Match!
Musab A. M. Ali
Management and Science University
EngineeringControl engineeringComputer scienceGSMRobot
19Publications
3H-index
16Citations
What is this?
Publications 25
Newest
#2Musab A. M. Ali (Management and Science University)H-Index: 3
Last. Nooritawati Md Tahir (UiTM: Universiti Teknologi MARA)H-Index: 12
view all 3 authors...
This paper has identified user requirement of IT Risk Management for IT audit, designed web-based of the IT audit with the detail of tool development. Methodology consisting of the system design, development and implementation which covered problem awareness, description of requirement, suggestions, development, evaluation and usability testing. This paper has developed a fundamental foundation for ITA of Oman by using Design Research methodology and applying UML technique for analysing and desi...
Source
#2Musab A. M. Ali (Management and Science University)H-Index: 3
view all 3 authors...
Biometric authentication method based on image processing has obtained considerable attention. Images captured have its unique features especially the variance between objects and background. Hence n this paper, an automatic approach for personal recognition using deep learning algorithm namely the Basic Alexnet model that utilized the SVM algorithm for classification is proposed. The proposed algorithm consists of the following: data acquisition, designing the architecture of the Deep Learning ...
Source
#2Musab A. M. Ali (Management and Science University)H-Index: 3
Last. Nooritawati Md Tahir (UiTM: Universiti Teknologi MARA)H-Index: 12
view all 4 authors...
It is indeed vital for software development industry to increase the success rate of projects and productivity as well. However, several studies have reported that software projects which is the core of a software development industry are suffering from a high rate of failure or deficiency in productivity. It is well known that developers and any related factors are the main players in ensuring successful of projects and understanding the factors that contributed towards developers' engagement a...
Source
#2Musab A. M. Ali (Management and Science University)H-Index: 3
Last. Nooritawati Md Tahir (UiTM: Universiti Teknologi MARA)H-Index: 12
view all 4 authors...
In this study, the Region-based Convolutional Neural Network (R-CNN) is utilised for object detection in the MATLAB simulation environment. This involves the basic R-CNN model that uses the SVM algorithm for classification. Firstly, total images of 911 acquired and captured from desert environment acted as the database in this study. The reason for choosing this type of images are due to the unique features specifically variances between objects and background and this is indeed different from c...
Source
#2Musab A. M. Ali (Management and Science University)H-Index: 3
Last. Shahad Al-yousif (Dijlah University College)
view all 3 authors...
the goal of this article is to explore the factors of intent and acceptance of transit to new enterprise resource planning venture in Universities. The article outcome is the development of a model that may help the higher education market in their decision-making procedure for ERP adoption and execution. Higher education institutions (HEIs) are looking at organisation models for management of processes and innovations that resolve the continuous pressure connected with the regulating increasing...
Source
#1Faisel Mohamed Elbahri (Civil Aviation Authority)H-Index: 1
#2Omar Ismael Al-Sanjary (Management and Science University)H-Index: 3
Last. Omar Ahmed Ibrahim (University of Mosul)H-Index: 1
view all 4 authors...
Enterprise Resource Planning (ERP) become an essential information system for most organization. With the revolution of cloud computing and its advantages, the cloud ERP system become an attractive option. The aim of this paper are to make a good comparison of the different cloud ERP systems and give advice and recommendations on the use of any kind of system. ERP systems are now the backbone of many companies to collect business data from a different department in a single database and allow em...
Source
#1Musab A. M. Ali (Management and Science University)H-Index: 3
Last. Nooritawati Md Tahir (UiTM: Universiti Teknologi MARA)H-Index: 12
view all 5 authors...
In this paper, a comparative study of remote techniques as sturdier schemes for creation distributed system depend on applications is presents. Demand the object active already in the process been approaches for an object occupied in another process. This area tolerates to be not in the same environment and emphasis on the modern technique event-based be intensely more but this time with the same object could respond to change concealment performance as another object. Those applications pose of...
Source
#1Sultan Rehman Sherief (Management and Science University)
#2Aissa Mosbah (Management and Science University)H-Index: 1
Last. Ibrahim Al-Jubari (Management and Science University)H-Index: 1
view all 4 authors...
Immigrant entrepreneurship has traditionally been viewed as a mean of survival, however in the last two decades or so immigrant entrepreneurs have become more apparent in opportunity-based industries such as the high-tech and resulted in undeniable impact on host country economies. Such impact can be chiefly attributed to the status and nature of the firms operations. This impact may differ from country to country depending on a number of factors. In this paper we bring to light the limited lite...
Source
#1Ramzi H. Elghanuni (Management and Science University)
#2Musab A. M. Ali (Management and Science University)H-Index: 3
Last. Marwa B. Swidan (IIUM: International Islamic University Malaysia)H-Index: 1
view all 3 authors...
Social networks are rapidly becoming part of our everyday activities. In online social network (OSN) environment, there is a huge amount of information which is available and widely used for various areas; such as provide the sharing of information and create relationship between people in a virtual community, capturing the criminals, detect terrorist and unlawful activities. Based on analyzing the OSN, there are two types of data that are inferred, first is behavioral data which depends on the ...
Source
#1Musbah Abdulkarim Musbah Ataya (Management and Science University)
#2Musab A. M. Ali (Management and Science University)H-Index: 3
The main purpose of this paper is to understand the true impact of security on e-banking users and its relationship with user behavior toward e-banking acceptance. This paper reviews in-depth previous studies on security factors affecting e-banking. Security trust, risks, protection strategy and best practices for future security trends are discussed to help banks and consumers mitigate the suitable secure transactions of e-banking. Results from reviewing valuable studies in this paper shows tha...
Source
123