Masrah Azrifah Azmi Murad

Masrah Azrifah Azmi Murad
Universiti Putra Malaysia | UPM · Department of Software Engineering and Information Systems

PhD in Artificial Intelligence

About

181
Publications
67,245
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,468
Citations
Citations since 2017
51 Research Items
927 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150

Publications

Publications (181)
Article
Full-text available
Feature extraction and selection are critical in sentiment analysis (SA) to extract and select only the appropriate features by removing those deemed redundant. As such, the successful implementation of this process leads to better classification accuracy. Inevitably, selecting high-quality minimal features can be challenging given the inherent com...
Article
Full-text available
Computer-aided diagnosis system that uses classification process for an automated detection of breast cancer could provide a second opinion that improves diagnosis. Several researchers have proposed the use of associative classifier that generates strong associations between features and reveals hidden relationship that can be missed by other class...
Article
The usability study of the Ministry of Education’s Training Management System (SPLKPM) is a preliminary study conducted by the researcher to determine the rationale and analysis of research needs regarding system usage behaviour among teachers. The purpose of this study is to assess the system's usability in the management of in-service teacher tra...
Article
Full-text available
Limited approaches have been applied to Arabic sentiment analysis for a five-point classification problem. These approaches are based on single task learning with a handcrafted feature, which does not provide robust sentence representation. Recently, hierarchical attention networks have performed outstandingly well. However, when training such mode...
Article
Full-text available
This study validates and extends the latest unified theory of acceptance and use of technology (UTAUT2) with the privacy calculus model. To evaluate the adoption of healthcare and e-government applications, researchers have recommended—in previous literature—the application of technology adoption models with privacy, trust, and security-related con...
Article
Full-text available
The healthcare industry has undergone a rapid change as the internet shows latent abilities to assist in information seeking and decision making regarding self-care and health-related issues. Therefore, it is essential to discern issues concerning the quality of the information and the system. Thus, this paper aims to explore the current issues in...
Article
Full-text available
A multi-level mathematical model was used to estimate the stressed-strained state of a cylindrical reservoir with a defect in the wall shape in the form of a dent; the concentration of stresses in the defect zone was studied. The proper choice of the mathematical model was verified; it has been shown that the engineering assessment of the stressed...
Chapter
Over the last few decades, information and communication technologies (ICT) have changed our lives to enhance the process of teaching and learning. E-learning is powerful and influential in the classroom or elsewhere, as long as there is computer and internet access. The vast majority of institutions utilized a Learning Management System (LMS) to a...
Article
Full-text available
Social media platforms hold a vast volume of raw data that has been posted by people in the forms of texts, images, audio and video. People use this medium to express their thoughts and opinions. As a result, the data can be captured, categorized, and analyzed using Sentiment Analysis approaches to identify users' behaviour, customer's feedback or...
Article
Full-text available
Software flexibility is a crucial factor in designing and developing software as it reflects its capability to adapt to changes. It is a topic that has been discussed for a very long time which indicates its importance in software development. However, it is not easy to produce a flexible software design. Design principles provide fundamental conce...
Preprint
BACKGROUND Advance technological breakthroughs have dramatically contributed to the nature of the healthcare environment paired with current concerns arise over patients’ health information seeking and how to seek them effectively; the e-health systems are gaining the attention of more and more people. OBJECTIVE The primary objective of this study...
Article
Full-text available
The use of graphical knowledge representation formalisms with a representational vocabulary agreement of terms of conceptualization of the universe of discourse is a new high potential approach in the ontology engineering and knowledge management context. Initially, concept maps were used in the fields of education and learning. After that, it beca...
Article
An Enterprise resource planning (ERP) system is designed to improve operational efficiency by integrating business processes and providing better access to integrated data across the entire organization (Badewi et al., 2018).However, ERP systems are complex, risky to implement, and time consuming (Al-Sabri et al., 2018). Theaim of this paper isto i...
Conference Paper
Full-text available
This article intends to inform people on understanding the process of learning via Talaqqi approach and how Talaqqi framework plays a role in ensuring learning transpired. Certainly, our thinking and approach to effective learning have been influenced by the concept of Talaqqi presented in this article. We listed five pillars in constructing effect...
Article
Full-text available
The complexities and tangles of Arabic dialect in orthography and morphology typically make the sentimental analysis quite challenging. Moreover, most of the classification approaches have addressed this problem based on the hand-crafted features. Since Arabic language has multi-dialects and the language has no word-based order, the extraction proc...
Article
Full-text available
In this era of technology, delivering quality software has become a crucial requirement for the developers. Quality software is able to help an organization to success and gain a competitive edge in the market. There are numerous quality attributes introduced by various quality models. Various researches and studies prove that the quality of the ob...
Article
Full-text available
Provision of sufficient knowledge to users is the ultimate goal of a knowledge management system (KMS). Unfortunately, existing KMS’s relyon human effort foraccess to desired knowledge. Semantic technologies have become a force for paradigm shift in KMS research. They aim to enable the delivery of the right knowledge to the right person and in the...
Conference Paper
Spam detection techniques has been a major techniques to detect spam activities on social networks. Due to the rapid growth of spam menace on social networks , the problems of increasing spam mail on social media on the internet are becoming serious issues and difficult to detect.. Furthermore, several email social networks classification methods h...
Thesis
Spam detection techniques has been a major techniques to detect spam activities on social networks. Due to the rapid growth of spam menace on social networks , the problems of increasing spam mail on social media on the internet are becoming serious issues and difficult to detect.. Furthermore, several email social networks classification methods h...
Conference Paper
Computer-aided diagnosis (CADx) can help radiologists in the interpretation of mammograms to assist them in diagnostic decision-making. Such a system is capable to automatically classify and suggest the pathological terms for a new mammography image. A few traditional classification methods have shown poor performance for nonlinear separable data....
Article
Full-text available
The analyse and propose the factors that affect the current levels of collaboration which exist among physicians in sharing healthcare information in the selected hospitals in developing countries using HISs , A quantitative method of enquiry was used for this study in the two public hospitals in Selangor state in Malaysia, by using questionnaire i...
Conference Paper
Full-text available
The problem with Social networks has been a major issues globally. In recent years, Spam Detection on social networks has been focused. However, Spammer has seen that social networks are vulnerable to attack in order to perpetrate their evil. Influx of spam has been a great threat to individual, organization, government, institution if left uncheck...
Article
There is a need for further research in the area of ontology evaluation specifically dealing with ontology development exploiting concept maps. The existing literature on ontology evaluation primarily emphasis on ontology formalisation as well as on performing logical inferences, which is usually not directly relevant for concept maps as they are c...
Conference Paper
Full-text available
The most important task in aspect-based sentiment analysis (ABSA) is the aspect and sentiment word extraction. It is a challenge to identify and extract each aspect and it specific associated sentiment word correctly in the review sentence that consists of multiple aspects with various polarities expressed for multiple sentiments. By exploiting the...
Article
Full-text available
With the help of technology, people nowadays can easily express their opinions on services or products that they received. Sentiment analysis is an evolving field of study that deals directly with the online expressions posted by user via the internet. The main objective of sentiment analysis is to automate the process of mining opinions into valua...
Chapter
Twitter sentiment analysis according to five points scales has attracted research interest due to its potential use in commercial and public social media application. A multi-point scale classification is a popular way used by many companies to evaluate the sentiment of product reviews (e.g. Alibaba, Amazon and eBay). Most of the classification app...
Article
Full-text available
The massive increaseof spam is posing a very dangerous and serious threat to our email and social networks. It is pertinent and imperative to step up the spam detection approach and strategies in email and social networks. In recent years online spam has become a major problem for the sustainability of the internet globally, Excessive amounts of sp...
Article
Full-text available
This paper discuss the infrastructure requirement of the model named Experienced Based Facto-ry Model for Software Development Process (EBF-SD) in order to ensure the implementation of the model will be able support collaborative environment effectively and efficiently.
Article
Full-text available
Computer-aided diagnosis has gained a significant attention in helping radiologists to improve the accuracy of mammographic detection and diagnostic decision. The aim of proposed research work is to build an efficient and accurate classifier for the classification of mammogram images using a hybrid method by incorporating Genetic Association Rule M...
Article
Analyzing students’ feedback and their expressed emotions toward any subjects could help lecturers to understand their students’ learning behaviour. Several platforms are used by students to express their feelings such as through social networking sites, blogs, discussion forums and the university survey systems. However, the feedbacks typically co...
Article
Full-text available
Semantic web is an addition of the previous one that represents information more significantly for humans and computers. It enables the description of contents and services in machine readable form. It also enables annotating, discovering, publishing, advertising and composing services to be programmed. Semantic web was developed based on Ontology...
Article
Spam has been a major and global threat, Social networks have become our daily live and everyday tools, while different social networks have different target groups. With the rapid growth of social networks, people tend to misuse them for unethical and illegal conducts, fraud and phishing. Creation of a fake profile becomes such adversary effect wh...
Conference Paper
Full-text available
With the ever increasing of internet applications and social networking sites, people nowadays can easily express their feelings towards any products and services. These online reviews act as an important source for further analysis and improved decision making. These reviews are mostly unstructured by nature and thus, need processing like sentimen...
Article
During the mammographic acquisition, the breast is compressed with a tilting compression paddle; hence the breast thickness is non-uniform across the mammogram and thinner in the peripheral area and therefore over exposing this area. In Computer Aided Detection systems, peripheral enhancements were used as a pre-processing stage for the enhancement...
Article
Full-text available
Social network has become a very popular way for internet users to communicate and interact online. The socia; networks provide a platform to maintain a contact with friends. Increasing social network’s popularity allows all of them to collect large amounts of personal details about their users. Globally, the issue of identifying spammers have rece...
Article
Full-text available
A number of ontology engineering methodologies have been proposed to date. Distinct methodologies rely on different techniques and activities for developing ontologies. The concept mapping technique has been recently used for developing ontologies related to different domains. However, the existing approaches using concept mapping do not make use o...
Article
Full-text available
A number of ontology engineering methodologies have been proposed to date. Distinct methodologies rely on different techniques and activities for developing ontologies. The concept mapping technique has been recently used for developing ontologies related to different domains. However, the existing approaches using concept mapping do not make use o...
Article
Software development is a highly intensive knowledge process. Information, data, knowledge and experiences are accumulated daily and it is crucial that they are managed appropriately for the purpose of sharing and future reuse. Today, software development has spread across geographical boundaries; therefore, the need for knowledge retention has ris...
Article
Higher Education Institutions (HEIs) have become key institutions in the knowledge-based economy. Over the past decade, the Malaysian government has placed greater emphasis on improved efficiency and productivity in the HEI as an engine for promoting quality human capital for a knowledge-based economy. Importantly, the government raised the share o...
Article
Nowadays most of the public sector organisations are implementing a knowledge management system (KMS) to assist the systematic creation and sharing of their knowledge resources. The recent technological needs, collaboration and cooperation among public sector organisations (PSO) serve a vital role in the development of knowledge management systems...
Article
Nowadays most of the public sector organisations are implementing a knowledge management system (KMS) to assist the systematic creation and sharing of their knowledge resources. The recent technological needs, collaboration and cooperation among public sector organisations (PSO) serve a vital role in the development of knowledge management systems...
Article
Full-text available
Key phrase Visualizer System has become an important research area as more and more teaching materials are being uploaded to the net. Key phrase Visualizer System is the discovery of new, previously unknown pattern of knowledge based on automatic extraction of keywords and key phrases from presentation slides. However, because of this relatively ne...
Article
Full-text available
This paper presents the mechanics of a presentation mining system that mines keywords and key phrases from a collection of PowerPoint slides and generates a mind map using the extracted words and phrases. The core of presentation mining lies in two stages; ranking the potential phrases and extracting the keywords and key phrases. The keywords and k...
Article
Full-text available
Sentiment classification of financial news deals with the identification of positive and negative news so that they can be applied in decision support systems for stock trend predictions. This paper explores several types of feature spaces as different data spaces for sentiment classification of the news article. Experiments are conducted using N-g...
Article
Ambiguity is a potential problem in any semantic question answering (SQA) system due to the nature of idiosyncrasy in composing natural language (NL) question and semantic resources. Thus, disambiguation of SQA systems is a field of ongoing research. Ambiguity occurs in SQA because a word or a sentence can have more than one meaning or multiple wor...
Article
Slide presentations such as the PowerPoint presents knowledge by the subject matter expert in a linear sequence. Nonetheless, post-presentation, the knowledge is actually reconstructed differently by the learners depending on their personal understanding over the entire presentation. To enhance learning, this paper presents a presentation mining to...
Article
Full-text available
In our daily engagement with technology we interact with software in many aspects, rendering software engineering field a very robust area with a lot of dynamism. In this paper we have comprehensively surveyed on software engineering approaches for designing knowledge based systems. First we looked at knowledge based systems in detail, then at soft...
Article
Full-text available
The purpose of this paper is to empirically test the effect of information systems criterion on the European Foundation for Quality Management (EFQM) excellence model in Higher Education Institutions (HEIs). The paper identifies five (5) causal hypotheses from literatures that are related to the information systems criterion. The data were collecte...
Article
Semantic question answering (SQA) demands different processing compared to the common information retrieval method because the semantic knowledge base is stored in the triples form. However, manipulating the knowledge requires understanding of its structure and proficiency in semantic query language such as SPARQL. Natural language interface (NLI)...
Article
Purpose – The purpose of this paper is to propose an approach that integrates three complementary perspectives, multi-agent systems, fuzzy logic and case-based reasoning. Unsatisfied customers, information overload and high uncertainty are the main challenges that are faced by today’s supply chains. In addition, a few existing agent-based approache...
Article
Mammography is an important examination in the early detection of breast abnormalities. Automatic classifications of mammogram images into normal, benign or malignant would help the radiologists in diagnosis of breast cancer cases. This study investigates the effectiveness of using rule-based classifiers with multivariate filter and genetic miner t...
Article
Knowledge and experience are important assets for software organizations. In today’s global software development trends, development teams are no longer located in single premise; they are spreading across national and geographic boundaries. As a software project progresses, more and more activities are involved which results with the accumulation...
Conference Paper
Full-text available
The effectiveness of opinion mining relies on the availability of credible opinion for sentiment analysis. Often, there is a need to filter out deceptive opinion from the spammer, therefore several studies are done to detect spam reviews. It is also problematic to test the validity of spam detection techniques due to lack of available annotated dat...
Conference Paper
Non-taxonomic relation is one of the most important components in ontology to describe a domain. Currently, most studies focused on extracting non-taxonomic relationships from text within the scope of single sentence. The predicate between two concepts (i.e. subject and object) that appear in a same sentence is extracted as potential relation. Ther...
Article
Full-text available
Risk assessment (RA) is one of the main activities in risk management of IT governance. Basically, IT governance is a process or a procedure that involves evaluating and directing the plans for the use of ICT to support the organization and monitoring the achievement of these plans. The risks that may emerge during the implementation of IT governan...
Article
Full-text available
Risk Mitigation (RM) is one of the important activities in risk management of IT governance. In IT governance project, IT risk mitigation emphasizes taking action early in a project to prevent the occurrence of undesired events or to reduce the consequences of their occurrence. The essential of RM in IT governance enables enterprise achieving "the...