- Software Engineering Research
- Cloud Computing and Resource Management
- Service-Oriented Architecture and Web Services
- Cloud Data Security Solutions
- Technology Adoption and User Behaviour
- Big Data and Business Intelligence
- Software Engineering Techniques and Practices
- Software Reliability and Analysis Research
- Advanced Software Engineering Methodologies
- Halal products and consumer behavior
- Semantic Web and Ontologies
- Software System Performance and Reliability
- Business Process Modeling and Analysis
- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Software Testing and Debugging Techniques
- Data Quality and Management
- Organizational and Employee Performance
- Advanced Malware Detection Techniques
- Model-Driven Software Engineering Techniques
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Artificial Intelligence in Healthcare
- Web Data Mining and Analysis
- Text and Document Classification Technologies
Universiti Putra Malaysia
2016-2025
Sultan Sharif Ali Islamic University
2022
State University of Malang
2021
Serdang Hospital
2009-2016
Information Technology University
2011-2012
Healthcare systems are transformed digitally with the help of medical technology, information systems, electronic records, wearable and smart devices, handheld devices. The advancement in big data, along availability new computational models field healthcare, has enabled caretakers researchers to extract relevant visualize healthcare data a spectrum. role becomes challenging task form storage, required retrieval within limited time, cost efficient solutions terms care, many others. Early...
Cloud computing (CC) delivers services for organizations, particularly higher education institutions (HEIs) anywhere and anytime, based on scalability pay-per-use approach. Examining the factors influencing decision-makers’ intention towards adopting CC plays an essential role in HEIs. Therefore, this study aimed to understand predict key determinants that drive managerial perspectives technology. The data were gathered from 134 institutional managers, involved decision making of...
Safeguarding the high quality of halal food products is a new realm to explore with advent technologies. The efficiency industry management has boosted applicability product traceability system aid internet things (IoT). Traceability use IoT facilitated players in managing their information along supply chain. As one key players, agro-food small and medium enterprises (SMEs) are reportedly yet embrace adoption IoT. With IoT, SMEs chain undoubtedly provided trusted platform. However, related...
Business processes have an inherent complexity which if not controlled can keep on increasing with time, thus making the error-prone, difficult to understand and maintain. In last few years, several researchers proposed a number of metrics be used measure therefore control business processes. this study, survey process is conducted goal investigating there are any gaps in literature. Initially, description definition validation presented, followed by analysis that appeared literature 5...
The significance of big data advancement has benefited various organizations to leverage the potential insights and capabilities in organizational performance decision-making.However, analytics outcome quality (BDA) implementation yet be addressed.Therefore aims this paper are identify analyze affecting factors elements BDA propose a conceptual model for effective decision-making through assessment.The is developed based on three dimensions such as performing strategy (organization),...
Big data analytics (BDA) readiness factors have been widely researched; nevertheless, few investigated the impact and success of BDA implementation in organizational context. The relevance quality outcomes a significant concern to leaders supporting them for strategic decision-making. To that end, objective this study is twofold. Firstly, it investigates influencing effective Secondly, adds body knowledge information system (IS) domain, especially with its focus on packages. Based 18...
Telemarketing is a type of direct marketing where salesperson contacts the customers to sell products or services over phone. The database prospective comes from database. It important for company predict set with highest probability accept sales offer based on their personal characteristics behavior during shopping. Recently, companies have started resort data mining approaches customer profiling. This project focuses helping banks increase accuracy profiling through classification as well...
This study investigates the role of sacrificial meat logistics in enhancing consumer trust and improving quality life, with a focus on underserved communities. Using survey 328 respondents, research examines impact packaging innovations, distribution systems, halal logistics, religious compliance. Structural model analysis reveals that packaging, distribution, significantly enhance trust, which mediates life improvement. Religious compliance, while culturally essential, showed no direct...
The computing power in a cloud environments is supplied by collection of data centers, or storages (CDSs) housed many different locations and interconnected high speed networks. CDS, like any other emerging technology, experiencing growing pains. Data integrity checking structures has grown importance recently due to the expansion online services, which have become reliable scalable. In this paper we propose an layered architecture typical based on MAS consists two main layers resources...
Currently, higher learning institutions (HLIs) are facing their most challenging problem in inefficient information management. The knowledge management system (KMS) application calls for providing several benefits to lecturers and students, producing daily information, documenting records evidence of a transaction, eventually improving the decision-making process. Knowledge can be coupled with fuzzy logic deal imprecision uncertainty data KMS. ICT dynamic development has shifted HLI...
The purpose of this literature review is to provide the information about illustrating usage Multi-Agent System (MAS) techniques that can be beneficial in cloud computing platform facilitate security data storage (CDS) among it. MAS are often distributed and agents have proactive reactive features which very useful for (CDSS). architecture system formed from a set agent's communities. This paper described on theoretical concept approach framework as well could implemented order CDS, how...
Higher Education Institutions (HEIs) consider resource optimization as an essential concern. Cloud computing (CC) in the fourth industrial revolution became de-facto standard for delivering IT resources and services. CC is now a mainstream technology, andHEIs across globe are rapidly transitioning to this model; hence, maintaining retention of customers such technologies challenging cloud service providers. Current research concerning focused on adoption acceptance. However, there still...
Service Level Agreement (SLA) is a document contract between the service provider and recipient which expected services to be delivered received. SLA includes all information about provided their performance. The identified level of performance such as penalties, priorities, compensation resolution time. If quality does not meet usage then need pay penalties also known violation. violation occurred might from software or hardware but another factor human involved. system requires...
Cloud computing environment is required an efficiency security techniques due it's contains a numbered of assets such as data, users, technologies, resources and business transactions. Multi Agent system (MAS) architecture critical to ensure high facilitation based on the way its development. A framework MAS facilitate confidentiality, correctness assurance, availability integrity collaborative cloud data storage (CDS) proposed. In order verify our proposed architecture, pilot study...
The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud is utilization many servers/data centers or data storages (CDSs) housed in different locations and interconnected by high speed networks. CDS, like any other emerging technology, experiencing growing pains. It immature, it fragmented lacks standardization. Although issues are delaying its fast adoption, an unstoppable force we need to provide mechanisms ensure secure adoption. In...
Security plays an important role in the development of Multi Agent Systems (MAS). However, a careful analysis software processes shows that definition security requirements is, usually, considered after design system. This mainly, due to fact agent oriented engineering methodologies have not integrated concerns throughout their developing stages. Designing team agents can work together toward common goal is one challenges research area agent-oriented engineering. Prometheus methodology. The...