Al-Madinah International University
Shah Alam, Malaysia

MEDIU is an independent, non-profit educational institution, located in Malaysia. The university was established in 2006, founded on Islamic principles and values. MEDIU is licensed by the Malaysian Ministry of Higher Education and its programs are accredited by the Malaysian Qualification Agency . The university is managed by Rector Prof. Dr. Mohammad Khalifa Al-Tamimi. Wikipedia.

Time filter

Source Type

Hanum H.M.,University Technology of MARA | Nasaruddin S.,University Technology of MARA | Bakar Z.A.,Al-Madinah International University
2016 3rd International Conference on Information Retrieval and Knowledge Management, CAMP 2016 - Conference Proceedings | Year: 2016

Prosodic phrasing is useful to segment lengthy spontaneous speech into smaller meaningful utterance without analysis of linguistic information. A simpler approach is presented to identify and classify the boundaries in prosodic phrasing using pitch and intensity patterns and pause duration on Malay speech sentences. We also propose a listening test that allows trained listener to classify the boundaries as minor or major breaks. This cheaper and faster approach is proven useful for under-resource language such as Malay which do not have comprehensive prosodic-annotated corpus. Word-related pitch, intensity and duration features are extracted from the targeted sentence and phrase breaks. A speech corpus is developed from targeted breaks of 100 speech sentences evaluated in the listening test. Instead of labeling the phrase break using linguistic and phonetic meaning, the proposed listening test allows labeling of phrase break as perceived by listener. In addition, the results can be used as preliminary information for evaluation of boundary saliency at the targeted boundary locations. © 2016 IEEE.

Sazali S.S.,University Technology of MARA | Rahman N.A.,University Technology of MARA | Bakar Z.A.,Al-Madinah International University
2016 3rd International Conference on Information Retrieval and Knowledge Management, CAMP 2016 - Conference Proceedings | Year: 2016

Natural Language Processing (NLP) is an important field of research in Computer Science. NLP is the process of analyzing texts based on a set of theories and technologies, and recent studies focused more on Information Extraction (IE). In Information Extraction, there are few steps or commonly known as task to be followed, which are named entity recognition, relation detection and classification, temporal and event processing, and template filling. Recent researches in Malay languages mainly focused on newspaper articles and since this research experiment is experimenting on classical documents, there is a need to identify the best way to extract noun from existing methods. This paper proposes to conduct a research about extracting nouns from Malay classical documents. The result shows that experiment using the Noun Extraction using Morphological Rules (Verb, Adjective and Noun Affixes) that has 77.61% chances of identifying a noun to contribute to the existing Malay noun list. As there is not any existing completed Malay noun list or dictionary that can be used as a guide, the results extracted still need to be judged by the language experts. © 2016 IEEE.

Azizan A.,University Technology of MARA | Bakar Z.A.,Al-Madinah International University | Noah S.A.,National University of Malaysia
2016 3rd International Conference on Information Retrieval and Knowledge Management, CAMP 2016 - Conference Proceedings | Year: 2016

Query reformulation techniques based on ontological approach have been studied as a method to improve retrieval effectiveness. However, the evaluation of this techniques has primarily focused on comparing the technique with ontology and without ontology. The aim of this paper is to present, evaluate and compare the proposed technique in four different possibilities of reformulation. In this study we propose the combination of ontology terms and keywords from the query to reformulate new queries. The experimental result shows that reformulation using ontology terms alone has increases recall and decreases precision. However, better results were obtained when the ontology terms being combined with the query's keywords. © 2016 IEEE.

PubMed | Jabal Amman, Al-Madinah International University, Mu'tah University and Public Health England
Type: | Journal: Journal of infection and public health | Year: 2016

Little is known of carbapenemase producing Klebsiella pneumoniae (CPK) in Jordan. This study aimed to determine the prevalence of CPK in a major hospital in Amman, Jordan in 2012-2013 and to characterize the isolates and detect the types of carbapenemase(s) they produced. For the 296 isolates investigated, species identification and antimicrobial susceptibilities were determined (Vitek II, bioMrieux). Isolates with decreased ertapenem susceptibility were tested for carbapenemase production using the Modified Hodge Test. Isolates with a carbapenemase-positive phenotype were characterized further via multiplex PCRs for extended-spectrum -lactamase and carbapenemase genes and by Pulsed Field Gel Electrophoresis (PFGE). Seven of 296 K. pneumoniae isolated in 2012-2013 (2.4%) were carbapenemase producers, five produced class D carbapenemases (OXA-48-like) and two produced a NDM metallo-beta-lactamase. All seven isolates also encoded CTX-M enzymes; CTX-M-1-like enzymes were detected in five isolates (two co-producing NDM enzymes and three co-producing OXA-48-like enzymes), CTX-M-9 was found in the two remaining OXA-48-like producers. PFGE revealed five genetically distinct types amongst the seven carbapenemase producing K. pneumoniae, with two pairs of identical isolates associated with patients treated on the same wards. The emergence of OXA-48-like and NDM carbapenemases associated with multi-drug resistant (MDR) isolates in Jordan is concerning. The strict implementation of infection control practices will help to disrupt the spread of MDR carbapenemase producers in Jordanian hospitals.

Mat Kiah M.L.,University of Malaya | Zaidan B.B.,Multimedia University | Zaidan B.B.,Sunway University | Zaidan B.B.,Al-Madinah International University | And 5 more authors.
International Journal of Physical Sciences | Year: 2011

With the increasing usage of digital multimedia, the protection of intellectual property rights problem has become a very important issue. Everyday, thousands of multimedia files are being uploaded and downloaded. Therefore, multimedia copyrights become an important issue to protect the intellectual property for the authors of these files. In this paper, the domains of digital audio steganography, the properties of H.A.S, the audio and the digital representation transmission environments, and its software metric, are discussed. The main purpose of this paper is to provide a proper background on the usage of audio file for the purpose of implementing new approaches and techniques in digital watermarking and steganography. ©2011 Academic Journals.

Patel A.,National University of Malaysia | Patel A.,Kingston University | Seyfi A.,National University of Malaysia | Tew Y.,National University of Malaysia | And 2 more authors.
Library Hi Tech News | Year: 2011

Purpose: Grid computing, cloud computing (CC), utility computing and software as a service are emerging technologies predicted to result in massive consolidation as meta-level computing services of everything beneath one umbrella in the future. The purpose of this study is to foster the understanding and differentiation, by using the three aforementioned types of computing technologies and software, as a service by both public and private libraries to meet their expectations and strategic objectives. Design/methodology/approach: The approach in this study is a review based on comparing the four computing technologies with a brief analysis for researching and designing the mind map of a new meta-level computing service approach, taking into consideration the need for new economic tariff and pricing models as well as service-level agreements. Findings: Since it is anticipated that there will be likely potential consolidation and integration of computing services, a study of these four most advanced computing technologies and their methodologies is presented through their definition, characteristics, functionalities, advantages and disadvantages. This is a well-timed technological advancement for libraries. Practical implications: It appears that the future of library services will become even more integrated, running over CC platforms based on usage rather than just storage of data. Social implications: Libraries will become an open useful resource to all and sundry in a global context, and that will have huge societal benefits never imagined before. Originality/value: Concisely addresses the strategies, functional characteristics, advantages and disadvantages by comparing these technologies from several service aspects with a view to assisting in creating the next generation outer space computing. © Emerald Group Publishing Limited.

Liban A.,Al-Madinah International University | Hilles S.M.S.,Al-Madinah International University
Proceedings - 2014 5th IEEE Control and System Graduate Research Colloquium, ICSGRC 2014 | Year: 2014

Securing the database against frequent attacks is a big concern; attackers usually intend to snitch private information and damage databases. These days, web applications are widely used as a meddler between computer users. Web applications are also used mostly by e-commerce companies, and these types of applications need a secured database in order to keep sensitive and confidential information. Since Blind SQL injection attacks occurred as a new way of accessing database through the application rather than directly through the database itself, they have become popular among hackers and malicious users. Many detection tools are developed to handle this problem but they have limitations. This study enhances SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks (MYSQL Injector) using time-based attack with Inference Binary Search Algorithm. It covers four types of blind SQL injection attacks, true/false, true error, time-based and order by attacks. This tool will automate the process of the blind SQL injection attacks to check the blind SQL injection vulnerability in the PHP-based websites that use MySQL databases. Forty four vulnerable websites and thirty non vulnerable websites were tested to ensure the accuracy of the tool. The result shows 93% accuracy for detecting the vulnerability while MySQL injector performs 84%. © 2014 IEEE.

Yafooz W.M.S.,Advanced Analytics Engineering Center | Yafooz W.M.S.,University Technology of MARA | Abidin S.Z.Z.,Advanced Analytics Engineering Center | Abidin S.Z.Z.,University Technology of MARA | And 2 more authors.
Communications in Computer and Information Science | Year: 2016

Big data is a popular term used to describe a massive volume of data, which is a key component of the current information age. Such data is complex and difficult to understand, and therefore, may be not useful for users in that state. News extraction, aggregation, clustering, news topic detection and tracking, and social network analysis are some of the several attempts that have been made to manage the massive data in social media. Current visualization tools are difficult to adapt to the constant growth of big data, specifically in online news articles. Therefore, this paper proposes Interactive Big Data Visualization Model Based on Hot Issues (IBDVM). IBDVM can be used to visualize hot issues in daily news articles. It is based on textual data clusters in textual databases that improve the performance, accuracy, and quality of big data visualization. This model is useful for online news reader, news agencies, editors, and researchers who involve in textual documents domains. © Springer Nature Singapore Pte Ltd. 2016.

Moussa A.N.,University of Technology Malaysia | Ithnin N.B.,University of Technology Malaysia | Miaikil O.A.M.,Al-Madinah International University
Proceedings - 2014 IEEE Conference on System, Process and Control, ICSPC 2014 | Year: 2014

Cloud computing provides to the consumers basic computing resources that range from storage and computing power to sophisticated applications. When digital forensics is needed for suspected cases involving cloud computing, the provider is responsible for collecting the digital evidence. Limitations of this approach include lack of efficient incident response, and that the consumers may have a little or no choice but to accept electronic evidences made available by the cloud provider. This research investigates whether it is possible to perform consumer-side digital forensics where a consumer independently collects all digital evidences required for a suspected case from Infrastructure as a Service resources (IaaS). In particular, the research contributes to a digital forensics readiness framework that shows how digital evidence collection can be made strongly consumer-centric, so that all the electronic evidences that digital forensic investigation requires for suspected cases can be provided independently by the IaaS consumers. © 2014 IEEE.

Hilles S.M.S.,Al-Madinah International University | Maidanuk V.P.,Vinnytsia National Technical University
ARPN Journal of Engineering and Applied Sciences | Year: 2014

This paper present image coding which is gained many researchers attention in order to improve the quality of image after the compression process. Since this is expended most computing resources and research which is related not only to search for a mathematical transformation, but also to study the characteristics of visual perception of the image features and fail-safe transmission of images via communication channels. There are many methods of image coding with neural networks of 2D SOFM kohonen map have been suggested and investigated. The coding schemes are proposed methods vector quantization as the original image, and the spatial frequency image component derived from the adaptive to the contours of the two-dimensional analysis and synthesis. The calculation of the computational cost in compression based on Kohonen maps. The methods are characterized by a high level of adaptation due to the introduction of educational stage that provides for the increase of multiplication ratio and high quality of image restarting after coding. The modified method of image multiplexing based on characteristic feature of the given method is vector digitizing of image components. This paper considers the coding problem of photo realistic images, presented in a digital form. The characteristic feature of the method is the application of pair exchange, this increases processing speed and sorting of data arrays. However the result of proposed method is shown the image quality after compression processor. Using this approach the differences or lost pixels between the image after and before compression processer are considered. The propose method may useful for image representation and image coding researcher and such related field. © 2006-2014 Asian Research Publishing Network (ARPN).

Loading Al-Madinah International University collaborators
Loading Al-Madinah International University collaborators