- Data Mining Algorithms and Applications
- Advanced Text Analysis Techniques
- Semantic Web and Ontologies
- Multi-Agent Systems and Negotiation
- Network Security and Intrusion Detection
- Topic Modeling
- Sports Analytics and Performance
- Service-Oriented Architecture and Web Services
- Spam and Phishing Detection
- Internet Traffic Analysis and Secure E-voting
- Sports Performance and Training
- Imbalanced Data Classification Techniques
- Natural Language Processing Techniques
- Web Data Mining and Analysis
- Advanced Malware Detection Techniques
- Recommender Systems and Techniques
- Software Engineering Research
- Text and Document Classification Technologies
- Video Analysis and Summarization
- Data Quality and Management
- Image Retrieval and Classification Techniques
- Logic, Reasoning, and Knowledge
- Artificial Intelligence in Healthcare
- Caching and Content Delivery
- Software Engineering Techniques and Practices
Tun Hussein Onn University of Malaysia
2016-2025
American University of Beirut
2025
Université Hassan 1er
2024
University Kebangsaan Malaysia Medical Centre
2018-2024
Asia Pacific University of Technology & Innovation
2023
Kebbi State University of Science and Technology
2023
Northern University of Malaysia
2022
University of the Ryukyus
2022
Universiti Teknologi MARA
2014-2021
Sultan Haji Ahmad Shah Hospital
2021
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks is yet to be offered by security systems. Incidents serious damage due DDoS have been increasing, thereby leading urgent need for new attack identification, mitigation, and prevention mechanisms. To prevent attacks, the basic features dynamically analyzed because their patterns, ports, protocols or operation mechanisms are rapidly changed manipulated. Most proposed methods different types drawbacks...
Recently, development in intelligent transportation systems (ITS) requires the input of various kinds data real-time and from multiple sources, which imposes additional research application challenges. Ongoing studies on Data Fusion (DF) have produced significant improvement ITS manifested an enormous impact its growth. This paper reviews implementation DF methods to facilitate traffic flow analysis (TFA) solutions that entail prediction variables such as driving behavior, travel time,...
Abstract Due to the wide availability of easy-to-access content on social media, along with advanced tools and inexpensive computing infrastructure, has made it very easy for people produce deep fakes that can cause spread disinformation hoaxes. This rapid advancement panic chaos as anyone easily create propaganda using these technologies. Hence, a robust system differentiate between real fake become crucial in this age media. paper proposes an automated method classify images by employing...
Nowadays, activities and decisions making in an organization is based on data information obtained from analysis, which provides various services for constructing reliable accurate process. As are significant resources all organizations the quality of critical managers operating processes to identify related performance issues. Moreover, high can increase opportunity achieving top organization. However, identifying aspects definition, dimensions, types, strategies, techniques essential equip...
Genetic algorithms (GA) are stimulated by population genetics and evolution at the level where crossover mutation comes from random variables.The problems of slow premature convergence to suboptimal solution remain an existing struggle that GA is facing.Due lower diversity in a population, it becomes challenging locally exploit solutions.In order resolve these issues, focus now on reaching equilibrium between explorative exploitative features GA.Therefore, search process can be prompted...
Intrusion detection systems (IDS) are used in analyzing huge data and diagnose anomaly traffic such as DDoS attack; thus, an efficient classification method is necessary for the IDS. The IDS models attempt to decrease false alarm increase true rates order improve performance accuracy of system. To resolve this concern, three machine learning algorithms have been tested evaluated research which decision jungle (DJ), random forest (RF) support vector (SVM). main objective propose a ML-based...
Currently, online organizational resources and assets are potential targets of several types attack, the most common being flooding attacks. We consider Distributed Denial Service (DDoS) as dangerous type attack that could target those resources. The DDoS consumes network available such bandwidth, processing power, memory, thereby limiting or withholding accessibility to users. Flash Crowd (FC) is quite similar whereby many legitimate users concurrently access a particular service, number...
When the amount of data and information is said to double in every 20 months or so, feature selection has become highly important beneficial. Further improvements will positively affect a wide array applications fields such as pattern recognition, machine learning, signal processing. Bio‐inspired method called Bat Algorithm hybridized with Naive Bayes classifier been presented this work. The performance proposed algorithm was investigated using twelve benchmark datasets from different...
Mobile ad hoc network (MANET) can be described as a group of wireless mobile nodes that form temporary dynamic and independent infrastructure or central administration facility. High energy consumption is one the main problems associated with MANET technology. The used in this process rely on batteries because does not have steady power supply. Thus, rapid battery drain reduces lifespan network. In paper, new Bat Optimized Link State Routing (BOLSR) protocol proposed to improve usage (OLSR)...
There are many difficulties and challenges involved in cars failure malfunction diagnosis. The diagnosis process involves heuristic complex series of activities requires specific skills expertise. A basic toolkit assistance software imperatives to help the car drivers at least identify source or malfunction, especially, when location event does not permit immediate help. It enables driver take an initiative knowing condition try repeat car. Expert systems widely used embody expertise into...
Depression can affect anyone, without discrimination. Therefore, this study aims to determine the relationship between level of physical fitness and depression in elderly according gender marital status. The sample used for consisted 110 men women aged 60 90 years. instrument assess was a modified senior test with 6 items: 1) 30-second chair stand test, 2) arm curl (30-second curl), 3) 2-minute step 4) sit reach 5) back scratch 6) foot rise walk test. Level Geriatric Scale -15 (GDS -15). For...
Medical Data Mining (MDM) is one of the most critical aspects automated disease diagnosis and prediction. MDM involves developing data mining algorithms techniques to analyze medical data. In recent years, liver disorders have excessively increased diseases are becoming fatal in several countries. this study, two real patient datasets were investigated for building classification models order predict diagnosis. Eleven applied performance all classifiers compared against each other terms...
The issues of modeling asscoiation football prediction model has become increasingly popular in the last few years and many different approaches models have been proposed with point evaluating attributes that lead a team to lose, draw or win match. There are three types considered for predicting matches results which include statistical approaches, machine learning Bayesian approaches. Lately, studies regarding produced using This paper proposes Networks (BNs) predict term home (H), away (A)...
Partial transmit sequence (PTS) technique is considered as one of the efficient methods to reduce high peak-to-average power ratio (PAPR) problem in 4G waveform design such orthogonal frequency division multiplexing (OFDM) systems. Filtered-OFDM (F-OFDM) a new candidate 5G development with maintaining level commonality legacy OFDM systems, but PAPR value still considerable because F-OFDM supports transmission. Although PTS improves reduction performance significantly, computational...
Abstract Tricet method of weight training is an exercise that involves using three types tools to train one group muscle in the sequence order, but with different exercises for each set and without breaks between sets. Exercise this able provide maximum response a muscles are trained so potential development more optimal. This paper investigates by giving treatment form tricet be carried out 3 times week, intensity 70% 80% or One Maximum Repetition (1RM), sets, 8-12 repetitions aim...
Flood is one of main natural disaster that happens all around the globe caused law nature. It has vast destruction huge amount properties, livestock and even loss life. Therefore, needs to develop an accurate efficient flood risk prediction as early warning system highly essential. This study aims a predictive modelling follow Cross-Industry Standard Process for Data Mining (CRISP-DM) methodology by using Bayesian network (BN) other Machine Learning (ML) techniques such Decision Tree (DT),...