Amirrudin Kamsin

Amirrudin Kamsin
  • PhD Computer Science (University College London)
  • Associate Professor at University of Malaya

About

104
Publications
92,198
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,843
Citations
Current institution
University of Malaya
Current position
  • Associate Professor
Additional affiliations
November 2008 - November 2012
University College London
Position
  • PhD Student
June 2001 - present
University of Malaya
Position
  • Professor (Associate)

Publications

Publications (104)
Article
Over the past few years, technology and digital methods have been increasingly integrated into education, offering new forms of learning. However, it remains unclear and difficult to assess how this integration of technology may impact children's intellectual capacities and their motivation for learning. The purpose of this research is to assess an...
Article
Full-text available
Impacto del Aprendizaje Basado en Juegos Digitales en la educación STEM en las escuelas primarias: Un meta-análisis de enfoques de aprendizaje ABSTRACT Enhancing learning outcomes in Science, Technology, Engineering, and Mathematics (STEM) subjects for primary school students remains a challenge. This meta-analysis, guided by the Preferred Reportin...
Article
Full-text available
This mixed-methods study examines the relationship between the integration of the AI-driven educational platform BrainPOP, teacher digital competencies, and the development of students' research skills in elementary and secondary education in Tehran, Iran. The study focuses on four primary objectives: (1) identifying strategies for integrating Brai...
Article
Full-text available
User experience or usability is under research, particularly in mobile learning in the era of industrial revolution (IR) 5.0. This article discusses incorporating sophisticated mobile technologies such as augmented reality (AR), virtual reality (VR), and artificial intelligence (AI) into the user experience in educational settings. Therefore, this...
Book
Full-text available
Games, particularly serious games (SGs), have long been embraced in education for their inherent engagement and motivational qualities, especially among younger learners. In the realm of STEM education, SGs have emerged as a technological strategy to enhance student engagement and performance. This paper addresses the growing interest in SG impleme...
Article
Full-text available
Data science approaches, which are increasingly used in virtually every sector, can be applied to the quantity of information collected from children’s interactions with augmented reality (AR) games. Data science tools can significantly improve AR game evaluation and help teachers and institutions to make evidence-based decisions. The collection, a...
Article
Full-text available
The effectiveness of children's oral health education (OHE) is determined by the appropriateness of the educational materials used, which can influence their attitude towards oral health. However, there is a lack of studies exploring the benefits of OHE materials from the perspective of schoolchildren. This study aimed to explore schoolchildren's o...
Article
Purpose This study aims to propose a Sharīʿah-based and information and communication technology-driven microfinance model (SIMM) to reduce extreme poverty in rural areas. Existing microfinance models run by microfinance institutions exclude severely poor individuals from their activities. Design/methodology/approach This study uses an exploratory...
Article
Full-text available
Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering Task Force (IETF) defined RPL in March 2012 as a de facto distance-vector routing protocol for...
Article
Full-text available
Wireless sensor networks (WSNs) consist of hundreds, or thousands of sensor nodes distributed over a wide area and used as the Internet of Things (IoT) devices to benefit many home users and autonomous systems industries. With many users adopting WSN-based IoT technology, ensuring that the sensor’s information is protected from attacks is essential...
Data
This data demonstrate that originality of the research work was less then 1 percent give credibility of research and main author , the rest of authors are contributing relatively except the ( Azul seems agrees and only by not ethical action ) that just by regulation of university will be add and by subjective he retracting all works this This data...
Data
Image pattern recognition in the field of big data has gained increasing importance and attention from researchers and practitioners in many domains of science and technology. context, the taxonomy of image pattern recognition and big data is revealed. The applications of image pattern recognition for big data, including multimedia, biometrics, and...
Article
Full-text available
In recent years, the use of digital game-based learning (DGBL) in the early childhood learning process has been growing. Recent research shows that DGBL has the potential to create new forms of childhood learning, it is not yet clear how applications can affect young students' learning. There are also not sufficient studies to analyze the significa...
Article
Full-text available
The Holy Quran and Hadith are the two main sources of legislation and guidelines for Muslims to shape their lives. The daily activities, sayings, and deeds of the Holy Prophet Muhammad (PBUH) are called Hadiths. Hadiths are the optimal practical descriptions of the Holy Quran. Technological advancements of information and communication technologies...
Article
The ability to post short text and media messages on Social media platforms like Twitter, Facebook, etc., plays a huge role in the exchange of information following a mass emergency event like hurricane, earthquake, tsunami etc. Disaster victims, families, and other relief operation teams utilize social media to help and support one another. Despit...
Article
Terrorist groups in the Arab world are using social networking sites like Twitter and Facebook to rapidly spread terror for the past few years. Detection and suspension of such accounts is a way to control the menace to some extent. This research is aimed at building an effective text classifier, using machine learning to identify the polarity of t...
Article
Full-text available
Hadith is a set of Islamic byelaws based on the teachings in the holy Quran. Arabic natural language processing (ANLP) tools possess features, which are mainly used for explaining Qur'an verses. In the last few years, research work in identifying both fake and authentic hadith has drawn a great attention. As of late, there are numerous hadith whose...
Article
Full-text available
The implementation of blended learning in higher educational institutions is increasing due to its perceived effectiveness in affording the benefits of both face-to-face traditional mode and the fully online mode of instructions. However, the leading challenge associated with the online component of blended learning is students’ inability to proper...
Article
Full-text available
Mobile devices have become an important tool in higher education. Although mobile devices have several benefits for students, the use of these devices is still very limited among students. This low percentage of usage could be attributed to several reasons, both technical and non-technical. Therefore, there is a need to conduct more research in ord...
Article
Full-text available
Social media communication serves as an integral part of the crisis response following a mass emergency (disaster) event. Regardless of the kind of disaster event, whether it is a hurricane, a flood, an earthquake or a man-made disaster event like a riot or a terrorist attack, social media platforms like Facebook, Twitter etc. have proven to be a p...
Article
Full-text available
Mobile phones have become widespread in the modern era. One contemporary use of mobile phones is in the education field, commonly known as M-Learning. Subsequent to the growth of M-Learning, developers of educational mobile applications need to understand what the user requirements are, and how to satisfy them. In order to measure user satisfaction...
Article
Full-text available
This paper critically analyses the key problem of Hadith authentication and scrutiny. The study looks into key aspects, such as the impression of critical scholars and the standard accepted by the main compilers of Hadith in giving rulings on the validity of Hadith. The paper uncovers an authoritative blend of facts, theory, and critical enquiry wi...
Preprint
Wireless Sensor Networks (WSNs) have different Quality of Service (QoS) parameters from those of traditional networks. Several considerations utilized for evaluating QoS include appropriate number of active nodes, network lifetime, network coverage, and resource utilization. One of the features of Cellular Learning Automata (CLA), besides its simpl...
Article
Recent studies regarding digital game-based learning (DGBL) are increasing, having the potential to enable new forms of learning, however, it remains unclear how DGBL applications can impact young students’ creativity. The main purpose of this study is to investigate whether DGBL application technologies (tablets and smartphones), can improve creat...
Article
Full-text available
The Editors-in-Chief of Environmental Earth Sciences are issuing an editorial expression of concern to alert readers that this article.
Article
Although in the recent study digital game-based learning (DGBL) has the potential to enable new forms of learning, it remains unclear how DGBL applications can impact young students’ creativity. The main purpose of this study is to investigate whether DGBL application technologies (tablets and smartphones), can improve creativity skills in preschoo...
Article
Full-text available
Mobile learning is fairly new in the local context, particularly for STEM subjects in Malaysia universities. However, this raises the issue of the ethics of mobile technology. With the advancement of mobile technologies few studies have been conducted for mobile ethics in student-generated activities. The aim of this research is to investigate the...
Article
Full-text available
Over the years, MOOCs have been an attractive research area and has yielded large quantities of empirical and review studies. However, existing review studies in MOOCs are characterized by short year coverage or focusing on a specific theme. Therefore, we aim to examine the overall research topics, focuses and research productivity of the empirical...
Article
Full-text available
The flipped classroom is considered an instructional strategy and a type of blended learning instruction that focused on active learning and student engagement. Over the years, flipped classroom studies have focused more on the advantages and challenges of flipped instruction and its effectiveness, but little is known about the state of self-regula...
Conference Paper
Full-text available
The face may be a made supply of data for indicating the personal characteristics like identity, ethnicity, expression, age and gender. The face characteristics measure thought-about jointly of the necessary individual characteristics. This could be utilized in several software, like age estimation and face recognition. The value of those applicati...
Article
Full-text available
Massive open online courses (MOOCs) have revolutionized todays education by offering a global accessible form of online learning. Over the years, MOOCs have been an attractive research area and have yielded an ample amount of research publications. However, the existing review studies in MOOCs are characterized by short year coverage or focusing on...
Article
Full-text available
String matching has been an extensively studied research domain in the past two decades due to its various applications in the fields of text, image, signal, and speech processing. As a result, choosing an appropriate string matching algorithm for current applications and addressing challenges is difficult. Understanding different string matching a...
Preprint
Full-text available
In contemporary age, Computational Intelligence (CI) performs an essential role in the interpretation of big biological data considering that it could provide all of the molecular biology and DNA sequencing computations. For this purpose, many researchers have attempted to implement different tools in this field and have competed aggressively. Henc...
Article
Full-text available
Short message communication media, such as mobile and microblogging social networks, have become attractive platforms for spammers to disseminate unsolicited contents. However, the traditional content-based methods for spam detection degraded in performance due to many factors. For instance, unlike the contents posted on social networks like Facebo...
Chapter
Educational Data Mining is an emerging field in the data mining domain. In this competitive world scenario, the quality of education needs to improve. Unfortunately most of the students’ data are becoming data tombs for not analyzing the hidden knowledge. The educational data mining tries to uncover the hidden knowledge by discovering relationships...
Conference Paper
Full-text available
The Internet of Things anticipates the conjunction of physical gadgets to the Internet and their access to wireless sensor data which makes it expedient to restrain the physical world. Big Data convergence has put multifarious new opportunities ahead of business ventures to get into a new market or enhance their operations in the current market. co...
Preprint
Full-text available
Internet of Things (IoT) is one of the emerging technologies of this century and its various aspects, such as the Infrastructure, Security, Architecture and Privacy, play an important role in shaping the future of the digitalised world. Internet of Things devices are connected through sensors which have significant impacts on the data and its secur...
Article
Encoding for Arabic based on the Unicode Transformation Format (UTF) differs from encoding for English based on the American Standard Code for Information Interchange (ASCII) since the Arabic usage of diacritics, symbols and elongated characters makes searching more challenging in the field of information retrieval. In this paper, we propose a new...
Article
Full-text available
Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. The focus of these algorithms is to achieve time efficiency according to applications but not memory consumption. In this...
Chapter
Recently, due to the increase use of technology among children, fostering creativity in the virtual environment has become a challenge to investigate. Few studies have pointed out that young children can use an extensive area of technologies in order to elevate creativity and learning. The aim of the study is to identify pre-school children’s usage...
Chapter
One of the latest trends in mobile phones is the wave of smart phone apps, which include game based social skills and collaboration apps for young children. Despite the massive development and invention on the game based apps, it is also noted that there are still limited studies that discuss on the right guideline in developing the game based soci...
Conference Paper
Full-text available
The most popular algorithms used in searching texts involves Exact matching algorithms. These algorithms are used in the areas of natural language processing, networking, and bioinformatics. Boyer Moore algorithm is one of the most widely in searching texts. However, the performance of the Boyer-Moore algorithm and existing exact matching algorithm...
Preprint
Full-text available
The Internet of Things anticipates the conjunction of physical gadgets to the In-ternet and their access to wireless sensor data which makes it expedient to restrain the physical world. Big Data convergence has put multifarious new opportunities ahead of business ventures to get into a new market or enhance their operations in the current market. c...
Article
Full-text available
Arabic script is highly sensitive to changes in meaning with respect to the accurate arrangement of diacritics and other related symbols. The most sensitive Arabic text available online is the Digital Qur’an, the sacred book of Revelation in Islam that all Muslims including non-Arabs recite as part of their worship. Due to the different characteris...
Article
Full-text available
Facial features are considered one of the important personal traits. This can be used in many applications, such as face recognition and age estimation. The value of these applications lies in several areas, such as security applications, law enforcement applications, and attendance systems. In addition, they are particularly useful in the finding...
Article
The explosive growth of data in volume, velocity and diversity that are produced by medical applications has contributed to abundance of big data. Current solutions for efficient data storage and management cannot fulfill the needs of heterogeneous data. Therefore, by applying computational intelligence (CI) approaches in medical data helps get bet...
Article
Full-text available
Twitter social network is growing on a daily basis and as a result, attackers have developed interest in distributing malicious contents on this platform. Numerous studies have investigated the possibility of reducing spamming activities on Twitter with each study focusing on introducing a new set of features for countermeasure. This paper adopts t...
Article
Full-text available
During the recent years, the issue of preserving the integrity of digital text has become a focus of interest in the transmission of online content on the Internet. Watermarking has a useful tool in the protection of digital text content as it solves the problem of tampering, duplicating, unauthorized access and security breaches. The rapid develop...
Article
Full-text available
A Computer game is the new platform in generating learning experiences for educational purposes. There are many educational games that have been used as an interaction design tool in a learning environment to enhance students learning outcomes. However, research also claims that playing video games can have a negative impact on student behavior, co...
Chapter
Increment of Internet users accessing content related to digital Quran and Hadith has increased from past few years. This has increased the need of Quran and Hadith authentication system that can authenticate between fake and original verses. In this work, complete framework related to automatic authentication and distribution of digital Quran and...
Article
Full-text available
Due to the rapid growth of the Internet and advanced technologies, data storage and extraction of Arabic diacritical data in real time from an Arabic corpus have become a vital issue in the field of information retrieval. In this paper, we propose a new idea for representing Arabic diacritic text in the corpus such that search engines can enhance t...
Conference Paper
Full-text available
Bioinformatics is growing rapidly and has found many new applications and its progress caused the interaction with other fields. Thus presently, the Computational Intelligence based on IoT in bioinformatics is used to archive, search, display, analysis and interpret biological data. Development of bioinformatics and growing need of actuarial scienc...
Conference Paper
Full-text available
In contemporary ages, Computational Intelligence (CI) performs an essential role in the interpretation of biological big data considering that it could provide all of the molecular biology and DNA sequencing computations. For this purpose, many researchers have attempted to implement the greatest tool in this field and have competed aggressively. H...
Conference Paper
Full-text available
Among multimedia content, one of the most predominant medium is text content. There have been lots of efforts to protect and secure text information over the Internet. The limitations of existing works have been identified in terms of watermark capacity, time complexity and memory complexity. In this work, an invisible digital watermarking approach...
Article
Full-text available
The explosive growing number of data from mobile devices, social media, Internet of Things and other applications has highlighted the emergence of big data. This paper aims to determine the worldwide research trends on the field of big data and its most relevant research areas. A bibliometric approach was performed to analyse a total of 6572 papers...
Article
Full-text available
Image pattern recognition in the field of big data has gained increasing importance and attention from researchers and practitioners in many domains of science and technology. This paper focuses on the usage of image pattern recognition for big data applications. In this context, the taxonomy of image pattern recognition and big data is revealed. T...
Conference Paper
Full-text available
The Internet of Things (IoT) integrated with various healthcare applications and medical fields such as remote care system for patients, warning systems for emergencies, fitness programs, chronic diseases and also elderly care such as heart rate checking system, blood pressure measurement system, health check systems, artificial heart rate provider...
Article
Trends in Internet usage and accessing online content in different languages and formats are proliferating at a considerable speed. There is a vast amount of digital online content available in different formats that are sensitive in nature with respect to writing styles and arrangement of diacritics. However, research done in the area aimed at ide...
Article
Full-text available
There has been an increase of content related to Quran and Hadith on the internet over the past few years. Diacritical Digital Quran is very sensitive to tampering. Diacritics are the symbols used beneath/above Quranic verses for reading purposes of the Quran. Minor change in diacritics can alter the meaning of a particular Quranic verse. Hence, th...
Article
This paper presents a novel approach towards Arabic handwritten word recognition using the zone-wise material. Due to complex nature of the Arabic characters involving issues of overlapping and related issues like touching, the segmentation and recognition is a monotonous main occupation of in Arabic cursive (e.g. Naskha, Riqaa and other comparable...
Article
Full-text available
In recent years, a new trend has come up, which is that of reading the Digital Quran online. This text was revealed more than 1400 years ago in the Arabic language and has been protected from all possible ways of distortion until today. Unfortunately, driven by the desire to make profit or gain publicity, fraudsters have started modifying certain Q...
Article
Full-text available
Over the last few years, online social networks (OSNs), such as Facebook, Twitter and Tuenti, have experienced exponential growth in both profile registrations and social interactions. These networks allow people to share different information ranging from news, photos, videos, feelings, personal information or research activities. The rapid growth...
Article
Full-text available
This paper researches offline Arabic handwriting recognition. It introduces a new approach to segmentation ligature and open Arabic character based on the structural perspective dealing with sub-words/words, including dots to recognize individual letters. Segmentation approaches that have been integrated into the recognition phase have the capabili...
Article
Having knowledge on soil temperature, as an important meteorological parameter, is of indispensable significance for various scientific researches. In this study, adaptive neuro-fuzzy inference system (ANFIS) is applied for determining the most relevant parameters for prediction of daily soil temperature at six depths of 5, 10, 20, 30, 50 and 100 c...
Conference Paper
Full-text available
Microblogging social network, like Twitter, Sina Weibo and Tumblr, has become attractive platform for social spammers to disseminate malicious contents. Unlike other social networking sites, such as Facebook and LinkedIn, which allow users to post messages with long characters, microblogging post has distinguished features: (1) Microblogging messag...
Article
The main objective of wind farm modeling is to maximize wind farm efficiency. The optimal wind turbine placement on a wind farm could be modified by taking economic aspects into account. The net present value (NPV) is the most important criteria for project investment estimating. The general approach in deciding the distinctive choice for a task th...
Article
Full-text available
Recently, utilization of hybrid models has gained remarkable attention as they take the advantage of specific nature of each technique to enhance the precision and reliability of the predictions. In this research work, a new hybrid approach combined the extreme learning machine (ELM) with wavelet transform (WT) algorithm is proposed to predict dail...
Chapter
Full-text available
Serious Games is an emerging technology that can be used in a learning environment. This technology is an effective interaction design paradigm which can be embedded as a persuasive learning tool to attract learners’ attention. This article will explore the concept of game rhetoric as an element in game systems for persuading students to engage wit...
Article
Full-text available
It is a challenge to identify who actually holds the valid copy of the holy Quran, or whether one digital copy is tampered or not. In fact, previous literature has shown that most of people were not aware of the distribution of fake copies of Quran online. Majority of them have raised the importance of having a central Islamic body to control and d...
Thesis
Personal Task Management (PTM) describes the planning, prioritising and list-making of tasks employed by an individual user. There are hundreds of commercial electronic PTM tools available on the market which users can choose from. There appears to be little attempt to develop a framework for describing people’s task management behaviour, making it...
Article
Full-text available
Existing applications tend to highlight tasks that people should be doing at any given time based on the parameters of urgency (e.g. deadline), assigned priority and reminders. Our field studies demonstrate that people consider existing applications as inadequate to flexibly adapt to current changes in other essential factors, including, task size,...
Conference Paper
Kuala Lumpur city is located at the confluence of two rivers and are flood prone area. With rapid development and uncontrolled town planning, the city had experience several major flash flood incidents and have caused tremendous damage to country. This research describes a study made to model and simulate the flash flood incident that struck Kuala...
Article
Full-text available
The increasing flash flood hazards in major cities like Kuala Lumpur have caused tremendous damages to the society and this requires more essential countermeasures to be implemented. With the advancement in 3D Computer Graphics and fluid simulation technologies, movie experts can now produce realistic visual effects for fluid objects such as water....
Conference Paper
Nowadays, as biology has been taught at schools for years, the teachers have been facing a problem on how to get the students involved and encourage them to learn about the biology subject effectively particularly about the structure of cells. Utterly, students can learn the structure of cells from the books that they read. However, do they truly u...
Conference Paper
Since the middle of 1990s, Malaysia has already showed its commitment and emphasis on the idea of Information and Communication Technology (ICT). Malaysia's Multimedia Super Corridor (MSC) is being developed in order to satisfy the country's ambition to achieve the fully developed status by the year 2020. Recent studies showed that online learning...
Article
Virtual environment (VE) is a system used to create and enhance communication between human and computers/machines. As such human-related principles and issues need to be examined and accomplished to make VE well received by its users. This paper will generally delve into the human-related challenges faced by VE. The four challenges identified are...
Conference Paper
Nowadays, as biology has been taught at schools for years, the teachers have been facing a problem on how to get the students to fully understand the human biology. Of course a student can explain what a skull is, based on the books that he or she has read, but does he or she truly know what a skull looks like. Has he or she touched one? Examine it...

Network

Cited By