selected publications academic article Sentiment and Emotion Analysis with Large Language Models for Political Security Prediction Framework. International Journal of Advanced Computer Science and Applications. 16. 2025 A Review on Deep Learning Approaches and Optimization Techniques For Political Security Threat Prediction. JOIV : International Journal on Informatics Visualization. 8:1082. 2024 Decentralised Access Control Framework using Blockchain: Smart Farming Case. International Journal of Advanced Computer Science and Applications. 14. 2023 Optical Flow-Based Algorithm Analysis to Detect Human Emotion from Eye Movement-Image Data. Journal of Image and Graphics. 11:53-60. 2023 Political Security Threat Prediction Framework Using Hybrid Lexicon-Based Approach and Machine Learning Technique. IEEE Access. 11:17151-17164. 2023 Comparative Assessment of Data Mining Techniques for Flash Flood Prediction. International Journal of Advances in Soft Computing and its Applications. 14:126-145. 2022 Decentralized Access Control using Blockchain Technology for Application in Smart Farming. International Journal of Advanced Computer Science and Applications. 13. 2022 ESTABLISHMENT OF BIG DATA ANALYTICS APPLICATION MODEL FOR MALAYSIAN PUBLIC SECTOR: AN EXPERT VALIDATION. EDPACS. 65:1-20. 2022 Factors Influencing Users’ Satisfaction Towards Image Use in Social Media: A PLS-SEM Analysis. International Journal of Interactive Mobile Technologies (iJIM). 16:172-186. 2022 Exploring and Developing an Industrial Automation Acceptance Model in the Manufacturing Sector Towards Adoption of Industry 4.0. Manufacturing Technology. 21:434-446. 2021 Exploring big data traits and data quality dimensions for big data analytics application using partial least squares structural equation modelling. Journal of Big Data. 8:49. 2021 HOW POPULAR IS SOCIAL MEDIA IMAGE GRATIFICATION AS A RESEARCH THEME IN TOP JOURNALS?. Malaysian Journal of Computer Science. 75-84. 2021 Opinion mining for national security: techniques, domain applications, challenges and research opportunities. Journal of Big Data. 8:150. 2021 Conceptual Model for Connected Vehicles Safety and Security using Big Data Analytics. International Journal of Advanced Computer Science and Applications. 11. 2020 Correlation between Military Character Strengths and Leaders of Character in Software Development Process among Computer Science Students. International Journal of Information and Education Technology. 10:763-767. 2020 Evaluation of Blockchain-based Data Sharing Acceptance among Intelligence Community. International Journal of Advanced Computer Science and Applications. 11. 2020 Exploring Students’ Feedback in Online Assessment System Using Opinion Mining Technique. International Journal of Information and Education Technology. 10:664-668. 2020 Opinion mining technique for developing student feedback analysis system using lexicon-based approach (OMFeedback). Education and Information Technologies. 25:2549-2560. 2020 Identifying priority antecedents of educational data mining acceptance using importance-performance matrix analysis. Education and Information Technologies. 24:1741-1752. 2019 Product Feature Ranking and Popularity Model based on Sentiment Comments. International Journal of Advanced Computer Science and Applications. 9. 2018 Educational data mining acceptance among undergraduate students. Education and Information Technologies. 22:1195-1216. 2017 chapter Unraveling Social Media’s Issues on Public Opinion and Activism: A Thematic Review. CSR, Sustainability, Ethics & Governance. 155-163. 2024 National Sport Institute Case: Automated Data Migration Using Talend Open Studio with ‘Trickle Approach’. Lecture Notes in Computer Science. 214-223. 2021 Technology Adoption Models: Users’ Online Social Media Behavior Towards Visual Information. Lecture Notes in Electrical Engineering. 15-26. 2021 The Mediating Role of Cloud Computing and Moderating Influence of Digital Organizational Culture Towards Enhancing SMEs Performance. Lecture Notes in Computer Science. 447-458. 2021 The Assessment of Trust in Information Security Using Kansei. Advances in Intelligent Systems and Computing. 194-202. 2020 Disaster Management Support Model for Malaysia. Lecture Notes in Computer Science. 570-581. 2019 Enhance Multi-factor Authentication Model for Intelligence Community Access to Critical Surveillance Data. Lecture Notes in Computer Science. 560-569. 2019 Identifying Fake Account in Facebook Using Machine Learning. Lecture Notes in Computer Science. 441-450. 2019 conference paper Application to Detect Driver Distraction Using Haar Cascade Method. 40-44. 2023 Staying Safe Online: Security Measures by University Students to Secure Privacy. 572-576. 2023 Conceptual model for prediction of individual risk in developing colorectal cancer (CRC) using hybrid meta-analysis and machine learning techniques. AIP Conference Proceedings. 020002. 2022 Evaluation of industrial automation acceptance model for manufacturing sector towards adoption of industry 4.0. AIP Conference Proceedings. 030003. 2022 Opinion mining hybrid technique to classify people’s emotions in text using Kansei and lexicon-based approach for national security domain. AIP Conference Proceedings. 030001. 2022 Vehicles congestion prediction based on machine learning techniques using OpenCV and orange. AIP Conference Proceedings. 020005. 2022 Review on Fake News in Malaysia during the Movement Control Order (MCO) from the Ethics in ICT Perspective. 461-465. 2021 A new Euler scheme based on harmonic-polygon approach for solving first order ordinary differential equation. AIP Conference Proceedings. 020102. 2017 The importance of TALIB system using computer controlled for visual impaired community. 936-940. 2010 Predicting NDUM Student's Academic Performance Using Data Mining Techniques. 357-361. 2009