default search action
Zulaiha Ali Othman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Mohammad Mashrekul Kabir, Zulaiha Ali Othman, Mohd Ridzwan Yaakub:
A Hybrid Frequency Based, Syntax, and Conditional Random Field Method for Implicit and Explicit Aspect Extraction. IEEE Access 12: 72361-72373 (2024) - [j20]Ammar Nasif, Zulaiha Ali Othman, Nor Samsiah Sani, Mohammad Kamrul Hasan, Yousra Abudaqqa:
Huffman Deep Compression of Edge Node Data for Reducing IoT Network Traffic. IEEE Access 12: 122988-122997 (2024) - [j19]Siti Malihah Mohd Yusof, Zulaiha Ali Othman, Sabrina Tiun:
Important Aspects of Food Home-Business Sales Based on Customer Review in Shopee. Int. J. Asian Bus. Inf. Manag. 15: 1-15 (2024) - 2022
- [j18]Normadiah Binti Mahiddin, Zulaiha Ali Othman, Azuraliza Abu Bakar, Nur Arzuar Abdul Rahim:
An Interrelated Decision-Making Model for an Intelligent Decision Support System in Healthcare. IEEE Access 10: 31660-31676 (2022) - 2021
- [j17]Omar Fitian Rashid, Zulaiha Ali Othman, Suhaila Zainudin, Noor Azah Samsudin:
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems. IEEE Access 9: 31892-31907 (2021) - [j16]Ammar Nasif, Zulaiha Ali Othman, Nor Samsiah Sani:
The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on IoT Nodes in Smart Cities. Sensors 21(12): 4223 (2021) - 2020
- [j15]Herman Yuliansyah, Zulaiha Ali Othman, Azuraliza Abu Bakar:
Taxonomy of Link Prediction for Social Network Analysis: A Review. IEEE Access 8: 183470-183487 (2020) - [j14]Oday A. Hassen, Ansam A. Abdulhussein, Saad M. Darwish, Zulaiha Ali Othman, Sabrina Tiun, Yasmin A. Lotfy:
Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network. Symmetry 12(10): 1699 (2020) - [j13]Mansour Alssager, Zulaiha Ali Othman, Masri Ayob, Rosmayati Mohemad, Herman Yuliansyah:
Hybrid Cuckoo Search for the Capacitated Vehicle Routing Problem. Symmetry 12(12): 2088 (2020)
2010 – 2019
- 2017
- [j12]Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, Mohd Zakree Ahmad Nazri:
Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67: 296-303 (2017) - [j11]Nur Shazila Mohamed, Suhaila Zainudin, Zulaiha Ali Othman:
Metaheuristic approach for an enhanced mRMR filter method for classification using drug response microarray data. Expert Syst. Appl. 90: 224-231 (2017) - [j10]Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, Mohd Zakree Ahmad Nazri:
Real-time multi-agent system for an adaptive intrusion detection system. Pattern Recognit. Lett. 85: 56-64 (2017) - 2016
- [j9]Abbas Madraky, Zulaiha Ali Othman, Abdul Razak Hamdan:
Hair-oriented data model for spatio-temporal data representation. Expert Syst. Appl. 59: 119-144 (2016) - [c30]Rufai Kazeem Idowu, Ravie Chandren Muniyandi, Zulaiha Ali Othman:
Integrated Membrane Computing Framework for Modeling Intrusion Detection Systems. BIC-TA (1) 2016: 336-346 - 2015
- [j8]Djoko Budiyanto Setyohadi, Azuraliza Abu Bakar, Zulaiha Ali Othman:
Optimization overlap clustering based on the hybrid rough discernibility concept and rough K-Means. Intell. Data Anal. 19(4): 795-823 (2015) - [j7]Siti Sakira Kamaruddin, Azuraliza Abu Bakar, Abdul Razak Hamdan, Fauzias Mat Nor, Mohd Zakree Ahmad Nazri, Zulaiha Ali Othman, Ghassan Saleh Hussein:
A text mining system for deviation detection in financial documents. Intell. Data Anal. 19(s1): S19-S44 (2015) - [c29]Ghassan Saleh Al-Dharhani, Zulaiha Ali Othman, Azuraliza Abu Bakar, Sharifah Mastura Syed Abdullah:
Fuzzy-Based Shapelets for Mining Climate Change Time Series Patterns. IVIC 2015: 38-50 - [c28]Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, Mohd Zakree Ahmad Nazri:
Intrusion Detection System Based on Modified K-means and Multi-level Support Vector Machines. SCDS 2015: 265-274 - 2014
- [j6]Seyed Reza Hasani, Zulaiha Ali Othman, Seyed Mostafa Mousavi Kahaki:
Hybrid Feature Selection Algorithm for Intrusion Detection System. J. Comput. Sci. 10(6): 1015-1025 (2014) - [j5]Kazeem I. Rufai, Ravie Chandren Muniyandi, Zulaiha Ali Othman:
Improving Bee Algorithm Based Feature Selection in Intrusion Detection System Using Membrane Computing. J. Networks 9(3): 523-529 (2014) - [c27]Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, Noor Maizura Mohamad Noor:
Ontology-based Decision Support System Architecture for Tendering Management. DSS 2014: 189-200 - 2013
- [j4]Moaiad Khder, Zulaiha Ali Othman, AbdullahMohdZin, Salha Abdullah:
Improving Data Availability in Mobile Environment using Data Allocation. J. Comput. Sci. 9(8): 1019-1029 (2013) - [c26]Mohammed Hasan, Siti Norul Huda Sheikh Abdullah, Zulaiha Ali Othman:
Efficient Face Recognition Technique with Aid of Active Appearance Model. FIRA 2013: 101-110 - [c25]Mohammed Hasan, Siti Norul Huda Sheikh Abdullah, Zulaiha Ali Othman:
Face recognition based on opposition particle swarm optimization and support vector machine. ICSIPA 2013: 417-424 - [e2]Shahrul Azman Noah, Azizi Abdullah, Haslina Arshad, Azuraliza Abu Bakar, Zulaiha Ali Othman, Shahnorbanun Sahran, Nazlia Omar, Zalinda Othman:
Soft Computing Applications and Intelligent Systems - Second International Multi-Conference on Artificial Intelligence Technology, M-CAIT 2013, Shah Alam, Malaysia, August 28-29, 2013. Proceedings. Communications in Computer and Information Science 378, Springer 2013, ISBN 978-3-642-40566-2 [contents] - 2012
- [j3]Arash Mousavi, Mohd Jan Nordin, Zulaiha Ali Othman:
Ontology-driven coordination model for multiagent-based mobile workforce brokering systems. Appl. Intell. 36(4): 768-787 (2012) - [c24]Abbas Madraky, Zulaiha Ali Othman, Abdul Razak Hamdan:
Hair data model: A new data model for Spatio-Temporal data mining. DMO 2012: 18-22 - [c23]Hamidah Jantan, Abdul Razak Hamdan, Zulaiha Ali Othman:
Intelligent DSS for talent management: a proposed architecture using knowledge discovery approach. ICUIMC 2012: 90:1-90:7 - [e1]Abdul Razak Hamdan, Siti Mariyam Shamsuddin, Azuraliza Abu Bakar, Zulaiha Ali Othman, Fazel Famili, Mohd Zakree Ahmad Nazri, Salwani Abdullah, Mohamed Rawidean Mohd Kassim:
4th Conference on Data Mining and Optimization, DMO 2012, Langkawi, Malaysia, September 2-4, 2012. IEEE 2012, ISBN 978-1-4673-2717-6 [contents] - 2011
- [j2]Azuraliza Abu Bakar, Zulaiha Ali Othman, Abdul Razak Hamdan, Rozianiwati Yusof, Ruhaizan Ismail:
An agent model for rough classifiers. Appl. Soft Comput. 11(2): 2239-2245 (2011) - [c22]Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, Noor Maizura Mohamad Noor:
Ontological-Based Information Extraction of Construction Tender Documents. AWIC 2011: 153-162 - [c21]Zulaiha Ali Othman, Entisar E. Eljadi:
Network anomaly detection tools based on association rules. ICEEI 2011: 1-7 - [c20]Zulaiha Ali Othman, Juhana Salim, Zainal Badli:
Web screening model using multiple features. ICEEI 2011: 1-6 - [c19]Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, Noor Maizura Mohamad Noor:
Automatic Recognition of Document Structure from PDF Files. ICSECS (3) 2011: 274-282 - [c18]Zulaiha Ali Othman, Abdul Razak Hamdan, Azuraliza Abu Bakar, Suhaila Zainudin, Hafiz Mohd Sarim, Mohd Zakree Ahmad Nazri, Zalinda Othman, Salwani Abdullah, Masri Ayob, Ahmad Tarmizi Abdul Ghani:
MYNDA - An Intelligent Data Mining Application Generator. IVIC (2) 2011: 217-230 - 2010
- [c17]Djoko Budiyanto Setyohadi, Azuraliza Abu Bakar, Zulaiha Ali Othman:
An Improved Rough Clustering Using Discernibility Based Initial Seed Computation. ADMA (1) 2010: 161-168 - [c16]Zulaiha Ali Othman, Azuraliza Abu Bakar, Intesar Etubal:
Improving signature detection classification model using features selection based on customized features. ISDA 2010: 1026-1031 - [c15]Hamidah Jantan, Abdul Razak Hamdan, Zulaiha Ali Othman:
Classification and Prediction of Academic Talent Using Data Mining Techniques. KES (1) 2010: 491-500 - [i1]Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, Noor Maizura Mohamad Noor:
Decision Support Systems (DSS) in Construction Tendering Processes. CoRR abs/1004.3260 (2010)
2000 – 2009
- 2009
- [c14]Hamidah Jantan, Abdul Razak Hamdan, Zulaiha Ali Othman:
Classification Techniques for Talent Forecasting in Human Resource Management. ADMA 2009: 496-503 - [c13]Hamidah Jantan, Abdul Razak Hamdan, Zulaiha Ali Othman:
Classification for talent management using Decision Tree Induction techniques. DMO 2009: 15-20 - [c12]Nur Shazila Mohamed, Zulaiha Ali Othman, Azuraliza Abu Bakar:
A classification of "Gracilaria changii" protein sequences using back-propagation classifier. DMO 2009: 94-99 - [c11]Azuraliza Abu Bakar, Zulaiha Ali Othman, Nor Liyana Mohd Shuib:
Building a new taxonomy for data discretization techniques. DMO 2009: 132-140 - [c10]Helmi Md Rais, Zulaiha Ali Othman, Abdul Razak Hamdan:
Improvement DACS3 searching performance using local search. DMO 2009: 160-166 - [c9]Hamidah Jantan, Abdul Razak Hamdan, Zulaiha Ali Othman:
Potential Data Mining Classification Techniques for Academic Talent Forecasting. ISDA 2009: 1173-1178 - [c8]Halimah Badioze Zaman, Azlina Ahmad, Tengku M. T. Sembok, Sufian Bin Idris, Shahrul Azman Mohd. Noah, Azuraliza Abu Bakar, Zulaiha Ali Othman, Nazlia Omar, Salwani Abdullah, A. Sanep, M. T. Hailani, M. Z. Zaher, Azizah Jaafar, M. Y. Nor Faezah, W. O. Choo, Chew Abdullah, B. Sopian:
Multi-tiered S-SOA, Parameter-Driven New Islamic Syariah Products of Holistic Islamic Banking System (HiCORE): Virtual Banking Environment. IVIC 2009: 288-301 - [c7]Zulaiha Ali Othman, Azuraliza Abu Bakar, Zalinda Othman, Suzanna Rosli:
Development of the Data Preprocessing Agent's Knowledge for Data Mining Using Rough Set Theory. RSKT 2009: 86-93 - 2008
- [j1]Moutaz Saleh Mustafa, Zulaiha Ali Othman:
Efficient scheduling discipline for Hierarchical Diff-EDF. Int. J. Netw. Manag. 18(3): 279-294 (2008) - [c6]Moutaz Saleh Mustafa, Zulaiha Ali Othman:
Efficient Hierarchical Diff-EDF schedulability for QoS packet networks. AICCSA 2008: 815-819 - [c5]Moutaz Saleh Mustafa, Zulaiha Ali Othman, Abdullah Mohd Zin:
ASRTS: An Agent-Based Simulator for Real-Time Schedulers. Asia International Conference on Modelling and Simulation 2008: 7-12 - [c4]Azuraliza Abu Bakar, Zulaiha Ali Othman, Abdul Razak Hamdan, Rozianiwati Yusof, Ruhaizan Ismail:
An Agent Based Rough Classifier for Data Mining. ISDA (1) 2008: 145-151 - 2007
- [c3]Moutaz Saleh Mustafa, Zulaiha Ali Othman:
Adaptive Scheduling for Real-Time Network Traffic Using Agent-Based Simulation. ICCSA (3) 2007: 248-261 - [c2]Jawed I. A. Siddiqi, Zulaiha Ali Othman, Nazaraf Shah, Babak Akhgar:
Multi-Agent System Engineering: A Methodology and Software Abstractions for Designing Agent Based Systems. Software Engineering Research and Practice 2007: 254-260 - 2004
- [b1]Zulaiha Ali Othman:
Using software abstraction to develop an agent-based system. Sheffield Hallam University, UK, 2004 - 2003
- [c1]Saeedeh Maleki-Dizaji, Zulaiha Ali Othman, Henry O. Nyongesa, Jawed I. A. Siddiqi:
Evolutionary Reinforcement of User Models in an Adaptive Search Engine. Web Intelligence 2003: 706-709
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint