching and learning process is important, especially in learning the use of a s...
Article
Full-text available
The Master Data Management (MDM) empowers government agencies to consolidate and integrate multiple master data sources to a single source of truth. With MDM, the master data from different agencies that are valuable across agencies, applications and services will be identified and managed in a central repository as a high quality enterprise master...
Article
Full-text available
Learning English as a second language can be overwhelming for international students, especially when they are studying abroad and living in a foreign country. Some of the challenges include overcoming the anxiety to communicate with their peers and having assurance that they are being understood by others. The purpose of this phenomenological inqu...