Mohd Arfian Ismail
Universiti Malaysia Pahang

Published : 10 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 10 Documents
Search

A new model for iris data set classification based on linear support vector machine parameter's optimization Zahraa Faiz Hussain; Hind Raad Ibraheem; Mohammad Alsajri; Ahmed Hussein Ali; Mohd Arfian Ismail; Shahreen Kasim; Tole Sutikno
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (504.778 KB) | DOI: 10.11591/ijece.v10i1.pp1079-1084

Abstract

Data mining is known as the process of detection concerning patterns from essential amounts of data. As a process of knowledge discovery. Classification is a data analysis that extracts a model which describes an important data classes. One of the outstanding classifications methods in data mining is support vector machine classification (SVM). It is capable of envisaging results and mostly effective than other classification methods. The SVM is a one technique of machine learning techniques that is well known technique, learning with supervised and have been applied perfectly to a vary problems of: regression, classification, and clustering in diverse domains such as gene expression, web text mining. In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function Nur Farahaina Idris; Mohd Arfian Ismail; Mohd Saberi Mohamad; Shahreen Kasim; Zalmiyah Zakaria; Tole Sutikno
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 11, No 2: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v11.i2.pp448-461

Abstract

Breast cancer is the second leading cause of mortality among female cancer patients worldwide. Early detection of breast cancer is considerd as one of the most effective ways to prevent the disease from spreading and enable human can make correct decision on the next process. Automatic diagnostic methods were frequently used to conduct breast cancer diagnoses in order to increase the accuracy and speed of detection. The fuzzy-ID3 algorithm with association function implementation (FID3-AF) is proposed as a classification technique for breast cancer detection. The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. The fuzzy-neural dynamicbottleneck-detection (FUZZYDBD) is considered as an automatic fuzzy database definition method, would aid in the development of the fuzzy database for the data fuzzification process in FID3-AF. The FID3-AF overcame ID3’s issue of being unable to handle continuous data. The association function is implemented to minimise overfitting and enhance generalisation ability. The results indicated that FID3-AF is robust in breast cancer classification. A thorough comparison of FID3-AF to numerous existing methods was conducted to validate the proposed method’s competency. This study established that the FID3-AF performed well and outperform other methods in breast cancer classification.
Comparison of meta-heuristic algorithms for fuzzy modelling of COVID-19 illness’ severity classification Nur Azieta Mohamad Aseri; Mohd Arfian Ismail; Abdul Sahli Fakharudin; Ashraf Osman Ibrahim; Shahreen Kasim; Noor Hidayah Zakaria; Tole Sutikno
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 11, No 1: March 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v11.i1.pp50-64

Abstract

The world health organization (WHO) proclaimed the COVID-19, commonly known as the coronavirus disease 2019, was a pandemic in March 2020. When people are in close proximity to one another, the virus spreads mostly through the air. It causes some symptoms in the affected person. COVID-19 symptoms are quite variable, ranging from none to severe sickness. As a result, the fuzzy method is seen favourably as a tool for determining the severity of a person’s COVID-19 sickness. However, when applied to a large situation, manually generating a fuzzy parameter is challenging. This could be because of the identification of a large number of fuzzy parameters. A mechanism, such as an automatic procedure, is consequently required to identify the right fuzzy parameters. The metaheuristic algorithm is regarded as a viable strategy. Five meta-heuristic algorithms were analyzed and utilized in this article to classify the severity of COVID-19 sickness data. The performance of the five meta-heuristic algorithms was evaluated using the COVID-19 symptoms dataset. The COVID-19 symptom dataset was created in accordance with WHO and the Indian ministry of health and family welfare criteria. The findings provide the average classification accuracy for each approach.
Review of the machine learning methods in the classification of phishing attack John Arthur Jupin; Tole Sutikno; Mohd Arfian Ismail; Mohd Saberi Mohamad; Shahreen Kasim; Deris Stiawan
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (723.905 KB) | DOI: 10.11591/eei.v8i4.1344

Abstract

The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. This shows that the use of Internet networks is very important, whether for work purposes or access to social media accounts. However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. This problem will allow hackers to hack and commit network attacks. This is very dangerous, especially for Internet users because hackers can steal confidential information such as bank login account or social media login account. The attacks that can be made include phishing attacks. The goal of this study is to review the types of phishing attacks and current methods used in preventing them. Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.
Review of the machine learning methods in the classification of phishing attack John Arthur Jupin; Tole Sutikno; Mohd Arfian Ismail; Mohd Saberi Mohamad; Shahreen Kasim; Deris Stiawan
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (723.905 KB) | DOI: 10.11591/eei.v8i4.1344

Abstract

The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. This shows that the use of Internet networks is very important, whether for work purposes or access to social media accounts. However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. This problem will allow hackers to hack and commit network attacks. This is very dangerous, especially for Internet users because hackers can steal confidential information such as bank login account or social media login account. The attacks that can be made include phishing attacks. The goal of this study is to review the types of phishing attacks and current methods used in preventing them. Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.
Review of the machine learning methods in the classification of phishing attack John Arthur Jupin; Tole Sutikno; Mohd Arfian Ismail; Mohd Saberi Mohamad; Shahreen Kasim; Deris Stiawan
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (723.905 KB) | DOI: 10.11591/eei.v8i4.1344

Abstract

The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. This shows that the use of Internet networks is very important, whether for work purposes or access to social media accounts. However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. This problem will allow hackers to hack and commit network attacks. This is very dangerous, especially for Internet users because hackers can steal confidential information such as bank login account or social media login account. The attacks that can be made include phishing attacks. The goal of this study is to review the types of phishing attacks and current methods used in preventing them. Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection Noor Syahirah Nordin; Mohd Arfian Ismail; Tole Sutikno; Shahreen Kasim; Rohayanti Hassan; Zalmiyah Zakaria; Mohd Saberi Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i2.pp1146-1158

Abstract

Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed and four metrics including accuracy, recall, precision, and f-measure. 
Optimisation of Biochemical Systems Production using Hybrid of Newton Method, Differential Evolution Algorithm and Cooperative Coevolution Algorithm Mohd Arfian Ismail; Vitaliy Mezhuyev; Kohbalan Moorthy; Shahreen Kasim; Ashraf Osman Ibrahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 1: October 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i1.pp27-35

Abstract

This paper present a hybrid method of Newton method, Differential Evolution Algorithm (DE) and Cooperative Coevolution Algorithm (CCA). The proposed method is used to solve the optimisation problem in optimise the production of biochemical systems. The problems are maximising the biochemical systems production and simultaneously minimising the total amount of chemical reaction concentration involves. Besides that, the size of biochemical systems also contributed to the problem in optimising the biochemical systems production. In the proposed method, the Newton method is used in dealing biochemical system, DE for optimisation process while CCA is used to increase the performance of DE. In order to evaluate the performance of the proposed method, the proposed method is tested on two benchmark biochemical systems. Then, the result that obtained by the proposed method is compare with other works and the finding shows that the proposed method performs well compare to the other works.
User identification system for inked fingerprint pattern based on central moments Esraa Jaffar Baker; Sundos Abdulameer Alazawi; Nada Thanoon Ahmed; Mohd Arfian Ismail; Rohayanti Hassan; Shahliza Abd Halim; Tole Sutikno
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i2.pp1149-1160

Abstract

The use of the fingerprint recognition has been and remains very important in many security applications and licensing systems. Fingerprint recognition is required in many areas such as licensing access to networks, corporate computers and organizations. In this paper, the system of fingerprint recognition that can be used in several cases of fingerprint such as being rounded at an angle by a randomly inked fingerprint on paper. So, fingerprint image is tooked at a different angle in order to identify the owner of the ink fingerprint. This method involves two working levels. The first one, the fingerprint pattern's shape features are calculated based on the central moments of each image being listed on a regular basis with three states rotation. Each image is rotated at a specified angle. In the second level, the fingerprint holder entered is identified using the previously extracted shape features and compared to the three local databases content of three rotation states. When applied the method for several persons by taken their inked fingerprint on the paper, the accuracy of the system in identifying the owner of the fingerprint after rotation states were close to 83.71.
Application of the Jaya algorithm to solve the optimal reliability allocation for reduction oxygen supply system of a spacecraft Saad Abbas Abed; Mohammad Aljanabi; Noor Hayder Abdul Ameer; Mohd Arfian Ismail; Shahreen Kasim; Rohayanti Hassan; Tole Sutikno
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i2.pp1202-1211

Abstract

In this paper the reliability of reduction oxygen supply system (ROSS) of a spacecraft which was calculated as a complex system using minimal cut method. The reliability of each component of system was calculated as well as the reliability importance of the system. The cost of each component of the system was possible approaches of the allocation values of reliability based the minimization of the overall cost in this system. The advantage of this algorithm can be used to allocate the optimization of reliability for simple or complex system. This optimization is achieved using the Jaya algorithm. The proposed technique is based on the notion that a conclusion reached on a particular problem should pass near the best results and avoid the worst outcomes. The original findings of this paper are: i) the system used in this paper is a spacecraft’s reduced oxygen supply system with the logarithmic cost function; and ii) the results obtained were by using the Jaya algorithm to solve specific system reliability optimization problems.