Azman Yasin
Universiti Utara Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Azman Yasin.
Computer and Information Science | 2010
Huda Ibrahim; Azman Yasin; Zulkhairi Dahalin
Telecentres plays an important role in bridging digital divide in Malaysia. A study was conducted to identify the issues of financial sustainability on 132 telecentres in Malaysia. The study focused on TCs in four regions of Malaysia Peninsular (northern, central, southern and eastern). Questionnaires were sent to the telecentres’ operators. The results prove that financial support is critical in operating and maintaining the centers. The costs incurred in running telecentres involve the costs for promotion, staff, utilities, premise renting, and training. More than 75 percent of the telecentres are operating under tight cash budget. Recommendations are given to encourage telecentre’s financial sustainability in the future.
international conference on education technology and computer | 2010
Nur Sukinah Aziz; Mohd Nizam Saad; Abd. Hadi Abd. Razak; Azman Yasin
Nowadays there are handwriting recognition systems that can be occupied to assist children learning how to write properly. However, one of the major barriers that hinders them using the system is its complex user interface where the designed is based on adult preferences. Therefore in this paper, we present the guideline to redesign the user interfaces via our experience developing a handwriting recognition system for pre-school children named Handwriting-based Learning Number (HLN). The redesign process has followed eight guidelines and rules as presented by Schniederman. The user interface satisfaction evaluation result done using Questionnaire for User Interface Satisfaction (QUIS) is very convincing where the users are almost satisfied with the redesign process that we did to the user interface. Hence we found that the guidelines are very useful and developers are all welcome to follow it if they intend to do similar system like us.
international conference on advanced computer science applications and technologies | 2012
Ghassan N. Mohammed; Azman Yasin; Akram M. Zeki
The rapid evolution in data transmission by the wide use of the internet, as provided an urgent need to prevent penetration and maintain the confidentiality of this data through the applying of some techniques to hide data within the carrier for example, text, image, audio and Video. A variety of image watermarking techniques have been published in the last few years which attempts to develop techniques and methods which are used to obtain better results through the fact that the changes that took place after the concealment is visible to the human eye. Digital image watermarking is one of the general information hiding problem. This study is to highlight some of these studies and analysis for use in future research and development to get to the best results.
international conference on computer science and information technology | 2014
Ghassan N. Mohammed; Azman Yasin; Akram M. Zeki
The most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. The relationship between the two requirements is completely conflict. In this study, the method focuses on the robustness against chosen attacks for the watermarked image based on Dual Intermediate Significant Bit (DISB) model. This method requires embedding two bits into every pixel of the original image, while and the other six bits are changed so as to directly assimilate the original pixel. In the case, when the two hidden bits are equal or not equal to the original bits, there is a need to use mathematical equations to solve this problem which derived and applied in this study. The results show that the proposed model produces robustness watermarked images as compared to our previous method when focuses on the high quality of the watermarked image which proved that proposed method is better as compared with the Least Significant Bit (LSB) after embedding two bits. The best values investigated when the Peak Signal to Noise Ratio (PSNR) is equal or more than 30db, and finding the best Normalized Cross Correlation (NCC) to evaluate the image resistance against attacks. The best values investigated when the two embedded bits are k1=4 and k2=6.
international conference on it convergence and security, icitcs | 2013
Ghassan N. Mohammed; Azman Yasin; Akram M. Zeki
The impeccability (quality) represent as one of the most important requirements of any watermarking system of the watermarked gray scale image. In most studies, the watermarking algorithm has to embed the watermark so that this will not affect the quality of the host data. In this study, the method concentrates on the greatest quality of the watermarked image based on Dual Intermediate Significant Bit (DISB) model. The embedding process is done by using two keys k1 and k2 where k2 > k1. The extracting process has been done after applying some types of attacks. The experimental results show that the new method improves the quality.
soft computing | 2012
Wahab Musa; Ku Ruhana Ku-Mahamud; Azman Yasin
The objective of this research is to develop a long term energy demand forecasting model that used hybrid optimization. To accomplish this goal, a hybrid algorithm that combined a genetic algorithm and a local search algorithm method has been developed to overcome premature convergence. Model performances of hybrid algorithm were compared with former single algorithm model in estimating parameter values of an objective function to measure the goodness-of-fit between the observed data and simulated results. Averages error between two models was adopt to select the proper model for future projection of energy demand.
international conference on computer and information sciences | 2014
Azham Hussain; Norasyikin Abdul Mutalib; Azman Yasin
This study introduce a new method for learning Jawi for deaf children by adding some hand signs and named the method as jFakih. Since Fakih is a learning method for deaf children to read Quran, its also possible to be used in Jawi learning for deaf children. Fakih used number and colours to recognize the Arabic character and also the script. We also designed the reference model for jFakih for future development of mobile application. By using waterfall-agile hybrid method, we gathered the requirements and designed the model using UML technique. The model was validated through prototype development and some survey was implemented to get feedbacks from users.
ieee international conference on control system computing and engineering | 2014
Ghassan N. Mohammed; Azman Yasin; Akram M. Zeki
For any watermarking system, there are two important requirements which are quality and robustness. These two requirements are conflicts all the time, which means when increasing image quality the robustness will decreasing and vice versa. This study focuses on the robustness after applied chosen attacks for the watermarked image based on the existing technique Dual Intermediate Significant Bit (DISB). This method requires embedding two bits into every pixel of the original image, while and the other six bits are changed so as to directly assimilate the original pixel. In the case, when the two hidden bits are equal or not equal to the original bits, there is a need to use mathematical equations to solve this problem. Two measurements criteria used in this study to test image robustness, the first one is Normalized Cross Correlation (NCC) and Bit Error Ratio (BER). The results show that the proposed model produces robustness watermarked images as compared to our previous method when focuses on the high quality of the watermarked image.
international conference on advanced computer science applications and technologies | 2012
Ghassan N. Mohammed; Azman Yasin; Akram M. Zeki
Imperceptibility or quality for digital image watermarking represents one of the most important requirements for any digital watermarking system. Many studies try to enhance the quality by using different techniques and methods. In this study, Genetic Algorithm (GA) method is used to embed two bits of watermarking data within every pixel of original image and to find the optimal value based on the existing Dual Intermediate Significant Bit (DISB). However, if the two embedded bits is equal to the original bits then this means the watermarked image is still the same as the original one without any changing, while in the other case GA is used getting the minimum fitness value in which the fitness is the absolute value between the pixel and chromosome and the value of chromosome between 0-255. The results show that the new method improves the image quality and get the optimal value for the two embedded bits.
Archive | 2018
Mazni Omar; Mazida Ahmad; Azman Yasin; Huda Ibrahim; Osman Ghazali; Shakiroh Khamis
Academic performance of a student is one the main areas to be devoted to and implemented by the university. This study examined whether and how the technologies provided will affect students’ academic performance among university students. A sample of l47 UUM undergraduate students was analyzed from their Wi-Fi usage. The students’ Cumulative Grade Point Average (CGPA) was used as a measure of academic performance. The data were analyzed quantitatively by using web 2.0 category analyses and Spearman correlation of Statistical Package for Social Sciences (SPSS). The result indicates that Wi-Fi usage does not affect student academic performance. Additionally, the study of Wi-Fi hardcore users also found that the usage does not affect students’ performance academically. Furthermore, based on the students CGPA who have CGPA between 2.00 to 2.99, there have two categories of Wi-Fi usage that will affect their performance which are downloading and online game categories.