Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Norulzahrah Mohd Zainudin is active.

Publication


Featured researches published by Norulzahrah Mohd Zainudin.


international visual informatics conference | 2015

Implementing Low Level Features for Human Aggressive Movement Detection

Tuan Khalisah Tan Zizi; Suzaimah Ramli; Norazlin Ibrahim; Norulzahrah Mohd Zainudin; Lili Nurliyana Abdullah; Nor Asiakin Hasbullah

In this real world, being able to identify the signs of imminent abnormal behaviors such as aggression or violence and also fights, is of extreme importance in keeping safe those in harm’s way. This research propose an approach to figure out human aggressive movements using Horn-Schunck optical flow algorithm in order to find the flow vector for all video frames. The video frames are collected using digital camera. This research guides and discovers the patterns of body distracted movement so that suspect of aggression can be investigated without body contact. Using the vector of this method, the abnormal and normal video frames are then classified and utilized to define the aggressiveness of humans. Preliminary experiment result showed that the low level of feature extraction can classify human aggressive and non-aggressive movements.


International Conference on Kansei Engineering & Emotion Research | 2018

Fear as Emotion Assessment in Information Security Using Kansei Engineering Methodology

Nurjannatul Jannah Aqilah Md Saad; Mat Razali Noor Afiza; Khairul Khalil Ishak; Nor Asiakin Hasbullah; Norulzahrah Mohd Zainudin; Suzaimah Ramli; Norshahriah Wahab; Mohd Fahmi Mohamad Amran

Information security assessment needs to be further developed due to the increased need to improve information security. Human factors need to be considered in formulizing and establishing information security methodology. A preliminary study of fear as emotional assessment in information security using Kansei Engineering methodology was discussed in this paper. The concept of fear in information security was explored to better understand the emotion of fear, for the purpose of implementating it as user assessment. Based on the literature reviews, it shows that fear appeal does play a crucial role in changing an individual’s behaviour and attitude in the context of risk measures. However, too much induced fear could cause affect how much users comply to security policies. Therefore, it is vital to have the optimum level of fear appeal applied in information security. This study surveyed the relationship between fear level and users action in applying security measures and serve as preliminary study to use fear as emotion assessment in information security using Kansei Engineering.


international visual informatics conference | 2017

Knowledge Driven Interface to Determine Degree of Exposure of Young Adult to Pedophile Online

Mat Razali Noor Afiza; Nurjannatul Jannah Aqilah Md Saad; Nor Asiakin Hasbullah; Norulzahrah Mohd Zainudin; Suzaimah Ramli; Norshahriah Wahab; Mohd Nazri Ismail; Mohd Fahmi Mohamad Amran

In the era of Internet of Thing (IoT) which a lot of devices are connected to the internet, children are spending more hours online interacting in cyber space that increase exposure to cyber security including pedophile activity. Increase of time spend online could increase the potential of online sexual grooming behaviours of child molesters. Since that the behaviour are not easily identified prior to the abuse, this study gathers and collect information about child sexual abuse by pedophile and propose a comprehensive decision support system to educate children base on knowledge-driven method about online grooming by molesters. An interactive system is built to provide knowledge to children regarding child sexual abuse and pedophile in terms of definition and each characteristics of it. The main purpose of the system is compiling database about child sexual abuse and pedophiles in order to determine the level of child’s exposure to pedophile in term of five attributes which is selection of victims, gaining access, grooming, trust and approach.


international conference on information and communication technology | 2016

A review on cyberbullying in Malaysia from digital forensic perspective

Norulzahrah Mohd Zainudin; Khairil Hanan Zainal; Nor Asiakin Hasbullah; Norshahriah Wahab; Suzaimah Ramli

This paper is a review on cyberbullying generally on the issues around it and specifically in Malaysia. The topic that will be covered in this review begins with the definition of cyberbullying, what types of cyberbullying that occur nowadays, the roles of person involve and statistic of who being targeted, and what type of common data that being used in cyberbullying. This paper will give perspective towards digital forensic investigation such as what type of data and medium are being used by the cyberbullies.


international conference on information and communication technology | 2016

Comparison between Horn-Schunck and Brox techniques for Motion Detection in Thermal Video

Suzaimah Ramli; N. Othman; Norulzahrah Mohd Zainudin; Norshahriah Wahab; Nor Asiakin Hasbullah; T. Tan Zizi; F. Mohd Azizi; Norazlin Ibrahim

The Motion Detection From The Thermal Video Using Optical Flow Technique was created to study motion detection techniques from thermal video using optical flow. The purpose of this application is to identify which techniques is more effective in detecting motion in thermal videos and to some extent it can drive technological development in the context of image processing. This application is developed to detect motion of an object in the distance occurred in the video. The program of the development Graphical User Interface (GUI) for this application is to facilitate users in order to use this application and to understand how these applications work. GUI is an intermediate medium between the user and a system. The technique developed for this application is called the Horn-Schunck and Brox technique. The analysed scene involved a video recording of a human dynamic motion. The analysis was done through an algorithm to detect motion based on the differences of the flow direction of the magnitude that occurs between image frames. The result of the analysis showed which one of the techniques is more effective in detecting the motion of objects that occurs in the video.


international conference on information and communication technology | 2016

Lecturer Promotion Assessment System based on Fuzzy Logic

T. Tan Zizi; N. Othman; Norulzahrah Mohd Zainudin; Norshahriah Wahab; Nor Asiakin Hasbullah; Suzaimah Ramli; Norazlin Ibrahim

Lecturer Promotion Assessment System for Department of Computer Science, Faculty of Science and Technology Defence was built to help the promotion of lecturers featured appraiser to conduct an initial assessment of the eligibility status of lecturers. The lecturer will be treated as eligible, in observation or tidal worth in value that has been set to proceed with the application promotion. It is because, in the application for promotion of lecturers it includes several procedures such as application delivery and assessment meetings between committee members. Thus the system helps the evaluator by using the Fuzzy Logic method consists of several phases which are fuzzification, fuzzy inference system and defuzzification. The system uses the engine type Mamdani fuzzy inference system and defuzzification through technique of centroid of Gravity (COG) as the output. Each of the estimated assessment will be compared with a database that has been set before produced as output. There are several ways to analyze the results of these feasibility of using graphs and message box. The construction of this system is expected to help ease the burden of the assessors and settle the problems that arise. In fact, this system may also be a drive to the use of more high-tech systems and artificial intelligence features along with the rapidly evolving technology now.


international conference for internet technology and secured transactions | 2015

Facial expression change detection algorithm using optical flow technique

Norulzahrah Mohd Zainudin; Suzaimah Ramli; Tuan Khalisah Tan Zizi; Nor Asiakin Hasbullah; Norazlin Ibrahim

This study is aimed to investigate the use of optical flow techniques in detecting changes in facial expressions. A person face expression detection is very important as we can identify a persons emotional and mental state. When communicating with people, human can identify someones expression accurately compared to computer. Although many approaches are tackled on this topic, there are still several drawbacks and limitations. In order to yield better results, we have applied optical flow technique to detect facial expression. In addition, we have the technique with Horn-Schunck method to optimize the results. Based on the experiment conducted, the average value represented by every facial expression can be identified, and the values are significant for future research that is focused on facial expression classification.


international colloquium on signal processing and its applications | 2015

Temperature determining method from motion detection using thermal images

Siti Nurhana Abd Wahab; Suzaimah Ramli; Norulzahrah Mohd Zainudin

This paper present a basic determining method to illustrate the optical flow estimation using motion information to detect the elevated temperature of febrile individual in thermal image sequences. Object detection on this paper focus on motion based rather than feature based. Target classification using physical based approach and optical flow algorithm to identifies the moving object. Proposed method in this paper will merge visual and thermal images to create “heat picture” of a object. Using thermal camera, a pointer automatically shows the hottest area in the picture, which is detect of object/human body temperature from motion recognition.


international visual informatics conference | 2013

Comparison of Edge Detection Technique for Lane Analysis by Improved Hough Transform

Muhamad Lazim Talib; Xio Rui; Kamarul Hawari Ghazali; Norulzahrah Mohd Zainudin; Suzaimah Ramli

Lane detection system for car driver assisted becomes an important study to be implemented for safety purposes. It used to lessen possibility of traffic accidents, to monitor the position of a car effectively and to contribute for further development of autonomous navigation technology. In this paper, we proposed an improved Hough transform technique to detect road lane where a comparison has been made on edge detection technique of Canny, Sobel and Roberts. The improved Hough Transform used to extract the features of structured roads. The close field-of-view scope adopts a straight line model to accelerate the speed of data calculation and to find the fitting line. Prior-knowledge is used in lane finding process to efficiently decrease Hough space efficiently, thus enhancing its robustness by improving the processing speed. The algorithm gave good result in detecting straight and smooth curvature lane on highway even when the lane was affected by shadow. The data of road lane has been taken in a video format. Experiment has been done by making a comparison of edge detection technique and we find that the best method that produces high accuracy of detection is by using canny edge detector.


Archive | 2017

Aggressive movement detection using optical flow features base on digital & thermal camera

Suzaimah Ramli; Norulzahrah Mohd Zainudin; Nor Asiakin Hasbullah; Norshariah Abdul Wahab; Noor Afiza Mat Razali; Norazlin Ibrahim

Collaboration


Dive into the Norulzahrah Mohd Zainudin's collaboration.

Top Co-Authors

Avatar

Suzaimah Ramli

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Nor Asiakin Hasbullah

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Norshahriah Wahab

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mat Razali Noor Afiza

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Fahmi Mohamad Amran

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

N. Othman

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Nurjannatul Jannah Aqilah Md Saad

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

T. Tan Zizi

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Tuan Khalisah Tan Zizi

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

F. Mohd Azizi

National Defence University of Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge