Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Azman Yasin is active.

Publication


Featured researches published by Azman Yasin.


Computer and Information Science | 2010

Financial Sustainability Issues in Malaysia’s Telecentres

Huda Ibrahim; Azman Yasin; Zulkhairi Dahalin

Telecentres plays an important role in bridging digital divide in Malaysia. A study was conducted to identify the issues of financial sustainability on 132 telecentres in Malaysia. The study focused on TCs in four regions of Malaysia Peninsular (northern, central, southern and eastern). Questionnaires were sent to the telecentres’ operators. The results prove that financial support is critical in operating and maintaining the centers. The costs incurred in running telecentres involve the costs for promotion, staff, utilities, premise renting, and training. More than 75 percent of the telecentres are operating under tight cash budget. Recommendations are given to encourage telecentre’s financial sustainability in the future.


international conference on education technology and computer | 2010

Redesigning the user interface of handwriting recognition system for preschool children

Nur Sukinah Aziz; Mohd Nizam Saad; Abd. Hadi Abd. Razak; Azman Yasin

Nowadays there are handwriting recognition systems that can be occupied to assist children learning how to write properly. However, one of the major barriers that hinders them using the system is its complex user interface where the designed is based on adult preferences. Therefore in this paper, we present the guideline to redesign the user interfaces via our experience developing a handwriting recognition system for pre-school children named Handwriting-based Learning Number (HLN). The redesign process has followed eight guidelines and rules as presented by Schniederman. The user interface satisfaction evaluation result done using Questionnaire for User Interface Satisfaction (QUIS) is very convincing where the users are almost satisfied with the redesign process that we did to the user interface. Hence we found that the guidelines are very useful and developers are all welcome to follow it if they intend to do similar system like us.


international conference on advanced computer science applications and technologies | 2012

Digital Image Watermarking, Analysis of Current Methods

Ghassan N. Mohammed; Azman Yasin; Akram M. Zeki

The rapid evolution in data transmission by the wide use of the internet, as provided an urgent need to prevent penetration and maintain the confidentiality of this data through the applying of some techniques to hide data within the carrier for example, text, image, audio and Video. A variety of image watermarking techniques have been published in the last few years which attempts to develop techniques and methods which are used to obtain better results through the fact that the changes that took place after the concealment is visible to the human eye. Digital image watermarking is one of the general information hiding problem. This study is to highlight some of these studies and analysis for use in future research and development to get to the best results.


international conference on computer science and information technology | 2014

Robust image watermarking based on Dual Intermediate Significant Bit (DISB)

Ghassan N. Mohammed; Azman Yasin; Akram M. Zeki

The most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. The relationship between the two requirements is completely conflict. In this study, the method focuses on the robustness against chosen attacks for the watermarked image based on Dual Intermediate Significant Bit (DISB) model. This method requires embedding two bits into every pixel of the original image, while and the other six bits are changed so as to directly assimilate the original pixel. In the case, when the two hidden bits are equal or not equal to the original bits, there is a need to use mathematical equations to solve this problem which derived and applied in this study. The results show that the proposed model produces robustness watermarked images as compared to our previous method when focuses on the high quality of the watermarked image which proved that proposed method is better as compared with the Least Significant Bit (LSB) after embedding two bits. The best values investigated when the Peak Signal to Noise Ratio (PSNR) is equal or more than 30db, and finding the best Normalized Cross Correlation (NCC) to evaluate the image resistance against attacks. The best values investigated when the two embedded bits are k1=4 and k2=6.


international conference on it convergence and security, icitcs | 2013

Improvement of the Quality for Digital Image Watermarking Based on Dual ISB

Ghassan N. Mohammed; Azman Yasin; Akram M. Zeki

The impeccability (quality) represent as one of the most important requirements of any watermarking system of the watermarked gray scale image. In most studies, the watermarking algorithm has to embed the watermark so that this will not affect the quality of the host data. In this study, the method concentrates on the greatest quality of the watermarked image based on Dual Intermediate Significant Bit (DISB) model. The embedding process is done by using two keys k1 and k2 where k2 > k1. The extracting process has been done after applying some types of attacks. The experimental results show that the new method improves the quality.


soft computing | 2012

Long Term Energy Demand Forecasting based on Hybrid, Optimization: Comparative Study

Wahab Musa; Ku Ruhana Ku-Mahamud; Azman Yasin

The objective of this research is to develop a long term energy demand forecasting model that used hybrid optimization. To accomplish this goal, a hybrid algorithm that combined a genetic algorithm and a local search algorithm method has been developed to overcome premature convergence. Model performances of hybrid algorithm were compared with former single algorithm model in estimating parameter values of an objective function to measure the goodness-of-fit between the observed data and simulated results. Averages error between two models was adopt to select the proper model for future projection of energy demand.


international conference on computer and information sciences | 2014

jFakih: Modelling mobile learning game

Azham Hussain; Norasyikin Abdul Mutalib; Azman Yasin

This study introduce a new method for learning Jawi for deaf children by adding some hand signs and named the method as jFakih. Since Fakih is a learning method for deaf children to read Quran, its also possible to be used in Jawi learning for deaf children. Fakih used number and colours to recognize the Arabic character and also the script. We also designed the reference model for jFakih for future development of mobile application. By using waterfall-agile hybrid method, we gathered the requirements and designed the model using UML technique. The model was validated through prototype development and some survey was implemented to get feedbacks from users.


ieee international conference on control system computing and engineering | 2014

A new robust image watermarking method using Dual Intermediate Significant Bits

Ghassan N. Mohammed; Azman Yasin; Akram M. Zeki

For any watermarking system, there are two important requirements which are quality and robustness. These two requirements are conflicts all the time, which means when increasing image quality the robustness will decreasing and vice versa. This study focuses on the robustness after applied chosen attacks for the watermarked image based on the existing technique Dual Intermediate Significant Bit (DISB). This method requires embedding two bits into every pixel of the original image, while and the other six bits are changed so as to directly assimilate the original pixel. In the case, when the two hidden bits are equal or not equal to the original bits, there is a need to use mathematical equations to solve this problem. Two measurements criteria used in this study to test image robustness, the first one is Normalized Cross Correlation (NCC) and Bit Error Ratio (BER). The results show that the proposed model produces robustness watermarked images as compared to our previous method when focuses on the high quality of the watermarked image.


international conference on advanced computer science applications and technologies | 2012

High Image Quality Watermarking Model by Using Genetic Algorithm

Ghassan N. Mohammed; Azman Yasin; Akram M. Zeki

Imperceptibility or quality for digital image watermarking represents one of the most important requirements for any digital watermarking system. Many studies try to enhance the quality by using different techniques and methods. In this study, Genetic Algorithm (GA) method is used to embed two bits of watermarking data within every pixel of original image and to find the optimal value based on the existing Dual Intermediate Significant Bit (DISB). However, if the two embedded bits is equal to the original bits then this means the watermarked image is still the same as the original one without any changing, while in the other case GA is used getting the minimum fitness value in which the fitness is the absolute value between the pixel and chromosome and the value of chromosome between 0-255. The results show that the new method improves the image quality and get the optimal value for the two embedded bits.


Archive | 2018

WiFi usage and student performance: Examining the interrelations for UUM students

Mazni Omar; Mazida Ahmad; Azman Yasin; Huda Ibrahim; Osman Ghazali; Shakiroh Khamis

Academic performance of a student is one the main areas to be devoted to and implemented by the university. This study examined whether and how the technologies provided will affect students’ academic performance among university students. A sample of l47 UUM undergraduate students was analyzed from their Wi-Fi usage. The students’ Cumulative Grade Point Average (CGPA) was used as a measure of academic performance. The data were analyzed quantitatively by using web 2.0 category analyses and Spearman correlation of Statistical Package for Social Sciences (SPSS). The result indicates that Wi-Fi usage does not affect student academic performance. Additionally, the study of Wi-Fi hardcore users also found that the usage does not affect students’ performance academically. Furthermore, based on the students CGPA who have CGPA between 2.00 to 2.99, there have two categories of Wi-Fi usage that will affect their performance which are downloading and online game categories.

Collaboration


Dive into the Azman Yasin's collaboration.

Top Co-Authors

Avatar

Mazni Omar

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Fauziah Baharom

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Haslina Mohd

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mazida Ahmad

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Akram M. Zeki

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nurnasran Puteh

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Huda Ibrahim

Universiti Utara Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge