{"title":"Online dyslexia screening test for Malaysian young adults in Bahasa Melayu","authors":"Nur Amalina Mohamad Hazawawi, S. Hisham","doi":"10.1109/ICT4M.2014.7020676","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020676","url":null,"abstract":"Identifying potentially dyslexics among Malaysian young adults could be a difficult task. This is due to lack of awareness about the impacts of dyslexia to young adults, and partly because of the current dyslexia awareness programs in Malaysia are mainly focused on the intervention program for children with dyslexia. Therefore, through this study an online dyslexia-screening test known as MaDIST was developed in Bahasa Melayu targeting the Malaysian young adults. Related study shows that reading assessment is crucial in diagnosing potentially dyslexic among young adults. The development of MaDIST is part of the preliminary work to gather data about dyslexia among young adults in Malaysia - at present, there is lack of accessible data about prevalence dyslexia among the young adults. Despite the fact that many of young adults have been able to overcome their difficulties but most of them describe their childhood experience as `growing up in shame and blame'. This has significantly affected their self-esteem and life opportunities in a long term - although related studies indicate that dyslexic are gifted with profound talents in various fields such as arts, businesses and science. Future work from this study aims to assist Malaysian young adults with dyslexia to overcome their difficulties in life especially in studies by providing them with more information on learning strategies and intervention programs about dyslexia in Malaysia.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126469815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nadianatra Musa, DayangSuryati Abang Ibrahim, Noor Alamshah Bolhassan, Johari Abdullah, N. Kulathuramaiyer, M. Khairuddin
{"title":"An IT governance framework for achieving the development of academic programme in higher institutions: A case of Universiti Malaysia Sarawak (UNIMAS)","authors":"Nadianatra Musa, DayangSuryati Abang Ibrahim, Noor Alamshah Bolhassan, Johari Abdullah, N. Kulathuramaiyer, M. Khairuddin","doi":"10.1109/ICT4M.2014.7020673","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020673","url":null,"abstract":"In Information Technology (IT) Governance, the use of web has become a competitive strategy for aligning business goals and IT within an organization. IT Governance is a subset of corporate governance. IT Governance is the strategic alignment of IT with business so that maximum business value is achieved through the development and maintenance of effective IT control and accountability, performance management and risk management. As the Internet has connected the organization with people all over the world, providing an effective IT control and achieving risk management over the critical data and services. This is a challenging task to all sectors including education. We modeled a conceptual framework by identifying the elements of governance for achieving the development of academic programme through web based system. For the governance elements, data was collected using qualitative methods. This paper reports on the impact gained from the IT governance framework for the development of academic programme in UNIMAS.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115232126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. M. Hafizur Rahman, S. M. Ashif Manjur, A. B. M. Kowser Patwary, Y. Inoguchi
{"title":"Crosstalk freeness of Concatenated Modified Plus-Minus 2i photonic switching network","authors":"M. M. Hafizur Rahman, S. M. Ashif Manjur, A. B. M. Kowser Patwary, Y. Inoguchi","doi":"10.1109/ICT4M.2014.7020661","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020661","url":null,"abstract":"In this paper, we analyze the crosstalk freeness Concatenated Modified Plus-Minus 2i (CMPM2I) photonic switching network. A new routing algorithm is proposed for this network, which decomposes a permutation into two semi-permutations. It is shown that using the proposed routing algorithm the CMPM2I network is capable of realizing semi-permutation in one pass and thus the whole network is corsstalk free in two passes.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123978201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Dzulkifli, Abdul Wahab Abdul Rahman, Abdul Kabir Hussain Solihu, Jamal Ahmed Bashier Badi, Sofia Afzal
{"title":"Optimizing human memory: An insight from the study of Al Huffaz","authors":"M. A. Dzulkifli, Abdul Wahab Abdul Rahman, Abdul Kabir Hussain Solihu, Jamal Ahmed Bashier Badi, Sofia Afzal","doi":"10.1109/ICT4M.2014.7020624","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020624","url":null,"abstract":"We investigated the memory control processes used by a group of people who commit to memory the entire word text of the Quran with complete accuracy. The findings from interviews conducted, revealed the importance of several control processes such as rehearsal, motivation or interest and self-discipline. More importantly, it has been found that it is maintenance and not elaborative rehearsal that plays the most important role in the memorization of the Quran. These findings will help to form a better understanding of the cognitive basis underlying human memory. This knowledge can be incorporated with technology for the purpose of optimizing human potential. More importantly, it gives implications to learning process at large and opens new opportunities and ways to serve the Ummah better.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kabir Umar, A. B. Sultan, H. Zulzalil, N. Admodisastro, Mohd Taufik Abdullah
{"title":"Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach","authors":"Kabir Umar, A. B. Sultan, H. Zulzalil, N. Admodisastro, Mohd Taufik Abdullah","doi":"10.1109/ICT4M.2014.7020604","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020604","url":null,"abstract":"In recent times, there is an alarming increase in web application attacks, with significant cases, specifically, targeting Islamic websites. Since 2004, SQL Injection Vulnerabilities (SQLIVs) remains the most serious software security loopholes via which web applications are exploited. Fixing SQLIVs prior to deployment would provide very effective means of protection against such exploits. Ideally, SQLIVs fixing includes four main phases: SQLIVs detection, fix generation, fix application, and fix effectiveness verification. Most existing research works address different phases separately. There is no single research that addresses the four phases in a seamless integrated automation. This paper presents instances of attack on Islamic websites, and then propose framework for seamless integrated and automated SQLIVs fixing for web application, as part of an ongoing research work. The framework employs Evolutionary Programming to establish competitive co-evolution of web applications and test sets, in which fitness of evolved web applications is evaluated based on their ability to defend test attacks and pass legitimate input tests.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131969153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Suryady, G. Sinniah, S. Haseeb, M. T. Siddique, M. Ezani
{"title":"Rapid development of smart parking system with cloud-based platforms","authors":"Z. Suryady, G. Sinniah, S. Haseeb, M. T. Siddique, M. Ezani","doi":"10.1109/ICT4M.2014.7020616","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020616","url":null,"abstract":"Smart-parking system is one of necessary component to realize the concept of smart city, especially, in the era of Internet of Things (IOT). However, the traditional way of smart-parking development would have been complex, time consuming and prohibitive. On the other hands, in attempt to accelerate the adoption of Internet of Things, Internet Engineering Task Force (IETF) has been aggressively promoted the use of web services through implementation of Platform as a Service (PaaS) as it allows simple, quick and less complex application development. Therefore, in this paper we discuss the adoption of this approach to gain rapid development of smart-parking system. Furthermore, the integration of parking sensor with IOT middleware and front-end dashboard is also highlighted in this paper.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125445498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Responsible tourism system dynamic planning model for rural area","authors":"Khoo Wen Keat, Nadianatra Bt Musa","doi":"10.1109/ICT4M.2014.7020679","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020679","url":null,"abstract":"Rural Tourism has the potential to contribute significantly to the economic development of Malaysia. However, like other forms of tourism, sustainability is its main problem. Responsible Tourism (RT) is a new movement claims that could enhance sustainability in Malaysia tourism industry. A dynamic simulation model has been developed to assist decision makers in RT development. Lundu is chosen as a destination in structuring the causal loop diagram to help understand the dynamic relationship between environment, tourism and local population. A simulation model is designed using mathematical equations in the causal loop diagram. In this model, several scenarios were used to analyze the data obtained and results generated were being analysed. Validation of the model in usability is done by a few tourism research officers. Key indicators were refined to improve the effectiveness and consistency. This study shows that system dynamic modelling is an effective and powerful tool to help understand the complex tourism system by presenting a comprehensive picture. It is hoped that this model will help policy makers in the decision making to achieve desirable outcomes.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating cyber terrorism components in Malaysia","authors":"Zahri Yunos, R. Ahmad","doi":"10.1109/ICT4M.2014.7020582","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020582","url":null,"abstract":"In this digital age, the use of cyberspace to carry out terrorist activities has emerged. To date, there is no universally accepted definition of cyber terrorism, which seems to be the fundamental issue and challenge in countering cyber terrorism threats. Some argued that the concept should be parallel with domestic political, cultural and social context. The purpose of this paper is to develop components of cyber terrorism using qualitative method analysis. In this paper, a semi-structured interview with purposive sampling for data collection has been carried out. The analysis indicated that the framework describing cyber terrorism can be considered from six different components: motivation, target, method of attack, domain, action by perpetrator and impact. The analysis has also shown that there were some similarities and differences in views regarding the proposed cyber terrorism conceptual framework.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116496995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of perceived task complexity on the information types needed, information sources and channels used by lawyers","authors":"N. Adewale, Y. Mansor","doi":"10.1109/ICT4M.2014.7020620","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020620","url":null,"abstract":"Tasks and its features, especially the complexity dimension has been identified as a major drive for information seeking. This study explores the effects of the perceived task complexity and uncertainty on the information types needed and the information sources used by commercial lawyers in Nigeria. A survey method was adopted and data was gathered with the use of questionnaires. The analysis and hypotheses testing was done using the smartPLS 2.0 M3 software. Findings indicate direct positive relationships among the constructs, except for the relationship between perceived task complexity and the information sources consulted by lawyers.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133517544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. W. Mahesar, Hafiz Abid Mahmood Malik, Akhlaq Ahmad, Asadullah Shah, M. Wahiddin
{"title":"Calculus and its applications in scale-free networks","authors":"A. W. Mahesar, Hafiz Abid Mahmood Malik, Akhlaq Ahmad, Asadullah Shah, M. Wahiddin","doi":"10.1109/ICT4M.2014.7020635","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020635","url":null,"abstract":"The purpose of this article is to highlight and emphasize the applications of calculus in scale-free networks, which have been found as property of many complex networks. There are many different types of real and manmade complex networks in various domain of life ranging from technological, social, biological, transportation and ecological networks among many others. All these networks have shown many similar structural properties in their formation and functions. This article focuses on the most prevalence type of networks known as Scale-Free Networks (SFN). These types of networks have two basic properties: growth and preferential node attachment. In this paper, we analyze and discuss the importance and usage of calculus in understanding the formation of these type of networks, as these networks continuously change their topology by inclusion of new nodes and links as they evolve. Further, as the calculus is the mathematical study of change therefore the applications of calculus in evolution process of complex networks with fitness model have been explained analytically based on fit-get-rich phenomenon in the complex networks as compared to simple BA1 model which is based, only on the consideration of number of nodes linkages in the networks.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133694378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}