Ali Selamat

Ali Selamat
Universiti Teknologi Malaysia | UTM

Doctor of Philosophy

About

503
Publications
223,537
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,291
Citations
Additional affiliations
February 2018 - January 2021
Universiti Teknologi Malaysia
Position
  • Head of Faculty

Publications

Publications (503)
Article
Reduced graphene oxide (rGO) has applications in Water purification, and Energy conversion. In this study, a water-based nanofluid containing rGO was formed at specific concentrations. The nanofluid Thermo-Rheology behavior was studied at room temperature to 50 °C. Viscosity was detected at specific RPMs from 10 to 100. The results showed that this...
Article
Ti-based alloys have the potential to be used as hydrogen storage units, including NiTi. In contrast, NiTi alloy is sensitive to H atoms. It has been found that hydrogen can cause embrittlement in NiTi alloys. Thus, it is become indispensable to elucidate the reaction of H2 molecules on the NiTi surface. Using density functional theory, we investig...
Article
Business systems are a subclass of dynamic, complex systems; the plurality of multifarious and interwoven factors affecting a business system makes prediction, modeling, and decision-making challenging for the players in such systems. This study conceptualises dynamic business modeling from a sustainability viewpoint by investigating the basic prin...
Article
Nickel Titanium (NiTi) alloys are produced by heating raw Ni and Ti in high temperature. In this stage, Ni and Ti atoms diffuse and mix to form an alloy. Despite the importance of technology, Ni and Ti atoms’ diffusion mechanism, however, still remains unelucidated. We performed molecular dynamics simulations for 1 ns to investigate the diffusion p...
Article
Full-text available
Botnet is a significant cyber threat that continues to evolve. Botmasters continue to improve the security framework strategy for botnets to go undetected. Newer botnet source code runs attack detection every second, and each attack demonstrates the difficulty and robustness of monitoring the botnet. In the conventional network botnet detection mod...
Article
Phishing has become an increasing concern and captured the attention of end-users as well as security experts. Existing phishing detection techniques still suffer from the deficiency in performance accuracy and inability to detect unknown attacks despite decades of development and improvement. Motivated to solve these problems, many researchers in...
Article
Full-text available
Missing values are highly undesirable in real-world datasets. The missing values should be estimated and treated during the preprocessing stage. With the expansion of nature-inspired metaheuristic techniques, interest in missing value imputation (MVI) has increased. The main goal of this literature is to identify and review the existing research on...
Article
Full-text available
Cyber-attack detection via on-gadget embedded models and cloud systems are widely used for the Internet of Medical Things (IoMT). The former has a limited computation ability, whereas the latter has a long detection time. Fog-based attack detection is alternatively used to overcome these problems. However, the current fog-based systems cannot handl...
Article
Full-text available
This study proposes an alternate data extraction method that combines three well-known feature selection methods for handling large and problematic datasets: the correlation-based feature selection (CFS), best first search (BFS), and dominance-based rough set approach (DRSA) methods. This study aims to enhance the classifier’s performance in decisi...
Conference Paper
Full-text available
The use of virtual reality (VR) technology in data visualisation and analytics introduces a new way for users to explore and understand the data through Immersive Analytics (IA). However, previous works evaluated the IA based on the traditional 2D visualisation tasks and thus reduced the VR benefits. The IA is also still in its infancy and lacks st...
Chapter
Each year, malware issues remain one of the cybersecurity concerns since malware’s complexity is constantly changing as the innovation rapidly grows. As a result, malware attacks have affected everyday life from various mediums and ways. Therefore, a machine learning algorithm is one of the essential solutions in the security of computer systems to...
Article
Full-text available
TiAl alloys can be used in aircraft and high-performance vehicle engines owing to their structural stability at high temperatures and their light weight. Although many studies have focused on developing this alloy material, there is still a lack of information about the changes in the structure of TiAl alloys under tensile and compressive loading....
Article
Full-text available
Phishing detection with high-performance accuracy and low computational complexity has always been a topic of great interest. New technologies have been developed to improve the phishing detection rate and reduce computational constraints in recent years. However, one solution is insufficient to address all problems caused by attackers in cyberspac...
Chapter
The increasing popularity of social networks indicates that the vast amounts of data contained within them could be useful in various implementations, including recommendation systems. Interests and research publications on deep learning-based recommendation systems have largely increased. This study aimed to identify, summarize, and assess studies...
Chapter
The use of long short-term memory (LSTM) for session-based recommendations is described in this research. This study uses char-level LSTM as a real-time recommendation service to test and offer the optimal solution. Our strategy can be used to any situation. Two LSTM layers and a thick layer make up our model. To evaluate the prediction results, we...
Article
Full-text available
The fitness-dependent optimizer (FDO), a newly proposed swarm intelligent algorithm, is focused on the reproductive mechanism of bee swarming and collective decision-making. To optimize the performance, FDO calculates velocity (pace) differently. FDO calculates weight using the fitness function values to update the search agent position during the...
Article
Full-text available
Missing rainfall data have reduced the quality of hydrological data analysis because they are the essential input for hydrological modeling. Much research has focused on rainfall data imputation. However, the compatibility of precipitation (rainfall) and non-precipitation (meteorology) as input data has received less attention. First, we propose a...
Article
Full-text available
The recent development in wireless networks and devices leads to novel services that will utilize wireless communication on a new level [...]
Article
Full-text available
The evaluation of the correlation between the activations of various organs has great importance. This work investigated the synchronization of the brain and heart responses to different auditory stimuli using complexity-based analysis. We selected three pieces of music based on the difference in the complexity of embedded noise (including white no...
Chapter
The rapid growth of emerging technologies, smart devices, 5G communication, etc. have contributed to the accumulation of data, hence introducing the big data era. Big data imposes a variety of challenges associated with machine learning, especially in phishing detection. Therefore, this paper aims to provide an analysis and summary of current resea...
Article
Full-text available
Today, predictive analytics applications became an urgent desire in higher educational institutions. Predictive analytics used advanced analytics that encompasses machine learning implementation to derive high-quality performance and meaningful information for all education levels. Mostly know that student grade is one of the key performance indica...
Article
In the current day and age, innovation is the fodder that keeps companies and institutions running, and universities play an important role. During the crisis and in the post-crisis period, financial support for research and development have undergone significant changes especially at universities. The aim of this research is to conduct a patent fo...
Article
Full-text available
In recent years, uncertain data clustering has become the subject of active research in many fields, for example, pattern recognition, and machine learning. Nowadays, researchers have committed themselves to substitute the traditional distance or similarity measures with new metrics in the existing centralized clustering algorithms in order to tack...
Chapter
This paper describes the use of long short-term memory (LSTM) for session-based recommendations. This paper aims to test and propose the best solution using word-level LSTM as a real-time recommendation service. Our method is for general use. Our model is composed of embedding, two LSTM layers and dense layer. We employ the mean of squared errors t...
Article
Graphene oxide/silica composite’s rheological behavior was studied in this investigation. This composite was made to reduce the cost of industrial usages. The volume fractions investigated from 0.1% to 1.0% (GO 30%–SiO2 70%), the shear rates investigated from 12.23 to 122.3 s−1, and the temperatures investigated from 25 to 50 °C. To study the chara...
Article
Full-text available
The coronavirus has influenced the lives of many people since its identification in 1960. In general, there are seven types of coronavirus. Although some types of this virus, including 229E, NL63, OC43, and HKU1, cause mild to moderate illness, SARS-CoV, MERS-CoV, and SARS-CoV-2 have shown to have severer effects on the human body. Specifically, th...
Chapter
Missing rainfall data have reduced the quality of hydrological data analysis because they are the essential input for hydrological modeling. Much research has focused on rainfall data imputation. However, the compatibility of precipitation (rainfall) and non-precipitation (meteorology) as input data has received less attention. First, we propose a...
Chapter
Education is one of the important fields in this challenging world. The researchers come out with the new perceptive, which is learning analytics that is a new invention for helping out the instructors, learners, and administrators. The use of learning analytics can be the medium for increasing the productivity of education for producing capable le...
Article
Full-text available
A botnet is a malware program that is remotely controlled by a hacker called a botmaster that able to launch massive attacks such as DDOS, SPAM, click-fraud, information, and identity stealing. Botnet also can avoid being detected by a security system. The traditional method of detecting botnets commonly used signature-based analysis unable to dete...
Article
Research on predictive analytics has increasingly evolved due to its impact on providing valuable and intuitive feedback that could potentially assist educators in improving student success in higher education. By leveraging predictive analytics, educators could design an effective mechanism to improve the academic results to prevent students’ drop...
Article
Full-text available
There are various modern systems for the measurement and consequent acquisition of valuable patient’s records in the form of medical signals and images, which are supposed to be processed to provide significant information about the state of biological tissues [...]
Article
Full-text available
In 2019,citizens of Indonesiaparticipated in the democratic process of electing a new president, vice president, and various legislative candidates for the country. The 2019 Indonesian presidential election was very tense in terms of the candidates' campaigns in cyberspace, especially on social media sites such as Facebook,Twitter,Instagram,Google+...
Book
This two-volume set of LNAI 12798 and 12799 constitutes the thoroughly refereed proceedings of the 34th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2021, held virtually and in Kuala Lumpur, Malaysia, in July 2021. The 87 full papers and 19 short papers presented were carefully r...
Book
This two-volume set of LNAI 12798 and 12799 constitutes the thoroughly refereed proceedings of the 34th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2021, held virtually and in Kuala Lumpur, Malaysia, in July 2021. The 87 full papers and 19 short papers presented were carefully r...
Conference Paper
Full-text available
Three-dimensional volume reconstruction can help physicians to understand the patients’ inner anatomy better in a 3D perspective. However, the pixel nearest neighbor method volume reconstruction tended to blur the reconstruction result. This study aims to present the design and configuration of improved modified butterfly interpolation scheme as th...
Article
Full-text available
Attention has shifted to the development of villages in Europe and other parts of the world with the goal of combating rural-urban migration, and moving toward self-sufficiency in rural areas. This situation has birthed the smart village idea. Smart village initiatives such as those of the European Union is motivating global efforts aimed at improv...
Preprint
Full-text available
Researchers attempt to develop more competent anti-ransomware tools that assisted by machine learning classifiers to mitigate the threats of ransomware, protect the privacy of cyber users, and survive the security of cyber-space. However, their achievements remain insufficient in their efficacy against zero-day variants and/or imperviously detected...
Article
Full-text available
Background: Rare or orphan diseases have become an important target of healthcare activities all over the world. The study aims to identify ethical questions linked to rare diseases and orphan drugs and ethical principles or approaches applied to solve them. Methods: Relevant peer-reviewed articles were identified by means of a systematic review...
Chapter
This paper presents and discusses a comparative study of three major clustering categories namely Hierarchical-based, Iterative mode-based and Partition-based in analyzing and prioritizing Mobile Augmented reality (MAR) Learning (MAR-learning) usability data. This paper first discusses the related works in usability and clustering before moving on...
Chapter
Deep learning has recently gained the attention of many researchers in various fields. A new and emerging machine learning technique, it is derived from a neural network algorithm capable of analysing unstructured datasets without supervision. This study compared the effectiveness of the deep learning (DL) model vs. a hybrid deep learning (HDL) mod...
Chapter
Student performance is the most factor that can be beneficial for many parties, including students, parents, instructors, and administrators. Early prediction is needed to give the early monitor by the responsible person in charge of developing a better person for the nation. In this paper, the improvement of Bagged Tree to predict student performa...
Chapter
Seed point placement techniques have been introduced and improved flow visualization research domains since the beginning of the introduction of streamlines visualization. It is a starting point of the streamlines. Thus, it is crucial because the result is directly impacted by the seed point placement. Improved seed point placement has been present...
Chapter
Full-text available
Normative multi-agent research is an alternative viewpoint in the design of adaptive autonomous agent architecture. Norms specify the standards of behaviors such as which actions or states should be achieved or avoided. The concept of norm synthesis is the process of generating useful normative rules. This study proposes a model for normative rule...
Chapter
Data-driven plays an important role in determining the quality of services in institutions of higher learning (HEIs). Increasingly data in education is encouraging institutions to find ways to improve student academic performance. By using machine learning with visual analytics, data can be predicted based on valuable information and presented with...
Article
Full-text available
Objective: Medical device development, from the product's conception to release to market, is very complex and relies significantly on the application of exact processes. This paper aims to provide an analysis and summary of current research in the field of medical device development methodologies, discuss its phases, and evaluate the associated le...
Article
Full-text available
In this paper, a new approach for the periodical testing and the functionality evaluation of a fetal heart rate monitor device based on ultrasound principle is proposed. The design and realization of the device are presented, together with the description of its features and functioning tests. In the designed device, a relay element, driven by an e...
Article
Full-text available
The amount of construction waste generated is enormous due to the growth of the construction activities, which might lead to serious environmental problems. This is also including the construction waste that was generated from the natural disaster. This potential human-made disaster has been receiving worldwide attention and becomes a significant c...
Article
Full-text available
Real data may have a considerable amount of noise produced by error in data collection, transmission and storage. The noisy training data set increases the training time and complexity of the induced machine learning model, which led to reduce the overall performance. Identifying noisy instances and then eliminating or correcting them are useful te...
Article
Full-text available
The subject of the submitted work is the proposal of electrodes for the continual measurement of the glucose concentration for the purpose of specifying further hemodynamic parameters. The proposal includes the design of the electronic measuring system, the construction of the electrodes themselves and the functionality of the entire system, verifi...
Article
Due to the combined navigation system consisting of both Inertial Navigation System (INS) and Global Positioning System (GPS) in a complementary mode which assure a reliable, accurate, and continuous navigation system, we use a GPS/INS navigation system in our research. Because of the conditions of navigation system such as low-cost MEMS-based iner...
Article
Class noise is an important issue in classification with a lot of potential consequences. It can decrease the overall accuracy and increase the complexity of the induced model. This study investigates ensemble filtering, removing and relabeling noisy instances issues and proposes a new two-filter model for Class Noise Detection and Classification (...
Article
Full-text available
Desktop and portable platform-based information systems become the most tempting target of crypto and locker ransomware attacks during the last decades. Hence, researchers have developed anti-ransomware tools to assist the Windows platform at thwarting ransomware attacks, protecting the information, preserving the users’ privacy, and securing the i...
Article
Full-text available
The rapid growth of the Industrial Revolution (IR) 4.0 has prompted the Malaysian Education Institution to transform the current education system into the future education system 4.0. The impact of IR 4.0 has opened a new paradigm for the Malaysian Educational Institution to ensure that all lecturers are capable of using information and communicati...
Chapter
Medical image processing is a highly challenging research area, thus medical imaging techniques are used to make diagnosis in human body. Moreover, as tumor in the brain is a critical and medical complaint, segmentation of the images has an important role to make segmentation of the brain tumor and it provides suspicious region diagnosis from the m...
Chapter
Super-resolution is one of the frequently investigated methods of image processing. The quality of the results is a constant problem in the methods used to obtain high resolution images. Interpolation-based methods have blurry output problems, while non-interpolation methods require a lot of training data and high computing power. In this paper, we...
Chapter
Parallel processing is an execution of processes that make computation and calculation on many things simultaneously. In addition, parallel processing methods are applied extensively to the examination of MR imaging in treatment. As parallel computer systems become larger and faster at the present time; scientists, researchers and engineers are eve...
Article
Full-text available
Knowledge-base is a fundamental platform in the architecture of an intelligent system. Relations and operators are popular knowledge in practice knowledge domains. In this paper, we propose a method to represent the model by combining these kinds of knowledge, called the Rela-Ops model. This model includes foundation components consisting of concep...
Article
Nowadays, with the emerging of rapid revolution industries, there are various educational learning styles evolve in solving the way of teaching and learning among the TVET polytechnic students. However, the surrounding changes of enormous data in learning styles have tangled the TVET polytechnic students to grab the opportunity to improve the perfo...