Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 508

Search results for: Aswami Fadillah bin Mohd Ariffin

508 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 233
507 Cryptocurrency Forensics: Analysis on Bitcoin E-Wallet from Computer Source Evidence

Authors: Muhammad Nooraiman bin Noorashid, Mohd Sharizuan bin Mohd Omar, Mohd Zabri Adil bin Talib, Aswami Fadillah bin Mohd Ariffin

Abstract:

Nowadays cryptocurrency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The cryptocurrency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin cryptocurrency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, digital wallet, digital forensics

Procedia PDF Downloads 292
506 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation

Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.

Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques

Procedia PDF Downloads 244
505 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10

Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin

Abstract:

The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.

Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10

Procedia PDF Downloads 135
504 Prediction of Changes in Optical Quality by Tissue Redness after Pterygium Surgery

Authors: Mohd Radzi Hilmi, Mohd Zulfaezal Che Azemin, Khairidzan Mohd Kamal, Azrin Esmady Ariffin, Mohd Izzuddin Mohd Tamrin, Norfazrina Abdul Gaffur, Tengku Mohd Tengku Sembok

Abstract:

Purpose: The purpose of this study is to predict optical quality changes after pterygium surgery using tissue redness grading. Methods: Sixty-eight primary pterygium participants were selected from patients who visited an ophthalmology clinic. We developed a semi-automated computer program to measure the pterygium fibrovascular redness from digital pterygium images. The outcome of this software is a continuous scale grading of 1 (minimum redness) to 3 (maximum redness). The region of interest (ROI) was selected manually using the software. Reliability was determined by repeat grading of all 68 images and its association with contrast sensitivity function (CSF) and visual acuity (VA) was examined. Results: The mean and standard deviation of redness of the pterygium fibrovascular images was 1.88 ± 0.55. Intra- and inter-grader reliability estimates were high with intraclass correlation ranging from 0.97 to 0.98. The new grading was positively associated with CSF (p<0.01) and VA (p<0.01). The redness grading was able to predict 25% and 23% of the variance in the CSF and the VA respectively. Conclusions: The new grading of pterygium fibrovascular redness can be reliably measured from digital images and show a good correlation with CSF and VA. The redness grading can be used in addition to the existing pterygium grading.

Keywords: contrast sensitivity, pterygium, redness, visual acuity

Procedia PDF Downloads 469
503 Changes in Religious Belief after Flood Disasters

Authors: Sapora Sipon, Mohd Fo’ad Sakdan, Che Su Mustaffa, Najib Ahmad Marzuki, Mohamad Sukeri Khalid, Mohd Taib Ariffin, Husni Mohd Radzi, Salhah Abdullah

Abstract:

Flood disasters occur throughout the world including Malaysia. The major flood disaster that hit Malaysia in the 2014-2015 episodes proved the psychosocial and mental health consequences such as vivid images of destruction, upheaval, death and loss of lives. Flood, flood survivors reported that flood has changed one looks at their religious belief. The main objective of this paper is to investigate the changes in religious belief after the 2014-2015 Malaysia flood disaster. The total population of 1300 respondents who experienced the 2014-2015 Malaysia flood were surveyed a month after the disaster. The questionnaires were used to measure religiosity and stress. The results provide compelling evidence that religion played an important role in the lives of Malaysia flood disasters’ survivor where more than half of the respondents (>75%) experiencing the strengthening of their religious belief. It was also reported the victims’ strengthening of their religious belief proved to be a powerful factor in reducing stress in the aftermath of the flood.

Keywords: religious belief, flood disaster, humanity, society

Procedia PDF Downloads 364
502 Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis

Authors: Yunos Zahri, Ariffin Aswami

Abstract:

Cyber terrorism represents the convergence of two worlds: virtual and physical. The virtual world is a place in which computer programs function and data move, whereas the physical world is where people live and function. The merging of these two domains is the interface being targeted in the incidence of cyber terrorism. To better understand why cyber terrorism acts are committed, this study presents the context of cyber terrorism from motivational perspectives. Motivational forces behind cyber terrorism can be social, political, ideological and economic. In this research, data are analyzed using a qualitative method. A semi-structured interview with purposive sampling was used for data collection. With the growing interconnectedness between critical infrastructures and Information & Communication Technology (ICT), selecting targets that facilitate maximum disruption can significantly influence terrorists. This work provides a baseline for defining the concept of cyber terrorism from motivational perspectives.

Keywords: cyber terrorism, terrorism, motivation, qualitative analysis

Procedia PDF Downloads 368
501 Comparison of Corneal Curvature Measurements Conducted with Tomey AO-2000® and the Current Standard Biometer IOL Master®

Authors: Mohd Radzi Hilmi, Khairidzan Mohd Kamal, Che Azemin Mohd Zulfaezal, Ariffin Azrin Esmady

Abstract:

Purpose: Corneal curvature (CC) is an important anterior segment parameter. This study compared CC measurements conducted with two optical devices in phakic eyes. Methods: Sixty phakic eyes of 30 patients were enrolled in this study. CC was measured three times with the optical biometer and topography-keratometer Tomey AO-2000 (Tomey Corporation, Nagoya, Japan), then with the standard partial optical coherence interferometry (PCI) IOL Master (Carl Zeiss Meditec, Dublin, CA) and data were statistically analysed. Results: The measurements resulted in a mean CC of 43.86 ± 1.57 D with Tomey AO-2000 and 43.84 ± 1.55 D with IOL Master. Distribution of data is normal, and no significance difference in CC values was detected (P = 0.952) between the two devices. Correlation between CC measurements was highly significant (r = 0. 99; P < 0.0001). The mean difference of CC values between devices was 0.017 D and 95% limit of agreement was -0.088 to 0.12. Duration taken for measurements with the standard biometer IOL Master was longer (55.17 ± 2.24 seconds) than with Tomey AO-2000 (39.88 ± 2.38 seconds) in automatic mode. Duration of manual measurement with Tomey AO-2000 in manual mode was the shortest (28.57 ± 2.71 seconds). Conclusion: In phakic eyes, CC measured with Tomey AO-2000 and IOL Master showed similar values, and high correlation was observed between these two devices. This shows that both devices can be used interchangeably. Tomey AO-2000 is better in terms of faster to operate and has its own topography systems.

Keywords: corneal topography, corneal curvature, IOL Master, Tomey AO2000

Procedia PDF Downloads 342
500 The Effect of Second Victim-Related Distress on Work-Related Outcomes in Tertiary Care, Kelantan, Malaysia

Authors: Ahmad Zulfahmi Mohd Kamaruzaman, Mohd Ismail Ibrahim, Ariffin Marzuki Mokhtar, Maizun Mohd Zain, Saiful Nazri Satiman, Mohd Najib Majdi Yaacob

Abstract:

Background: Aftermath any patient safety incidents, the involved healthcare providers possibly sustained second victim-related distress (second victim distress and reduced their professional efficacy), with subsequent negative work-related outcomes or vice versa cultivating resilience. This study aimed to investigate the factors affecting negative work-related outcomes and resilience, with the triad of support; colleague, supervisor, and institutional support as the hypothetical mediators. Methods: This was a cross sectional study recruiting a total of 733 healthcare providers from three tertiary care in Kelantan, Malaysia. Three steps of hierarchical linear regression were developed for each outcome; negative work-related outcomes and resilience. Then, four multiple mediator models of support triad were analyzed. Results: Second victim distress, professional efficacy, and the support triad contributed significantly for each regression model. In the pathway of professional efficacy on each negative work-related outcomes and resilience, colleague support partially mediated the relationship. As for second victim distress on negative work related outcomes, colleague and supervisor support were the partial mediator, and on resilience; all support triad also produced a similar effect. Conclusion: Second victim distress, professional efficacy, and the support triad influenced the relationship with the negative work-related outcomes and resilience. Support triad as the mediators ameliorated the effect in between and explained the urgency of having good support for recovery post encountering patient safety incidents.

Keywords: second victims, patient safety incidents, hierarchical linear regression, mediation, support

Procedia PDF Downloads 63
499 Determination of Alkali Treatment Conditions Effects That Influence the Variability of Kenaf Fiber Mean Cross-Sectional Area

Authors: Mohd Yussni Hashim, Mohd Nazrul Roslan, Shahruddin Mahzan Mohd Zin, Saparudin Ariffin

Abstract:

Fiber cross-sectional area value is a crucial factor in determining the strength properties of natural fiber. Furthermore, unlike synthetic fiber, a diameter and cross-sectional area of natural fiber has a large variation along and between the fibers. This study aims to determine the main and interaction effects of alkali treatment conditions that influence kenaf bast fiber mean cross-sectional area. Three alkali treatment conditions at two different levels were selected. The conditions setting were alkali concentrations at two and ten w/v %; fiber immersed temperature at room temperature and 1000C; and fiber immersed duration for 30 and 480 minute. Untreated kenaf fiber was used as a control unit. Kenaf bast fiber bundle mounting tab was prepared according to ASTM C1557-03. The cross-sectional area was measured using a Leica video analyzer. The study result showed that kenaf fiber bundle mean cross-sectional area was reduced 6.77% to 29.88% after alkali treatment. From the analysis of variance, it shows that the interaction of alkali concentration and immersed time has a higher magnitude at 0.1619 compared to alkali concentration and immersed temperature interaction that was 0.0896. For the main effect, alkali concentration factor contributes to the higher magnitude at 0.1372 which indicated the decrease pattern of variability when the level changed from lower to the higher level. Then, it was followed by immersed temperature at 0.1261 and immersed time at 0.0696 magnitudes.

Keywords: natural fiber, kenaf bast fiber bundles, alkali treatment, cross-sectional area

Procedia PDF Downloads 385
498 Failure to React Positively to Flood Early Warning Systems: Lessons Learned by Flood Victims from Flash Flood Disasters: the Malaysia Experience

Authors: Mohamad Sukeri Khalid, Che Su Mustaffa, Mohd Najib Marzuki, Mohd Fo’ad Sakdan, Sapora Sipon, Mohd Taib Ariffin, Shazwani Shafiai

Abstract:

This paper describes the issues relating to the role of the flash flood early warning system provided by the Malaysian Government to the communities in Malaysia, specifically during the flash flood disaster in the Cameron Highlands, Malaysia. Normally, flash flood disasters can occur as a result of heavy rainfall in an area, and that water may possibly cause flooding via streams or narrow channels. For this study, the flash flood disaster in the Cameron Highlands occurred on 23 October 2013, and as a result the Sungai Bertam overflowed after the release of water from the Sultan Abu Bakar Dam. This release of water from the dam caused flash flooding which led to damage to properties and also the death of residents and livestock in the area. Therefore, the effort of this study is to identify the perceptions of the flash flood victims on the role of the flash flood early warning system. For the purposes of this study, data collection was gathered from those flood victims who were willing to participate in this study through face-to-face interviews. This approach helped the researcher to glean in-depth information about their feeling and perceptions on the role of the flash flood early warning system offered by the government. The data were analysed descriptively and the findings show that the respondents of 22 flood victims believe strongly that the flash flood early warning system was confusing and dysfunctional, and communities had failed to response positively to it. Therefore, most of the communities were not well prepared for the releasing of water from the dam that caused property damage and 3 people were killed in Cameron Highland flash flood disaster.

Keywords: communities affected, disaster management, early warning system, flash flood disaster

Procedia PDF Downloads 657
497 Isolation and Identification Fibrinolytic Protease Endophytic Fungi from Hibiscus Leaves in Shah Alam

Authors: Mohd Sidek Ahmad, Zainon Mohd Noor, Zaidah Zainal Ariffin

Abstract:

Fibrin degradation is an important part in prevention or treatment of intravascular thrombosis and cardiovascular diseases. Plasmin like fibrinolytic enzymes has given new hope to patient with cardiovascular diseases by treating fibrin aggregation related diseases with traditional plasminogen activator which have many side effects. Various researches involving wide range of sources for production of fibrinolytic proteases, from bacteria, fungi, insects and fermented foods. But few have looked into endophytic fungi as a potential source. Sixteen (16) endophytic fungi were isolated from Hibiscus sp. leaves from six different locations in Shah Alam, Selangor. Only two endophytic fungi, FH3 and S13 showed positive fibrinolytic protease activities. FH3 produced 5.78cm and S13 produced 4.48cm on Skim Milk Agar after 4 days of incubation at 27°C. Fibrinolytic activity was observed; 3.87cm and 1.82cm diameter clear zone on fibrin plate of FH3 and S13 respectively. 18srRNA was done for identification of the isolated fungi with positive fibrinolytic protease. S13 had the highest similarity (100%) to that of Penicillium citrinum strain TG2 and FH3 had the highest similarity (99%) to that of Fusarium sp. FW2PhC1, Fusarium sp. 13002, Fusarium sp. 08006, Fusarium equiseti strain Salicorn 8 and Fungal sp. FCASAn-2. Media composition variation showed the effects of carbon nitrogen on protein concentration, where the decrement of 50% of media composition caused drastic decrease in protease of FH3 from 1.081 to 0.056 and also S13 from 2.946 to 0.198.

Keywords: isolation, identification, fibrinolytic protease, endophytic fungi, Hibiscus leaves

Procedia PDF Downloads 372
496 Planning for a Sustainable Islamic City in Malaysia

Authors: Mohd Yazid M. Yunos, R. Arinah, Nor Kalsum M. Isa, U. Nangkula, Nor A. Ismail, Nor F. Ariffin

Abstract:

Islamic City planning is a concept of optimizing the overall arrangement of land use without compromising community. The concept was influenced by the specific intentions in mind, applying certain ideological principles and objectives rooted in Islamic faith and Muslim culture using distinct design elements. Holy Quran and hadiths provide a foundation for understanding Islamic Principles as clearly shared by the established Islamic Cities such as Medina, Mecca and Jerusalem. This paper aimed to explore the principles and elements of an Islamic City through the review of relevant literature by the means of Content Analysis method. A theoretical framework of Islamic City Principles was then formulated to be the main outcome of the study. The finding is very important to be a useful starting point for future study, especially for formulating a clear guide for the development of upcoming Islamic City in Malaysia.

Keywords: Islamic principles, sustainable city planning, Islamic city, Malaysia

Procedia PDF Downloads 479
495 Social Network Impact on Self Learning in Teaching and Learning in UPSI (Universiti Pendidikan Sultan Idris)

Authors: Azli Bin Ariffin, Noor Amy Afiza Binti Mohd Yusof

Abstract:

This study aims to identify effect of social network usage on the self-learning method in teaching and learning at Sultan Idris Education University. The study involved 270 respondents consisting of students in the pre-graduate and post-graduate levels from nine fields of study offered. Assessment instrument used is questionnaire which measures respondent’s background includes level of study, years of study and field of study. Also measured the extent to which social pages used for self-learning and effect received when using social network for self-learning in learning process. The results of the study showed that students always visit Facebook more than other social sites. But, it is not for the purpose of self-learning. Analyzed data showed that 45.5% students not sure about using social sites for self-learning. But they realize the positive effect that they will received when use social sites for self-learning to improve teaching and learning process when 72.7% respondent agreed with all the statements provided.

Keywords: facebook, self-learning, social network, teaching, learning

Procedia PDF Downloads 489
494 Enzymatic Synthesis of Olive-Based Ferulate Esters: Optimization by Response Surface Methodology

Authors: S. Mat Radzi, N. J. Abd Rahman, H. Mohd Noor, N. Ariffin

Abstract:

Ferulic acid has widespread industrial potential by virtue of its antioxidant properties. However, it is partially soluble in aqueous media, limiting their usefulness in oil-based processes in food, cosmetic, pharmaceutical, and material industry. Therefore, modification of ferulic acid should be made by producing of more lipophilic derivatives. In this study, a preliminary investigation of lipase-catalyzed trans-esterification reaction of ethyl ferulate and olive oil was investigated. The reaction was catalyzed by immobilized lipase from Candida antarctica (Novozym 435), to produce ferulate ester, a sunscreen agent. A statistical approach of Response surface methodology (RSM) was used to evaluate the interactive effects of reaction temperature (40-80°C), reaction time (4-12 hours), and amount of enzyme (0.1-0.5 g). The optimum conditions derived via RSM were reaction temperature 60°C, reaction time 2.34 hours, and amount of enzyme 0.3 g. The actual experimental yield was 59.6% ferulate ester under optimum condition, which compared well to the maximum predicted value of 58.0%.

Keywords: ferulic acid, enzymatic synthesis, esters, RSM

Procedia PDF Downloads 292
493 A New Modification of Nonlinear Conjugate Gradient Coefficients with Global Convergence Properties

Authors: Ahmad Alhawarat, Mustafa Mamat, Mohd Rivaie, Ismail Mohd

Abstract:

Conjugate gradient method has been enormously used to solve large scale unconstrained optimization problems due to the number of iteration, memory, CPU time, and convergence property, in this paper we find a new class of nonlinear conjugate gradient coefficient with global convergence properties proved by exact line search. The numerical results for our new βK give a good result when it compared with well-known formulas.

Keywords: conjugate gradient method, conjugate gradient coefficient, global convergence

Procedia PDF Downloads 399
492 Towards Integrating Statistical Color Features for Human Skin Detection

Authors: Mohd Zamri Osman, Mohd Aizaini Maarof, Mohd Foad Rohani

Abstract:

Human skin detection recognized as the primary step in most of the applications such as face detection, illicit image filtering, hand recognition and video surveillance. The performance of any skin detection applications greatly relies on the two components: feature extraction and classification method. Skin color is the most vital information used for skin detection purpose. However, color feature alone sometimes could not handle images with having same color distribution with skin color. A color feature of pixel-based does not eliminate the skin-like color due to the intensity of skin and skin-like color fall under the same distribution. Hence, the statistical color analysis will be exploited such mean and standard deviation as an additional feature to increase the reliability of skin detector. In this paper, we studied the effectiveness of statistical color feature for human skin detection. Furthermore, the paper analyzed the integrated color and texture using eight classifiers with three color spaces of RGB, YCbCr, and HSV. The experimental results show that the integrating statistical feature using Random Forest classifier achieved a significant performance with an F1-score 0.969.

Keywords: color space, neural network, random forest, skin detection, statistical feature

Procedia PDF Downloads 407
491 Cytochrome B Marker Reveals Three Distinct Genetic Lineages of the Oriental Latrine Fly Chrysomya megacephala (Diptera: Calliphoridae) in Malaysia

Authors: Rajagopal Kavitha, Van Lun Low, Mohd Sofian-Azirun, Chee Dhang Chen, Mohd Yusof Farida Zuraina, Mohd Salleh Ahmad Firdaus, Navaratnam Shanti, Abdul Haiyee Zaibunnisa

Abstract:

This study investigated the hidden genetic lineages in the oriental latrine fly Chrysomya megacephala (Fabricius) across four states (i.e., Johore, Pahang, Perak and Selangor) and a federal territory (i.e., Kuala Lumpur) in Malaysia using Cytochrome b (Cyt b) genetic marker. The Cyt b phylogenetic tree and haplotype network revealed three distinct genetic lineages of Ch. megacephala. Lineage A, the basal clade was restricted to flies that originated from Kuala Lumpur and Selangor, while Lineages B and C, comprised of flies from all studied populations. An overlap of the three genetically divergent groups of Ch. megacephala was observed. However, the flies from both Kuala Lumpur and Selangor populations consisted of three different lineages, indicating that they are genetically diverse compared to those from Pahang, Perak and Johore.

Keywords: forensic entomology, calliphoridae, mitochondrial DNA, cryptic lineage

Procedia PDF Downloads 464
490 Triangular Geometric Feature for Offline Signature Verification

Authors: Zuraidasahana Zulkarnain, Mohd Shafry Mohd Rahim, Nor Anita Fairos Ismail, Mohd Azhar M. Arsad

Abstract:

Handwritten signature is accepted widely as a biometric characteristic for personal authentication. The use of appropriate features plays an important role in determining accuracy of signature verification; therefore, this paper presents a feature based on the geometrical concept. To achieve the aim, triangle attributes are exploited to design a new feature since the triangle possesses orientation, angle and transformation that would improve accuracy. The proposed feature uses triangulation geometric set comprising of sides, angles and perimeter of a triangle which is derived from the center of gravity of a signature image. For classification purpose, Euclidean classifier along with Voting-based classifier is used to verify the tendency of forgery signature. This classification process is experimented using triangular geometric feature and selected global features. Based on an experiment that was validated using Grupo de Senales 960 (GPDS-960) signature database, the proposed triangular geometric feature achieves a lower Average Error Rates (AER) value with a percentage of 34% as compared to 43% of the selected global feature. As a conclusion, the proposed triangular geometric feature proves to be a more reliable feature for accurate signature verification.

Keywords: biometrics, euclidean classifier, features extraction, offline signature verification, voting-based classifier

Procedia PDF Downloads 336
489 Studies on Induction of Cytotoxicity Through Apoptosis In Ovarian Cancer Cell Line (CAOV-3) by Chloroform Extract of Artocarpus Kemando Miq

Authors: Noor Shafifiyaz Mohd Yazid, Najihah Mohd Hashim, Hapipah Mohd Ali, Syam Mohan, Rosea Go

Abstract:

Artocarpus kemando is a plant species from Moraceae family. This plant is used as household utensil by the local and the fruits are edible. The plants’ bark was used for the extraction process and yielded the chloroform crude extract which was used to screen for anticancer potential. The cytotoxic effect of the extract on CAOV-3 and WRL 68 cell lines were determined using 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide or MTT assays. Qualitative AO/PI assay was performed to confirm the apoptosis and necrosis process. Meanwhile, the measurement of cell loss, nuclear morphology, DNA content, cell membrane permeability, mitochondrial membrane potential changes and cytochrome c release from mitochondria were detected through cytotoxicity 3 assay. In MTT assay, A. kemando inhibited 50% growth of CAOV-3 cells at 27.9 ± 0:03, 20.1± 0:03, 18.21± 0:04 µg/mL after 24, 48 and 72 hour, respectively. The morphology changes can be seen on CAOV-3 with a production of cell membrane blebbing, cromatin condensation and apoptotic bodies. Evaluation of cytotoxicity 3 on CAOV-3 cells after treated with extract resulting loss of mitochondrial membrane potential and release of cytochrome c from mitochondria. The results demonstrated A. kemando has potentially anticancer agent, particularly on human ovarian cancer.

Keywords: anticancer, Artocarpus kemando, ovarian cancer, cytotoxicity

Procedia PDF Downloads 506
488 Low Back Pain among Nurses in Penang Public Hospitals: A Study on Prevalence and Factors Associated

Authors: Izani Uzair Zubair, Mohd Ismail Ibrahim, Mohd Nazri Shafei, Hassan Merican Omar Naina Merican, Mohamad Sabri Othman, Mohd Izmi Ahmad Ibrahim, Rasilah Ramli, Rajpal Singh Karam Singh

Abstract:

Nurses experience a higher prevalence of low back pain (LBP) and musculoskeletal complaints as compared to other hospital workers. Due to no proper policy related to LBP, the job has exposed them to the problem. Thus, the current study aims to look at the intensity of the problem and factors associated with development of LBP. Method and Tools: A cross sectional study was carried out among 1292 nurses from six public hospitals in Penang. They were randomly selected and those who were pregnant and have been diagnosed to have LBP were excluded. A Malay validated BACK Questionnaire was used. The associated factors were determined by using multiple logistic regression from SPSS version 20.0. Result: Most of the respondents were at mean age 30 years old and had mean working experience 86 months. The prevalence of LBP was identified as 76% (95% CI 74, 82). Factors that were associated with LBP among nurses include lifting a heavy object (OR2.626 (95% CI 1.978, 3.486) p =0.001 and the estimation weight of the lifted object (OR1.443 (95% CI 1.056, 1.970) p =0.021. Conclusion: Nurses who practice lifting heavy object and weight of the object lifted give a significant contribution to the development of LBP. The prevalence of the problem is significantly high. Thus, a proper no weight lifting policy should be considered.

Keywords: low back pain, nurses, Penang public hospital, Penang

Procedia PDF Downloads 439
487 A Review on Light Shafts Rendering for Indoor Scenes

Authors: Hatam H. Ali, Mohd Shahrizal Sunar, Hoshang Kolivand, Mohd Azhar Bin M. Arsad

Abstract:

Rendering light shafts is one of the important topics in computer gaming and interactive applications. The methods and models that are used to generate light shafts play crucial role to make a scene more realistic in computer graphics. This article discusses the image-based shadows and geometric-based shadows that contribute in generating volumetric shadows and light shafts, depending on ray tracing, radiosity, and ray marching technique. The main aim of this study is to provide researchers with background on a progress of light scattering methods so as to make it available for them to determine the technique best suited to their goals. It is also hoped that our classification helps researchers find solutions to the shortcomings of each method.

Keywords: shaft of lights, realistic images, image-based, and geometric-based

Procedia PDF Downloads 238
486 Severity Index Level in Effectively Managing Medium Voltage Underground Power Cable

Authors: Mohd Azraei Pangah Pa'at, Mohd Ruzlin Mohd Mokhtar, Norhidayu Rameli, Tashia Marie Anthony, Huzainie Shafi Abd Halim

Abstract:

Partial Discharge (PD) diagnostic mapping testing is one of the main diagnostic testing techniques that are widely used in the field or onsite testing for underground power cable in medium voltage level. The existence of PD activities is an early indication of insulation weakness hence early detection of PD activities can be determined and provides an initial prediction on the condition of the cable. To effectively manage the results of PD Mapping test, it is important to have acceptable criteria to facilitate prioritization of mitigation action. Tenaga Nasional Berhad (TNB) through Distribution Network (DN) division have developed PD severity model name Severity Index (SI) for offline PD mapping test since 2007 based on onsite test experience. However, this severity index recommendation action had never been revised since its establishment. At presence, PD measurements data have been extensively increased, hence the severity level indication and the effectiveness of the recommendation actions can be analyzed and verified again. Based on the new revision, the recommended action to be taken will be able to reflect the actual defect condition. Hence, will be accurately prioritizing preventive action plan and minimizing maintenance expenditure.

Keywords: partial discharge, severity index, diagnostic testing, medium voltage, power cable

Procedia PDF Downloads 126
485 Microwave-Assisted Synthesis of Silver Nanoparticles from Dioscorea Deltoidea Callus Extract and Evaluation of Its Antimicrobial Activity

Authors: Mujeeb Mohd, Aqil Mohd, A. K. Najmi, Akhtar MMohd, Vasim Mohd

Abstract:

Dioscorea deltoidea belongs to the Dioscoreaceae family, is usually found in the north-western Himalayas and some other parts of the world up to an altitude of 1000–3000 m. D. deltoidea commonly known as yam and is an extensively used medicinal plant in the indigenous system of medicine. It has been reported to contain dioscine a steroidal glycoside in higher concentration. In the present investigation, silver nanoparticles (AgNPs) have been synthesized by a simple, efficient, environmentally benevolent and economic microwave-assisted method. Callus culture of D. deltoidea was developed and maintained on Murashige and skooge basal medium supplemented with different combination and concentration of plant growth regulators. Aqueous extract of callus culture was used as the reducing and stabilizing agent. The synthesized nanoparticles have been characterized by UV–Vis spectroscopy, Fourier transform infrared spectroscopy (FT-IR), transmission electron microscopy (TEM), scanning electron microscopy (SEM) and X-ray diffraction (XRD analysis. The presence of a characteristic surface plasmon resonance (SPR) absorption band at 430 nm in UV–Vis reveals the reduction of silver metal ions into silver nanoparticles. Whereas FTIR analysis was performed to probe the possible functional group involved in the synthesis of AgNPs. Further extract and AgNPs were evaluated for antimicrobial activity against different pathogenic microorganisms.

Keywords: antimicrobial, Dioscorea deltoidea, microwave, silver, nanoparticles

Procedia PDF Downloads 231
484 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation

Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin

Abstract:

The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.

Keywords: ISMS success factors, IT project management, IS success, information security

Procedia PDF Downloads 264
483 The Influencing Factors of Export Performance Amongst Halal Small and Medium-Sized Enterprises (SMEs) in Malaysia

Authors: Shanorfizah Mohd Safar, Shaizatulaqma Kamalul Ariffin

Abstract:

Internationalization of halal small and medium-sized enterprises (SMEs) is necessary for SMEs to become more involved in regional trade and business cooperation. By internationalization, SMEs' profit can increase, and market expansion of SMEs is basic for rising economies of countries to contend all around in the halal industry globally. There are several modes of internationalization; exporting is one of the first steps for internationalization with less capital needed. The study examines the influential factors of export performance amongst halal SMEs in Malaysia. Specifically, this study examines the positive and significant relationships amongst human capital, managerial capability, Halal Assurance Management System (HAMS), digital transformation, government support, and networking capability on halal SMEs' export performance toward SMEs' competitive advantage. In addition, this study will examine innovation capabilities as a moderator in the relationship between independence variables and competitive advantage. Competitive advantage is the most compelling perspective that drives the export performance of halal SMEs in Malaysia. A quantitative method will be used: an online questionnaire survey distributed through emails and face-to-face toward selected halal-certificated SMEs registered in JAKIM, MATRADE website and SME Corp Malaysia website. Nevertheless, whether the halal SMEs practice global business, they will still be the potential respondents. The data were examined and obtained using the statistical software Smart PLS. The analysis used is reliability, correlation, and regression analysis to meet the research objectives. This study contributes significantly to the theory by integrating Resource Based View (RBV) theory, Technology–Organization–Environment (TOE) framework and Networking theory. In addition, this research extends the RBV by extending a variable, the Halal Assurance Management System. This study also examines a moderating role of innovation capabilities in the framework and competitive advantage as a mediator. This research aims to analyze the factors that will impact the internationalization of halal SMEs.

Keywords: internationalization, halal SMEs, competitive advantage, export performance

Procedia PDF Downloads 27
482 Thermal Properties of Chitosan-Filled Empty Fruit Bunches Filter Media

Authors: Aziatul Niza Sadikin, Norasikin Othman, Mohd Ghazali Mohd Nawawi, Umi Aisah Asli, Roshafima Rasit Ali, Rafiziana Md Kasmani

Abstract:

Non-woven fibrous filter media from empty fruit bunches were fabricated by using chitosan as a binder. Chitosan powder was dissolved in a 1 wt% aqueous acetic acid and 1 wt% to 4 wt% of chitosan solutions was prepared. Chitosan-filled empty fruit bunches filter media have been prepared via wet-layup method. Thermogravimetric analysis (TGA) was performed to study various thermal properties of the fibrous filter media. It was found that the fibrous filter media have undergone several decomposition stages over a range of temperatures as revealed by TGA thermo-grams, where the temperature for 10% weight loss for chitosan-filled EFB filter media and binder-less filter media was at 150oC and 300oC, Respectively.

Keywords: empty fruit bunches, chitosan, filter media, thermal property

Procedia PDF Downloads 401
481 Level Set and Morphological Operation Techniques in Application of Dental Image Segmentation

Authors: Abdolvahab Ehsani Rad, Mohd Shafry Mohd Rahim, Alireza Norouzi

Abstract:

Medical image analysis is one of the great effects of computer image processing. There are several processes to analysis the medical images which the segmentation process is one of the challenging and most important step. In this paper the segmentation method proposed in order to segment the dental radiograph images. Thresholding method has been applied to simplify the images and to morphologically open binary image technique performed to eliminate the unnecessary regions on images. Furthermore, horizontal and vertical integral projection techniques used to extract the each individual tooth from radiograph images. Segmentation process has been done by applying the level set method on each extracted images. Nevertheless, the experiments results by 90% accuracy demonstrate that proposed method achieves high accuracy and promising result.

Keywords: integral production, level set method, morphological operation, segmentation

Procedia PDF Downloads 269
480 The Development of GPS Buoy for Ocean Surface Monitoring: Initial Results

Authors: Anuar Mohd Salleh, Mohd Effendi Daud

Abstract:

This study presents a kinematic positioning approach which is use the GPS buoy for precise ocean surface monitoring. A GPS buoy data from two experiments have been processed using a precise, medium-range differential kinematic technique. In each case the data were collected for more than 24 hours at nearby coastal site at a high rate (1 Hz), along with measurements from neighboring tidal stations, to verify the estimated sea surface heights. Kinematic coordinates of GPS buoy were estimated using the epoch-wise pre-elimination and the backward substitution algorithm. Test results show the centimeter level accuracy in sea surface height determination can be successfully achieved using proposed technique. The centimeter level agreement between two methods also suggests the possibility of using this inexpensive and more flexible GPS buoy equipment to enhance (or even replace) the current use of tidal gauge stations.

Keywords: global positioning system, kinematic GPS, sea surface height, GPS buoy, tide gauge

Procedia PDF Downloads 491
479 Overcoming 4-to-1 Decryption Failure of the Rabin Cryptosystem

Authors: Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah

Abstract:

The square root modulo problem is a known primitive in designing an asymmetric cryptosystem. It was first attempted by Rabin. Decryption failure of the Rabin cryptosystem caused by the 4-to-1 decryption output is overcome efficiently in this work. The proposed scheme to overcome the decryption failure issue (known as the AAβ-cryptosystem) is constructed using a simple mathematical structure, it has low computational requirements and would enable communication devices with low computing power to deploy secure communication procedures efficiently.

Keywords: Rabin cryptosystem, 4-to-1 decryption failure, square root modulo problem, integer factorization problem

Procedia PDF Downloads 413