
Masrah Azrifah Azmi MuradUniversiti Putra Malaysia | UPM · Department of Software Engineering and Information Systems
Masrah Azrifah Azmi Murad
PhD in Artificial Intelligence
About
181
Publications
67,245
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,468
Citations
Citations since 2017
Publications
Publications (181)
Feature extraction and selection are critical in sentiment analysis (SA) to extract and select only the appropriate features by removing those deemed redundant. As such, the successful implementation of this process leads to better classification accuracy. Inevitably, selecting high-quality minimal features can be challenging given the inherent com...
Computer-aided diagnosis system that uses classification process for an automated detection of breast cancer could provide a second opinion that improves diagnosis. Several researchers have proposed the use of associative classifier that generates strong associations between features and reveals hidden relationship that can be missed by other class...
The usability study of the Ministry of Education’s Training Management System (SPLKPM) is a preliminary study conducted by the researcher to determine the rationale and analysis of research needs regarding system usage behaviour among teachers. The purpose of this study is to assess the system's usability in the management of in-service teacher tra...
Limited approaches have been applied to Arabic sentiment analysis for a five-point classification problem. These approaches are based on single task learning with a handcrafted feature, which does not provide robust sentence representation. Recently, hierarchical attention networks have performed outstandingly well. However, when training such mode...
This study validates and extends the latest unified theory of acceptance and use of technology (UTAUT2) with the privacy calculus model. To evaluate the adoption of healthcare and e-government applications, researchers have recommended—in previous literature—the application of technology adoption models with privacy, trust, and security-related con...
The healthcare industry has undergone a rapid change as the internet shows latent abilities to assist in information seeking and decision making regarding self-care and health-related issues. Therefore, it is essential to discern issues concerning the quality of the information and the system. Thus, this paper aims to explore the current issues in...
A multi-level mathematical model was used to estimate the stressed-strained state of a cylindrical reservoir with a defect in the wall shape in the form of a dent; the concentration of stresses in the defect zone was studied.
The proper choice of the mathematical model was verified; it has been shown that the engineering assessment of the stressed...
Over the last few decades, information and communication technologies (ICT) have changed our lives to enhance the process of teaching and learning. E-learning is powerful and influential in the classroom or elsewhere, as long as there is computer and internet access. The vast majority of institutions utilized a Learning Management System (LMS) to a...
Social media platforms hold a vast volume of raw data that has been posted by people in the forms of texts, images, audio and video. People use this medium to express their thoughts and opinions. As a result, the data can be captured, categorized, and analyzed using Sentiment Analysis approaches to identify users' behaviour, customer's feedback or...
Software flexibility is a crucial factor in designing and developing software as it reflects its capability to adapt to changes. It is a topic that has been discussed for a very long time which indicates its importance in software development. However, it is not easy to produce a flexible software design. Design principles provide fundamental conce...
BACKGROUND
Advance technological breakthroughs have dramatically contributed to the nature of the healthcare environment paired with current concerns arise over patients’ health information seeking and how to seek them effectively; the e-health systems are gaining the attention of more and more people.
OBJECTIVE
The primary objective of this study...
The use of graphical knowledge representation formalisms with a representational vocabulary agreement of terms of conceptualization of the universe of discourse is a new high potential approach in the ontology engineering and knowledge management context. Initially, concept maps were used in the fields of education and learning. After that, it beca...
An Enterprise resource planning (ERP) system is designed to improve operational efficiency by integrating business processes and providing better access to integrated data across the entire organization (Badewi et al., 2018).However, ERP systems are complex, risky to implement, and time consuming (Al-Sabri et al., 2018). Theaim of this paper isto i...
This article intends to inform people on understanding the process of learning via Talaqqi approach and how Talaqqi framework plays a role in ensuring learning transpired. Certainly, our thinking and approach to effective learning have been influenced by the concept of Talaqqi presented in this article. We listed five pillars in constructing effect...
The complexities and tangles of Arabic dialect in orthography and morphology typically make the sentimental analysis quite challenging. Moreover, most of the classification approaches have addressed this problem based on the hand-crafted features. Since Arabic language has multi-dialects and the language has no word-based order, the extraction proc...
In this era of technology, delivering quality software has become a crucial requirement for the developers. Quality software is able to help an organization to success and gain a competitive edge in the market. There are numerous quality attributes introduced by various quality models. Various researches and studies prove that the quality of the ob...
Provision of sufficient knowledge to users is the ultimate goal of a knowledge management system (KMS). Unfortunately, existing KMS’s relyon human effort foraccess to desired knowledge. Semantic technologies have become a force for paradigm shift in KMS research. They aim to enable the delivery of the right knowledge to the right person and in the...
Spam detection techniques has been a major techniques to detect spam activities on social networks. Due to the rapid growth of spam menace on social networks , the problems of increasing spam mail on social media on the internet are becoming serious issues and difficult to detect.. Furthermore, several email social networks classification methods h...
Spam detection techniques has been a major techniques to detect spam activities on social networks. Due to the rapid growth of spam menace on social networks , the problems of increasing spam mail on social media on the internet are becoming serious issues and difficult to detect.. Furthermore, several email social networks classification methods h...
Computer-aided diagnosis (CADx) can help radiologists in the interpretation of mammograms to assist them in diagnostic decision-making. Such a system is capable to automatically classify and suggest the pathological terms for a new mammography image. A few traditional classification methods have shown poor performance for nonlinear separable data....
The analyse and propose the factors that affect the current levels of collaboration which exist among physicians in sharing healthcare information in the selected hospitals in developing countries using HISs , A quantitative method of enquiry was used for this study in the two public hospitals in Selangor state in Malaysia, by using questionnaire i...
The problem with Social networks has been a major issues globally. In recent years, Spam Detection on social networks has been focused. However, Spammer has seen that social networks are vulnerable to attack in order to perpetrate their evil. Influx of spam has been a great threat to individual, organization, government, institution if left uncheck...
There is a need for further research in the area of ontology evaluation specifically dealing with ontology development exploiting concept maps. The existing literature on ontology evaluation primarily emphasis on ontology formalisation as well as on performing logical inferences, which is usually not directly relevant for concept maps as they are c...
The most important task in aspect-based sentiment analysis (ABSA) is the aspect and sentiment word extraction. It is a challenge to identify and extract each aspect and it specific associated sentiment word correctly in the review sentence that consists of multiple aspects with various polarities expressed for multiple sentiments. By exploiting the...
With the help of technology, people nowadays can easily express their opinions on services or products that they received.
Sentiment analysis is an evolving field of study that deals directly with the online expressions posted by user via the internet.
The main objective of sentiment analysis is to automate the process of mining opinions into valua...
Twitter sentiment analysis according to five points scales has attracted research interest due to its potential use in commercial and public social media application. A multi-point scale classification is a popular way used by many companies to evaluate the sentiment of product reviews (e.g. Alibaba, Amazon and eBay). Most of the classification app...
The massive increaseof spam is posing a very dangerous and serious threat to our email and social networks. It is pertinent and imperative to step up the spam detection approach and strategies in email and social networks. In recent years online spam has become a major problem for the sustainability of the internet globally, Excessive amounts of sp...
This paper discuss the infrastructure requirement of the model named Experienced Based Facto-ry Model for
Software Development Process (EBF-SD) in order to ensure the implementation of the model will be able support
collaborative environment effectively and efficiently.
Computer-aided diagnosis has gained a significant attention in helping radiologists to improve the accuracy of mammographic detection and diagnostic decision. The aim of proposed research work is to build an efficient and accurate classifier for the classification of mammogram images using a hybrid method by incorporating Genetic Association Rule M...
Analyzing students’ feedback and their expressed emotions toward any subjects could help lecturers to understand their students’ learning behaviour. Several platforms are used by students to express their feelings such as through social networking sites, blogs, discussion forums and the university survey systems. However, the feedbacks typically co...
Semantic web is an addition of the previous one that represents information more significantly for humans and computers. It enables the description of contents and services in machine readable form. It also enables annotating, discovering, publishing, advertising and composing services to be programmed. Semantic web was developed based on Ontology...
Spam has been a major and global threat, Social networks have become our daily live and everyday tools, while different social networks have different target groups. With the rapid growth of social networks, people tend to misuse them for unethical and illegal conducts, fraud and phishing. Creation of a fake profile becomes such adversary effect wh...
With the ever increasing of internet applications and social networking sites, people nowadays can easily express their feelings towards any products and services. These online reviews act as an important source for further analysis and improved decision making. These reviews are mostly unstructured by nature and thus, need processing like sentimen...
During the mammographic acquisition, the breast is compressed with a tilting compression paddle; hence the breast thickness is non-uniform across the mammogram and thinner in the peripheral area and therefore over exposing this area. In Computer Aided Detection systems, peripheral enhancements were used as a pre-processing stage for the enhancement...
Social network has become a very popular way for internet users to communicate and interact online. The socia; networks provide a platform to maintain a contact with friends. Increasing social network’s popularity allows all of them to collect large amounts of personal details about their users. Globally, the issue of identifying spammers have rece...
A number of ontology engineering methodologies have been proposed to date. Distinct methodologies rely on different techniques and activities for developing ontologies. The concept mapping technique has been recently used for developing ontologies related to different domains. However, the existing approaches using concept mapping do not make use o...
A number of ontology engineering methodologies have been proposed to date. Distinct methodologies rely on different techniques and activities for developing ontologies. The concept mapping technique has been recently used for developing ontologies related to different domains. However, the existing approaches using concept mapping do not make use o...
Software development is a highly intensive knowledge process. Information, data, knowledge and experiences are accumulated daily and it is crucial that they are managed appropriately for the purpose of sharing and future reuse. Today, software development has spread across geographical boundaries; therefore, the need for knowledge retention has ris...
Higher Education Institutions (HEIs) have become key institutions in the knowledge-based economy. Over the past decade, the Malaysian government has placed greater emphasis on improved efficiency and productivity in the HEI as an engine for promoting quality human capital for a knowledge-based economy. Importantly, the government raised the share o...
Nowadays most of the public sector organisations are implementing a knowledge management system (KMS) to assist the systematic creation and sharing of their knowledge resources. The recent technological needs, collaboration and cooperation among public sector organisations (PSO) serve a vital role in the development of knowledge management systems...
Nowadays most of the public sector organisations are implementing a knowledge management system (KMS) to assist the systematic creation and sharing of their knowledge resources. The recent technological needs, collaboration and cooperation among public sector organisations (PSO) serve a vital role in the development of knowledge management systems...
Key phrase Visualizer System has become an important research area as more and more teaching materials are being uploaded to the net. Key phrase Visualizer System is the discovery of new, previously unknown pattern of knowledge based on automatic extraction of keywords and key phrases from presentation slides. However, because of this relatively ne...
This paper presents the mechanics of a presentation mining system that mines keywords and key phrases from a collection of PowerPoint slides and generates a mind map using the extracted words and phrases. The core of presentation mining lies in two stages; ranking the potential phrases and extracting the keywords and key phrases. The keywords and k...
Sentiment classification of financial news deals with the identification of positive and negative news so that they can be applied in decision support systems for stock trend predictions. This paper explores several types of feature spaces as different data spaces for sentiment classification of the news article. Experiments are conducted using N-g...
Ambiguity is a potential problem in any semantic question answering (SQA) system due to the nature of idiosyncrasy in composing natural language (NL) question and semantic resources. Thus, disambiguation of SQA systems is a field of ongoing research. Ambiguity occurs in SQA because a word or a sentence can have more than one meaning or multiple wor...
Slide presentations such as the PowerPoint presents knowledge by the subject matter expert in a linear sequence. Nonetheless, post-presentation, the knowledge is actually reconstructed differently by the learners depending on their personal understanding over the entire presentation. To enhance learning, this paper presents a presentation mining to...
In our daily engagement with technology we interact with software in many aspects, rendering software engineering field a very robust area with a lot of dynamism. In this paper we have comprehensively surveyed on software engineering approaches for designing knowledge based systems. First we looked at knowledge based systems in detail, then at soft...
The purpose of this paper is to empirically test the effect of information systems criterion on the European Foundation for Quality Management (EFQM) excellence model in Higher Education Institutions (HEIs). The paper identifies five (5) causal hypotheses from literatures that are related to the information systems criterion. The data were collecte...
Semantic question answering (SQA) demands different processing compared to the common information retrieval method because the semantic knowledge base is stored in the triples form. However, manipulating the knowledge requires understanding of its structure and proficiency in semantic query language such as SPARQL. Natural language interface (NLI)...
Purpose
– The purpose of this paper is to propose an approach that integrates three complementary perspectives, multi-agent systems, fuzzy logic and case-based reasoning. Unsatisfied customers, information overload and high uncertainty are the main challenges that are faced by today’s supply chains. In addition, a few existing agent-based approache...
Mammography is an important examination in the early detection of breast abnormalities. Automatic classifications of mammogram images into normal, benign or malignant would help the radiologists in diagnosis of breast cancer cases. This study investigates the effectiveness of using rule-based classifiers with multivariate filter and genetic miner t...
Knowledge and experience are important assets for software organizations. In today’s global software development trends, development teams are no longer located in single premise; they are spreading across national and geographic boundaries. As a software project progresses, more and more activities are involved which results with the accumulation...
The effectiveness of opinion mining relies on the availability of credible opinion for sentiment analysis.
Often, there is a need to filter out deceptive opinion from the spammer, therefore several studies are done to detect spam reviews. It is also problematic to test the validity of spam detection techniques due to lack of available annotated dat...
Non-taxonomic relation is one of the most important components in ontology to describe a domain. Currently, most studies focused on extracting non-taxonomic relationships from text within the scope of single sentence. The predicate between two concepts (i.e. subject and object) that appear in a same sentence is extracted as potential relation. Ther...
Risk assessment (RA) is one of the main activities in risk management of IT governance. Basically, IT governance is a process or a procedure that involves evaluating and directing the plans for the use of ICT to support the organization and monitoring the achievement of these plans. The risks that may emerge during the implementation of IT governan...
Risk Mitigation (RM) is one of the important activities in risk management of IT governance. In IT governance project, IT risk mitigation emphasizes taking action early in a project to prevent the occurrence of undesired events or to reduce the consequences of their occurrence. The essential of RM in IT governance enables enterprise achieving "the...