Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hafiza Abas is active.

Publication


Featured researches published by Hafiza Abas.


international conference on electrical engineering and informatics | 2011

Scaffolding models for remedial students in using augmented reality storybook

Hafiza Abas; Halimah Badioze Zaman

Scaffolding model for augmented reality (AR) storybook is a structured method of supporting student in learning how to read. Reading is one of the fundamental skills needed by the remedial students to be successful in their academic endeavors. Remedial students are students who have problems with their cognition, motivation, and emotion. This research focuses on developing a Malay language storybook with the support of the AR technology. It contributes six scaffolding models that are based on theories, guidelines, and the previous research of scaffolding. They are i) scaffolding model for AR story books (thematic stories); ii) scaffolding model for AR story books (short stories); iii) scaffolding model for AR story books (comprehension); iv) scaffolding model for AR story books (dictionary); v) scaffolding model for AR story books (coloring activity) and vi) scaffolding model for AR story books (marker). The next step is the development phases, which are the composition of AR story book and AR markers. This will then be the lead for future works, and research on the acceptance test with experts and usability testing with the remedial students.


Archive | 2014

Persona Design Analysis of Digital Storybook for Remedial Students

Rahmah Lob Yussof; Hafiza Abas; Tengku Nazatul Shima Tengku Paris

Remedial students have problems in learning such as attention span in study engagement and concentration. Thus, engaging them in digital storybook is one of the ways to help them to engage and be motivated in reading environment. Unfortunately, the development of software application such as digital storybook that meets the learners’ need is a challenging task. Meanwhile the success or failure of the development is essentially determined during the initial phases preceding the actual software development itself. During these phases, getting the accurate information of users is the key factor to build strategic objectives in order to come out with the suitable application to fulfill the users’ need. Hence, we propose the persona technique which is widely used by human-computer interaction (HCI) researchers to describe users. The technique is to gather data about the users’ need, behavior, and preferences in order to construct a vivid description of the developmental objectives. Based on the participatory questionnaire checklist, observations, and interviews made, we found out that remedial students have some problems during learning sessions. This paper reports on persona design analysis which claims greater accuracy and usefulness to create digital storybook in motivating remedial students in learning. From the results, analysis of the persona is seen able to give positive influence to the design decision of a digital storybook with the right syllable patterns and interface design.


International Conference on Advanced Machine Learning Technologies and Applications | 2012

A New Dynamic Hash Algorithm in Digital Signature

Erfaneh Noroozi; Salwani Mohd Daud; Ali Sabouhi; Hafiza Abas

This paper presents adoption of a new hash algorithm in digital signature. Digital signature presents a technique to endorse the content of the message. This message has not been altered throughout the communication process. Due to this, it increased the receiver confidence that the message was unchanged. If the message is digitally signed, any changes in the message will invalidate the signature. The comparison of digital signature between Rivest, Shamir and Adleman (RSA) algorithms are summarized. The finding reveals that previous algorithms used large file sizes. Finally the new encoding and decoding dynamic hash algorithm is proposed in a digital signature. The proposed algorithm had reduced significantly the file sizes (8 bytes) during the transferring message.


international conference on advances in electrical electronic and systems engineering | 2016

A study of authentication protocols for security of mobile RFID (M-RFID) system

Noriani Mohammed Noor; Kamilia Kamardin; Suriani Mohd Sam; Hafiza Abas; Nilam Nur Amir Sjarif; Yusnaidi Md Yusof; Azri Azmi

Radio-frequency identification (RFID) uses electromagnetic fields for wireless communication that automatically recognized target devices with no physical interaction with the purpose of information transmission. The RFID system composed of transponder or tag, interrogator and back-end host system. The services of mobile RFID (M-RFID) networks can be setup by consolidating with current wireless networking for mobile devices and RFID networks whereby these services are aiming for individual and private users using Mobile smart phone or PDA. Even though these systems have the benefits of RFID and mobile technology, it also promotes crucial security and privacy issues. M-RFID inherits all issues that exist in the traditional RFID system, for example, replay attack, denial of service, spoofing, traceability and impersonation. However the severity of these issues intensifies because M-RFID reader is used in the wireless environment with agility in movement and greater scanning zone. Therefore, many security protocols developed to support the security and privacy problems arise in M-RFID systems. Among the famous security protocol for the system is the ultralightweight authentication protocols and this survey focus on the study of these protocols. These protocols are not capable of fulfilling all the security and privacy requirements especially in the mobile wireless environments. As in most of the literatures that described and proposed for the security and privacy authentication protocol of M-RFID, they proved that designing a security and privacy authentication protocol is still a demanding and challenging activities. Although many authentication protocols have been developed over the years, none can be considered as perfect and supreme. Based on the review of the authentication protocols, the well-chosen protocol always depends on the context and scenario for the security and privacy efficiency requirements of the M-RFID system.


Procedia - Social and Behavioral Sciences | 2012

Affective Engineering of Background Colour in Digital Storytelling for Remedial Students

Rahmah Lob Yussof; Hafiza Abas; Tengku Nazatul Shima Tengku Paris


international conference on advanced computer science applications and technologies | 2013

'Dyslexia Baca' Mobile App -- The Learning Ecosystem for Dyslexic Children

Salwani Mohd Daud; Hafiza Abas


international visual informatics conference | 2011

Visual learning through augmented reality storybook for remedial student

Hafiza Abas; Halimah Badioze Zaman


Global Learn | 2010

Digital Storytelling Design with Augmented Reality Technology for Remedial Students in Learning Bahasa Melayu

Hafiza Abas; Halimah Badioze Zaman


Archive | 2015

User Readiness Evaluation of QR Codes in Mobile Learning (m-Learning)

Hafiza Abas; Faridah Hanim Yahya; Mahamsiatus Kamaruddin


Procedia - Social and Behavioral Sciences | 2013

Mixed Usability Evaluation During the Development Cycle of “MEL-SindD”☆

Rahmah Lob Yussof; Tengku Nazatul Shima Tengku Paris; Hafiza Abas; Halimah Badioze Zaman

Collaboration


Dive into the Hafiza Abas's collaboration.

Top Co-Authors

Avatar

Salwani Mohd Daud

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Halimah Badioze Zaman

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Azizul Azizan

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Suriani Mohd Sam

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Azri Azmi

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Nilam Nur Amir Sjarif

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Sya Azmeela Shariff

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Yusnaidi Md Yusof

Universiti Teknologi Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge