Azlinah Mohamed

Learn More
Currently, the distance related to time and location between distributed software development teams is considered contributing to the chaotic environment of Global Software Development (GSD). Furthermore, when it involves using Agile method where communication is crucial between developers and customers. This paper aim to discussed the issues that have(More)
An optimal evacuation route plan has to be established to overcome the problem of poor coordination and uneven distribution of vehicles before or during disaster. This article introduces the evacuation vehicle routing problem (EVRP) as a new variant to the vehicle routing problem (VRP). EVRP is a process of moving vehicles from a vehicle location to the(More)
In any flash flood evacuation operation, vehicle assignment at the inundated areas is vital to help eliminate loss of life. Vehicles of various types and capacities are used to evacuate victims to relief centers. This paper examines combinatorial optimization approach with the objective function to assign a specified number of vehicles with maximum number(More)
Automated fruit grading in local fruit industries are gradually receiving attention as the use of technology in upgrading the quality of food products are now acknowledged. In this paper, outer surface colors of palm oil fresh fruit bunches (FFB) are analyzed to automatically grade the fruits into over ripe, ripe and unripe. We compared two methods of color(More)
This paper examines the use of evolutionary computation (EC) to find optimal solution in vehicle assignment problem (VAP). The VAP refers to the allocation of the expected number of people in a potentially flooded area to various types of available vehicles in evacuation process. A novel discrete particle swarm optimization (DPSO) algorithm and genetic(More)
Risk management in IT outsourcing projects is a process of identifying, analyzing, controlling and reducing risks in IT outsourcing projects life cycle. Risk management is important as the practices of risk management will reduce the risks thus lead to success in IT outsourcing projects. Risk management should be conducted in IT outsourcing as it will(More)
Information Communication Technology (ICT) Outsourcing provides an effective ways to cut cost, launch new business venture and improve efficiency. Sometimes, ICT outsourcing can lead to an information security risk incident that might be difficult to manage and mitigate. Hence, the objectives of the research are to determine the information security risk(More)
In this paper, we discuss baseline extraction algorithm for online signature recognition based on vector rules. In order to recognize, verify and analyze a signature, one needs to establish the feasible computational signature features which would be required to be extracted. The main features in this case are direction, slant, baseline, pressure, speed and(More)
A constraint satisfaction problem (CSP) involves assigning possible values to a set of variables without defying any constraints. There are various techniques available to solve or give partial solution to CSP. This paper presents a modification of branch and bound algorithm, which is used to solve a constraint satisfaction problem in map colouring problem.(More)
Information Communication Technology (ICT) services become more importance in today business environment. Most of the organizations which were not have enough resources and expertise outsource their ICT project to vendors. Conversely, the strategy could also contribute to some risks especially information security risks that could expose organizational(More)