Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nor Fazlida Mohd Sani is active.

Publication


Featured researches published by Nor Fazlida Mohd Sani.


asia-pacific software engineering conference | 2009

Unit Testing Approaches for BPEL: A Systematic Review

Zulfa Zakaria; Rodziah Atan; Abdul Azim Abdul Ghani; Nor Fazlida Mohd Sani

Service-Oriented Architecture (SOA) is a new architectural style for developing distributed business applications. Nowadays, those applications are realized through web services, which are later grouped as web service compositions. Web service compositions language, like the BPELWS 2.0 standard, are extensions of imperative programming languages. Additionally, it presents a challenge for traditional white-box testing, due to its inclusion of specific instructions, concurrency, fault compensation and dynamic service discovery and invocation. In fact, there is a lack of unit testing approaches and tools, which has resulted in inefficient practices in testing and debugging of automated business processes. Therefore, we performed a systematic review study to analyze 27 different studies for unit testing approaches for BPEL. This paper aims to focus on a comprehensive review to identify a categorization, a description of test case generation approaches, empirical evidence, current trends in BPEL studies, and finally to end with future work for other researchers.


international symposium on biometrics and security technologies | 2014

Plan recognition scheme using multi-factors authentication for smart card online system

Noor Afiza Mohd Ariffin; Nor Fazlida Mohd Sani

Authentication is one of the essential security features in network communication and ensures the system resources are not obtained by illegal users. In authentication process, the originator of the communication and the respondent will manage some identification codes of each other before to start of the message transaction. Several approaches have been proposed regarding the authentication process from time to time. However, the previous approaches are vulnerable to various attacks. This research introduces a new scheme named plan recognition authentication scheme that use for smart card based on networking system. It is an authentication scheme which is different with existing scheme to ensure and enhance the smart card based authentication and security. All the features of this scheme such as reliability, integrity, confidentiality and accessibility are applied during the authentication process. In this plan recognition scheme, the technique that use to identify authentication with combination of something known and something possessed such as a usage of smart card and password.


international conference on advanced computer science applications and technologies | 2013

Mobile Plant Tagging System for Urban Forest Eco-Tourism Using QR Code

Iskandar Ishak; Fatimah Sidi; Lilly Suriani Affendey; Nor Fazlida Mohd Sani; Amir Syamimi Hamzah; Paiman Bawon

The transformation of mobile devices from being a communication devices to be important information resources has changed the way of how activities being implemented including in tourism industry. This is very important for the tourists especially when they visit remote location such as forests. For these tourists, information regarding plants is very important to them and most of the time the tour guides or books will be their source of references. The traditional way of forest tourism lacks the facility for these tourists to obtain information regarding the plants. This paper proposes a system that uses QR codes as tag for tagging the plants that can be scanned by tourists to get further information of the plants. Through this system the visitors only need to use their mobile devices to scan on the plant tag to get its information on their devices. The QR codes used representing the plant ID. Based on these QR codes, the application will query a remote database and retrieved the information of the scanned plant and will be displayed in the visitors mobile devices. Using this system, tourists can get accurate information regarding the plants in the forest through their devices. Also, through this system, they can get information during their visit in the forest quickly without having to depend on tour guides or reference books.


international conference on advanced computer science applications and technologies | 2012

Conceptual Database Design for Smart Medical Clinical System

Nor Fazlida Mohd Sani; Lilly Suriani Affendey; Rahmita Wirza O. K. Rahmat; Mohd Hasan Selamat; Rabiah Abdul Kadir; Mohd Zamrin Dimon

Hospitals are known for having separate information systems across various departments, which are usually heterogeneous in nature. Medical experts could benefit greatly from the integration of these islands, but the heterogeneity of the sources/databases often impedes this. Most cardiothoracic units use isolated heterogeneous systems to keep patients records as well as to support the experts when deciding for cardiothoracic surgery. These include patients information system, lab results for x-ray, angiography, echocardiogram, blood etc. All these information are stored in heterogeneous systems and as such, a user would have to log-in and log-out from one system to another, to monitor/trace a patients medical record. As the solution, we proposed a clinical database system in which the system incorporates the overall patients management, from ward admission through Operation Theatre, Coronary Intensive Care Unit (CICU), recovery and discharge in which is divided into several modules. The purpose of this paper is to presents the conceptual database design for the Smart Medical Clinical System which include features that could alert the healthcare personnel regarding any abnormal trend in the data, so that medical experts need not have to repeat the same investigations.


soft computing | 2016

Performance-Aware Trust-Based Access Control for Protecting Sensitive Attributes

Mohd Rafiz Salji; Nur Izura Udzir; Mohd Izuan Hafez Ninggal; Nor Fazlida Mohd Sani; Hamidah Ibrahim

The prevailing trend of the seamless digital collection has prompted privacy concern not only among academia but also among the majority. In enforcing the automation of privacy policies and law, access control has been one of the most devoted subjects. Despite the recent advances in access control frameworks and models, there are still issues that impede the development of effective access control. Among them are the lack of assessment’s granularity in user authorization, and reliance on identity, role or purpose-based access control schemes. In this paper, we address the problem of protecting sensitive attributes from inappropriate access. We propose an access control mechanism that employs two trust metrics name experience and behavior. We also propose a scheme for quantifying those metrics in an enterprise computing environment. Finally, we show that these metrics are useful in improving the assessment granularity in permitting or prohibiting users to gain access to sensitive attributes.


Archive | 2013

An OOAD Model of Program Understanding System’s Parser

Norazimah Rosidi; Nor Fazlida Mohd Sani; Abdul Azim Abd Ghani

This paper describes a model of parser for program understanding system. This model is developed by using Unified Modeling Language (UML). The UML is a common notation for structured modeling within Object-oriented analysis and design (OOAD) framework. It helps to specify, visualize and document models of software system. The objective of developing this model is to capture and document the details of this parser. The parser may build parse tree and abstract syntax tree (AST) which representing data structure of all elements of the source code. It also generate control flow graph (CFG) to show the flow of program. This paper describes the process of developing this model, which include creating use case diagram, class diagram, and behavior diagrams.


Archive | 2013

The Unified Modeling Language Model of an Object Oriented Debugger System

Noor Afiza Mohd Ariffin; Nor Fazlida Mohd Sani; Rodziah Atan

In this paper will explain a model that being used to develop an Object Oriented Debugger (OOD). Unified Modeling Language (UML) is the best choice model and suitable to design the Object Oriented Debugger which will be developed in an object oriented programming environment. The model will provide an ability to capture the characteristics of a system by using notations in the process of designing and implementing the system. The objective of this paper is to capture the structure and behavior of the Object Oriented Debugger system by using the UML diagram. The model also can ease the readability of the documentation for the maintenance purposes. This paper starts with explanation about the concepts of Object Oriented Debugger and has divided into three sections which include creating use case, capturing process flow and finding objects interactions. Appropriate UML diagrams for Object Oriented Debugger system are presented in relevant sections of this paper.


international symposium on information technology | 2008

Object-oriented codes representation of program understanding system

Nor Fazlida Mohd Sani; Abdullah Mohd Zin; Sufian Idris

The purpose of this paper is to present and describe the representation of an object-oriented programming code in the program understanding system. The program’s representation that has been used and will be discussed is an Object-oriented Control Flow Graph (OO-CFG). OO-CFG was an added version on the notation of the traditional control flow graph (CFG). This new OO-CFG has been created since from the literature there are no researches specifically focus on the problem in presenting the communications between objects. Usually the communication between objects in object-oriented program code is by a process of message passing. In this paper, we are introducing the OO-CFG representation and also example on the usage.


Archive | 2013

A Survey About Impacts of Cloud Computing on Digital Forensics

Farid Daryabar; Ali Dehghantanha; Nur Izura Udzir; Nor Fazlida Mohd Sani; Solahuddin bin Shamsuddin; Farhood Norouzizadeh


Archive | 2013

A Survey on Privacy Impacts of Digital Investigation

Farid Daryabar; Ali Dehghantanha; Nur Izura Udzir; Nor Fazlida Mohd Sani; Solahuddin bin Shamsuddin; Farhood Norouzizadeh

Collaboration


Dive into the Nor Fazlida Mohd Sani's collaboration.

Top Co-Authors

Avatar

Ramlan Mahmod

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar

Fatimah Sidi

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar

Nur Izura Udzir

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar

Iskandar Ishak

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aida Mustapha

Universiti Tun Hussein Onn Malaysia

View shared research outputs
Top Co-Authors

Avatar

Farid Daryabar

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar

Hamidah Ibrahim

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge