{"title":"3D animation as an alternative mean of da'wah for children","authors":"M. Draman, A. Zeki","doi":"10.1109/ICT4M.2014.7020615","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020615","url":null,"abstract":"3D animation cartoons has prodigious influence on children's mind, because children love watching cartoon. It is proved to influences family functioning in varied ways and has shaped our culture and social system. It affects the new generation with more aggressive personality and negative minds in sociality. Hence, it obstructed their learning of right behaviors. Concerned that this problem might become more severe, we tried relieve these problems by using a more proper 3D animation cartoon for children's entertainment as it is the closest media to the children. We have been motivated to propose a proselytizing or preaching of Islam (Da'wah) to prevent negative influences towards the children by proposing a suitable guideline for 3D animator in producing da'wah animation media more effectively.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"88 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133749871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rosli Omar, Abu Osman Md Tap, Zainatul Shima Abdullah
{"title":"Web usage mining: A review of recent works","authors":"Rosli Omar, Abu Osman Md Tap, Zainatul Shima Abdullah","doi":"10.1109/ICT4M.2014.7020638","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020638","url":null,"abstract":"Web mining is the application of data mining on web data and web usage mining is an important component of web mining. The goal of web usage mining is to understand the behavior of web site users through the process of data mining of web access data. Knowledge obtained from web usage mining can be used to enhance web design, introduce personalization service and facilitate more effective browsing. This paper presents a review of literature containing latest works done in this field. Our objective is to provide an overview of web usage mining concepts relevant to pattern mining phase of web usage mining process. We provide review of pattern discovery algorithms which utilize association rules, classification and sequential patterns, and since sequential pattern mining is gaining much interest from WUM research community extra emphasis is given to related papers.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"34 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133932049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. A. Aziz, Yushiana Manser, Sharifah Nur Amirah Sarif Abdullah, Siti Raihanah Mohd Shah, Nurul Farahana Aersid
{"title":"Normalizing library records display using FRBR model for al-Qur'an work-set","authors":"N. A. Aziz, Yushiana Manser, Sharifah Nur Amirah Sarif Abdullah, Siti Raihanah Mohd Shah, Nurul Farahana Aersid","doi":"10.1109/ICT4M.2014.7020586","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020586","url":null,"abstract":"The Functional Requirements for Bibliographic Records (FRBR) model is a conceptual entity-relationship model developed for better arrangement, collocation, and navigation in bibliographic databases. As such, a FRBRized library online catalog (OPAC) can improve the performance of OPAC as a retrieval tool. We explored the utility of FRBR framework for supporting rich indexation, and rich interaction in digital libraries using an open source FRBR tool developed by the Library of Congress. We tested the system on some MARC-based bibliographic records from the International Islamic University Malaysia (IIUM) library. Several issues have been found useful to be explored which includes multi-script, complex work, and missing fields. We also experimented on FRBRzing the work-set on al-Quran using the LOC FRBR Display Tool. This paper will elaborate on the process of FRBRizing using this open-source tool. Several problems encountered in the experiment are discussed and future enhancements are proposed. This work may initiate interest among the librarian to adopt FRBR as advancement to the existing digital library system.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132835566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identify the best location to place data based on social interaction in opportunistic network","authors":"H. Lenando, Goh Sing Sian, A. Khan, A. H. Fauzi","doi":"10.1109/ICT4M.2014.7020600","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020600","url":null,"abstract":"Opportunistic networking is an evolution of Ad hoc mobile communication paradigm. Sharing information in opportunistic networks is challenging due to intermittent connectivity, short connection durations and a highly dynamic topology. Numbers of researches have proposed data dissemination approach to increase the chances of delivering information to the destination node with the minimum duration of time. This paper presents the mechanism of identifying the best location based on social interaction to increasing the data dissemination successful rate in opportunistic network. From the simulation results, we found that in the high density population, placing data based on identified location increases the data exchange between nodes about 38% compared to random data placement. Therefore placing data in the right place contribute the effective of data dissemination among mobile nodes.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123514085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdul Rahman Ahmad Dahlan, Hayati Mohd. Dahan, Md Yazid Mohd Saman
{"title":"The success factors in government information sharing (GIS) — Empirical findings from the Malaysians natural disaster management context","authors":"Abdul Rahman Ahmad Dahlan, Hayati Mohd. Dahan, Md Yazid Mohd Saman","doi":"10.1109/ICT4M.2014.7020642","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020642","url":null,"abstract":"Governments around the world are turning to information sharing and collaboration in an interactive process to act on issues such as natural disasters. This demand for a comprehensive disaster management (DM) program covering a wide range of disciplines, sectors and organizations, calling for diverse and expanded forms of collaboration can be far more powerful than individual contributions. The occurrences of natural disasters has been increasing for the last 30 years in the world causing great damages and losses, where about 90% are concentrated in the Asian region. Malaysia has also experienced some devastating natural disasters. In 2007, 29 people had been killed and more than 166,000 people had been affected by floods, with economic damage amounting to USD 968 million. DM including disaster risk reduction (DRR) efforts aim to minimize or avoid the potential losses from hazards, assure prompt and appropriate assistance to victims of disaster, and achieve rapid and effective recovery. While data, information, knowledge, experiences, expertise and resources sharing can enhance the process of DM, there is a perceived gap in government collaboration and coordination within the context of natural DM. The objective of this paper is to present the initial empirical findings on the success factors that can provide high quality of government information sharing (GIS) in supporting effectively DM in Malaysia.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129212970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rizal Bin Mohd. Nor, Abdulfattah Muhyideen bin Muhd Ridzuan, Mohamed Jalaldeen Mohamed Razi
{"title":"The design and implementation of a QR-code enabled mobile online judging application","authors":"Rizal Bin Mohd. Nor, Abdulfattah Muhyideen bin Muhd Ridzuan, Mohamed Jalaldeen Mohamed Razi","doi":"10.1109/ICT4M.2014.7020641","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020641","url":null,"abstract":"In this paper, we show the design considerations of using QR code in the evaluation of academic poster presentations. Most researchers focused their study in the usability and implementation of a QR-code in mobile applications. While its use and implementation can be applied to many areas, its adoption is still at an infant stage. This is due to poor design considerations which affects users satisfaction and ease of use. In our research, we designed and developed a mobile online judging application called MOJA to be used by judges in the IIUM IRIIE 2014 poster exhibition and performed a survey to measure user's satisfaction in using the application. Our results show that most of the users are satisfied with MOJA based on their perceived usefulness of our application in their judging process. Additionally, we showed that their perceived ease of use influenced users to use MOJA in their future judging process, as well as, their willingness to recommend MOJA to their friends and colleagues.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123353138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Farin Rahman, Mahjabeen Mostafa, M. M. Hafizur Rahman
{"title":"Four persons envy-free division: A case study","authors":"Farin Rahman, Mahjabeen Mostafa, M. M. Hafizur Rahman","doi":"10.1109/ICT4M.2014.7020609","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020609","url":null,"abstract":"In this paper we present an algorithm for 4 person envy free division. The theme of this division is that each and every person will not envious to other i.e. no one will receive larger piece. They will be satisfied with their own portion and will think that he or she received the largest piece. Here we present two possible procedures and we used as minimal cuts as possible.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115560820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic resources at the University of Dubai: Information seeking behavior","authors":"Ali Amour El-Maamiry","doi":"10.1109/ICT4M.2014.7020593","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020593","url":null,"abstract":"The study investigated use of electronic resource by students of College of Business Administration and College of Information Technology. That is, it examined possible factors and problems in their searching habits, information seeking, use and retrieval in satisfying their needs. Therefore, the study focused on information seeking behaviour of students and barriers to utilizing online resources to execute academic tasks.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115406432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Techniques for analysing Android malware","authors":"O. S. Adebayo, N. A. Aziz","doi":"10.1109/ICT4M.2014.7020656","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020656","url":null,"abstract":"The Android operating system is gaining market share on smartphones and tablets due to its market openness and easier accessibility and operability. Therefore, it is increasingly targeted by malware. This research examines several attack vectors on an android smartphone. Techniques are presented for the analysis of such attack vectors in order to identify and obtain useful features for analysis and classification and suggestions proffered for appropriate solution. The research recommends appropriate practices to ensure the security of information on an android smartphone.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116944898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventing persistent Cross-Site Scripting (XSS) attack by applying pattern filtering approach","authors":"Imran Yusof, A. Pathan","doi":"10.1109/ICT4M.2014.7020628","DOIUrl":"https://doi.org/10.1109/ICT4M.2014.7020628","url":null,"abstract":"Cross-Site Scripting (XSS) vulnerability is one of the most widespread security problems for web applications, which has been haunting the web application developers for years. Various approaches to defend against attacks (that use XSS vulnerabilities) are available today but no single approach solves all the loopholes. After investigating this area, we have been motivated to propose an efficient approach to prevent persistent XSS attack by applying pattern filtering method. In this work, along with necessary background, we present case studies to show the effectiveness of our approach.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126259262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}