Nor Asiakin Hasbullah
National Defence University of Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Nor Asiakin Hasbullah.
international visual informatics conference | 2015
Tuan Khalisah Tan Zizi; Suzaimah Ramli; Norazlin Ibrahim; Norulzahrah Mohd Zainudin; Lili Nurliyana Abdullah; Nor Asiakin Hasbullah
In this real world, being able to identify the signs of imminent abnormal behaviors such as aggression or violence and also fights, is of extreme importance in keeping safe those in harm’s way. This research propose an approach to figure out human aggressive movements using Horn-Schunck optical flow algorithm in order to find the flow vector for all video frames. The video frames are collected using digital camera. This research guides and discovers the patterns of body distracted movement so that suspect of aggression can be investigated without body contact. Using the vector of this method, the abnormal and normal video frames are then classified and utilized to define the aggressiveness of humans. Preliminary experiment result showed that the low level of feature extraction can classify human aggressive and non-aggressive movements.
international conference on user science and engineering | 2010
Wan Abdul Rahim Wan Mohd Isa; Nor Asiakin Hasbullah; Noor Nor Laila; Nor Farizma Manaf
The emerging area of Human Computer Interaction - Privacy (HCI-P) is evolving to include research on engineering HCI requirement and localizing privacy protection to include socio-cultural requirement, legal protection by countries and user privacy preferences. ‘Personal Data Protection Act 2009’, passed in April 2010 by Malaysias Parliament demonstrated the infancy level of privacy protection in Malaysia. In addition, there is little study in Malaysia to investigate; (i) the privacy protection awareness among public and (ii) the practice of privacy adoption among companies. This study aims towards bridging this understanding by investigating the adoption of privacy policy among Malaysia e-commerce website. A sample of 210 Small Medium Enterprises (SME) websites was selected by using convenient sampling from various categories of Malaysia e-commerce portal available at http://www.shoppe.com.my. The evaluation process was done by using personal observation using an adopted indicators of privacy policies from Jamal, Maeir and Sunder (2002) [1] by observing the ‘privacy policy statements’, ‘privacy policy notice’ and ‘privacy policy’ provided by the companies. The study revealed several issues pertaining privacy policy adoption among Malaysia e-commerce websites. We end our study with few recommendations for further improvement of the privacy policy adoption and future feasible work within this line of study.
International Conference on Kansei Engineering & Emotion Research | 2018
Nurjannatul Jannah Aqilah Md Saad; Mat Razali Noor Afiza; Khairul Khalil Ishak; Nor Asiakin Hasbullah; Norulzahrah Mohd Zainudin; Suzaimah Ramli; Norshahriah Wahab; Mohd Fahmi Mohamad Amran
Information security assessment needs to be further developed due to the increased need to improve information security. Human factors need to be considered in formulizing and establishing information security methodology. A preliminary study of fear as emotional assessment in information security using Kansei Engineering methodology was discussed in this paper. The concept of fear in information security was explored to better understand the emotion of fear, for the purpose of implementating it as user assessment. Based on the literature reviews, it shows that fear appeal does play a crucial role in changing an individual’s behaviour and attitude in the context of risk measures. However, too much induced fear could cause affect how much users comply to security policies. Therefore, it is vital to have the optimum level of fear appeal applied in information security. This study surveyed the relationship between fear level and users action in applying security measures and serve as preliminary study to use fear as emotion assessment in information security using Kansei Engineering.
international visual informatics conference | 2017
Mat Razali Noor Afiza; Nurjannatul Jannah Aqilah Md Saad; Nor Asiakin Hasbullah; Norulzahrah Mohd Zainudin; Suzaimah Ramli; Norshahriah Wahab; Mohd Nazri Ismail; Mohd Fahmi Mohamad Amran
In the era of Internet of Thing (IoT) which a lot of devices are connected to the internet, children are spending more hours online interacting in cyber space that increase exposure to cyber security including pedophile activity. Increase of time spend online could increase the potential of online sexual grooming behaviours of child molesters. Since that the behaviour are not easily identified prior to the abuse, this study gathers and collect information about child sexual abuse by pedophile and propose a comprehensive decision support system to educate children base on knowledge-driven method about online grooming by molesters. An interactive system is built to provide knowledge to children regarding child sexual abuse and pedophile in terms of definition and each characteristics of it. The main purpose of the system is compiling database about child sexual abuse and pedophiles in order to determine the level of child’s exposure to pedophile in term of five attributes which is selection of victims, gaining access, grooming, trust and approach.
international conference on information and communication technology | 2016
Norulzahrah Mohd Zainudin; Khairil Hanan Zainal; Nor Asiakin Hasbullah; Norshahriah Wahab; Suzaimah Ramli
This paper is a review on cyberbullying generally on the issues around it and specifically in Malaysia. The topic that will be covered in this review begins with the definition of cyberbullying, what types of cyberbullying that occur nowadays, the roles of person involve and statistic of who being targeted, and what type of common data that being used in cyberbullying. This paper will give perspective towards digital forensic investigation such as what type of data and medium are being used by the cyberbullies.
international conference on information and communication technology | 2016
Suzaimah Ramli; N. Othman; Norulzahrah Mohd Zainudin; Norshahriah Wahab; Nor Asiakin Hasbullah; T. Tan Zizi; F. Mohd Azizi; Norazlin Ibrahim
The Motion Detection From The Thermal Video Using Optical Flow Technique was created to study motion detection techniques from thermal video using optical flow. The purpose of this application is to identify which techniques is more effective in detecting motion in thermal videos and to some extent it can drive technological development in the context of image processing. This application is developed to detect motion of an object in the distance occurred in the video. The program of the development Graphical User Interface (GUI) for this application is to facilitate users in order to use this application and to understand how these applications work. GUI is an intermediate medium between the user and a system. The technique developed for this application is called the Horn-Schunck and Brox technique. The analysed scene involved a video recording of a human dynamic motion. The analysis was done through an algorithm to detect motion based on the differences of the flow direction of the magnitude that occurs between image frames. The result of the analysis showed which one of the techniques is more effective in detecting the motion of objects that occurs in the video.
international conference on information and communication technology | 2016
T. Tan Zizi; N. Othman; Norulzahrah Mohd Zainudin; Norshahriah Wahab; Nor Asiakin Hasbullah; Suzaimah Ramli; Norazlin Ibrahim
Lecturer Promotion Assessment System for Department of Computer Science, Faculty of Science and Technology Defence was built to help the promotion of lecturers featured appraiser to conduct an initial assessment of the eligibility status of lecturers. The lecturer will be treated as eligible, in observation or tidal worth in value that has been set to proceed with the application promotion. It is because, in the application for promotion of lecturers it includes several procedures such as application delivery and assessment meetings between committee members. Thus the system helps the evaluator by using the Fuzzy Logic method consists of several phases which are fuzzification, fuzzy inference system and defuzzification. The system uses the engine type Mamdani fuzzy inference system and defuzzification through technique of centroid of Gravity (COG) as the output. Each of the estimated assessment will be compared with a database that has been set before produced as output. There are several ways to analyze the results of these feasibility of using graphs and message box. The construction of this system is expected to help ease the burden of the assessors and settle the problems that arise. In fact, this system may also be a drive to the use of more high-tech systems and artificial intelligence features along with the rapidly evolving technology now.
international conference for internet technology and secured transactions | 2015
Norulzahrah Mohd Zainudin; Suzaimah Ramli; Tuan Khalisah Tan Zizi; Nor Asiakin Hasbullah; Norazlin Ibrahim
This study is aimed to investigate the use of optical flow techniques in detecting changes in facial expressions. A person face expression detection is very important as we can identify a persons emotional and mental state. When communicating with people, human can identify someones expression accurately compared to computer. Although many approaches are tackled on this topic, there are still several drawbacks and limitations. In order to yield better results, we have applied optical flow technique to detect facial expression. In addition, we have the technique with Horn-Schunck method to optimize the results. Based on the experiment conducted, the average value represented by every facial expression can be identified, and the values are significant for future research that is focused on facial expression classification.
Archive | 2017
Suzaimah Ramli; Norulzahrah Mohd Zainudin; Nor Asiakin Hasbullah; Norshariah Abdul Wahab; Noor Afiza Mat Razali; Norazlin Ibrahim
International Journal for Information Security Research | 2015
Norulzahrah Mohd Zainudin; Suzaimah Ramli; T. Tan Zizi; Nor Asiakin Hasbullah; M. Mohd Hanafi; Norshahriah Wahab; Norazlin Ibrahim
Collaboration
Dive into the Nor Asiakin Hasbullah's collaboration.
Nurjannatul Jannah Aqilah Md Saad
National Defence University of Malaysia
View shared research outputs