Ali Selamat

Ali Selamat
University of Technology Malaysia | UTM

Doctor of Philosophy

About

566
Publications
326,041
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,934
Citations
Additional affiliations
February 2018 - January 2021
University of Technology Malaysia
Position
  • Head of Faculty

Publications

Publications (566)
Article
Full-text available
This community service aims to increase public awareness and understanding regarding renewable electrical energy based on environmentally friendly solar cells. In this modern era, the need for clean and sustainable energy is increasingly urgent. This program will provide comprehensive education regarding the benefits, working mechanisms, and practi...
Article
Using catalytic methane decomposition techniques to produce H2 could advance renewable energy development. Selecting the proper catalyst for this method is essential for efficient hydrogen production. We used reactive molecular simulations to examine methane's decomposition reaction and the formation of H2 molecules on a Ni (1 1 0) surface. The res...
Article
Full-text available
This community service focuses on training teachers to use technology-based interactive learning media, especially the Wordwall platform, for Tsanawiyah Dharut Thalibin, Sampung, Ponorogo, and East Java. This training aims to improve teachers' skills in creating interactive digital worksheets to overcome student boredom and increase active particip...
Article
Full-text available
This program aimed to enhance STEM education at SDN Bringinan, Jambon, Ponorogo, by integrating PhET Interactive Simulations. The program focused on two main topics: energy transfer and energy transformations. Students from grades 4, 5, and 6 were divided into groups and guided by facilitators to explore these concepts using PhET. The program began...
Chapter
The selection between Deep Learning (DL) approaches is not easy for URL phishing due to the variety of attacks and scammers. There are various DL techniques to detect phishing URLs, and choosing the suitable algorithm and affecting the model formed is very important. Wrong-choosing DL techniques might lead to low maturity and produce bias. The trai...
Chapter
The hybrid sine cosine and fitness dependent optimizer (SC-FDO) introduces four modifications to the original fitness dependent optimizer (FDO) algorithm to improve its exploit-explore tradeoff with a faster convergence speed. The modifications include a modified pace-updating equation, a random weight factor and global fitness weight strategy, a c...
Chapter
The Sine Cosine Algorithm (SCA) is a relatively recent metaheuristic algorithm, drawing inspiration from the characteristics of trigonometric sine and cosine functions. SCA has been widely used to address diverse optimization challenges in several domains. The advantages of SCA can be attributed to its simple implementation, reasonable execution ti...
Chapter
Researchers attempt to develop more competent anti-ransomware tools that assisted by machine learning classifiers to mitigate the threats of ransomware, protect the privacy of cyber users, and survive the security of cyberspace. However, their achievements remain insufficient in their efficacy against zero-day variants and/or imperviously detected...
Article
Full-text available
Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem...
Article
Full-text available
The Internet's rapid growth has led to information overload, necessitating recommender systems for personalized suggestions. While content-based and collaborative filtering have been successful, data sparsity remains a challenge. To address this, this article presents a novel social recommender system based on convolutional neural networks (SRSCNN)...
Article
Full-text available
The dynamic deontic (DD) is a norm synthesis framework that extracts normative rules from reinforcement learning (RL), however it was not designed to be applied in agent coordination. This study proposes a norm augmented reinforcement learning framework (NARLF) that extends said model to include a norm deliberation mechanism for learned norms re-im...
Article
Full-text available
Diabetes, especially type 2 diabetes (T2D), is a chronic disease affecting millions of people worldwide. The increasing prevalence of T2D, coupled with the complex interplay between genetic, environmental, and lifestyle factors, presents a major challenge for effective disease management. The traditional methods for predicting T2D progression and d...
Article
Full-text available
Background: The key histopathological features of Alzheimer’s disease (AD) include extensive brain shrinkage and amyloid plaques made up of amyloid beta (Aβ) deposition, as well as neurofibrillary tangles (NFTs) made up of hyperphosphorylated microtubule-associated Tau protein. The existence of AD is primarily a complicated biological and neurodege...
Article
Full-text available
The growth and development of social networks, blogs, forums, and e-commerce websites has produced a number of data, notably textual data, which has increased tremendously. Twitter is one of the most popular media social platforms; during the COVID-19 pandemic, people all around the world use social media to share their opinions or concerns about t...
Article
Full-text available
Technology startups are critical to the advancement of digital initiatives in many countries undergoing smart nation agenda. Technology startups are thus vendors and suppliers of services to large organizations such as the government sector, multi-national corporations and financial institutions. As such, startups are fast becoming attack vectors f...
Chapter
Full-text available
Obfuscated malware poses a challenge to traditional malware detection methods as it uses various techniques to disguise its behavior and evade detection. This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. Furthermore, this paper discusses the current state of obfuscated malware, the me...
Article
Full-text available
Refactoring is a maintenance task that aims at enhancing the quality of a software’s source code by restructuring it without affecting the external behavior. Move method refactoring (MMR) involves reallocating a method by moving it from one class to the class in which the method is used most. Several studies have been performed to explore the impac...
Article
Full-text available
Reog is one of the distinctive cultural practices of Ponorogo. Typically, this art is performed in an open space with many entertainers. Reog Ponorogo enthusiasts will primarily purchase trinkets and handicrafts. Numerous artisans in Reog Ponorogo are members of Micro, Small, and Medium-Sized Enterprises (MSMEs). However, because of the global Covi...
Article
Full-text available
Background Attention is focused on the health and physical fitness of older adults due to their increasing age. Maintaining physical abilities, including safe walking and movement, significantly contributes to the perception of health in old age. One of the early signs of declining fitness in older adults is limited mobility. Approximately one thir...
Chapter
The past decade has witnessed the rapid development of natural language processing and machine learning in the phishing detection domain. However, there needs to be more research on word embedding and deep learning for malicious URL classification. Inspired to solve this problem, this chapter aims to examine the application of word embedding and de...
Article
Full-text available
Fake information, better known as hoaxes, is often found on social media. Currently, social media is not only used to make friends or socialize with friends online, but some use it to spread hate speech and false information. Hoaxes are very dangerous in social life, especially in countries with large populations and ethnically diverse cultures, su...
Article
PurposeWithout effective solutions, the expenses associated with elderly care in the coming years may become overwhelmingly high, especially as the ageing population continues to increase glob-ally. As such, there have been several efforts to potentially save public social expenses for elderly, leading to the question of how to improve the cost-eff...
Article
Full-text available
Infertility has recently emerged as a severe medical problem. The essential elements in male infertility are sperm morphology, sperm motility, and sperm density. In order to analyze sperm motility, density, and morphology, laboratory experts do a semen analysis. However, it is simple to err when using a subjective interpretation based on laboratory...
Conference Paper
Full-text available
Cybersecurity is increasingly becoming an important discussion topic in the boardroom of companies, regardless of the size or industry. Hackers nowadays are becoming increasingly smart. Instead of attacking big multinational companies, international banks and government organisations which have built strong protection against cyber threats, the per...
Article
Full-text available
Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. As a result, malware detection has always been a major worry and a difficult issue, owing to shortcomings in performance accuracy, analysis type, and malware det...
Article
Full-text available
Camera localization involves the estimation of the camera pose of an image from a random scene. We used a single image or sequence of images or videos as the input. The output depends on the representation of the scene and method used. Several computer vision applications, such as robot navigation and safety inspection, can benefit from camera loca...
Article
Full-text available
Due to the rise of social media, a vast volume of information is shared daily. Finding relevant and acceptable information has become more challenging as the Internet’s information flow has changed and more options have been available. Various recommendation systems have been proposed and successfully used for different applications. This paper pre...
Article
Full-text available
Immersive analytics (IA) is a fast-growing research field that concerns improving and facilitating human sense making and data understanding through an immersive experience. Understanding the suitable application scenario that will benefit from IA enables a shift towards developing effective and meaningful applications. This paper aims to explore t...
Article
Full-text available
The Internet of Things (IoT) is an emerging technology with a very high market growth rate. In IoT, machines, and users from different levels need to collaborate to exchange data and share resources. IoT opens the door for a vast improvement in all human life aspects. However, the increasing adoption of IoT in many sectors makes it difficult to con...
Article
Full-text available
Scene text image super-resolution aims to improve readability by recovering text shapes from low-resolution degraded text images. Although recent developments in deep learning have greatly improved super-resolution (SR) techniques, recovering text images with irregular shapes, heavy noise, and blurriness is still challenging. This is because networ...
Conference Paper
Full-text available
Malaysia is one of the most megadiverse regions in the world. Therefore, it is important to record these rich biodiversity data to safeguard and improve national conservation efforts. However, the lack of nationwide genomic sequencing hampers a more sophisticated species identification, data management, and analytics activities. Thus, this project...
Article
Background and objectives: Nowadays, an automated computer-aided diagnosis (CAD) is an approach that plays an important role in the detection of health issues. The main advantages should be in early diagnosis, including high accuracy and low computational complexity without loss of the model performance. One of these systems type is concerned with...
Article
Full-text available
A social network is one of the efficient tools for information propagation. The content is the bridge between the product and its customers. Evaluating the user’s content creation is a valuable feature to improve information spreading on the social network. This paper proposes a method for extracting brand value with influencers by combining the us...
Chapter
This article addresses the issue of detecting traffic signs signalling cycle routes. It is also necessary to read the number or text of the cycle route from the given image. These tags are kept under the identifier IS21 and have a defined, uniform design with text in the middle of the tag. The detection was solved using the You Look Only Once (YOLO...
Chapter
Full-text available
One of the challenging issues in detecting the malware is that modern stealthy malware prefers to stay hidden during their attacks on our devices and be obfuscated. They can evade antivirus scanners or other malware analysis tools and might attempt to thwart modern detection, including altering the file attributes or performing the action under the...
Chapter
There exist numerous solutions to detect malicious URLs based on Natural Language Processing and machine learning technologies. However, there is a lack of comparative analysis among approaches using distributed representation and deep learning. To solve this problem, this paper performs a comparative study on phishing URL detection based on text e...
Chapter
Worm-like ransomware strains spread quickly to critical systems such as IoMT without human interaction. Therefore, detecting different worm-like ransomware attacks during their spread is vital. Nevertheless, the low detection rate due to the imbalanced ransomware data and the detection systems’ disability for multiclass simultaneous detection are t...
Conference Paper
Abstract— Depression is now a common mental health condition that must be treated in people, particularly adolescents. Although the issue of mental illness has received more attention in recent years, many cases of depression remain undiagnosed. Traditionally, the diagnosis process involved face-to-face communication between doctors and patients, w...
Chapter
A malicious website, also known as a phishing website, remains one of the major concerns in the cybersecurity domain. Among numerous deep learning-based solutions for phishing website detection, a Convolutional Neural Network (CNN) is one of the most popular techniques. However, when used as a stand-alone classifier, CNN still suffers from an accur...
Chapter
The fog-based attack detection systems can surpass cloud-based detection models due to their fast response and closeness to IoT devices. However, current fog-based detection systems are not lightweight to be compatible with ever-increasing IoMT big data and fog devices. To this end, a lightweight fog-based attack detection system is proposed in thi...
Article
Reduced graphene oxide (rGO) has applications in Water purification, and Energy conversion. In this study, a water-based nanofluid containing rGO was formed at specific concentrations. The nanofluid Thermo-Rheology behavior was studied at room temperature to 50 °C. Viscosity was detected at specific RPMs from 10 to 100. The results showed that this...
Article
Ti-based alloys have the potential to be used as hydrogen storage units, including NiTi. In contrast, NiTi alloy is sensitive to H atoms. It has been found that hydrogen can cause embrittlement in NiTi alloys. Thus, it is become indispensable to elucidate the reaction of H2 molecules on the NiTi surface. Using density functional theory, we investig...
Article
Sentiment analysis is a Natural Language Processing (NLP) research field that uses texture data and machine learning approaches in analyzing sentiments, behaviors, and emotions. People use social media to express feelings in various forms of sentiment. Feelings of fear, worry, sadness, anger, and gratitude were expressed in an online social network...
Chapter
Infertility has become a severe health issue in recent years. Sperm morphology, sperm motility, and sperm density are the most critical factors in male infertility. As a result, sperm motility, density, and morphology are examined in semen analysis carried out by laboratory professionals. However, applying a subjective analysis based on laboratory...
Article
Full-text available
Recently, more young people are suffering from mental illness especially stress and depression during the COVID-19 pandemic. The different between how bad the mental health condition depends on the ways each individual handle and overcome it. Besides, factor that leads stress and depression also plays an important roles in order to know the level o...
Article
Business systems are a subclass of dynamic, complex systems; the plurality of multifarious and interwoven factors affecting a business system makes prediction, modeling, and decision-making challenging for the players in such systems. This study conceptualises dynamic business modeling from a sustainability viewpoint by investigating the basic prin...
Article
Nickel Titanium (NiTi) alloys are produced by heating raw Ni and Ti in high temperature. In this stage, Ni and Ti atoms diffuse and mix to form an alloy. Despite the importance of technology, Ni and Ti atoms’ diffusion mechanism, however, still remains unelucidated. We performed molecular dynamics simulations for 1 ns to investigate the diffusion p...
Article
Purpose With the proliferation of terrorist/extremist websites on the World Wide Web, it has become progressively more crucial to detect and analyze the content on these websites. Accordingly, the volume of previous research focused on identifying the techniques and activities of terrorist/extremist groups, as revealed by their sites on the so-call...
Article
Full-text available
Botnet is a significant cyber threat that continues to evolve. Botmasters continue to improve the security framework strategy for botnets to go undetected. Newer botnet source code runs attack detection every second, and each attack demonstrates the difficulty and robustness of monitoring the botnet. In the conventional network botnet detection mod...
Article
Full-text available
Phishing has become an increasing concern and captured the attention of end-users as well as security experts. Existing phishing detection techniques still suffer from the deficiency in performance accuracy and inability to detect unknown attacks despite decades of development and improvement. Motivated to solve these problems, many researchers in...
Article
Full-text available
Missing values are highly undesirable in real-world datasets. The missing values should be estimated and treated during the preprocessing stage. With the expansion of nature-inspired metaheuristic techniques, interest in missing value imputation (MVI) has increased. The main goal of this literature is to identify and review the existing research on...
Article
Full-text available
Student success is essential for improving the higher education system student outcome. One way to measure student success is by predicting students’ performance based on their prior academic grades. Concerning the significance of this area, various predictive models are widely developed and applied to help the institution identify students at risk...
Article
Full-text available
Cybersecurity has gained increasing interest among firms of different sizes and industries due to the significant rise of cyber-attacks over time. Technology start-ups are particularly vulnerable to cyber-attacks, as appropriate security measures cannot be executed due to their limited human capital and financial resources to quantify cyber risks a...
Article
Full-text available
Cyber-attack detection via on-gadget embedded models and cloud systems are widely used for the Internet of Medical Things (IoMT). The former has a limited computation ability, whereas the latter has a long detection time. Fog-based attack detection is alternatively used to overcome these problems. However, the current fog-based systems cannot handl...
Article
Full-text available
This study proposes an alternate data extraction method that combines three well-known feature selection methods for handling large and problematic datasets: the correlation-based feature selection (CFS), best first search (BFS), and dominance-based rough set approach (DRSA) methods. This study aims to enhance the classifier’s performance in decisi...
Conference Paper
Full-text available
The use of virtual reality (VR) technology in data visualisation and analytics introduces a new way for users to explore and understand the data through Immersive Analytics (IA). However, previous works evaluated the IA based on the traditional 2D visualisation tasks and thus reduced the VR benefits. The IA is also still in its infancy and lacks st...
Chapter
Full-text available
Each year, malware issues remain one of the cybersecurity concerns since malware’s complexity is constantly changing as the innovation rapidly grows. As a result, malware attacks have affected everyday life from various mediums and ways. Therefore, a machine learning algorithm is one of the essential solutions in the security of computer systems to...