Firkhan Ali - Academia.edu (original) (raw)
Papers by Firkhan Ali
International Journal of Professional Business Review
Purpose: This study aim to explore the inspiration of technology in conducting learning process f... more Purpose: This study aim to explore the inspiration of technology in conducting learning process for special education studens in classroom. Framework: It is common knowledge that education today requires teachers to be more creative in delivering learning and teaching in the classroom. Methodology: This study use qualitative approach in gathering the data. 12 teachers were interview in this studies. Findings: The result shows the rapidity of technology is now to some extent helping teachers find fresher ideas to conduct teaching in the classroom. The existence of various types of technology including gadgets, software, video applications and others are seen to be able to attract the interest of students in turn can achieve teaching objectives. However, some studies show that some teachers are less effective in the use of technology when teaching in the classroom. Implications: In addition to speeding up the process of obtaining information, the use of technology also actuall...
International Journal of Advanced Computer Science and Applications
In today's digital landscape, the identification of malicious software has become a crucial under... more In today's digital landscape, the identification of malicious software has become a crucial undertaking. The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. Consequently, machine learning strategies have surfaced as a viable means of detecting malware. The following research report focuses on the implementation of classification machine learning methods for detecting malware. The study assesses the effectiveness of several algorithms, including Naïve Bayes, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Decision Tree, Random Forest, and Logistic Regression, through an examination of a publicly accessible dataset featuring both benign files and malware. Additionally, the influence of diverse feature sets and preprocessing techniques on the classifiers' performance is explored. The outcomes of the investigation exhibit that machine learning methods can capably identify malware, attaining elevated precision levels and decreasing false positive rates. Decision Tree and Random Forest display superior performance compared to other algorithms with 100.00% accuracy. Furthermore, it is observed that feature selection and dimensionality reduction techniques can notably enhance classifier effectiveness while mitigating computational complexity. Overall, this research underscores the potential of machine learning approaches for detecting malware and offers valuable guidance for the development of successful malware detection systems.
Journal of Advanced Research in Applied Sciences and Engineering Technology, Feb 8, 2023
Journal of Physics: Conference Series, May 1, 2018
information technology and computer science, May 18, 2021
International Journal of Information Technology Infrastructure, 2020
Two factor authentications had two entry levels for authentication’s mechanism. This study had us... more Two factor authentications had two entry levels for authentication’s mechanism. This study had used Short Messaging Service (SMS) technology as a second factor in doing authentication on the web application. It can minimize the problems that occur regarding to the illegal access over the user privacy information on the Internet. The system that uses two factor authentications is capable to give the priority and safety in aspect of user’s privacy information from the web based applications
information technology and computer science, May 18, 2021
First, the students should enroll the subjects in the semester so that the teaching and learning ... more First, the students should enroll the subjects in the semester so that the teaching and learning process can be done in video conference service. The aim to develop this system is to make student discussion with lecturer or among them through online by using video conference technology. Rapid Application Development methodology (RAD) is used to develop the system. However, it used Real-Time Messaging Protocol within the web technology to develop video conferencing service part. The system is available as long as internet connectivity is available. The system can accessed without limition of the time and place.
Malaysia Yemen Student Information System (YSIS) with SMS (Short Messaging System) Notification i... more Malaysia Yemen Student Information System (YSIS) with SMS (Short Messaging System) Notification is to take an important role of developing integrated information about Yemen’s students that study at all Malaysia’s university. YSIS will develop in order to overcome the problems with the current manual system. The system management will give a benefit to every Yemen student in Malaysia, cultural attached to integrate, transfer, and get updated data and information faster and easier. Rational Unified Process (RUP) methodology is used to develop the system. However, it used mobile technology within the web technology to develop part of SMS notofocation. The system is available as long as internet connectivity is available. The system can accessed without limition of the time and place.
Sistem Maklumat Pengujian Keselamatan Teknologi Maklumat ini dibangunkan berasaskan kepada modul-... more Sistem Maklumat Pengujian Keselamatan Teknologi Maklumat ini dibangunkan berasaskan kepada modul-modul manual yang terdapat dalam Open Source Security Testing Methodology Manual (OSSTMM). OSSTMM menggunakan borang-borang secara manual untuk memasukkan maklumat-maklumat hasil pengujian dan pemerhatian keselamatan bagi sesebuah infrastruktur teknologi maklumat. Sistem maklumat berkomputer ini akan memudahkan pengguna untuk memasukkan, mengedit dan melihat data-data dan maklumat-maklumat yang telah diperolehi daripada sistem pengujian keselamatan teknologi maklumat tersebut
2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), 2011
Nowadays, computer security has become important issue in many organizations in this world. There... more Nowadays, computer security has become important issue in many organizations in this world. There are many ways to handle this issue including by using Intrusion Detection System on the computer system. It takes the role as a detector for any intrusion that is occurring from the computer system. The study is to develop host based intrusion detection system for Microsoft Windows XP environment. Method that had used in the study was applying intrusion detection pattern matching technique on the Security Event Log File for Microsoft Windows XP. The intrusion had identified when there was matching of intrusion pattern that is create with Security Event Log in Microsoft Windows XP. The system is hoping to evolve into IDS that include any kind of intrusion detection technique in future.
Procedia - Social and Behavioral Sciences, 2012
The changes given by the communication technologies will always have an enormous impact on every ... more The changes given by the communication technologies will always have an enormous impact on every aspects of life, especially on how the people interact to each other. Presently all the people almost have no obstacles to communicate to each other. There have been many sophisticated communication tools that provide many functions and services. Even though the communication technology is becoming more incredible, there is not much of communication technology development and improvement for disabled people. The way they communicate have not changed much compared to normal people. Sign language is the most common method followed by writing. For the writing method, it is not really applicable since not all of them is able to write. Yet, for the last a few years, they frequently use Short Message Service (SMS) as another method to communicate. It is the most popular communication technology used by the disabled people. All of them use SMS to send information in a far distance, such as to family. However, the problem emerges when it comes out to short distance communication because they usually use sign language to transfer information. It is the obstacle since not all of us understand that method. Prototype of Disabled People Chatting using mobile platform is a new method which has the power using Bluetooth conncetivity during communication process. The program supports text communication in both sides. Furthermore, the program has the power in handling hosts. It means the user could chat using method, such as one-to-one (unicast). Hopefully, the success of this project would becomes the innovation and brings the revolution for all of us, especially for disabled people.
2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), 2011
Firewall is a subject in form of hardware or software or both, which is use to protects a network... more Firewall is a subject in form of hardware or software or both, which is use to protects a network from intrusion by outsiders. It is regulating the traffic that can pass through a router that connecting to the network infrastructure. It is preventing from unauthorized users to access the network whether from outside via the Internet or inside, Local Area
2014 International Conference on Computer, Communications, and Control Technology (I4CT), 2014
... KOMUNIKASI: ASAS, ISU DAN GAYA TEKNOLOGI Artikel-artikel ini pernah diterbitkan di ruangan Me... more ... KOMUNIKASI: ASAS, ISU DAN GAYA TEKNOLOGI Artikel-artikel ini pernah diterbitkan di ruangan Megabait, Sains dan Teknologi, akhbar Utusan Malaysia dan blog, universitimengkarakk. blogspot.com. FIRKHAN ALI BIN HAMID ALI Page 2. Page 3. iii ISI KANDUNGAN ...
International Journal of Professional Business Review
Purpose: This study aim to explore the inspiration of technology in conducting learning process f... more Purpose: This study aim to explore the inspiration of technology in conducting learning process for special education studens in classroom. Framework: It is common knowledge that education today requires teachers to be more creative in delivering learning and teaching in the classroom. Methodology: This study use qualitative approach in gathering the data. 12 teachers were interview in this studies. Findings: The result shows the rapidity of technology is now to some extent helping teachers find fresher ideas to conduct teaching in the classroom. The existence of various types of technology including gadgets, software, video applications and others are seen to be able to attract the interest of students in turn can achieve teaching objectives. However, some studies show that some teachers are less effective in the use of technology when teaching in the classroom. Implications: In addition to speeding up the process of obtaining information, the use of technology also actuall...
International Journal of Advanced Computer Science and Applications
In today's digital landscape, the identification of malicious software has become a crucial under... more In today's digital landscape, the identification of malicious software has become a crucial undertaking. The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. Consequently, machine learning strategies have surfaced as a viable means of detecting malware. The following research report focuses on the implementation of classification machine learning methods for detecting malware. The study assesses the effectiveness of several algorithms, including Naïve Bayes, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Decision Tree, Random Forest, and Logistic Regression, through an examination of a publicly accessible dataset featuring both benign files and malware. Additionally, the influence of diverse feature sets and preprocessing techniques on the classifiers' performance is explored. The outcomes of the investigation exhibit that machine learning methods can capably identify malware, attaining elevated precision levels and decreasing false positive rates. Decision Tree and Random Forest display superior performance compared to other algorithms with 100.00% accuracy. Furthermore, it is observed that feature selection and dimensionality reduction techniques can notably enhance classifier effectiveness while mitigating computational complexity. Overall, this research underscores the potential of machine learning approaches for detecting malware and offers valuable guidance for the development of successful malware detection systems.
Journal of Advanced Research in Applied Sciences and Engineering Technology, Feb 8, 2023
Journal of Physics: Conference Series, May 1, 2018
information technology and computer science, May 18, 2021
International Journal of Information Technology Infrastructure, 2020
Two factor authentications had two entry levels for authentication’s mechanism. This study had us... more Two factor authentications had two entry levels for authentication’s mechanism. This study had used Short Messaging Service (SMS) technology as a second factor in doing authentication on the web application. It can minimize the problems that occur regarding to the illegal access over the user privacy information on the Internet. The system that uses two factor authentications is capable to give the priority and safety in aspect of user’s privacy information from the web based applications
information technology and computer science, May 18, 2021
First, the students should enroll the subjects in the semester so that the teaching and learning ... more First, the students should enroll the subjects in the semester so that the teaching and learning process can be done in video conference service. The aim to develop this system is to make student discussion with lecturer or among them through online by using video conference technology. Rapid Application Development methodology (RAD) is used to develop the system. However, it used Real-Time Messaging Protocol within the web technology to develop video conferencing service part. The system is available as long as internet connectivity is available. The system can accessed without limition of the time and place.
Malaysia Yemen Student Information System (YSIS) with SMS (Short Messaging System) Notification i... more Malaysia Yemen Student Information System (YSIS) with SMS (Short Messaging System) Notification is to take an important role of developing integrated information about Yemen’s students that study at all Malaysia’s university. YSIS will develop in order to overcome the problems with the current manual system. The system management will give a benefit to every Yemen student in Malaysia, cultural attached to integrate, transfer, and get updated data and information faster and easier. Rational Unified Process (RUP) methodology is used to develop the system. However, it used mobile technology within the web technology to develop part of SMS notofocation. The system is available as long as internet connectivity is available. The system can accessed without limition of the time and place.
Sistem Maklumat Pengujian Keselamatan Teknologi Maklumat ini dibangunkan berasaskan kepada modul-... more Sistem Maklumat Pengujian Keselamatan Teknologi Maklumat ini dibangunkan berasaskan kepada modul-modul manual yang terdapat dalam Open Source Security Testing Methodology Manual (OSSTMM). OSSTMM menggunakan borang-borang secara manual untuk memasukkan maklumat-maklumat hasil pengujian dan pemerhatian keselamatan bagi sesebuah infrastruktur teknologi maklumat. Sistem maklumat berkomputer ini akan memudahkan pengguna untuk memasukkan, mengedit dan melihat data-data dan maklumat-maklumat yang telah diperolehi daripada sistem pengujian keselamatan teknologi maklumat tersebut
2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), 2011
Nowadays, computer security has become important issue in many organizations in this world. There... more Nowadays, computer security has become important issue in many organizations in this world. There are many ways to handle this issue including by using Intrusion Detection System on the computer system. It takes the role as a detector for any intrusion that is occurring from the computer system. The study is to develop host based intrusion detection system for Microsoft Windows XP environment. Method that had used in the study was applying intrusion detection pattern matching technique on the Security Event Log File for Microsoft Windows XP. The intrusion had identified when there was matching of intrusion pattern that is create with Security Event Log in Microsoft Windows XP. The system is hoping to evolve into IDS that include any kind of intrusion detection technique in future.
Procedia - Social and Behavioral Sciences, 2012
The changes given by the communication technologies will always have an enormous impact on every ... more The changes given by the communication technologies will always have an enormous impact on every aspects of life, especially on how the people interact to each other. Presently all the people almost have no obstacles to communicate to each other. There have been many sophisticated communication tools that provide many functions and services. Even though the communication technology is becoming more incredible, there is not much of communication technology development and improvement for disabled people. The way they communicate have not changed much compared to normal people. Sign language is the most common method followed by writing. For the writing method, it is not really applicable since not all of them is able to write. Yet, for the last a few years, they frequently use Short Message Service (SMS) as another method to communicate. It is the most popular communication technology used by the disabled people. All of them use SMS to send information in a far distance, such as to family. However, the problem emerges when it comes out to short distance communication because they usually use sign language to transfer information. It is the obstacle since not all of us understand that method. Prototype of Disabled People Chatting using mobile platform is a new method which has the power using Bluetooth conncetivity during communication process. The program supports text communication in both sides. Furthermore, the program has the power in handling hosts. It means the user could chat using method, such as one-to-one (unicast). Hopefully, the success of this project would becomes the innovation and brings the revolution for all of us, especially for disabled people.
2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), 2011
Firewall is a subject in form of hardware or software or both, which is use to protects a network... more Firewall is a subject in form of hardware or software or both, which is use to protects a network from intrusion by outsiders. It is regulating the traffic that can pass through a router that connecting to the network infrastructure. It is preventing from unauthorized users to access the network whether from outside via the Internet or inside, Local Area
2014 International Conference on Computer, Communications, and Control Technology (I4CT), 2014
... KOMUNIKASI: ASAS, ISU DAN GAYA TEKNOLOGI Artikel-artikel ini pernah diterbitkan di ruangan Me... more ... KOMUNIKASI: ASAS, ISU DAN GAYA TEKNOLOGI Artikel-artikel ini pernah diterbitkan di ruangan Megabait, Sains dan Teknologi, akhbar Utusan Malaysia dan blog, universitimengkarakk. blogspot.com. FIRKHAN ALI BIN HAMID ALI Page 2. Page 3. iii ISI KANDUNGAN ...