- Big Data and Business Intelligence
- Network Security and Intrusion Detection
- Video Surveillance and Tracking Methods
- Advanced Malware Detection Techniques
- Biometric Identification and Security
- Stock Market Forecasting Methods
- Text and Document Classification Technologies
- Advanced Steganography and Watermarking Techniques
- Customer churn and segmentation
- Energy Load and Power Forecasting
- Handwritten Text Recognition Techniques
- Face recognition and analysis
- Hand Gesture Recognition Systems
- Human Pose and Action Recognition
- Spam and Phishing Detection
- Vehicle License Plate Recognition
- Sentiment Analysis and Opinion Mining
- Housing Market and Economics
- Data Visualization and Analytics
- IoT and Edge/Fog Computing
- Gait Recognition and Analysis
- Phonocardiography and Auscultation Techniques
- Remote-Sensing Image Classification
- Open Source Software Innovations
- User Authentication and Security Systems
University of Technology Malaysia
2015-2024
Universiti Tun Abdul Razak
2019-2024
University of Kuala Lumpur
2019
Biometric systems such as signature verification are highly viable in order to identify individuals organizations or finance divisions. Advancement classification of images using deep learning networks has opened an opportunity for this problem. In study, the largest available handwritten dataset, namely, GPDS Synthetic Signature Database, was employed signatures 1000 users, each which having 24 original (or genuine) signatures, and 30 forged fake) signatures. Moreover, two popular GoogLeNet...
The daily traffic of Short Message Service (SMS) keeps increasing. As a result, it leads to dramatic increase in mobile attacks such as spammers who plague the service with spam messages sent groups recipients. Mobile spams are growing problem number keep increasing day by even filtering systems. Spams defined unsolicited bulk various forms unwanted advertisements, credit opportunities or fake lottery winner notifications. Spam classification has become more challenging due complexities...
Organization with considerable investment into data warehousing, the influx of various types and forms requires certain ways prepping staging platform that support fast, efficient volatile to reach its targeted audiences or users different business needs. Extract, Transform Load (ETL) system proved be a choice standard for managing sustaining movement transactional process valued big assets. However, traditional ETL can no longer accommodate effectively handle streaming near real-time...
Handwritten recognition (HWR) is the ability of a computer to receive and interpret intelligible handwritten input from source such as paper documents, photographs, touch-screens other devices. In this we will using three (3) classification t o re cognize which SVM, KNN Neural Network.
Distributed software development (DSD) has grown rapidly over the last few years and present definite risk to industry which need be carefully analyzed managed. The risks relating DSD include lack of trust, ineffective communication, time zone difference, cultural differences such as language corporate culture along with knowledge sharing challenges. Software management approach in DSD, however, is still inadequate needed further attention. aim this paper identify components involved process...
Multi-step stock index forecasting is vital in finance for informed decision-making. Current methods this task frequently produce unsatisfactory results due to the inherent randomness and instability of data, thereby underscoring demand advanced models. Given superiority capsule network (CapsNet) over CNNs various classification tasks, study investigates potential integrating a 1D CapsNet with an LSTM multi-step forecasting. To end, hybrid 1D-CapsNet-LSTM model introduced, which utilizes...
In recent years, we have withnessed a dramatic increment volume in the number of mobile users grows telecommunication industry. However, this leads to drastic increase spam SMS messages. Short Message Service (SMS) is considered one widely used communication service. reality, most ignore because lower rate and limited amount classification tools. paper, propose Support Vector Machine (SVM) algorithm for Spam Classification. as effective data mining techniques. The been evaluated using public...
Mobile Business Intelligence (BI) is the ability to access BI-related data such as key performance indicators (KPIs), business metric and dashboard through mobile device. BI addresses use-case of remote or workers that need on-demand business-critical data. User acceptance on an essential in order identify which factors influence user application. Research model organizational decision-making limited due novelty newly emerged innovation. In answer gap adoption decision-making, this paper...
Face recognition is a biometric technique that has been widely used in many fields. Most of the face applications are security and surveillance system. However, due to current pandemic, wearing facemasks an obligation for everybody public places. Hence, will encounter problem such as extracting facial features blockage caused by facemasks. Thus, it lower down rate level. The collected dataset consists two categories which masked unmasked face. This called FaceMask Dataset was obtained from...
Cardiovascular diseases (CVDs) are a prevalent cause of mortality worldwide, and the traditional cardiovascular disease diagnosis has relied heavily on stethoscope-based heart sound auscultations. Hence, development medical systems led to several machine learning (ML)-related studies for analysing sounds using phonocardiograms (PCGs). Although this process enables detection additional mechanical activity information about muscle, various crucial gaps (background noise, unbalanced datasets,...
The most sensitive Arabic text available online is the digital Holy Quran. This sacred Islamic religious book recited by all Muslims worldwide including non-Arabs as part of their worship needs. Thus, it should be protected from any kind tampering to keep its invaluable meaning intact. Different characteristics letters like vowels (), Kashida (extended letters), and other symbols in Quran must secured alterations. cover watermarked are different due low values Peak Signal Noise Ratio (PSNR)...
Sustainable software engineering is a mean of developing sustainable with process activities while balancing its various dimensions for instance economic, environmental, social, technical and individual. It conveyed that the technical, environmental social are explored to satisfactory degree however individual dimension which concerned wellbeing engineers not respect understanding challenges. Therefore, aim study highlight prioritize challenges regarding sustainability dimension. The also...
Ear biometrics is one of the primary that definitely standing out. recognition enjoys special benefits and can make distinguishing proof safer dependable along with other (for example fingerprints face). Particularly as a supplement to face schemes experience issues in genuine circumstances. This because extraordinary variety planar representation confusing object varied shapes, illumination, profile shape. study an endeavor conquer these restrictions, by proposing scale-invariant feature...
<span style="font-size: 9pt; font-family: 'Times New Roman', serif;">Ethnicity identification for demographic information has been studied soft biometric analysis, and it is essential human verification. Ethnicity remains popular receives attention in a recent year especially automatic information. Unfortunately, ethnicity technique using color-based feature mostly failed to determine the classes accurately due low properties of features color-based. Thus, this paper purposely analyses...
Threats towards the cyberspace have becoming more aggressive, intelligent and some attack at real-time. These urged both researchers practitioner to secure very root point, which refer as endpoint. The detection response endpoint must be able protect real-time good attacker. In this paper, we reviewed techniques used in response. We discovered trend shifted from traditional approaches way. Specifically, most proposed focused on machine learnings. also zoomed into these outline advantages of...