Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohamed Ali Saip is active.

Publication


Featured researches published by Mohamed Ali Saip.


PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST’16) | 2016

Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model

Haslina Mohd; Muhammad Afdhal Muhammad Robie; Fauziah Baharom; Norida Muhd Darus; Mohamed Ali Saip; Azman Yasin

e-Tendering is an electronic processing of the tender document via internet and allow tenderer to publish, communicate, access, receive and submit all tender related information and documentation via internet. This study aims to design the e-Tendering system using Rational Unified Process approach. RUP provides a disciplined approach on how to assign tasks and responsibilities within the software development process. RUP has four phases that can assist researchers to adjust the requirements of various projects with different scope, problem and the size of projects. RUP is characterized as a use case driven, architecture centered, iterative and incremental process model. However the scope of this study only focusing on Inception and Elaboration phases as step to develop the model and perform only three of nine workflows (business modeling, requirements, analysis and design). RUP has a strong focus on documents and the activities in the inception and elaboration phases mainly concern the creation of diagram...


PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST’16) | 2016

A secured e-tendering modeling using misuse case approach

Haslina Mohd; Muhammad Afdhal Muhammad Robie; Fauziah Baharom; Norida Muhd Darus; Mohamed Ali Saip; Azman Yasin

Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering. Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework. Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements. Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment. Therefore, this paper aims to model a secured e-tendering system using misuse case approach. The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994). It is followed by identifying security threats and their countermeasure. Then, the e-tendering was modelled using misuse case approach. T...


PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST’16) | 2016

Factors influencing a problem-based learning implementation: A case study of IT courses

Norida Muhd Darus; Haslina Mohd; Fauziah Baharom; Mohamed Ali Saip; Nurnasran Puteh; Mohd Zabidin Husain; Azman Yasin

IT students must be trained to work efficiently as teamwork. One of the techniques that can be used to train them is through Problem-Based Learning (PBL) approach. The PBL implementation can be influenced by various factors depending on the ultimate goal of the study. This study is focusing on the IT students’ perception of the PBL implementation. The student’s perception is important to ensure the successfulness of the PBL implementation. Therefore, it is important to identify the factors that might influence the implementation of PBL of IT courses. This study aims to identify some catalyst factors that may influence the PBL implementation of IT courses. The study involved three (3) main phases: identifying PBL implementation factors, constructing a PBL model, and PBL model validation using statistical analysis. Four main factors are identified: PBL Characteristics, PBL Course Assessment, PBL Practices, and PBL Perception. Based on these four factors, a PBL model is constructed. Then, based on the propos...


Journal of Telecommunication, Electronic and Computer Engineering | 2016

Best Practices of Problem-Based Learning Implementation for IT Courses from Students Perspectives

Norida Mohd Darus; Haslina Mohd; Fauziah Baharom; Mohamed Ali Saip; Nurnasran Puteh; Mohd Zabidin Husain; Azman Yasin


International Journal of Supply Chain Management | 2016

A Secured e-Tendering Model Based on Rational Unified Process (RUP) Approach: Inception and Elaboration Phases

Haslina Mohd; Fauziah Baharom; Norida Muhd Darus; Mohamed Ali Saip; Zaharin Marzuki; Azman Yasin; Muhammad Afdhal Muhammad Robie


Archive | 2015

A problem based learning model for IT courses

Norida Muhd Darus; Halina Mohd; Nurnasran Puteh; Fauziah Baharom; Mohamed Ali Saip; Mohd Zabidin Husin; Azman Yasin


Archive | 2012

Misuse case modeling for secure e-tendering system

Haslina Mohd; Mohd Afdhal Muhammad Robie; Fauziah Baharom; Nazib Nordin; Norida Muhd Darus; Mohamed Ali Saip; Azman Yasin; Azida Zainol; Nor Laily Hashim


Archive | 2010

Generic functional requirements for effective school parents interaction system (SPIS)

Mohamed Ali Saip; Noorfaizalfarid Mohd Noor; Jamaiah Yahaya; Fauziah Baharom; Mohd Zabidin Husin


Archive | 2006

Teknologi bluetooth dalam konteks syarikat berasakan teknologi tinggi: Satu tinjauan awal

Mohd Zabidin Husin; Zhamri Che Ani; Mohamed Ali Saip


Archive | 2006

Perisian aplikasi Grodis dalam pembentukan kumpulan pelajar: Konsep dan implementasi

Mohd Zabidin Husin; Zhamri Che Ani; Mohamed Ali Saip

Collaboration


Dive into the Mohamed Ali Saip's collaboration.

Top Co-Authors

Avatar

Fauziah Baharom

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Azman Yasin

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Haslina Mohd

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nurnasran Puteh

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Zhamri Che Ani

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jamaiah Yahaya

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Nazib Nordin

Universiti Utara Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge