N.A. Aziz

N.A. Aziz
International Islamic University Malaysia | iium · Department of Computer Sciences

BSc in CS, Univ of S. Carolina, USA; MSc in CS, UKM Malaysia; PhD Dept. of Artificial Intelligence, Univ of Edinburgh, UK

About

61
Publications
25,110
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
155
Citations

Publications

Publications (61)
Book
Full-text available
This book explains mKitchen IIUM students experience in the real journey of integrating food entrepreneurship with Budi Sejahtera. The students participated as a vendor in the Bazaar Ramadan organized by EDC IIUM. This one-month Bazaar Ramadan provides the students the real experience of food entrepreneurs. While preparing premium food for Bazaar R...
Book
Full-text available
Why do you need to have a copy of this book? This book explains mKitchen IIUM students’ journey in mKitchen by integrating food entrepreneurship with Budi Sejahtera. The students started the journey with in-class training on entrepreneurship, business plan development, digital marketing, and cash management. Then, the students had a cooking demonst...
Book
This book provides mKitchen training and development. The training starts with preparation of mKitchen training materials. The training and development includes call for participation, selection, and induction processes prior to actual training activities. The first phase of training is process phase, which is team building to create ta’awun among...
Book
Full-text available
This book narrates mKitchen in assisting flood victims. The first part of the book reflects the history and development of mKitchen. mKitchen sticks to its vision, mission and objectives. In any event, mKitchen must not deviate from its founding objectives. The second part of the book narrates the humanitarian mission of mKitchen through food distr...
Book
This book narrates budiman journey in Mahallah Kitchen. Budiman Mahallah Kitchen who are searching for adab (virtue), budi (kindness) and sejahtera (peace). By doing so, budiman and budiwati will have the capacity of bijak berbudi (wisdom in kindness), berani (brave) and bijaksana (full with wisdom). Budiman and budiwati with these attributes will...
Experiment Findings
This project narrates the journey of ta'awun (cooperative behaviour) at IIUM Mkitchen® project with Masjid Al-Syakirin Gombak (MASG). The main objective of the project is transform the mosque as a platform to provide free food, to up skill in foodpreneurship, to create new employment opportunities, to give empowerment and to nurture entrepreneurshi...
Technical Report
This report presents the brainstorming for the ideation process of mKitchen. After the brainstorming, the team mapped the filtered ideas into technical terms of mKitchen into digital technopreneurship and human computer interactions. It follows the convention of ideation with ontology, epistemology, and methodology stages. The introduction serves a...
Technical Report
This report presents the status of Mkitchen has reached its 9th month journey with more evidences and experience in regulatory, funding, networking and entrepreneurship. In advancing Mkitchen, it has to develop technical requirement, guideline, procedure and guidelines from participants, operations, entrepreneurship and compliance. The technical re...
Book
Buku ini membentangkan naratif dan pengalaman rintis projek usaha sama dengan masyarakat melalui kerjasama pintar atau ta’awun melalui projek mKitchen® UIAM. Rakan strategik projek ialah Masjid Al-Syakirin Gombak (MASG). Projek ini dilaksanakan kerana pihak mKitchen berasa bertanggungjawab dalam menyahut hasrat kerajaan dan badan Kesatuan Duni...
Book
Full-text available
This book narrates the journey of ta’awun (cooperative behaviour) at IIUM Mkitchen® project with Masjid Al-Syakirin Gombak (MASG). The main objective of the project is transform the mosque as a platform to provide free food, to up skill in foodpreneurship, to create new employment opportunities, to give empowerment and to nurture entrepreneurship (...
Article
Full-text available
This study presents a prediction model based on Logistic Growth Curve (LGC) to evaluate the effectiveness of Movement Control Order (MCO) on COVID-19 pandemic spread. The evaluation assesses and predicts the growth models. The estimated model is a forecast-based model that depends on partial data from the COVID-19 cases in Malaysia. The model is st...
Preprint
Full-text available
This study presents a prediction model based on Logistic Growth Curve to evaluate the effectiveness of Movement Control Order (MCO) on COVID-19 pandemic spread. The evaluation assesses and predicts the growth models. The estimated model is a forecast-based model that depended on partial data from the COVID-19 cases in Malaysia. The model is then st...
Article
Full-text available
The incessant destruction and harmful tendency of malware on mobile devices has made malware detection an indispensable continuous field of research. Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. In order to improve...
Chapter
The usefulness of mobile phones nowadays has gone beyond making calls and sending text messages. In fact, most of applications available on desktop computer are presently easily accessible on mobile devices, especially smartphone based on Androids, iOS, and Windows phone platforms. However, at the same time, malware is increasingly becoming pervasi...
Conference Paper
The advancement of Information and Communication Technology (ICT) offers positive and negative impacts in our daily life today. Criminals too leverage on sophisticated ICT in their modus operandi. Hence, digital evidences are abundant to be acquired and analysed as part of investigation, today. Two homegrown tools i.e. PenDua and Kloner are used fo...
Conference Paper
Full-text available
Programming is a difficult course and often the result of its assessment is not encouraging. Programming skill is very important to graduate in order to get job and to success in the industry. A careful assessment is required to help the student learning. It is proved that the assessment itself will improve the learning. The review showed to-date t...
Conference Paper
Full-text available
The emergence of outcome based education and the increase of number of student in higher education have posed a need of assisted competency based assessment. Most of the assisted assessment available are focusing on performance-based approach. A new hybrid approach has been developed via a combination of Natural Language Processing, Neural Net and...
Article
Full-text available
Technology in the animation industry has evolved significantly over the past decade. The tools to create animation are becoming more intuitive to use. Animators now spend more time on the artistic quality of their work than wasting time figuring out how to use the software that they rely on. However, one particular tool that is still unintuitive fo...
Conference Paper
Technology in the animation industry has evolved significantly over the past decade. The tools to create animation are becoming more intuitive to use. Animators now spend more time on the artistic quality of their work than wasting time figuring out how to use the software that they rely on. However, one particular tool that is still unintuitive fo...
Conference Paper
This paper describes an implementation of a Secure Coding learning package for Undergraduate students in the Kulliyyah of Information and Communication Technology (KICT) at the International Islamic University Malaysia. The learning package consists of three components which are SCALT, WebGoat and notes on several vulnerabilities in programming lan...
Conference Paper
Astrocytes, one type of glial cells, are considered to be an active partner to neurons in processing information of Central Nervous System (CNS). Therefore, studying the interaction between the astrocytes and neurons is important to create a novel model for Artificial Neuron-Glial Networks (ANGN). In this paper, a novel model for (ANGN) is proposed...
Conference Paper
Full-text available
The advancement of wireless technology and mobile devices have change our life tremendously. The number of smartphone users increases and majority people rely on it for communication and business related matters. While smartphones are used for positive aspects of our life, it is also used by criminals as medium for their modus operandi. Therefore,...
Chapter
The usefulness of mobile phones nowadays has gone beyond making calls and sending text messages. In fact, most of applications available on desktop computer are presently easily accessible on mobile devices, especially smartphone based on Androids, iOS, and Windows phone platforms. However, at the same time, malware is increasingly becoming pervasi...
Conference Paper
In this paper we propose simple recurrent network (SRN) and mathematical paradigm to model real time interaction of astrocyte in simplified spiking neural network (SRM0). Both Elman neural network and Jordan neural network are used in the proposed network. Elman neural network is connected to the synapse and Jordan neural network is connected to th...
Article
Detection of text in images plays an important role in many situations such as video retrieval, annotation, indexing, and content analysis. In information security to filter image spam, one main feature can be used is text contents in image. Extracting text features from image spam needs efficient text detection. Obfuscating techniques used by spam...
Article
Full-text available
The Functional Requirements for Bibliographic Records (FRBR) model is a conceptual entity-relationship model developed for better arrangement, collocation, and navigation in bibliographic databases. As such, a FRBRized library online catalog (OPAC) can improve the performance of OPAC as a retrieval tool. We explored the utility of FRBR framework fo...
Article
The Android operating system is gaining market share on smartphones and tablets due to its market openness and easier accessibility and operability. Therefore, it is increasingly targeted by malware. This research examines several attack vectors on an android smartphone. Techniques are presented for the analysis of such attack vectors in order to i...
Article
Full-text available
Teaching and learning Arabic language is not an easy task for non-native Arabic speakers. Computer Aided for Language Learning (CALL) has been used by many learning institutions to address this issue. Various teaching-learning techniques and features can be embedded in CALL to compliment the conventional method of language teaching and learning. Th...
Article
Several machine learning techniques based on supervised learning have been applied to classify malware. However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorith...
Conference Paper
The increased adoption of competency-based education has posed the need of an automated competency assessment. Most of the existing assisted assessment does not cater for competency assessment. The high percentage on the use of short free text answer as competency assessment shows that the need of the competency assisted assessment is urgent. This...
Article
In the existing approaches of Automatic Text Summarization (ATS) which uses the algebraic reduction method Non-negative Matrix Factorization (NMF), the approximation process is more concerned towards convergence and feature selection from the original text into W matrix is of less consideration. This obviously leads to linguistic noise which affect...
Article
Full-text available
Feature extraction is the promising issue to be addressed in algebraic based Automatic Text Summarization (ATS) methods. The most vital role of any ATS is the identification of most important sentences from the given text. This is possible only when the correct features of the sentences are identified properly. Hence this paper proposes a Condition...
Conference Paper
Full-text available
SQL Injection Attack (SQLIA) has made to the top of the OWASP, Top 10 Web Application Security Risks in 2013 and in 2010. The explosive use of web application with very little emphasis lay on securing it make this attack becoming more popular. Various methods have been discussed and proposed as countermeasure to the attack. Unfortunately, most of t...
Article
Full-text available
The present study is aimed at designing a formula for estimating the difficulty of reading Arabic texts. Flesch, Gunning Fox and Dale-Chall are some of the formulae that have been used for measuring English texts difficulty. Some of them have been automated making it easy for users to check the readability level of a particular text. A few scholars...
Conference Paper
Full-text available
Image spam continues to be one of cyber security problem today. Spammers used image spam as a technique to by-pass conventional email filters. Anti-Spammers used image classification as a method to detect images spam by extracting different features of the image. One of the important features used is color features. Several works used different col...
Conference Paper
Today, a growing, sophisticated technique called Fast-Flux Service Networks (FFSN) poses a major problem to Internet security. They are increasingly used in many illegal practices including money mule recruitment sites, distribution of malware downloads, illegal adult content, and other forms of Internet fraud. Essentially, FFSN were first used as...
Article
Full-text available
Today, a growing, sophisticated technique called Fast-Flux Service Networks (FFSN) poses a major problem to Internet security. They are increasingly used in many illegal practices including money mule recruitment sites, distribution of malware downloads, illegal adult content, and other forms of Internet fraud. Essentially, FFSN were first used as...
Conference Paper
The significance of Non-negative Matrix Factorization (NMF) in the field of automatic text summarization is rapidly increasing due to its interpretation and storage capabilities. Interpretation defines the ease at which the structure of high dimensional data can be understood. While, storage capability relates to the extent of data reduction proces...
Article
Assessing learner' answers is an important task and also require a lot of time. In many cases, exam papers comprise of questions that require learners to write at least one or two sentences to express their understanding. However, there are not many computer-based assessment tools able to cater the needs due to limitations in computerized marking t...
Article
ISO/IEC 27001 is an international standard that provides a set of requirements for an Information Security Management System (ISMS) implementation. A risk assessment exercise for an ISMS implementation requires human expertise with comprehensive understanding and considerable knowledge in information security. A common risk assessment exercise is b...
Chapter
Full-text available
Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide network continue to look for security control solutions...
Article
Full-text available
Assessment is the process of which the quality of the candidate achievements can be judged. Automated assessment tools can be useful assistants to human examiners. This paper discusses a work on an automated assessment tool that applied a node-link analysis technique. The tool is able to assess short sentences answers. It uses Part-of-speech as imp...
Article
Full-text available
This paper discusses on an initiative of developing a repository on multilingual language resources for minority languages of a campus community. The choice of language is based on a survey amongst IIUM international students about the status of their mother language's resources and usages in the digital world. As a starting point, multilingual dic...
Conference Paper
The demand of secure computing systems and its platform is crucial in today's networked and computing world. As the number of illegitimate users and applications increased, the systems vulnerabilities can be a treat to individuals and organizations. This paper highlights software vulnerabilities and approaches to address them. In addition to such a...
Conference Paper
Robots in a group can solve problems in fundamentally different ways than individuals while achieving higher levels of performance, however, programming and coordination of a group of robots poses big challenge. This paper addresses the problem of mobile robots executing complex group behaviors in an attempt to form collaborative group behavior of...
Chapter
Due to the advancement of information technology in line with the increasing number tools to the market pose challenges to those who are carrying out forensic investigations. The forensic experts finds very intricate to choose the right tools to its intended purpose. Most of these tools come with no such documentations due to their security reasons...
Article
Full-text available
Assessment is an important component of learning and it also noted that many examinations make heavily used of short answers. This assessment can be a tedious task. This research work proposed a technique that models the teacher's and learner's knowledge to evaluate short free text answer. It is based on a hybrid approach that combines natural lang...
Article
Assessment is an important component of learning and it also noted that many academic examination make heavy used of short answers. This assessment can be a tedious task. However, there are not many computer-based assessment tools due to limitations in computerized marking technology. Our research attempts to address this limitation by introducing...
Conference Paper
There have been many research works using the Electroencephalogram (EEG) to understand and analyze the functionality of the human brain. EEG has been widely used in many areas including the learning field. In school curricular, mathematical anxiety is considered as a common problem among students. Unregulated emotions may affect students' performan...
Conference Paper
There have been many research works using the Electroencephalogram (EEG) to understand and analyze the functionality of the brain in order to identify or detect brain disorder. The portability and affordability of the EEG equipment makes it a better choice in comparison with the functional magnetic resonance imaging (fMRI) system for analyzing brai...
Conference Paper
Full-text available
Assessment is an important component of learning and it also noted that many academic examination make heavy used of short answers. This assessment can be a tedious task. However, there are not many computer-based assessment tools due to limitations in computerized marking technology. Our research attempts to address this limitation by introducing...
Article
Assessing leaner’s answers is very time consuming for educators and limits them to be involved in other activities. In many cases, exam papers comprise of questions that require learners to write at least one or two sentences toe express their understanding. However, there are not many computer-based assessment tools due to limitations in computeri...
Conference Paper
Full-text available
Cognition or thinking involves mental activities or thought process. The complexness of thought process is represented by the complexness of textual information that consists of more distinct pieces of information. Textual information which is in the form of language and symbol are means in representing and communicating information, experiences an...
Conference Paper
This paper discusses on an English-Malay translation memory (TM) prototype system developed as a tool to translate English to Malay text by re-using pre-translated examples stored in the TM repositories. The architectural system design and structural model of the English-Malay TM using data flow diagrams (DFDs) are also described. We then shared th...
Article
Full-text available
A bilingual parallel corpora is an important resource in constructing an English – Malay Bilingual Knowledge Base that is heavily referred to in our English to Malay machine translation system. We present an approach that we applied at word level alignment from a bilingual parallel corpora to improve the translation quality of our English to Malay...

Network

Cited By

Projects

Projects (4)
Project
To analyze the dynamic behavior of Fast-Flux and to investigate the potential pattern and/or types of fluxing i.e. single-flux, double flux, NS-flux
Project
To reduce the problems associated with malicious applications on android devices