Aida Mustapha
Universiti Tun Hussein Onn Malaysia

Published : 29 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 29 Documents
Search

Review of local binary pattern operators in image feature extraction Shihab Hamad Khaleefah; Salama A. Mostafa; Aida Mustapha; Mohammad Faidzul Nasrudin
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp23-31

Abstract

With the substantial expansion of image information, image processing and computer vision have significant roles in several applications, including image classification, image segmentation, pattern recognition, and image retrieval. An important feature that has been applied in many image applications is texture. Texture is the characteristic of a set of pixels that form an image. Therefore, analyzing texture has a significant impact on segmenting an image or detecting important portions of an image. This paper provides a review on LBP and its modifications. The aim of this review is to show the current trends for using, modifying and adapting LBP in the domain of image processing.
Comparative Analysis for Topic Classification in Juz Al-Baqarah Mohamad Izzuddin Rahman; Noor Azah Samsudin; Aida Mustapha; Adeleke Abdullahi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp406-411

Abstract

In Islam, Quran is the holy book that was revealed to the Prophet Muhammad. It functions as complete code of life for the Muslims. Remarks from Allah which contains more than 77,000 words that was passed down through Prophet Muhammad to the mankind for 23 years started in 610 ce. The Quran was divided into 114 chapters.  Arabic language is the original text. The need for the Muslims across the world to find the meaning to understand the content in the Quran is necessary. Nevertheless, understanding the Quran is an interest for the Muslims as well as the attention of millions of people from the faiths.  Following the generation, lots of content that related to the Quran has been broadcast by Muslims scholars in the way of the tafsirs, translation and the book of hadiths. Problem has happened at current is most Muslim in Malaysia do not understand sentences in the Quran due to language barrier. The purpose of this research is classified topic in each verses of the Quran sentence based on its specific theme. It involves the objective of text mining which are based on linguistic information and domain. The usage of corpus helps to perform various data mining tasks including information extraction, text categorization, the relationship of concepts, association discovery, the evaluation of pattern and assessed. This research project is aiming to create computing environment that enable us use to text mining the Quran. The classification experiment is using the Support Vector Machine to find themes in Juz’ Baqarah. The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. This research project aims at creating an enabling computational environment for text mining the Qur’an and to facilitate users to understand every verse in Juz’ Baqarah.
Competitive analysis of single and multi-path routing protocols in mobile Ad-Hoc network Mohammed Ahmed Jubair; Mustafa Hamid Hassan; Salama A. Mostafa; Hairulnizam Mahdin; Aida Mustapha; Luqman Hanif Audah; Farooq Sijal Shaqwi; Ali Hashim Abbas
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp293-300

Abstract

A Mobile Ad-hoc Network (MANET) refers to a dynamic and wireless network, which can be designed without an existing infrastructure as every node serves as a router. A MANET is a self-configuring system of mobile nodes that are connected wirelessly. Every node serves as a sink, as well as a router to send packets. The movement of the nodes is not restricted as they can move in any direction, and they have the ability to get organized into a network. Due to their free and independent movement, they do not have a fixed position; they often change positions. In this study, the Dynamic Source Routing (DSR) and Ad-hoc On Multipath Demand Distance Vector (AOMDV) protocols are compared using Network Simulator NS2.35. DSR is a reactive gateway discovery algorithm whereby the connection of a MANET mobile device is established only on demand. Basically, AOMDV was specially tailored for ad-hoc networks that are highly dynamic to respond to link failures and breakages in the network. It ensures that the paths for destinations are sustained, and it defines the new routing information using destination serial numbers to ensure loop freedom always while avoiding problems. More so, it is a protocol that is based on a timer that can discover ways through which the mobile nodes respond to link breakages and change in topology. A comparison of protocols has been carried out individually and jointly with the aim of evaluating their performance. The performance is measured in terms of End-to-End Delay, Packet Delivery Ratio, Packet Loss Ratio, and Routing Overhead Ratio. The performance of the routing protocols was done using two scenarios; when there is a change in the simulation time and when there is a change in the number of nodes.
Analysis Review on Performance Metrics for Extraction Schemes in Text Steganography Raihan Sabirah Sabri; Roshidi Din; Aida Mustapha
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp761-767

Abstract

In today's era of big data computer networks, protection of secret messages when transmitting information is a major concern. The openness and publicity of the communication channel are the main attraction for malicious people to steal personal data even though privacy protection in operational. Data extraction is process that reverses the data embedding process in information hiding. However, the performance of an information hiding framework highly depends on the evaluation metrics used. The effectiveness of evaluation itself is mainly determined by the performance aspect or critera such as capacity, imperceptibility or security. The aim of this paper is to present a review on trends for existing performance metrics used in extraction schemes from a data hiding framework. This review is hoped to help future research in evaluating the performance of data hiding framework in general and the proposed extraction schemes in specific.
A review of arabic text steganography: past and present Suhaibah Jusoh; Aida Mustapha; Azizan Ismail; Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp1040-1046

Abstract

Steganography is a strategy for hiding secret information in a cover document in order to avoid attacker from predict about hidden information. Steganography exploit cover message, for instance text, audio, picture and video to hide the secret message. Before this, linguistic text steganographic techniques are implemented just for the English language. But nowadays different languages are used to hide the data like Arabic language. This language is still new in the steganography and still need practices for empowerment. This paper will present the text steganographic method for Arabic language, scholar paper within 5 year will be analyze and compared. The main objective of this paper is to give the comparative analysis in the Arabic steganography method that has been applied by previous researchers. Finally, the disadvantage and advantage of the method also will be presented in this paper.
Heartbeats: music recommendation system with fuzzy inference engine Vinothini Kasinathan; Aida Mustapha; Tan Sau Tong; Mohamad Firdaus Che Abdul Rani; Nor Azlina Abd Rahman
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i1.pp275-282

Abstract

In developing a music recommendation system, there are several factors that can contribute to the inefficiency in music selection. One of the problems persists during the music listening is that common music playing application lacks the ability to acquire context of the user. Another problem that common music recommendation system fails to address the is emotional impact of the recommended song. To address this gap, this paper presents a music recommendation system based on fuzzy inference engine that considers user activities and emotion as part of the recommendation parameters. The system includes building a smart music recommendation system that has user profiling capabilities to recommend correct songs based on the user’s preferences, mood and time. Findings of the this paper have shown that Heartbeats’s fuzzy inference engine has successfully achieved its aim, which is to improve users’ music listening experience by giving suitable song recommendation based on user context situation.
A Review on Structured Scheme Representation on Data Security Application Siti Norussaadah Mohd Salleh; Roshidi Din; Nur Haryani Zakaria; Aida Mustapha
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp733-739

Abstract

With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application.
A survey on local binary pattern and gabor filter as texture descriptors of smart profiling systems Shihab Hamad Khaleefah; Salama A. Mostafa; Aida Mustapha; Noor Azah Samsudin; Mohammad Faidzul Nasrudin; Abdullah Baz
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1379-1387

Abstract

With the dramatic expansion of image information nowadays, image processing and computer visions are playing a significant role in terms of several applications such as image classification, image segmentation, pattern recognition, and image retrieval. One of the important features that have been used in many image applications is texture. The texture is the characteristic of a set of pixels that formed the image. Therefore, analyzing such texture would have a significant impact on segmenting the image or detecting important portions of such image. This paper aims to overview the feature extraction and description techniques depicted in the literature to characterize regions for images. In particular, two of popular descriptors will be examined including local binary pattern (LBP) and gabor filter. The key characteristic behind such investigation lies in how the features of an image would contribute toward the process of recognition and image classification. In this regard, an extensive discussion is provided on both LBP and Gabor descriptors along with the efforts that have been intended to combine them. The reason behind investigating these descriptors is that they are considered the most common local and global descriptors used in the literature. The overall aim of this survey is to show current trends on using, modifying and adapting these descriptors in the domain of image processing.
TicTad: A Chatterbot for Learning Visual C# Programming based on Expert System Vinothini Kasinathan; Aida Mustapha; Sonia Siow; Marshella Hopman
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp740-746

Abstract

This paper presents TicTad, a Chatterbot on Visual C# Programming to help students who struggle with learning programming, or who wants to learn Visual C#. TicTad provides an efficacious way to memorize the concepts through an interactive gateway. This will decrease the time and effort needed to learn Visual C# as compared to traditional methods.