45 results on '"Mohamad Mohsin, Mohamad Farhan"'
Search Results
2. Beta Distribution Weighted Fuzzy C-Ordered-Means Clustering
- Author
-
Hengda, Wang, Mohamad Mohsin, Mohamad Farhan, Mohd Pozi, Muhammad Syafiq, Hengda, Wang, Mohamad Mohsin, Mohamad Farhan, and Mohd Pozi, Muhammad Syafiq
- Abstract
The fuzzy C-ordered-means clustering (FCOM) is a fuzzy clustering algorithm that enhances robustness and clustering accuracy through the ordered mechanism based on fuzzy C-means (FCM). However, despite these improvements, the FCOM algorithm’s effectiveness remains unsatisfactory due to the significant time cost incurred by its ordered operation. To address this problem, an investigation was conducted on the ordered weighted model of the FCOM algorithm leading to proposed enhancements by introducing the beta distribution weighted fuzzy C-ordered-means clustering (BDFCOM). The BDFCOM algorithm utilises the properties of the Beta distribution to weight sample features, thus not only circumventing the time cost problem of the traditional ordered mechanism but also reducing the influence of noise. Experiments were conducted on six UCI datasets to validate the effectiveness of the BDFCOM, comparing its performance against seven other clustering algorithms using six evaluation indices. The results show that compared to the average of the other seven algorithms, BDFCOM improves about 15 percent on F1-score, 11 percent on Rand Index, 13 percent on Adjusted Rand Index, 3 percent on Fowlkes-Mallows Index and 16 percent on Jaccard Index. For the other two ordered mechanism FCM algorithms, the time consumption was also reduced by 90.15 percent on average. The proposed algorithm, which designs a new way of feature weighting for ordered mechanisms, advances the field of ordered mechanisms. And, this paper provides a new method in the application field where there is a lot of noise in the dataset
- Published
- 2024
3. Beta Distribution Weighted Fuzzy C-Ordered-Means Clustering.
- Author
-
Wang Hengda, Mohamad Mohsin, Mohamad Farhan, and Mohd Pozi, Muhammad Syafiq
- Subjects
FUZZY algorithms ,ALGORITHMS ,NOISE - Abstract
The fuzzy C-ordered-means clustering (FCOM) is a fuzzy clustering algorithm that enhances robustness and clustering accuracy through the ordered mechanism based on fuzzy C-means (FCM). However, despite these improvements, the FCOM algorithm’s effectiveness remains unsatisfactory due to the significant time cost incurred by its ordered operation. To address this problem, an investigation was conducted on the ordered weighted model of the FCOM algorithm leading to proposed enhancements by introducing the beta distribution weighted fuzzy C-ordered-means clustering (BDFCOM). The BDFCOM algorithm utilises the properties of the Beta distribution to weight sample features, thus not only circumventing the time cost problem of the traditional ordered mechanism but also reducing the influence of noise. Experiments were conducted on six UCI datasets to validate the effectiveness of the BDFCOM, comparing its performance against seven other clustering algorithms using six evaluation indices. The results show that compared to the average of the other seven algorithms, BDFCOM improves about 15 percent on F1-score, 11 percent on Rand Index, 13 percent on Adjusted Rand Index, 3 percent on Fowlkes-Mallows Index and 16 percent on Jaccard Index. For the other two ordered mechanism FCM algorithms, the time consumption was also reduced by 90.15 percent on average. The proposed algorithm, which designs a new way of feature weighting for ordered mechanisms, advances the field of ordered mechanisms. And, this paper provides a new method in the application field where there is a lot of noise in the dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. A COMPARATIVE REVIEW OF CONFERENCE MANAGEMENT SYSTEM
- Author
-
Wan Ishak, Wan Hussain, primary, Mat Yamin, Fadhilah, additional, Mohamad Mohsin, Mohamad Farhan, additional, and Mansor, Mohd Fitri, additional
- Published
- 2023
- Full Text
- View/download PDF
5. Dengue Outbreak Detection Model Using Artificial Immune System: A Malaysian Case Study
- Author
-
Mohamad Mohsin, Mohamad Farhan, primary, Abu Bakar, Azuraliza, additional, Hamdan, Abdul Razak, additional, Sahani, Mazrura, additional, and Mohd Ali, Zainudin, additional
- Published
- 2023
- Full Text
- View/download PDF
6. Dengue Outbreak Detection Model Using Artificial Immune System: A Malaysian Case Study
- Author
-
Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Sahani, Mazrura, Mohd Ali, Zainudin, Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Sahani, Mazrura, and Mohd Ali, Zainudin
- Abstract
Dengue is a virus that is spreading quickly and poses a severe threat in Malaysia. It is essential to have an accurate early detection system that can trigger prompt response, reducing deaths and morbidity. Nevertheless, uncertainties in the dengue outbreak dataset reduce the robustness of existing detection models, which require a training phase and thus fail to detect previously unseen outbreak patterns. Consequently, the model fails to detect newly discovered outbreak patterns. This outcome leads to inaccurate decision-making and delays in implementing prevention plans. Anomaly detection and other detection-based problems have already been widely implemented with some success using danger theory (DT), a variation of the artificial immune system and a nature-inspired computer technique. Therefore, this study employed DT to develop a novel outbreak detection model. A Malaysian dengue profile dataset was used for the experiment. The results revealed that the proposed DT model performed better than existing methods and significantly improved dengue outbreak detection. The findings demonstrated that the inclusion of a DT detection mechanism enhanced the dengue outbreak detection model’s accuracy. Even without a training phase, the proposed model consistently demonstrated high sensitivity, high specificity, high accuracy, and lower false alarm rate for distinguishing between outbreak and non-outbreak instances.
- Published
- 2023
7. A Comparative Review of Conference Management System
- Author
-
Wan Ishak, Wan Hussain, Mat Yamin, Fadhilah, Mohamad Mohsin, Mohamad Farhan, Mansor, Mohd Fitri, Wan Ishak, Wan Hussain, Mat Yamin, Fadhilah, Mohamad Mohsin, Mohamad Farhan, and Mansor, Mohd Fitri
- Abstract
This article provides a brief yet comprehensive review of Conference Management Systems (CMS), showcasing widely-used platforms such as EasyChair, ConfBay, OpenConf, Microsoft CMT, COMS, and EDAS—tools commonly employed by conference organizers. The strengths and features of each platform are explored, with a focus on key aspects such as paper submission, the review process, registration, agenda and program management, virtual conference support, proceedings, and email communication. Through this comparative analysis, the diverse functionalities and distinctive contributions of each CMS become evident, offering valuable insights for conference organizers to make well-informed decisions tailored to their specific event requirements. For instance, EasyChair is recognized for its user-friendly interface and the inclusion of the Virtual Conference Support (VCS) feature, addressing the growing trend of virtual and hybrid events. ConfBay positions itself as a user-friendly CMS with customizable features, while OpenConf offers versatility through its Community, Plus, and Professional Editions. This review highlights the unique strengths of each CMS, empowering organizers with a deeper understanding of their capabilities. The adaptability of these systems to the evolving landscape of academic and scientific events is a central theme, underscoring their potential to significantly contribute to the success and efficiency of conferences globally. Ultimately, this analysis serves as a valuable resource for navigating the complex landscape of CMS platforms, guiding organizers toward optimal choices aligned with their unique event management needs.
- Published
- 2023
8. A COMPARATIVE REVIEW OF CONFERENCE MANAGEMENT SYSTEM.
- Author
-
Ishak, Wan Hussain Wan, Yamin, Fadhilah Mat, Mohamad Mohsin, Mohamad Farhan, and Mansor, Mohd Fitri
- Subjects
SCHOLARS ,EMAIL ,TELEMATICS ,COMMUNICATION - Abstract
A conference stands as one of the most popular academic events, bringing together scholars to exchange knowledge on a specific theme. However, organising a conference is a demanding task that requires the meticulous utilisation of various resources. A conference management system (CMS) emerges as a valuable tool, empowering conference organisers to streamline tasks such as article submission, reviewing, and registration, thereby enhancing the efficiency of the overall conference management process. This article presents a comprehensive review of commonly used CMS platforms such as EasyChair, ConfBay, OpenConf, Microsoft CMT, COMS, and EDAS. The review delves into the strengths and features of each platform, focusing on essential aspects such as paper submission, the review process, registration, agenda and programme management, virtual conference support, proceedings, and email communication. Through a comparative analysis, the article highlights the varied functionalities and unique features of each CMS, giving organisers a deep understanding of what each platform offers. The aim is to empower organisers with insights that help them make informed decisions based on their specific event management needs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. The Effect of Normalization for Real Value Negative Selection Algorithm
- Author
-
Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Noah, Shahrul Azman, editor, Abdullah, Azizi, editor, Arshad, Haslina, editor, Abu Bakar, Azuraliza, editor, Othman, Zulaiha Ali, editor, Sahran, Shahnorbanun, editor, Omar, Nazlia, editor, and Othman, Zalinda, editor
- Published
- 2013
- Full Text
- View/download PDF
10. Outbreak detection model based on danger theory
- Author
-
Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, and Hamdan, Abdul Razak
- Published
- 2014
- Full Text
- View/download PDF
11. Chest X-Ray Image Annotation based on Spatial Relationship Feature Extraction.
- Author
-
Saad, Mohd Nizam, Mohamad Mohsin, Mohamad Farhan, Hamid, Hamzaini Abdul, and Muda, Zurina
- Subjects
X-ray imaging ,FEATURE extraction ,MEDICAL databases ,ANNOTATIONS ,IMAGE databases ,IMAGE retrieval - Abstract
Digital imaging has become an essential element in every medical institution. Therefore, medical image retrieval such as chest X-ray (CXR) must be improved via novel feature extraction and annotation activities before they are stored into image databases. To date, many methods have been introduced to annotate medical images using spatial relationships after these features are extracted. However, the annotation performance for each method is inconsistent and does not show promising achievement to retrieve images. It is noticed that each method is still struggling with at least two big problems. Firstly, the recommended annotation model is weak because the method does not consider the object shape and rely on gross object shape estimation. Secondly, the suggested annotation model can only be functional for simple object placement. As a result, it is difficult to determine the spatial relationship feature after they are extracted to annotate images accurately. Hence, this study aims to propose a new model to annotate nodule location within lung zone for CXR image with extracted spatial relationship feature to improve image retrieval. In order to achieve the aim, a methodology that consists of six phases of CXR image annotation using the extracted spatial relationship features is introduced. This comprehensive methodology covers all cycles for image annotation tasks starting from image pre-processing until determination of spatial relationship features for the lung zone in the CXR. The outcome from applying the methodology also enables us to produce a new semi-automatic annotation system named CHEXRIARS which acts as a tool to annotate the extracted spatial relationship features in CXR images. The CHEXRIARS performance is tested using a retrieval test with two common tests namely the precision and recall (PNR). Apart from CHEXRIARS, three other annotation methods that are object slope, object projection and comparison of region boundaries are also included in the retrieval performance test. Overall, the CHEXRIARS interpolated PNR curve shows the best shape because it is the closest curve approaching the value of 1 on the X-axis and Y-axis. Meanwhile the value of area under curve for CHEXRIARS also revealed that this system attained the highest score at 0.856 as compared to the other three annotation methods. The outcome from the retrieval performance test indicated that the proposed annotation model has produced outstanding outcome and improved the image retrieval. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. The Effect of Normalization for Real Value Negative Selection Algorithm
- Author
-
Mohamad Mohsin, Mohamad Farhan, primary, Hamdan, Abdul Razak, additional, and Abu Bakar, Azuraliza, additional
- Published
- 2013
- Full Text
- View/download PDF
13. Makan@Local Chatok: Mobile Eatery Recommendation System Based on Local Knowledge
- Author
-
Sarif, Siti Mahfuzah, primary, Hanafi, Zurina, additional, Packeer Mohamed, Shafinah Farvin, additional, Bahrin Zaibon, Syamsul, additional, and Mohamad Mohsin, Mohamad Farhan, additional
- Published
- 2020
- Full Text
- View/download PDF
14. Makan@local chatok: mobile eatery recommendation system based on local knowledge
- Author
-
Sarif, Siti Mahfuzah, Hanafi, Zurina, Mohamed, Shafinah Farvin Packeer, Zaibon, Syamsul Bahrin, Mohamad Mohsin, Mohamad Farhan, Sarif, Siti Mahfuzah, Hanafi, Zurina, Mohamed, Shafinah Farvin Packeer, Zaibon, Syamsul Bahrin, and Mohamad Mohsin, Mohamad Farhan
- Abstract
This paper discusses a unique business model of eatery recommended system based on local knowledge using mobile platform. The business model is developed to define the business concept of the innovation which is a rural innovation involving multiple entities (locals, eatery owners and users who are searching for eatery). The innovation highlights on local knowledge crowd sourced from the participation of locals through ramification activities included in the mobile app. In achieving the aim, the design science methodology was adapted in this study which consists of 4 phases: (i) Awareness of Problem, (ii) Suggestion, (iii) Evaluation, and (iv) Conclusion. The proposed business model was developed through a few activities including literature review, comparative study and preliminary study. Then, the study continued with developing a prototype known as Makan@Local Chatok (M@LC) app and evaluated the app in terms of its usability aspects. Results from the usability testing concludes that the app is perceived as easy to use. It was also found that the proposed business model has been well-accepted by users. In conclusion, it is hoped that this study will not only demonstrate the potential and impact of mobile eatery recommendation system using local knowledge, but also provide a capstone on business research in the field of tourism industry.
- Published
- 2020
- Full Text
- View/download PDF
15. Univariate Financial Time Series Prediction using Clonal Selection Algorithm
- Author
-
Azlan, Ammar, primary, Yusof, Yuhanis, additional, and Mohamad Mohsin, Mohamad Farhan, additional
- Published
- 2020
- Full Text
- View/download PDF
16. Investigating the Relevant Agro Food Keyword in Malaysian Online Newspapers
- Author
-
Mohamad Mohsin, Mohamad Farhan, primary, Kamaruddin, Siti Sakira, additional, Siraj, Fadzilah, additional, Hambali, Hamirul Aini, additional, and Taiye, Mohammed Ahmed, additional
- Published
- 2019
- Full Text
- View/download PDF
17. Investigation on the Access Log Pattern of the Corporate Social Responsibility UUMWiFi among Changlun’s Community
- Author
-
Mohamad Mohsin, Mohamad Farhan, primary, Abdul Hamid, Mohd Noor, additional, Ahmad Mustaffa, Nurakmal, additional, Ramli, Razamin, additional, and Abdullah, Kamarudin, additional
- Published
- 2019
- Full Text
- View/download PDF
18. Determining the impact of window length on time series forecasting using deep learning
- Author
-
Azlan, Ammar, Yusof, Yuhanis, Mohamad Mohsin, Mohamad Farhan, Azlan, Ammar, Yusof, Yuhanis, and Mohamad Mohsin, Mohamad Farhan
- Abstract
Time series forecasting is a method of predicting the future based on previous observations. It depends on the values of the same variable, but at different time periods. To date, various models have been used in stock market time series forecasting, in particular using deep learning models. However, existing implementations of the models did not determine the suitable number of previous observations, that is the window length. Hence, this study investigates the impact of window length of long short-term memory model in forecasting stock market price. The forecasting is performed on S&P500 daily closing price data set. A different window length of 25-day, 50-day, and 100-day were tested on the same model and data set. The result of the experiment shows that different window length produced different forecasting accuracy. In the employed dataset, it is best to utilize 100 as the window length in forecasting the stock market price. Such a finding indicates the importance of determining the suitable window length for the problem in-hand as there is no One-Size-Fits-All model in time series forecasting.
- Published
- 2019
- Full Text
- View/download PDF
19. Investigation on the access log pattern of the corporate social responsibility UUMWiFi among Changlun’s community
- Author
-
Mohamad Mohsin, Mohamad Farhan, Abdul Hamid, Mohd Noor, Ahmad Mustaffa, Nurakmal, Ramli, Razamin, Abdullah, Kamarudin, Mohamad Mohsin, Mohamad Farhan, Abdul Hamid, Mohd Noor, Ahmad Mustaffa, Nurakmal, Ramli, Razamin, and Abdullah, Kamarudin
- Abstract
—CSR UUMWiFi is a CSR project under Universiti Utara Malaysia (UUM) that provides unlimited free internet connection for the Changlun community launched in 2015, the service has accumulated a huge number of users with diverse background and interest. This paper aims to uncover interesting service users’ behavior by mining the usage data. To achieve that, the access log for 3 months with 24,000 online users were downloaded from the WiFi network server, pre-process and analyzed. The finding reveals that there were many loyal users who have been using this service on a daily basissince 2015 and the community spent 20-60 minutes per session. Besides that, the social media and leisure based application such YouTube, Facebook, Instagram, chatting applications, and miscellaneous web applications were among the top applications accessed by the Changlun community which contributes to huge data usage. It is also found that there were few users have used the CSR UUMWiFifor academicor business purposes. The identified patterns benefits the management team in providing a better quality service for community in future and setting up new policies for the service.
- Published
- 2019
- Full Text
- View/download PDF
20. An application of Barnacle Mating Optimizer in Infectious Disease Prediction: A Dengue Outbreak Cases.
- Author
-
Mustaffa, Zuriani, Sulaiman, Mohd Herwan, Mohamad Mohsin, Mohamad Farhan, Yusof, Yuhanis, Ernawan, Ferda, Yusob, Bariah, and Noor, Noorhuzaimi Mohd
- Subjects
DISEASES ,ALGORITHMS ,OPTIMIZERS (Computer software) ,ERROR rates ,EVALUATION - Abstract
Meta-heuristic algorithms have been significantly applied in addressing various real-world prediction problem, including in disease prediction. Having a reliable disease prediction model benefits many parties in providing proper preparation for prevention purposes. Hence, the number of cases can be reduced. In this study, a relatively new meta-heuristic algorithm namely Barnacle Mating Optimizer (BMO) is proposed for short term dengue outbreak prediction. The BMO prediction model is realized over real dengue cases data recorded in weekly frequency from Malaysia. In addition, meteorological data sets were also been employed as input. For evaluation purposes, error analysis relative to Mean Absolute Percentage Error (MAPE), Mean Square Error (MSE), and Mean Absolute Deviation (MAD) were employed to validate the performance of the identified algorithms which includes the comparison between BMO against Moth Flame Optimizer (MFO) and Grey Wolf Optimizer (GWO) algorithms. Upon simulation, the superiority is in favour to BMO by producing lower error rates. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
21. An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection
- Author
-
Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy, Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, and Abdul Wahab, Mohd Helmy
- Abstract
In dendrite cell algorithm (DCA), the abnormality of a data point is determined by comparing the multi-context antigen value (MCAV) with anomaly threshold. The limitation of the existing threshold is that the value needs to be determined before mining based on previous information and the existing MCAV is inefficient when exposed to extreme values. This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. This paper proposed an improved anomaly threshold solution for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability. In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV. From the experiments towards 12 benchmark and two outbreak datasets, the improved DCA is proven to have a better detection result than its previous version in terms of sensitivity, specificity, false detection rate and accuracy.
- Published
- 2018
22. NFC-based data retrieval device
- Author
-
Abd Wahab, Mohd Helmy, Mohamed Suhaimi, Nur Farezan, Mohamad Mohsin, Mohamad Farhan, Mustapha, Aida, Samsudin, Noor Azah, Ambar, Radzi, Abd Wahab, Mohd Helmy, Mohamed Suhaimi, Nur Farezan, Mohamad Mohsin, Mohamad Farhan, Mustapha, Aida, Samsudin, Noor Azah, and Ambar, Radzi
- Abstract
This paper describes the design and development of data retrieval system using near field communication (NFC) protocol to read and transfer data from the device storage panel located at the recycle bin. In existing systems, data are manually collected from the storage device using the SD card and sent for upload to regional workstation of the data center, which is located at the central server. The device automatically establishes the NFC connection with the recycle bin panel and once the connection is established, data will automatically be transferred to the device and the current data storage in the recycle bin will be erased. Next, the collected data will be uploaded to the server through regional workstation
- Published
- 2018
23. CSR UUMWiFi: A University's effort in bridging digital divide among rural community
- Author
-
Abdul Hamid, Mohd Noor, Mustaffa, Nurakmal Ahmad, Mohamad Mohsin, Mohamad Farhan, Ramli, Razamin, Abdullah, Kamarudin, Abdul Hamid, Mohd Noor, Mustaffa, Nurakmal Ahmad, Mohamad Mohsin, Mohamad Farhan, Ramli, Razamin, and Abdullah, Kamarudin
- Abstract
As a response to the government effort to bridge digital divide and democratising access to the Internet, particularly in rural area, Universiti Utara Malaysia (UUM) has taken a proactive step to provide free wireless internet connection for Sintok-Changlun community known as CSR UUMWiFi. It is the first local public university in Malaysia that provides such service as part of its corporate social responsibility.In this paper, an investigation towards CSR UUMWiFi was conducted with the aim to ascertain the level of awareness, satisfactions, and its importance to the community.To achieve that, a questionnaire survey (via printed and online) were conducted and distributed within the Sintok-Changlon areas.A total of 424 usable responses were collected through simple random sampling.Data from the questionnaire were analysed using several statistical analysis's such descriptive analysis, correlation test, and chi-square test.Findings from the study reveal that majority of the users are Changlun's local residents, particularly the young and well educated group.The service is rank highly in terms of its importance.Nevertheless, the level of satisfaction on the CSR UUMWiFi is still at a moderate level.Interestingly, the gender and level of education have significant relationship with internet browsing activity where female and those with bachelor degree and SPM have higher propensity to use the service.Some improvements and future works were proposed to ensure that the service is more reliable and can help to transform the socio-economic of the community.
- Published
- 2018
24. AN IMPROVED ARTIFICIAL DENDRITE CELL ALGORITHM FOR ABNORMAL SIGNAL DETECTION
- Author
-
Mohamad Mohsin, Mohamad Farhan, primary, Abu Bakar, Azuraliza, additional, Hamdan, Abdul Razak, additional, and Abdul Wahab, Mohd Helmy, additional
- Published
- 2017
- Full Text
- View/download PDF
25. CHANGE POINT ANALYSIS: A STATISTICAL APPROACH TO DETECT POTENTIAL ABRUPT CHANGE
- Author
-
Mohd Arif, Siti Nur Afiqah, primary, Mohamad Mohsin, Mohamad Farhan, additional, Abu Bakar, Azuraliza, additional, Hamdan, Abdul Razak, additional, and Syed Abdullah, Sharifah Mastura, additional
- Published
- 2017
- Full Text
- View/download PDF
26. Validation on an Enhanced Dendrite Cell Algorithm using Statistical Analysis
- Author
-
Mohamad Mohsin, Mohamad Farhan, primary, Hamdan, Abdul Razak, additional, Abu Bakar, Azuraliza, additional, and Abd Wahab, Mohd Helmy, additional
- Published
- 2017
- Full Text
- View/download PDF
27. Validation on an enhanced dendrite cell algorithm using statistical analysis
- Author
-
Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy, Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, and Abd Wahab, Mohd Helmy
- Abstract
Evaluating a novel or enhanced algorithm is compulsory in data mining studies in order to measure it has superior performance than its previous version. In practice, most of studies apply a straightforward approach for evaluation where appropriate performance metrics such as classification accuracy is selected, computes the mean and its variance over several repetitive experiments, and then compares it with the base algorithm or other comparative approach. However, there are limitations using this approach because dataset from different domain tend to produce different error rate thus make their average meaningless as well as susceptible to the outlier. This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. In this study, we evaluated the performance of the enhanced algorithm called dendrite cell algorithm using sensitivity, specificity, false positive rate, and accuracy and validated the result using parametric and non parametric statistical significant tests. From the evaluation, the new version of dendrite cell algorithm was statistically proven to have improvement with a significant difference compared to its previous versions in all performance metrics.
- Published
- 2017
28. An adaptive anomaly threshold in artificial dendrite cell algorithm
- Author
-
Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, and Hamdan, Abdul Razak
- Abstract
The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold.In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values.This causes the DCA fails to detect unlabeled data if the new pattern distinct from previous information and reduces the detection accuracy.This paper proposed an adaptive anomaly threshold for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability.In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV.From the experiments towards 12 datasets, the new version of DCA generated a better detection result than its previous version in term of sensitivity, specificity, false detection rate, and accuracy.
- Published
- 2017
29. Experimenting the dendrite cell algorithm for disease outbreak detection model
- Author
-
Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, and Abu Bakar, Azuraliza
- Abstract
The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. To achieve that, an anthrax disease outbreak is chosen as a case study.Two artificial anthrax datasets known as WSARE7 and WSARE58 are taken as experiment data.The experiment is measured based on five metrics; detection rate, specificity, false alarm rate, accuracy, and time taken to produce result. Besides that, a comparison is made with Cumulative Sum, Exponentially-weighted Moving Average, and Multi Layer Perceptron.From the experiment, the best parameter setting for anthrax outbreak using dendrite cell algorithm is identified whereby it proven can helps the model to produce a good detection result between detection rate and false alarm rate.Since each outbreak disease carries different outbreak characteristic, the parameter setting for different outbreak might be different.
- Published
- 2014
30. An evaluation of feature selection technique for dendrite cell algorithm
- Author
-
Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, and Abu Bakar, Azuraliza
- Abstract
Dendrite cell algorithm needs appropriates feature to represents its specific input signals. Although there are many feature selection algorithms have been used in identifying appropriate features for dendrite cell signals, there are algorithms that never been investigated and limited work to compare performance among them. In this study, six feature selection algorithms namely Information Gain, Gain Ratio, Symmetrical Uncertainties, Chi Square, Support Vector Machine, and Rough Set with Genetic Algorithm Reduct are examined and their effectiveness to represent dendrite cell signal are evaluated. Eight universal datasets are chosen and assessing their performance according to sensitivity, specificity, and accuracy. From the experiment, the Rough Set Genetic Algorithm reduct is found to be the most effect feature selection for dendrite cell algorithm when it generates a consistent result for all evaluation metrics. In single evaluation metrics, the chi square technique has the best competence in term of sensitiveness while the rough set genetic algorithm reduct is good at specificity and accuracy. In the next step, further analysis will be conducted on complex dataset such as time series data set.
- Published
- 2014
- Full Text
- View/download PDF
31. An intelligent trainee selection model
- Author
-
Mohamad Mohsin, Mohamad Farhan, Ahmad, Faudziah, Mohamed Din, Aniza, Ku-Mahamud, Ku Ruhana, Din, Roshidi, Mohamad Mohsin, Mohamad Farhan, Ahmad, Faudziah, Mohamed Din, Aniza, Ku-Mahamud, Ku Ruhana, and Din, Roshidi
- Abstract
This paper proposed an intelligent model that is aimed at facilitating key workers select suitable trainees for a training program.The proposed model is initiated because it has been found that many motivational training programs fail to meet their objectives because there is a mismatch between the needs of training programs and the integrity levels of trainees.The proposed model consists of three modules namely personality characteristics identification, training program requirements identification, and trainee selection agent.A dataset for the study called Trainees Integrity Dataset (TID) is mined using association rule to discover important personality characteristics. TID is obtained from Langkawi District Education Office (LDEO) and it has 1500 respondents which represents secondary school teachers in Pulau Langkawi, Kedah, Malaysia who attended a training program organized by LDEO in 2009.The proposed model is intended to produce an efficient selection process and suitable trainees.
- Published
- 2011
32. The design of F-CMS: A flexible conference management system
- Author
-
Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohamad Helmy, Abdul Mutalib, Ariffin, Yasin, Azman, Abdul Kadir, Herdawatie, Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohamad Helmy, Abdul Mutalib, Ariffin, Yasin, Azman, and Abdul Kadir, Herdawatie
- Abstract
Conference management system (CMS) is designed to help the conference committee manages a conference well.The CMS which is available in market nowadays provides a well managed pre-conference function such as paper reviewing, paper submission, and participant registration system.However, payment module is not given priority by the existing CMS. This study argues that the payment management is importance ant to simplify the payment process, avoiding the unpaid paper being published in the proceeding. Also the conference committee can easily calculate the conference profit when the event ends. However, CMS is inflexible handling certain cases such as in case authors are unable to pay the fee before the conference day but need to submit the camera ready.Hence, this paper attempts to explain the design of a flexible conference management system (f-CMS).f-CMS is developed using RAD approach. It also includes the registration module during conference day.This paper presents the review of literatures and the early stages of the development of f-CMS.
- Published
- 2011
33. Weakest integrity traits identification of teachers using association rule mining
- Author
-
Mohamad Mohsin, Mohamad Farhan, Ahmad, Faudziah, Mohamed Din, Aniza, Ku-Mahamud, Ku Ruhana, Din, Roshidi, Mohamad Mohsin, Mohamad Farhan, Ahmad, Faudziah, Mohamed Din, Aniza, Ku-Mahamud, Ku Ruhana, and Din, Roshidi
- Abstract
The government has arranged many programs for teacher development however the training is organized to fit yearly calendar without considering the right teacher for the right training.The selection of teacher to attend training is done randomly, by rotation and not based on their work performance.This paper investigate the weakest integrity trait of teacher using association rule technique with the aim can assists the school management to organize training related to teachers integrity performance and avoid sending a wrong teacher for a training.A dataset of Trainees Integrity Dataset (TID) representing 1500 secondary school teachers in Langkawi Island, Malaysia in the year 2009 were pre-processed and mined using apriori. The knowledge from the mining was analyzed based on demographic and integrity trait of teacher.The finding indicates that adaptability and stability are the weakest integrity trait among teachers.Besides that, the analysis also unable to prove that demographic factor such as the age and gender of teachers reflect their low integrity performance.The finding can be a guideline for school management to propose a suitable training program for teacher to improve integrity mainly at the adaptability and stability trait.
- Published
- 2011
34. Dimensional ranking and reduction approach for finding optimal stock price influencing factors: An empirical study
- Author
-
Ahmad, Faudziah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza, Mohamad Mohsin, Mohamad Farhan, Ahmad, Faudziah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza, and Mohamad Mohsin, Mohamad Farhan
- Abstract
A limited number of factors in critical areas are necessary to identify the sustainability of companies [30].It was found that three factors were commonly used [2] and a maximum of seven factors was recommended [2].In order to identify the optimal factors, we propose a method based on rough set theory that consisted of five main steps.These were data cleansing and preparation, dimensional reduction, ranking selected factors, optimal factor extraction, and rules generation and evaluation. Dimensional reduction was conducted using rough set theory where the set of factors were identified from the set of reducts that produce highest classification accuracy.These factors were first ranked through computation of its occurrences in reduct sets and then selected based on highest occurrences.The major contribution of this work is the reduced factors shows competitive results in classifying new cases and therefore keeping the quality of knowledge.
- Published
- 2011
35. WAS-GN: Web-based Appointment System with GSM Network
- Author
-
Abd Wahab, Mohd Helmy, Ooi, Lee Lee, Abdul Kadir, Herdawatie, Johari, Ayob, Abdul Mutalib, Ariffin, Mohamad Mohsin, Mohamad Farhan, Mohd Sidek, Roslina, A., Noraziah, Abd Wahab, Mohd Helmy, Ooi, Lee Lee, Abdul Kadir, Herdawatie, Johari, Ayob, Abdul Mutalib, Ariffin, Mohamad Mohsin, Mohamad Farhan, Mohd Sidek, Roslina, and A., Noraziah
- Abstract
This paper presents a new way of online communications through mobile to web that helps students and lecturers to be always aware of appointments no matter where they are. It contributes to the teaching and learning process, in which communication is made easy using short messaging system (SMS) technology which is called Web-based Student Appointment System with GSM Network (WAS-GN).It starts with examples of previous success stories of the implementation of SMS in many areas.The objectives of the paper are to discuss about the hardware and software requirement, and integrate them to be measured in terms of functionality. The research method is outlined next, and some discussions over current outcomes of the research are addressed.The prototype of WAS-GN is successfully implemented using SMS technology.Briefly, results show that WAS-GN is able to solve the appointment-making problem.
- Published
- 2011
- Full Text
- View/download PDF
36. Face recognition for remote database backup system
- Author
-
Mohamed Din, Aniza, Ahmad, Faudziah, Mohamad Mohsin, Mohamad Farhan, Ku-Mahamud, Ku Ruhana, Theab, Mustafa Muwafak, Mohamed Din, Aniza, Ahmad, Faudziah, Mohamad Mohsin, Mohamad Farhan, Ku-Mahamud, Ku Ruhana, and Theab, Mustafa Muwafak
- Abstract
Face recognition is one of the most interesting applications in the image processing field.To build a model to recognize the face of different people, we need to do several processes on the image to obtain the most efficient features.In this research a face recognition model is developed.The dataset used is of different face images. Neural Networks technique, specifically Multilayer Perceptron (MLP) model with Back-Propagation learning algorithm and Template Matching approach are implemented in model developed.The face recognition model developed is then applied on a remote database backup system.Template matching approach is found to give a higher percentage of matching accuracy and a faster result can be obtained compared to MLP as no learning process is required
- Published
- 2011
37. Suitability of training programme based on integrity traits identification
- Author
-
Mohamad Mohsin, Mohamad Farhan, Ahmad, Faudziah, Mohamed Din, Aniza, Ku-Mahamud, Ku Ruhana, Din, Roshidi, Mohamad Mohsin, Mohamad Farhan, Ahmad, Faudziah, Mohamed Din, Aniza, Ku-Mahamud, Ku Ruhana, and Din, Roshidi
- Abstract
Training programs for teacher’s development in Malaysia are organized ever year. The selection of teachers to attend trainings is currently done randomly, by rotation and not based on their work performance.This poses a problem in selecting the right teacher to attend the right course.Up until now, there is no intelligent model to assist the school management to determine the integrity level of teacher and assign them to the right training program. Thus, this study investigates the integrity traits of teacher using association rule technique with an aim, which can assist the school management to organize a training related to teachers’ integrity performance and to avoid sending the wrong teacher for the training.A dataset of Trainees Integrity Dataset representing 1500 secondary school teachers in Langkawi Island, Malaysia in the year 2009 were pre-processed and mined using apriori. Mining knowledge was analyzed based on demographic and integrity trait of teacher.The finding indicates that adaptability and stability are the weakest integrity trait among teachers. Teachers from the age group of 26 - 30 years are found to have lower integrity performance.However, other demographic factor such as gender, race, and grade position of teachers were not able to reflect their low integrity level in this study.Findings from this study can be used as guideline for school management to propose suitable training programs for teacher to improve their integrity mainly on adaptability and stability traits.
- Published
- 2011
38. An investigation into influence factor of student programming grade using association rule mining
- Author
-
Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Zaiyadi, Mohd Fairuz, Hibadullah, Cik Fazilah, Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Zaiyadi, Mohd Fairuz, and Hibadullah, Cik Fazilah
- Abstract
Computer programming is one of the most essential skills which each graduate has to acquire.However, there are reports that they are unable to write a program well. Researches indicated there are many factors can affect student programming performance.Thus, the aim of this study is to investigate the significant factors that may influence students programming performance based information from previous student performance using data mining technique. Data mining is a data analysis technique that able to discover hidden knowledge in database. The programming dataset used in this study comprises information on the performance profile of Universiti Utara Malaysia students from 4 different bachelor programs that were Bachelor in Information Technology , Bachelor in Multimedia, Bachelor in Decision Science and Bachelor in Education specializing in IT of the November session year 2004/2005. They were required to enroll introductory programming subject as requirement to graduate . The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. The result indicated that the student who has been exposed to programming prior to entering university and scored well in Mathematics and English subject during secondary Malaysian School Certificate examination were among strong indicators that contributes to good programming grades. This finding can be a guideline to the faculty to plan a teaching and learning program for new registered student.
- Published
- 2010
- Full Text
- View/download PDF
39. Design and development of portable RFID for attendance system
- Author
-
Abd Wahab, Mohd Helmy, Abdul Kadir, Herdawatie, Abdul Mutalib, Ariffin, Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Abdul Kadir, Herdawatie, Abdul Mutalib, Ariffin, and Mohamad Mohsin, Mohamad Farhan
- Abstract
This paper describes an ongoing project for recording examination attendance using Radio Frequency Identification (RFID).The project is carried out to test in a university, where the system which is named Portable Examination Attendance System (PEAS) is integrated with the existing system for record extraction.The use of RFID technology enables the university management to avoid attendance forms from damages such as tear, lost, and misplaced. This paper describes about the design and development of PEAS in terms of hardware technology and software. In addition, some related works are reviewed and addressed to support this project.As a conclusion, this paper states some future works of this project.
- Published
- 2010
- Full Text
- View/download PDF
40. The development of hashing indexing technique in case retrieval
- Author
-
Mohamad Mohsin, Mohamad Farhan, Md Norwawi, Norita, Manaf, Maznie, Abd Wahab, Mohd Helmy, Mohamad Mohsin, Mohamad Farhan, Md Norwawi, Norita, Manaf, Maznie, and Abd Wahab, Mohd Helmy
- Abstract
Case-based reasoning (CBR) considers previous experience in form of cases to overcome new problems. It requires many solved cases in case base in order to produce a quality decision. Since today, database technology has allowed CBR to use a huge case storage therefore the case retrieval process also reflects the final decision in CBR. Traditionally, sequential indexing method has been applied to search for possible cases in case base. This technique is worked fast when the number of cases is small but it consumes more time to retrieve when the number of data grows in case base.To overcome the weakness, this study researches the non-sequential indexing called hashing as an alternative to mine large cases and faster the retrieval time in CBR. Hashing indexing searches a record by determines the index using only an entry's search key without traveling to all records. This paper presents the review of a literature and early stages of the integration hashing indexing method in CBR. The concept of hashing indexing in case retrieving process, the model development, and the preliminary algorithm testing result will be discussed in this paper.
- Published
- 2010
- Full Text
- View/download PDF
41. Web-Based appointment system using short message service technology: Usability aspect
- Author
-
Abd Wahab, Mohd Helmy, Ooi, Lee Lee, Abdul Mutalib, Ariffin, Hassan, Norlida, Mohd Sidek, Roslina, Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Ooi, Lee Lee, Abdul Mutalib, Ariffin, Hassan, Norlida, Mohd Sidek, Roslina, and Mohamad Mohsin, Mohamad Farhan
- Abstract
This paper presents an ongoing research that helps students and lecturers to be always aware of the appointment no matter where they are.It contributes to the teaching and learning process, in which communication is made easy using short messaging system (SMS) technology.It starts with examples of previous success stories of the implementation of SMS in many areas.The objectives of the paper are to discuss about the hardware and software requirement, and integrate them to be measured in terms functional. The research method is outlined next, and some discussions on current outcome of the research are addressed.The research is planned to be continued with full implementation of the proposed system that is called Student Appointment System using SMS technology.
- Published
- 2010
42. Pattern extraction for programming performance evaluation using directed apriori
- Author
-
Mohamad Mohsin, Mohamad Farhan, Zaiyadi, Mohd Fairuz, Md Norwawi, Norita, Abd Wahab, Mohd Helmy, Mohamad Mohsin, Mohamad Farhan, Zaiyadi, Mohd Fairuz, Md Norwawi, Norita, and Abd Wahab, Mohd Helmy
- Abstract
Computer programming is taught as a core subject in Information Technology related studies.It is one of the most essential skills which each student has to acquire.However, there is still a small number of students who are unable to write a program well. Several researches indicated that there are many factors which can affect student programming performance.Thus, the objective of this paper is to investigate the significant factors that may influence students programming performance using information from previous student performance.Since data mining data analysis able to discover hidden knowledge in database, a programming dataset which comprises information about performance profile of Bachelor of Information Technology students of Faculty of IT, Universiti Utara Malaysia in the year 2004-2005 were explored using data mining technique.The dataset consists of 421 records with 70 mixture type of attributes were pre-processed and then mined using directed association rule (AR) mining algorithm namely apriori.The result indicated that the student who has a programming experience in advanced before starts learn programming in university and scored well in Mathematics and English subject during SPM were among the factor that contributes to a good programming grades.
- Published
- 2009
43. Data pre-processing on web server logs for generalized association rules mining algorithm
- Author
-
Abd Wahab, Mohd Helmy, Mohd, Mohd Norzali, Hanafi, Hafizul Fahri, Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Mohd, Mohd Norzali, Hanafi, Hafizul Fahri, and Mohamad Mohsin, Mohamad Farhan
- Abstract
Web log file analysis began as a way for IT administrators to ensure adequate bandwidth and server capacity on their organizations website. Log file data can offer valuable insight into web site usage.It reflects actual usage in natural working condition, compared to the artificial setting of a usability lab.It represents the activity of many users, over potentially long period of time, compared to a limited number of users for an hour or two each.This paper describes the pre-processing techniques on IIS Web Server Logs ranging from the raw log file until before mining process can be performed. Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.
- Published
- 2008
44. Comparing the knowledge quality in rough classifier and decision tree classifier
- Author
-
Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Mohamad Mohsin, Mohamad Farhan, and Abd Wahab, Mohd Helmy
- Abstract
This paper presents a comparative study of two rule based classifier; rough set (Rc) and decision tree (DTc).Both techniques apply different approach to perform classification but produce same structure of output with comparable result. Theoretically, different classifiers will generate different sets of rules via knowledge even though they are implemented to the same classification problem.Hence, the aim of this paper is to investigate the quality of knowledge produced by Rc and DTc when similar problems are presented to them.In this case, four important performance metrics are used as comparison, the accuracy of classification, rules quantity, rules length and rules coverage.Five dataset from UCI Machine Learning are chosen and then mined using Rc toolkit namely ROSETTA while C4.5 algorithm in WEKA application is chosen as DTc rule generator. The experimental result shows that Rc and DTc own capability to generate quality knowledge since most of the results are comparable. Rc outperform as an accurate classifier, produce shorter and simpler rule with higher coverage. Meanwhile, DTc obviously generates fewer numbers of rules with significant difference.
- Published
- 2008
- Full Text
- View/download PDF
45. Integration Of The Dendritic Cell Algorithm With K-Means Clustering.
- Author
-
Mohamad Mohsin, Mohamad Farhan, Bakar, Azuraliza Abu, and Hamdan, Abdul Razak
- Subjects
DENDRITIC cells ,ALGORITHM research ,MATHEMATICAL sequences ,CLUSTER analysis (Statistics) ,MATHEMATICAL transformations - Abstract
The dendritic cell algorithm is an effective technique to detect anomalies in time series applications. However, the algorithm is less effective when it mines a general classification dataset because the items are not organized in an orderly event-driven manner. Ideally, for they need to be arranged in sequence by sorting them according to decision class. However, it is not practicable to apply this step because the decision classes for real datasets is unknown. Therefore, an integrated model that combines the dendritic cell algorithm and the k-means algorithm is proposed as an alternative to the existing sorting function based on decision class. The proposed model is evaluated by applying it to eight universal classification datasets and assessing its performance according to four evaluation metrics: detection rate, specificity, false detection rate, and accuracy. The results show that the proposed clustered dendritic cell algorithm is more effective than the non-clustered version. When applied to a benchmark dataset, the clustered dendritic cell algorithm demonstrates significant improvement in performance on the unordered version of the dataset and generates a comparable result to that of its competitor. For the other seven datasets, the proposed algorithm generates better specificity, false detection rate, and accuracy. The findings indicate that item--centroid distance within a cluster can be adopted to transform an unordered dataset into a sequential dataset, thus fulfilling the dendritic cell algorithm requirement for ordered data. [ABSTRACT FROM AUTHOR]
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.