Nazri Mohd Nawi

Nazri Mohd Nawi
Universiti Tun Hussein Onn Malaysia | uthm · Faculty of Computer Science and Information Technology (FSKTM)

PhD In Data Mining Techniques
Looking for collaborators in data mining research particularly deep learning improvements.

About

182
Publications
97,268
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,749
Citations
Citations since 2016
86 Research Items
1288 Citations
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
Introduction
Currently, my research area is in Artificial Neural Networks (ANN). Most of my papers focus on improving ANN particularly back propagation algorithm. Since 1986 a lot research been done on ANN and it still going on and I think that research on ANN is getting saturated eventhough it is consider as quite stabil but yet it is old so I'm thinking to apply, hybrid ANN with other methods and apply it into diverse applications. Hope that I can connect with researchers that have those plans.
Additional affiliations
June 2006 - October 2006
University of Wales
Position
  • Research Assistant
Description
  • helping my supervisor preparing his notes, running some simulations results and producing some papers.
June 2001 - February 2016
Universiti Tun Hussein Onn Malaysia
Position
  • Professor (Associate)
Description
  • Quite new to research and still looking for improvements and collaboration with other researchers in data mining domain.
January 2001 - January 2016
Universiti Tun Hussein Onn Malaysia
Position
  • Professor (Associate)
Education
November 2007
Swansea University
Field of study
  • Computer Science (Data Mining)

Publications

Publications (182)
Article
Full-text available
Nowadays, computer scientists have shown the interest in the study of social insect's behaviour in neural networks area for solving different combinatorial and statistical problems. Chief among these is the Artificial Bee Colony (ABC) algorithm. This paper investigates the use of ABC algorithm that simulates the intelligent foraging behaviour of a...
Poster
Full-text available
The Fifth International Conference on Soft Computing and Data Mining (SCDM 2022) is dedicated to address the challenges in the areas of Soft Computing and Data Mining, thereby presenting a consolidated view to the interested researchers in the fields. The goal of this conference is to bring together researchers and practitioners from academia and i...
Chapter
Ordinary linear regression models have been widely implemented to measure the causal relationship between exogenous factors and purchase decision. While inconsistent samples are not yet investigated by previous studies through these models. In this paper, we are interested to discuss a purchase decision model by ordinary regression using data reduc...
Chapter
Clustering is a standard paradigm for associating some similar objects to a cluster while associating others to their respective clusters in an unsupervised manner. Different techniques are proposed in the domain of clustering depending upon the underlying methodology slightly vary from one another. Some of these are regarded as Hierarchical Cluste...
Chapter
The nature inspired algorithms have motivated the practitioners to solve complex real-world problems. These algorithms are more capable to approach the optimal solution faster than conventional methods. The proposed algorithm uses the exploration capability of the Improved Flower Pollination algorithm with dynamic switch probability and swap operat...
Chapter
Clustering is an effective technique for identifying patterns and structures in labeled and unlabeled datasets in the medical sector. Density-based clustering is a sophisticated machine learning technique for identifying distinctive patterns in large datasets. However, this approach has certain drawbacks like inability to determine local densities...
Article
Full-text available
Cloud computing is new technology that has considerably changed human life at different aspect over the last decade. Especially after the COVID-19 pandemic, almost all life activity shifted into cloud base. Cloud computing is a utility where different hardware and software resources are accessed on pay per user ground base. Most of these resources...
Article
Full-text available
Due to recent advances in computer technology and the accessibility of large datasets, deep learning has become at the forefront of artificial intelligence and on various tasks, especially those related to image classification and modelling, its performance is often equal to or even better than human appreciation. Ophthalmology has always been in a...
Chapter
Evolutionary techniques such as Genetic algorithms (GA) are used to perform approximation for real-world problems and provide optimized solutions. Most of the time, these techniques provide desirable solutions and. The GAs depend on various operations such as selection criteria, crossover, and mutation operators. The GA is a useful technique for ch...
Article
Full-text available
Abstract: Recently, many researchers have used nature inspired metaheuristicalgorithms due to their ability to perform optimally on complex problems. Tosolve problems in a simple way, in the recent era bat algorithm has becomefamous due to its high tendency towards convergence to the global optimummost of the time. But, still the standard bat with...
Article
Full-text available
Meta-heuristic algorithms have emerged as a powerful optimization tool for handling non-smooth complex optimization problems and also to address engineering and medical issues. However, the traditional methods face difficulty in tackling the multimodal non-linear optimization problems within the vast search space. In this paper, the Flower Pollinat...
Article
Full-text available
Team formation (TF) in social networks exploits graphs (i.e., vertices = experts and edges = skills) to represent a possible collaboration between the experts. These networks lead us towards building cost-effective research teams irrespective of the geolocation of the experts and the size of the dataset. Previously, large datasets were not closely...
Article
Full-text available
Contractive auto encoder (CAE) is on of the most robust variant of standard Auto Encoder (AE). The major drawback associated with the conventional CAE is its higher reconstruction error during encoding and decoding process of input features to the network. This drawback in the operational procedure of CAE leads to its incapability of going into fin...
Article
Full-text available
In this modern era, people utilise the web to share information and to deliver services and products. The information seekers use different search engines (SEs) such as Google, Bing, and Yahoo as tools to search for products, services, and information. However, web spamming is one of the most significant issues encountered by SEs because it dramati...
Article
Full-text available
Cloud technology is a utility where different hardware and software resources are accessed on pay-per-user ground base. Most of these resources are available in virtualized form and virtual machine (VM) is one of the main elements of visualization. However, the tasks send by user to cloud may cause the VM to be under loaded or overloaded due to tas...
Article
Full-text available
Pashto is one of the most ancient and historical languages in the world and is spoken in Pakistan and Afghanistan. Various languages like Urdu, English, Chinese, and Japanese have OCR applications, but very little work has been conducted on the Pashto language in this perspective. It becomes more difficult for OCR applications to recognize handwrit...
Article
Heart failure means that the heart is not pumping well as normal as it should be. A congestive heart failure is a form of heart failure that involves seeking timely medical care, although the two terms are sometimes used interchangeably. Heart failure happens when the heart muscle does not pump blood as well as it can, often referred to as congesti...
Article
The use of Social Network Sites (SNS) is on the rise these days, particularly among the younger generations. Users can communicate their interests, feelings, and everyday routines thanks to the availability of social media sites. Many studies show that properly utilizing user-generated content (UGC) can aid in determining people's mental health sta...
Poster
Full-text available
Dear my fellow Academics and Industries Expert.. We really wish to have your participation for our 5th International Conference.. The details as below; The Fifth International Conference on Soft Computing and Data Mining (SCDM 2022) is dedicated to address the challenges in the areas of Soft Computing and Data Mining, thereby presenting a consolida...
Article
Full-text available
The Sine-Cosine algorithm (SCA) is a population-based metaheuristic algorithm utilizing sine and cosine functions to perform search. To enable the search process, SCA incorporates several search parameters. But sometimes, these parameters make the search in SCA vulnerable to local minima/maxima. To overcome this problem, a new Multi Sine-Cosine alg...
Article
Back propagation (BP) neural network is known for its popularity and its capability in prediction and classification. BP used gradient descent (GD) method as one of the most widely used error minimization methods used to train back propagation (BP) networks. Besides its popularity BP still faces some limitation such as very slow in learning as well...
Article
The artificial neural network (ANN) particularly back propagation (BP) algorithm has recently been applied in many areas. It is known that BP is an excellent classifier for nonlinear input and output numerical data. However, the popularity of BP comes with some drawbacks such as slow in learning and easily getting stuck in local minima. Improving t...
Article
Contractive auto-encoder (CAE) is a type of auto-encoders and a deep learning algorithm that is based on multilayer training approach. It is considered as one of the most powerful, efficient and robust classification techniques, more specifically feature reduction. The problem independence, easy implementation and intelligence of solving sophistica...
Article
Full-text available
span>The economic dispatch is used to find the best optimal output of power generation at the lowest operating cost of each generator, to fulfill the requirements of the consumer. To get a practical solution, several constraints have to be considered, like transmission losses, the valve point effect, prohibited operating region, and emissions. In t...
Article
Cloud computing brings incipient transmutations in different fields of life and consists of different characteristics and virtualization is one of them. Virtual machine (VM) is one of the main elements of virtualization. VM is a process in which physical server changes into the virtual machine and works as a physical server. When a user sends data...
Article
Full-text available
span>Search Engines are used to search any information on the internet. The primary objective of any website owner is to list their website at the top of all the results in Search Engine Results Pages (SERPs). Search Engine Optimization is the art of increasing visibility of a website in Search Engine Result Pages. This art of improving the visibi...
Article
Full-text available
Flood is a temporary overflow of a dry area due to overflow of excess water, runoff surface waters or undermining of shoreline. In Malaysia itself in 2014, the country grieved with the catastrophic flood event in Kuala Krai, Kelantan, which caused of human lives, public assets and money lost. Due to uncertainties in flooding event, it is vital for...
Article
Full-text available
Parkinson’s disease (PD) among Alzheimer’s and epilepsy are one of the most common neurological disorders which appreciably affect not only live of patients but also their households. According to the current trend of aging social behaviour, it is expected to see a rise of Parkinson’s disease. Even though there is no cure for PD, a proper medicatio...
Article
Full-text available
Now days, security is the main concerning research area for public and private sectors. Security become a major issue in many of our daily life places such as offices, libraries, hospitals, houses, laboratories, educational institutes, military areas etc where in these places, our privacy and confidentiality are very high. A number of methods used...
Article
Full-text available
Auto-encoders (AEs) have been proposed for solving many problems in the domain of machine learning and deep learning since the last few decades. Due to their satisfactory performance, their multiple variations have also recently appeared. First, we introduce the conventional AE model and its different variant for learning abstract features from dat...
Poster
Full-text available
The 4th International Conference on Soft Computing and Data Mining 2020 (SCDM 2020) will be held from 22nd to 23rd January 2020 at Langkawi, Malaysia. The previous SCDM (SCDM 2018) has been successfully held at the Le Grandeur Palm Resort, Senai, Johor, Malaysia and all presented papers has been published in Springer: Advances in Intelligent System...
Chapter
Digital Reference Service (DRS) play a vital role in the Digital Library (DL) research. DRS is a very valuable service provided by DL. Unfortunately, the reference service movement towards digital environment begins late, and this shift was not model based. So, a journey towards a digital environment without following a proper model raises some iss...
Chapter
Lungs cancer is a life-taking disease and is causing a problem around the world for a long time. The only plausible solution for this type of disease is the early detection of the disease because at preliminary stages it can be treated or cured. With the recent medical advancements, Computerized Tomography (CT) scan is the best technique out there...
Book
This book provides an introduction to data science and offers a practical overview of the concepts and techniques that readers need to get the most out of their large-scale data mining projects and research studies. It discusses data-analytical thinking, which is essential to extract useful knowledge and obtain commercial value from the data. Also...
Article
Full-text available
Cloud computing is modern technology that has led to significant change in different fields of life by providing different kinds of servicer like hardware and software on user demands based on pay and gain rule. Due to the rapid growth of cloud computing it faces different kinds of issues, and resource allocation is one of them. For the improvement...
Article
Sentiment classification is an important but challenging task in natural language processing (NLP) and has been widely used for determining the sentiment polarity from user opinions. And word embedding technique learned from a various contexts to produce same vector representations for words with same contexts and also has been extensively used for...
Article
Full-text available
In modern data centres of cloud computing contains virtualization system. In order to improve network stability, energy efficiency, and makespan proper virtualization need. The virtual machine is one of the examples of virtualizations. Cloud computing data centres consist of millions of virtual machine to manage load balancing. In this study check...
Book
Full-text available
Cloud computing is emerging technology in IT land. But it still faces challenges like load balancing. It is a technique which dynamic distributed work load among various nodes equally in a situation where some nodes are under load and some are overload. Main achievements of load balancing are resource consumption and reduce energy. Swarm intelligen...
Article
Full-text available
Cloud computing is emerging technology in IT land. But it still faces challenges like load balancing. It is a technique which dynamic distributed work load among various nodes equally in a situation where some nodes are under load and some are overload. Main achievements of load balancing are resource consumption and reduce energy. Swarm intelligen...
Article
Full-text available
Recent development on visual sensor networks (VSN) have shown the emergence of VSN as an important class of sensor-based distributed intelligent systems, with unique performance, complexity, and quality of service challenges. Furthermore, the popularity of VSN had attracted researchers and industries from many applications. Basically, VSN consists...
Article
Full-text available
Identifying seed manually in agriculture takes a long time for practical applications. Therefore, an automatic and reliable plant seeds identification is effectively, technically and economically importance in agricultural industry. In addition, the current trend on big data and data analysis had introduced scientist with many opportunities to use...
Article
Full-text available
Back Propagation (BP) algorithm is one of the oldest learning techniques used by Artificial Neural Networks (ANN). It has successfully been implemented in various practical problems. However, the algorithm still faces some drawbacks such as getting easily stuck at local minima and needs longer time to converge on an acceptable solution. Recently, t...
Article
Distributed systems are progressively designed as multi-agent systems that are helpful in designing high strength complex industrial software. Recently, distributed systems cooperative applications are openly access, dynamic and large scales. Nowadays, it hardly seems necessary to emphasis on the potential of decentralized software solutions. This...
Article
Full-text available
No doubt that every second in our daily routine, the number of visitors that connect to the internet increase day by day due to the fast growing of World Wide Web. Until this day there are more than 11.3 billion web pages in the World Wide Web. In the modern era of technology and advance computation, world page ranking is becoming a common feature...
Article
Full-text available
In this modern age, the internet is a powerful source of information. Roughly, one-third of the world population spends a significant amount of their time and money on surfing the internet. In every field of life, people are gaining vast information from it such as learning, amusement, communication, shopping, etc. For this purpose, users tend to e...
Article
Dengue disease is one of the serious and dangerous diseases that cause many mortality and spread in most area in Indonesia. There are about 201,885 cases had been reported in 2016 including 1,585 death cases. The availability of nowadays clinical data of Dengue disease can be used to train machine learning algorithm in order to automaticaly detect...
Article
Full-text available
Search Engine Optimization (SEO) plays a very vital role in the development of professional websites. There are some search engines available on the internet such as Yahoo, Ask.com, AOL.com, Baidu, and Bing. Among which Google is the most widely used search engine. Each search engine uses different SEO technique and algorithm, which not only forms...
Article
Full-text available
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks. Although technology had improved a lot during these past years, but, hackers still can find holes to perform the SQL injection. There are...