Nurulhuda Firdaus Mohd Azmi
YOU?
Author Swipe
View article: Navigating the microarray landscape: a comprehensive review of feature selection techniques and their applications
Navigating the microarray landscape: a comprehensive review of feature selection techniques and their applications Open
This review systematically summarizes recent advances in microarray feature selection techniques and their applications in biomedical research. It addresses the challenges posed by the high dimensionality and noise of microarray data, aimi…
View article: Enhancing Early Detection of Type II Diabetes with Machine Learning: A Performance Evaluation
Enhancing Early Detection of Type II Diabetes with Machine Learning: A Performance Evaluation Open
Type II diabetes is a common issue nowadays and takes a longer time to detect. Detection of diabetes greatly relies on the clinical results from medical professionals, which require a significant amount of time, manpower, and expenses. Mac…
View article: A PRISMA Review on Methods and Challenges in Learning Computer Maintenance Using Augmented Reality Technology
A PRISMA Review on Methods and Challenges in Learning Computer Maintenance Using Augmented Reality Technology Open
Augmented reality technology which is currently used in mobile phones is convenient for students and educational institutions because it provides flexibility and real-time learning environments. The use of AR applications in higher educati…
View article: Predicting the Intention to Use Learning Analytics for Academic Advising in Higher Education
Predicting the Intention to Use Learning Analytics for Academic Advising in Higher Education Open
Learning analytics (LA) is a rapidly growing educational technology with the potential to enhance teaching methods and boost student learning and achievement. Despite its potential, the adoption of LA remains limited within the education e…
View article: Migrating data from document-oriented database to graph-oriented database
Migrating data from document-oriented database to graph-oriented database Open
In data migration between different types of NoSQL databases, data may not be directly transferred to the targeted database compared to migration of data between the same types of database. This is due to the heterogeneity of the storage p…
View article: Constructing and Analysing the MalaySarc Dataset: A Resource for Detecting and Understanding Sarcasm in Malay Language
Constructing and Analysing the MalaySarc Dataset: A Resource for Detecting and Understanding Sarcasm in Malay Language Open
Social media platforms provide users with an efficient and effective way to interact with content without requiring lengthy or complex textual expressions.However, sarcasm in social media discourse has become a serious problem for research…
View article: Modeling Orbital Propagation Using Regression Technique and Artificial Neural Network
Modeling Orbital Propagation Using Regression Technique and Artificial Neural Network Open
Orbital propagation models are used to predict the position and velocity of natural and artificial objects orbiting the Earth. It is crucial to get accurate predictions to ensure proper satellite operational planning and early detection of…
View article: Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida
Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida Open
The most sensitive Arabic text available online is the digital Holy Quran. This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs. Thus, it should be protected from any kin…
View article: Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique
Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique Open
The text of the Quran is principally dependent on the Arabic language. Therefore, improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difficult ch... | Find, read…
View article: Detecting Telecommunication Fraud with Visual Analytics: A Review
Detecting Telecommunication Fraud with Visual Analytics: A Review Open
The detection of anomalous events in large multivariate data is sought in many domains. Analysis of data is an important fraud detection procedure in detecting suspicious events and prevent attempts to defraud. While now the data is becomi…
View article: Adopting ISO/IEC 27005:2011-based Risk Treatment Plan to Prevent Patients Data Theft
Adopting ISO/IEC 27005:2011-based Risk Treatment Plan to Prevent Patients Data Theft Open
The concern raised in late 2017 regarding 46.2 million mobile device subscribers’ data breach had the Malaysian police started an investigation looking for the source of the leak. Data security is fundamental to protect the assets or infor…
View article: Enhancing Classroom Engagement Through Padlet as a Learning Tool: A Case Study
Enhancing Classroom Engagement Through Padlet as a Learning Tool: A Case Study Open
Activities conducted in classrooms are important to acquire students’ understanding and participation in a learning environment. Some of perceived barriers that prevent students to participate in classroom activities include difficulty to …
View article: Feature Selection Using Multivariate Adaptive Regression Splines in Telecommunication Fraud Detection
Feature Selection Using Multivariate Adaptive Regression Splines in Telecommunication Fraud Detection Open
Feature selection determines the most significant features for a given task while rejecting the noisy, irrelevant and redundant features of the dataset that might mislead the classifier. Besides, the technique diminishes the dimensionality…
View article: Applying Game Theory to Mortgage Framework
Applying Game Theory to Mortgage Framework Open
To some, the retail banking market is considered an oligopoly. This is not healthy for a country’s economy and its people because it is important for competition to thrive in the banking industry. Any form of market failure or anti-competi…
View article: Enhancing Prediction Method of Ionosphere for Space Weather Monitoring Using Machine Learning Approaches: A Review
Enhancing Prediction Method of Ionosphere for Space Weather Monitoring Using Machine Learning Approaches: A Review Open
This paper studies the machine learning techniques that can be used to enhance the prediction method of the ionosphere for space weather monitoring. Previously, the empirical model is used. However, there is a large deviation of the total …
View article: Risk Management Framework for Distributed Software Team: A Case Study of Telecommunication Company
Risk Management Framework for Distributed Software Team: A Case Study of Telecommunication Company Open
Distributed software development (DSD) has grown rapidly over the last few years and present definite risk to the software industry which need to be carefully analyzed and managed. The risks relating to DSD include lack of trust, ineffecti…
View article: SMS Spam Message Detection using Term Frequency-Inverse Document Frequency and Random Forest Algorithm
SMS Spam Message Detection using Term Frequency-Inverse Document Frequency and Random Forest Algorithm Open
The daily traffic of Short Message Service (SMS) keeps increasing. As a result, it leads to dramatic increase in mobile attacks such as spammers who plague the service with spam messages sent to the groups of recipients. Mobile spams are a…
View article: Experimenting Dynamic Clonal Selection (DCS) for Parallel Multiple Interest Topics of User Profile Adaptation in Content Based Filtering
Experimenting Dynamic Clonal Selection (DCS) for Parallel Multiple Interest Topics of User Profile Adaptation in Content Based Filtering Open
User profile for information filtering is an inspiring issue through distinctive profiling features plus profiling desires. The profile of the user should be accomplished of constant learning and be unable to remember past interest. Forget…
View article: Understanding Factors that Affect Information Technology Outsourcing of Government Shared Services
Understanding Factors that Affect Information Technology Outsourcing of Government Shared Services Open
One of the Public Sector Information Communication Technology Strategic Directions for 2016 – 2020 is to optimize shared services through a centralized and structured initiative. Due to some identified problems and challenges in managing…
View article: Mobile Business Intelligence Acceptance Model for Organisational Decision Making
Mobile Business Intelligence Acceptance Model for Organisational Decision Making Open
Mobile Business Intelligence (BI) is the ability to access BI-related data such as key performance indicators (KPIs), business metric and dashboard through mobile device. Mobile BI addresses the use-case of remote or mobile workers that ne…
View article: A Review for Improving Software Change using Traceability Model with Test Effort Estimation
A Review for Improving Software Change using Traceability Model with Test Effort Estimation Open
Maintaining a software system includes tasks such as fixing defects, adding new features, or modifying the software (software changes) to accommodate different environments. Then, the modified software system needs to be tested, to ensure …
View article: Preliminary review of model-view-presenter (MVP) and usability design for the development of postgraduate web portal
Preliminary review of model-view-presenter (MVP) and usability design for the development of postgraduate web portal Open
The process of managing and monitoring postgraduate students should enable mobility to the individuals involved, should not use high human effort and should provide transparent monitoring. Therefore, it needs a solution that could enable m…
View article: Enhancing security elements for MapReduce processing with whitelist
Enhancing security elements for MapReduce processing with whitelist Open
Big data requires new ways and technologies of how data is harnessed, managed and applied to create values that offer insights for better decision making. An exploration of MapReduce model which reliably accommodates big data processing re…
View article: Descriptive Finding Regarding Factors Influencing Information Security Vulnerability: A Case Study in Electrical Company in Iran
Descriptive Finding Regarding Factors Influencing Information Security Vulnerability: A Case Study in Electrical Company in Iran Open
Implementing technology is important to enhance the enterprise information transaction but it isimpossible to secure it without organizational and human supports. Information security is aboutconfidentiality, integrity and availability of …
View article: EXTRACTION TRANSFORMATION LOAD (ETL) SOLUTION FOR DATA INTEGRATION: A CASE STUDY OF RUBBER IMPORT AND EXPORT INFORMATION
EXTRACTION TRANSFORMATION LOAD (ETL) SOLUTION FOR DATA INTEGRATION: A CASE STUDY OF RUBBER IMPORT AND EXPORT INFORMATION Open
Data integration is important in consolidating all the data in the organization or outside the organization to provide a unified view of the organization's information. Extraction Transformation Load (ETL) solution is the back-end process …