Search Results - "Wook, Muslihah"
-
1
Exploring big data traits and data quality dimensions for big data analytics application using partial least squares structural equation modelling
Published in Journal of big data (23-03-2021)“…The popularity of big data analytics (BDA) has boosted the interest of organisations into exploiting their large scale data. This technology can become a…”
Get full text
Journal Article -
2
Opinion mining for national security: techniques, domain applications, challenges and research opportunities
Published in Journal of big data (04-12-2021)“…Background Opinion mining, or sentiment analysis, is a field in Natural Language Processing (NLP). It extracts people’s thoughts, including assessments,…”
Get full text
Journal Article -
3
Political Security Threat Prediction Framework using Hybrid Lexicon-based Approach and Machine Learning Technique
Published in IEEE access (01-01-2023)“…The internet offers a powerful medium for expressing opinions, emotions and ideas, using online platforms supported by smartphone usage and high internet…”
Get full text
Journal Article -
4
Opinion mining technique for developing student feedback analysis system using lexicon-based approach (OMFeedback)
Published in Education and information technologies (01-07-2020)“…Online assessment systems are increasingly utilised as an evaluation tool for measuring the performance of lecturers in Institutions of Higher Learning (IHLs)…”
Get full text
Journal Article -
5
Identifying priority antecedents of educational data mining acceptance using importance-performance matrix analysis
Published in Education and information technologies (16-03-2019)“…Previous studies on educational data mining (EDM) acceptance were focused on antecedents that were adopted from various models and theories. However, the ways…”
Get full text
Journal Article -
6
Staying Safe Online: Security Measures by University Students to Secure Privacy
Published in 2023 11th International Conference on Information and Education Technology (ICIET) (18-03-2023)“…Security measures are meant to protect the three key principles of security which are confidentiality, integrity and accountability. Previous research has…”
Get full text
Conference Proceeding -
7
A Review on Deep Learning Approaches and Optimization Techniques For Political Security Threat Prediction
Published in JOIV : international journal on informatics visualization Online (30-09-2024)“…In an era of complex geopolitical dynamics and evolving security threats, the accurate prediction and proactive management of political security risks are…”
Get full text
Journal Article -
8
Application to Detect Driver Distraction Using Haar Cascade Method
Published in 2023 IEEE Symposium on Wireless Technology & Applications (ISWTA) (15-08-2023)“…Road accidents are a terrible fact of life. A traffic collision is usually mentioned in at least one of the daily news reports in Malaysia. The number of…”
Get full text
Conference Proceeding -
9
ESTABLISHMENT OF BIG DATA ANALYTICS APPLICATION MODEL FOR MALAYSIAN PUBLIC SECTOR: AN EXPERT VALIDATION
Published in EDPACS (03-04-2022)“…These days, Big Data (BD) and Big Data Analytics (BDA) applications have increased intensively among public and private organisations. Most organisations are…”
Get full text
Journal Article -
10
Educational data mining acceptance among undergraduate students
Published in Education and information technologies (01-05-2017)“…The acceptance of Educational Data Mining (EDM) technology is on the rise due to, its ability to extract new knowledge from large amounts of students’ data…”
Get full text
Journal Article -
11
Data Mining Technology Adoption in Institutions of Higher Learning: A Conceptual Framework Incorporating Technology Readiness Index Model and Technology Acceptance Model 3
Published in Journal of applied sciences (Asian Network for Scientific Information) (01-01-2014)“…The adoption of Data Mining Technology (DMT) is on the rise due to its ability to discover hidden knowledge amongst large amounts of data. This technology is…”
Get full text
Journal Article -
12
Review on Fake News in Malaysia during the Movement Control Order (MCO) from the Ethics in ICT Perspective
Published in 2021 9th International Conference on Information and Education Technology (ICIET) (27-03-2021)“…Prevalence of fake news during the movement control order (MCO) could be seen through disclaimers made by the Ministry of Communications and Multimedia…”
Get full text
Conference Proceeding -
13
The importance of TALIB system using computer controlled for visual impaired community
Published in 2010 International Symposium on Information Technology (01-06-2010)“…This paper presents the advantages and importants of the information technology to the visual impaired community to transform the knowledge from normal text…”
Get full text
Conference Proceeding -
14
Predicting NDUM Student's Academic Performance Using Data Mining Techniques
Published in 2009 Second International Conference on Computer and Electrical Engineering (01-12-2009)“…The ability to predict the students' academic performance is very important in institution educational system. Recently some researchers have been proposed…”
Get full text
Conference Proceeding