HOME JOURNALS CONTACT

Journal of Applied Sciences

Year: 2015 | Volume: 15 | Issue: 9 | Page No.: 1176-1183
DOI: 10.3923/jas.2015.1176.1183
Architecture of Decision Support System for Crime Visualization
Noor Maizura Mohamad Noor, Siti Haslini Ab Hamid, Rosmayati Mohemad, Masita @ Masila Abdul Jalil and Muhammad Suzuri Hitam

Abstract: Recently, crime rate in Malaysia is increasing from day to day. If this situation is not monitored and there is no drastic action taken, it may cause many serious problems. Therefore, crime prevention is one of the important components of an overall strategy to reduce crime and to strengthen public security. However, the main challenge faced by all law-enforcement and intelligence-gathering organizations is to analyze the growing volumes of crime data accurately and efficiently in order to make decision for crime prevention. Due to difficulty in decision making for crime prevention, Decision Support System (DSS) and data mining approach can be used to resolve the problem. Now-a-days, data mining approach has been exposed to be a practical decision-support concept in predicting and preventing crime. As a result, we propose architecture of DSS using visualization technique because it can represent crime data into more comprehensible presentation. The results from this proposed architecture can support the security authority in assessing more suitable law enforcement strategies, increasing the accuracy of selection decision making, as well as improving the use of security authority duty deployment for crime prevention.

Fulltext PDF Fulltext HTML

How to cite this article
Noor Maizura Mohamad Noor, Siti Haslini Ab Hamid, Rosmayati Mohemad, Masita @ Masila Abdul Jalil and Muhammad Suzuri Hitam, 2015. Architecture of Decision Support System for Crime Visualization. Journal of Applied Sciences, 15: 1176-1183.

Keywords: visualization, self-organizing map, Decision support system and crime prevention

INTRODUCTION

Crime refers to an act that violates the rules of law, an act that is considered prohibited or illegal and punishable by law; immoral or deviant actions and behavior as well as a serious offense. Recently, the crime rate in Malaysia is increasing from day to day (Sakip and Abdullah, 2012). If this situation is not monitored and there is no drastic action taken, it may cause many serious problems. Therefore, one of the Malaysia government agenda as stated in National Key Result Area (NKRA) has been introduced to reduce crime index and improve the public safety (Ismail and Ramli, 2013). Crime prevention is one of the important components of an overall strategy to reduce crime and to strengthen public security. Crime prevention refers to all actions and efforts that aim to reduce crime and fear of crime (Marzbali et al., 2012).

A wide range of unstructured data related to crime rapidly cumulate over a long period of time. In addition, the main challenge faced by all law-enforcement and intelligence gathering organizations is to analyze the growing volumes of crime data accurately and efficiently. In Malaysia, the decision making process for crime prevention is done manually by the security authorities. Based on the crime index, the security authorities will determine the level of crime at the level of high, medium or low. Thereafter, they will determine the most appropriate prevention decision according to the level of crime. The selection of the right decision for crime prevention is expected to be more appropriate in the real conditions, where each crime level has a different crime prevention decision. Moreover, they will compare the current year crime volume with the previous year crime volume for each crime type. The increment for each crime type cannot be more than five percents.

Table 1:Several crime researches using data mining techniques

The manual process for decision making for crime prevention will produce inaccurate and inefficient result. That requires a method to help the security authorities to determine the most appropriate decisions.

Over the past few years, a number of article on crime researches have appeared in conferences and journal publications. Researchers have developed many methods to support decision making for crime prevention over the last two decades. These works originate from disciplines of behavior and psychology, statistic and artificial intelligence (Li et al., 2010). The approach of behavior science and psychology has been aimed at preventing individuals from committing crimes since the 1960s. This traditional approach depends on the expertise and tactic knowledge of specialists, which easily leads to criminal experts’ fatigue, misjudgment and slow response. Moreover, it usually lacks of the real data for verification, thus making it difficult to apply the findings to the actual policy. Therefore, researchers have continued to find new improved methods in this area especially in artificial intelligence.

Due to difficulty in decision making for crime prevention, Decision Support System (DSS) has become increasingly important to the security authority. The DSS can be defined as an integrated, interactive computer system, consisting of analytical tools and information management capabilities, designed to aid decision makers in solving relatively large and unstructured problems (Sieker et al., 2006). In addition, crime analysis can make an important contribution to the delivery of an effective and efficient security authority services and to how the security authorities and their partners tackle crime. It also provides valuable information that is fundamental to internal management decisions and policy making. To handle crime analysis, data mining is a great tool that enables criminal investigators who may lack extensive training as data analysts to discover huge databases quickly and efficiently (Chen et al., 2004). In addition, data mining approach has been exposed to be a practical decision-support concept in predicting and preventing crime. Data mining contains six common classes of tasks which include clustering, classification, outlier detection, prediction, regression and visualization (Ngai et al., 2011). Table 1 analyzes several crime researches using data mining techniques which contain information on crime type, data mining class and technique and proposed architecture. Some of the data mining classes can address more than one crime type and therefore we grouped this table based on crime type. For example, Phillips and Lee (2012) presented a framework that allows autonomous exploratory analysis and knowledge discovery in massive real aggregated crime dataset. They used visualization technique to extract and visualize crime patterns efficiently. Li et al. (2010) applied Fuzzy Self-Organizing Map (FSOM) and rule extraction algorithm to analyze crime statistical data for 20 country police bureaus in Taiwan from 2003-2004 and produced results that can help police in criminal incidents prevention. They combined visualization and clustering techniques. But, the limitation of the proposed model is difficult to evaluate the accurate performance. Ku et al. (2012) developed crime report visualization-Textual Analysis of Similar Crimes (TASC) using combination of visualization and clustering techniques to support crime analysts analyze, compare and contrast crime report in timely manner. However, the limitation of TASC is can only handle visualization of text highlighting for simple analytical tasks. Moreover, Palocsay et al. (2000) applied neural network to generate case-by-case results in criminal recidivism but their results are depending heavily on the choice of the network topology. Grubesic (2006) used fuzzy clustering for hot-spot detection but he did not mention specific architecture. Kaikhah and Doddameti (2006) presented a novel knowledge discovery technique to discover trends using clustering technique for murder, rape, robbery and auto theft crime in United States cities. Furthermore, Yu et al. (2011) applied classification technique for burglary crime. They studied, compared and proposed the best forecasting approach to achieve the most stable results.

Based on Table 1, some of the data mining classes that have been applied in crime researches are visualization, clustering, prediction and classification. For data mining techniques, the researchers used techniques like neural network, fuzzy clustering and naive bayes. Several data mining classes such as visualization, prediction and clustering cover all crime types. However, in term of proposed architecture, some of the crime researches did not propose or mention specific architecture in their works. From the literature (Chen et al., 2004), visualization techniques have demonstrated an enormous capacity to analyze crime data. Although visualization has the highest analysis capability on crime data, but there is still a lack of researches using this new technique. Because of this, current researchers are more focus on using visualization technique in their researches and studies including researches related to visualization of crime data. Unfortunately, the research in crime visualization is still limited in Malaysia. Thus, this research is conducted to overcome this gap and make a valuable contribution in analyzing crime data and thus support decision making for crime prevention.

Based on the issues that have been discussed as well as our previous crime researches (Noor et al., 2011a-c), we propose architecture of DSS using visualization technique for all crime types. In this study, we choose visualization technique because it has been proven can represent crime data into more understandable presentation. The aim of this research is to discover crime visualization, which will help the security authorities to have a better understanding of crime data. Then, they can use this information to directly support decision making for crime prevention. Therefore, to understand the architecture of DSS for crime visualization, the rest of the study is structured as follows. Section 2 provides information on materials and methods that include information about experimental design and the proposed architecture for crime visualization. Section 3 shows the experimental result and discussion. Lastly, section 4 gives conclusions and future works.

MATERIALS AND METHODS

Data acquisition: This study uses monthly crime volume for index crimes provided by the Royal Malaysia Police (RMP) from year 2008-2009 for Selangor state. Index crime in Malaysia refers to fourteen types of crime that occur with sufficient regularity and significance that they collectively serve as a meaningful index to the overall crime situation (PMDU., 2010). All index crimes are collected: Murder, rape, fire arm gang robbery, gang robbery without fire arm, fire arm robbery, robbery without fire arm, injuring others, stealing, stealing of truck/van, stealing of car, stealing of bike, snatch theft, house breaking and theft by day and house breaking and theft by night. Index crimes are grouped into two main crime categories, which are property crime and violent crime as depicted in Table 2. Crime volume is a basic indicator of the frequency of known criminal activity and it represents the number of reported offenses. Therefore, 336 temporal crime data is constructed, formed by 14 offenses in Selangor state for 24 months.

Data preprocessing: Data preprocessing includes data cleaning, data integration, data transformation and data reduction. In this study, data transformation is used to convert monthly crime volume into appropriate forms for mining.

Table 2:Crime types grouped by crime category

Due to variability existing in crime types, each of the monthly crime volume is standardized into a value between 0 and 1 using min-max normalization in Eq. 1:

(1)

where, X is actual value, Xmin is minimum value of crime volume X and Xmax is maximum value of crime volume X in a crime type.

Parameter setting: At the mining phase, the Self Organizing Map (SOM) network is trained to cluster the standardize crime data. Before training, map size needs to be decided in advance. Specification of map size (number of output neurons) in the SOM training process is very much important to identify the deviation of the data. If the map size is too small, the outcome is more towards general patterns and it may not reveal some significant differences that should be detected. In contrast, larger map sizes will produce more detailed patterns where the differences are too small (Chattopadhyay et al., 2012). In addition, to measure the quality of a SOM’s projection, the Topographic Error (TE) can be used as an alternative way. The TE represents the proportion of all data vectors for which the first and second Best Matching Units (BMUs) are not closest to measure the topology preservation. The TE also represents the accuracy of the mapping in the preserving topology (Chen et al., 2013). Lower TE value specifies better mapping quality (Chattopadhyay et al., 2012). Therefore, we used 2×2 map size because it produces the lowest TE, which is 0.042 using square topology.

Furthermore, Euclidean distance is used for distance scaling because it is the most straightforward way of computing distances between objects in a multidimensional space. List of input parameter also needs to be chosen because some of the results are based on input parameter. In this study, input parameter refers to the list of crime type as mentioned in subsection data acquisition.

Proposed architecture: The DSS is an information system that participates and supports the human decision making process. Generally, DSS can help decision makers make use of data and model and solve unstructured problems. The DSS makes full use of suitable computer techniques and through the interactive human-machine model, it helps and improves the effectiveness of decision-making about semi-structures and non-structures (Zhou et al., 2008).

Fig. 1:Proposed architecture of DSS for crime visualization

The DSS is applied by human in many areas such as oil management, tourism, education and medical to improve the quality of decision making (Ramnarayan et al., 2004). For instance, a DSS model is used for crime prevention in Taiwan (Li et al., 2010). There are also many other researches related to DSS (Santana et al., 2012; Yang et al., 2012). Therefore, we are confident that DSS can be used to help the security authorities in Malaysia to make use of crime data and solve the problem related to the decision making for crime prevention.

This study uses hybrid DSS, a combination of model-driven DSS (MD-DSS) and web-based technology in handling decision making for crime prevention. The MD-DSS models decision problem using optimization and analytical tools and suggests actions. The MD-DSS uses data and parameters provided by decision maker to aid decision maker in analyzing a situation. This hybrid DSS can help retrieve, analyze and display structured data from relational database or large multidimensional, offer access to system and help communication and decision making for multiple users (Power, 2000). In DSS, there are three fundamental components which are Model-Base Management System (MBMS), Database Management System (DBMS) and Dialog Generation and Management System (DGMS) as depicted in Fig. 1. The DBMS serves as a data bank for the DSS while MBMS transforms data from DBMS into information that is useful for decision making. The DGMS or user interface is used to improve the ability of the system user to utilize and benefit from DSS. For instance, monthly crime volume for each crime type that covered for two years was recorded by the security authorities. By using this data, DBMS can store, update, delete and generate report. In this study, we use MySQL as our DBMS. To transform raw crime data into information, MBMS will communicate with DBMS. All information and reports generated will be displayed using DGMS.

In our proposed architecture, we use SOM in MBMS to transform monthly crime data into crime visualization. The SOM has been one of the most unsupervised neural network models to solve a wide variety of problems in clustering, classification, visualization and modeling (Li et al., 2010). The SOM is a visualization and analysis tool for high dimensional data. The SOM algorithm is based on nonlinear projection mapping which reduce the dimensions of high-dimensional data to two-dimensional data (2D) by producing a topology map. Therefore, SOM can be used to detect, analyze and visualize crime data that contains many variables.

RESULTS AND DISCUSSION

In this section, we analyze and discuss the experimental results for the aspects of crime visualization.

Visualization of crime data: Visualization of crime data provides useful information for the security authorities because visualization itself refers to an easily understandable presentation of data and to methodology that converts complicated data characteristics into clear patterns to allow users to view the complex patterns or relationships uncovered in the data mining process (Ngai et al., 2011). This proposed architecture can plot several types of plots such as using color, barplot, lines and radar. Nevertheless, the results of crime visualization are depending on the crime data and the parameter settings as mentioned in section 2.

Fig. 2(a-g):
Observation using "color" plot for violent crime, (a) Murder, (b) Rape, (c) Fire arm gang robbery, (d) Gang robbery without fire arm, (e) Fire arm robbery, (f) Robbery without fire arm and (g) Injuring other

Fig. 3(a-g):
Observation using "color" plot for property crime, (a) Stealing, (b) Stealing of truck/van, (c) Stealing of car, (d) Stealing of bike (e) Snatch theft, (f) House breaking and theft by day and (g) House breaking and theft by night

In this study, we will show the result for observation using "color" and "barplot" plots only. For both result of observations, there are 4 clusters appeared in each map result. Cluster 1 located at left bottom corner, cluster 2 at left upper corner, cluster 3 at right bottom corner and cluster 4 at right upper corner of the map.

Observation using "color" plot for violent and property crimes are illustrated in both Fig. 2 and 3. By using this plot, it visualizes the result based on list of input parameters (crime types). Red (dark) color represents high level value while the yellow (light) color represents the low level value.

Fig. 4(a-d): Observation using "barplot" plot for all crime types, (a) Cluster 2, (b) Cluster 4, (c) Cluster 1 and (d) Cluster 3

Table 3:Result for cluster 1 in Fig. 4

Based on Fig. 2, rape and injuring others have shown the highest crime value compared to other crime types in category of violent crime because three from four clusters displayed red color. Murder and robbery without fire arm show medium crime value while fire arm gang robbery, gang robbery without fire arm and fire arm robbery have shown small crime value. According to Fig. 3, stealing and house breaking and theft by night from category of property crime have shown the highest crime value. Stealing of truck/van, stealing of car, stealing of bike and snatch theft display medium crime value while house breaking and theft by day shows small crime value.

Next, we move to the observation using "barplot" plot for all crime types as depicted in Fig. 4. To understand the result, let us analyze the result for cluster 1 precisely. Table 3 contains detailed result for cluster 1 in Fig. 4. The list of A-N refers to the list of input parameters. For example, "A" refers to murder while "N" refers to house breaking and theft by night. In cluster 1, "J" (stealing of car) shows the highest crime value while "N" (house breaking and theft by night) shows the lowest crime value. Additionally, according to Fig. 4, it illustrates that most of the low crime values are assigned to cluster 2 and most of the high crime values are assigned to cluster 3. However, through observation using "barplot" plot, it can only represent general crime result in each cluster. To make a detailed conclusion on crime results, we need to analyze all four clusters and refer to observation based on input parameter such as by using "color" plot.

In this study, we agree with the capability of SOM as a visualization technique that can demonstrate a great capacity to analyze crime data (Chen et al., 2004). According to the analysis, we can discover four crime types that displayed the highest crime values compared to other crime types in Selangor state. The four crime types are rape, injuring others, stealing and house breaking and theft by night. In addition, based on Fig. 2 and 3, property crime shows higher crime value compared to violent crime. The results obtained are in support of other previous researches and surveys (PMDU., 2010). Sources from the RMP show that property crime makes up most of the overall index crime. Furthermore, although this study is aim to support decision making processes for crime prevention similar to other previous researches and studies, but it produces different way of results. For example, Li et al. (2010) used similar monthly crime volume but the result produced different crime trend patterns in Taiwan. Ku et al. (2012) applied visualization but he analyzed crime text report to facilitate analysis and decision making process. Kaikhah and Doddameti (2006) applied knowledge discovery technique but only focused for murder, rape, robbery and auto theft crime in US.

Therefore, the information we provide is useful for the security authority to determine level of crime for each crime type. The security authority can make a better use of its duty deployment, establish more satisfactory law enforcement policies and focus on the index crimes that affect the Malaysia society.

Strategy making of security authority duty deployment: Based on the crime visualization result, it can support the security authorities to decide the kind of duty deployment that should be applied for each crime types. In general, there are two kinds of strategies of security authority duty deployment (Li et al., 2010). The first strategy is deploys the routine duties and the second strategy consists of special duties conducted by the security authorities. Based on our results, index crimes like rape, injuring others and stealing show high crime value in Selangor state. According to Sham et al. (2012), there is a high number of women who will experience greater fear while travelling if public transport supply are not allocated accordingly to secure their journey. This may increase opportunity of crime towards women like rape, injuring others and stealing. In addition, house breaking and theft by night is also display high crime value in Selangor state. This is a reason for the government to take special emphasis for preventing house break-in in Government Transformation Program (GTP) (PMDU., 2013). The government took initiatives like residential police patrols, dedicated house break-in teams, coordinating volunteers through community policing and Crime Prevention Through Environmental Design (CPTED) to improve home security. For the crime types that fall under low and medium levels, the security authority can implement routine duties to prevent the crimes. Furthermore, to increase the safety perception index, several initiatives have been introduced such as Rakan Cop, whitening blackspot initiative, crime awareness day, safety perception survey and women awareness campaign.

CONCLUSION

In this study, architecture of DSS for crime visualization was described. The key contribution of this study is the proposed architecture is not only can be used for crime visualization but it could be valuable to other visualization apart from the crime data. Main feature of the architecture is the ability to visualize crime data by using several types of plots. The advantages of using this proposed architecture are it is a powerful exercise and also provide fastest way to communicate the results to others because it is a web-based application that used visualization technique. Therefore, the proposed architecture can support the security authority in assessing more suitable law enforcement strategies, increasing the accuracy of selection decision making, as well as improving the use of security authority duty deployment for crime prevention.

One limitation of the current study is that, it has computation time issue in handling huge crime data. Therefore, future researches could be aimed to find a better way to handle huge crime data and thus support the process of decision making for crime prevention. In addition, due to the availability of the crime data, the research was conducted using monthly crime volume that covered a period of two years for a specific state in Malaysia. If the period under consideration could be increased, it would provide a better result. In the future, we intend to test the architecture using monthly crime data that covered a period of five years for all states in Malaysia. Hopefully, this study will support one of the Malaysian government agendas known as NKRA, in which to reduce crime in Malaysia.

ACKNOWLEDGMENTS

This study is supported by Fundamental Research Grant Scheme (FRGS) under Ministry of Education (MOE), Malaysia with grant number 59289 and it is gratefully appreciated. Special thanks are also accorded to Criminal Investigation Department from the Royal Malaysia Police for the support and cooperation in providing crime data.

REFERENCES

  • Chattopadhyay, M., P.K. Dan and S. Mazumdar, 2012. Application of visual clustering properties of self organizing map in machine-part cell formation. Applied Soft Comput., 12: 600-610.
    CrossRef    Direct Link    


  • Chen, H., W. Chung, J.J. Xu, G. Wang, Y. Qin and M. Chau, 2004. Crime data mining: A general framework and some examples. Computer, 37: 50-56.
    CrossRef    Direct Link    


  • Chen, N., B. Ribeiro, A. Vieira and A. Chen, 2013. Clustering and visualization of bankruptcy trajectory using self-organizing map. Exp. Syst. Applic., 40: 385-393.
    CrossRef    Direct Link    


  • Grubesic, T.H., 2006. On the application of fuzzy clustering for crime hot spot detection. J. Quant. Criminol., 22: 77-105.
    CrossRef    Direct Link    


  • Ismail, S. and N. Ramli, 2013. Short-term crime forecasting in Kedah. Proc.-Social Behav. Sci., 91: 654-660.
    CrossRef    Direct Link    


  • Kaikhah, K. and S. Doddameti, 2006. Discovering trends in large datasets using neural networks. Applied Intell., 24: 51-60.
    CrossRef    Direct Link    


  • Ku, C.H., J.H. Nguyen and G. Leroy, 2012. Tasc-crime report visualization for investigative analysis: A case study. Proceedings of the IEEE 13th International Conference on Information Reuse and Integration, August 8-10 2012, Las Vegas, NV., pp: 466-473.


  • Li, S.T., S.C. Kuo and F.C. Tsai, 2010. An intelligent decision-support model using FSOM and rule extraction for crime prevention. Exp. Syst. Applic., 37: 7108-7119.
    CrossRef    Direct Link    


  • Marzbali, M.H., A. Abdullah, N.A. Razak and M.J.M. Tilaki, 2012. Validating crime prevention through environmental design construct through checklist using structural equation modelling. Int. J. Law Crime Justice, 40: 82-99.
    CrossRef    Direct Link    


  • Noor, N.M.M., R. Astari, M. Norizan, M.S.M. Yazid and A.M. Lazim, 2011. A framework of decision support for crime forecasting in Malaysia. Proceedings of the 2nd European Conference for the Applied Mathematics and Informatics, December 29-31, 2011, Montreux, Switzerland, pp: 31-35.


  • Noor, N.M.M., R. Astari, T.Y. Sudarya and M. Lazim Abd, 2011. Intelligent decision support system for fuzzy crime forecasting: An improved model. Int. J. Comput. Inform. Syst., 2: 26-30.
    Direct Link    


  • Noor, N.M.M., A. Retnowardhani, Y.S. Triana, M.Y.M. Saman and M.L. Abdullah, 2011. Implementation of arima model with fuzzy for crime forecasting. Proceedings of the 10th UMT International Annual Symposium on Empowering Science, Technology and Innovation Towards a Better Tomorrow, July 11-13, 2011, University Malaysia Terengganu, Malaysia, pp: 205-211.


  • Ngai, E.W.T., Y. Hu, Y.H. Wong, Y. Chen and X. Sun, 2011. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decis. Support Syst., 50: 559-569.
    CrossRef    Direct Link    


  • Palocsay, S.W., P. Wang and R.G. Brookshire, 2000. Predicting criminal recidivism using neural networks. Socio-Econ. Plann. Sci., 34: 271-284.
    CrossRef    Direct Link    


  • Phillips, P. and I. Lee, 2012. Mining co-distribution patterns for large crime datasets. Exp. Syst. Applic., 39: 11556-11563.
    CrossRef    Direct Link    


  • Power, D.J., 2000. Web-based and model-driven decision support systems: Concepts and issues. Proceedings of the Americas Conference on Information Systems, August 10-13, 2000, Long Beach, California, pp: 352-355.


  • Ramnarayan, P., G. Kulkarni, A. Tomlinson and J. Britto, 2004. ISABEL: A novel internet-delivered clinical decision support system. Healthcare Computing, pp: 245-254.


  • Sakip, S.R.M. and A. Abdullah, 2012. Measuring crime prevention through environmental design in a gated residential area: A pilot survey. Proc.-Social Behav. Sci., 42: 340-349.
    CrossRef    Direct Link    


  • Santana, A.L., G.B. Conde, L.P. Rego, C.A. Rocha and D.L. Cardoso et al., 2012. Predict-decision support system for load forecasting and inference: A new undertaking for brazilian power suppliers. Electr. Power Energy Syst., 38: 33-45.
    CrossRef    Direct Link    


  • Sham, R., N. Omar and D.W. Amat, 2012. Hot spot urban crime area for woman travellers. Proc.-Social Behav. Sci., 68: 417-426.
    CrossRef    Direct Link    


  • Sieker, H., S. Bandermann, K. Schroter, M. Ost rowski and A. Leichtfuss et al., 2006. Development of a decision support system for integrated water resources management in intensively used small watersheds. Water Practice Technol., 1: 1-9.
    Direct Link    


  • Yang, Y., W. Tan, T. Li and D. Ruan, 2012. Consensus clustering based on constrained self-organizing map and improved Cop-Kmeans ensemble in intelligent decision support systems. Knowledge-Based Syst., 32: 101-115.
    CrossRef    Direct Link    


  • Yu, C.H., M.W. Ward, M. Morabito and W. Ding, 2011. Crime forecasting using data mining techniques. Proceedings of the IEEE 11th International Conference on Data Mining Workshops, December 11, 2011, IEEE, Vancouver, BC., pp: 779-786.


  • Zhou, F., B. Yang, L. Li and Z. Chen, 2008. Overview of the new types of intelligent decision support system. Proceedings of the 3rd International Conference on Innovative Computing Information and Control, June 18-20, 2008, IEEE, Dalian, Liaoning, pp: 267-.


  • PMDU., 2010. Government transformation programme: The roadmap 2.0-catalysing transformation for a brighter future. Chapter 6: Assuring Quality Education. Percetakan Nasional Malaysia Berhad, Putrajaya, pp: 109-133. http://www.pemandu.gov.my/gtp/upload/GTP2_ENG.pdf.


  • PMDU., 2013. GTP annual report 2013. Percetakan Nasional Malaysia Berhad, Putrajaya. https://www.pmo.gov.my/dokumenattached/NTP-Report-2013/GTP_2013_ENG_Report.pdf.

  • © Science Alert. All Rights Reserved