Syed Zulkarnain Syed Idrus

Syed Zulkarnain Syed Idrus
  • Doctor of Philosophy
  • Professor (Associate) at University of Malaysia, Perlis

About

264
Publications
226,239
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,546
Citations
Introduction
SYED ZULKARNAIN SYED IDRUS is currently an Associate Professor of Computer Science at Universiti Malaysia Perlis (UniMAP). He pursued for his M.Sc. degree in the field of Computer Engineering and graduated in 2008 from the Universiti Malaysia Perlis (UniMAP), Perlis, Malaysia. Finally, he completed his Ph.D. degree in Computer Science and Applications at the Université de Caen Basse-Normandie (UniCAEN), Caen, France in 2015 specialising in computer security.
Current institution
University of Malaysia, Perlis
Current position
  • Professor (Associate)
Additional affiliations
September 2020 - present
University of Malaysia, Perlis
Position
  • Professor (Associate)
November 2019 - September 2020
University of Malaysia, Perlis
Position
  • Professor (Associate)
May 2013 - October 2019
University of Malaysia, Perlis
Position
  • Professor (Associate)
Education
September 2011 - February 2015
University of Caen Normandy
Field of study
  • Computer Science and Applications
September 2006 - August 2008
University of Malaysia, Perlis
Field of study
  • Computer Engineering
September 1997 - June 2001
University of Manchester Institute of Science and Technology
Field of study
  • Information Systems Engineering

Publications

Publications (264)
Article
Full-text available
Use of Information and Communication Technology to more efficiently deliver government services to citizens is known as e-government. This research investigated the factors that influence e-government adoption intention by Bangladeshi citizens. The study extended the basic UTAUT model to propose an e-government adoption conceptual framework. The pr...
Article
Full-text available
The electronic government service delivery or e-government is included in any government agenda world over. Bangladesh is no different. Under the ‘Digital Bangladesh’ drive, Bangladesh government has taken huge initiatives to improve the infrastructure supporting e-government services in the country. However, the engagement of the citizens of Bangl...
Article
Full-text available
In recent years, digital video courseware has emerged as an effective tool for enhancing learning experiences, particularly in Technical and Vocational Education and Training (TVET) programs. As technological advancements continue to reshape industries, there is an increasing demand for students to develop both digital competence and problem-solvin...
Article
Full-text available
The multi-form self-media technology has expanded the speed of media culture and the sharing of social information resources. The development of science and technology promotes the diversification of media communication, the rapid development of information and the deep integration of society has provided a new resource development. The phenomenon...
Article
Full-text available
Cybersecurity is fast becoming a crucial area of study due to the advancement of digital technology. As cybersecurity impacts all digital technology users, there is a pressing need for educating users on this issue. Moreover, the risk of falling victim to cyber threats is far more eminent in non-technical background users. Thus, this study focuses...
Book
This book explores how computer security can be improved by analyzing the unique way people type on a keyboard. It starts by explaining the history of this approach and how it has evolved over time. The book then dives into how combining typing patterns with personal details like education, culture, and gender can make security systems much more ac...
Article
Full-text available
Nowadays, it has become increasingly important for companies to effectively manage cybersecurity risks in emerging technologies. This article presents an overview of cybersecurity in these technologies. It sheds light on the obstacles that businesses encounter when dealing with these risks. The field of cybersecurity poses challenges that need to b...
Article
Full-text available
A home automation system is essential for promoting a safe and comfortable living environment and notable energy conservation for the user. However, the system’s favour had been obstructed by cost, power usage, inadequate security, complexity, and no emergency backup power. Current home automation systems with controllers were limited by their numb...
Chapter
Full-text available
When traditional Malaysian paddy farmers adopted the Internet of Things (IoT) in the area of Muda Agricultural Development Authority (MADA), it sparked a bioeconomy change. With regard to food security challenges around the world, researchers explored how precision farming can provide farmers with a means of improving and expanding rice production....
Chapter
Full-text available
In 2016, cryptocurrency was reported to be active in terms of user adoption. Generally speaking, making the correct forecast is essential in any field, but it is more important in cryptocurrencies. Researchers have studied machine learning algorithms with cryptocurrencies, a concept that has been recently presented and has a great future as a finan...
Conference Paper
Full-text available
This study gives a review of Extended Reality (XR)-based on education tools, with a focus on the new technology that has seen significant growth in the context of education during the Covid-19 pandemic. Comprehensive research on XR and its applications for the Covid-19 outbreak is conducted using keywords such as education, virtual reality, and Cov...
Conference Paper
Full-text available
This paper evaluates visual fatigue among students in a virtual semiconductor lab using HMDs - the HP Reverb G2 and Oculus Quest 2 - and the CVS-Q questionnaire. The study measures the frequency of visual fatigue symptoms (never, occasionally, or always) and aims to determine the effects of HMD usage on visual fatigue and eye strain, providing insi...
Conference Paper
Full-text available
The Virtual Reality (VR) Semiconductor Laboratory, a computer-based virtual lab designed for training engineering students in semiconductor concepts, was evaluated to enhance user experience (UX) in virtual environments. A sample of 97 participants, including undergraduate, Master's, and PhD students, participated in the study. The User Experience...
Conference Paper
Full-text available
Virtual Reality (VR) sickness, a common challenge among VR users, has increasingly gained attention in academic research due to its adverse side effects. The Simulator Sickness Questionnaire (SSQ) has been traditionally employed to measure simulator motion sickness; however, the extent to which it measures symptoms specifically attributable to VR s...
Conference Paper
Full-text available
This research presents an enhanced version of the Technology Acceptance Model (TAM), which integrates usability and learning objectives to evaluate the effect of adopting virtual laboratories on student performance. Data from 97 participants, gathered via a survey, was used to examine the correlation between perceived usefulness (PU), perceived eas...
Conference Paper
Full-text available
Virtual reality (VR) technology has been increasingly adopted for creating engaging educational environments, such as virtual laboratories. This study evaluated the user experience of a virtual semiconductor laboratory environment, utilizing Reverb G2 HMD VR headsets, through a user experience questionnaire (UEQ-S) and a psychometric analysis of it...
Article
Full-text available
The use of extended reality (XR) technologies, namely Augmented Reality (AR), Virtual Reality (VR) and Mixed Reality(MR) in education, has attracted much attention in recent years. Since the middle of the 20th century, virtual reality (VR) has been a part of our lives. Today, technology has made virtual reality accessible to everyone. In the last t...
Article
Full-text available
During the global pandemic, we now live and work differently, forcing government decisionmakers to find innovative, new ways to learn and train that will still be feasible during the pandemic. As we move slowly away from the Covid-19 shadow, upskilling and reskilling students are crucial for learning and professional development. Consequently, the...
Article
Full-text available
Technology plays a vital role in the social, political, and economic empowerment of marginalized communities, particularly women. The most important role in this process of women's emancipation is played by information and communication technology (ICT), as lack of access to information directly affects women's subordination. The current study inte...
Article
Full-text available
Extended Reality (XR) technologies can play a significant role in proving huge value to education following the changed circumstances universities faced during pandemic. This study presents Virtual Reality (VR) as a means of enhancing learning in education and training field during outbreak. This paper represents the use of XR technologies in a wid...
Article
Full-text available
Nowadays technology development in real life will reflect on education inexorably. Today, the concept of Extended Reality (XR) technologies (XRs), such as virtual reality (VR), augmented reality (AR), and mixed reality (MR), as very promising technological tools for education. The purpose of these technologies is to facilitate human life. In this c...
Article
Full-text available
Today, learning environments (LEs) are proceeding towards virtual environments (VEs) in which a sense of reality can be presented in three dimensions (3D) and a sense of inclusion can be experienced. A virtual learning environment (VLE) can be presented in a more realistic and visual manner with the use of innovative technologies such as virtual re...
Conference Paper
Full-text available
Due to the possibilities provided by such technologies to provide people with live immersive virtual worlds, Extended Reality (XR) technologies such as virtual (VR), augmented (AR), and mixed reality (MR) have grown. The role of XR has a highly effective and efficient technology in virtual laboratories (VL) as experiments can be performed almost an...
Article
Full-text available
Over the last 50 years, worldwide education has grown remarkably at all levels. Historically, these expanded education systems have never faced a greater challenge than COVID-19. The governments have forced the university to switch to online learning and virtual education overnights. As a result of COVID-19's disruptions to learning trajectories, i...
Conference Paper
It is fairly obvious that we live in a toxic world and our brains are poisoned continuously, and this constant low level of exposure over time is slowly damaging our neurons and brain cells. The worse news is that this harmful toxic environment is not going to stop anytime in the foreseeable future and environmental toxins are a leading cause of ne...
Article
Full-text available
There is concerned that the students' knowledge and skills are not par as those who experience normal education before COVID-19 pandemic. Digital parents ought to participate in their children's new normal learning method because the students cannot have proper face-to-face education with their teachers and lecturers except online Teaching and Lear...
Article
Full-text available
laboratories are essential to the education process in all fields of engineering, technology has changed the scientific laboratory landscape. The role of using Extended Reality (XR) technology after the COVID-19 pandemic is unprecedented, the virus had affecting almost all countries concurrently, resulting in an economic crisis, the education secto...
Article
Full-text available
This project implemented the role of 5G technologies for vehicle application. 5G connectivity will give added value to a vehicle, to be able to connect to the networks and also talk to each other without any interference in very low latency. Implementing such kind of this technology will leverage disruptive new applications that will allow to impro...
Article
Full-text available
In most sports today, the decisions taken by referees are supported by the use of electronic technology. The detection and monitoring system of the woodball lines serves the same function, helping the referee to take decisions and modernise woodball sports. The modern sport of wood balls depends entirely on out decisions. The line detection technol...
Article
Full-text available
High blood pressure or hypertension is a global public health issue. High blood pressure can lead to cardiovascular disease, stroke, diabetes and others. The diet problem of high blood pressure patients has always been concerned by the field of operational research. Some previous and recent research have proposed that diet plays an important role i...
Article
Full-text available
Forecasting is an approach that has been used widely for ages. However, forecasting stock market price is a challenging task to be completed as the data fluctuates rapidly along the time and can be influenced by a variety of factors. Hence, this study aims to forecast the stock market price of gold, silver, crude oil and platinum by using Double Ex...
Article
Full-text available
Digital marketplace provides a convenient place for farmers to market farm’s products sales anywhere anytime. If this platform is fully utilized by farmers, it can improve the sustainability of farmers in agriculture industry because it can improve sales volume and fair price for farmers and consumers. However, the current AgroBazaar Online has a f...
Article
Full-text available
Automotive collision avoidance system is a system that avoid collision when danger occur. It is also very helpful in order to alert the drivers and passengers. The system also reacts to danger automatically, faster, and more efficient. The system is implemented on a remote control car. The remote control car can automatically brake when the differe...
Article
Full-text available
Detection of blood vessel plays an important stage in different medical areas, such as ophthalmology, oncology, neurosurgery and laryngology. The significance of the vessel analysis was helped by the continuous overview in clinical studies of new medical technologies intended for improving the visualization of vessels. In this paper, a new blood ve...
Article
Full-text available
This paper deals with optical code division multiple access (optical-CDMA) and provides a general analysis of multi-mode fiber (MMF). The purpose of this work is to classify the works in the literature that are related to Optical-CDMA based on MMF and to find the limitation of the researches done in this field. Several challenges that occur in the...
Article
Full-text available
Biometric is used as a main security fence in a computer system. The unique characteristics of a person can be distinguished from each other. Human’s biometrics can be categorized into three types: morphological, biological and behavioural. Morphological biometrics uses physical features for recognition. Biological biometrics used to identify user...
Article
Full-text available
Various optical communication technologies use Optical-Code Division Multiple Access (Optical-CDMA) as a channel access technique, which allows transmission of different users simultaneously over the optical communication channel. Therefore, Optical-CDMA permits free undue interference transmission of several users. Whereas Wavelength-division mult...
Article
Full-text available
The optical vortex has recently attracted scholars to implement it in optical tweezers, microscopy, optical communications, quantum information processing, optical trapping, and laser machining. Optical vortex beam applied classically that can be transferred to the transverse amplitude of a heralded single-photon, and optical vortex possesses a hel...
Article
Full-text available
This study demonstrates the implementation of multi-input-multi-output (MIMO) transmission donut modes in space wavelength division multiplexing (SWDM) over multi-mode optical fiber (MMOF) and simulating the effect of mode coupling of the transmitted signal. However, during the data transmitted over MMF by using SWDM an issue is encountered, which...
Article
Full-text available
For long haul coherent optical fiber communication systems, it is significant to precisely monitor the quality of transmission links and optical signals. The channel capacity beyond Shannon limit of Single-mode optical fiber (SMOF) is achieved with the help of Multi-mode optical fiber (MMOF), where the signal is multiplexed in different spatial mod...
Article
Full-text available
The housing affordability issue has seriously occurred in Kuala Lumpur recently as the property price increased significantly from time to time. Several factors may influence the decision making of the buyers. The factors were the interesting topic for this study which can assist the consumers to purchase a suitable residence in Kuala Lumpur. The A...
Article
Full-text available
This study focuses on quality in a view of usability on website for Down Syndrome Children (DSC). The website specially designed for children with Down Syndrome to gain benefit and to learn how easy to use the website. This study wants to know how easy of exist website which are focus on DSC and really easy to use with using usability principles: l...
Article
Full-text available
The housing affordability issue was bothered the B40 and M40 buyers where the income level of the buyers cannot afford the higher housing price in Kuala Lumpur. To understand the factors that contribute to the housing price can improve the planning for the buyers. The planning for purchasing the residential property should be construct by the buyer...
Article
Full-text available
Arm rehabilitation activities need to be monitored continuously in terms of analysis by experts within sufficient information to discover arm dysfunction and disorders such as stroke early. Although there are numerous previous researches about the home-based rehabilitation procedures and arm performance, some drawbacks still exist. For example, cur...
Article
Full-text available
The optical vortex has recently attracted scholars to implement it in optical tweezers, microscopy, optical communications, quantum information processing, optical trapping, and laser machining. Optical vortex beam applied classically that can be transferred to the transverse amplitude of a heralded single-photon, and optical vortex possesses a hel...
Article
Full-text available
Feistel algorithm is a design model from which many different block ciphers are derived. DES is just one example of a Feistel Cipher. A cryptographic system based on Feistel cipher structure uses the same algorithm for both encryption and decryption. In each round, the right half of the block, R, goes through unchanged. But the left half, L, goes t...
Article
Full-text available
Circular polarized microstrip antenna have been proposed to establish connection among distributed solar farms. The base station antenna of each solar farm permits more precise on the targeting the radio signal and usually is placed at the open area or at a height place so that the radio waves to be transmitted will not be interrupted. For this pap...
Conference Paper
Full-text available
Natural rubber (NR) price is easily affect by the long term and short term exchange rate of developments on supply and demand sides, as well as the effects of exchange rates. Due to the fact that monthly, quarterly, and annually data have underwent the smoothing technique, it may has missed out some of the important characteristics or information d...
Conference Paper
Full-text available
Crude oil price is strongly impacting the world economy. However, it is very fluctuated and difficult for investor to make decision. Hence, forecasting is one of the ways to minimizing risks arise from indecision on future. This paper will apply Support Vector Machine (SVM) and Artificial Neural Network (ANN) and a proposed hybrid model name Empiri...
Conference Paper
Full-text available
The UAV mapping has a huge potential for a number of sectors including construction, agriculture, mining, infrastructure inspection and real estate. The demand for high quality aerial data capture from UAVs or unmanned aerial vehicle (UAV) is growing fast and increase rapidly. In civil application, UAVs are used as an assisting tools for a large sc...
Article
Full-text available
At present, Cervical cancer is the second most common cancer among women around the world. This cancer develops in the cervix; which is the entrance to the uterus. Most of the time, hospital doctors are facing difficulties in identifying cancer cells because the nucleus is sometimes rather difficult to see with the naked eye. Normal cells nuclei ar...
Article
Full-text available
Diversification is a strategic method that investors use to optimize risk of portfolio. It is an opportunity by which investors move from micro-firm into macro-firm. The investors’ aim is to make an optimal choice that leads to minimization of risk and maximization of return, but the methods that lead to these objectives are not easily achieved. Th...
Article
Full-text available
With the future technology and architecture, the digital musical instruments have been designed into a pack of electronic hardware and software with no strings or animal skins for producing an instruments sound. One of the musical instruments with high interest to learn by a beginner is piano. To solve this problem, this research aimed to design an...
Article
Full-text available
Named Data Networking (NDN) has been repeatedly quoted in numerous past and existing literature reviews to have replaced Host Centric Networking (HCN) due to its ability to solve energy efficiency issues inherent in Multi-hop Wireless Ad-hoc Networks (WAHN). However, this claim is proven to be wholly unsubstantiated and is not justified by academic...
Article
Full-text available
A binary masking is often seen as a medium to enhance speech signal especially in hearing aid and speech recognition applications due to its simplicity and efficient approach for supervised source separation. High intelligibility could be obtained by applying the binary time-frequency masking to noisy speech signal. Since the issue of linear filter...
Article
Full-text available
Road accident is a major concern in automobile powered world and road safety. Most of the accidents are not attended or treated quickly due to the lack of best emergency facilities and late information of the accident to rescue team especially in rural area. This paper aims to design Smart Accident Notification and Tracker (SANAT) by using Arduino...
Article
Full-text available
Today, renewable energy systems are becoming the best way to generate electricity. Solar energy is one of the most attractive sources of renewable energy used for electrification. Harnessing solar energy needs a photovoltaic (PV) system that converts light energy from sunlight to direct electricity. Therefore, to evaluate its performance, real-time...
Article
Full-text available
Conventionally, the evaluation of cognitive and psychomotor ability performance is typically based on self-writing reports. However, such assessment was unable to measure the actual performance during the task execution. Furthermore, the performance results perceived by the instructor is mainly subjective. For an alternative solution, a new approac...
Article
Full-text available
The navigation system has been around for many years in terms of map and simple navigation control, and only recently has technology caught up in the idea of the interconnected world, allowing full assist of navigating from one point to another becomes reality. Recently, the architecture of the shopping stores is getting more and more complex and i...
Article
Full-text available
Brain is the most amazing thing that god create, without brain humans are just like living zombies. Brain generate electrical impulse that create brainwave. Therefore, from the brainwave there are four type of spectrum which are Delta, Theta, Alpha and Beta. Each spectrum has their own special meaning. For instance, there will be slight change in t...
Article
Full-text available
Diabetes is an affecting people disease nowadays. Over 246 million people worldwide with a majority of them being women had been affected by diabetes. According to the World Health Organization (WHO), by 2025, this number is expected to increase to over 380 million. The disease has been ranked as the fifth deadliest disease in United States with no...
Article
Full-text available
This paper will do a study about brain, electroencephalograph (EEG) and also brainwriting. There are four types of frequency bands produces by human brain like delta, alpha, beta and theta. Every bands have their own spectrum of frequency where it be used for analysing brain activities. Electroencephalogram (EEG) is a method to measure signal by st...
Article
Full-text available
This paper entails the incorporation of electronics in the sports of woodball. The decisions made by the referees in most sports nowadays are with the use of electronic technologies to assist them. For instance, the goal-line technology in football and the electronic line judge in tennis is some of the recent advances in electronic technologies tha...
Article
Full-text available
Metamaterial used widely nowadays to overcome the limitation of the natural material in manipulating the electromagnetic wave and radiation. Split-Ring Resonator (SRR) have been used widely as a design to manipulate the electromagnetic waves but none of them used for higher frequency such as light frequency. Therefore, the objective of this paper i...
Article
Full-text available
In this paper, critical illness patients are referred to breast cancer patients. This cancer is developed from the breast tissue. It is developed due to the erratic growth of cells of the breast tissue. In Malaysia, according to the statistics in 2017, one out of 20 individuals has the breast cancer in their life. In order to help the breast cancer...
Article
Full-text available
Computer security is a process that controls the entire information system, including network, system and hardware. Important information that must be controlled in a system is the data or information contained in a system. Various methods have been used to ensure that only users with legitimate access to data can use a system. Usernames and passwo...
Article
Full-text available
This study inspects the capability of LDAP in improving the performance of query operation in the trading service. Thus, an experiment is conducted to distinguish the performance result gained from a trading service which uses LDAP with a trading service that uses relational database as its backend storage. From the outcome of the experiment conduc...
Article
Full-text available
This paper presents a high gain of 2x1 circularly polarized rectangular microstrip array antenna for wide communication. This paper study the design and the simulation of the array antenna in terms of gain, return loss and the axial ratio. The 2×1 array antenna with dimension of 130 × 80 mm is proposed. The presented design is composed of two eleme...
Article
Full-text available
Phishing is an online identity theft that lure unsuspecting victims into phishing website that asks for their personal information such as financial credentials or online access. The most obvious phishing attacks use spam emails to lure victims into visiting its phishing website. The less obvious attack is when a phisher spoofes legitimate sites to...
Article
Full-text available
In this paper, the design of a metamaterial ultra-wideband (UWB) antenna with a goal towards application in microwave imaging systems for detecting unwanted cells in human tissue, such as in cases of breast cancer, heart failure and brain stroke detection is proposed. The metamaterial unit cell is constructed using circular split ring resonator (CS...
Conference Paper
Full-text available
To date, numerous methods have been developed in response to the EEG signal classification of post-stroke patients, among which feature extraction methods are of particular interest. This paper presents a new perspective on the visualisation of the EEG signal of different post-stroke patients in the image representation that can be used to assist i...
Article
Full-text available
In order to formalize and co-create the Industrial Revolution 4.0. Augmented Reality is indispensable to facilitate human life. As a result, the difficulty is experienced by the user to know the exact location. As such, these developed applications can greatly assist mobile application users in making it easier to decide where to use their smartpho...
Article
Full-text available
To provide a sustainable fiber-to-the-home (FTTH), several multiplexing techniques have been developed for this purpose. The correlation features are the main obstacle behind the network performance limitation, which imposes to a high level of multiple access interference. However, the development of multiplexing techniques helps to overcome these...

Network

Cited By