Mohamad Afendee Mohamed
Universiti Sultan Zainal Abidin

Published : 14 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 14 Documents
Search

Cryptographic adaptation of the middle square generator Hana Ali-Pacha; Naima Hadj-Said; Adda Ali-Pacha; Mohamad Afendee Mohamed; Mustafa Mamat
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (889.016 KB) | DOI: 10.11591/ijece.v9i6.pp5615-5627

Abstract

Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.
A New Chaotic System with Line of Equilibria: Dynamics, Passive Control and Circuit Design Aceng Sambas; Mustafa Mamat; Ayman Ali Arafa; Gamal M Mahmoud; Mohamad Afendee Mohamed; W. S. Mada Sanjaya
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2267.016 KB) | DOI: 10.11591/ijece.v9i4.pp2336-2345

Abstract

A new chaotic system with line equilibrium is introduced in this paper. This system consists of five terms with two transcendental nonlinearities and two quadratic nonlinearities. Various tools of dynamical system such as phase portraits, Lyapunov exponents, Kaplan-Yorke dimension, bifurcation diagram and Poincarè map are used. It is interesting that this system has a line of fixed points and can display chaotic attractors. Next, this paper discusses control using passive control method. One example is given to insure the theoretical analysis. Finally, for the  new chaotic system, An electronic circuit for realizing the chaotic system has been implemented. The numerical simulation by using MATLAB 2010 and implementation of circuit simulations by using MultiSIM 10.0 have been performed in this study.
A simple multi-stable chaotic jerk system with two saddle-foci equilibrium points: analysis, synchronization via backstepping technique and MultiSim circuit design Aceng Sambas; Sundarapandian Vaidyanathan; Irene M. Moroz; Babatunde Idowu; Mohamad Afendee Mohamed; Mustafa Mamat; W. S. Mada Sanjaya
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 4: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i4.pp2941-2952

Abstract

This paper announces a new three-dimensional chaotic jerk system with two saddle-focus equilibrium points and gives a dynamic analysis of the properties of the jerk system such as Lyapunov exponents, phase portraits, Kaplan-Yorke dimension and equilibrium points. By modifying the Genesio-Tesi jerk dynamics (1992), a new jerk system is derived in this research study. The new jerk model is equipped with multistability and dissipative chaos with two saddle-foci equilibrium points. By invoking backstepping technique, new results for synchronizing chaos between the proposed jerk models are successfully yielded. MultiSim software is used to implement a circuit model for the new jerk dynamics. A good qualitative agreement has been shown between the MATLAB simulations of the theoretical chaotic jerk model and the MultiSIM results
Speech encryption by multiple chaotic map with fast fourier transform Yahia Alemami; Mohamad Afendee Mohamed; Saleh Atiewi; Mustafa Mamat
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (743.64 KB) | DOI: 10.11591/ijece.v10i6.pp5658-5664

Abstract

There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdropping the calls and voice messages, One way to solve this problem is via cryptographic approach. Chaos cryptography build on top of nonlinear dynamics chaotic system has gained some footstep in data security. It provides an alternative to conventional cryptography built on top of mathematical structures. This research focuses on the protection of speech recording by encrypting it with multiple encryption algorithms, including chaotic maps (Logistic Map and Sine Maps).
Improve of contrast-distorted image quality assessment based on convolutional neural networks Ismail Taha Ahmed; Chen Soong Der; Norziana Jamil; Mohamad Afendee Mohamed
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (771.32 KB) | DOI: 10.11591/ijece.v9i6.pp5604-5614

Abstract

Many image quality assessment algorithms (IQAs) have been developed during the past decade. However, most of them are designed for images distorted by compression, noise and blurring. There are very few IQAs designed specifically for Contrast Distorted Images (CDI), e.g. Reduced-reference Image Quality Metric for Contrast-changed images (RIQMC) and NR-IQA for Contrast-Distorted Images (NR-IQA-CDI). The existing NR-IQA-CDI relies on features designed by human or handcrafted features because considerable level of skill, domain expertise and efforts are required to design good handcrafted features. Recently, there is great advancement in machine learning with the introduction of deep learning through Convolutional Neural Networks (CNN) which enable machine to learn good features from raw image automatically without any human intervention. Therefore, it is tempting to explore the ways to transform the existing NR-IQA-CDI from using handcrafted features to machine-crafted features using deep learning, specifically Convolutional Neural Networks (CNN).The results show that NR-IQA-CDI based on non-pre-trained CNN (NR-IQA-CDI-NonPreCNN) significantly outperforms those which are based on handcrafted features. In addition to showing best performance, NR-IQA-CDI-NonPreCNN also enjoys the advantage of zero human intervention in designing feature, making it the most attractive solution for NR-IQA-CDI.
A new two-scroll chaotic system with two nonlinearities: dynamical analysis and circuit simulation Sundarapandian Vaidyanathan; Aceng Sambas; Sen Zhang; Yicheng Zeng; Mohamad Afendee Mohamed; Mustafa Mamat
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.10650

Abstract

Chaos theory has several applications in science and engineering. In this work, we announce a new two-scroll chaotic system with two nonlinearities. The dynamical properties of the system such as dissipativity, equilibrium points, Lyapunov exponents, Kaplan-Yorke dimension and bifurcation diagram are explored in detail. The presence of coexisting chaotic attractors, coexisting chaotic and periodic attractors in the system is also investigated. In addition, the offset boosting of a variable in the new chaotic system is achieved by adding a single controlled constant. It is shown that the new chaotic system has rotation symmetry about the z-axis. An electronic circuit simulation of the new two-scroll chaotic system is built using Multisim to check the feasibility of the theoretical model. 
Malware threat analysis techniques and approaches for IoT applications: a review Chimeleze Collins Uchenna; Norziana Jamil; Roslan Ismail; Lam Kwok Yan; Mohamad Afendee Mohamed
Bulletin of Electrical Engineering and Informatics Vol 10, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i3.2423

Abstract

Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
University course timetabling model using ant colony optimization algorithm approach Munirah Mazlan; Mokhairi Makhtar; Ahmad Firdaus Khair Ahmad Khairi; Mohamad Afendee Mohamed
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i1.pp72-76

Abstract

Due to the increased number of students and regulations, all educational institutions have renewed their interest to appear in the number of complexity and flexibility since the resources and events are becoming more difficult to be scheduled. Timetabling is the type of problems where the events need to be organized into a number of timeslots to prevent the conflicts in using a given set of resources. Thus in the intervening decades, significant progress has been made in the course timetabling problem monitoring with meta-heuristic adjustment. In this study, ant colony optimization (ACO) algorithm approach has been developed for university course timetabling problem. ACO is believed to be a powerful solution approach for various combinatorial optimization problems. This approach is used according to the data set instances that have been collected. Its performance is presented using the appropriate algorithm. The results are arguably within the best results range from the literature. The performance assessment and results are used to determine whether they are reliable in preparing a qualifying course timetabling process.
Colored object detection using 5 dof robot arm based adaptive neuro-fuzzy method Mujiarto Mujiarto; Asari Djohar; Mumu Komaro; Mohamad Afendee Mohamed; Darmawan Setia Rahayu; W. S. Mada Sanjaya; Mustafa Mamat; Aceng Sambas; Subiyanto Subiyanto
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i1.pp293-299

Abstract

In this paper, an Adaptive Neuro Fuzzy Inference System (ANFIS) based on Arduino microcontroller is applied to the dynamic model of 5 DoF Robot Arm presented. MATLAB is used to detect colored objects based on image processing. Adaptive Neuro Fuzzy Inference System (ANFIS) method is a method for controlling robotic arm based on color detection of camera object and inverse kinematic model of trained data. Finally, the ANFIS algorithm is implemented in the robot arm to select objects and pick up red objects with good accuracy.
Spam detection by using machine learning based binary classifier Mohd Fadzil Abdul Kadir; Ahmad Faisal Amri Abidin; Mohamad Afendee Mohamed; Nazirah Abdul Hamid
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i1.pp310-317

Abstract

Because of its ease of use and speed compared to other communication applications, email is the most commonly used communication application worldwide. However, a major drawback is its inability to detect whether mail content is either spam or ham. There is currently an increasing number of cases of stealing personal information or phishing activities via email. This project will discuss how machine learning can help in spam detection. Machine learning is an artificial intelligence application that provides the ability to automatically learn and improve data without being explicitly programmed. A binary classifier will be used to classify the text into two different categories: spam and ham. This research shows the machine learning algorithm in the Azure-based platform predicts the score more accurately compared to the machine learning algorithm in visual studio, hybrid analysis and JoeSandbox cloud.