Claim Missing Document
Check
Articles

Found 6 Documents
Search

Vista Angkasa Apartment Management System Thevaraju, Devi Priya; Zakaria, Zalmiyah; Mohamad Sukri, Khairul Amin; Kasim, Shahreen
International Journal of Advanced Science Computing and Engineering Vol. 1 No. 2 (2019)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1110.338 KB) | DOI: 10.62527/ijasce.1.2.4

Abstract

Vista Angkasa Apartment is one of the oldest apartments in the Bangsar South area, with a total of 8 blocks and consisting of more than 1000 units of houses. Currently, all the transaction related to the maintenance of each apartment is recorded manually. It is very difficult to manage all the data manually and if some information is required urgently then to obtain it also is very difficult. It will not only take a lot of time, but it also increases the chances of errors. Therefore, to solve the issues faced, an apartment management system that allows management staff to view the apartment’s data and tenant’s data as well as maintenance requests, notices and complaints has been developed. It also increases the efficiency and the effectiveness of Vista Angkasa Apartment Management by eliminating the current manual system. Compilation of data can be done easily with just a click of mouse. The methodology that has been applied to develop the system will be Agile with the PHP programming language. The developed system has successfully tested with the real time data at the Vista Angkasa Apartment. Based on the obtained results, the Vista Angkasa Apartment Management System solved the current issues with the management office and tenants.
University Course Timetabling System For Part-Time Students Ruslaan, Mohd Asyraf; Zakaria, Zalmiyah; Saringat, Mohd Zainuri; Kasim, Shahreen
International Journal of Advanced Science Computing and Engineering Vol. 1 No. 2 (2019)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (297.012 KB) | DOI: 10.62527/ijasce.1.2.5

Abstract

University timetabling system is a part of a timetabling problem that aims to produce course timetable that meets student needs such as the maximum number of subjects that can be offered, the maximum number of elective subjects that can be offered and the number of subject students can take. In every semester, the timetabling process in UTMSPACE is done manually where there are likely to be a small number of students who will have problems because the subject to be taken is not in the subjects offering list. Additionally, the number of subjects offered is also not optimal and this will result in a loss on UTMSPACE because each subject is offered at a cost. Therefore, in order to solve this problem, the Heuristic-based approach is used to overcome the problems mentioned and speed up the process to generate timetable. Heuristic engines have been developed using PHP language programming. This approach has been successfully tested and implemented using real-time scheduling data at UTMSPACE for Software Engineering course. The results show that Heuristics has successfully solved the problem of producing a timetable without affecting students who want to enroll the subject offered.
Diagnosis Specialist System at Palm Oil Hassan, Norhasniza; Zakaria, Zalmiyah; Ali Shah, Zuraini; Abdullah, Noryusliza; Kasim, Shahreen
International Journal of Advanced Science Computing and Engineering Vol. 1 No. 2 (2019)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (764.72 KB) | DOI: 10.62527/ijasce.1.2.13

Abstract

 The project that was developed is a computerize system that will be ableto diagnose problems happened to palm oil tree. Generally, there is twomain problem that always happened to palm oil tree; disease and pest.This system developed to store the knowledge in the related field into aknowledge base to help the newcomer in this field to make a decision tosettle the problem faced. To solve this problem, data driven searchtechnique applied to search for the symptom stored in the knowledgebase. The system developed using expert system concept. Based on thisconcept, a knowledge base was built to store all the knowledge compiled.Inference engine used to search the knowledge in the knowledge base.The knowledge based was stored in MySQL database and the inferenceengine was developed using PHP language.
Online Diagnose System for Risk of Kidney Failure Mohd Noh, Noraziah; Zakaria, Zalmiyah; Kasim, Shahreen
International Journal of Advanced Science Computing and Engineering Vol. 1 No. 1 (2019)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1098.026 KB) | DOI: 10.62527/ijasce.1.1.17

Abstract

Renal or kidney failure, only a few citizen alert in this renal failure problem. They have a lot of thing to done, and disregard on their healthy matter, especially on organ healthy that it cannot be see directly on our eyes. On that matter, online Diagnosis Renal Failure system is developed to help society to diagnose their healthy on renal failure view. System is developed online to give an advantage to society to achieve or access the system everywhere. System has two major module, diagnosis module and information module. Diagnosis module is the part where the user can make a diagnose. Information module has two sub modules, information on renal failure and information on dialysis center all around city in peninsular Malaysia. The system development is performed on expert system methodology with prototyping as the model. Production rules technique is used to represent knowledge and for searching process pattern matching technique has been use. The system expectantly can give a benefit to society and performing diagnosis in represent the knowledge of expert in medical field.
Test Case Prioritization for Software Product Line: A Systematic Mapping Study Idham, Muhammad; Halim, Shahliza Abd; Jawawi, Dayang Norhayati Abang; Zakaria, Zalmiyah; Erianda, Aldo; Arss, Nachnoer
JOIV : International Journal on Informatics Visualization Vol 7, No 3-2 (2023): Empowering the Future: The Role of Information Technology in Building Resilien
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3-2.1340

Abstract

Combinatorial explosion remains a common issue in testing. Due to the vast number of product variants, the number of test cases required for comprehensive coverage has significantly increased. One of the techniques to efficiently tackle this problem is prioritizing the test suites using a regression testing method. However, there is a lack of comprehensive reviews focusing on test case prioritization in SPLs. To address this research gap, this paper proposed a systematic mapping study to observe the extent of test case prioritization usage in Software Product Line Testing. The study aims to classify various aspects of SPL-TCP (Software Product Line – Test Case Prioritization), including methods, criteria, measurements, constraints, empirical studies, and domains. Over the last ten years, a thorough investigation uncovered twenty-four primary studies, consisting of 12 journal articles and 12 conference papers, all related to Test Case Prioritization for SPLs. This systematic mapping study presents a comprehensive classification of the different approaches to test case prioritization for Software Product Lines. This classification can be valuable in identifying the most suitable strategies to address specific challenges and serves as a guide for future research works. In conclusion, this mapping study systematically classifies different approaches to test case prioritization in Software Product Lines. The results of this study can serve as a valuable resource for addressing challenges in SPL testing and provide insights for future research.
Entropy Based Method for Malicious File Detection Edzuan Zainodin, Muhammad; Zakaria, Zalmiyah; Hassan, Rohayanti; Abdullah, Zubaile
JOIV : International Journal on Informatics Visualization Vol 6, No 4 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.4.1265

Abstract

Ransomware is by no means a recent invention, having existed as far back as 1989, yet it still poses a real threat in the 21st century. Given the increasing number of computer users in recent years, this threat will only continue to grow, affecting more victims as well as increasing the losses incurred towards the people and organizations impacted in a successful attack. In most cases, the only remaining courses of action open to victims of such attacks were the following: either pay the ransom or lose their data. One commonly shared behavior by all crypto ransomware strains is that there will be attempts to encrypt the victims’ files at a certain point during the ransomware execution. This paper demonstrates a technique that can identify when these encrypted files are being generated and is independent of the strain of the ransomware. Previous research has highlighted the difficulty in differentiating between compressed and encrypted files using Shannon entropy, as both file types exhibit similar values. Among the experiments described in this study, one showed a unique characteristic for the Shannon entropy of encrypted file header fragments, which was used to differentiate between encrypted files and other high entropy files such as archives. The Shannon entropy of encrypted file header fragments has a unique characteristic in one of the tests discussed in this study. This property was used to distinguish encrypted files from other files with high entropy, such as archives. To overcome this drawback, this study proposed an approach for test case generation by enhancing the entropy-based threat tree model, which would improve malicious file identification. The file identification was enhanced by combining three entropy algorithms, and the test case was generated based on the threat tree model. This approach was then evaluated using accuracy measurements: True Positive, True Negative, False Positive, False Negative. A promising result is expected. This method solves the challenge of leveraging file entropy to distinguish compressed and archived files from ransomware-encrypted files in a timely manner.