
M. R. M. IsaNational Defence University of Malaysia | UPNM
M. R. M. Isa
Doctor of Philosophy
About
60
Publications
15,546
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
264
Citations
Introduction
Skills and Expertise
Publications
Publications (60)
The maturity of oil palm fruits is a very crucial factor for oil extraction industry in In-donesia, Malaysia, Thailand, and other countries to ensure the oil quality and increase productivity. This literature review examines the various machine learning techniques, especially the deep learning techniques used to automate the maturity grading proces...
Access to networks and the Internet has multiplied, and data traffic is growing exponentially and quickly. High network utilization, along with varied traffic types in the network, poses a considerable challenge and impact on the ICT Infrastructure, particularly affecting the performance and responsiveness of real-time application users who will ex...
The Internet of Things (IoT) connects electrical appliances that enable data transfer for communication without human intervention. IoT has evolved, and its implementation has been extended to residential areas. It can be said that all residents use fans as cooling appliances. In Malaysia, having a fan is not sufficient due to its hot temperature t...
This study is a meta-analysis that identifies several publications focusing on the effect of computational thinking skills (CTS) on the academic achievement of engineering education students at the higher education level. Publications were sourced from Google Scholar and Scopus metadata using the Publish or Perish application, with a search time ra...
The implementation of project-based learning (PjBL) has contributed to improving students’ learning outcomes. However, strong evidence specifically linking PjBL to the improvement of students' higher-order thinking skills (HOTS) is still limited, especially in engineering education. Hence, this study aims to uncover the impact of PjBL on students'...
One major problem commonly faced by organizations is a network attack especially if the network is vulnerable due to poor security policies. Network security is vital in protecting not only the infrastructure but most importantly, the data that moves around the network and is stored within the organization. Ensuring a secure network requires a comp...
A good WLAN performance is crucial in determining the quality of experience (QoE) among the campus community. Proper WLAN planning and design should be done beforehand to ensure good WLAN performance. Various studies have discussed different methods of conducting WLAN planning to predict WLAN's best performance, including using artificial intellige...
Technological progress has brought about modifications in the educational process. This transformation has led to numerous technological innovations for supporting student learning, with smartphones being one of the prominent tools. Despite the widespread use, students have primarily used smartphones for online gaming and social media, leading to a...
One of the impacts of the COVID-19 outbreak was the closure of numerous education facilities, including schools and universities. Due to the closing of these institutions, the method used for teaching and learning changed from physical face-to-face lecturing to online contactless learning. This helps curb the spread of infections while ensuring tha...
The heterogeneous data traffic of today's network is a huge challenge to existing best-effort network technology, particularly in the context of large Ethernet, which handles hundreds to thousands of users. The existing conventional best-effort network technology is no longer efficient to handle the diversity of traffic types in the network and req...
The heterogeneous data traffic of today's network is a huge challenge to existing best-effort network technology, particularly in the context of large Ethernet, which handles hundreds to thousands of users. The existing conventional best-effort network technology is no longer efficient to handle the diversity of traffic types in the network and req...
Sheep are a significant food source for humans, besides cattle and poultry. Despite its significance to Malaysian Muslims, who make up approximately 60% of the local population, the sheep supply is limited by the high mortality rate caused by fatal diseases such as foot and mouth disease (FMD) and tetanus. Infected sheep can spread food-borne bacte...
Sheep are a significant food source for humans, besides cattle and poultry. Despite its significance to Malaysian Muslims, who make up approximately 60% of the local population, the sheep supply is limited by the high mortality rate caused by fatal diseases such as foot and mouth disease (FMD) and tetanus. Infected sheep can spread food-borne bacte...
Sheep are crucial to Malaysian Muslims, which accounts to 60% of the population. Yet there is not enough supply due to a high death rate brought on by diseases like Tetanus and Foot and Mouth Disease (FMD), among others. Objective of the study is to create a uniform data collection system that can be adopted across farms. The system will be develop...
Sheep are a significant food source for humans, besides cattle and poultry. Despite its significance to Malaysian Muslims, who make up approximately 60% of the local population, the sheep supply is limited by the high mortality rate caused by fatal diseases such as foot and mouth disease (FMD) and tetanus. Infected sheep can spread food-borne bacte...
Smart campus initiative enables higher education to enhance services, decision-making, and campus sustainability. The initiatives are being actively implemented globally by higher education, including in Malaysia. The recent COVID-19 pandemic has underscored the need for the education sector to explore a digital revolution. The adaptation of digita...
Motivated by an inherent difficulty of foreseeing the exact occurrence of disasters, attempts to rapidly detect and forecast associated information leading towards and in the aftermath of the disaster events can help minimize casualties and collateral damage, particularly in the rural and crowded urban environment. An emerging Internet of Things (I...
Passpix is a key element in pixel value access control, containing a pixel value extracted from a digital image that users input to authenticate their username. However, it is unclear whether cloud storage settings apply compression to prevent deficiencies that would alter the file's 8-bit attribution and pixel value, causing user authentication fa...
This paper investigated the performance of Malaysian power plants from the year 2015 to 2017 using Malmquist Total Factor Productivity (TFP) index, which is based on Data Envelopment Analysis (DEA). This approach offers substantial advantages as compared to other existing methods as it can measure productivity changes over time for a variety of inp...
Improving outdated technologies have empowered the development plan to establish judgement methods to solve real life problems. A community of end-users, such as military and civilian command and control experts, developers, engineers, and specialists, intended to help the Blended Reality (MR) environment. The Virtual Tool creates a coordination of...
Floods in Malaysia are described as flash floods and monsoon floods by the Department of Irrigation and Drainage (DID). Forecasting is a specialized form of predictive analysis used to predict future trends or behavior from existing data. Weather forecasting predicts the weather in the future from current data circumstances. As flood forecasting mo...
This research is basically to investigate the effectiveness and efficiency of drone sensor application. Drones, which are a kind of remotely piloted aircraft system (RPAS) or unmanned aircraft system (UAS), can take a real-time visual recording, surrounding the targeted area and upload all the visual dataset into a system (VAL-Dr1) to be analysed....
With the current development of science and technology-, big data technology, the Internet of Things (IoT), cloud computing, and mobile Internet in Malaysia, it is time for smart campuses to be established and Higher Education Institution (HEI) should not have left behind. The smart campus is the upgraded version of a digital university, providing...
With the current development of science and technology, big data technology, the Internet of Things (IoT), cloud computing, and mobile Internet in Malaysia, it is time for smart campuses to be established and Higher Education Institution (HEI) should not have left behind. The smart campus is the upgraded version of a digital university, providing a...
Teaching and learning processes in higher education have been affected due to the COVID-19 pandemic. Face-to face learning has been transitioned to online learning. This study explored student preferences for online materials during unprecedented online learning due to COVID-19. Through an online questionnaire, quantitative data was collected from...
One major problem faced by network users is an attack on the security of the network especially if the network is vulnerable due to poor security policies. Network security is largely an exercise to protect not only the network itself but most importantly, the data. This exercise involves hardware and software technology. Secure and effective acces...
Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users to load their image as their password. PVAC extracts the image to obtain a three-octet 8-bits Red-Green-Blue (RGB) value as its password to authenticate a user. The pixel value must be matched with the record stored in t...
In a huge congregation, a number of pilgrimages went missing because they got lost or other causes. Cases like panicking due to getting scatter around from the group or getting lost and cannot find the way back happens daily during the holy seasons. To accommodate this problem, Portable Pilgrim Tracker is proposed in this paper to overcome those mi...
span>Developments in computer networking have raised concerns of the associated Botnets threat to the Internet security. Botnet is an inter-connected computers or nodes that infected with malicious software and being controlled as a group without any permission of the computer’s owner.
This paper explores how network traffic characterising can be...
The pixel value graphical password scheme was introduced to reduce the burden on memorizing a hard textual password and to hide the password information. It gives freedom for the user to utilizing their personal image their password, called PassPix, that makes it is more memorable and hidden in the same time. However, when the PassPix is travelled...
Accident detection systems help reduce fatalities stemming from car accidents by decreasing the response time of emergency responders. This paper focuses on development a framework for detecting accident and sending alert message using android application. The proposed framework developed in order to produce the android application or system with t...
Decision making process in military require military who are capable and highly skilled of having a complete set of skills in making decision as well as situational awareness (SA). However, the ability and skills the decision maker have are not sufficient without an efficient and effective interaction and control between the equipment and decision...
The study investigates and develops components for implementing an effective and efficient military knowledge/information/communication in closed network architecture. Since military personnel are always on the move, the dissemination of knowledge/information/communication needs a mobile platform to accommodate mobility of people. The mobile and wi...
The study investigates and develops components for implementing an effective and efficient military knowledge/information/communication in closed network architecture. Since, military personnel are always on the move, the dissemination of knowledge/information/communication needs a mobile platform to accommodate mobility of people. The mobile and w...
The study investigates and develops components for implementing an effective and efficient militaryknowledge/information/communication in closed network architecture. Since, military personnel are always on the move, the dissemination of knowledge/information/communication needs a mobile platform to accommodate mobility of people. The mobile and wi...
This paper presents a proposal for a suitable and viable combination of a face recognition system and a watermarking system, namely a PCA—DCT combination, as a new watermarked face recognition scheme that will ensure the authenticity of the data being transmitted in the face recognition system, which will then increase its level of security. The em...
In this project, we propose the use of VoIP application as an video conference instead of using the normal telephone line. This technology facilitates the users in the aspect of cost saving as the conference can be made access to the internet without hav of carrying out this project is to test the performance of the codecs installed in the softphon...
A digital image is basically formed together information about the file (e.g. location captured, aut keywords. These properties allow database. Those images later can be retrieved from the system by running a text which explained the characteristics of an image. Although retrieving by text method is a common and widely used to find images in a very...
Chemical inventory management system has been experiencing a new revolution from traditional inventory system which is manual to an automated inventory management system. In this paper, some review of the classic and modern approaches to chemical inventory management system has been discussed. This paper also describe about both type of inventory m...
Mobile services support various situations in everyday life and with the increasing sophistication of phone functions, the daily life is much more easier and better especially in term of managing tools and apparatus. Since chemical inventory management system has been experiencing a new revolution from antiquated to an automated inventory managemen...
Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students. QR code technology is the best technology to solve the problems faced by the current system. The system is capable of decod QR, i...
This paper presents a proposal for a suitable and viable combination of a face recognition system and a watermarking system, with a watermarking technique that will ensure the authenticity of the data being transmitted in the face recognition system, which will then enhance its level of security. The proposed combination is a PCA—DCT system.
This paper presents combined face recognition and watermarking technique to secure a biometric image and maintain the recognition rate. These days, with advanced technology, the biometric data can be stolen and faked which may be used in other applications that utilize the same biometric feature. The discrete cosine transform (DCT) watermarking tec...
Information Technology Knowledge Management (ITKM) is a process that helps organization to create, identify, manage and distribute important information including the expertise owned for activities like making decision, strategic planning, dynamic learning and problem solving. In the business of waging wars, the military has always maintained that...
The aim of this paper is to contribute to the solutions of face recognition security problem by deploying an appropriate watermarking scheme to a modified face recognition algorithm. The significance of the proposed work is therefore manifold. The suitability of the face recognition for authentication purposes has already been studied in the securi...
The prepaid card market is growing rapidly. Its features have attracted many consumers. As a result, consumers require high quality services from prepaid cards companies. Moreover, high demand in surveys and feedbacks are required so that high quality of prepaid card services can be achieved in order to manipulate consumer perceptions. Therefore, t...
Intrusion Detection System (IDS) is used to detect intrusion and then alert the system administrator about the intrusion. This is what traditional IDS is all about. It is then up to the system administrator to deal with the intrusion. Human intervention is still needed when it comes to dealing with intrusion. This is because traditional IDS could o...
Biometrics personal authentication utilizing fingerprints have been thoroughly studied and applied. Exploiting the unique features of a fingerprint and the pleasant way of capturing the required information permits it to be used in numerous applications. Smart card is also being widely adopted in many applications and refers as an essential platfor...
Fingerprint matching for user authentication is becoming widely used in many applications. Smart cards are also being used heavily in identification applications. It is now required to combine both technologies so fingerprints can be matched on the smart card. This paper presents combination on two security components which are the fingerprint reco...
The ability to predict the students’ academic performance is very important in institution educational system. Recently some researchers have been proposed data mining techniques for higher education. In this paper, we compare two data mining techniques which are: Artificial Neural Network (ANN) and the combination of clustering and decision tree c...