Articles
Evaluation review of effectiveness and security metrics performance on information technology domain
Roshidi Din;
Rosmadi Bakar;
Azizan Ismail;
Aida Mustapha;
Sunariya Utama
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i2.pp1059-1064
Information Technology (IT) development is the vital required for human life activities in this global era. This implementation of IT system has becomes competitive among developers to increase the quality of system performance. In order to discover the IT performance of system, it neccesary to evaluate the IT implementation performance. It determines the anticipated system output to prepare to enhance the application performance. In this paper the evaluation performance that is reviewd are effectiveness and security metrics because both of evaluations able to improve the development and protection of system. Therefore, this paper classifies some IT domain development that used in term of effectiveness and security metric approach from previous researchers’ effort. It is categorized the domain based on both evaluation term of effectiveness and security metrics from specific parameter their used. The concern of this paper is to discover the important effectiveness and security metrics in IT domain performance that is anticipated to achieve expected performance.
Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique
Roshidi Din;
Sunariya Utama;
Aida Mustapha
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp747-754
Steganography is one of the categories in information hiding that is implemented to conceal the hidden message to ensure it cannot be recognized by human vision. This paper focuses on steganography implementation in text domain namely text steganography. Text steganography consists of two groups, which are word-rule based and feature-based techniques. This paper analysed these two categories of text steganography based on effectiveness and security evaluation because the effectiveness is critically important in order to determine that technique has the appropriate quality. Meanwhile, the security is important due to the intensity performance in securing the hidden message. The main goal of this paper is to review the evaluation of text steganography in terms of effectiveness and security that have been developed by previous research efforts. It is anticipated that this paper will identify the performance of text steganography based on effectiveness and security measurement.
Fasting Ontology in Pillars of Islam
Sara Afiqah Mohd Zailani;
Nurul Aswa Omar;
Aida Mustapha;
Mohd Hisyam Abdul Rahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i2.pp562-569
The development of Fasting Ontology in the Pillars of Islam is presented in this paper and has been built based on reliable sources of Islamic Knowledge. The METHONTOLOGY methodology is used for the ontology development, which include identifying motivation scenarios, creating the competency questions, implementation and evaluation. From the beginning of the development of life cycle, the ontology was appraised from the competency questions and the outcome were clear. Therefore, this ontology can link each concept specifically to the individual verse together with the Tafsir that is related to the topics. The ontology proposed will be part of a larger ontology on Five Pillars of Islam. This development of the ontology is intended to refer to the field of learning for other purpose. For instance, search engine, chatbot, expert system or knowledge-based system.
A review of object-oriented approach for test case prioritization
Umar Farooq;
Hannani Aman;
Aida Mustapha;
Zainuri Saringat
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i1.pp429-434
The most essential phase in regression testing is Test Case Prioritization (TCP), with its primary objective to increase the fault detection rate at different stages during testing. Prior to achieving the objective, existing evidence of techniques in TCP must be synthesized and analyzed. At present, fault detection for TCP based on object-oriented features only consider statement, module, and class level. The important features of object-oriented (OO) programming like inheritance and polymorphism have not been fully explored for fault detection in TCP. Such OO concepts are important for test case selection and in turn for ranking the test cases (prioritization). This paper reviews various test case prioritization techniques specific to OO systems. This review is hoped to highlight the importance and usage of TCP in relation to object-oriented software development lifecycle.
Substitution-based linguistic steganography based on antonyms
Fawwaz Zamir Mansor;
Azizan Ismail;
Roshidi Din;
Aida Mustapha;
Noor Azah Samsudin
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i1.pp530-538
The study of steganography focuses on strengthening the security in protecting content message by hiding the true intention behind the texts. However, existing linguistic steganography approach especially in synonym-based substitution is prone to attack. In this paper, a new substitution-based approach for linguistic steganography is proposed using antonyms. The antonym-based stego-text generation algorithm is implemented in a tool called the Antonym Substitution-based (ASb). Evaluation of ASb was carried out via verification and validation. The results showed highly favorable performance of this approach.
Gamification concept for encouraging lecture attendance
Vinothini Kasinathan;
Aida Mustapha;
Chan Kok Fu;
Mohamad Firdaus Che Abdul Rani;
Sadesh Manikam
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i1.pp482-490
New generation of students has high dependence on technology and embrace social learning environments that have low barrier to access. This means in-class lectures are not popular anymore, and in fact has become a burden for them to cope. To resolve the issue of low student attendance, this paper proposes a character growth game with the concept of gamification in education that is able to track and reward student attendance called PetAttendToClass. PetAttendToClass is a client-based system developed using C# and unity3D game engine. Although finding from the UAT session revealed that some users believed that attendance is the responsibility of the student, gamification is meant to turn this mundane responsibility into something motivative, interactive and interesting. It is hoped that by gamifying the class attendance, student will be motivated to attend their daily classes.
Data Mining Approach to Herbs Classification
Adillah Dayana Ahmad Dali;
Nurul Aswa Omar;
Aida Mustapha
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i2.pp570-576
Herbs are one of the high-value products in Malaysia. The term ‘herbs’ has more than one definition. It is also demanding by multiple manifolds. Herbs are used in many sectors nowadays. The ability to identify variety herbs in the market is quite hard without the intervention of human experts. Unfortunately, human experts are prone to error. Herbs classification is able to assist human experts and at the same time minimizing the intervention. This research performs identification and classification of herbs based on image capture ad variety of classification algorithms such as an Artificial Neural Network (ANN), K-Nearest Neighbors (IBK), Decision Table (DT) and M5P Tree algorithms. The selected algorithms are implemented and evaluated to their relative performance and IBK is found to produce the highest quality outputs.
Analysis review on linguistic steganalysis
Syiham Mohd Lokman;
Aida Mustapha;
Azizan Ismail;
Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i2.pp950-956
Steganography and steganalysis are essential topics for hiding information. Steganography is a technique of conceal secret messages by transmitting data through different domains. Its objective is to avoid discovery of secret messages. Steganalysis, meanwhile, is a method for locating the secret messages contained in the stego text. The objective of steganalysis is to find concealed data and to break the security of its domains. Steganalysis can be categorized into two types: targeted steganalysis and blind steganalysis. Steganography and steganalysis both have domains that are split into natural, also known as linguistic and digital media. There are three kinds of digital media which are picture, video and audio. The aim of this paper is to provide a survey on different linguistic steganalysis techniques used to find secret messages. This paper also highlighted two type of steganalysis method that are used in research and real practice. The discussion include findings on the most recent work on linguistic steganalysis techniques. This review hoped to help future research for improving and enhancing steganalytic capabilities.
An Antonym Substitution-based Model on Linguistic Steganography Method
Fawwaz Zamir Mansor;
Aida Mustapha;
Roshidi Din;
Azizi Abas;
Sunariya Utama
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i1.pp225-232
This paper implement the antonym procedure in substitution-based approach for linguistic steganography that is expected to be an alternative to the existing substitution approach that using synonym. This method is hidden the message as existing approach, however that is changing the semantic of the stego text from cover text as the medium. This paper proposed the development method is named Antonym Substitution-based that applied based on implementation linguistic steganography in covering the secret message. This approach refines the word choices makes antonym substitution-based approach linguistically is comparable with the previous effort of synonym substitution. Furthermore, this paper also used the verification and validation approaches as the procedure to evaluate performance of this method. The evaluation through verification approach used in order to determine the effectiveness and quality performance. This proposed method is expected has become the new technique implementation of linguistic steganography in process securing secret message that hide in the text medium.
Pattern Analysis of Goals Scored in Malaysia Super League 2015
Nazim Razali;
Aida Mustapha;
Filipe Manuel Clemente;
Md Fauzi Ahmad;
Mohamad Aizi Salamat
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp718-724
This paper is set to study the pattern of goals scored across 132 matches in 2015 Malaysian Super League (MSL). Despite of well-known researches in European football, no information in Malaysian football teams has been done consistently. To identify the patterns, this research focuses on goals scored based on timing that includes scoring frequency, the impact of first goal achieved by team towards the final match outcome, as well as the impact of having home advantage for matches during MSL 2015. The findings of this paper will provide useful information on MSL besides helping coaches with fresh insight for creating effective training and tactical plan as the time progressed during match. At the same time, players will also be more prepared for a consistent performance especially when training for matches as the visiting teams.