Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Introducing Coding to Children with Scratch: A Pilot Study

    As digital literacy is necessary in the modern workplace, programming or coding skills have been deemed as an important competence in 21st century education. However, learning to code or program is generally p...

    Check-Yee Law, Kah-Ong Goh, Shih-Yin Ooi in Proceedings of the Future Technologies Con… (2023)

  2. No Access

    Chapter and Conference Paper

    A Pilot Study of Learning Programming with ScratchJr

    Embedding technological tools in learning and providing learning environment that can support wider use of technology to equip students with computational thinking have become the trend in education. Computati...

    Check-Yee Law, Kah-Ong Goh, Shih-Yin Ooi in Advances in Information and Communication (2023)

  3. No Access

    Chapter and Conference Paper

    Modified TPACK Framework for Teachers’ Efficiency, Students’ Performance and Students’ Engagement

    In the digital era, the environment of the classroom had gone through a drastic change where technology is slowly being introduced. Instead of conducting classes and lessons through the traditional or rather c...

    Daniel Lai, Sook Ling Lew, Shih Yin Ooi in Proceedings of Sixth International Congres… (2022)

  4. No Access

    Chapter and Conference Paper

    Proposed Integration of Mobile Interactive System in the Classroom

    In the twenty-first century, there are many technologies available to assist us in our daily lives. One of the most commonly owned technology is mobile technology. Due to its nature of high mobility and easier...

    Daniel Lai, Sook Ling Lew, Shih Yin Ooi in Proceedings of Sixth International Congres… (2022)

  5. No Access

    Article

    Toward forecasting future day air pollutant index in Malaysia

    The association of air pollution and the magnitude of adverse health effects are receiving close attention from the world. The effects of air pollution were found to be most significant for children, elderly, ...

    Kok-Seng Wong, Yee Jian Chew, Shih Yin Ooi, Ying Han Pang in The Journal of Supercomputing (2021)

  6. No Access

    Chapter and Conference Paper

    Contactless Patient Authentication for Registration Using Face Recognition Technology

    Patient registration is an essential process in every clinic and hospital before services are provided to patients. Usually, patient’s identity card or fingerprint (through a fingerprint scanner) will be reque...

    Kian Yang Tay, Ying Han Pang, Shih Yin Ooi in Computational Science and Technology (2021)

  7. No Access

    Chapter and Conference Paper

    A Sequential Approach to Network Intrusion Detection

    In this paper, we combine the sequential modeling capability of Recurrent Neural Network (RNN), and the robustness of Random Forest (RF) in detecting network intrusions. Past events are modelled by RNN, captur...

    Nicholas Lee, Shih Yin Ooi, Ying Han Pang in Computational Science and Technology (2020)

  8. No Access

    Chapter and Conference Paper

    Decision Tree with Sensitive Pruning in Network-based Intrusion Detection System

    Machine learning techniques have been extensively adopted in the domain of Network-based Intrusion Detection System (NIDS) especially in the task of network traffics classification. A decision tree model with ...

    Yee Jian Chew, Shih Yin Ooi, Kok-Seng Wong in Computational Science and Technology (2020)

  9. No Access

    Article

    Temporal Sleuth Machine with decision tree for temporal classification

    Temporal data classification is an extension field of data classification, where the observed datasets are temporally related across sequential domain and time domain. In this work, an inductive learning tempo...

    Shih Yin Ooi, Shing Chiang Tan, Wooi ** Cheah in Soft Computing (2018)

  10. No Access

    Article

    Enhanced independent spectral histogram representations in face recognition

    A spectral histogram descriptor computes a set of marginal distributions based on the filter bank’s responses, and further encodes them into the images. The encoding process for local image structure takes pla...

    Ying Han Pang, Andrew Beng ** Teoh, Shih Yin Ooi in Multimedia Tools and Applications (2018)

  11. No Access

    Chapter and Conference Paper

    Vulnerability Reports Consolidation for Network Scanners

    Vulnerability scanning is one of the vital process conducted by many penetration testers and security consultants as to assess the security of an organizational network. However, when multiple vulnerability s...

    Nicholas Ming Ze Lee, Shih Yin Ooi, Ying Han Pang in Computational Science and Technology (2018)

  12. No Access

    Article

    Temporal sampling forest ( \(\varvec{\textit{TS-F}}\) ): an ensemble temporal learner

    Ensemble learning is in favour of machine learning community due to its tolerance in handling divergence and biasness issues faced by a single learner. In this work, an ensemble temporal learner, namely tempor...

    Shih Yin Ooi, Shing Chiang Tan, Wooi ** Cheah in Soft Computing (2017)

  13. No Access

    Chapter

    Experimental Study of Elman Network in Temporal Classification

    Elman network is an extension of multilayer perceptron (MLP), where it introduces single hidden layer architecture, as well as an additional state table to store the time units for hidden neurons. This additio...

    Shih Yin Ooi, Shing Chiang Tan in Emerging Trends in Neuro Engineering and N… (2017)

  14. No Access

    Chapter and Conference Paper

    Classifying Human Activities with Temporal Extension of Random Forest

    Sensor-Based Human Activity Recognition (HAR) is a study of recognizing the human’s activities by using the data captured from wearable sensors. Avail the temporal information from the sensors, a modified vers...

    Shih Yin Ooi, Shing Chiang Tan, Wooi ** Cheah in Neural Information Processing (2016)

  15. No Access

    Chapter and Conference Paper

    Biometric Access Control with High Dimensional Facial Features

    Access control is vital to prevent adversary from stealing resources from data centres. The security of traditional authentication means, such as password and Personal Identification Number (PIN), are imperfec...

    Ying Han Pang, Ean Yee Khor, Shih Yin Ooi in Information Security and Privacy (2016)

  16. No Access

    Chapter and Conference Paper

    Anomaly Based Intrusion Detection through Temporal Classification

    Many machine learning techniques have been used to classify anomaly-based network intrusion data, encompassing from single classifier to hybrid or ensemble classifiers. A nonlinear temporal data classification...

    Shih Yin Ooi, Shing Chiang Tan, Wooi ** Cheah in Neural Information Processing (2014)