
Nazirah Abd. HamidUniversiti Sultan Zainal Abidin | UniSZA | unisza · Faculty of Informatics and Computing
Nazirah Abd. Hamid
Bachelor of Information Technology (BIT) (UUM), Master of Computer Science (Information Security) (UTM)
About
18
Publications
13,073
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
44
Citations
Citations since 2017
Introduction
Publications
Publications (18)
—The recognition of printed Arabic words remains
an open area for research since Arabic is among the most
complex languages. Prior research has shown that few efforts
have been made to develop models of accurate Arabic
recognition, as most of these models have faced the increasing
complexity of the performance and lack of benchmark Arabic
datasets....
A Wireless Sensor Network (WSN) is a small device that has batteries and radios to connect to the internet. The main problem with WSNs is a limited energy source, energy studies needed to ensure that these sensor nodes can last longer, especially since a lot of energy is wasted during idle listening, overhearing, and data collision that occurs at t...
span lang="EN-US">Because of its ease of use and speed compared to other communication applications, email is the most commonly used communication application worldwide. However, a major drawback is its inability to detect whether mail content is either spam or ham. There is currently an increasing number of cases of stealing personal information o...
Numerous studies have shown that currently, role-based access control has becoming one of the successful access control model because of its principle that could simplifies the work of security administrators. However, to construct a concise, role-based access control system, a good role mining algorithm structure is needed therefore the objectives...
Role-based access control (RBAC) has been widely accepted by many organizations due to its security features. RBAC executes based on a role which includes set of permissions built in a matrix form. There are many studies investigated flexibility offered by RBAC. One of them is the ability to modify and reassigned user's roles according to the permi...
Authentication is a way to enable an individual to be uniquely identified usually based on passwords and personal identification number (PIN). The main problems of such authentication are they can be lost, forged, stolen or forgotten. Furthermore, physical biometric very much rely on special-purpose hardware devices to collect biometric data. In th...
Islamic education is crucial and deemed important for Muslims, especially among the younger age groups. This is to ensure that the Muslims are equipped with the rightful Islamic knowledge and principles in whatever endeavor they undertake. Virtual Umrah application was developed as an alternative tool to improve the teaching and learning process am...
In cloud computing, steganography can be employed as one of the solutions that is mainly used to protect transmitted data from any security breaches. Most of the existing steganography algorithms cannot embed a high capacity of secret message. The aim of this study is to show that the proposed algorithm can embed a high capacity of secret message w...
Virtual reality is a technology that enables the user to experience something that similar to the real world but it still has not been well adopted in Hajj or Umrah applications. The existing applications still rely on conventional method such as plain text that lacks of the capability to visualize the concept of Umrah and eventually lead to the mi...
With the emergence of the learning materials volume, the developer has to face many challenges to develop an effective and efficient application to support the learning process. The objective of this study is to evaluate usability of Virtual Umrah application based on expert views using User-Centered Design approach. User-Centered Design is a multi...
The objective of this study is to propose a new model for hiding text in an image. The proposed model use logical connective in propositional logic to calculate a new binary number of secret message. This model can produce a low computational complexity of steganography because of the simplicity of the proposed algorithm. Moreover, the using of sim...
This paper attempts to present insight of components in Virtual 'Umrah application. This interactive application consists of five components namely content, virtual reality (VR) technology, multimedia elements, user profile and usability evaluation. Virtual reality technique in this application enables to provide a realistic experience for the user...
A biometric system consists of pattern-recognition system that recognizes a person based on either physiological or behavioral characteristics. This system can be used either to identify or verify a user. In this paper, we proposed a behavioral biometric system that used random mouse movement to identify a user. We developed an application and test...
The use of wireless devices are flooding the network, thus giving rise to extensive data transmission. One of the main concerns is how to dictate the buffering of data so that throughput fairness can be achieved, specifically in the multihop wireless networks. The technique of buffering has to be based on the scheduling algorithms. Several studies...
A biometric system is a pattern-recognition system that
recognizes a person based on either physiological or behavioral
characteristics. This kind of system is used to provide access
control to some valuable assets. In this paper, we proposed a
behavioral biometric system that used random mouse movement
in identifying a user. We developed a pr...