Firkhan Ali - Academia.edu (original) (raw)

Papers by Firkhan Ali

Research paper thumbnail of Information Transmission Capacity and Error Control Capability of Collaborative Coding Multiple Access System

Research paper thumbnail of Special Education Classrooms: Can Technology Use Inspired?

International Journal of Professional Business Review

Purpose: This study aim to explore the inspiration of technology in conducting learning process f... more Purpose: This study aim to explore the inspiration of technology in conducting learning process for special education studens in classroom. Framework: It is common knowledge that education today requires teachers to be more creative in delivering learning and teaching in the classroom. Methodology: This study use qualitative approach in gathering the data. 12 teachers were interview in this studies. Findings: The result shows the rapidity of technology is now to some extent helping teachers find fresher ideas to conduct teaching in the classroom. The existence of various types of technology including gadgets, software, video applications and others are seen to be able to attract the interest of students in turn can achieve teaching objectives. However, some studies show that some teachers are less effective in the use of technology when teaching in the classroom. Implications: In addition to speeding up the process of obtaining information, the use of technology also actuall...

Research paper thumbnail of Detecting Malware with Classification Machine Learning Techniques

International Journal of Advanced Computer Science and Applications

In today's digital landscape, the identification of malicious software has become a crucial under... more In today's digital landscape, the identification of malicious software has become a crucial undertaking. The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. Consequently, machine learning strategies have surfaced as a viable means of detecting malware. The following research report focuses on the implementation of classification machine learning methods for detecting malware. The study assesses the effectiveness of several algorithms, including Naïve Bayes, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Decision Tree, Random Forest, and Logistic Regression, through an examination of a publicly accessible dataset featuring both benign files and malware. Additionally, the influence of diverse feature sets and preprocessing techniques on the classifiers' performance is explored. The outcomes of the investigation exhibit that machine learning methods can capably identify malware, attaining elevated precision levels and decreasing false positive rates. Decision Tree and Random Forest display superior performance compared to other algorithms with 100.00% accuracy. Furthermore, it is observed that feature selection and dimensionality reduction techniques can notably enhance classifier effectiveness while mitigating computational complexity. Overall, this research underscores the potential of machine learning approaches for detecting malware and offers valuable guidance for the development of successful malware detection systems.

Research paper thumbnail of Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance

Journal of Advanced Research in Applied Sciences and Engineering Technology, Feb 8, 2023

Research paper thumbnail of Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

Journal of Physics: Conference Series, May 1, 2018

Research paper thumbnail of Sistem Pengesan Gerakan Dengan Notifikasi Melalui Aplikasi Mudah Alih

information technology and computer science, May 18, 2021

Research paper thumbnail of Two Factor Authentication by Using SMS for Web Based Application

International Journal of Information Technology Infrastructure, 2020

Two factor authentications had two entry levels for authentication’s mechanism. This study had us... more Two factor authentications had two entry levels for authentication’s mechanism. This study had used Short Messaging Service (SMS) technology as a second factor in doing authentication on the web application. It can minimize the problems that occur regarding to the illegal access over the user privacy information on the Internet. The system that uses two factor authentications is capable to give the priority and safety in aspect of user’s privacy information from the web based applications

Research paper thumbnail of UTHM Shuttle Bus Application

information technology and computer science, May 18, 2021

Research paper thumbnail of Web-based Learning System with video conference is to take

First, the students should enroll the subjects in the semester so that the teaching and learning ... more First, the students should enroll the subjects in the semester so that the teaching and learning process can be done in video conference service. The aim to develop this system is to make student discussion with lecturer or among them through online by using video conference technology. Rapid Application Development methodology (RAD) is used to develop the system. However, it used Real-Time Messaging Protocol within the web technology to develop video conferencing service part. The system is available as long as internet connectivity is available. The system can accessed without limition of the time and place.

Research paper thumbnail of Available Online at

Malaysia Yemen Student Information System (YSIS) with SMS (Short Messaging System) Notification i... more Malaysia Yemen Student Information System (YSIS) with SMS (Short Messaging System) Notification is to take an important role of developing integrated information about Yemen’s students that study at all Malaysia’s university. YSIS will develop in order to overcome the problems with the current manual system. The system management will give a benefit to every Yemen student in Malaysia, cultural attached to integrate, transfer, and get updated data and information faster and easier. Rational Unified Process (RUP) methodology is used to develop the system. However, it used mobile technology within the web technology to develop part of SMS notofocation. The system is available as long as internet connectivity is available. The system can accessed without limition of the time and place.

Research paper thumbnail of Sistem maklumat pengujian keselamatan teknologi maklumat berasaskan OSSTMM

Sistem Maklumat Pengujian Keselamatan Teknologi Maklumat ini dibangunkan berasaskan kepada modul-... more Sistem Maklumat Pengujian Keselamatan Teknologi Maklumat ini dibangunkan berasaskan kepada modul-modul manual yang terdapat dalam Open Source Security Testing Methodology Manual (OSSTMM). OSSTMM menggunakan borang-borang secara manual untuk memasukkan maklumat-maklumat hasil pengujian dan pemerhatian keselamatan bagi sesebuah infrastruktur teknologi maklumat. Sistem maklumat berkomputer ini akan memudahkan pengguna untuk memasukkan, mengedit dan melihat data-data dan maklumat-maklumat yang telah diperolehi daripada sistem pengujian keselamatan teknologi maklumat tersebut

Research paper thumbnail of Himpunan artikel dalam bidang teknologi maklumat

Research paper thumbnail of Development of host based intrusion detection system for log files

2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), 2011

Nowadays, computer security has become important issue in many organizations in this world. There... more Nowadays, computer security has become important issue in many organizations in this world. There are many ways to handle this issue including by using Intrusion Detection System on the computer system. It takes the role as a detector for any intrusion that is occurring from the computer system. The study is to develop host based intrusion detection system for Microsoft Windows XP environment. Method that had used in the study was applying intrusion detection pattern matching technique on the Security Event Log File for Microsoft Windows XP. The intrusion had identified when there was matching of intrusion pattern that is create with Security Event Log in Microsoft Windows XP. The system is hoping to evolve into IDS that include any kind of intrusion detection technique in future.

Research paper thumbnail of Asas rangkaian komputer

Research paper thumbnail of Development of Prototype Chat System Using Mobile Platform for Disable People

Procedia - Social and Behavioral Sciences, 2012

The changes given by the communication technologies will always have an enormous impact on every ... more The changes given by the communication technologies will always have an enormous impact on every aspects of life, especially on how the people interact to each other. Presently all the people almost have no obstacles to communicate to each other. There have been many sophisticated communication tools that provide many functions and services. Even though the communication technology is becoming more incredible, there is not much of communication technology development and improvement for disabled people. The way they communicate have not changed much compared to normal people. Sign language is the most common method followed by writing. For the writing method, it is not really applicable since not all of them is able to write. Yet, for the last a few years, they frequently use Short Message Service (SMS) as another method to communicate. It is the most popular communication technology used by the disabled people. All of them use SMS to send information in a far distance, such as to family. However, the problem emerges when it comes out to short distance communication because they usually use sign language to transfer information. It is the obstacle since not all of us understand that method. Prototype of Disabled People Chatting using mobile platform is a new method which has the power using Bluetooth conncetivity during communication process. The program supports text communication in both sides. Furthermore, the program has the power in handling hosts. It means the user could chat using method, such as one-to-one (unicast). Hopefully, the success of this project would becomes the innovation and brings the revolution for all of us, especially for disabled people.

Research paper thumbnail of A study of technology in firewall system

2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), 2011

Firewall is a subject in form of hardware or software or both, which is use to protects a network... more Firewall is a subject in form of hardware or software or both, which is use to protects a network from intrusion by outsiders. It is regulating the traffic that can pass through a router that connecting to the network infrastructure. It is preventing from unauthorized users to access the network whether from outside via the Internet or inside, Local Area

Research paper thumbnail of Development of CAPTCHA system based on puzzle

2014 International Conference on Computer, Communications, and Control Technology (I4CT), 2014

Research paper thumbnail of Vulnerability analysis on the network security by using Nessus

Research paper thumbnail of Voice and file transmission using bluetooth technology

Research paper thumbnail of Himpunan artikel teknologi maklumat dan komunikasi: asas, isu dan gaya teknologi

... KOMUNIKASI: ASAS, ISU DAN GAYA TEKNOLOGI Artikel-artikel ini pernah diterbitkan di ruangan Me... more ... KOMUNIKASI: ASAS, ISU DAN GAYA TEKNOLOGI Artikel-artikel ini pernah diterbitkan di ruangan Megabait, Sains dan Teknologi, akhbar Utusan Malaysia dan blog, universitimengkarakk. blogspot.com. FIRKHAN ALI BIN HAMID ALI Page 2. Page 3. iii ISI KANDUNGAN ...

Research paper thumbnail of Information Transmission Capacity and Error Control Capability of Collaborative Coding Multiple Access System

Research paper thumbnail of Special Education Classrooms: Can Technology Use Inspired?

International Journal of Professional Business Review

Purpose: This study aim to explore the inspiration of technology in conducting learning process f... more Purpose: This study aim to explore the inspiration of technology in conducting learning process for special education studens in classroom. Framework: It is common knowledge that education today requires teachers to be more creative in delivering learning and teaching in the classroom. Methodology: This study use qualitative approach in gathering the data. 12 teachers were interview in this studies. Findings: The result shows the rapidity of technology is now to some extent helping teachers find fresher ideas to conduct teaching in the classroom. The existence of various types of technology including gadgets, software, video applications and others are seen to be able to attract the interest of students in turn can achieve teaching objectives. However, some studies show that some teachers are less effective in the use of technology when teaching in the classroom. Implications: In addition to speeding up the process of obtaining information, the use of technology also actuall...

Research paper thumbnail of Detecting Malware with Classification Machine Learning Techniques

International Journal of Advanced Computer Science and Applications

In today's digital landscape, the identification of malicious software has become a crucial under... more In today's digital landscape, the identification of malicious software has become a crucial undertaking. The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. Consequently, machine learning strategies have surfaced as a viable means of detecting malware. The following research report focuses on the implementation of classification machine learning methods for detecting malware. The study assesses the effectiveness of several algorithms, including Naïve Bayes, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Decision Tree, Random Forest, and Logistic Regression, through an examination of a publicly accessible dataset featuring both benign files and malware. Additionally, the influence of diverse feature sets and preprocessing techniques on the classifiers' performance is explored. The outcomes of the investigation exhibit that machine learning methods can capably identify malware, attaining elevated precision levels and decreasing false positive rates. Decision Tree and Random Forest display superior performance compared to other algorithms with 100.00% accuracy. Furthermore, it is observed that feature selection and dimensionality reduction techniques can notably enhance classifier effectiveness while mitigating computational complexity. Overall, this research underscores the potential of machine learning approaches for detecting malware and offers valuable guidance for the development of successful malware detection systems.

Research paper thumbnail of Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance

Journal of Advanced Research in Applied Sciences and Engineering Technology, Feb 8, 2023

Research paper thumbnail of Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

Journal of Physics: Conference Series, May 1, 2018

Research paper thumbnail of Sistem Pengesan Gerakan Dengan Notifikasi Melalui Aplikasi Mudah Alih

information technology and computer science, May 18, 2021

Research paper thumbnail of Two Factor Authentication by Using SMS for Web Based Application

International Journal of Information Technology Infrastructure, 2020

Two factor authentications had two entry levels for authentication’s mechanism. This study had us... more Two factor authentications had two entry levels for authentication’s mechanism. This study had used Short Messaging Service (SMS) technology as a second factor in doing authentication on the web application. It can minimize the problems that occur regarding to the illegal access over the user privacy information on the Internet. The system that uses two factor authentications is capable to give the priority and safety in aspect of user’s privacy information from the web based applications

Research paper thumbnail of UTHM Shuttle Bus Application

information technology and computer science, May 18, 2021

Research paper thumbnail of Web-based Learning System with video conference is to take

First, the students should enroll the subjects in the semester so that the teaching and learning ... more First, the students should enroll the subjects in the semester so that the teaching and learning process can be done in video conference service. The aim to develop this system is to make student discussion with lecturer or among them through online by using video conference technology. Rapid Application Development methodology (RAD) is used to develop the system. However, it used Real-Time Messaging Protocol within the web technology to develop video conferencing service part. The system is available as long as internet connectivity is available. The system can accessed without limition of the time and place.

Research paper thumbnail of Available Online at

Malaysia Yemen Student Information System (YSIS) with SMS (Short Messaging System) Notification i... more Malaysia Yemen Student Information System (YSIS) with SMS (Short Messaging System) Notification is to take an important role of developing integrated information about Yemen’s students that study at all Malaysia’s university. YSIS will develop in order to overcome the problems with the current manual system. The system management will give a benefit to every Yemen student in Malaysia, cultural attached to integrate, transfer, and get updated data and information faster and easier. Rational Unified Process (RUP) methodology is used to develop the system. However, it used mobile technology within the web technology to develop part of SMS notofocation. The system is available as long as internet connectivity is available. The system can accessed without limition of the time and place.

Research paper thumbnail of Sistem maklumat pengujian keselamatan teknologi maklumat berasaskan OSSTMM

Sistem Maklumat Pengujian Keselamatan Teknologi Maklumat ini dibangunkan berasaskan kepada modul-... more Sistem Maklumat Pengujian Keselamatan Teknologi Maklumat ini dibangunkan berasaskan kepada modul-modul manual yang terdapat dalam Open Source Security Testing Methodology Manual (OSSTMM). OSSTMM menggunakan borang-borang secara manual untuk memasukkan maklumat-maklumat hasil pengujian dan pemerhatian keselamatan bagi sesebuah infrastruktur teknologi maklumat. Sistem maklumat berkomputer ini akan memudahkan pengguna untuk memasukkan, mengedit dan melihat data-data dan maklumat-maklumat yang telah diperolehi daripada sistem pengujian keselamatan teknologi maklumat tersebut

Research paper thumbnail of Himpunan artikel dalam bidang teknologi maklumat

Research paper thumbnail of Development of host based intrusion detection system for log files

2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), 2011

Nowadays, computer security has become important issue in many organizations in this world. There... more Nowadays, computer security has become important issue in many organizations in this world. There are many ways to handle this issue including by using Intrusion Detection System on the computer system. It takes the role as a detector for any intrusion that is occurring from the computer system. The study is to develop host based intrusion detection system for Microsoft Windows XP environment. Method that had used in the study was applying intrusion detection pattern matching technique on the Security Event Log File for Microsoft Windows XP. The intrusion had identified when there was matching of intrusion pattern that is create with Security Event Log in Microsoft Windows XP. The system is hoping to evolve into IDS that include any kind of intrusion detection technique in future.

Research paper thumbnail of Asas rangkaian komputer

Research paper thumbnail of Development of Prototype Chat System Using Mobile Platform for Disable People

Procedia - Social and Behavioral Sciences, 2012

The changes given by the communication technologies will always have an enormous impact on every ... more The changes given by the communication technologies will always have an enormous impact on every aspects of life, especially on how the people interact to each other. Presently all the people almost have no obstacles to communicate to each other. There have been many sophisticated communication tools that provide many functions and services. Even though the communication technology is becoming more incredible, there is not much of communication technology development and improvement for disabled people. The way they communicate have not changed much compared to normal people. Sign language is the most common method followed by writing. For the writing method, it is not really applicable since not all of them is able to write. Yet, for the last a few years, they frequently use Short Message Service (SMS) as another method to communicate. It is the most popular communication technology used by the disabled people. All of them use SMS to send information in a far distance, such as to family. However, the problem emerges when it comes out to short distance communication because they usually use sign language to transfer information. It is the obstacle since not all of us understand that method. Prototype of Disabled People Chatting using mobile platform is a new method which has the power using Bluetooth conncetivity during communication process. The program supports text communication in both sides. Furthermore, the program has the power in handling hosts. It means the user could chat using method, such as one-to-one (unicast). Hopefully, the success of this project would becomes the innovation and brings the revolution for all of us, especially for disabled people.

Research paper thumbnail of A study of technology in firewall system

2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), 2011

Firewall is a subject in form of hardware or software or both, which is use to protects a network... more Firewall is a subject in form of hardware or software or both, which is use to protects a network from intrusion by outsiders. It is regulating the traffic that can pass through a router that connecting to the network infrastructure. It is preventing from unauthorized users to access the network whether from outside via the Internet or inside, Local Area

Research paper thumbnail of Development of CAPTCHA system based on puzzle

2014 International Conference on Computer, Communications, and Control Technology (I4CT), 2014

Research paper thumbnail of Vulnerability analysis on the network security by using Nessus

Research paper thumbnail of Voice and file transmission using bluetooth technology

Research paper thumbnail of Himpunan artikel teknologi maklumat dan komunikasi: asas, isu dan gaya teknologi

... KOMUNIKASI: ASAS, ISU DAN GAYA TEKNOLOGI Artikel-artikel ini pernah diterbitkan di ruangan Me... more ... KOMUNIKASI: ASAS, ISU DAN GAYA TEKNOLOGI Artikel-artikel ini pernah diterbitkan di ruangan Megabait, Sains dan Teknologi, akhbar Utusan Malaysia dan blog, universitimengkarakk. blogspot.com. FIRKHAN ALI BIN HAMID ALI Page 2. Page 3. iii ISI KANDUNGAN ...