Fairuz Iskandar Othman - Academia.edu (original) (raw)
Papers by Fairuz Iskandar Othman
Advanced Science Letters, 2016
2021 7th International Conference on Research and Innovation in Information Systems (ICRIIS), 2021
Energy-Saving Glass (ESG) is a specially coated glass with metallic oxide coating to maximize blo... more Energy-Saving Glass (ESG) is a specially coated glass with metallic oxide coating to maximize blocking of infrared and ultraviolet radiation into buildings. These are called low-emissivity or energy-saving windows since the metallic oxide coating on one side of the glass can reflect most of the incident infrared power. This coated glass acts as a filter for electromagnetic radiations in the infrared region, while being totally transparent to the visible part of the spectrum. Due to this property of coated glass, thermal insulation is obtained inside the buildings. However, it has several drawbacks where one of the major is the attenuation of the transmission of useful microwave signals and radio frequency (RF) signals, such as Global System for Mobile Communication (GSM) and personal communication signal, which leads to poor communication inside the building. Therefore, in order to overcome this problem, several solutions have been determined; where the first solution is to etch the...
DNS tunneling is one of the issues that have concerned the information security community in the ... more DNS tunneling is one of the issues that have concerned the information security community in the last decade. Such malicious activity resembles a legitimate threat for many corporations where there are a respected amount of network traffic that would be embedded with DNS tunneling. The threats that caused by such tunneling could be ranged from the full remote control into file transfer or even a full IP tunnel. Therefore, different approaches have been proposed for detecting the DNS tunneling such firewalls and intrusion detection systems. However, these approaches are limited to specific types of tunneling. Therefore, researchers have tended to utilize machine learning techniques due to its ability to analyze and predict the occurrence of DNS tunneling. Nonetheless, there are plenty of choices for employing specific machine learning techniques. This paper aims to provide a comparative study for three machine learning techniques including SVM, NB and J48. A benchmark dataset for the...
In spite of the numerous benefits suggested for organisations to adopt formal IT Governance (ITG)... more In spite of the numerous benefits suggested for organisations to adopt formal IT Governance (ITG) practice, research has shown that these practices show low levels of adoption. This research develops and empirically validates a theoretical model of barriers to formal ITG practice adoption. It advances our theoretical understanding of barriers to formal ITG practice adoption while providing insightful implications for organisations in their journey towards adoption of formal ITG practice.
Journal of Telecommunication, Electronic and Computer Engineering, 2018
IS security awareness plays a significant role in the process of the overall information security... more IS security awareness plays a significant role in the process of the overall information security of any organisation. Based on an empirical study of 368 academic staff in three institutions of higher learning (IHL), we found that the level of information security awareness can be considered good, but it can certainly be improved further. Employees need further training in this area mainly at institutions which only recently received the ISO/IEC 27001:2013 certification. Our sample seems to suggest that demographics such as the age of the respondents contributed to their information security risk tolerance and adherence behaviour.
Advanced Science Letters, 2018
Advanced Science Letters, 2018
Bulletin of Electrical Engineering and Informatics, 2019
The African continent is ranked second most populated region and has a huge amount of natural res... more The African continent is ranked second most populated region and has a huge amount of natural resources to be locally transformed or outsourced overseas. The traditional telecommunications system has helped connect people and enabled them to manage their businesses and trading in Africa for a long-time; many African countries have embarked early in changing their network and technology systems during the first years of the information age. Over a few decades ago, the introduction of new telecommunication methods and techniques have influenced much of African countries" growth via different perspectives. The situation has triggered an enormous interest in people. They analyzed the factors supporting such changes, which in the case of this paper is all about the advent and adoption of LTE/4G-LTE technologies including its service commercialization in Africa. This review article attempts to provide an overview of 4G-LTE networks technologies and the internet; it includes the current evolution of telecommunication networks within and even beyond the African continent, assisted by the 4G-LTE expansion. An extended view is provided throughout this article"s development with respect to what could be expected (or is missing) for the sake of this continent"s telecommunication infrastructure enhancement and a better QoS to Africa"s dwellers.
Advanced Science Letters, 2018
Lecture Notes in Electrical Engineering, 2015
In this paper, an analysis was done by combining two separate antenna design into one which is th... more In this paper, an analysis was done by combining two separate antenna design into one which is the Bow-Tie design and the Ice-Cream cone design. This antenna was designed to operate at 120 GHz for millimetre wave application via CST Microwave Studio Simulation Software. An investigation was done on the antenna return loss and radiation efficiency to the new combined design. This antenna was designed on an Alumina substrate with a dielectric constant 8.8. The proposed antenna shows improvement in the radiation efficiency and the ability to operate at high frequency. Results of the simulation and the antenna design are presented as well.
Kertas kerja ini menerangkan kaedah pembelajaran rangkaian internet protokol versi 6 (IPv6) kepad... more Kertas kerja ini menerangkan kaedah pembelajaran rangkaian internet protokol versi 6 (IPv6) kepada pelajar sarjana muda dan diploma di Universiti Teknikal Malaysia Melaka. Di sini, penerangan mengenai rangkaian IPv6 didalam bidang teknologi maklumat dilaksanakan melalui sokongan alat bantu simulasi rangkaian untuk memantapkan tahap pemahaman para pelajar. Oleh itu, langkah selanjutnya telah dilaksanakan bagi membuktikan di mana sistem alat bantu ini lebih efektif berbanding cara pembelajaran konvensional. Kajian telah dijalankan terhadap dua kumpulan pelajar daripada semester pengajian yang berbeza di mana hanya satu kumpulan sahaja diberi pendedahan kepada alat bantu tersebut. Melalui kaedah soal-selidik dan keputusan ujian pelajar, beberapa permasalahan dan penemuan berkaitan pembelajaran ini berjaya dihasilkan. Pelbagai kelebihan terdapat pada alat bantu simulasi yang berperanan dalam memudahkan pemahaman tentang rangkaian IPv6 merangkumi proses pemilihan, pengurusan dan pengkonfigurasian perkakasan dan rangkaian. Kaedah pembelajaran turut menjadi lebih mudah serta menarik melalui pendekatan opsyen samada Grafic Computer Interface (GUI) atau Command Line Interface (CLI). Penggunaan alat bantu simulasi oleh para pelajar secara langsung mempertingkatkan penguasaan kemahiran merekacipta dan membangunkan rangkaian IPv6. Jesteru itu, perlaksanaan pembelajaran berasaskan alat bantu seperti simulasi ini semakin mendapat galakan khususnya di dalam sektor pendidikan secara teknikal. Ini adalah berikutan pendekatan tersebut bersesuaian dengan kemudahan teknologi terkini.
Kertas kerja ini menerangkan kaedah pembelajaran Rangkaian Kawasan Setempat Maya (VLAN) kepada pe... more Kertas kerja ini menerangkan kaedah pembelajaran Rangkaian Kawasan Setempat Maya (VLAN) kepada pelajar sarjana muda di Universiti Teknikal Malaysia Melaka. Di sini, penerangan mengenai rangkaian ini didalam bidang teknologi maklumat dilaksanakan melalui sokongan alat bantu simulasi rangkaian untuk memantapkan tahap pemahaman para pelajar. Pelbagai kelebihan terdapat pada alat bantu simulasi yang berperanan dalam memudahkan pemahaman tentang rangkaian ini merangkumi proses pemilihan, pengurusan dan pengkonfigurasian perkakasan dan rangkaian. Kaedah pembelajaran turut menjadi lebih mudah serta menarik melalui pendekatan opsyen samada Grafic Computer Interface (GUI) atau Command Line Interface (CLI). Penggunaan alat bantu simulasi oleh para pelajar secara langsung mempertingkatkan penguasaan kemahiran merekacipta dan membangunkan rangkaian. Jesteru itu, perlaksanaan pembelajaran berasaskan alat bantu seperti simulasi ini semakin mendapat galakan khususnya di dalam sektor pendidikan secara teknikal. Ini adalah berikutan pendekatan tersebut bersesuaian dengan kemudahan teknologi terkini. Secara kesimpulannya, pembangunan alat bantu pengajaran bersifat simulasi merupakan satu alternatif kepada kaedah pembelajaran konvensional dimana ianya lebih merangsang minda dan kreativiti seseorang pelajar khususnya bagi pembelajaran VLAN. Penggunaan elemen ini secara tidak langsung menghasilkan pembelajaran yang lebih anjal, berstruktur, menarik dan juga mudah difahami.
Journal of Physics: Conference Series, 2014
This paper presents Spanar Antenna designed using CST Microwave Studio Simulation 2011. The propo... more This paper presents Spanar Antenna designed using CST Microwave Studio Simulation 2011. The proposed antenna was designed to operate at 10 GHz, which suggested return loss, S 11 must be less than-10 dB and voltage standing wave ratio (VSWR) must be less than 2. The best performance of simulation of Spanar Antenna was obtained at a small size of 24.8 mm x 8.0 mm with dimension board of FR4 substrate 31.7 mm x 18.5 mm. The thickness (h) and dielectric constant (Ɛr) of substrate were 1.6 mm and 4.7. An analysis between simulation result and measurement result has been compared in order to see the antenna performance.
Proceedings of 15th …, 2011
The adoption of IT Governance (ITG) continues to be an important topic for research. Many researc... more The adoption of IT Governance (ITG) continues to be an important topic for research. Many researchers have focused their attention on how these practices are currently being implemented in the many diverse areas and industries. Literature shows that a majority of these studies have only been based on industries and organizations in developed countries. There exist very few researches that look specifically within the context of a developing country. Furthermore, there seems to be a lack of research on identifying the barriers or inhibitors to IT Governance adoption within the context of an emerging yet still developing Asian country. This research sets out to justify, substantiate and improve on a priori model developed to study the barriers to the adoption of ITG practice using qualitative data obtained through a series of semi-structured interviews conducted on organizations in Malaysia.
International Journal on Advanced Science, Engineering and Information Technology
2021 Sixth International Conference on Informatics and Computing (ICIC), 2021
Verifying a set of most frequent problems is essential before introducing practical solutions usi... more Verifying a set of most frequent problems is essential before introducing practical solutions using new technology, processes, and practices. This study proposes a way to verify these problem sets. The main contribution of this paper is a method to verify a set of most frequent problems in waste disposal practices previously identified through a survey questionnaire, using Google Earth visualization and the Apriori algorithm. Google Earth is used to pinpoint the geographical locations of existing waste bins, illegal landfills, and people's houses. The distance between the waste bins and the residents' houses, sites of waste disposal by burning, and sites of waste disposal by dumping are then analyzed as a combination of the problems of waste disposal practices. Support, Confidence, multiplication between Support and Confidence, and lift ratio values are then calculated to obtain a combination of the most frequent problems sets. Next, the support value in the Apriori algorithm is compared with the FP-Growth method using Rapidminer. Results obtain support and thus verify data previously obtained from the survey. For a 2-itemset problem and a minimum support value of 0.1, 33% accuracy is obtained, while a 3-itemset problem returns 99% accuracy. We show that our method is useful in verifying data previously obtained from other sources.
This paper discusses a curriculum approach that will give emphasis on practical portions of teach... more This paper discusses a curriculum approach that will give emphasis on practical portions of teaching network security subjects in information and communication technology courses. As we are well aware, the need to use a practice and application oriented approach in education is paramount. Research on active learning and cooperative groups have shown that students grasps more and have more tendency towards obtaining and realizing soft skills like leadership, communication and team work as opposed to the more traditional theory and exam based teaching and learning. While this teaching and learning paradigm is relatively new in Malaysia, it has been practiced widely in the West. This paper examines a certain approach whereby students learning wireless security are divided into and work in small and manageable groups where there will be 2 teams which consist of black hat and white hat teams. The former will try to find and expose vulnerabilities in a wireless network while the latter wi...
2021 Sixth International Conference on Informatics and Computing (ICIC), 2021
This project develops a face recognition-based door locking system with two-factor authentication... more This project develops a face recognition-based door locking system with two-factor authentication using OpenCV. It uses Raspberry Pi 4 as the microcontroller. Face recognition-based door locking has been around for many years, but most of them only provide face recognition without any added security features, and they are costly. The design of this project is based on human face recognition and the sending of a One-Time Password (OTP) using the Twilio service. It will recognize the person at the front door. Only people who match the faces stored in its dataset and then inputs the correct OTP will have access to unlock the door. The Twilio service and image processing algorithm Local Binary Pattern Histogram (LBPH) has been adopted for this system. Servo motor operates as a mechanism to access the door. Results show that LBPH takes a short time to recognize a face. Additionally, if an unknown face is detected, it will log this instance into a "Fail" file and an accompanying CSV sheet.
Advanced Science Letters, 2016
2021 7th International Conference on Research and Innovation in Information Systems (ICRIIS), 2021
Energy-Saving Glass (ESG) is a specially coated glass with metallic oxide coating to maximize blo... more Energy-Saving Glass (ESG) is a specially coated glass with metallic oxide coating to maximize blocking of infrared and ultraviolet radiation into buildings. These are called low-emissivity or energy-saving windows since the metallic oxide coating on one side of the glass can reflect most of the incident infrared power. This coated glass acts as a filter for electromagnetic radiations in the infrared region, while being totally transparent to the visible part of the spectrum. Due to this property of coated glass, thermal insulation is obtained inside the buildings. However, it has several drawbacks where one of the major is the attenuation of the transmission of useful microwave signals and radio frequency (RF) signals, such as Global System for Mobile Communication (GSM) and personal communication signal, which leads to poor communication inside the building. Therefore, in order to overcome this problem, several solutions have been determined; where the first solution is to etch the...
DNS tunneling is one of the issues that have concerned the information security community in the ... more DNS tunneling is one of the issues that have concerned the information security community in the last decade. Such malicious activity resembles a legitimate threat for many corporations where there are a respected amount of network traffic that would be embedded with DNS tunneling. The threats that caused by such tunneling could be ranged from the full remote control into file transfer or even a full IP tunnel. Therefore, different approaches have been proposed for detecting the DNS tunneling such firewalls and intrusion detection systems. However, these approaches are limited to specific types of tunneling. Therefore, researchers have tended to utilize machine learning techniques due to its ability to analyze and predict the occurrence of DNS tunneling. Nonetheless, there are plenty of choices for employing specific machine learning techniques. This paper aims to provide a comparative study for three machine learning techniques including SVM, NB and J48. A benchmark dataset for the...
In spite of the numerous benefits suggested for organisations to adopt formal IT Governance (ITG)... more In spite of the numerous benefits suggested for organisations to adopt formal IT Governance (ITG) practice, research has shown that these practices show low levels of adoption. This research develops and empirically validates a theoretical model of barriers to formal ITG practice adoption. It advances our theoretical understanding of barriers to formal ITG practice adoption while providing insightful implications for organisations in their journey towards adoption of formal ITG practice.
Journal of Telecommunication, Electronic and Computer Engineering, 2018
IS security awareness plays a significant role in the process of the overall information security... more IS security awareness plays a significant role in the process of the overall information security of any organisation. Based on an empirical study of 368 academic staff in three institutions of higher learning (IHL), we found that the level of information security awareness can be considered good, but it can certainly be improved further. Employees need further training in this area mainly at institutions which only recently received the ISO/IEC 27001:2013 certification. Our sample seems to suggest that demographics such as the age of the respondents contributed to their information security risk tolerance and adherence behaviour.
Advanced Science Letters, 2018
Advanced Science Letters, 2018
Bulletin of Electrical Engineering and Informatics, 2019
The African continent is ranked second most populated region and has a huge amount of natural res... more The African continent is ranked second most populated region and has a huge amount of natural resources to be locally transformed or outsourced overseas. The traditional telecommunications system has helped connect people and enabled them to manage their businesses and trading in Africa for a long-time; many African countries have embarked early in changing their network and technology systems during the first years of the information age. Over a few decades ago, the introduction of new telecommunication methods and techniques have influenced much of African countries" growth via different perspectives. The situation has triggered an enormous interest in people. They analyzed the factors supporting such changes, which in the case of this paper is all about the advent and adoption of LTE/4G-LTE technologies including its service commercialization in Africa. This review article attempts to provide an overview of 4G-LTE networks technologies and the internet; it includes the current evolution of telecommunication networks within and even beyond the African continent, assisted by the 4G-LTE expansion. An extended view is provided throughout this article"s development with respect to what could be expected (or is missing) for the sake of this continent"s telecommunication infrastructure enhancement and a better QoS to Africa"s dwellers.
Advanced Science Letters, 2018
Lecture Notes in Electrical Engineering, 2015
In this paper, an analysis was done by combining two separate antenna design into one which is th... more In this paper, an analysis was done by combining two separate antenna design into one which is the Bow-Tie design and the Ice-Cream cone design. This antenna was designed to operate at 120 GHz for millimetre wave application via CST Microwave Studio Simulation Software. An investigation was done on the antenna return loss and radiation efficiency to the new combined design. This antenna was designed on an Alumina substrate with a dielectric constant 8.8. The proposed antenna shows improvement in the radiation efficiency and the ability to operate at high frequency. Results of the simulation and the antenna design are presented as well.
Kertas kerja ini menerangkan kaedah pembelajaran rangkaian internet protokol versi 6 (IPv6) kepad... more Kertas kerja ini menerangkan kaedah pembelajaran rangkaian internet protokol versi 6 (IPv6) kepada pelajar sarjana muda dan diploma di Universiti Teknikal Malaysia Melaka. Di sini, penerangan mengenai rangkaian IPv6 didalam bidang teknologi maklumat dilaksanakan melalui sokongan alat bantu simulasi rangkaian untuk memantapkan tahap pemahaman para pelajar. Oleh itu, langkah selanjutnya telah dilaksanakan bagi membuktikan di mana sistem alat bantu ini lebih efektif berbanding cara pembelajaran konvensional. Kajian telah dijalankan terhadap dua kumpulan pelajar daripada semester pengajian yang berbeza di mana hanya satu kumpulan sahaja diberi pendedahan kepada alat bantu tersebut. Melalui kaedah soal-selidik dan keputusan ujian pelajar, beberapa permasalahan dan penemuan berkaitan pembelajaran ini berjaya dihasilkan. Pelbagai kelebihan terdapat pada alat bantu simulasi yang berperanan dalam memudahkan pemahaman tentang rangkaian IPv6 merangkumi proses pemilihan, pengurusan dan pengkonfigurasian perkakasan dan rangkaian. Kaedah pembelajaran turut menjadi lebih mudah serta menarik melalui pendekatan opsyen samada Grafic Computer Interface (GUI) atau Command Line Interface (CLI). Penggunaan alat bantu simulasi oleh para pelajar secara langsung mempertingkatkan penguasaan kemahiran merekacipta dan membangunkan rangkaian IPv6. Jesteru itu, perlaksanaan pembelajaran berasaskan alat bantu seperti simulasi ini semakin mendapat galakan khususnya di dalam sektor pendidikan secara teknikal. Ini adalah berikutan pendekatan tersebut bersesuaian dengan kemudahan teknologi terkini.
Kertas kerja ini menerangkan kaedah pembelajaran Rangkaian Kawasan Setempat Maya (VLAN) kepada pe... more Kertas kerja ini menerangkan kaedah pembelajaran Rangkaian Kawasan Setempat Maya (VLAN) kepada pelajar sarjana muda di Universiti Teknikal Malaysia Melaka. Di sini, penerangan mengenai rangkaian ini didalam bidang teknologi maklumat dilaksanakan melalui sokongan alat bantu simulasi rangkaian untuk memantapkan tahap pemahaman para pelajar. Pelbagai kelebihan terdapat pada alat bantu simulasi yang berperanan dalam memudahkan pemahaman tentang rangkaian ini merangkumi proses pemilihan, pengurusan dan pengkonfigurasian perkakasan dan rangkaian. Kaedah pembelajaran turut menjadi lebih mudah serta menarik melalui pendekatan opsyen samada Grafic Computer Interface (GUI) atau Command Line Interface (CLI). Penggunaan alat bantu simulasi oleh para pelajar secara langsung mempertingkatkan penguasaan kemahiran merekacipta dan membangunkan rangkaian. Jesteru itu, perlaksanaan pembelajaran berasaskan alat bantu seperti simulasi ini semakin mendapat galakan khususnya di dalam sektor pendidikan secara teknikal. Ini adalah berikutan pendekatan tersebut bersesuaian dengan kemudahan teknologi terkini. Secara kesimpulannya, pembangunan alat bantu pengajaran bersifat simulasi merupakan satu alternatif kepada kaedah pembelajaran konvensional dimana ianya lebih merangsang minda dan kreativiti seseorang pelajar khususnya bagi pembelajaran VLAN. Penggunaan elemen ini secara tidak langsung menghasilkan pembelajaran yang lebih anjal, berstruktur, menarik dan juga mudah difahami.
Journal of Physics: Conference Series, 2014
This paper presents Spanar Antenna designed using CST Microwave Studio Simulation 2011. The propo... more This paper presents Spanar Antenna designed using CST Microwave Studio Simulation 2011. The proposed antenna was designed to operate at 10 GHz, which suggested return loss, S 11 must be less than-10 dB and voltage standing wave ratio (VSWR) must be less than 2. The best performance of simulation of Spanar Antenna was obtained at a small size of 24.8 mm x 8.0 mm with dimension board of FR4 substrate 31.7 mm x 18.5 mm. The thickness (h) and dielectric constant (Ɛr) of substrate were 1.6 mm and 4.7. An analysis between simulation result and measurement result has been compared in order to see the antenna performance.
Proceedings of 15th …, 2011
The adoption of IT Governance (ITG) continues to be an important topic for research. Many researc... more The adoption of IT Governance (ITG) continues to be an important topic for research. Many researchers have focused their attention on how these practices are currently being implemented in the many diverse areas and industries. Literature shows that a majority of these studies have only been based on industries and organizations in developed countries. There exist very few researches that look specifically within the context of a developing country. Furthermore, there seems to be a lack of research on identifying the barriers or inhibitors to IT Governance adoption within the context of an emerging yet still developing Asian country. This research sets out to justify, substantiate and improve on a priori model developed to study the barriers to the adoption of ITG practice using qualitative data obtained through a series of semi-structured interviews conducted on organizations in Malaysia.
International Journal on Advanced Science, Engineering and Information Technology
2021 Sixth International Conference on Informatics and Computing (ICIC), 2021
Verifying a set of most frequent problems is essential before introducing practical solutions usi... more Verifying a set of most frequent problems is essential before introducing practical solutions using new technology, processes, and practices. This study proposes a way to verify these problem sets. The main contribution of this paper is a method to verify a set of most frequent problems in waste disposal practices previously identified through a survey questionnaire, using Google Earth visualization and the Apriori algorithm. Google Earth is used to pinpoint the geographical locations of existing waste bins, illegal landfills, and people's houses. The distance between the waste bins and the residents' houses, sites of waste disposal by burning, and sites of waste disposal by dumping are then analyzed as a combination of the problems of waste disposal practices. Support, Confidence, multiplication between Support and Confidence, and lift ratio values are then calculated to obtain a combination of the most frequent problems sets. Next, the support value in the Apriori algorithm is compared with the FP-Growth method using Rapidminer. Results obtain support and thus verify data previously obtained from the survey. For a 2-itemset problem and a minimum support value of 0.1, 33% accuracy is obtained, while a 3-itemset problem returns 99% accuracy. We show that our method is useful in verifying data previously obtained from other sources.
This paper discusses a curriculum approach that will give emphasis on practical portions of teach... more This paper discusses a curriculum approach that will give emphasis on practical portions of teaching network security subjects in information and communication technology courses. As we are well aware, the need to use a practice and application oriented approach in education is paramount. Research on active learning and cooperative groups have shown that students grasps more and have more tendency towards obtaining and realizing soft skills like leadership, communication and team work as opposed to the more traditional theory and exam based teaching and learning. While this teaching and learning paradigm is relatively new in Malaysia, it has been practiced widely in the West. This paper examines a certain approach whereby students learning wireless security are divided into and work in small and manageable groups where there will be 2 teams which consist of black hat and white hat teams. The former will try to find and expose vulnerabilities in a wireless network while the latter wi...
2021 Sixth International Conference on Informatics and Computing (ICIC), 2021
This project develops a face recognition-based door locking system with two-factor authentication... more This project develops a face recognition-based door locking system with two-factor authentication using OpenCV. It uses Raspberry Pi 4 as the microcontroller. Face recognition-based door locking has been around for many years, but most of them only provide face recognition without any added security features, and they are costly. The design of this project is based on human face recognition and the sending of a One-Time Password (OTP) using the Twilio service. It will recognize the person at the front door. Only people who match the faces stored in its dataset and then inputs the correct OTP will have access to unlock the door. The Twilio service and image processing algorithm Local Binary Pattern Histogram (LBPH) has been adopted for this system. Servo motor operates as a mechanism to access the door. Results show that LBPH takes a short time to recognize a face. Additionally, if an unknown face is detected, it will log this instance into a "Fail" file and an accompanying CSV sheet.