Zirawani Baharum
Universiti Kuala Lumpur

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

A model of determinants for continuous usage of business intelligence in Malaysian manufacturing organizations using theoretical Ernie Mazuin Mohd Yusof; Mohd Shahizan Othman; Ahmad Rizal Mohd Yusof; Zirawani Baharum
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v18.i3.pp1439-1445

Abstract

Business Intelligence (BI) offered many advantages to organizations adopting the system such as improved decision making and boost organization’s performance. The lack of research on the continuous usage of BI in manufacturing motivates the initiative in this study to have an understanding of the determinants that influenced it. The study proposed a model of individual-related determinants that lead to the continuous usage of BI in manufacturing. A model integrating Unified Theory of Acceptance and Use of Technology (UTAUT) and Information System Continuance Model (ISCM) will be developed. The model will portray 20 hypotheses and 11 determinants leading continuance usage of BI. Data will be collected through survey questionnaires instrument and validated using Structural Equation Modelling (SEM). The result is hoping to show significant relationships between the determinants towards the continuous usage of BI in manufacturing. The study can potentially be used to guide manufacturers and practitioners for considerations in implementing BI in the manufacturing industry. 
Simulation Model on Movement of Goods in Sea Freight for Small and Medium Enterprise Zirawani Baharum; Muhammad Hanif; Muhammad Imran Qureshi; Syazwa Nabila Mohd Raidzuan; Hairulnizam Mahdin
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i3.pp1214-1222

Abstract

Sea transportation is one of the major transportation in the scope of transport industry and plays important role towards the growth of performance in the industry that involves the movement of good (MOG). With the crucial operations, it is also essential to concern about the employee’s welfare, such as long working hours that occurred due to non-systematic procedure for the MOG. The long working hours been potentitially impact to the psychological factors of works stress and physical and health effects. Therefore, this research is important to be studied in order to develop the simulation model on MOG in sea freight for small and medium-sized enterprises (SMEs), effectively and efficiency. Initially, this research is startup by defining all existed activities with the duration as required. Subsequently, the business model of MOG in sea freight is developed according to the case study in order to develop the simulation model. This research is give a guide for future research towards providing a well-computer-based by applying the decision support system, especially to manage and control the movement of goods in sea freight.
Internet of things: security requirements, attacks and counter measures Maria Imdad; Deden Witarsyah Jacob; Hairulnizam Mahdin; Zirawani Baharum; Shazlyn Milleana Shaharudin; Mohd Sanusi Azmi
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v18.i3.pp1520-1530

Abstract

Internet of Things (IoT) is a network of connected and communicating nodes. Recent developments in IoT have led to advancements like smart home, industrial IoT and smart healthcare etc. This smart life did bring security challenges along with numerous benefits. Monitoring and control in IoT is done using smart phone and web browsers easily.  There are different attacks being launched on IoT layers on daily basis and to ensure system security there are seven basic security requirements which must be met. Here we have used these requirements for classification and subdivided them on the basis of attacks, followed by degree of their severity, affected system components and respective countermeasures. This work will not only give guidelines regarding detection and removal of attacks but will also highlight the impact of these attacks on system, which will be a decision point to safeguard  system from high impact attacks on priority basis.
A scoping review of topic modelling on online data Mohd Mukhlis Mohd Sharif; Ruhaila Maskat; Zirawani Baharum; Kamaruzaman Maskat
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1633-1641

Abstract

With the increasing prevalence of unstructured online data generated (e.g., social media, online forums), mining them is important since they provide a genuine viewpoint of the public. Due to this significant advantage, topic modelling has become more important than ever. Topic modelling is a natural language processing (NLP) technique that mainly reveals relevant topics hidden in text corpora. This paper aims to review recent research trends in topic modelling and state-of-the-art techniques used when dealing with online data. Preferred reporting items for systematic reviews and meta-analysis (PRISMA) methodology was used in this scoping review. This study was conducted on recent research works published from 2020 to 2022. We constructed 5 research questions for the interest of many researchers. 36 relevant papers revealed that more work on non-English languages is needed, common pre-processing techniques were applied to all datasets regardless of language e.g., stop word removal; latent dirichlet allocation (LDA) is the most used modelling technique and also one of the best performing; and the produced result is most evaluated using topic coherence. In conclusion, topic modelling has largely benefited from LDA, thus, it is interesting to see if this trend continues in the future across languages.