In face recognition, feature extraction techniques<br> attempts to search for appropriate r... more In face recognition, feature extraction techniques<br> attempts to search for appropriate representation of the data. However,<br> when the feature dimension is larger than the samples size, it brings<br> performance degradation. Hence, we propose a method called<br> Normalization Discriminant Independent Component Analysis<br> (NDICA). The input data will be regularized to obtain the most<br> reliable features from the data and processed using Independent<br> Component Analysis (ICA). The proposed method is evaluated on<br> three face databases, Olivetti Research Ltd (ORL), Face Recognition<br> Technology (FERET) and Face Recognition Grand Challenge<br> (FRGC). NDICA showed it effectiveness compared with other<br> unsupervised and supervised techniques.
2017 5th International Conference on Information and Communication Technology (ICoIC7), 2017
This short case study represents a preliminary exploration of the impact of a poorly developed hi... more This short case study represents a preliminary exploration of the impact of a poorly developed higher order level of self-regulation on self-regulated learning (SRL), testing the relevance to students' capacity to manage conflicting academic and non-academic goals. We further problematize culture in this context and develop a model, as a basis for future research. The environments for the study are countries that provide tertiary education to international students. The overall aim is to demonstrate that incomplete development of self-regulated learning prevents students from effectively managing conflicting high-priority goals (H2-4). Secondary aims are to test if poorly developed self-regulation coincides with unsatisfactory development of general study skills (H5) and to theoretically justify future research on the impact of culture on SRL (H1). The data source for this study is an entry level skills/knowledge test. Three scenario-based motivational questions were added and d...
This article is to learn the characteristics of graphical passwords by comparing different catego... more This article is to learn the characteristics of graphical passwords by comparing different categories of graphical passwords with the ISO 9126 model. The ISO 9126 model is divided into six parts, which are usability, reliability, functionality, maintainability, efficiency, and portability. Each part listed is sub-categorised by the standard and is used to evaluate the quality of a product. Multiple graphical passwords are chosen from different classification of graphical passwords for thirty users to test and fill in the survey. Then a survey was conducted to compare each of these five categories of graphical passwords based on the ISO 9126 model. Thirty users of different ages and gender were invited to the booth to test the graphical password systems and fill in survey. The survey results as described in the article show us which category of graphical passwords contains more of the ISO 9126 characteristics
This paper introduces the hybrid UTAUT model to explore pre-school children’s actual interaction ... more This paper introduces the hybrid UTAUT model to explore pre-school children’s actual interaction experience with video puzzle using tablets. For the past 10 years, there is much debate on the factors affecting children’s actual interaction experience with interactive edutainment using tablet and there is a general agreement that children need access to tablet for learning activities and cognitive development. However, little research was carried out to evaluate the actual interaction motivation that determines the learning experience of pre-school children in their interaction with video puzzle using tablet. In Malaysia, the use of tablet in pre-school has been increasing rapidly, therefore, research to understand actual children video puzzle interaction using tablet to meaningfully support children’s learning activities is much demanded. The main constructs of UTAUT had been maintained by integrating two new constructs, namely, Playability and Self-Efficacy into a hybrid model. The...
2017 5th International Conference on Information and Communication Technology (ICoIC7), 2017
eHealth organizations are a major target for hackers as they hold wealth of information. Current ... more eHealth organizations are a major target for hackers as they hold wealth of information. Current cyber security solutions for eHealth organizations are not comprehensive and only protect certain security layer. Therefore; the need for a next generation cyber security solution is increasing, a solution that is smart, scalable and adoptable to challenges. The wide spread of security tools and advancing technology have provided the needed infrastructure to create a comprehensive eHealth security solution. Connecting the right security tools together to ensure the overall security without affecting the network performance and user productivity is hard and requires special setup. The network layer is a major target for any eHealth organization, this research has indicated several network security metrics that need to be considered when designing and managing network security for an eHealth organization. The ultimate goal of this research is to identify the limitations in the current eHealth organization cyber security solutions specially the network layer and propose a next generation cyber security solution for eHealth organizations.
Increasingly, learner motivation is implicated in student failure at universities. This has led t... more Increasingly, learner motivation is implicated in student failure at universities. This has led to intense research into internal or external variables that might buoy resilience to failure. This research investigates the impact of strong cultural connectedness and strong belief systems on the academic buoyancy of international students studying at an Australian University. For this purpose, we surveyed 102 tertiary students at a Sydney university. Results demonstrate that, in the event of academic failure, students’ academic buoyancy remains high if they have support through strong cultural connections and from their belief systems. We further endeavored to identify if academic buoyancy was fed by intrinsic or extrinsic motivation. This research contributes to the understanding of the sources of strengths available to international students from primarily collective cultures studying overseas. There are implications for educational practice in terms of identifying students ‘at high...
2014 2nd International Conference on Information and Communication Technology (ICoICT), 2014
User authentication depends largely on the concept of passwords. However, users find it difficult... more User authentication depends largely on the concept of passwords. However, users find it difficult to remember alphanumerical passwords over time. When user is required to choose a secure password, they tend to choose an easy, short and insecure password. Graphical password method is proposed as an alternative solution to text-based alphanumerical passwords. The reason of such proposal is that human brain is better in recognizing and memorizing pictures compared to traditional alphanumerical string. Therefore, in this paper, we propose a conceptual framework to better understand the user performance for new high-end graphical password method. Our proposed framework is based on hybrid approach combining different features into one. The user performance experimental analysis pointed out the effectiveness of the proposed framework.
In recent years, increased social concern towards hygienic biometric technology has led to a high... more In recent years, increased social concern towards hygienic biometric technology has led to a high demand for contactless palm vein biometric. Nonetheless, there are a number of challenges to be addressed in this technology. Among the most important challenges in the hand rotation issue that is caused inadvertently by unrestricted hand posture. In spite of the existing palm ROI region methods, the inadequacies of handling large rotations have never been accounted. In this paper, a rotation-invariant palm ROI detection method is proposed to handle a hand rotation of up to 360o and thus, providing a high flexibility for hand placement on the sensor. Experiments on the benchmark database validate the effectiveness of the proposed contactless palm vein approach.
Proceedings of the 2010 Symposium on Information and Communication Technology, Aug 27, 2010
Abstract This paper presents an innovative contactless palm vein recognition system. We design a ... more Abstract This paper presents an innovative contactless palm vein recognition system. We design a hand sensor that could capture the palm vein image using low-resolution web camera. The design of the sensor is simple and low-cost, and we do not need to install specialized infrared sensor. We allow subjects to position their hands freely above the sensor and they can move their hands during the acquisition process. In order to obtain clear image of the palm vascular pattern, we propose a novel image processing technique ...
2013 IEEE International Conference on Signal and Image Processing Applications, 2013
ABSTRACT Face recognitions systems suffer from the problem associated with illumination variation... more ABSTRACT Face recognitions systems suffer from the problem associated with illumination variation. Therefore, there&#39;s a need to address this problem. In this paper, we present a novel algorithm for illumination normalization call Local Trapezoid Feature LTF. The features are derived from the trapezoid rule and the experiments results on extended Yale face database demonstrated the effectiveness and the superiority of the algorithm. Furthermore, our algorithm doesn&#39;t require dimensionality reduction or feature extraction.
2010 International Symposium on Information Technology, 2010
Abstract This paper proposes an innovative contactless hand geometry recognition system. We prese... more Abstract This paper proposes an innovative contactless hand geometry recognition system. We present a novel hand tracking approach to automatically detect and capture the geometrical features of the hand from low resolution video stream. No constraint is imposed and the subject can place his/her hand naturally on top of the sensor without touching any device. Conventional hand geometry systems require fairly precise positioning of the hand in order to obtain accurate measures of the hand. However, the proposed contactless ...
In face recognition, feature extraction techniques<br> attempts to search for appropriate r... more In face recognition, feature extraction techniques<br> attempts to search for appropriate representation of the data. However,<br> when the feature dimension is larger than the samples size, it brings<br> performance degradation. Hence, we propose a method called<br> Normalization Discriminant Independent Component Analysis<br> (NDICA). The input data will be regularized to obtain the most<br> reliable features from the data and processed using Independent<br> Component Analysis (ICA). The proposed method is evaluated on<br> three face databases, Olivetti Research Ltd (ORL), Face Recognition<br> Technology (FERET) and Face Recognition Grand Challenge<br> (FRGC). NDICA showed it effectiveness compared with other<br> unsupervised and supervised techniques.
2017 5th International Conference on Information and Communication Technology (ICoIC7), 2017
This short case study represents a preliminary exploration of the impact of a poorly developed hi... more This short case study represents a preliminary exploration of the impact of a poorly developed higher order level of self-regulation on self-regulated learning (SRL), testing the relevance to students' capacity to manage conflicting academic and non-academic goals. We further problematize culture in this context and develop a model, as a basis for future research. The environments for the study are countries that provide tertiary education to international students. The overall aim is to demonstrate that incomplete development of self-regulated learning prevents students from effectively managing conflicting high-priority goals (H2-4). Secondary aims are to test if poorly developed self-regulation coincides with unsatisfactory development of general study skills (H5) and to theoretically justify future research on the impact of culture on SRL (H1). The data source for this study is an entry level skills/knowledge test. Three scenario-based motivational questions were added and d...
This article is to learn the characteristics of graphical passwords by comparing different catego... more This article is to learn the characteristics of graphical passwords by comparing different categories of graphical passwords with the ISO 9126 model. The ISO 9126 model is divided into six parts, which are usability, reliability, functionality, maintainability, efficiency, and portability. Each part listed is sub-categorised by the standard and is used to evaluate the quality of a product. Multiple graphical passwords are chosen from different classification of graphical passwords for thirty users to test and fill in the survey. Then a survey was conducted to compare each of these five categories of graphical passwords based on the ISO 9126 model. Thirty users of different ages and gender were invited to the booth to test the graphical password systems and fill in survey. The survey results as described in the article show us which category of graphical passwords contains more of the ISO 9126 characteristics
This paper introduces the hybrid UTAUT model to explore pre-school children’s actual interaction ... more This paper introduces the hybrid UTAUT model to explore pre-school children’s actual interaction experience with video puzzle using tablets. For the past 10 years, there is much debate on the factors affecting children’s actual interaction experience with interactive edutainment using tablet and there is a general agreement that children need access to tablet for learning activities and cognitive development. However, little research was carried out to evaluate the actual interaction motivation that determines the learning experience of pre-school children in their interaction with video puzzle using tablet. In Malaysia, the use of tablet in pre-school has been increasing rapidly, therefore, research to understand actual children video puzzle interaction using tablet to meaningfully support children’s learning activities is much demanded. The main constructs of UTAUT had been maintained by integrating two new constructs, namely, Playability and Self-Efficacy into a hybrid model. The...
2017 5th International Conference on Information and Communication Technology (ICoIC7), 2017
eHealth organizations are a major target for hackers as they hold wealth of information. Current ... more eHealth organizations are a major target for hackers as they hold wealth of information. Current cyber security solutions for eHealth organizations are not comprehensive and only protect certain security layer. Therefore; the need for a next generation cyber security solution is increasing, a solution that is smart, scalable and adoptable to challenges. The wide spread of security tools and advancing technology have provided the needed infrastructure to create a comprehensive eHealth security solution. Connecting the right security tools together to ensure the overall security without affecting the network performance and user productivity is hard and requires special setup. The network layer is a major target for any eHealth organization, this research has indicated several network security metrics that need to be considered when designing and managing network security for an eHealth organization. The ultimate goal of this research is to identify the limitations in the current eHealth organization cyber security solutions specially the network layer and propose a next generation cyber security solution for eHealth organizations.
Increasingly, learner motivation is implicated in student failure at universities. This has led t... more Increasingly, learner motivation is implicated in student failure at universities. This has led to intense research into internal or external variables that might buoy resilience to failure. This research investigates the impact of strong cultural connectedness and strong belief systems on the academic buoyancy of international students studying at an Australian University. For this purpose, we surveyed 102 tertiary students at a Sydney university. Results demonstrate that, in the event of academic failure, students’ academic buoyancy remains high if they have support through strong cultural connections and from their belief systems. We further endeavored to identify if academic buoyancy was fed by intrinsic or extrinsic motivation. This research contributes to the understanding of the sources of strengths available to international students from primarily collective cultures studying overseas. There are implications for educational practice in terms of identifying students ‘at high...
2014 2nd International Conference on Information and Communication Technology (ICoICT), 2014
User authentication depends largely on the concept of passwords. However, users find it difficult... more User authentication depends largely on the concept of passwords. However, users find it difficult to remember alphanumerical passwords over time. When user is required to choose a secure password, they tend to choose an easy, short and insecure password. Graphical password method is proposed as an alternative solution to text-based alphanumerical passwords. The reason of such proposal is that human brain is better in recognizing and memorizing pictures compared to traditional alphanumerical string. Therefore, in this paper, we propose a conceptual framework to better understand the user performance for new high-end graphical password method. Our proposed framework is based on hybrid approach combining different features into one. The user performance experimental analysis pointed out the effectiveness of the proposed framework.
In recent years, increased social concern towards hygienic biometric technology has led to a high... more In recent years, increased social concern towards hygienic biometric technology has led to a high demand for contactless palm vein biometric. Nonetheless, there are a number of challenges to be addressed in this technology. Among the most important challenges in the hand rotation issue that is caused inadvertently by unrestricted hand posture. In spite of the existing palm ROI region methods, the inadequacies of handling large rotations have never been accounted. In this paper, a rotation-invariant palm ROI detection method is proposed to handle a hand rotation of up to 360o and thus, providing a high flexibility for hand placement on the sensor. Experiments on the benchmark database validate the effectiveness of the proposed contactless palm vein approach.
Proceedings of the 2010 Symposium on Information and Communication Technology, Aug 27, 2010
Abstract This paper presents an innovative contactless palm vein recognition system. We design a ... more Abstract This paper presents an innovative contactless palm vein recognition system. We design a hand sensor that could capture the palm vein image using low-resolution web camera. The design of the sensor is simple and low-cost, and we do not need to install specialized infrared sensor. We allow subjects to position their hands freely above the sensor and they can move their hands during the acquisition process. In order to obtain clear image of the palm vascular pattern, we propose a novel image processing technique ...
2013 IEEE International Conference on Signal and Image Processing Applications, 2013
ABSTRACT Face recognitions systems suffer from the problem associated with illumination variation... more ABSTRACT Face recognitions systems suffer from the problem associated with illumination variation. Therefore, there&#39;s a need to address this problem. In this paper, we present a novel algorithm for illumination normalization call Local Trapezoid Feature LTF. The features are derived from the trapezoid rule and the experiments results on extended Yale face database demonstrated the effectiveness and the superiority of the algorithm. Furthermore, our algorithm doesn&#39;t require dimensionality reduction or feature extraction.
2010 International Symposium on Information Technology, 2010
Abstract This paper proposes an innovative contactless hand geometry recognition system. We prese... more Abstract This paper proposes an innovative contactless hand geometry recognition system. We present a novel hand tracking approach to automatically detect and capture the geometrical features of the hand from low resolution video stream. No constraint is imposed and the subject can place his/her hand naturally on top of the sensor without touching any device. Conventional hand geometry systems require fairly precise positioning of the hand in order to obtain accurate measures of the hand. However, the proposed contactless ...
Uploads
Papers by Lau Hoe