About
63
Publications
14,451
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
315
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (63)
The cold-start problem is a condition for a new node to join a network with no available information or an isolated node. Most studies use topological network information with the Triadic Closure principles to predict links in future networks. However, the method based on the Triadic Closure principles cannot predict the future link due to no commo...
span lang="EN-US">Few studies on text clustering for the Malay language have been conducted due to some limitations that need to be addressed. The purpose of this article is to compare the two clustering algorithms of k-means and k-medoids using Euclidean distance similarity to determine which method is the best for clustering documents. Both algor...
The nature of decision making in healthcare is complex and crucial. It is essential to have a tool that helps with accurate and correct decisions based on real-time data. Moreover, the healthcare process itself is complex, comprising various stages from primary to palliative, closely related to each other, and the process is different depending on...
Police narrative reports are critical in assisting the investigation officer in uncovering hidden information during the criminal investigation process. In recent years, detecting criminal linkages by locating modus operandi in a massive volume of unstructured police reports has become a significant challenge. Here have been few studies on text cla...
Currently, Coronavirus is a major worldwide threat. It has affected millions of people around the world, resulting in hundreds of thousands of deaths. It is indeed important to forecast the number of new cases in aims to assist in disease prevention and healthcare service readiness. Many researchers used different mathematical and machine learning...
The Multidimensional Poverty Index (MPI) is an income-based poverty index which measures multiple deprivations alongside other relevant factors to determine and classify poverty. The implementation of a reliable MPI is one of the significant efforts by the Malaysian government to improve measures in alleviating poverty, in line with the recent poli...
Networking is crucial for smart city projects nowadays, as it offers an environment where people and things are connected. This paper presents a chronology of factors on the development of smart cities, including IoT technologies as network infrastructure. Increasing IoT nodes leads to increasing data flow, which is a potential source of failure fo...
Deoxyribonucleic acid (DNA) can be used to discover the presence of diseases in the human body. Similarly, its functionality can be leveraged in an intrusion detection system (IDS) to detect attacks against computer systems and network traffic. Various approaches have been proposed for using DNA sequences in IDSs. The most popular is the DNA sequen...
Having the best solution for Vehicle Routing Problem (VRP) is still in demand. Beside, Cuckoo Search (CS) is a popular metaheuristic based on the reproductive strategy of the Cuckoo species and has been successfully applied in various optimizations, including Capacitated Vehicle Routing Problem (CVRP). Although CS and hybrid CS have been proposed f...
In recent years, due to the emergence of various social network platforms, a massive amount of data is continuously generated and shared. The majority of the data is unstructured, which contains information that might be crucial and valuable if analyzed. Effective use of these unstructured data is a tedious and labor-intensive task. Information ext...
span>Fault detection is the task of discovering patterns of a certain fault in industrial manufacturing. Early detection of fault is an essential task in industrial manufacturing. Traditionally, faults are detected by human experts. However, this method suffers from cost and time. In this era of Industrial revolution IR 4.0, machine learning (ML) m...
The concern in crime prevention to realize a safe environment for public’s welfare is one of the central agenda to government authorities. The increasing volume of crime reports with unstructured data that are heavily loaded with text presents the biggest challenge to human experts in analysing the data efficiently as it contains lots of hidden and...
Blockchain technology has been commonly used in the last years in numerous fields, such astransactions documenting and monitoring real assets (house, cash) or intangible assets (copyright,intellectual property). The internet of things (IoT) technology, on the other hand, has become themain driver of the fourth industrial revolution, and is currentl...
Link prediction is a technique to forecast future new or missing relationships between entities based on the current network information. Graph theory and network science are theoretical concepts that have influenced the link prediction research. Although previous reviews clearly outlined the link prediction research, it was focused on describing p...
Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding meth...
The cuckoo search algorithm is a novel metaheuristic based on the obligate brood parasitic behavior of some cuckoo species in combination with the Lévy flight behavior of some birds and fruit flies. Its shows good performance when applied to various domains in continuous and discrete search space. This study presents a cuckoo search algorithm for c...
This paper investigated patterns of climate change in Malaysia and proposed a fuzzy based symbolic data representation known as a shapelet patterns algorithm (SPA). The Shapelet Pattern visualise climate change patterns in the form of coloured shapes to indicate annual changes in temperature patterns. The experiment used climate change data collect...
Guru merupakan panggilan kepada seorang pendidik yang mengajar di sekolah. Kecemerlangan seseorang pelajar biasanya berkait rapat dengan kecemerlangan guru yang mengajar. Kewujudan guru cemerlang amat diperlukan di semua sekolah dan masalah yang biasa dihadapi oleh pihak pentadbiran sekolah ialah menjadikan seseorang guru itu guru yang cemerlang. O...
In this paper, a fully automatic 2.5D facial technique for forensic applications is presented. Feature extraction and classification are fundamental processes in any face identification technique. Two methods for feature extraction and classification are proposed in this paper subsequently. Active Appearance Model (AAM) is one of the familiar featu...
The heuristic method is a well-known constructive method for initialize trail quality solutions in capacitated vehicle routing problem. Cheapest insertion heuristic is a popular construction heuristic known for being fast, producing decent solutions, simple to implement and easy to extend handling complicated constraints. However, in previous work,...
Ground level ozone is one of the common pollution issues that has a negative influence on human health. The key characteristic behind ozone level analysis lies on the complex representation of such data which can be shown by time series. Clustering is one of the common techniques that have been used for time series metrological and environmental da...
Having an effective data structure regards to fast data changing is one of the most important demands in spatio-temporal data. Spatio-temporal data have special relationships in regard to spatial and temporal values. Both types of data are complex in terms of their numerous attributes and the changes exhibited over time. A data model that is able t...
Rainfall has influence the social and economic activities in particular area such as agriculture, industry and domestic needs. Therefore, having an accurate rainfall forecasting becomes demanding. Various statistical and data mining techniques are used to obtain the accurate prediction of rainfall. Time series data mining is a well-known used for f...
The enormous amount of unstructured data presents the biggest challenge to decision makers in eliciting meaningful information to support business decision-making. This study explores the potential use of ontologies in extracting and populating the information from various combinations of unstructured and semi-structured data formats such as tabula...
Ground level ozone is one of the common pollution issues that has a negative influence on human health. The key characteristic behind ozone level analysis lies on the complex representation of such data which can be shown by time series. Clustering is one of the common techniques that have been used for time series metrological and environmental da...
This paper presents a hybrid Water Flow-like Algorithm with Tabu Search for solving travelling salesman problem (WFA-TS-TSP).WFA has been proven its outstanding performances in solving TSP meanwhile TS is a conventional algorithm which has been used since decades to solve various combinatorial optimization problem including TSP. Hybridization betwe...
The cuckoo search algorithm is a novel metaheuristic based on the reproduction behavior of some cuckoo species in combination with the Levy flight behavior of some birds and fruit flies. It has been applied to a wide range of optimization problems with good performance such as a TSP; nonetheless, it has yet to be applied to the vehicle routing prob...
The growth of network attacks has lengthened the intrusion detection system’s (IDS) processing time to detect these attacks. The demand for reducing the processing time has increased when dealing with real time IDS. Several methods were proposed, such as improving the algorithm, or improving the IDS’s architectural design; which includes distribute...
The cuckoo search algorithm is a novel metaheuristic based on the obligate brood parasitic behavior of some cuckoo species in combination with the Lévy flight behavior of some birds and fruit flies. Its shows good performance when applied to various domains in continuous and discrete search space. This study presents a cuckoo search algorithm for c...
As the number of internet users grows exponentially everyday, the attacks and intrusions experienced on different networks equally multiply rapidly! Most of the current Intrusion Detection Systems (IDSs) are confronted with the challenge of coping with this high volume of traffics because they have low processing throughput. The overall consequence...
It is difficult to identify visualized multi-climate change patterns from time series data due to the fact that the data begin to look similar over time. Traditionally, time series weather patterns are presented in the form of a linear graph, which is limited to discovering understandable climate change patterns. On the other hand, the Symbolic Agg...
Attempts to mine text documents to discover deviations or anomalies have increased in recent years due to the elevated amount of textual data in today's data repositories. Text mining assists in uncovering hidden information contents across multiple documents. Although various text mining tools are available, their focus is mainly to assist in data...
This paper proposed a multi-level model for intrusion detection that combines the two techniques of modified K-means and support vector machine (SVM). Modified K-means is used to reduce the number of instances in a training data set and to construct new training data sets with high-quality instances. The new, high-quality training data sets are the...
This paper proposed a multi-level model for intrusion detection that combines the two techniques of modified K-means and support vector machine (SVM). Modified K-means is used to reduce the number of instances in a training data set and to construct new training data sets with high-quality instances. The new, high-quality training data sets are the...
Although ‘Intrusion’ is considered to be a bitter pill to swallow due to the havoc it unleashes on the cyber space, but it has become a household name to cyber-security experts because it appears to rebuff all possible solutions! Consequent upon this, there have been unrelenting efforts to reduce its negative impacts to the lowest ebb by the introd...
An attractive research in recent years is solving class imbalance problem in imbalanced dataset. The class is imbalanced when the number of one class (majority) is more than another one (minority). The classification of this imbalanced class causes imbalanced distribution and poor predictive classification accuracy. This paper introduces a new ense...
Even though cognition is heavily emphasized in the learning world, but quite recently there has been a spurred interest to study the emotion of the learners, as the previous researchers unveil that emotion is as important as cognition in learning traditionally or online. This paper discusses mainly about the first finding out of four findings expec...
A Chip Shooter placement machine in printed circuit board assembly has three movable mechanisms: an XY table carrying a printed circuit board, a feeder carrier with several feeders holding components and a rotary turret with multiple assembly heads to pick up and place components. In order to minimize the total traveling time spent by the head for...
Face recognition has recently received significant attention, especially during the past few years. Many face recognition techniques were developed such as PSO-SVM and LDA-SVM However, inefficient features in the face recognition may lead to inadequate in the recognition results. Hence, a new face recognition system based on Genetic Algorithm and F...
Network security is a serious global concern. Usefulness Intrusion Detection Systems (IDS) are increasing incredibly in Information Security research using Soft computing techniques. In the previous researches having irrelevant and redundant features are recognized causes of increasing the processing speed of evaluating the known intrusive patterns...
A face recognition technique is one of the common computer applications that automatically identifies or authenticates a person from a digital image or a video frame in a video source. This face recognition procedure is done by matching the selected face features from the image and the face database. Several face recognition techniques recognize th...
No one can deny the fact that face recognition systems, as one of the most adaptable systems in biometric facial recognition, has interestingly been one of the fields that draw researchers' attention to enhance the efficiency and efficacy of biometric applications. These researchers have mainly focused on the existed limitations such as extracting...
A main issue in associate rule mining is to extract quality rules with faster times. The most popular method is improving the data representation method. This study aims to propose an automated Boolean Matrix data transactional representation scheme that improves the existing Apriori algorithm for mining association rules. It contains two stages. F...
Disaster is an old challenge to the human society, which is continuously presenting new threats to society and its way of life. Thus, it is important for us to find ways to help mitigate these threats and to provide the society with better solutions to cope with disaster. Over the past decades, disasters have also caused damaged to telecommunicatio...
Talent management is a very crucial task and demands close attention from human resource (HR) professionals. Recently, among the challenges for HR professionals is how to manage organization’s talents, particularly to ensure the right job for the right person at the right time. Some employee’s talent patterns can be identified through existing know...
Talent management is a very crucial task and demands close attention from human resource (HR) professionals. Recently, among the challenges for HR professionals is how to manage organization’s talents, particularly to ensure the right job for the right person at the right time. Some employee’s talent patterns can be identified through existing know...
Positive emotion plays an important role in learning. Previous researchers have emphasised the importance of positive emotion for effective learning. Although some researchers have documented the association between emotion and eLearning, few studies have addressed users' emotional experience during their interaction with eLearning material. Theref...
In any organization, managing human talent is very important and need more attentions from Human Resource (HR) professionals. Nowadays, among the challenges of HR professionals is to manage an organization’s talent, especially to ensure the right person is assigned to the right job at the right time. Knowledge Discovery in Database (KDD) is a data...
Learning occurs when learners are actively involved in various learning activities. Current e-learning systems focus more on content development rather than on learning activities itself. Embedding pedagogical aspect in learning activities into e-learning system is value added as it represents the natural way of learning process. This pedagogical a...
Since several years, communication networks have known a surprising growth. The increased number of users, the consequent increase of traffic, and the request for new services involve the development of new technologies and the deployment of high throughput networks. Networking technology has correspondingly grown to meet the diverse needs of appli...
Packet networks are currently enabling the integration of heterogeneous traffic with a wide range of characteristics that extend from video traffic with stringent QoS requirements to best-effort traffic requiring no guarantees. QoS guarantees can be provided in packet networks by the use of proper packet scheduling algorithms. Similar to the trends...
Questions
Question (1)
Dear Sir/Madam
Did researchgate provides API that I can read my main page research gate that I can access by link it in other website
Projects
Projects (5)
1. To consolidate various sources of data related to B40 for big data analytics.
2. To propose new indicators and new dimensions for poverty classification.
3. To translate data analytics findings into actionable policies.
4. To establish big data repository for B40.
Examine Hair-Oriented Data Model performance using spatio-temporal clustering algorithm called ST-OPTICS. The performance measures are execution time and clustering performance.