Iskandar Ishak

Iskandar Ishak
  • PhD in Computer Science, UTM
  • Senior Lecturer at Universiti Putra Malaysia

About

49
Publications
40,701
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
338
Citations
Introduction
Skills and Expertise
Current institution
Universiti Putra Malaysia
Current position
  • Senior Lecturer

Publications

Publications (49)
Article
Full-text available
Rapid technological development has led to an information explosion in the current Web environment. Recently, tourists have become reliant on the Internet as a tool to obtain information about the places they intend to visit. However, due to the overload of information, tourists face many challenges and difficulties in making the right choice. Desp...
Article
Full-text available
The end goal of technological advancement used in crisis response and recovery is to prevent, reduce or mitigate the impact of a crisis, thereby enhancing sustainable recovery. Advanced technological approaches such as social media, machine learning (ML), social network analysis (SNA), and big data are vital to a sustainable crisis management decis...
Article
Full-text available
Community resilience following a crisis has become essential to avoid panic. In contrast, social media usage has been practical to improve public resilience. However, the impacts of social media crisis response and social interaction have not been fully addressed. Therefore, this study aims to investigate the effects of social media crisis communic...
Article
Full-text available
Missing data are a universal data quality problem in many domains, leading to misleading analysis and inaccurate decisions. Much research has been done to investigate the different mechanisms of missing data and the proper techniques in handling various data types. In the last decade, machine learning has been utilized to replace conventional metho...
Article
Full-text available
The desire of people affected by crises or disasters is to return to their normal lives quickly and easily. Social media provides a platform for crisis response which helps recovery and resilience building. Therefore, this study aims to investigate how social media crisis response and information shaped people’s resilience-building, either affected...
Article
Full-text available
The rapid revolution of information technology has enhanced the global tourism industry that positively changed the structure of economy in large scale. Today, tourists face difficulties to find information to meet their needs or exceed their expectations due to the huge amount of information in the current Web and tourism portals. This has made th...
Article
Full-text available
The effects of trust score measurement is web donor selection is evaluated in this study. The performance of the proposed method is conducted by running a prediction model on the imputed dataset. Thus, several experiments were carried out to quantify the impact of the prediction model via Root Mean Squared Error (RMSE) and F-Measure. The results de...
Article
The data stream is a series of data generated at sequential time from different sources. Processing such data is very important in many contemporary applications such as sensor networks, RFID technology, mobile computing and many more. The huge amount data generated and frequent changes in a short time makes the conventional processing methods insu...
Article
Full-text available
Big Data has been used in university and hospital due to its enormous potential in managing large volume and many types of data. However, university that also has hospitals may need to integrate their data repository to have a single site access for easier system administration and management. The needs of image analytics for both researchers in th...
Article
Full-text available
Data quality drawn a major concern when dealing with data especially in the event that insightful outputs is needed. Research in data quality emerged in various topics and diversification in known knowledge and used approach is inevitable. In this paper, we apply systematic review study to explain the landscape of data quality and to identify avail...
Article
Full-text available
One of the reasons mobile phones become one of the worldwide commonly usedcommunication devices nowadays is because they allow the installation of various mobile apps which are mostly interesting and useful to mobiles users. Unfortunately, mobile apps involve transmissions of digital data wirelessly and vulnerable to hacking activities. An improved...
Article
Full-text available
Increasing volumes of data are rapidly being produced by researchers with the advancement of digital technologies. In order to manage these data, a suitable research data repository infrastructure is needed by the higher learning institutions. Apart from storing the data, these data repository need to support the research data life-cycle that inclu...
Article
Full-text available
Content-based medical image retrieval (CBMIR) is an active field of research and a complementary decision support tool for the diagnosis of breast cancer. Current CBMIR systems employ hand-engineered image descriptors which are not effective enough at retrieval phase. Besides this drawback, the so-called semantic gap in the CBMIR is not still addres...
Article
Full-text available
span lang="EN-US">The number of unstructured documents written in Malay language is enormously available on the web and intranets. However, unstructured documents cannot be queried in simple ways, hence the knowledge contained in such documents can neither be used by automatic systems nor could be understood easily and clearly by humans. This paper...
Article
In recent years, data migration has become an important exercise in data management due to the demand of scalable database management systems. Data transformation is an important part of data migration and researchers have put a lot of effort to produce better data transformation approaches. Based on the literatures, there are multiple ways of cond...
Article
Full-text available
Mobile devices are rapidly becoming the predominant means of accessing the Internet due to advances in wireless communication techniques. The development of Mobile applications ("apps") for various platforms is on the rise due to growth in the number of connected devices. Numerous apps rely on cloud infrastructure for data storage and sharing. Apar...
Article
Fake news can impact negatively in terms of creating negative perception towards business, organization, and government. One of the ways that fake news iscreated is through deceptive news writing. Many researchers havedeveloped approaches in detecting deceptive news content using machine-learningapproach and each of the approach has its own focus.P...
Conference Paper
Full-text available
Mobile enterprise applications are primarily developed for existing backend enterprise systems and some usage scenarios require storing of large files on the mobile devices. These files range from large PDFs to media files in various formats (MPEG videos).These files needs to be used offline, sometimes updated and shared among users. In this paper,...
Conference Paper
Full-text available
Veracity is a way to find the truthfulness, availability, accountability and authenticity while deception refers to the way of identifying whether verbal expressions or the overall content is truthful or not. Among the issue in data veracity is the use of deception element in digital news content. Many research have been conducted to address the is...
Article
Full-text available
Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security manageme...
Article
Full-text available
User generated content as such online reviews plays an important role in customer's purchase decisions. Many works have focused on identifying satisfaction of the reviewer in social media through the study of sentiment analysis (SA) and opinion mining. The large amount of potential application and the increasing number of opinions expresses on the...
Article
Full-text available
In practice, collected data usually are incomplete and contains missing value. Existing approaches in managing missing values overlook the importance of trustworthy data values in replacing missing values. In view that trusted completed data is very important in data analysis, we proposed a framework of missing value replacement using trustworthy d...
Conference Paper
Full-text available
Breast cancer is known as the second most prevalent cancer among women worldwide, and an accurate and fast diagnosis of it requires a pathologist to go through a time-consuming process examining different captured images under varying magnifications. Computer vision and machine learning techniques are used by many scholars to automate this process...
Article
Full-text available
The aim of this review is to highlight issues in data quality research and to discuss potential research opportunity to achieve high data quality within an organization. The review adopted systematic literature review method based on research articles published in journals and conference proceedings. We developed a review strategy based on specific...
Article
An extensive review of the existing schema matching approaches discovered an area of improvement in the field of semantic schema matching. Normalization and lexical annotation methods using WordNet have been somewhat successful in general cases. However, in the presence of stop-words these approaches result in poor accuracy. Stop-words have previou...
Article
Full-text available
Since its existence in 1990's, online news has been the major source of news content for news readers. Unfortunately, based on a number of findings, readers tend to judge on certain event based on the news headlines rather than its contents. With the advancement of mobile and web technologies, it is easier to spread news to others and this unhealth...
Article
Full-text available
The growing number of big data technologies and analytic solutions has been developed to support the requirement of big data implementation. The capability of analyzing big data becomes critical issues in the big data implementation because the traditional analytics tools are no longer suitable to process and analyze the massive amount and differen...
Article
Knowledge in unstructured documents is lacking the structured characteristics; therefore raising the problem of extracting answers when queried by simple queries. This paper proposes the Interrogative Knowledge Object- (IKO-) Recognizer that is able to model the extracted interrogative lexical constructs from unstructured documents into ontological...
Article
Full-text available
For most of us now, life is incomplete if living without mobile phones. This is because mobile phones are like a necessity to many people nowadays. Statistics have shown that more than seven billion people in the world are having these devices in 2015. This also means 97% of the human world populations are actually mobile phone users. Besides, more...
Article
Full-text available
There have been many cases of fake documents be used for important legal transactions. This includes the use of fake degrees or certificates during professional job applications either in private sectors or government related firms. Since many people are using smart phones currently, it is possible to have a mobile application system (apps) that ca...
Article
Data mining is a common automated way of generating normal patterns for intrusion detection systems. In this work a large dataset is customized to be suitable for both sequence mining and association rule learning. These two different mining methods are then tested and compared to find out which one produces more accurate valid patterns for the int...
Article
Full-text available
An extensive review of the existing research work in the field of schema matching uncovers the significance of semantics in this subject. It is beyond doubt that both structural and semantics aspect of schema matching have been the topic of research for many years and there are strong references available for both. However, an in-depth analysis of...
Conference Paper
Full-text available
The transformation of mobile devices from being a communication devices to be important information resources has changed the way of how activities being implemented including in tourism industry. This is very important for the tourists especially when they visit remote location such as forests. For these tourists, information regarding plants is v...
Conference Paper
Digital data transmission has become prominent in this era of communication. Digital data such as text, still images, movies, or sounds can be wirelessly distributed through internet, intranet or digital broadcasting. A recent data management technology known as QR Code (Quick Response Code) allows data or information to be communicated wirelessly...
Article
Recent popularity of mobile devices such as smart phones and tablets have increase the usage of these devices including by petty traders. This paper presents a prototype mobile phone application designed and developed to enhance the business activities for petty traders especially in open markets such as night markets. The proposed application cons...
Article
Full-text available
Internet banking and shopping are two main e-commerce activities that are popular among Internet users. However, millions of dollars have lost due to the compromised bank account of users that have been hacked or intercept by irresponsible person through the Internet. The increase of threats towards online banking and shopping has made the study to...
Article
Full-text available
Problem statement: Efficient searching is a fundamental problem for unstructured peer to peer networks. Flooding requires a lot of resources in the network and thus will increase the search cost. Searching approach that utilizes minimum network resources is required to produce efficient searching in the robust and dynamic peer-to-peer network. Appr...
Article
In this paper, we propose a query-feedback based routing approach for efficient routing in unstructured peer-to-peer network. In our approach, each node maintains a table that stores information about past queries that have been forward and answered. Each past query represents a number of peers. Each incoming query will be compared with the past qu...
Article
Full-text available
Biological data sources are known for its heterogeneous in many aspects. These aspects include data formats, physical location as well as its query capabilities. These data sources need to be integrated so that researchers can easily access it, query it and get results. Approaches like link-driven, data warehousing and mediator-based are being used...
Article
Unstructured peer-to-peer networks are popular due to its robustness and scalability. Query schemes that are being used in unstructured peer-to-peer such as the flooding and interest-based shortcuts suffer various problems such as using large communication overhead long delay response. The use of routing indices has been a popular approach for peer...
Article
Full-text available
In this paper, we propose a query based query routing approach for unstructured peer-to-peer network. We consider two parameters to be used to selectively route query in the network. The parameters are based on the recent past query and the similarity of the past query with the query to be routed. The objective of our approach is to have a low cost...

Network

Cited By