Nilam Nur Amir Sjarif

ORCID: 0000-0003-4969-9708
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Big Data and Business Intelligence
  • Network Security and Intrusion Detection
  • Video Surveillance and Tracking Methods
  • Advanced Malware Detection Techniques
  • Biometric Identification and Security
  • Stock Market Forecasting Methods
  • Text and Document Classification Technologies
  • Advanced Steganography and Watermarking Techniques
  • Customer churn and segmentation
  • Energy Load and Power Forecasting
  • Handwritten Text Recognition Techniques
  • Face recognition and analysis
  • Hand Gesture Recognition Systems
  • Human Pose and Action Recognition
  • Spam and Phishing Detection
  • Vehicle License Plate Recognition
  • Sentiment Analysis and Opinion Mining
  • Housing Market and Economics
  • Data Visualization and Analytics
  • IoT and Edge/Fog Computing
  • Gait Recognition and Analysis
  • Phonocardiography and Auscultation Techniques
  • Remote-Sensing Image Classification
  • Open Source Software Innovations
  • User Authentication and Security Systems

University of Technology Malaysia
2015-2024

Universiti Tun Abdul Razak
2019-2024

University of Kuala Lumpur
2019

Biometric systems such as signature verification are highly viable in order to identify individuals organizations or finance divisions. Advancement classification of images using deep learning networks has opened an opportunity for this problem. In study, the largest available handwritten dataset, namely, GPDS Synthetic Signature Database, was employed signatures 1000 users, each which having 24 original (or genuine) signatures, and 30 forged fake) signatures. Moreover, two popular GoogLeNet...

10.1016/j.procs.2019.11.147 article EN Procedia Computer Science 2019-01-01

The daily traffic of Short Message Service (SMS) keeps increasing. As a result, it leads to dramatic increase in mobile attacks such as spammers who plague the service with spam messages sent groups recipients. Mobile spams are growing problem number keep increasing day by even filtering systems. Spams defined unsolicited bulk various forms unwanted advertisements, credit opportunities or fake lottery winner notifications. Spam classification has become more challenging due complexities...

10.1016/j.procs.2019.11.150 article EN Procedia Computer Science 2019-01-01

Organization with considerable investment into data warehousing, the influx of various types and forms requires certain ways prepping staging platform that support fast, efficient volatile to reach its targeted audiences or users different business needs. Extract, Transform Load (ETL) system proved be a choice standard for managing sustaining movement transactional process valued big assets. However, traditional ETL can no longer accommodate effectively handle streaming near real-time...

10.1109/icriis.2017.8002467 article EN 2017-07-01

Handwritten recognition (HWR) is the ability of a computer to receive and interpret intelligible handwritten input from source such as paper documents, photographs, touch-screens other devices. In this we will using three (3) classification t o re cognize which SVM, KNN Neural Network.

10.48550/arxiv.1702.00723 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Distributed software development (DSD) has grown rapidly over the last few years and present definite risk to industry which need be carefully analyzed managed. The risks relating DSD include lack of trust, ineffective communication, time zone difference, cultural differences such as language corporate culture along with knowledge sharing challenges. Software management approach in DSD, however, is still inadequate needed further attention. aim this paper identify components involved process...

10.1016/j.procs.2019.11.113 article EN Procedia Computer Science 2019-01-01

Multi-step stock index forecasting is vital in finance for informed decision-making. Current methods this task frequently produce unsatisfactory results due to the inherent randomness and instability of data, thereby underscoring demand advanced models. Given superiority capsule network (CapsNet) over CNNs various classification tasks, study investigates potential integrating a 1D CapsNet with an LSTM multi-step forecasting. To end, hybrid 1D-CapsNet-LSTM model introduced, which utilizes...

10.1016/j.jksuci.2024.101959 article EN cc-by Journal of King Saud University - Computer and Information Sciences 2024-02-01

In recent years, we have withnessed a dramatic increment volume in the number of mobile users grows telecommunication industry. However, this leads to drastic increase spam SMS messages. Short Message Service (SMS) is considered one widely used communication service. reality, most ignore because lower rate and limited amount classification tools. paper, propose Support Vector Machine (SVM) algorithm for Spam Classification. as effective data mining techniques. The been evaluated using public...

10.18517/ijaseit.10.2.10175 article EN cc-by-sa International Journal on Advanced Science Engineering and Information Technology 2020-04-17

Mobile Business Intelligence (BI) is the ability to access BI-related data such as key performance indicators (KPIs), business metric and dashboard through mobile device. BI addresses use-case of remote or workers that need on-demand business-critical data. User acceptance on an essential in order identify which factors influence user application. Research model organizational decision-making limited due novelty newly emerged innovation. In answer gap adoption decision-making, this paper...

10.11591/eei.v7i4.1356 article EN Bulletin of Electrical Engineering and Informatics 2018-12-01

Face recognition is a biometric technique that has been widely used in many fields. Most of the face applications are security and surveillance system. However, due to current pandemic, wearing facemasks an obligation for everybody public places. Hence, will encounter problem such as extracting facial features blockage caused by facemasks. Thus, it lower down rate level. The collected dataset consists two categories which masked unmasked face. This called FaceMask Dataset was obtained from...

10.1109/cspa52141.2021.9377283 article EN 2021-03-05

Cardiovascular diseases (CVDs) are a prevalent cause of mortality worldwide, and the traditional cardiovascular disease diagnosis has relied heavily on stethoscope-based heart sound auscultations. Hence, development medical systems led to several machine learning (ML)-related studies for analysing sounds using phonocardiograms (PCGs). Although this process enables detection additional mechanical activity information about muscle, various crucial gaps (background noise, unbalanced datasets,...

10.1109/access.2024.3432309 article EN cc-by-nc-nd IEEE Access 2024-01-01

The most sensitive Arabic text available online is the digital Holy Quran. This sacred Islamic religious book recited by all Muslims worldwide including non-Arabs as part of their worship needs. Thus, it should be protected from any kind tampering to keep its invaluable meaning intact. Different characteristics letters like vowels (), Kashida (extended letters), and other symbols in Quran must secured alterations. cover watermarked are different due low values Peak Signal Noise Ratio (PSNR)...

10.32604/cmc.2021.015803 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

Sustainable software engineering is a mean of developing sustainable with process activities while balancing its various dimensions for instance economic, environmental, social, technical and individual. It conveyed that the technical, environmental social are explored to satisfactory degree however individual dimension which concerned wellbeing engineers not respect understanding challenges. Therefore, aim study highlight prioritize challenges regarding sustainability dimension. The also...

10.18517/ijaseit.10.2.10190 article EN International Journal on Advanced Science Engineering and Information Technology 2020-04-19

Ear biometrics is one of the primary that definitely standing out. recognition enjoys special benefits and can make distinguishing proof safer dependable along with other (for example fingerprints face). Particularly as a supplement to face schemes experience issues in genuine circumstances. This because extraordinary variety planar representation confusing object varied shapes, illumination, profile shape. study an endeavor conquer these restrictions, by proposing scale-invariant feature...

10.47839/ijc.22.3.3236 article EN cc-by International Journal of Computing 2023-10-01

<span style="font-size: 9pt; font-family: 'Times New Roman', serif;">Ethnicity identification for demographic information has been studied soft biometric analysis, and it is essential human verification. Ethnicity remains popular receives attention in a recent year especially automatic information. Unfortunately, ethnicity technique using color-based feature mostly failed to determine the classes accurately due low properties of features color-based. Thus, this paper purposely analyses...

10.11591/ijeecs.v18.i3.pp1383-1390 article EN Indonesian Journal of Electrical Engineering and Computer Science 2020-02-09

Threats towards the cyberspace have becoming more aggressive, intelligent and some attack at real-time. These urged both researchers practitioner to secure very root point, which refer as endpoint. The detection response endpoint must be able protect real-time good attacker. In this paper, we reviewed techniques used in response. We discovered trend shifted from traditional approaches way. Specifically, most proposed focused on machine learnings. also zoomed into these outline advantages of...

10.1109/ictc46691.2019.8939836 article EN 2021 International Conference on Information and Communication Technology Convergence (ICTC) 2019-10-01
Coming Soon ...