Noor Azah Samsudin

Noor Azah Samsudin
Universiti Tun Hussein Onn Malaysia | uthm · Faculty of Computer Science and Information Technology (FSKTM)

About

76
Publications
42,228
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
330
Citations
Additional affiliations
March 2004 - present
University Tun Hussein Onn Malaysia
Position
  • Professor (Associate)
February 2004 - present
University Tun Hussein Onn Malaysia, Batu Pahat, Johor, Malaysia
Position
  • Professor (Associate)
Education
February 2007 - December 2013
The University of Queensland, Brisbane, Australia
Field of study
  • Information Technology

Publications

Publications (76)
Chapter
There are common factors that characterize individuals who commit crime. Statistically, relationship between factors could be measured and formed using regression models. While modeling crime rates was widely approached using the ordinary regression model. However, this model is not much capable for categorical response variables such as crime type...
Article
Machine learning involves the task of training systems to be able to make decisions without being explicitly programmed. Important among machine learning tasks is classification involving the process of training machines to make predictions from predefined labels. Classification is broadly categorized into three distinct groups: single-label (SL),...
Article
Full-text available
Arabic handwriting recognition is currently experiencing a massive rise in terms of analysis research. It is clear in the lecture review that researchers concentrate on Arabic handwriting recognition. A major increase has been reported in feature extraction and classification techniques compared to before. Offline Arabic handwriting recognition is...
Article
Full-text available
In the last few years, deep learning-based models have made significant inroads into the field of handwriting recognition. However, deep learning requires the availability of massive labelled data and considerable computation for training or automatic feature extraction. The role of handcrafted features and their significance is still crucial for a...
Article
Full-text available
Laptop has always been a very useful tool for studies and most university students own at least one laptop. However, not all university student knows how to diagnose and troubleshoot their laptop when it is not working right. Most university student would rather hire computer technician to fix their laptop even though the solution to their laptop p...
Article
The symmetry triangular fuzzy number has been developed to build fuzzy autoregressive models by using various approaches such as low-high data, integer number, measurement error, and standard deviation data. However, most of these approaches are not simulated and compared between ordinary least square and fuzzy optimization in parameter estimation....
Article
Full-text available
Deoxyribonucleic acid (DNA) can be used to discover the presence of diseases in the human body. Similarly, its functionality can be leveraged in an intrusion detection system (IDS) to detect attacks against computer systems and network traffic. Various approaches have been proposed for using DNA sequences in IDSs. The most popular is the DNA sequen...
Article
Full-text available
With the dramatic expansion of image information nowadays, image processing and computer visions are playing a significant role in terms of several applications such as image classification, image segmentation, pattern recognition, and image retrieval. One of the important features that have been used in many image applications is texture. The text...
Article
Full-text available
span>Fault detection is the task of discovering patterns of a certain fault in industrial manufacturing. Early detection of fault is an essential task in industrial manufacturing. Traditionally, faults are detected by human experts. However, this method suffers from cost and time. In this era of Industrial revolution IR 4.0, machine learning (ML) m...
Article
Full-text available
Text classification is imperative in order to search for more accessible and appropriate information. It utilized in various fields, including marketing, security, biomedical, etc. Apart from its usefulness, the available classifiers are vulnerable to two major problems, namely long processing time and low accuracy. They can result from a large amo...
Chapter
Full-text available
The field of Arabic handwriting recognition and translation is currently experiencing rapid growth in terms of research, which is evident in the coverage of major conferences and journals that specialise in the area of handwriting recognition. Against this backdrop, a significant increase has been observed in the classification and features techniq...
Article
Chronic Kidney Disease (CKD) is one of the leading cause of death contributed by other illnesses such as diabetes, hypertension, lupus, anemia or weak bones that lead to bone fractures. Early prediction of CKD is important in order to contain the disesase. However, instead of predicting the severity of CKD, the objective of this paper is to predict...
Article
Full-text available
Feature selection is an integral phase in text classification problems. It is primarily applied in preprocessing text data prior to labeling. However, there exist some limitations with the FS techniques. The filter-based FS techniques have the drawback of lower accuracy performance while the wrapper-based techniques are highly computationally expen...
Article
Full-text available
Classification of Quranic verses into predefined categories is an essential task in Quranic studies. However, in recent times, with the advancement in information technology and machine learning, several classification algorithms have been developed for the purpose of text classification tasks. Automated text classification (ATC) is a well-known te...
Article
Full-text available
span>The study of steganography focuses on strengthening the security in protecting content message by hiding the true intention behind the texts. However, existing linguistic steganography approach especially in synonym-based substitution is prone to attack. In this paper, a new substitution-based approach for linguistic steganography is proposed...
Article
Full-text available
Graduates shall see the importance of improving their skills to prepare themselves to get the right jobs. Considering such important requirements, therefore many universities have designed various skill development programs in their curriculum. The students enrol in these programs and eventually, their skills performance will be evaluated using cer...
Article
Nowadays, with the increasing availability of online text documents, it becomes an important task for an organization to automatically classify the document. In Text Classification (TC), Support Vector Machine is the commonly used machine-learning algorithm. Performance of SVM highly depends on parameter tuning using metaheuristic algorithm for tex...
Article
Full-text available
Abstract: Since electronic documents are dramatically increasing therefore document classification becomes a very important task to organised information automatically. Text in the documents is a high dimensional data that create difficulties in classification task. So, the feature ranking techniques are necessary to reduce the dimensionality of th...
Conference Paper
In economics research survey, the causal relationship between independent and dependent attributes has been frequently investigated by using regression linear models. However, not easy to achieve the high R-square value between both attributes if there are too many unclassified elements in data sets. This paper presents removing unclassified elemen...
Article
Flood is a temporary overflow of a dry area due to overflow of excess water, runoff surface waters or undermining of shoreline. In 2014, Malaysia grieved with the catastrophic flood event in Kuala Krai, Kelantan, which sacrificed human lives, public assets and a total of RM 2 billion loss. Due to uncertainties in flooding event, this research is se...
Article
Full-text available
In 2017, a significant number of individuals profited from the staggering growth of the price of Bitcoin from $800 USD in January to almost $20,000 USD in December. Because the cryptocurrency market being relatively new when compared to traditional markets such as stocks, foreign exchange, and gold, there is a significant lack of studies in regard...
Article
Full-text available
This paper presents multi-instance (MI) image classification for cancer diagnosis using statistical mapping Support Vector Machine (SVM). The existing MI image classification is limited to focusing on standard multi-instance classification (MIC) assumption, but do not generalize to the whole range of MI data and do not fully utilize the power of co...
Article
Full-text available
In Islam, Quran is the holy book that was revealed to the Prophet Muhammad. It functions as complete code of life for the Muslims. Remarks from Allah which contains more than 77,000 words that was passed down through Prophet Muhammad to the mankind for 23 years started in 610 ce. The Quran was divided into 114 chapters. Arabic language is the origi...
Article
Full-text available
Cooling pads are commonly used to reduce temperature of laptop to avoid overheating problem. However, existing cooling pads are prone to various limitations: fixed voltage in the hardware component, inaccurate temperature readings and lacked of computer-based temperature monitoring functions. In this paper, a laptop cooling system with multivoltage...
Article
Full-text available
In this era of modernization, there are various public transportations that facilitate the movement of users, among which is the Monorail service. However, beyond the route information such as the train schedule and the ticket fare provided by the Monorail service, users do not have access to other sources of information relating to local attractio...
Article
Full-text available
This paper describes the design and development of data retrieval system using near field communication (NFC) protocol to read and transfer data from the device storage panel located at the recycle bin. In existing systems, data are manually collected from the storage device using the SD card and sent for upload to regional workstation of the data...
Article
Full-text available
Jaccard index and rough set approaches have been frequently implemented in decision support systems with various domain applications. Both approaches are appropriate to be considered for categorical data analysis. This paper presents the applications of sets operations for flu diagnosis systems based on two different approaches, such as, Jaccard in...
Article
Full-text available
Classification of Quranic verses into predefined categories is an essential task in Quranic studies. However, in recent times, with the advancement in information technology and machine learning, several classification algorithms have been developed for the purpose of text classification tasks. Automated text classification (ATC) is a well-known te...
Conference Paper
Rough set and regression approximations are useful in establishing decision support system for medical diagnostic applications. However, the data elimination strategy for unclassified elements or patients in the medical diagnostic applications remains as a serious issue to be explored, especially with the aim of achieving higher prediction accuracy...
Chapter
Full-text available
Most existing feature selection approach is limited to determine features from a single source of data. In this paper, a feature selection approach is proposed to consider multiple sources of textual data. The proposed GBFS approach is then applied to label Quranic verses based on two major references, the English translation and tafsir (Commentary...
Chapter
Full-text available
Medical images contain the Region of Interest (ROI) from the affected area in human body and provide useful information to support clinical decision-making for diagnostics as well as the treatment planning. Unfortunately, medical image data may contain noise, missing values, inhomogeneous ROI that may give inaccurate diagnostic. Therefore, image an...
Chapter
Full-text available
Mathematical models are established to represent real-world problems. Since the real-world faces various types of uncertainties, it makes mathematical model suffers with insufficient uncertainties modeling. The existing models lack of explanation in dealing uncertainties. In this paper, construction of mathematical model for decision making scenari...
Article
Full-text available
The limitations of the existing Knowledge Hyper-surface method in learning cause and effect relationships in the manufacturing process is explored. A new approach to enhance the performance of the current Knowledge Hyper-surface method has been proposed by constructing midpoints between each primary weight along each dimension by using a quadratic...
Conference Paper
Malignancy associated changes approach is one of possible strategies to classify a Pap smear slide as positive (abnormal) or negative (normal) in cervical cancer screening procedure. The malignancy associated changes (MAC) approach acquires analysis of the cells as a group as the abnormal phenomenon cannot be detected at individual cell level. Howe...
Conference Paper
Full-text available
Association rules is s one of data mining method that have been implemented in many discipline areas. This rule is able to find interesting relation between the data in a large data set. The traditional association rule has been employed to handle crisp set of items. However, for real-valued items, the traditional association rules fail to handle t...
Article
Full-text available
In 2016, the National Institute of Health reported that 26% of 8th graders, 47% of 10th graders, and 64% of 12th graders have all had experience in consuming alcoholic drinks. This finding indicates an accelerating trend in alcohol use among school students, hence a growing concerns among the public. To address this issue, this paper is set to mode...
Article
Training of artificial neural networks (ANN) is normally a time-consuming task due to iteratively search imposed by the implicit nonlinearity of the network behavior. In this work an improvement to 'batch-mode' offline training methods, gradient-based or gradient free is proposed. The new procedure computes and improves the search direction along t...
Article
Full-text available
The ultimate goal of labelling a Quranic verse is to determine its corresponding theme. However, the existing Quranic verse labelling approach is primarily depending on the availability of Quranic scholars who have expertise in Arabic language and Tafseer. In this paper, we propose to automate the labelling task of the Quranic verse using text clas...
Article
Full-text available
Children nowadays are having problem learning and understanding basic mathematical operations because they are not interested in studying or learning mathematics. This project proposes an educational game called Magic Touch Math that focuses on basic mathematical operations targeted to children between the age of three to five years old using gestu...
Article
Full-text available
The linguistic steganography studies are still in the stage of development and empowerment practices. This paper will present several text steganography on substitution methods based on the researcher's perspective, all scholar paper will analyse and compared. The objective of this paper is to give basic information in the substitution method of te...
Article
Full-text available
Artificial Neural Network had gained a tremendous attention from researchers particularly because of the architecture of Artificial Neural Network that laid the foundation as a powerful technique in handling problems such as classification, pattern recognition, and data analysis. It is known for its data-driven, self-adaptive, and non-linear capabi...
Article
Full-text available
Sentiment analysis is the process to study of people opinion, emotion and way of considering a matter and take the decision into different categorize like positive, negative and neutral in data mining. The sentiment analysis is used to find out negation within the text using Natural Language Processing rules. Our aim is to detect negation affect on...
Conference Paper
Generally, most strategy prefers to use fake tokens to detect phishing activity. However, using fake tokens is limited to static feature selection that needs to be pre-determined. In this paper, a tokenless trackback strategy for email-born phishing is presented, which makes the strategy dynamic. Initially, the selected features were tested on the...
Conference Paper
Nowadays, many areas in computer sciences use ontology such as knowledge engineering, software reuse, digital libraries, web on the heterogeneous information processing, semantic web, and information retrieval. The area of halal industry is the fastest growing global business across the world. The halal food industry is thus crucial for Muslims all...
Article
Full-text available
Feature ranking techniques are used to improve the performance of classification in text labeling problems. Most of the feature selection techniques utilize document and term frequencies to rank term. In contrast to document frequency, term frequency support real values of the term. Recent feature ranking techniques use term frequencies with freque...
Article
Full-text available
Quranic documents result has a limited query due to focusing on exact words to retrieve those relevant documents. Therefore, there is variety of results to be useful for the target users to explore Quran documents in proper manner. Thus, this paper presents analysis according to conducted empirical experiments in 12 retrieval processes. Thus a syst...
Article
Full-text available
The Quran is a scripture that acts as the main reference to people which their religion is Islam. It covers information from politics to science, with vast amount of information that requires effort to uncover the knowledge behind it. Today, the emergence of smartphones has led to the development of a wide-range application for enhancing knowledge-...
Article
Full-text available
This paper presents the view of TreeMap representation with retrieval results more attractive on eyes. It is also found that TreeMap more friendly to present Quran results for keyword (K) and queryword (Q). This research also is being applied in retrieving Malay verses Quran translation.