Azlinah Hj Mohamed

Azlinah Hj Mohamed
  • BSc CS, MSc AI, PhD Decision Support Systems
  • Senior Researcher at MARA University of Technology

About

154
Publications
70,649
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,792
Citations
Current institution
MARA University of Technology
Current position
  • Senior Researcher
Additional affiliations
December 2022 - present
YSL Strategic Alliance Sdn Bhd
Position
  • Managing Director

Publications

Publications (154)
Article
In the era of data-driven decision-making, managing dynamic data streams characterised by evolving data distributions and high dimensionality presents a formidable challenge for online feature selection. This research addresses the challenge by developing innovative solutions in optimising Online Feature Selection (OFS) to manage feature irrelevanc...
Article
Full-text available
Due to complex nature of metabolic pathways, E. coli metabolic model kinetic parameters are difficult to detect experimentally. Thus, obtaining accurate kinetic data for all reactions in an E. coli metabolic model is a technically-challenging process. So, Garra Rufa-inspired Optimization (GRO) Algorithm is applied to the primary metabolic network o...
Article
Full-text available
The pilgrimage quota for each country is 0.1% of the total population. The demand to perform Hajj increases yearly and demands more quotas, but it is limited due to providing exemplary services and maintaining comfort for pilgrims. The selection process is challenging and informative. Upon registration, the Malaysian waiting period was between 89 a...
Article
Full-text available
The COVID-19 pandemic has spread globally, resulting in financial instability in many countries and reductions in the per capita gross domestic product. Sentiment analysis is a cost-effective method for acquiring sentiments based on household income loss, as expressed on social media. However, limited research has been conducted in this domain usin...
Article
Knowledge discovery for data streaming requires online feature selection to reduce the complexity of real-world datasets and significantly improve the learning process. This is achieved by selecting highly relevant subsets and minimising irrelevant and redundant features. However, researchers have difficulties in addressing various forms of data. T...
Article
Full-text available
The emissions of greenhouse gases, such as carbon dioxide, into the biosphere have the consequence of warming up the planet, hence the existence of climate change. Sentiment analysis has been a popular subject and there has been a plethora of research conducted in this area in recent decades, typically on social media platforms such as Twitter, due...
Preprint
Full-text available
Automation is seen as a potential alternative in improving productivity in the twenty-first century. Invoicing is the essential foundation of accounting record keeping and serves as a critical foundation for law enforcement inspections by auditing agencies and tax authorities. With the rise of artificial intelligence, automated record keeping syste...
Article
Full-text available
Emergency management systems (EMS) assist emergency managers to resolve emergencies on hand, through analyzing the emergency characteristics and consolidating data from different departments that are involved in resolving the emergency. Many countries have adopted various forms of EMS that are specialized in resolving one type of emergency, and stu...
Article
Full-text available
Bookkeeping plays a vital role in dealing with records of day-to-day financial transactions from invoices until payment. It is also a method of documenting all company transactions in order to create a collection of accounting documents. Studies show that an evolution of bookkeeping management from manual record keeping to electronic record keeping...
Article
Full-text available
Pandemic outbreaks such as SARS-CoV, MERS-CoV and Covid-19 have attracted worldwide attention since these viruses have affected many countries and become a global public health issue. In 2019, Covid-19 was announced as a pandemic disease and categorized as a public health emergency globally. It is ranked as the sixth most serious pandemic internati...
Article
Collaborative Filtering (CF) has been known as the most successful recommendation technique in which recommendations are made based on the past rating records from like-minded users. Significant growth of users and items have negatively affected the efficiency of CF and pose key issues related to computational aspects and the quality of recommendat...
Book
This book constitutes the refereed proceedings of the 6th International Conference on Soft Computing in Data Science, SCDS 2021, which was held virtually in November 2021. The 31 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on AI techniques and applications; da...
Article
Full-text available
Hypertension is one of the non-communicable disease (NCD) that is classify as a global health risk with many critical health cases. Malaysia raise the same concern of the increasing NCD health problem. This paper aims to study the techniques used in predictive analytics namely healthcare and identify the factors of prevalence on hypertension. This...
Article
Full-text available
Exploring the new method of using technology for classifying rice grain quality is pertinent for rice producers in order to provide quality grains and protect consumers from any contamination exist. This is even more important when in today’s market we can see that rice with low quality is traded without stringent quality control which at the end w...
Article
Full-text available
Food delivery services have gained attention and become a top priority in developed cities by reducing travel time and waiting time by offering online food delivery options for a variety of dishes from a wide variety of restaurants. Therefore, customer analytics have been considered in business analysis by enabling businesses to collect and analyse...
Chapter
The rising population of older adult has contributed to the increasing number of elderly suffering from Alzheimer’s disease. Abundant new exciting applications have been developed to assist people with Alzheimer’s to support a better quality of life. The design of software product for older people should be carefully carried out as it could reduce...
Article
Full-text available
Big data has become a significant research area due to the birth of enormous data generated from various sources like social media, internet of things and multimedia applications. Big data has played critical role in many decision makings and forecasting domains such as recommendation systems, business analysis, healthcare, web display advertising,...
Book
This book covers the state of the art in learning algorithms with an inclusion of semi-supervised methods to provide a broad scope of clustering and classification solutions for big data applications. Case studies and best practices are included along with theoretical models of learning for a comprehensive reference to the field. The book is organi...
Chapter
Online medium has become popular among knowledgeable society as a new emerging platform of information gathering and sharing where their thoughts and opinions are considered important in many aspects of nation building. The overwhelmed of online opinionated data has created a great challenge for researchers to mine sentiments accurately. Sentiment...
Article
Recommender Systems deal with the issue of overloading information by retrieving the most relevant sources in the wide range of web services. They help users by predicting their interests in many domains like e-government, social networks, e-commerce and entertainment. Collaborative Filtering (CF) is the most promising technique used in recommender...
Article
Full-text available
Recommender systems have been regarded as gaining a more significant role with the emergence of the first research article on collaborative filtering (CF) in the mid-1990s. CF predicts the interests of an active user based on the opinions of users with similar interests. To extract information on the preference of users for a set of items and evalu...
Chapter
Full-text available
Minimum Remaining Values (MRV) is a popular strategy used along with Backtracking algorithm to solve Constraint Satisfaction Problems such as the Graph Colouring Problem. A common issue with MRV is getting stuck on search plateaus when two or more variables have the same minimum remaining values. MRV breaks the tie by arbitrarily selecting one of t...
Chapter
Examination scheduling is a challenging and time consuming activity among academic administrators of colleges and universities. This is because it involves scheduling a set of exams within a limited number of timeslots, assigning invigilators for each exam and satisfying a set of defined constraints. Scheduling is done to avoid cases in which stude...
Chapter
Full-text available
Staff Employment Platform (StEP) is a web-based application which employed machine learning engine to monitor Human Resource Management in hiring and talent managing. Instead of using the conventional method of hiring, StEP engine is built using decision tree classification technique to select the most significant skillsets for each job position in...
Chapter
Full-text available
This paper is an investigation about the MNIST dataset, which is a subset of the NIST data pool. The MNIST dataset contains handwritten digit images that is derived from a larger collection of NIST data which contains handwritten digits. All the images are formatted in 28 × 28 pixels value with grayscale format. MNIST is a handwritten digit images...
Book
This book constitutes the refereed proceedings of the 5th International Conference on Soft Computing in Data Science, SCDS 2019, held in Iizuka, Japan, in August 2019. The 30 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on information and customer analytics; v...
Article
Full-text available
Sentences are the language of human communication. This communication medium is so fluid that words and meaning can have many interpretations by readers. Besides, a document that consists of thousands of sentences would be tough for the reader to understand the content. In this case, computer power is required to analyse the gigantic batch size of...
Article
Full-text available
Currently, university students are required to follow stringent curriculum structure regardless of their performance. Personalized learning is not being offered resulting the whole cohort must compy to a customized fixed curriculum design. This is because the designed curriculum does not take into account different students’ attainment. Furthermore...
Article
Online opinionated data has increased tremendously since the arrival of web 2.0. Users have the authority to generate online content expressing their sentiments or opinions regarding subjects of interest. Although these phenomena caused the problem of information overload, the opinionated data is valuable and beneficial to others. Looking at the pr...
Article
Genome wide association study (GWAS) is a study to investigate the correlations between genetic variants and traits. GWAS normally focus on the associations between single-nucleotide polymorphisms (SNPs) and traits like major human diseases. Generally, GWAS uses standard statistical tests on each SNP to capture main the genetic effects. However, th...
Chapter
Full-text available
Advances in mobile technology have lead to a more interesting and inspiring applications that could be used to help people with health problem. Together with rapid progress in mobile devices, new applications to support treatments have been developed tremendously. This technology has also been identified to assist patients with Alzheimer’s disease....
Conference Paper
Full-text available
Traffic congestion is a common problem around the globe. Increased traffic and limited road capacity are major causes of this problem. Congestion is worsened when unexpected, which is known as Non-Recurrent Congestion (NRC). Traffic congestion is discussed and researched in several areas, including traffic management system, intelligent transportat...
Book
This book constitutes the refereed proceedings of the International Conference on Soft Computing in Data Science, SCDS 2017, held in Yogyakarta, Indonesia, November 27-28, 2017. The 26 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on deep learning and real-time...
Conference Paper
The use of assistive technology with intervention of mobile technology to support the treatment of Alzheimer’s disease patients have drawn a lot of attention among the researches over recent years. A number of applications were developed to help in improving the quality of life for people with AD. Studies showed that AD patients could benefits the...
Conference Paper
This paper describes the performance of a shallow network towards increasing complexity of dimension in an image input representation. This paper will highlight the generalization problem in Shallow Neural Network despite its extensive usage. In this experiment, a backpropagation algorithm is chosen to test the network as it is widely used in many...
Book
This book constitutes the refereed proceedings of the International Conference on Soft Computing in Data Science, SCDS 2016, held in Putrajaya, Malaysia, in September 2016. The 27 revised full papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on artificial neural networks; class...
Conference Paper
The advancement of web technologies has changed the way people share and express their opinions. People enthusiastically shared their thoughts and opinions via online media such as forums, blogs and social networks. The overwhelmed of online opinionated data have gained much attention by researchers especially in the field of text mining and natura...
Conference Paper
Caring a person who is diagnosed with Alzheimer's Disease (AD) can be very challenging. Most AD patients rely on their caretakers to carry out their daily routine. The research presents a personalized digital memory book for Alzheimer's Disease (AD) patient. The application was tested on a real patient on its functionality and usability to help the...
Article
Business Strategist and Technologist Implementers realized that ICT Outsourcing was one of the most successful strategies for ICT operational cost cutting and solved the shortage of ICT expertise or resources to implement an ICT project and services. Unfortunately, the strategy cause's other significant risks that could interrupt the ICT outsourcin...
Article
The most challenging task during a flood event is to evacuate people from the affected areas to safer locations. The difficulty of this task is attributed to an uneven distribution of vehicles, a lack of timely assistance, a deficiency in decision making and poor coordination at the operational level. Although it is important to identify flood-pron...
Conference Paper
Full-text available
Humans tend to form decisions intuitively, often based on experience, and without considering optimality; sometimes, search algorithms and their strategies apply the same approach. For example, the minimum remaining values (MRV) strategy selects Sudoku squares based on their remaining values; squares with less number of values are selected first, a...
Book
This book constitutes the refereed proceedings of the International Conference on Soft Computing in Data Science, SCDS 2015, held in Putrajaya, Malaysia, in September 2015. The 25 revised full papers presented were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections on data mining; fuzzy computing; evol...
Conference Paper
Full-text available
Traffic congestion is a global and crucial problem due to increase in demand and limited network transportation structure. Complex traffic structure, imbalanced traffic flow, and uncertain event like road accident are among of the identified factors that may cause traffic congestion. Traffic congestion problem causes delay in travelling, increase i...
Article
Data mining consists of crucial tasks in discovering knowledge and hidden patterns and the tasks are significant in the various areas, such as marketing, biomedical, drugs design, event sequences and etc. Frequent pattern mining is a method that has been explored by a lot of researches in discovering new or hidden knowledge. Therefore, this researc...
Conference Paper
Huge volume of online content in the era of web 2.0 increases difficulties in seeking information. Users are unable to get the right information based on their needs and preferences. Information filtering is capable to overcome the problems of information overload by filtering irrelevant information. There has been much work done in this area to in...
Article
Full-text available
Malaysia Qualification Framework, 2005 (MQF) promotes outcome based education (OBE) learning process. OBE calls for the evaluation of the course's Learning Outcomes (CLO) as specified in the Program Specification. This good practice is implemented in the Faculty of Information Technology and Quantitative Science, Universiti Teknologi MARA (FTMSK) t...
Article
Structured documents as forms, cheques, and slips are used widely in all sectors and have an inherently high error rate (ERR) which is mainly due to many factors as inconsistent of human while filling the documents manually, different written language used all over the world to fill up the required information, different structure and layouts for e...
Article
Based on the fact that thresholding stage can affect massively the performance of the subsequent steps of the whole structured document classification system, this paper proposed an efficient approach called Adaptive Generic Thresholding (AGT) combining point-dependent and regional-dependent methods using ordinal structure fuzzy logic. A point-depe...
Article
Developing an appropriate binarization method for an input image to the generic document classifier is a difficult problem. Typically, a human expert evaluates the binarized images according to his /her visual criteria. However, to conduct an objective evaluation, one needs to investigate how well the subsequent image analysis steps will perform on...
Conference Paper
Frequent pattern mining (FPM) is a popular method in discovering knowledge through generating associations between the attributes in database. Frequent patterns (FPs) represent interesting relationship that could improve understanding the data. High throughput genomic datasets normally consists of a lot of hidden relationships that can be discovere...
Article
Genome wide association studies have proved that genetic variants would increase the risk to common and complex diseases. The studies produced a lot of single nucleotide polymorphisms data but many variants are still in mystery and yet to be discovered. Existing researches have found tremendous findings on computational intelligence methods in iden...
Conference Paper
Full-text available
Global distributed software development or Global Software Development (GSD) has now become the trend for software companies to develop their product in order to cater demands from the global markets. At the same time, in order to fulfil this global demand, Agile method is used to develop the software because it is able to produce quality software...
Conference Paper
Disaster relief management is essential for various types of disasters such as terrorist attacks, hazardous materials, hurricanes and flash floods. Planning for disaster relief is important in rescuing victims with the involvement of many agencies and the public in managing the event. This is due to poor coordination, late assistance and uneven dis...
Article
Abstract—Information Communication Technology (ICT) Outsourcing provides effective ways to cut cost and improve efficiency in ICT services. Unfortunately, the outsourcing strategy still invites some critical risks especially information security risks. Fundamental concepts of information security requirements such as confidentiality, integrity and...
Conference Paper
Current development in biological sciences and data sharing have contributed a lot of advantages by increasing the number of research in computer sciences. These researches could manipulate environmental and genetic factors that influence and increase the risk to diseases. Genome wide association studies (GWAS) are the studies that exploit genetic...
Conference Paper
Dermatology or skin disease is one of the popular diseases among other diseases these days. The features similarities between different types of skin diseases make diagnosis of skin diseases very complex. A patient needs dermatologist that has a sound and vast good experience in skin diseases in order to give precise results at the right time. This...
Conference Paper
Information Communication Technology (ICT) Outsourcing provides an effective ways to cut cost and improve efficiency in ICT services. However, the strategy could invite some risks including information security risk. Therefore, fundamental concepts of information security requirements such as confidentiality, integrity and availability for informat...
Conference Paper
Full-text available
Most of the health care companies have shown their efforts in putting their patients' record properly. The patients' record would be very useful in discovering knowledge and identifying patterns, such as for disease detection. In order to exercise pattern identification task, we chose medical dataset from UCI as our preliminary study. We focused ou...
Conference Paper
With the availability of biological data and the power of sharing, it produces many opportunities for computer scientists to perform researches in bioinformatics. Generally the researches propose methods for different tasks, mainly to develop algorithms in diagnosing and identification of diseases. One of the primary studies that relevant to health...
Conference Paper
Turf grass needs water to survive and stay green, but too much water can really damage it. Turf grass irrigation processes can lead to excess water consumption. The irrigation process is based on several factors, which are evapotranspiration rate, grass evapotranspiration rate and tensiometer reading. This study proposes an irrigation process syste...
Conference Paper
Flood evacuation operations face a difficult task in moving affected people to safer locations. Uneven distributions of transport, untimely assistance and poor coordination at the operation level are among the main problems in the evacuation process. This is attributed to the lack of research focus on evacuation vehicle routing. This paper proposes...
Article
Full-text available
Online signature or dynamic signature is a biometric modality that uses, for recognition purpose, the behavioural that an individual exhibit when signing. There's a lot of factor that can be dynamically captured in the online signature recognition as the indicator of individual's identity or personality. This research aims to identify the two (2) i...
Conference Paper
Manual screening of colorectal biopsy tissue under microscope to conform the presence of cancerous cell is difficult and time consuming. The criteria in diagnosing colorectal cancer cell are gland shape and nucleus size. In this paper, we proposed a method of automatic image pre-processing to extract important feature of colorectal tissue images. I...
Conference Paper
Full-text available
Currently, the distance related to time and location between distributed software development teams is considered contributing to the chaotic environment of Global Software Development (GSD). Furthermore, when it involves using Agile method where communication is crucial between developers and customers. This paper aim to discussed the issues that...
Conference Paper
Full-text available
Nowadays, we can see an increasing number of studies in genomics that try to find out ways to detect diseases and also better prevention methods. The public would gain a lot of benefits from the studies. With the rapid development of genotyping technology, it creates opportunity to the researchers to go depth to the genetic and look into the varian...
Article
Manual screening of colon cancer biopsy tissue under microscope is difficult and time consuming. With the help of a computerized system, the diagnosis time can be shortened. In this paper, we proposed a method of detecting the layer of muscularis mucosae in the colon biopsy tissue image. By using RGB color information, we analyzed 65 images and pre...
Conference Paper
Full-text available
It is well known that for any type of cancer, mortality rate can be reduced by early detection of the cancer. Detection of cancer markers from the time of taking blood from patients until microscopic examination of the biopsy tissues is not only laborious but time consuming. It is known that with the help of a computerized system, the diagnosis tim...
Conference Paper
An optimal evacuation route plan has to be established to overcome the problem of poor coordination and uneven distribution of vehicles before or during disaster. This article introduces the evacuation vehicle routing problem (EVRP) as a new variant to the vehicle routing problem (VRP). EVRP is a process of moving vehicles from a vehicle location t...
Conference Paper
Signature is a popular method of seeking approval and authentication between various parties in many transaction applications. Signature pattern recognition is done by processing a set of data that consists of (x, y) coordinates, representing online signature. Particle Swarm Optimisation technique is used to find and analyse the baseline feature th...
Conference Paper
Full-text available
Manual screening of colon cancer biopsy tissue under microscope is difficult and time consuming. With the help of a computerized system, the diagnosis time can be shortened. In this paper, we proposed a method of detecting the layer of muscularis mucosae in the colon biopsy tissue image. By using RGB color information, we analyzed 65 images and pre...
Article
This article proposes a discrete particle swarm optimization (DPSO) for solution of the shortest path problem (SPP). The proposed DPSO adopts a new solution mapping which incorporates a graph decomposition and random selection of priority value. The purpose of this mapping is to reduce the searching space of the particles, leading to a better solut...
Article
Signature is a typical method in authenticating identities. It is commonly used in many official transactions as a symbol of approval and agreement between all parties involved in the specified transactions. Although many individuals can possess the same name in their birth certificates, their signature still differs from one person to another. The...
Conference Paper
This paper discusses the application of two unsupervised methods in classifying type of soils. Soils that are suitable for agricultural activities can be classified into four classes which are hill soil, organic soil, alteration soil and alluvium soil. In addition, no specific support system is able to classify the type of soil and retrieve the inf...
Conference Paper
Full-text available
Information Communication Technology (ICT) services become more importance in today business environment. Most of the organizations which were not have enough resources and expertise outsource their ICT project to vendors. Conversely, the strategy could also contribute to some risks especially information security risks that could expose organizati...
Conference Paper
Organizations all around the world are increasingly adopting the activity of outsourcing their IT function to service providers. However, the decision to outsource IT project is not an easy task. The risk will mostly affect the organizations as opposed to service provider. Therefore, it is important for the managers to manage this activity. This pa...
Conference Paper
There are many organizations opt for outsourcing in order to cut cost and improve efficiency for their ICT services. On the other hand, ICT outsourcing could also contribute to some risks especially information risks that could jeopardize information asset in the company. An appropriate information security risk management (ISRM) in ICT outsourcing...
Conference Paper
This paper examines the use of evolutionary computation (EC) to find optimal solution in vehicle assignment problem (VAP). The VAP refers to the allocation of the expected number of people in a potentially flooded area to various types of available vehicles in evacuation process. A novel discrete particle swarm optimization (DPSO) algorithm and gen...
Article
Full-text available
While corporate governance is now receiving due attention in the Asian region, IT governance (ITG) does not appear to be given much credence even though business processes today mandate IT. It is observed that awareness and practices of ITG do not seem to be widespread in the region. Using senior management sample data from Malaysian organizations,...
Conference Paper
Information Communication Technology (ICT) Outsourcing provides an effective ways to cut cost, launch new business venture and improve efficiency. Sometimes, ICT outsourcing can lead to an information security risk incident that might be difficult to manage and mitigate. Hence, the objectives of the research are to determine the information securit...
Article
Full-text available
Having been among the top ranks of worldwide ICT outsourcing indices for a number of years, Malaysia is familiar with the role outsourcing has played in changing today’s business landscape. However, concerns of data privacy and security, and the risks of data leakage arise during the course of outsourcing as the process may involve the exposure or...
Article
Full-text available
Automated fruit grading in local fruit industries are gradually receiving attention as the use of technology in upgrading the quality of food products are now acknowledged. In this paper, outer surface colors of palm oil fresh fruit bunches (FFB) are analyzed to automatically grade the fruits into over ripe, ripe and unripe. We compared two methods...
Conference Paper
There are various methods in data mining that can be applied in classification data. This paper discusses the experiments done in classifying ICU data. The dataset consists of 25 variables for 410 patients. The goal of this experiment is to determine the survival of the patients, so the targeted output are alive and dead. Three selected data mining...
Conference Paper
This paper covers the area of baseline identification, which leads to signature recognition. It addresses the usage of a proposed algorithm, which identifies the minima points of a signature to be applied in signature baseline recognition. Signature baseline is vaguely identifiable and hard to determine for its baseline form. In this study, the aim...
Conference Paper
Graphology and personality psychology are two different analyses approach perform by two different groups of people, but addresses the personality of the person that were analyzed. It is of interest to visualize a system that would aid personality identification given information visualization of these two domains. Therefore, a research in identify...
Article
Signature zones' identification has been used in signature recognition and verification. The identification of an offline signature requires the whole image of the signature to be processed without considering other features in the signature. One of the signature features that are frequently used as the precondition for other subsequent algorithms...
Article
Full-text available
The bandwagon effect of Kodak and IBM agreement has lead to more organizations to involve in IT outsourcing. Even though that is the case, IT outsourcing is not a panacea. Many researchers have been trying to come out with ways to effectively manage IT outsourcing. Some of them are anecdote, some with theoretical foundations and some are supported...
Article
Full-text available
A vector rule-based approach and analysis to on-line slant signature recognition algorithm is presented. Extracting features in signature is an intense area due to complex human behavior, which is developed through repetition. Features such as direction, slant, baseline, pressure, speed and numbers of pen ups and downs are some of the dynamic infor...

Network

Cited By