
Faudziah Ahmad- Professor (Associate) at Northern University of Malaysia
Faudziah Ahmad
- Professor (Associate) at Northern University of Malaysia
About
66
Publications
40,475
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
330
Citations
Introduction
Current institution
Publications
Publications (66)
Ensemble learning by combining several single classifiers or another ensemble classifier is one of the procedures to solve the imbalance problem in multiclass data. However, this approach still faces the question of how the ensemble methods obtain their higher performance. In this paper, an investigation was carried out on the design of the meta cl...
The aim of this paper is to investigate the effects of combining various sampling and ensemble classifiers on the prediction performance in addressing the multiclass imbalance data learning. This research uses data obtained from the Malaysian medicinal leaf images shape data and three other large benchmark datasets in which seven ensemble methods f...
The aim of this paper is to investigate the effects of combining various sampling and ensemble classifiers
on the prediction performance in addressing the multiclass imbalance data learning. This
research uses data obtained from the Malaysian medicinal leaf images shape data and three other
large benchmark datasets in which seven ensemble methods f...
This paper presents the importance of modeling dynamical behaviors of human cognitive states that serves as a core foundation in creating intelligent and responsive systems. It discusses in detail the development of a dynamical model of cognitive load and reading performance which acts as the central component of creating a reading companion robot....
This paper presents the development of an ambient agent model (software agent) as an initial step to develop a reading companion robot to sup-port reading performance. This ambient agent model provides detailed knowledge (human functioning) about reader’s dynamics states. Based on this human functioning knowledge, a robot will be able to reason abo...
Trust between human and robot is one of the crucial issues in robot-based therapy. It is highly important to provide a clearer and richer understanding and also to answer the questions why trust occurs in machines and how it can maintain successful interaction. In this paper, an agent based model for trust dynamics in short-term human-robot interac...
Human-functioning models that describe human cognitive and psychological states have been developed and used to serve as a core component in creating intelligent and responsive systems. Endowing such systems with these human-functioning models, it gives them the ability to reason and intelligently acting to attain its ultimate design object which i...
Anxiety can be defined as an unpleasant state of mental uneasiness or concern that causes physical and psychological discomfort. In this paper, we describe an interactive robot-based platform that is designed to be used to support of person with anxiety traits and states using non-medical treatments including mindfulness, relaxation, and muscle rel...
Reading performance and cognitive load play an important role to facilitate learners to learn, memorize, and understand a novel piece of information. The cognitive demands of the reading tasks for solving complicated problems, when using poor learning materials, or in a distraction condition such as noise or interruptions, can have a significant im...
Many studies on object detection have been initiated but these methods have some limitation. A segmentation method was proposed to recognize a leaf lesion in leaf images and overcome the limitation of existing object detection method in terms of accuracy and processing time. The method includes steps based on Artificial Bee Colony, Otsu, and geomet...
The analyzing and extracting important information from a text document is crucial and has produced interest in the area of text mining and information retrieval. This process is used in order to notice particularly in the text. Furthermore, on view of the readers that people tend to read almost everything in text documents to find some specific in...
Multi-class imbalance shape-based leaf image features requires feature subset that appropriately represent the leaf shape. Multi-class imbalance data is a type of data classification problem in which some data classes is highly underrepresented compared to others. This occurs when at least one data class is represented by just a few numbers of trai...
Attribute selection also known as feature selection is an essential process in data sets that comprise numerous numbers of input attributes. However, finding the optimal combination of algorithms for producing a good set of attributes has remained a challenging task. The aim of this paper is to find a list of an optimal combination search methods a...
One of the main challenges that hugely effect readers’ performance is cognitive load. It plays a pivotal role to facilitate readers to learn, memorize, and digest a piece of novel information. However, cognitive load can also have insignificant impacts on reading task when the cognitive demands of the reading task when to solve a complex problem. T...
Technological change (TC), in general refers to continuous invention, innovation and diffusion of technology. In relation to telecentre, TC is seen as the driving force of the centre’s operation. However, in recent years, telecentre’s usage and operation is declining slowly and this leads to the question about the continued relevance of these centr...
This paper presents a temporal dynamic model of anxiety states and traits for an individual. Anxiety is a natural part of life, and most of us experience it from time to time. But for some people, anxiety can be extreme. Based on several personal characteristics, traits, and a representation of events (i.e. psychological and physiological stressors...
A hybrid ensemble classifier which combines the entropy based naive Bayes (ENB) classifier strategy and k-nearest neighbor (k-NN) is examined. The classifiers are joined in light of the fact that naive Bayes gives prior estimations taking into account entropy while k-NN gives neighborhood estimate to model for a deferred characterization. While ori...
In this paper, a consolidated view of genetic algorithm approach from the perspective of steganalysis system on text based environment is presented. Thus, this paper is tries to measures the detection performance based on genetic algorithm method and statistical method in order to classify the analyzed text as stego text. Three aspects such as time...
Shape is the main information for leaf feature that most of the current literature in leaf identification utilize the whole leaf for feature extraction and to be used in the leaf identification process. In this paper, study of half-leaf features extraction for leaf identification is carried out and the results are compared with the results obtained...
Malaysia has abundant natural resources especially plants which can be used for medicinal or herbal purposes. However, there is less research to preserve the knowledge of these resources to be utilized by the community in identifying useful medicinal plants using computing tools. This paper presents the implementation of digital opportunities for M...
Telecentre effectiveness is highly related with involvement of people in the community and has been measured by the socio-economic benefit gained from the telecentre. One of the important aspects that are often overlooked in the assessment of telecentre effectiveness is the technological change. It is referred to as the overall process of continuou...
This article presents a temporal dynamic model of anxiety states and traits for an individual. Anxiety is a natural part of life, and most of us experience it from time to time. But for some people, anxiety can be extreme. Based on several individual characteristics, traits, and a representation of events (i.e. psychological and physiological stres...
The recent trend towards developing a new generation of robots capable of operating in human-centered environments, and participating in and assisting our daily lives has introduced the need for robotic systems capable to communicate and to react to their users in a social and engaging way. This type of robot could play essential roles to help indi...
An ensemble classifier called DECIML has previously reported that the classifier is able to perform on benchmark data compared to several single classifiers and ensemble classifiers such as AdaBoost, Bagging and Random Forest. The implementation of the ensemble using sampling was carried out in order to investigate if there are any improvements in...
The recent trend towards developing a new generation of robots capable of operating in human-centered environments, and participating in and assisting our daily lives has introduced the need for robotic systems capable to communicate and to react to their users in a social and engaging way. This type of robot could play essential roles to help indi...
In this paper, a hybrid method to measure lesion area on the green leaf surface is presented. The method involved combining two algorithms, Artificial Bee Colony and Otsu algorithm and applying geometry to obtain the area. Three leaf images were used that contains leaf lesions of different sizes: small, medium and big. The method was conducted in t...
In this paper, an algorithm to classify leaf disease severity based on lesions is presented. The algorithm involved
three main steps, filtration, recognition and detection. Artificial Bee Colony, Fuzzy Logic, Otsu and Geometry formula
were incorporated to achieve the goal. Ninety-four leaf images were used in this algorithm combination experiment....
Optical Character Recognition (OCR) systems often generate errors for images with noise or with low scanning resolution. In this paper, a novel approach that can be used to improve and restore the quality of any clean lower resolution images for easy recognition by OCR process. The method relies on the production of four copies of the original imag...
Many researchers have reported that more than seventy five percent of dot.com companies do not last longer than two years. One contributing factor is the ignorance of dot.com companies on the consumer needs in their website development. Furthermore, consumers’ perspectives are often ignored in e-commerce website evaluations. This paper presents a f...
In Optical character recognition (OCR), the characteristics of Arabic text cause more errors than in English text. In this paper, a two bi-grams based language model that uses Wikipedia's database is presented. The method can perform auto detection and correction of non-word errors in Arabic OCR text, and auto detection of real word errors. The met...
Focusing on the use of Semantic Network and Conceptual Graph (CO) representations, this paper presents an easy way in understanding concepts discussed in the Holy Quran. Quran is known as the main source of knowledge and has been a major source reference for ail types of problems. However understanding the issues and the solution from the Quran is...
The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks. BA keys vary from 32-448 bits to ensure a high level of security. However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large str...
Lesions in images can be detected using several edge detection methods such as Canny, Sobel, Roberts and Prewitt. However, all of these methods are time consuming in detecting lesions. The reason being each of the pixels is serially searched from top to bottom and from left to right in the image. In addition, a lesion can only be detected when all...
Humans are social creatures, and when facing certain level of events, they to seek for support from others and vice versa. In this paper, a multi-agent model for simulating the dynamics of support provision and receipt interaction among different individuals is presented. Important concepts in social support network and stress buffering studies wer...
Chronic fatigue syndrome (CFS) is a disorder that is caused by multiple factors. Much work has been conducted to understand CFS mechanisms but little attention has been paid to model the behaviour of a person who experienced chronic fatigue syndrome. The article aims to present verification results made on an agent model that was developed to simul...
Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient. In this paper we attempt t...
Many development methods have been proposed for developing web application in small software firms. However, these methods have some limitations. This paper aims to identify the suitable development methods for building high quality web application. In order to achieve this objective, a comparative study was conducted on several current development...
Randomness of the output is one of the significant factors in measuring the security of any cryptographic algorithm. Non-random block cipher is vulnerable to any type of attack. This paper presents the National Institute of Standard and Technology (NIST) statistical tests of the Blowfish algorithm to investigate its randomness. Blowfish algorithm w...
This paper presents a dynamic agent model of chronic fatigue syndrome for an individual. Chronic fatigue syndrome is the most common name to define a group of cognitive and medical disorders caused by persistent fatigue. Based on several personal characteristics, viral infection, and a representation of events (i.e. psychological and physiological...
Small software firms that involved with developing web application are lacked of well defined development process. Many development methods have been proposed for developing web application in these firms. However, these methods have some limitations. This paper aims to identify the agile development methods that are suitable for small development...
This paper discusses issues on current development and measurement practices
that were identified from a pilot study conducted on Jordanian small software
firms. The study was to investigate whether developers follow development and
measurement best practices in web applications development. The analysis was
conducted in two stages: first, grouping...
This paper aims to discuss the pilot study and analysis of the current
development and measurement practices in Jordanian small software firms. It is
conducted because most developers build web applications without using any
specific development method and don't know how to integrate the suitable
measurements inside the process to improve and reduc...
This research aims to depict implementation of e-commerce in SMEs Indonesia. The total numbers of the existing SMEs in Indonesia are 489 million units. However there is no database that stored the implementation of ecommerce. This research data is retrieved from www.google.co.id, which has 227 SMEs websites. This research applies e-questionnaire to...
The Malaysian Government has implemented Internet-based applications to help small scale farmers grab the benefits from the current Internet technology. Agribazaar, which acts as a one stop center for the Malaysian agricultural community was developed to facilitate agricultural community conduct businesses locally or globally online, specifically i...
Face recognition is one of the most interesting applications in the image processing field. To build a model to recognize the face of different people, we need to do several processes on the image to obtain the most efficient features. In this research a face recognition model is developed. The dataset used is of different face images. Neural Netwo...
Training programs for teacher's development in Malaysia are organized ever year. The selection of teachers to attend trainings is currently done randomly, by rotation and not based on their work performance. This poses a problem in selecting the right teacher to attend the right course. Up until now, there is no intelligent model to assist the scho...
Face recognition is one of the most interesting applications in the image processing field. To build a model to recognize the face of different people, we need to do several processes on the image to obtain the most efficient features. In this research a face recognition model is developed. The data set used is of different face images. Neural Netw...
The efficient utilization of input such as labor, raw material and capital is the main target for organization to produce output such as profit and revenue. The result of this practice will eliminate waste, increase output and increase organization's profit. In order to explore the utilization of input to produce better output, a set of data consis...
Agribazaar, a one stop center for the Malaysian agricultural community is developed to facilitate agricultural community conduct businesses locally or globally online, specifically in terms of buying and selling agricultural products. After seven years of its implementation, no study has been made to evaluate the performance of the portal. The stud...
The complexity of cryptography does not allow many people to actually understand the motivations and therefore available for practicing security cryptography. Cryptography process seeks to distribute an estimation of basic cryptographic primitives across a number of confluences in order to reduce security assumptions on individual nodes, which esta...
Recently, the rapid development and the common use of electronic data processing administered through the Cyberspace, cooperatively with many incidents of attacks and breaches, fuelled the need for better methods of defending the computers and the information they store, process, and transmit. According to these difficulties, this research seeks to...
This paper presents an evaluation of project efficiencies of 39 companies using data Envelopment Analysis. In-Fusion Solutions Sdn. Bhd. was chosen as the case study and data were collected from primary and secondary sources. Primary data were obtained through interviews conducted with personnel from the main office and the company branch in Chenna...
A limited number of factors in critical areas are necessary to identify the sustainability of companies [30]. It was found that three factors were commonly used [2] and a maximum of seven factors was recommended [2]. In order to identify the optimal factors, we propose a method based on rough set theory that consisted of five main steps. These were...
Face recognition is one of the most interesting applications in the image processing field. To build a model to recognize the face of different people, we need to do several processes on the image to obtain the most efficient features. In this research a face recognition model is developed. The dataset used is of different face images. Neural Netwo...
The government has arranged many programs for teacher development however the training is organized to fit yearly calendar without considering the right teacher for the right training. The selection of teacher to attend training is done randomly, by rotation and not based on their work performance. This paper investigate the weakest integrity trait...
This paper proposed an intelligent model that is aimed at facilitating key workers select suitable trainees for a training program. The proposed model is initiated because it has been found that many motivational training programs fail to meet their objectives because there is a mismatch between the needs of training programs and the integrity leve...
This research paper aims at comparing both quantitative and qualitative methods in evaluating web sites. The purpose is to identify the various methods and factors that have been used to perform the evaluation. Analysis in terms of popularity of methods and ranking of factors are presented. The research serves as an initial study to explore various...
The paper proposes an approach to transform an information based portal into a knowledge-based hub. The study is made on the Agribazaar, which is an information-based portal provided by the Department of Agriculture, Ministry of Agriculture and Agri-based Industry, Malaysia. Basically, the portal has been developed to offer an internet-based commer...
The paper proposes an approach to transform an information based portal into a knowledge-based hub. The study is made on the Agribazaar, which is an information-based portal provided by the Department of Agriculture, Ministry of Agriculture and Agri-based Industry, Malaysia. Basically, the portal has been developed to offer an internet-based commer...
Rules are the most important element in knowledge extraction. The performance or strength of rules will determine how good a model is. Higher accuracy implies that a model is good and vise versa. However, the strength of rules depends on the attributes. The number of attributes in a rule can influence the percentage of accuracy in a model. Most mac...
Internet banking is a faceless banking arrangement where trust is still a major problem. This problem has been addressed through the implementation of third party endorsement on the bank's Websites. This endorsement acts as a knowledge repository on several issues about the bank's Websites. This paper intends to look on the current implementation o...
Financial data has been a popular source and used to analyze companies' performance. Measures based on financial data are many and among these are current ratio, quick ratio, net income, working capital, operational income, revenue, sales growth, earnings per share, gross profit, book value, stock price, and stock volume. All these measures are rel...
Discretization process is known to be one of the most important data preprocessing tasks in data mining. Presently, many discretization methods are available. These include Boolean Reasoning, Equal Frequency Binning, Entropy, and others. Each method is developed for specific problems or domain area. In consequent, the usage of such methods in other...