Massudi Mahmuddin

Massudi Mahmuddin
Universiti Utara Malaysia | UUM · School of Computing

Doctor of Philosophy

About

115
Publications
34,089
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
625
Citations
Citations since 2016
62 Research Items
532 Citations
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
Introduction
Massudi Mahmuddin currently works at the School of Computing, Universiti Utara Malaysia. His work currently focus in computer networking, Computer Security, computational intelligent and Reliability and Algorithms. Their current project is 'A HYBRID ACTIVE CONTOUR AND BEE COLONY ALGORITHM FOR SEGMENTING MIXED-MEAL FOOD IMAGES'.
Additional affiliations
July 2020 - July 2021
Universiti Utara Malaysia
Position
  • Professor (Associate)
June 2000 - present
Universiti Utara Malaysia
Position
  • Professor (Associate)
June 2000 - January 2019
Universiti Utara Malaysia
Position
  • Professor (Assistant)
Education
April 2004 - October 2009
Cardiff University
Field of study
  • System Engineering

Publications

Publications (115)
Article
Students with good health contribute to overall academic performance especially in higher education. In the university campus, university health center provides medical and comprehensive health care services. These services including medical and dental treatment, counseling, first aid, and medication. This research explored the perception of underg...
Article
Library in the university is known as the centre of knowledge. University library offers learning support, research requirement and also teaching materials. The objective of this study is to identify the most (and least) factors that contribute to students satisfaction towards university library. A case study on selected respondents consist of 266...
Article
The reliability of public transport services (e.g., bus) is a critical factor to be considered among public transport users. This factor is important for the consequences that come with unreliability will significantly increase unnecessary anxiety and discomfort. Such consequences include additional waiting time, late arrival at destinations, and m...
Article
Full-text available
Sentiment could be expressed implicitly or explicitly in the text. Hence, it is the main challenge for current sentiment analysis (SA) approaches to identify hidden sentiments, other common challenges include false classification of opinion words, ignoring context information, and bad handling of a short text that arise from the bad interpretation...
Article
Full-text available
In this study, we investigate commonly used pre-processing techniques for sentiment analysis using bag-of-concepts text representation. We examine six approaches to study their effect on the consecutive sentiment analysis phases and recommend the appropriate pre-processing techniques for best sentiment analysis accuracy. Lexicon-based and neural ne...
Article
Full-text available
In reality, students learn via eLearning (electronic online learning) system in different ways depending on their learning needs, learning behaviours as well as eLearning system policy for users. However, most learning outcome prediction models of eLearning systems are still not stable and still cannot be applied in many situations as the use of eL...
Article
With the rapid advancements in technology, the adoption of information technology has increased across the financial sector. The banking industry is no exception to this trend. The adoption of information technology in banking practices has resulted in the adoption of mobile service and a major service that has stemmed from this development is m-ba...
Article
Full-text available
With the rapid advancements in technology, the adoption of information technology has increased across the financial sector. The banking industry is no exception to this trend. The adoption of information technology in banking practices has resulted in the adoption of mobile service and a major service that has stemmed from this development is m-ba...
Article
The increased utilization of Mobile Cloud Computing (MCC) technology creates an opportunity for cybercrimes. Modeling the suitable methods for mobile cloud forensic examination and analysis is essential to improve the investigation performance. This paper incorporates data mining and optimization methods to enforce precise handling of the mobile cl...
Article
Full-text available
Investigating the mobile cloud environment is a challenging task due to the characteristics of voluminous data, dispersion of data, virtualization, and diverse data. Recent research works focus on applying the latest forensic methodologies to the mobile cloud investigation. This paper proposes an enhanced forensic examination and analysis model for...
Chapter
The increased number of computers, enlarged network bandwidth, more powerful computers, consumed resources and the acceptance of the Internet has driven the ongoing demand for new and better ways to execute huge problems in shared computing infrastructure such as grid and P2P computing. Resource discovery is extremely significant and challenging is...
Article
Full-text available
Selection and allocation of space for intercropping in rubber plantations to maximize yield and minimum costs for individual farmers involves Multi-Criteria Decision Making (MCDM) and several conditions. The problem is that the information is scattered in many related agencies, there are separate stores and some data is redundant. In addition, the...
Article
Full-text available
Government become part of social life, open government data is the best way provide a better understanding of user’ intention to use open government data this study proposed a framework that can enhance the intention of open government data users. This study used Expectation Confirmation Theory (ECT) and suggested that expectation, confirmation, pe...
Book
Full-text available
Children of street vending mothers are exposed to hazardous risks from the vending environment, for example, air pollution, noise pollution, and lack of sanitary resources. However, street vending provides an opportunity for mothers to support the basic needs of their children. Lack of adequate resources and alternative care for children force some...
Conference Paper
Wireless Sensor Networks (WSN) consists of small sensor devices, which are connecting wirelessly each other to sensing and delivering specific data to the Base Station (BS). Routing Protocols in WSNs became an active area for both researchers and industrials, due to its responsibility for data delivering, extending network lifetime, reducing the de...
Article
Full-text available
Ad hoc network is divided into subcategories in which wireless sensor network (WSN) is one of them, which include several small devices known as sensor nodes (SNs) connected to base stations (BSs). The network lifetime is one of the most vital features as a trustworthy transmission. The low energy adaptive clustering hierarchy (LEACH) is one of the...
Article
Full-text available
Wireless sensor network (WSN) has countless potential application in many areas due to its easy deployment process, lower installation cost, less cabling required, and high mobility. However, limited energy residue (especially deposited in small size battery) is always a major obstacle in WSN. Improving mechanism on MAC layer is one of the potentia...
Article
Full-text available
Low Energy Adaptive Clustering Hierarchy (LEACH) is a procedure, which is the most appropriate for the WSN routing. LEACH depends upon an adapted clustering procedure. The LEACH manipulates clusters and a single tier structure on the basis of a two-stage manoeuvre. LEACH functions in a single hop in such a way that every cluster head (CH) in WSNs m...
Article
Full-text available
The implementation Wireless Sensor Network (WSN) in generally can be applied in any environment where the important MAC layer plays vital. Researchers discover that the major power consumption of wireless sensor network nodes are related to their radio transceiver’s activities on MAC. This paper explains the implementation expected systeme that can...
Article
Full-text available
Steganography is one area in information security that is able to conceal the secret message in any media to avoid the intruders. In this paper, the review of steganography is done in certain media such as image, text, audio, and video. It analyses some of the techniques that applied steganography to discover the development of the techniques to co...
Article
Aims: The rapid growth in Internet access among Malaysian showed more ventures towards e-commerce activity that contributes to significant value in national growth domestic product. As technology-driven industry is normally associated with younger generations that are more technology savvy, their purchasing behavior through online shopping platform...
Article
Superior prediction and classification in determining company's performance are major concern for practitioners and academic research in providing useful or important information to the shareholders and potential investors for investment decision. Generally, the normal practice to analysed firm's performance are based on financial indicators report...
Data
The images is collected by capturing the Arab food items ( breakfast meal ). Typical smartphone camera was used, and the camera has an 8-megapixel. No special arrangement for lighting is required more than the normal lighting in any indoor.The food is arranged on a round plate. The background includes a reference object. This study chooses breakfas...
Article
Full-text available
Sentiment analysis is the process of identifying the subjective opinion within a text. And it gains a huge interest due to its several benefits in developing economy, politic, and sociology. And since twitter is considered a rich source of people's thoughts and opinions, it is urged to benefit from it to explore public opinions. Many researches hav...
Article
Full-text available
Government worldwide engaged in open government data initiative to public the data and related information for the benefit of users. But the success of the open government data depends on the willingness of users the way they utilize the available information. In this regard, the government needs to understand those factors that can impact on the i...
Article
Full-text available
The quantity of data generated from Twitter and other social networks is enormous and expanding rapidly because of the growing number of users online who share their opinions and thoughts on these platforms. Extracting useful information from these data would be helpful for decision making related to services, products or people. One type of extrac...
Article
Full-text available
This paper explains about a comparison between assistive video for hearing-impaired learners (AV4HI) and assistive courseware for hearing-impaired learners (AC4HI). The rationale is that previous statement was made after learners experience normal courseware, not the courseware specifically designed for them. Hence, perhaps if the courseware is des...
Article
Technology has widely absorbed into daily life. In fact, various technologies have been carried out in supporting teaching and learning. In conjunction to that, this paper explains about a comparison between two technologies for hearing-impaired learners in their learning purpose. The technologies are assistive video for hearing-impaired learners (...
Article
Full-text available
Wireless Sensor Network (WSN) is a large number of small sensor devices that can connect each other wirelessly. WSNs applications are rapidly growing in last decades, furthermore, in WSN research, energy is one of the important issues that must consider when designing a new protocol. Due to the fact, almost all of nodes' energy deplete in the commu...
Article
Full-text available
In Wireless Sensor Network, sensor nodes are randomly deployed where the sensor nodes are not situated faraway from each other. Thus, an overlapping area is generated due to intersection of their sensing ranges. If an event occurs within the overlapping area, all the sharing nodes sense the same event and produce redundant and correlated data. Data...
Article
Full-text available
English has become one of the important languages in the era of globalization. In order to compete well in the world demand, Malaysia has put lot of efforts to make sure that young Malaysian are prepared with the English language as medium of communication. As such, an investigation on the factors that affect the level of English proficiency among...
Article
Image segmentation technique was widely used in pattern recognition to estimate calories. However, the process of segmentation multi-food images is more difficult. In this paper, segmentation of color food images for segmenting food images is proposed. The segmentation technique segments food image into two regions: foreground and background. In ad...
Article
Full-text available
The Bees Algorithm (BA) has been applied for finding the best possible subset features of a dataset. However, the main issue of the BA for feature selection is that it requires long computational time. This is due to the nature of BA combination search approach that exploits neighborhoods with random explorative. This situation creates unwanted sub...
Article
Full-text available
The problem of multi-criteria or multi-objective intercropping crop planning makes it vital to consider all related factors under the constraints that will produce the highest revenue and minimum cost. Principles of intercropping elements including soil type, plant area, plant diseases, planting and harvesting time and economics factors (e.g. price...
Article
Full-text available
The application of Bees Algorithm in wrapper feature selection (BAFS) has been implemented but yet too far from perfect and has few weaknesses. The algorithm performs combination of exploitative neighbourhoods and random explorative search. This creates a heavy computational time, and in the same time could affect the overall accuracy subset select...
Article
Internet-based distributed systems allow resources, which are distributed extensively in the network to be utilized cooperatively and shared to enable the end-user to get a massive computational power to tackle a huge task. Hence, the crucial role of resource discovery comes. Even though several mechanisms have been proposed to detect the multi-att...
Article
We present a mechanism, Self Resource Discovery Mechanism (SRDM) with the aim of offers scalable, decentralized resource discovery and load balancing for sharing computing via huge pools of various nodes. Primarily, SRDM hides the resources values for each node in the system in the configuration of the links linking the nodes. This distributed hidi...
Article
Full-text available
Packet-based or Deep Packet Inspection (DPI) intrusion detection systems (IDSs) face challenges when coping with high volume of traffic. Processing every payload on the wire degrades the performance of intrusion detection. This paper aims to develop a model for reducing the amount of data to be processed by intrusion detection using flow-based appr...
Article
Orientation map is an image representation method representing edges of objects in an image as a set of short line segments instead of pixels representation. The orientation map approach not only aims to extract the key orientation information which constitutes the semantic framework of the visual scene, but also to remove the insignificant element...
Article
Full-text available
Image based food identification is an emerging research topic for much industrial application. It refers to the capability of identifying various food items based on the visual information. Unfortunately, food items classification is highly sensitive to the accuracy of the image segmentation which is not always satisfying due to many factors. In th...
Article
Full-text available
Open data can be traced to various initiatives like freedom of information, transparency and participation, data exchange, reuse of public sector information, open access, open source and open government. This study suggests a different approach in assessing the variables of citizens satisfaction in open government data in malaysia. Based on a thor...
Conference Paper
Full-text available
Image segmentation of food items is the most important stage in developing automated calorie estimation system. This stage refers to a process that classifies images into distinct regions with the aim to extract only the food image from the background. Currently, there are several segmentation methods which have been used in object identification....
Conference Paper
Full-text available
This papers presents classification steganography method on text domain based on the perspective of researchers effort in last decade. Tharefore, It has been analyzed the categories of method steganography in medium of text; text steganography and linguistic steganography. The main objective on this paper is identifying the representative those two...
Article
Full-text available
Background Wireless sensor networks (WSNs) are a promising area for both researchers and industry because of their various applications The sensor node expends the majority of its energy on communication with other nodes. Therefore, the routing protocol plays an important role in delivering network data while minimizing energy consumption as much a...
Conference Paper
Agriculture is one of the most significant domains in need of knowledge sharing and Decision Support Systems (DSS) that can help farmers make decisions to solve complex problems. Monoculture agriculture has many problems such as plant disease dramatically decreasing product price. Intercropping is an alternative way to reduce a risk of market price...
Conference Paper
Full-text available
Wireless body sensor networks (WBSN) provide an appreciable aid to patients who require continuous care and monitoring. One key application of WBSN is mobile health (mHealth) for continuous patient monitoring, acquiring vital signs e.g. EEG, ECG, etc. Such monitoring devices are doomed to be portable, i.e., batter powered, and agile to allow for pa...
Article
Full-text available
Background and Objective: Inspecting all packets to detect intrusions faces challenges when coping with a high volume of traffic.Packet-based detection processes every payload on the wire, which degrades the performance of intrusion-detection systems. This issuerequires the introduction of a flow-based IDS approach that reduces the amount of data t...
Conference Paper
This paper explains about a comparison between assistive video for hearing-impaired learners (AV4HI) and assistive courseware for hearing-impaired learners (AC4HI). The rationale is that previous statement was made after learners experience normal courseware, not the courseware specifically designed for them. Hence, perhaps if the courseware is des...
Conference Paper
Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmissio...
Conference Paper
Knowledge and skill are necessary to develop the capability of knowledge workers. However, there is very little understanding of what the necessary knowledge work (KW) is, and how they influence the quality of knowledge work or knowledge work productivity (KWP) in software development process, including that in small and medium-sized (SME) enterpri...
Conference Paper
Full-text available
This papers presents several steganography method on text domain based on the perspective of researchers effort in last decade. It has been analyzed the categories of method steganography in medium of text; text steganography and linguistic steganography. The following aim on this paper is identifying the typical these two methods in order to recog...
Article
Full-text available
Global computational grids nowadays are suffered from ossification problems due to the following fundamental challenges related to different existing solutions in grid computing: scalability, adaptability, security, reliability, availability and manageability. The management difficulty is due to heterogeneity, dynamicity and locality of the resourc...
Article
Mobile phones nowadays become ubiquitous device and not only a device to facilitate communication, with some addition feature of hardware and software. There are many activities can be captured using mobile phone with many of features. However, not all of these features could benefit to the in processing and analyzer. The large number of features,...
Article
Pair programming (PP) software development technique is recommended for improving programming skills using concept of knowledge sharing. This paper aims to elaborate knowledge sharing concepts based on review of several previous studies. The relationship of knowledge sharing concepts in PP also has been discussed in details. With the elaboration, k...
Article
Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmissio...
Conference Paper
Full-text available
Using technology for food objects recognition and estimation of its calories is very useful to spread food culture and awareness among people in the age of obesity due to the bad habits of food consumption and wide range of inappropriate food products. Image based sensing of such system is very promising with the large expanding of camera embedded...
Thesis
Full-text available
Bees Algorithm (BA), a heuristic optimization procedure, represents one of the fundamental search techniques is based on the food foraging activities of bees. This algorithm performs a kind of exploitative neighbourhoods search combined with random explorative search. However, the main issue of BA is that it requires long computational time as well...
Article
Full-text available
Managing knowledge work in the workplace is inherently important and accessible to the organizations for the long terms growth and performance. Software developer is a key successor for the organization success and knowledge work is viewed as the highest complexity of work characteristics. The intentions of software developers to improve the knowle...
Article
Full-text available
Brain status information is captured by physiological electroencephalogram (EEG) signals, which are extensively used to study different brain activities. This study investigates the use of a new ensemble classifier to detect an epileptic seizure from compressed and noisy EEG signals. This noise-aware signal combination (NSC) ensemble classifier com...
Article
Full-text available
In the last few years, wireless sensor networks (WSN) have become an active area for researchers due to its broad and growing application. However, routing is a critical issue that needs consideration as it directly impacts the performance of WSN. Several protocols have been proposed to address this issue as well as reducing energy consumption and...
Article
This paper reports on an initiative that develops a concept of teaching and learning material for hearing-impaired learners in higher learning institutions. It describes the needs for the concept. The aim of the paper is to describe about the concept that is developed through User-centered Design approach. It involves observation and interview in t...
Article
The last decade, there has been a growing interest in the knowledge management literature relating to the factors that influence a company's ability to increase productivity. There is a general consensus that knowledge and skills are necessary to develop the capabilities of knowledge workers. However, there is a very little understanding regarding...
Article
IT governance in organizations has strategic roles and makes effective, consistent, and transparent decisions regarding strategies and IT investment. In Indonesia, IT governance has been a necessity, because organizations have been investing a big amount of money for IT. However, many IT projects failed and have not achieved their goals. To determi...
Chapter
With the introduction of computer networks and distributed computing, the utility of computing resources has been increased compared to individual isolated resources. Distributed systems enable multiple users to share the same resource, making the effectiveness of the resources high while reducing the per user cost of the resources. From time to ti...
Conference Paper
Full-text available
This paper will appear on the IEEE Xplore on 2015 PP: 633-639 Abstract - Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems. Classification is the most important technique for wide-ranging applications to categorize the items according to its f...
Conference Paper
Full-text available
Current lifestyles promote the development and advancement in wireless technologies, especially in Wireless Sensor Networks (WSN) due to its several benefits. WSN offers a low cost, low data rate, flexible routing, longer lifetime, and low-energy consumption suitable for unmanned and long term monitoring. Among huge WSN applications, some key appli...
Conference Paper
Full-text available
Current lifestyles promote the development and advancement in wireless technologies, especially in Wireless Sensor Networks (WSN) due to its several benefits. WSN offers a low cost, low data rate, flexible routing, longer lifetime, and low-energy consumption suitable for unmanned and long term monitoring. Among huge WSN applications, some key appli...
Article
Full-text available
This paper discusses the framework of IT (Information Technology) governance in the public sector organizations and the factors that contribute to the implementation of IT governance in the province of Gorontalo, Indonesia. The problem that occurs is the absence of such a framework which can provide the basis, functions and limits for the efficient...
Conference Paper
Full-text available
Content-based image retrieval is an active research area in image processing and computer vision. Color represents an important feature in CBIR applications, thus many color descriptors were proposed. Sequential search is one of the common drawbacks of most color descriptors especially in large databases. In this paper, dominant colors of an image...
Article
Current study on e-Learning user's behaviour model obtained the specific models. In many cases, the e-Learning user's behaviour model for open source e-Learning system such as Moodle, which can predict learning outcome or learning performance is still deficient and cannot generally apply in many institutions due to the fact that the majority of pre...
Article
This study describes a statistical analysis on employability among university graduate. The objective of this study is to explore the factors influencing graduate employ ability in Malaysia. A literature review of studies suggested that factors influencing student performance can be sorted into three factors: soft skills, co-curriculum and academic...
Article
Although there are many works have been done in Artificial Bee Colony (ABC) algorithm, yet, there still an issue for faster convergence for this algorithm. This paper will present a modified ABC algorithm to find optimum value for optimisation function. This hybrid ABC algorithm will adapt the modification especially in searching mechanism and prob...