Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nor Asiakin Hasbullah is active.

Publication


Featured researches published by Nor Asiakin Hasbullah.


international visual informatics conference | 2015

Implementing Low Level Features for Human Aggressive Movement Detection

Tuan Khalisah Tan Zizi; Suzaimah Ramli; Norazlin Ibrahim; Norulzahrah Mohd Zainudin; Lili Nurliyana Abdullah; Nor Asiakin Hasbullah

In this real world, being able to identify the signs of imminent abnormal behaviors such as aggression or violence and also fights, is of extreme importance in keeping safe those in harm’s way. This research propose an approach to figure out human aggressive movements using Horn-Schunck optical flow algorithm in order to find the flow vector for all video frames. The video frames are collected using digital camera. This research guides and discovers the patterns of body distracted movement so that suspect of aggression can be investigated without body contact. Using the vector of this method, the abnormal and normal video frames are then classified and utilized to define the aggressiveness of humans. Preliminary experiment result showed that the low level of feature extraction can classify human aggressive and non-aggressive movements.


international conference on user science and engineering | 2010

Towards engineering HCI - Privacy requirement in Malaysia: A preliminary study on Small-Medium e-commerce privacy adoptions

Wan Abdul Rahim Wan Mohd Isa; Nor Asiakin Hasbullah; Noor Nor Laila; Nor Farizma Manaf

The emerging area of Human Computer Interaction - Privacy (HCI-P) is evolving to include research on engineering HCI requirement and localizing privacy protection to include socio-cultural requirement, legal protection by countries and user privacy preferences. ‘Personal Data Protection Act 2009’, passed in April 2010 by Malaysias Parliament demonstrated the infancy level of privacy protection in Malaysia. In addition, there is little study in Malaysia to investigate; (i) the privacy protection awareness among public and (ii) the practice of privacy adoption among companies. This study aims towards bridging this understanding by investigating the adoption of privacy policy among Malaysia e-commerce website. A sample of 210 Small Medium Enterprises (SME) websites was selected by using convenient sampling from various categories of Malaysia e-commerce portal available at http://www.shoppe.com.my. The evaluation process was done by using personal observation using an adopted indicators of privacy policies from Jamal, Maeir and Sunder (2002) [1] by observing the ‘privacy policy statements’, ‘privacy policy notice’ and ‘privacy policy’ provided by the companies. The study revealed several issues pertaining privacy policy adoption among Malaysia e-commerce websites. We end our study with few recommendations for further improvement of the privacy policy adoption and future feasible work within this line of study.


International Conference on Kansei Engineering & Emotion Research | 2018

Fear as Emotion Assessment in Information Security Using Kansei Engineering Methodology

Nurjannatul Jannah Aqilah Md Saad; Mat Razali Noor Afiza; Khairul Khalil Ishak; Nor Asiakin Hasbullah; Norulzahrah Mohd Zainudin; Suzaimah Ramli; Norshahriah Wahab; Mohd Fahmi Mohamad Amran

Information security assessment needs to be further developed due to the increased need to improve information security. Human factors need to be considered in formulizing and establishing information security methodology. A preliminary study of fear as emotional assessment in information security using Kansei Engineering methodology was discussed in this paper. The concept of fear in information security was explored to better understand the emotion of fear, for the purpose of implementating it as user assessment. Based on the literature reviews, it shows that fear appeal does play a crucial role in changing an individual’s behaviour and attitude in the context of risk measures. However, too much induced fear could cause affect how much users comply to security policies. Therefore, it is vital to have the optimum level of fear appeal applied in information security. This study surveyed the relationship between fear level and users action in applying security measures and serve as preliminary study to use fear as emotion assessment in information security using Kansei Engineering.


international visual informatics conference | 2017

Knowledge Driven Interface to Determine Degree of Exposure of Young Adult to Pedophile Online

Mat Razali Noor Afiza; Nurjannatul Jannah Aqilah Md Saad; Nor Asiakin Hasbullah; Norulzahrah Mohd Zainudin; Suzaimah Ramli; Norshahriah Wahab; Mohd Nazri Ismail; Mohd Fahmi Mohamad Amran

In the era of Internet of Thing (IoT) which a lot of devices are connected to the internet, children are spending more hours online interacting in cyber space that increase exposure to cyber security including pedophile activity. Increase of time spend online could increase the potential of online sexual grooming behaviours of child molesters. Since that the behaviour are not easily identified prior to the abuse, this study gathers and collect information about child sexual abuse by pedophile and propose a comprehensive decision support system to educate children base on knowledge-driven method about online grooming by molesters. An interactive system is built to provide knowledge to children regarding child sexual abuse and pedophile in terms of definition and each characteristics of it. The main purpose of the system is compiling database about child sexual abuse and pedophiles in order to determine the level of child’s exposure to pedophile in term of five attributes which is selection of victims, gaining access, grooming, trust and approach.


international conference on information and communication technology | 2016

A review on cyberbullying in Malaysia from digital forensic perspective

Norulzahrah Mohd Zainudin; Khairil Hanan Zainal; Nor Asiakin Hasbullah; Norshahriah Wahab; Suzaimah Ramli

This paper is a review on cyberbullying generally on the issues around it and specifically in Malaysia. The topic that will be covered in this review begins with the definition of cyberbullying, what types of cyberbullying that occur nowadays, the roles of person involve and statistic of who being targeted, and what type of common data that being used in cyberbullying. This paper will give perspective towards digital forensic investigation such as what type of data and medium are being used by the cyberbullies.


international conference on information and communication technology | 2016

Comparison between Horn-Schunck and Brox techniques for Motion Detection in Thermal Video

Suzaimah Ramli; N. Othman; Norulzahrah Mohd Zainudin; Norshahriah Wahab; Nor Asiakin Hasbullah; T. Tan Zizi; F. Mohd Azizi; Norazlin Ibrahim

The Motion Detection From The Thermal Video Using Optical Flow Technique was created to study motion detection techniques from thermal video using optical flow. The purpose of this application is to identify which techniques is more effective in detecting motion in thermal videos and to some extent it can drive technological development in the context of image processing. This application is developed to detect motion of an object in the distance occurred in the video. The program of the development Graphical User Interface (GUI) for this application is to facilitate users in order to use this application and to understand how these applications work. GUI is an intermediate medium between the user and a system. The technique developed for this application is called the Horn-Schunck and Brox technique. The analysed scene involved a video recording of a human dynamic motion. The analysis was done through an algorithm to detect motion based on the differences of the flow direction of the magnitude that occurs between image frames. The result of the analysis showed which one of the techniques is more effective in detecting the motion of objects that occurs in the video.


international conference on information and communication technology | 2016

Lecturer Promotion Assessment System based on Fuzzy Logic

T. Tan Zizi; N. Othman; Norulzahrah Mohd Zainudin; Norshahriah Wahab; Nor Asiakin Hasbullah; Suzaimah Ramli; Norazlin Ibrahim

Lecturer Promotion Assessment System for Department of Computer Science, Faculty of Science and Technology Defence was built to help the promotion of lecturers featured appraiser to conduct an initial assessment of the eligibility status of lecturers. The lecturer will be treated as eligible, in observation or tidal worth in value that has been set to proceed with the application promotion. It is because, in the application for promotion of lecturers it includes several procedures such as application delivery and assessment meetings between committee members. Thus the system helps the evaluator by using the Fuzzy Logic method consists of several phases which are fuzzification, fuzzy inference system and defuzzification. The system uses the engine type Mamdani fuzzy inference system and defuzzification through technique of centroid of Gravity (COG) as the output. Each of the estimated assessment will be compared with a database that has been set before produced as output. There are several ways to analyze the results of these feasibility of using graphs and message box. The construction of this system is expected to help ease the burden of the assessors and settle the problems that arise. In fact, this system may also be a drive to the use of more high-tech systems and artificial intelligence features along with the rapidly evolving technology now.


international conference for internet technology and secured transactions | 2015

Facial expression change detection algorithm using optical flow technique

Norulzahrah Mohd Zainudin; Suzaimah Ramli; Tuan Khalisah Tan Zizi; Nor Asiakin Hasbullah; Norazlin Ibrahim

This study is aimed to investigate the use of optical flow techniques in detecting changes in facial expressions. A person face expression detection is very important as we can identify a persons emotional and mental state. When communicating with people, human can identify someones expression accurately compared to computer. Although many approaches are tackled on this topic, there are still several drawbacks and limitations. In order to yield better results, we have applied optical flow technique to detect facial expression. In addition, we have the technique with Horn-Schunck method to optimize the results. Based on the experiment conducted, the average value represented by every facial expression can be identified, and the values are significant for future research that is focused on facial expression classification.


Archive | 2017

Aggressive movement detection using optical flow features base on digital & thermal camera

Suzaimah Ramli; Norulzahrah Mohd Zainudin; Nor Asiakin Hasbullah; Norshariah Abdul Wahab; Noor Afiza Mat Razali; Norazlin Ibrahim


International Journal for Information Security Research | 2015

Horn Schunck Algorithm for Facial Expression Change Detection Classification

Norulzahrah Mohd Zainudin; Suzaimah Ramli; T. Tan Zizi; Nor Asiakin Hasbullah; M. Mohd Hanafi; Norshahriah Wahab; Norazlin Ibrahim

Collaboration


Dive into the Nor Asiakin Hasbullah's collaboration.

Top Co-Authors

Avatar

Norulzahrah Mohd Zainudin

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Suzaimah Ramli

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Norshahriah Wahab

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mat Razali Noor Afiza

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Fahmi Mohamad Amran

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

N. Othman

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nurjannatul Jannah Aqilah Md Saad

National Defence University of Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge