Afdallyna Fathiyah Harun
Universiti Teknologi MARA

Published : 13 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 8 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

Components of Participatory Engagement within E-Learning Community Noor Hida Natrah Aziz; Haryani Haron; Afdallyna Fathiyah Harun
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp556-561

Abstract

This paper explores the components of participatory engagement to improve learner’s engagement within the e-learning community. Data are gathered through observations to measuring the interactions of the learner’s. The measurement included the learners’ feedbacks through the interactions of learners and educators, learners and learners and learners and content. Follow-up interviews are conducted to get deeper insights into the interactions and overall learner’s engagement environment. Findings show that in order to promote learners’ engagement in e-learning components such as accessibility, mobility, active learning and collaboration must be present in an e-learning ecosystem.
Multi cases optimal reactive power dispatch using evolutionary programming Rahmatul Hidayah Salimin; Ismail Musirin; Zulkiffli Abdul Hamid; Afdallyna Fathiyah Harun; Saiful Izwan Suliman; Hadi Suyono; Rini Hasanah
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp662-670

Abstract

Evolutionary Programming (EP) is one of many types in Evolutionary Computation (EC) that used for optimization process. EP technique is used to find the optimal reactive power dispatch (ORPD) since it is one of the accessible options schemes that can be used on the system as a reactive power support. Sometimes, it is not necessary to operate all generators in order to perform ORPD to in achieve the objectives. Also, increment of reactive power load to the system will cause voltage decomposes with the increase in transmission loss in the system. Therefore, the proposed method decides the best grouping of generators that should be operated in system by bearing in mind the transmission loss reduction. ORPD will be used to minimize the transmission loss as well the increasing reactive power loading. This method conducted on IEEE 30-bus Test System with multi cases scenario. The best combination of operating generators determined and the transmission loss after optimization is smaller compared to the transmission loss before optimization resulted.
Factors influencing cloud computing adoption in higher education institution Wan Abdul Rahim Wan Mohd Isa; Ahmad Iqbal Hakim Suhaimi; Nurulhuda Noordin; Afdallyna Fathiyah Harun; Juhaida Ismail; Rosshidayu Awang Teh
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 1: January 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i1.pp412-419

Abstract

There are few studies on factors influencing cloud computing adoption in higher education institutions. However, there are lacks of understanding of the cloud computing adoption issues in the university. The main objective of this study is to investigate factors influencing cloud computing adoption in a higher education institution. The research method involved using qualitative interviewing with relevant stakeholders and case study at one public university in Malaysia. The analysis was done by using Atlat.ti. There are eighteen factors that have been coded into three main categories of Technological, Organizational and Environmental. These are among factors to influence the decision of cloud computing adoption for a public university. The first category (Technological) consists of nine factors; (i) relative advantage, (ii) cost reduction, (iii) ease of use, (iv) compatibility, (v) operational requirement, (vi) security, (vii) sustainability, (viii) trialability and (ix) complexity, The second category (organizational) consists of four factors; (i) infrastructure readiness, (ii) top management, (iii) knowledge and IT skillset and (iv) financial. The third category (environmental) consists of five factors; (i) Cloud Service Provider, (ii) Geographical, (iii) Data Privacy, (iv) Guideline and Policy, (v) Service Level Agreement (SLA). The result may provide a reference for the adoption of cloud computing in the area of mobile learning or mobile computing. Future work involves conducting similar studies at other case studies including public and private universities in Malaysia.
Genetic algorithm for intrusion detection system in computer network Hamizan Suhaimi; Saiful Izwan Suliman; Afdallyna Fathiyah Harun; Roslina Mohamad; Yuslinda Wati Mohamad Yusof; Murizah Kassim c
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1670-1676

Abstract

Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone’s life or sovereignty of a country if manipulated by wrong hands.  In network intrusion detection system (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of genetic algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD’99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar-patent of problems.   
Network intrusion detection system by using genetic algorithm Hamizan Suhaimi; Saiful Izwan Suliman; Ismail Musirin; Afdallyna Fathiyah Harun; Roslina Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1593-1599

Abstract

Developing a better intrusion detection systems (IDS) has attracted many researchers in the area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is proposed as a tool that capable to identify harmful type of connections in a computer network. Different features of connection data such as duration and types of connection in network were analyzed to generate a set of classification rule. For this project, standard benchmark dataset known as KDD Cup 99 was investigated and utilized to study the effectiveness of the proposed method on this problem domain. The rules comprise of eight variables that were simulated during the training process to detect any malicious connection that can lead to a network intrusion. With good performance in detecting bad connections, this method can be applied in intrusion detection system to identify attack thus improving the security features of a computer network.
ICT-supported for participatory engagement within E-learning community Noor Hida Natrah Aziz; Haryani Haron; Afdallyna Fathiyah Harun
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i1.pp492-499

Abstract

This paper presents ICT-supported for participatory engagement learning within the e-learning community. Effectively tools in e-Learning facilitate interactive learning and the achievement of desired learning outcomes for learners. However, the intensity of its usage is not very remarkable; there is a need to understand ICT- supported for learners from the perspectives of participatory engagement. Therefore, integrating suitable technology into e-learning is expected to strengthen learner's engagement within the e-learning community. The objective of the study is to identify technology that could effectively support learners' engagement. This study analyzes the available technology in the market to integrate into e-learning using the technology evaluation process. Interview sessions with experts were held to validated and suggested other technology uses in e-learning. This research is carrying out with three experts (academic staff) of the e-technologies within the University. This study uses semi-structured interviews to captured expert suggestions, knowledge, and expertise about technologies. Understanding learner's requirements toward technology are essential to ensure learners can reap the benefits of technology usage.  This study uses a thematical analysis to identify and organize key themes from qualitative data. The result reveals mobile technology, wireless technology, live streaming technology, authoring tool, summative assessment, cloud computing, gamification and Instagram is suitable technologies that support participatory engagement activities.
Requirements engineering for User-Centered school food ordering system Diyana Binti Halim Khoo; Afdallyna Fathiyah Harun; Saiful Izwan Suliman
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 1: January 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i1.pp357-364

Abstract

Understanding user requirement for a technology design is central to user experience. A user-centered technology design should consider user needs and constraints as well as abide to the principles of HCI design heuristics. This paper describes the requirements gathering for Kantin Online System, a school food ordering system where we considered the needs and constraints of different stakeholders involved and elicit a compromise where the needs of all parties can be met. We then applied usability heuristics into the system design to facilitate perceived ease of use and perceived usefulness. We conclude this paper with experts’ evaluations towards the heuristic elements of the system design concept and possible future work.
Cloud computing adoption reference model Wan Abdul Rahim Wan Mohd Isa; Ahmad Iqbal Hakim Suhaimi; Nurulhuda Noordin; Afdallyna Fathiyah Harun; Juhaida Ismail; Rosshidayu Awang Teh
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i1.pp395-400

Abstract

This paper presents a study to conceptualize a cloud computing adoption reference model. The case study on the cloud computing adoption was done in one local public university in Malaysia.  The case study was conducted to understand in-depth and real context phenomenon by investigating the influencing factors of cloud computing adoption. The main objective of this study is to design a cloud computing adoption reference model. This study applied Technology-Organizational-Environmental (TOE) Framework by Tornatzky & Fleischer and Diffusion of Innovation by Rogers as the theoretical background of the Cloud Computing Adoption Reference. Ten interviews were conducted with key informants. The theme pattern analysis of data were done by using qualitative computer programs, Atlas.ti. The findings are shown in summarize patterns that supports the conceptualization of cloud computing adoption reference model. Future work include the adaption of cloud computing adoption reference model specifically for the niche area of mobile computing.