Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Omar Zakaria is active.

Publication


Featured researches published by Omar Zakaria.


international conference on information and communication technology | 2016

Establishing of knowledge based framework for situational awareness using Nonaka's and Endsley's models

Wan Su Emi Yusnita Wan Yusof; Omar Zakaria; Zuraini Zainol

Up to this moment, there is no knowledge based framework with situational awareness using the combination of two models: Nonaka and Endsley. These models can assist our research in terms of collecting and transforming appropriate tacit knowledge into enhancing the existing explicit knowledge. The existing explicit knowledge can be found from training module (doctrines) or any relevant documents. However, tacit knowledge is not easily extracted due to being stored implicitly into the mind of the experienced staff. Therefore, this paper explains the structured way on how to collect appropriate tacit knowledge from the experienced staff.


international visual informatics conference | 2017

Document Clustering in Military Explicit Knowledge: A Study on Peacekeeping Documents

Zuraini Zainol; Syahaneim Marzukhi; Puteri N. E. Nohuddin; Wan M. U. Noormaanshah; Omar Zakaria

In Military domain, knowledge can also be categorized into explicit knowledge and tacit knowledge, where the explicit military knowledge can be any form of knowledge that can easily articulated, codified, accessed and stored into various media forms. Further, advanced computer technologies give a convenient platform for digitizing documents, producing web documents and electronic documents, including this explicit military knowledge (e.g. military peacekeeping documents). The main goal here is to discover useful knowledge from military peacekeeping documents. Yet, text mining is a powerful technique that is widely used for discovering useful patterns and knowledge specially in unstructured text documents. This paper describes Text Analytics of Unstructured Data (TAUD) framework for analyzing and discovering significant text patterns exist in the military text documents. The framework consists of three (3) components: (i) data collection (ii) document preprocessing and (iii) text analytics and visualization which are word cloud and document clustering using K-Means algorithm. The findings of this study allow the military commanders and training officers to understand and access the military knowledge which they had learnt and gathered during the training programs before they can be deployed into a peacekeeping mission.


International Journal on Advances in Information Sciences and Service Sciences | 2012

Graphical Password Authentication: Review and Analysis

Omar Zakaria; Toomaj Zangooei; Mohd Afizi Mohd Shukran


Archive | 2011

A Classification Method For Data Mining Using Svm-Weight And Euclidean Distance

Mohd Afizi; Mohd Afizi Mohd Shukran; Omar Zakaria


Archive | 2017

Text analytics of unstructured textual data: A study on military peacekeeping document using R text mining package

Zuraini Zainol; Puteri N. E. Nohuddin; Tengku A.T. Mohd; Omar Zakaria


Mathematical Models and Methods in Applied Sciences | 2012

Detection of Steganographic Messages in Email Attachment

Mohd Hazali Mohamed Halip; Mohd Afizi Mohd Shukran; Omar Zakaria; Syed Nasir Alsagoff Syed Zakaria


International Journal of Advancements in Computing Technology | 2012

Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme

Omar Zakaria; Toomaj Zangooei; Mohd Afizi Mohd Shukran


ist africa week conference | 2018

Measuring Cybersecurity Wellness Index of Critical Organisations

Husin Jazri; Omar Zakaria; Edmore Chikohora


international conference on ubiquitous information management and communication | 2018

Semantic-based Social Media Threats Detection

Hassan Al Banna Mohamed; Syahaneim Marzukhi; Zuraini Zainol; Tengku Mohd Tengku Sembok; Omar Zakaria


Journal of Telecommunication, Electronic and Computer Engineering | 2018

Readiness of Information Security Management Systems (ISMS) Policy on Hospital Staff Using e-Patuh System

Waidah Ismail; Najwa Haayati Mohd Alwi; Roesnita Ismail; Mahadi Bahari; Omar Zakaria

Collaboration


Dive into the Omar Zakaria's collaboration.

Top Co-Authors

Avatar

Mohd Afizi Mohd Shukran

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Zuraini Zainol

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Puteri N. E. Nohuddin

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Syahaneim Marzukhi

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Hardy Azmir Anuar

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Hassan Al Banna Mohamed

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mahadi Bahari

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohamad Abu Ubaidah Amir

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Afizi

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Hazali Mohamed Halip

National Defence University of Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge