Mohd Zamri Murah

Mohd Zamri Murah
Universiti Kebangsaan Malaysia | ukm

Master of Science

About

34
Publications
38,972
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
114
Citations
Citations since 2016
11 Research Items
77 Citations
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
Additional affiliations
January 2001 - January 2015
Universiti Kebangsaan Malaysia
Position
  • Researcher
January 2000 - September 2015
Universiti Kebangsaan Malaysia
Position
  • Researcher

Publications

Publications (34)
Article
Full-text available
Phishing has become a serious and concerning problem within the past 10 years, with many reviews describing attack patterns and anticipating different method utilizations. This indicates that the results are still not comprehensive, subsequently leaving a critical gap in phishing reports. Therefore, this study aims to conduct a systematic review, t...
Conference Paper
Full-text available
Teknik cantasan adalah sangat berguna dalam bidang capaian maklumat dan dokumen. Ia juga dapat mengurangkan saiz kamus. Dalam bahasa Melayu, terdapat dua jenis skrip penulisan, iaitu sama ada menggunakan sistem ejaan Rumi atau sistem ejaan Jawi. Kebanyakan pencantas perkataan Melayu hanya merangkumi tulisan Rumi dan beberapa Jawi moden. Kertas kerj...
Article
Full-text available
Many governments organizations in Libya have started transferring traditional government services to e-government. These e-services will benefit a wide range of public. However, deployment of e-government bring many new security issues. Attackers would take advantages of vulnerabilities in these e-services and would conduct cyber attacks that would...
Article
Full-text available
Jawi and Roman scripts are represented Malay language. In the past, Jawi writings are widely used by the Malay community and foreigners; and it can be seen in the old documents. Old documents face the risk of background damage. In order to preserve this valuable information, there are significant needs to automated Jawi materials. Based on previous...
Article
Full-text available
Libya has started transferring traditional government services into e-government services. The e-government initiative involves the use of websites to offer various services such as civil registration, financial transaction and private information handling. Currently, there has not been many studies about the security assessment of the Libyan gover...
Conference Paper
Full-text available
Libya has started transferring traditional government services into e-government services. The e-government initiative involves the use of websites to offer various services such as civil registration, financial transaction and private information handling. Currently, there has not been many studies about the security assessment of the Libyan gover...
Article
This paper describes the design and creation of a monolingual parallel corpus for the Malay language written in Jawi. This paper proposes a new corpus called the National University of Malaysia Word Tokenization (NUWT) corpora To the best of our knowledge, currently, there is no sufficiently comprehensive, well-designed standard corpus that is anno...
Article
Tokenization is a fundamental task focused on text processing. Among other tasks, the segmentation process is used to identify information units, such as sentences and words. In this paper, we discuss the Natural Language ToolKit (NLTK) tokenizer as a step to manipulate patterns within text. The purpose of this work is to build up Natural Language...
Article
The Malay language has two types of writing script, known as Rumi and Jawi. Most previous stemmer results have reported on Malay Rumi characters and only a few have tested Jawi characters. In this article, a new Jawi stemmer has been proposed and tested for document retrieval. A total of 36 queries and datasets from the transliterated Jawi Quran we...
Conference Paper
Assigning lexical categories to words is an important step in the automated analysis of a text. Modern Natural Language Processing (NLP) algorithms are based on machine learning; learn rules automatically through the analysis of large corpora of typical real world examples. The Buckwalter transliteration has become a standard to be followed in natu...
Conference Paper
Full-text available
In this paper, similarity evaluation of English translations of the Holy Quran using four computational methods is performed. The computational methods are bag of words, term-frequency, tfidf and latent semantic indexing. We used twenty-one translation pairs from seven English translations (Hilali, Yusuf Ali, Sahih, Shakir, Arberry, Pickthall, Maud...
Conference Paper
Full-text available
Transliterasi mesin adalah proses menukar skrip daripada teks sumber kepada teks sasaran secara automatik. Ia banyak digunakan Dalam Capaian Maklumat Merentas Bahasa (CLIR), Terjemahan Mesin dan Pengekstrakan Maklumat. Isu utama dalam kajian transliterasi mesin adalah bagaimana untuk mendapatkan hasil transliterasi yang mempunyai ketepatan yang tin...
Article
Stemmers are important for Information Retrieval and essential for Natural Language Processing. Many researchers have focused on the effect of stemming on document retrieval and measured their stemmers with recall and precision. Applications in text mining (i.e., document indexing and clustering) require great accuracy in index terms. The aim of th...
Article
Full-text available
An idea management system is where ideas are stored and then can be evaluated and analyzed. It provides the structure and the platform for users to contribute ideas for innovation and creativity. Designing and developing an idea management system is a complex task because it involves many users and lot of ideas. Some of the critical features for an...
Conference Paper
Full-text available
Jawi script is a script that has the Arabic influence. In the past, these writings are widely used by the Malay community as well as foreigners who have diplomatic relations, business, missionary and such. At that time, the Malay language is the lingua franca of this region. So there are many Malay heritages such as manuscripts, religious books, le...
Article
Full-text available
Kajian ini bertujuan untuk membandingkan sistem ejaan Jawi lama dan baru yang terdapat pada kitab Hidayah al Salikin yang dicetak di Pulau Pinang oleh Maktabah wa Matba`ah Dar al-Ma`arif (sistem ejaan Jawi lama) dan edisi ejaan Jawi baru terbitan Jabal Maraqy Enterprise Kota Bharu, Kelantan oleh Abdul Ghani Jabal Maraqy. Kitab Hidayah al Salikin ad...
Chapter
Research in Malay Part-of-Speech (POS) has increased considerably in the past few years. From the literature, POS are known as the first stage in automated text analysis and the development of language technologies can scarcely begun without this initial phase. Malay language can be written in Roman or Jawi. Three different spelling between Roman a...
Conference Paper
Full-text available
The paper aims to do a comparative analysis between old and modern Jawi spelling used in the Kitab Hidayah al-Salikin by Shaykh 'Abd al-Samad al-Falimbani written in 1192AH. This Kitab is the first Malay Kitab printed in Mecca. The major elements of this Kitab are Sufism, ‘Aqidah and Fiqh. This study examines the comparison of the printed Kitab in...
Article
Full-text available
Cloud computing is a technology that allow the users to access software applications, hardware, storage, computing processes directly from the web. It offers two paradigms in computing; SaaS and PaaS. This paper reviewed the experience of using cloud computing in teaching a graduate level networking course. It had been used to share references, to...
Article
Full-text available
Technology entrepreneurship is one of the core courses for senior students at the Faculty of Information Science and Technology. Through this course, students are introduced into the concepts and the theories of technology entrepreneurship in current business environment. This paper describes the transformations that have been done on the teaching...
Conference Paper
Full-text available
Tulisan Jawi yang kita lihat pada hari ini adalah berbeza ejaannya berbanding ejaan Jawi pada suatu masa dahulu. Ejaan Jawi kini telah banyak melalui perubahan mengikut arus peredaran zaman. Jawi kini mengalami evolusi kerana berbanding zaman dahulu, ejaan Jawi kini perlu menyaingi ejaan Melayu moden (Rumi) dengan pelbagai istilah moden, terutamany...
Conference Paper
Full-text available
Transliterasi adalah satu proses menukar perkataan daripada satu jenis tulisan kepada jenis tulisan yang lain dengan mengekalkan sebutannya. Biasanya ia melibatkan sekurang-kurangnya dua bahasa iaitu bahasa sumber dan bahasa sasaran. Dalam konteks kajian ini, teks sumber adalah Jawi manakala teks sasaran adalah Rumi yang mana kedua-duanya dalam bah...
Conference Paper
Full-text available
The Malay language may be written using either Roman or Jawi characters. Most Malay stemmers cover only Roman (Rumi) affixes. This paper proposes a stemmer for Jawi characters using two sets of rules in Jawi: one set of rules is used to stem various forms of derived words, and another set is used to replace the use of a dictionary by producing the...
Article
Stemmer is important especially for information and document retrieval. It can also help to reduce the size of the dictionary. Normally Malay stemmers need to have a root word dictionary to increase the stemmer's accuracy. In Jawi stemmer, we use Jawi spelling error rule to detect whether the program produces the correct stemmed word after all poss...
Article
This paper presents the evaluation of speech recognition. The main objective of the design is to develop new algorithm for control the motion of the robot such as forward, reverse, left, right and stop. The proposed method is divided to speech recognition and analytical engine. This system has been tested in two situation i.e. silent and noisy cond...

Network

Cited By

Projects

Projects (6)
Project
Develop models for cybersecurity based on deep learning (DL).
Project
cybersecurity