
Ali SelamatUniversiti Teknologi Malaysia | UTM
Ali Selamat
Doctor of Philosophy
About
534
Publications
283,385
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,245
Citations
Introduction
Ali Selamat is currently a researcher at Universiti Teknologi Malaysia
Additional affiliations
February 2018 - January 2021
Publications
Publications (534)
Obfuscated malware poses a challenge to traditional malware detection methods as it uses various techniques to disguise its behavior and evade detection. This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. Furthermore, this paper discusses the current state of obfuscated malware, the me...
Refactoring is a maintenance task that aims at enhancing the quality of a software’s source code by restructuring it without affecting the external behavior. Move method refactoring (MMR) involves reallocating a method by moving it from one class to the class in which the method is used most. Several studies have been performed to explore the impac...
Reog is one of the distinctive cultural practices of Ponorogo. Typically, this art is performed in an open space with many entertainers. Reog Ponorogo enthusiasts will primarily purchase trinkets and handicrafts. Numerous artisans in Reog Ponorogo are members of Micro, Small, and Medium-Sized Enterprises (MSMEs). However, because of the global Covi...
The past decade has witnessed the rapid development of natural language processing and machine learning in the phishing detection domain. However, there needs to be more research on word embedding and deep learning for malicious URL classification. Inspired to solve this problem, this chapter aims to examine the application of word embedding and de...
Fake information, better known as hoaxes, is often found on social media. Currently, social media is not only used to make friends or socialize with friends online, but some use it to spread hate speech and false information. Hoaxes are very dangerous in social life, especially in countries with large populations and ethnically diverse cultures, su...
PurposeWithout effective solutions, the expenses associated with elderly care in the coming years may become overwhelmingly high, especially as the ageing population continues to increase glob-ally. As such, there have been several efforts to potentially save public social expenses for elderly, leading to the question of how to improve the cost-eff...
Infertility has recently emerged as a severe medical problem. The essential elements in male infertility are sperm morphology, sperm motility, and sperm density. In order to analyze sperm motility, density, and morphology, laboratory experts do a semen analysis. However, it is simple to err when using a subjective interpretation based on laboratory...
Cybersecurity is increasingly becoming an important discussion topic in the boardroom of companies, regardless of the size or industry. Hackers nowadays are becoming increasingly smart. Instead of attacking big multinational companies, international banks and government organisations which have built strong protection against cyber threats, the per...
Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. As a result, malware detection has always been a major worry and a difficult issue, owing to shortcomings in performance accuracy, analysis type, and malware det...
Camera localization involves the estimation of the camera pose of an image from a random scene. We used a single image or sequence of images or videos as the input. The output depends on the representation of the scene and method used. Several computer vision applications, such as robot navigation and safety inspection, can benefit from camera loca...
Due to the rise of social media, a vast volume of information is shared daily. Finding relevant and acceptable information has become more challenging as the Internet’s information flow has changed and more options have been available. Various recommendation systems have been proposed and successfully used for different applications. This paper pre...
Immersive analytics (IA) is a fast-growing research field that concerns improving and facilitating human sense making and data understanding through an immersive experience. Understanding the suitable application scenario that will benefit from IA enables a shift towards developing effective and meaningful applications. This paper aims to explore t...
Background and objectives:
Nowadays, an automated computer-aided diagnosis (CAD) is an approach that plays an important role in the detection of health issues. The main advantages should be in early diagnosis, including high accuracy and low computational complexity without loss of the model performance. One of these systems type is concerned with...
A social network is one of the efficient tools for information propagation. The content is the bridge between the product and its customers. Evaluating the user’s content creation is a valuable feature to improve information spreading on the social network. This paper proposes a method for extracting brand value with influencers by combining the us...
This article addresses the issue of detecting traffic signs signalling cycle routes. It is also necessary to read the number or text of the cycle route from the given image. These tags are kept under the identifier IS21 and have a defined, uniform design with text in the middle of the tag. The detection was solved using the You Look Only Once (YOLO...
One of the challenging issues in detecting the malware is that modern stealthy malware prefers to stay hidden during their attacks on our devices and be obfuscated. They can evade antivirus scanners or other malware analysis tools and might attempt to thwart modern detection, including altering the file attributes or performing the action under the...
There exist numerous solutions to detect malicious URLs based on Natural Language Processing and machine learning technologies. However, there is a lack of comparative analysis among approaches using distributed representation and deep learning. To solve this problem, this paper performs a comparative study on phishing URL detection based on text e...
Worm-like ransomware strains spread quickly to critical systems such as IoMT without human interaction. Therefore, detecting different worm-like ransomware attacks during their spread is vital. Nevertheless, the low detection rate due to the imbalanced ransomware data and the detection systems’ disability for multiclass simultaneous detection are t...
Abstract— Depression is now a common mental health condition that must be treated in people, particularly adolescents. Although the issue of mental illness has received more attention in recent years, many cases of depression remain undiagnosed. Traditionally, the diagnosis process involved face-to-face communication between doctors and patients, w...
A malicious website, also known as a phishing website, remains one of the major concerns in the cybersecurity domain. Among numerous deep learning-based solutions for phishing website detection, a Convolutional Neural Network (CNN) is one of the most popular techniques. However, when used as a stand-alone classifier, CNN still suffers from an accur...
The fog-based attack detection systems can surpass cloud-based detection models due to their fast response and closeness to IoT devices. However, current fog-based detection systems are not lightweight to be compatible with ever-increasing IoMT big data and fog devices. To this end, a lightweight fog-based attack detection system is proposed in thi...
Reduced graphene oxide (rGO) has applications in Water purification, and Energy conversion. In this study, a water-based nanofluid containing rGO was formed at specific concentrations. The nanofluid Thermo-Rheology behavior was studied at room temperature to 50 °C. Viscosity was detected at specific RPMs from 10 to 100. The results showed that this...
Ti-based alloys have the potential to be used as hydrogen storage units, including NiTi. In contrast, NiTi alloy is sensitive to H atoms. It has been found that hydrogen can cause embrittlement in NiTi alloys. Thus, it is become indispensable to elucidate the reaction of H2 molecules on the NiTi surface. Using density functional theory, we investig...
Infertility has become a severe health issue in recent years. Sperm morphology, sperm motility, and sperm density are the most critical factors in male infertility. As a result, sperm motility, density, and morphology are examined in semen analysis carried out by laboratory professionals. However, applying a subjective analysis based on laboratory...
Recently, more young people are suffering from mental illness especially stress and depression during the COVID-19 pandemic. The different between how bad the mental health condition depends on the ways each individual handle and overcome it. Besides, factor that leads stress and depression also plays an important roles in order to know the level o...
Business systems are a subclass of dynamic, complex systems; the plurality of multifarious and interwoven factors affecting a business system makes prediction, modeling, and decision-making challenging for the players in such systems. This study conceptualises dynamic business modeling from a sustainability viewpoint by investigating the basic prin...
Nickel Titanium (NiTi) alloys are produced by heating raw Ni and Ti in high temperature. In this stage, Ni and Ti atoms diffuse and mix to form an alloy. Despite the importance of technology, Ni and Ti atoms’ diffusion mechanism, however, still remains unelucidated. We performed molecular dynamics simulations for 1 ns to investigate the diffusion p...
Botnet is a significant cyber threat that continues to evolve. Botmasters continue to improve the security framework strategy for botnets to go undetected. Newer botnet source code runs attack detection every second, and each attack demonstrates the difficulty and robustness of monitoring the botnet. In the conventional network botnet detection mod...
Phishing has become an increasing concern and captured the attention of end-users as well as security experts. Existing phishing detection techniques still suffer from the deficiency in performance accuracy and inability to detect unknown attacks despite decades of development and improvement. Motivated to solve these problems, many researchers in...
Missing values are highly undesirable in real-world datasets. The missing values should be estimated and treated during the preprocessing stage. With the expansion of nature-inspired metaheuristic techniques, interest in missing value imputation (MVI) has increased. The main goal of this literature is to identify and review the existing research on...
Student success is essential for improving the higher education system student outcome. One way to measure student success is by predicting students’ performance based on their prior academic grades. Concerning the significance of this area, various predictive models are widely developed and applied to help the institution identify students at risk...
Cybersecurity has gained increasing interest among firms of different sizes and industries due to the significant rise of cyber-attacks over time. Technology start-ups are particularly vulnerable to cyber-attacks, as appropriate security measures cannot be executed due to their limited human capital and financial resources to quantify cyber risks a...
Cyber-attack detection via on-gadget embedded models and cloud systems are widely used for the Internet of Medical Things (IoMT). The former has a limited computation ability, whereas the latter has a long detection time. Fog-based attack detection is alternatively used to overcome these problems. However, the current fog-based systems cannot handl...
This study proposes an alternate data extraction method that combines three well-known feature selection methods for handling large and problematic datasets: the correlation-based feature selection (CFS), best first search (BFS), and dominance-based rough set approach (DRSA) methods. This study aims to enhance the classifier’s performance in decisi...
The use of virtual reality (VR) technology in data visualisation and analytics introduces a new way for users to explore and understand the data through Immersive Analytics (IA). However, previous works evaluated the IA based on the traditional 2D visualisation tasks and thus reduced the VR benefits. The IA is also still in its infancy and lacks st...
Each year, malware issues remain one of the cybersecurity concerns since malware’s complexity is constantly changing as the innovation rapidly grows. As a result, malware attacks have affected everyday life from various mediums and ways. Therefore, a machine learning algorithm is one of the essential solutions in the security of computer systems to...
TiAl alloys can be used in aircraft and high-performance vehicle engines owing to their structural stability at high temperatures and their light weight. Although many studies have focused on developing this alloy material, there is still a lack of information about the changes in the structure of TiAl alloys under tensile and compressive loading....
Phishing detection with high-performance accuracy and low computational complexity has always been a topic of great interest. New technologies have been developed to improve the phishing detection rate and reduce computational constraints in recent years. However, one solution is insufficient to address all problems caused by attackers in cyberspac...
The increasing popularity of social networks indicates that the vast amounts of data contained within them could be useful in various implementations, including recommendation systems. Interests and research publications on deep learning-based recommendation systems have largely increased. This study aimed to identify, summarize, and assess studies...
The use of long short-term memory (LSTM) for session-based recommendations is described in this research. This study uses char-level LSTM as a real-time recommendation service to test and offer the optimal solution. Our strategy can be used to any situation. Two LSTM layers and a thick layer make up our model. To evaluate the prediction results, we...
The fitness-dependent optimizer (FDO), a newly proposed swarm intelligent algorithm, is focused on the reproductive mechanism of bee swarming and collective decision-making. To optimize the performance, FDO calculates velocity (pace) differently. FDO calculates weight using the fitness function values to update the search agent position during the...
Missing rainfall data have reduced the quality of hydrological data analysis because they are the essential input
for hydrological modeling. Much research has focused on rainfall data imputation. However, the compatibility
of precipitation (rainfall) and non-precipitation (meteorology) as input data has received less attention. First, we
propose a...
The recent development in wireless networks and devices leads to novel services that will utilize wireless communication on a new level [...]
The evaluation of the correlation between the activations of various organs has great importance. This work investigated the synchronization of the brain and heart responses to different auditory stimuli using complexity-based analysis. We selected three pieces of music based on the difference in the complexity of embedded noise (including white no...
The rapid growth of emerging technologies, smart devices, 5G communication, etc. have contributed to the accumulation of data, hence introducing the big data era. Big data imposes a variety of challenges associated with machine learning, especially in phishing detection. Therefore, this paper aims to provide an analysis and summary of current resea...
Today, predictive analytics applications became an urgent desire in higher educational institutions. Predictive analytics used advanced analytics that encompasses machine learning implementation to derive high-quality performance and meaningful information for all education levels. Mostly know that student grade is one of the key performance indica...
In the current day and age, innovation is the fodder that keeps companies and institutions running, and universities play an important role. During the crisis and in the post-crisis period, financial support for research and development have undergone significant changes especially at universities. The aim of this research is to conduct a patent fo...
In recent years, uncertain data clustering has become the subject of active research in many fields, for example, pattern recognition, and machine learning. Nowadays, researchers have committed themselves to substitute the traditional distance or similarity measures with new metrics in the existing centralized clustering algorithms in order to tack...
This paper describes the use of long short-term memory (LSTM) for session-based recommendations. This paper aims to test and propose the best solution using word-level LSTM as a real-time recommendation service. Our method is for general use. Our model is composed of embedding, two LSTM layers and dense layer. We employ the mean of squared errors t...
Graphene oxide/silica composite’s rheological behavior was studied in this investigation. This composite was made to reduce the cost of industrial usages. The volume fractions investigated from 0.1% to 1.0% (GO 30%–SiO2 70%), the shear rates investigated from 12.23 to 122.3 s−1, and the temperatures investigated from 25 to 50 °C. To study the chara...
The coronavirus has influenced the lives of many people since its identification in 1960. In general, there are seven types of coronavirus. Although some types of this virus, including 229E, NL63, OC43, and HKU1, cause mild to moderate illness, SARS-CoV, MERS-CoV, and SARS-CoV-2 have shown to have severer effects on the human body. Specifically, th...
Missing rainfall data have reduced the quality of hydrological data analysis because they are the essential input for hydrological modeling. Much research has focused on rainfall data imputation. However, the compatibility of precipitation (rainfall) and non-precipitation (meteorology) as input data has received less attention. First, we propose a...
Education is one of the important fields in this challenging world. The researchers come out with the new perceptive, which is learning analytics that is a new invention for helping out the instructors, learners, and administrators. The use of learning analytics can be the medium for increasing the productivity of education for producing capable le...
A botnet is a malware program that is remotely controlled by a hacker called a botmaster that able to launch massive attacks such as DDOS, SPAM, click-fraud, information, and identity stealing. Botnet also can avoid being detected by a security system. The traditional method of detecting botnets commonly used signature-based analysis unable to dete...
Research on predictive analytics has increasingly evolved due to its impact on providing valuable and intuitive feedback that could potentially assist educators in improving student success in higher education. By leveraging predictive analytics, educators could design an effective mechanism to improve the academic results to prevent students’ drop...
There are various modern systems for the measurement and consequent acquisition of valuable patient’s records in the form of medical signals and images, which are supposed to be processed to provide significant information about the state of biological tissues [...]
In 2019,citizens of Indonesiaparticipated in the democratic process of electing a new president, vice president, and various legislative candidates for the country. The 2019 Indonesian presidential election was very tense in terms of the candidates' campaigns in cyberspace, especially on social media sites such as Facebook,Twitter,Instagram,Google+...
This two-volume set of LNAI 12798 and 12799 constitutes the thoroughly refereed proceedings of the 34th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2021, held virtually and in Kuala Lumpur, Malaysia, in July 2021.
The 87 full papers and 19 short papers presented were carefully r...
This two-volume set of LNAI 12798 and 12799 constitutes the thoroughly refereed proceedings of the 34th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2021, held virtually and in Kuala Lumpur, Malaysia, in July 2021.
The 87 full papers and 19 short papers presented were carefully r...
Three-dimensional volume reconstruction can help physicians to understand the patients’ inner anatomy better in a 3D perspective. However, the pixel nearest neighbor method volume reconstruction tended to blur the reconstruction result. This study aims to present the design and configuration of improved modified butterfly interpolation scheme as th...
Attention has shifted to the development of villages in Europe and other parts of the world with the goal of combating rural-urban migration, and moving toward self-sufficiency in rural areas. This situation has birthed the smart village idea. Smart village initiatives such as those of the European Union is motivating global efforts aimed at improv...
Researchers attempt to develop more competent anti-ransomware tools that assisted by machine learning classifiers to mitigate the threats of ransomware, protect the privacy of cyber users, and survive the security of cyber-space. However, their achievements remain insufficient in their efficacy against zero-day variants and/or imperviously detected...
Background:
Rare or orphan diseases have become an important target of healthcare activities all over the world. The study aims to identify ethical questions linked to rare diseases and orphan drugs and ethical principles or approaches applied to solve them.
Methods:
Relevant peer-reviewed articles were identified by means of a systematic review...