My career has been focused on high impact research, practice and education in Network Security (Password system) starting with my doctoral thesis. Effective Network Security (Password system) requires science, engineering, business, policy and people skills. My goal is to instill this culture in the discipline and provide leadership in all elements.
EMonitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Monitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Monitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Monitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Monitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Monitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Educate to elevate the students and make them prepare for the industrial requirements of IT Industry and all their future endeavors. And also interested both in academic and research sector for self-development.
My career has been focused on high impact research, practice and education in Network Security (Password system) starting with my doctoral thesis. Effective Network Security (Password system) requires science, engineering, business, policy and people skills. My goal is to instill this culture in the discipline and provide leadership in all elements.
EMonitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Monitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Monitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Monitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Monitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Monitor and conduct academic activities of the institute
Promote industry institution interaction as well as research & development activity
Conduct the periodic meetings of the faculties
Collaborate for Sponsored Projects of Industry
Recommend allocation of budget for the departments as requested by the Head of Departments to the Governing
Educate to elevate the students and make them prepare for the industrial requirements of IT Industry and all their future endeavors. And also interested both in academic and research sector for self-development.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
3. Project Team
Name Section
Hasmafatiha Harun ISRS
Ir. Susana Kamaruddin PMF
Kairol Asmar bin Abu Bakar IARS
Al Malek Faisal bin Mohd. Amin ISRS
Raja Zurina binti Raja Mohamed Ali ISRS
Mohd Suhaimi bin Abdul Wahab ISRS
Mohd Azam Shah bin Abd Hamid ISRS
4. Project Activities
May 2015 June 2015 July 2015 August 2015 Sept 2015 Oct 2015 Nov 2015 Dec 2015
Activities W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
Project Planning and Management
Project Documentation/Management
Project Progress Presentation
Literature Review, Primary and Secondary
Research
Literature Review
Robotics Stakeholders’ Identification and Listing
Identification of Objectives
Development of Questionnaires
Stakeholders’ Engagement Session
Communicate with stakeholders using e-mail
and fax
Stakeholders’ Visit
Workshop
Data Analysis
Data Analysis based on the data collection
conducted
Portal Design and Development
Report Preparation and Writing
6. Questionnaires: Activities
No Activities Date/Month Remarks
1 Identification of objectives June 2015
2 Development of Questionnaires June – July 2015 2 questionnaires was developed
• Technology and Standards
• Human Capital (for Industry and Academia
respectively)
3 Cover Letter July 2015 Signed by Head of ISRS
4 Robotics Stakeholders Listing June – July 2015
5 Send Questionnaires 7th July 2015 - Questionnaires
emailed to 35 companies
- Email not updated on internet and directory. Need to
update email information through telephone
9th July 2015 - Questionnaires
emailed to 31 academias
13th July 2015 -
Questionnaires emailed to 35
companies
6 Follow up 27th July - current - Companies need more time to fill in the questionnaires
7 Data Compilation and Analysis In progress
7. Questionnaires: Respondents
No Respondents Company/Organisation Stakeholder Category Contact
1 Prof. Dr. Mohd Rizal bin Arshad USM (Underwater Robotics Research Group) Research Centre, Academia 04 599 6004/6074
eerizal@usm.my
2 Ricky Yap Wee Yang DF Automation & Robotics Solutions Provider,
Distributor, Training Centres
012-7587102
sales@dfautomation.com
3 Kelvin Ng Keng Chee Maltool Industries Sdn Bhd Distributor, Manufacturer maltoolind@yahoo.co.uk
4 K W Lam Drives Automation Solution Provider Via phone interview, 27th August
2015
5 Dr Surest Gobee APITT University Research Centre, Academia
6 Rozman bin Abdul Rahim NS Aries Sdn Bhd Solution Provider 019-472 4741
rozman@aries.com.my
7 Stanley JE Beh Automation Sdn Bhd Solution Provider 012-4946200
8 Ir. Dr. Mohd Zaidi bin Jaafar UTM Research Centre, Academia 016-2642573
mzaidij@petroleum.utm.my
9 Ahmad Dahari bin Jarno CyberSecurity Research Centre 012-6790891
dahari@cybersecurity.my
10 Wan Shariz Nuruddin M3NERGY Implementer/User 012-2831097
shariz@m3nergy.com
11 Norkamal Jaafar Jabatan Pendidikan Politeknik Academia 016-6967264
Nkj.jaafar@gmail.com
8. Questionnaires: Respondents
No Respondents Company/Organisation Stakeholder Category Contact
12 Dr Mohamed Nor Azhari bin
Azman
UPSI Research Centre/Academia 019-4055547
mnazhari@fptv.upsi.edu.my
13 Roslan bin Muhamed TPM Engineering Sdn Bhd Solution Provider
14 Mejar Ir. Nurulhasnan bin Abd
Majid
UPNM Research Centre/Academia 012-3994290
hasnan12@hotmail.com
15 Ilango Sethu Freescale Semiconductor Manufacturing ilango@freescale.com
16 Capt. Ahmad Imran Satumarin Sdn Bhd Solution Provider Capt.ahmadimran@satumarin.com
17 Nasery Abdul Rahman Berlian McDermott Sdn Bhd Solution Provider 013-8881331
narahman@mcdermott.com
18 Mohd Khairulazam bin Mohamed FELDA User 013-7231803
19 Abdul Aziz bin A Rahim Lembaga Pertubuhan Peladang User arahim_a@yahoo.com
20 Tan Ban Soon PUSPEKA TUDM User 013-3883624
21 Ir. Kenny Ang Control Easy Technology Sdn Bhd Solution Provider 012-3053798
sales@controlez.com
22 Noriasween bt Abd Malik UITM Academia 013-371175
23 Hairi Zamzuri UTM Academia 012-4701449, hairi.kl@utm.my
9. Questionnaires: Respondents
No Respondents Company/Organisation Stakeholder
Category
Contact
24 Mad Helmi bin Abd Majid USM Academia helmi_mjd@yahoo.com
25 Mohd Faid bin Yahya USM Academia 0137871657, mohdfaiz85@gmail.com
26 Mei Jian Hong USM Academia, Research
Centre
010-3929816, meijianhong@gmail.com
27 Song Yoong Siang USM Academia songys-109@hotmail.com
28 Irraivan Elamvazuthi UTP Academia Irraivan_elamvazuthi@petronas.com.my
29 Widad Ismail USM Academia, Research
Centre
012-4252683, eewidad@usm.my
30 Goke Ojemiyi UUM Academia 016-3613597, go4oje@yahoo.com
31 Hayder Mohamed Ali UUM Academia 019-4350143
32 Rizal A SLIM TIME SOLUTIONS Solution Provider osmanrizal@gmail.com
33 Mohamed Hadi Habaebi IIUM Academia 019-3290652, habaebi@iium.edu.my
34 R Hashim UITM Academia hajahgy@gmail.com
10. Visits to Stakeholders - Industry
Stakeholders/ Contact Person Date
Maltool Sdn Bhd 8th July 2015
Formahero (M) Sdn Bhd 13th July 2015
Vepro Sdn Bhd 29th July 2015
Leeden Robotics and Automation 3rd August 2015
NS Aries Sdn Bhd 2nd September 2015
SUBUR Teknologi (M) Sdn Bhd 2nd September 2015
JE BEH Automation Sdn Bhd 3rd September 2015
NAZA Automotive Sdn Bhd 3rd September 2015
11. Visits to Stakeholders – Academia/Experts
Stakeholders/ Contact Person Date
COE/Academia Centre of Artificial Intelligence and
Robotics
13th August 2015
Standards Pn Salwa binti Denan 28th August 2015
Human Capital Ir. Dr. Mazlee Md Rani 10th September 2015
12. Robotics Technology Advancement Workshop
13 October 2015, SIRIM
Bukit Jalil
To establish strategic
robotics projects for the
advancement of
Robotics in Malaysia
towards 2020
Representatives:
Industry, Universities,
Research Institution and
Government Agency
Agriculture
Oil & Gas
SME/Industry
Healthcare
Edutainment
Defense
Projects
Projects
Projects
Projects
Projects
Projects
Technologies
Technologies
Technologies
Technologies
Technologies
Technologies
Team
Structure
Team
Structure
Team
Structure
Team
Structure
Team
Structure
Team
Structure
16. 2015 IEEE International Symposium on Robotics
and Intelligent Sensors Oct. 18-20, 2015
• IEEE Robotics and Automation Society Malaysia Chapter's flagship conference and is
a premier international forum for robotics and sensors researchers and students to
present their work
• IEEE-IRIS2015 provides academic platform for interactive and technical discussion
and presentation on various issues in robotics and sensors.
•
• The conference theme is “Robotics and Sensors: Technologies Enabling New
Sustainable Lifestyle” reflecting the growing spectrum and recent developments in
robotics and sensors around the world towards sustainable human's lifestyle.
• Attended by 2 members:
• Hasmafatiha Harun
• Al Malek Faisal bin Mohd. Amin