Skip to main content

Research Repository

Advanced Search

Outputs (38)

Accuracy comparison of machine learning algorithms for predictive analytics in higher education (2019)
Presentation / Conference Contribution

In this research, we compared the accuracy of machine learning algorithms that could be used for predictive analytics in higher education. The proposed experiment is based on a combination of classic machine learning algorithms such as Naive Bayes an... Read More about Accuracy comparison of machine learning algorithms for predictive analytics in higher education.

Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia (2018)
Presentation / Conference Contribution

Increasing number of privately owned vehicles are depicting Malaysians preferred mode of mobility and lack of interest in the public transport system. In most developing countries such as Malaysia, motorized vehicles are the major contributors to air... Read More about Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia.

An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform (2017)
Presentation / Conference Contribution

There has been an alarming rise in the number of cyber crimes occurring lately and stealthier methodologies used by attackers, which has directly contributed to the rise of online victims. With the development of advanced persistent threats, current... Read More about An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform.

A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware (2017)
Presentation / Conference Contribution

Undeterred by numerous efforts deployed by antivirus software that shields users from various security threats, ransomware is constantly evolving as technology advances. The impact includes hackers hindering the user’s accessibility to their data, an... Read More about A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware.