Ali Selamat

Ali Selamat
Universiti Teknologi Malaysia | UTM

Doctor of Philosophy

About

534
Publications
283,385
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,245
Citations
Additional affiliations
February 2018 - January 2021
Universiti Teknologi Malaysia
Position
  • Head of Faculty

Publications

Publications (534)
Chapter
Obfuscated malware poses a challenge to traditional malware detection methods as it uses various techniques to disguise its behavior and evade detection. This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. Furthermore, this paper discusses the current state of obfuscated malware, the me...
Article
Full-text available
Refactoring is a maintenance task that aims at enhancing the quality of a software’s source code by restructuring it without affecting the external behavior. Move method refactoring (MMR) involves reallocating a method by moving it from one class to the class in which the method is used most. Several studies have been performed to explore the impac...
Article
Full-text available
Reog is one of the distinctive cultural practices of Ponorogo. Typically, this art is performed in an open space with many entertainers. Reog Ponorogo enthusiasts will primarily purchase trinkets and handicrafts. Numerous artisans in Reog Ponorogo are members of Micro, Small, and Medium-Sized Enterprises (MSMEs). However, because of the global Covi...
Chapter
The past decade has witnessed the rapid development of natural language processing and machine learning in the phishing detection domain. However, there needs to be more research on word embedding and deep learning for malicious URL classification. Inspired to solve this problem, this chapter aims to examine the application of word embedding and de...
Article
Full-text available
Fake information, better known as hoaxes, is often found on social media. Currently, social media is not only used to make friends or socialize with friends online, but some use it to spread hate speech and false information. Hoaxes are very dangerous in social life, especially in countries with large populations and ethnically diverse cultures, su...
Article
PurposeWithout effective solutions, the expenses associated with elderly care in the coming years may become overwhelmingly high, especially as the ageing population continues to increase glob-ally. As such, there have been several efforts to potentially save public social expenses for elderly, leading to the question of how to improve the cost-eff...
Article
Full-text available
Infertility has recently emerged as a severe medical problem. The essential elements in male infertility are sperm morphology, sperm motility, and sperm density. In order to analyze sperm motility, density, and morphology, laboratory experts do a semen analysis. However, it is simple to err when using a subjective interpretation based on laboratory...
Conference Paper
Full-text available
Cybersecurity is increasingly becoming an important discussion topic in the boardroom of companies, regardless of the size or industry. Hackers nowadays are becoming increasingly smart. Instead of attacking big multinational companies, international banks and government organisations which have built strong protection against cyber threats, the per...
Article
Full-text available
Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. As a result, malware detection has always been a major worry and a difficult issue, owing to shortcomings in performance accuracy, analysis type, and malware det...
Article
Full-text available
Camera localization involves the estimation of the camera pose of an image from a random scene. We used a single image or sequence of images or videos as the input. The output depends on the representation of the scene and method used. Several computer vision applications, such as robot navigation and safety inspection, can benefit from camera loca...
Article
Full-text available
Due to the rise of social media, a vast volume of information is shared daily. Finding relevant and acceptable information has become more challenging as the Internet’s information flow has changed and more options have been available. Various recommendation systems have been proposed and successfully used for different applications. This paper pre...
Article
Full-text available
Immersive analytics (IA) is a fast-growing research field that concerns improving and facilitating human sense making and data understanding through an immersive experience. Understanding the suitable application scenario that will benefit from IA enables a shift towards developing effective and meaningful applications. This paper aims to explore t...
Article
Background and objectives: Nowadays, an automated computer-aided diagnosis (CAD) is an approach that plays an important role in the detection of health issues. The main advantages should be in early diagnosis, including high accuracy and low computational complexity without loss of the model performance. One of these systems type is concerned with...
Article
Full-text available
A social network is one of the efficient tools for information propagation. The content is the bridge between the product and its customers. Evaluating the user’s content creation is a valuable feature to improve information spreading on the social network. This paper proposes a method for extracting brand value with influencers by combining the us...
Chapter
This article addresses the issue of detecting traffic signs signalling cycle routes. It is also necessary to read the number or text of the cycle route from the given image. These tags are kept under the identifier IS21 and have a defined, uniform design with text in the middle of the tag. The detection was solved using the You Look Only Once (YOLO...
Chapter
One of the challenging issues in detecting the malware is that modern stealthy malware prefers to stay hidden during their attacks on our devices and be obfuscated. They can evade antivirus scanners or other malware analysis tools and might attempt to thwart modern detection, including altering the file attributes or performing the action under the...
Chapter
There exist numerous solutions to detect malicious URLs based on Natural Language Processing and machine learning technologies. However, there is a lack of comparative analysis among approaches using distributed representation and deep learning. To solve this problem, this paper performs a comparative study on phishing URL detection based on text e...
Chapter
Worm-like ransomware strains spread quickly to critical systems such as IoMT without human interaction. Therefore, detecting different worm-like ransomware attacks during their spread is vital. Nevertheless, the low detection rate due to the imbalanced ransomware data and the detection systems’ disability for multiclass simultaneous detection are t...
Conference Paper
Abstract— Depression is now a common mental health condition that must be treated in people, particularly adolescents. Although the issue of mental illness has received more attention in recent years, many cases of depression remain undiagnosed. Traditionally, the diagnosis process involved face-to-face communication between doctors and patients, w...
Chapter
A malicious website, also known as a phishing website, remains one of the major concerns in the cybersecurity domain. Among numerous deep learning-based solutions for phishing website detection, a Convolutional Neural Network (CNN) is one of the most popular techniques. However, when used as a stand-alone classifier, CNN still suffers from an accur...
Chapter
The fog-based attack detection systems can surpass cloud-based detection models due to their fast response and closeness to IoT devices. However, current fog-based detection systems are not lightweight to be compatible with ever-increasing IoMT big data and fog devices. To this end, a lightweight fog-based attack detection system is proposed in thi...
Article
Reduced graphene oxide (rGO) has applications in Water purification, and Energy conversion. In this study, a water-based nanofluid containing rGO was formed at specific concentrations. The nanofluid Thermo-Rheology behavior was studied at room temperature to 50 °C. Viscosity was detected at specific RPMs from 10 to 100. The results showed that this...
Article
Ti-based alloys have the potential to be used as hydrogen storage units, including NiTi. In contrast, NiTi alloy is sensitive to H atoms. It has been found that hydrogen can cause embrittlement in NiTi alloys. Thus, it is become indispensable to elucidate the reaction of H2 molecules on the NiTi surface. Using density functional theory, we investig...
Chapter
Infertility has become a severe health issue in recent years. Sperm morphology, sperm motility, and sperm density are the most critical factors in male infertility. As a result, sperm motility, density, and morphology are examined in semen analysis carried out by laboratory professionals. However, applying a subjective analysis based on laboratory...
Article
Full-text available
Recently, more young people are suffering from mental illness especially stress and depression during the COVID-19 pandemic. The different between how bad the mental health condition depends on the ways each individual handle and overcome it. Besides, factor that leads stress and depression also plays an important roles in order to know the level o...
Article
Business systems are a subclass of dynamic, complex systems; the plurality of multifarious and interwoven factors affecting a business system makes prediction, modeling, and decision-making challenging for the players in such systems. This study conceptualises dynamic business modeling from a sustainability viewpoint by investigating the basic prin...
Article
Nickel Titanium (NiTi) alloys are produced by heating raw Ni and Ti in high temperature. In this stage, Ni and Ti atoms diffuse and mix to form an alloy. Despite the importance of technology, Ni and Ti atoms’ diffusion mechanism, however, still remains unelucidated. We performed molecular dynamics simulations for 1 ns to investigate the diffusion p...
Article
Full-text available
Botnet is a significant cyber threat that continues to evolve. Botmasters continue to improve the security framework strategy for botnets to go undetected. Newer botnet source code runs attack detection every second, and each attack demonstrates the difficulty and robustness of monitoring the botnet. In the conventional network botnet detection mod...
Article
Full-text available
Phishing has become an increasing concern and captured the attention of end-users as well as security experts. Existing phishing detection techniques still suffer from the deficiency in performance accuracy and inability to detect unknown attacks despite decades of development and improvement. Motivated to solve these problems, many researchers in...
Article
Full-text available
Missing values are highly undesirable in real-world datasets. The missing values should be estimated and treated during the preprocessing stage. With the expansion of nature-inspired metaheuristic techniques, interest in missing value imputation (MVI) has increased. The main goal of this literature is to identify and review the existing research on...
Article
Full-text available
Student success is essential for improving the higher education system student outcome. One way to measure student success is by predicting students’ performance based on their prior academic grades. Concerning the significance of this area, various predictive models are widely developed and applied to help the institution identify students at risk...
Article
Full-text available
Cybersecurity has gained increasing interest among firms of different sizes and industries due to the significant rise of cyber-attacks over time. Technology start-ups are particularly vulnerable to cyber-attacks, as appropriate security measures cannot be executed due to their limited human capital and financial resources to quantify cyber risks a...
Article
Full-text available
Cyber-attack detection via on-gadget embedded models and cloud systems are widely used for the Internet of Medical Things (IoMT). The former has a limited computation ability, whereas the latter has a long detection time. Fog-based attack detection is alternatively used to overcome these problems. However, the current fog-based systems cannot handl...
Article
Full-text available
This study proposes an alternate data extraction method that combines three well-known feature selection methods for handling large and problematic datasets: the correlation-based feature selection (CFS), best first search (BFS), and dominance-based rough set approach (DRSA) methods. This study aims to enhance the classifier’s performance in decisi...
Conference Paper
Full-text available
The use of virtual reality (VR) technology in data visualisation and analytics introduces a new way for users to explore and understand the data through Immersive Analytics (IA). However, previous works evaluated the IA based on the traditional 2D visualisation tasks and thus reduced the VR benefits. The IA is also still in its infancy and lacks st...
Chapter
Each year, malware issues remain one of the cybersecurity concerns since malware’s complexity is constantly changing as the innovation rapidly grows. As a result, malware attacks have affected everyday life from various mediums and ways. Therefore, a machine learning algorithm is one of the essential solutions in the security of computer systems to...
Article
Full-text available
TiAl alloys can be used in aircraft and high-performance vehicle engines owing to their structural stability at high temperatures and their light weight. Although many studies have focused on developing this alloy material, there is still a lack of information about the changes in the structure of TiAl alloys under tensile and compressive loading....
Article
Full-text available
Phishing detection with high-performance accuracy and low computational complexity has always been a topic of great interest. New technologies have been developed to improve the phishing detection rate and reduce computational constraints in recent years. However, one solution is insufficient to address all problems caused by attackers in cyberspac...
Chapter
The increasing popularity of social networks indicates that the vast amounts of data contained within them could be useful in various implementations, including recommendation systems. Interests and research publications on deep learning-based recommendation systems have largely increased. This study aimed to identify, summarize, and assess studies...
Chapter
The use of long short-term memory (LSTM) for session-based recommendations is described in this research. This study uses char-level LSTM as a real-time recommendation service to test and offer the optimal solution. Our strategy can be used to any situation. Two LSTM layers and a thick layer make up our model. To evaluate the prediction results, we...
Article
Full-text available
The fitness-dependent optimizer (FDO), a newly proposed swarm intelligent algorithm, is focused on the reproductive mechanism of bee swarming and collective decision-making. To optimize the performance, FDO calculates velocity (pace) differently. FDO calculates weight using the fitness function values to update the search agent position during the...
Article
Full-text available
Missing rainfall data have reduced the quality of hydrological data analysis because they are the essential input for hydrological modeling. Much research has focused on rainfall data imputation. However, the compatibility of precipitation (rainfall) and non-precipitation (meteorology) as input data has received less attention. First, we propose a...
Article
Full-text available
The recent development in wireless networks and devices leads to novel services that will utilize wireless communication on a new level [...]
Article
Full-text available
The evaluation of the correlation between the activations of various organs has great importance. This work investigated the synchronization of the brain and heart responses to different auditory stimuli using complexity-based analysis. We selected three pieces of music based on the difference in the complexity of embedded noise (including white no...
Chapter
The rapid growth of emerging technologies, smart devices, 5G communication, etc. have contributed to the accumulation of data, hence introducing the big data era. Big data imposes a variety of challenges associated with machine learning, especially in phishing detection. Therefore, this paper aims to provide an analysis and summary of current resea...
Article
Full-text available
Today, predictive analytics applications became an urgent desire in higher educational institutions. Predictive analytics used advanced analytics that encompasses machine learning implementation to derive high-quality performance and meaningful information for all education levels. Mostly know that student grade is one of the key performance indica...
Article
In the current day and age, innovation is the fodder that keeps companies and institutions running, and universities play an important role. During the crisis and in the post-crisis period, financial support for research and development have undergone significant changes especially at universities. The aim of this research is to conduct a patent fo...
Article
Full-text available
In recent years, uncertain data clustering has become the subject of active research in many fields, for example, pattern recognition, and machine learning. Nowadays, researchers have committed themselves to substitute the traditional distance or similarity measures with new metrics in the existing centralized clustering algorithms in order to tack...
Chapter
This paper describes the use of long short-term memory (LSTM) for session-based recommendations. This paper aims to test and propose the best solution using word-level LSTM as a real-time recommendation service. Our method is for general use. Our model is composed of embedding, two LSTM layers and dense layer. We employ the mean of squared errors t...
Article
Graphene oxide/silica composite’s rheological behavior was studied in this investigation. This composite was made to reduce the cost of industrial usages. The volume fractions investigated from 0.1% to 1.0% (GO 30%–SiO2 70%), the shear rates investigated from 12.23 to 122.3 s−1, and the temperatures investigated from 25 to 50 °C. To study the chara...
Article
Full-text available
The coronavirus has influenced the lives of many people since its identification in 1960. In general, there are seven types of coronavirus. Although some types of this virus, including 229E, NL63, OC43, and HKU1, cause mild to moderate illness, SARS-CoV, MERS-CoV, and SARS-CoV-2 have shown to have severer effects on the human body. Specifically, th...
Chapter
Missing rainfall data have reduced the quality of hydrological data analysis because they are the essential input for hydrological modeling. Much research has focused on rainfall data imputation. However, the compatibility of precipitation (rainfall) and non-precipitation (meteorology) as input data has received less attention. First, we propose a...
Chapter
Education is one of the important fields in this challenging world. The researchers come out with the new perceptive, which is learning analytics that is a new invention for helping out the instructors, learners, and administrators. The use of learning analytics can be the medium for increasing the productivity of education for producing capable le...
Article
Full-text available
A botnet is a malware program that is remotely controlled by a hacker called a botmaster that able to launch massive attacks such as DDOS, SPAM, click-fraud, information, and identity stealing. Botnet also can avoid being detected by a security system. The traditional method of detecting botnets commonly used signature-based analysis unable to dete...
Article
Full-text available
Research on predictive analytics has increasingly evolved due to its impact on providing valuable and intuitive feedback that could potentially assist educators in improving student success in higher education. By leveraging predictive analytics, educators could design an effective mechanism to improve the academic results to prevent students’ drop...
Article
Full-text available
There are various modern systems for the measurement and consequent acquisition of valuable patient’s records in the form of medical signals and images, which are supposed to be processed to provide significant information about the state of biological tissues [...]
Article
Full-text available
In 2019,citizens of Indonesiaparticipated in the democratic process of electing a new president, vice president, and various legislative candidates for the country. The 2019 Indonesian presidential election was very tense in terms of the candidates' campaigns in cyberspace, especially on social media sites such as Facebook,Twitter,Instagram,Google+...
Book
This two-volume set of LNAI 12798 and 12799 constitutes the thoroughly refereed proceedings of the 34th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2021, held virtually and in Kuala Lumpur, Malaysia, in July 2021. The 87 full papers and 19 short papers presented were carefully r...
Book
This two-volume set of LNAI 12798 and 12799 constitutes the thoroughly refereed proceedings of the 34th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2021, held virtually and in Kuala Lumpur, Malaysia, in July 2021. The 87 full papers and 19 short papers presented were carefully r...
Conference Paper
Full-text available
Three-dimensional volume reconstruction can help physicians to understand the patients’ inner anatomy better in a 3D perspective. However, the pixel nearest neighbor method volume reconstruction tended to blur the reconstruction result. This study aims to present the design and configuration of improved modified butterfly interpolation scheme as th...
Article
Full-text available
Attention has shifted to the development of villages in Europe and other parts of the world with the goal of combating rural-urban migration, and moving toward self-sufficiency in rural areas. This situation has birthed the smart village idea. Smart village initiatives such as those of the European Union is motivating global efforts aimed at improv...
Preprint
Full-text available
Researchers attempt to develop more competent anti-ransomware tools that assisted by machine learning classifiers to mitigate the threats of ransomware, protect the privacy of cyber users, and survive the security of cyber-space. However, their achievements remain insufficient in their efficacy against zero-day variants and/or imperviously detected...
Article
Full-text available
Background: Rare or orphan diseases have become an important target of healthcare activities all over the world. The study aims to identify ethical questions linked to rare diseases and orphan drugs and ethical principles or approaches applied to solve them. Methods: Relevant peer-reviewed articles were identified by means of a systematic review...