Claim Missing Document
Check
Articles

Found 18 Documents
Search
Journal : JOIV : International Journal on Informatics Visualization

The Rise of Deep Learning in Cyber Security: Bibliometric Analysis of Deep Learning and Malware Kamarudin, Nur Khairani; Firdaus, Ahmad; Osman, Mohd Zamri; Alanda, Alde; Erianda, Aldo; Kasim, Shahreen; Ab Razak, Mohd Faizal
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.1535

Abstract

Deep learning is a machine learning technology that allows computational models to learn via experience, mimicking human cognitive processes. This method is critical in the development of identifying certain objects, and provides the computational intelligence required to identify multiple objects and distinguish it between object A or Object B. On the other hand, malware is defined as malicious software that seeks to harm or disrupt computers and systems. Its main categories include viruses, worms, Trojan horses, spyware, adware, and ransomware. Hence, many deep learning researchers apply deep learning in their malware studies. However, few articles still investigate deep learning and malware in a bibliometric approach (productivity, research area, institutions, authors, impact journals, and keyword analysis). Hence, this paper reports bibliometric analysis used to discover current and future trends and gain new insights into the relationship between deep learning and malware. This paper’s discoveries include: Deployment of deep learning to detect domain generation algorithm (DGA) attacks; Deployment of deep learning to detect malware in Internet of Things (IoT); The rise of adversarial learning and adversarial attack using deep learning; The emergence of Android malware in deep learning; The deployment of transfer learning in malware research; and active authors on deep learning and malware research, including Soman KP, Vinayakumar R, and Zhang Y.
Comparative Analysis of Imputation Methods for Enhancing Predictive Accuracy in Data Models Zamri, Nurul Aqilah; Jaya, M. Izham; Irawati, Indrarini Dyah; Rassem, Taha H.; Rasyidah, -; Kasim, Shahreen
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.1666

Abstract

The presence of missing values within datasets can introduce a detrimental bias, significantly impeding the predictive algorithm's ability to discern patterns and accurately execute prediction. This paper aims to elucidate the intricacies of data imputation methods, providing a more profound understanding of prevalent imputation methods, including list-wise deletion (IGN), mean imputation (AVG), K-Nearest Neighbors (KNN), MissForest (MF), and Predictive Mean Matching (PMM). The dataset employed in this study consists of financial data about S&P 500 companies in the Compustat North America database. The training and validation dataset encompasses 1973 instances, consisting of data during the fourth quarter of 2009, the first quarter of 2010, and the third quarter of 2014. Within this set, 457 missing values were identified and imputed. The test dataset comprises 197 randomly selected instances from the fourth quarter of 2014, equivalent to ten percent of the total instances in the training dataset. The evaluation findings prominently position the dataset derived from MF imputation as the leading performer among all the imputed datasets. The insights derived from this study are intended to assist practitioners in making informed choices when selecting the most suitable data imputation method, particularly in the context of predictive modeling tasks.
Systematic Literature Review on Persuasive System Design Framework for Managing Curriculum Performance Saifunnizam, Syamir Thaqif; Md Fudzee, Mohd Farhan; Hanif Jofri, Muhamad; Kasim, Shahreen; Arrova Dewi, Deshinta; Arshad, Mohamad Safwan; Yulherniwati, -
JOIV : International Journal on Informatics Visualization Vol 9, No 1 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.1.3663

Abstract

Integrating digital resources into educational assessment has led to the widespread adoption of e-portfolios as tools for documenting and evaluating student achievement, thereby transforming traditional evaluation methods. However, the existing frameworks primarily focus on assessing academic performance, often neglecting the comprehensive monitoring of student’s co-curricular activities. To overcome current gaps in comprehensive student evaluation, this study introduces a conceptual framework incorporating persuasive system design (PSD) into an e-portfolio to facilitate efficient co-curricular performance monitoring in Malaysian secondary schools. To ensure a thorough approach to educational evaluation, it is essential to effectively monitor and manage academic and extracurricular performance to understand student progress comprehensively. By adding Physical Activity, Sports, and Co-curriculum Assessment (PAJSK) – specific categories and key PSD elements- primary task support, dialogue support, system credibility support, and social support- that are all designed to improve user engagement and system dependability in an educational environment, the framework builds on the Oinas-Kukkonen and Harijumaa PSD Model. This study adapts and discusses the persuasive design elements to meet the goals of educational assessment frameworks by comparing PSD implementation in e-health, e-tourism, e-commerce, and e-learning. The results offer an overview of developing a practical, engaging e-portfolio framework that facilitates comprehensive student evaluation, especially in educational environments focusing on co-curricular achievement.
Comparative Analysis of Robust Imputation Techniques for Enhancing Cervical Cancer Prediction with Missing Data Mizan, Muhammad Thaqiyuddin; Ernawan, Ferda; Kasim, Shahreen; Erianda, Aldo; Mohd Fauzi, Abdullah Munzir
JOIV : International Journal on Informatics Visualization Vol 9, No 5 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.5.4501

Abstract

Handling missing data is a critical challenge in machine learning applications, as it can significantly affect the accuracy and reliability of predictive models. Addressing this issue is crucial for developing robust systems that can deliver high-performance results. This study provides a comparative analysis of the robust imputation technique for cervical cancer prediction with incomplete information. This study has investigated the importance of robust imputation techniques, particularly Soft Imputer, in addressing missing data challenges and enhancing model performance. This study investigates the impact of various imputations across five distinct approaches: KNN imputer, PCA imputer, MICE imputer, XGBoost imputer, LightGBM imputer, and feature selection methods. These imputation data are tested on several machine learning models such as Random Forest (RF), Extreme Gradient Boosting (XGB), Decision Tree (DT), Support Vector Classifier (SVC), Logistic Regression (LR), Extra Trees Classifier (ETC), CatBoost Classifier, Stochastic Gradient Descent (SGD), and Gradient Boosting (GB) for improving classification accuracy of cervical cancer prediction. The evaluation reveals that the soft imputer method achieves a balanced and effective handling of missing data, significantly improving the reliability of the models. Among the tested methods, LightGBM and XGBoost deliver strong results, each achieving an average accuracy of 96.91%. MICE demonstrated the lowest average accuracy at 95.94%, although it still performs reliably in managing missing data. The findings provide valuable insights for enhancing predictive accuracy in future work by integrating advanced imputation strategies for high-dimensional and complex datasets.
Brain Tumor Classification based on Convolutional Neural Networks with an Ensemble Learning Approach through Soft Voting Puspita, Kartika; Ernawan, Ferda; Alkhalifi, Yuris; Kasim, Shahreen; Erianda, Aldo
JOIV : International Journal on Informatics Visualization Vol 9, No 5 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.5.4609

Abstract

The brain is a vital organ that serves various purposes in the human body. Processing sensory data, generating muscle movements, and performing complex cognitive tasks have all historically relied heavily on the brain. One of the most common conditions affecting the brain is the growth of abnormal tissue in brain cells, leading to the development of brain tumors. The most common forms of brain tumors are pituitary, glioma, and meningioma, which are major global health issues. From these issues, there is a need for appropriate and prompt handling before the brain tumor disease becomes more severe. Quick handling is through an early disease detection approach, and computer vision is one of the trending early disease detection methods that can predict diseases using images. This research proposes a model in computer vision, namely the Convolutional Neural Network (CNN), with a soft voting ensemble learning strategy to classify brain tumors. The dataset consists of 7,023 images without tumors and MRI brain tumors such as glioma, meningioma, and pituitary with a resolution of 512x512 pixels. This experiment investigates classifier models such as VGG16, MobileNet, ResNet50, and DenseNet121, each of which has been optimized to maximize performance. The proposed soft voting ensemble strategy outperformed existing methods, with an accuracy of 97.67% and a Cohen's Kappa value of 0.9688. The proposed soft voting ensemble method approach has proven effective in improving the accuracy.
A Hybrid Approach for Malicious URL Detection Using Ensemble Models and Adaptive Synthetic Sampling Sujon, Khaled Mahmud; Hassan, Rohayanti; Zainodin, Muhammad Edzuan; Salamat, Mohamad Aizi; Kasim, Shahreen; Alanda, Alde
JOIV : International Journal on Informatics Visualization Vol 9, No 5 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.5.4627

Abstract

Malicious URLs pose a significant cybersecurity threat, often leading to phishing attacks, malware infections, and data breaches. Early detection of these URLs is crucial for preventing security vulnerabilities and mitigating potential losses. In this paper, we propose a novel approach for malicious URL detection by combining ensemble learning methods with ADASYN-based oversampling to address the class imbalance typically found in malicious URL datasets. We evaluated three popular machine learning classifiers, including XGBoost, Random Forest, and Decision Tree, and incorporated ADASYN (Adaptive Synthetic Sampling) to handle the class-imbalanced nature of our selected dataset. Our detailed experiments demonstrate that the application of ADASYN can significantly increase the performance of the predictive model across all metrics. For instance, XGBoost saw a 2.2% improvement in accuracy, Random Forest achieved a 1.0% improvement in recall, and Decision Tree displayed a 3.0% improvement in F1-score. The Decision Tree model, in particular, showed the most substantial improvements, particularly in recall and F1-score, indicating better detection of malicious URLs. Finally, our findings in this research highlighted the potential of ensemble learning, enhanced by ADASYN, for improving malicious URL detection and demonstrated its applicability in real-world cybersecurity applications.
Hybrid Logistic Regression Random Forest on Predicting Student Performance Rohman, Muhammad Ghofar; Abdullah, Zubaile; Kasim, Shahreen; Rasyidah, -
JOIV : International Journal on Informatics Visualization Vol 9, No 2 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.2.3972

Abstract

The research aims to investigate the effects of unbalanced data on machine learning, overcome imbalanced data using SMOTE oversampling, and improve machine learning performance using hyperparameter tuning. This study proposed a model that combines logistic regression and random forests as a hybrid logistic regression, random forest, and random search SV that uses SMOTE oversampling and hyperparameter tuning. The result of this study showed that the prediction model using the hybrid logistic regression, random forest, and random search SV that we proposed produces more effective performance than using logistic regression and random forest, with accuracy, precision, recall, and F1-score of 0.9574, 0.9665, 0.9576. This can contribute to a practical model to address imbalanced data classification based on data-level solutions for student performance prediction.
Optimizing Genetic Algorithm by Implementation of An Enhanced Selection Operator BinJubier, Mohammed; Ismail, Mohd Arfian; Othman, Muhaini; Kasim, Shahreen; Amnur, Hidra
JOIV : International Journal on Informatics Visualization Vol 8, No 3-2 (2024): IT for Global Goals: Building a Sustainable Tomorrow
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3-2.3449

Abstract

The Traveling Salesman Problem (TSP) represents an extensively researched challenge in combinatorial optimization. Genetic Algorithms (GAs), recognized for their nature-inspired approach, stand as potent heuristics for resolving combinatorial optimization problems. Nevertheless, GA exhibits inherent deficiencies, notably premature convergence, which diminishes population diversity and consequential inefficiencies in computational processes. Such drawbacks may result in protracted operations and potential misallocation of computational resources, particularly when confronting intricate NP-hard optimization problems. To address these challenges, the current study underscores the pivotal role of the selection operator in ameliorating GA efficiency. The proposed methodology introduces a novel parameter operator within the Stochastic Universal Selection (SUS) framework, aimed at constricting the search space and optimizing genetic operators for parent selection. This innovative approach concentrates on selecting individuals based on their fitness scores, thereby mitigating challenges associated with population sorting and individual ranking while concurrently alleviating computational complexity. Experimental results robustly validate the efficacy of the proposed approach in enhancing both solution quality and computational efficiency, thereby positioning it as a noteworthy contribution to the domain of combinatorial optimization.
Transformer in mRNA Degradation Prediction Yit, Tan Wen; Hassan, Rohayanti; Zakaria, Noor Hidayah; Kasim, Shahreen; Moi, Sim Hiew; Khairuddin, Alif Ridzuan; Amnur, Hidra
JOIV : International Journal on Informatics Visualization Vol 7, No 2 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.2.1165

Abstract

The unstable properties and the advantages of the mRNA vaccine have encouraged many experts worldwide in tackling the degradation problem. Machine learning models have been highly implemented in bioinformatics and the healthcare fieldstone insights from biological data. Thus, machine learning plays an important role in predicting the degradation rate of mRNA vaccine candidates. Stanford University has held an OpenVaccine Challenge competition on Kaggle to gather top solutions in solving the mentioned problems, and a multi-column root means square error (MCRMSE) has been used as a main performance metric. The Nucleic Transformer has been proposed by different researchers as a deep learning solution that is able to utilize a self-attention mechanism and Convolutional Neural Network (CNN). Hence, this paper would like to enhance the existing Nucleic Transformer performance by utilizing the AdaBelief or RangerAdaBelief optimizer with a proposed decoder that consists of a normalization layer between two linear layers. Based on the experimental result, the performance of the enhanced Nucleic Transformer outperforms the existing solution. In this study, the AdaBelief optimizer performs better than the RangerAdaBelief optimizer, even though it possesses Ranger’s advantages. The advantages of the proposed decoder can only be shown when there is limited data. When the data is sufficient, the performance might be similar but still better than the linear decoder if and only if the AdaBelief optimizer is used. As a result, the combination of the AdaBelief optimizer with the proposed decoder performs the best with 2.79% and 1.38% performance boost in public and private MCRMSE, respectively.
Verification of Ph.D. Certificate using QR Code on Blockchain Ethereum Noorhizama, Nur Khairunnisa; Abdullah, Zubaile; Kasim, Shahreen; A Hamid, Isredza Rahmi; Mat Isa, Mohd Anuar
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1584

Abstract

One of the major challenges the university faces is to provide real-time verification of their student's degree certification upon request by other parties. Conventional verification systems are typically costly, time-consuming and bureaucratic against certificate credential misconduct. In addition, the forgery of graduation degree certificates has become more efficient due to easy-to-use scanning, editing, and printing technologies. Therefore, this research proposes verifying Ph.D. certificates using QR codes on the Ethereum blockchain to address certificate verification challenges. Blockchain technology ensures tamper-proof and decentralized management of degree certificates as the certificates stored on the blockchain are replicated across the network. The issuance of certificates requires the use of the issuer's private key, thus preventing forgery. The system was developed using Solidity for the smart contract, PHP, HTML/CSS for the web-based implementation, and MetaMask for blockchain integration. User testing confirmed the successful implementation and functionality of the system. Users can add, update, and delete certificates, generate and scan QR codes, and receive instant verification feedback. The verification system effectively meets all requirements, providing a robust solution for validating Ph.D. certificates. Future research may focus on scalability and adoption, privacy and data protection, user experience, and integration with existing systems. Other researchers can optimize the verification system for widespread adoption and utilization by exploring these areas. This research contributes to securing and efficiently verifying academic certificates using QR codes on the Ethereum blockchain. Ultimately, this work advances the field of certificate verification and promotes trust in academic credentials.
Co-Authors A Hamid, Isredza Rahmi Ab Razak, Mohd Faizal Abbas, Sara Tarek ElSayed Abbood, Maan Nawaf Abdullah, Noryusliza Abdullah, Nuraini Abdullah, Zubaile Ahmad Firdaus, Ahmad Ahmad, Johanna Alde Alanda, Alde Aldo Erianda, Aldo Ali Shah, Zuraini Aljanabi, Mohammad Alwaisi, Shaimaa Safaa Ahmed Anuar, Anies Nurfazlin Arrova Dewi, Deshinta Arshad, Mohamad Safwan Asmuni, Hishammuddin Bin Jubeir, Mohammed BinJubier, Mohammed Defni, - Dickenn, Haezel Ann Dwiny Meidelfi Efrizoni, Lusiana Eg Su, Goh Fadly Fadly Ferda Ernawan Gusman, Taufik Halim, Shahliza Abd Hanif Jofri, Muhamad Hassan, Norhasniza Hendrick, - Hidra Amnur Hui, Tay Xin Ichwanul Muslim Karo Karo Indrarini Dyah Irawati Ismail, Mohd Arfian Jalil, Luma Fayeq Jaya, M. Izham Kai Yuen, Simon Chong Kamarudin, Nur Fatihah Kamarudin, Nur Khairani Khairuddin, Alif Ridzuan Ling, Teng Mee Mat Isa, Mohd Anuar Mizan, Muhammad Thaqiyuddin Mohamad Sukri, Khairul Amin Mohamad, Radziah Mohd Farhan MD Fudzee, Mohd Farhan Mohd Fauzi, Abdullah Munzir Mohd Fuaad, Nur Atiqah Mohd Fudzee, Mohd Farhan Mohd Noh, Noraziah Moi, Sim Hiew Muhaini Othman, Muhaini Nazirah, Nurul Ain Noorhizama, Nur Khairunnisa Norung, Muhammad Hazim Muhamad Osman, Mohd Zamri Puspita, Kartika Qasim, Adeeb Mansoor Ramlan, Rohaizan Ramli, Azizul Azhar Rassem, Taha H. Rasyidah, - Rd. Rohmat Saedudin Rohayanti Hassan, Rohayanti Rohman, Muhammad Ghofar Ronal Hadi Ruslaan, Mohd Asyraf Saifannur, Andri Saifunnizam, Syamir Thaqif Salamat, Mohamad Aizi Saringat, Mohd Zainuri Selamat, Norhanim Sujon, Khaled Mahmud Sumatrani Saragih, Majied Thevaraju, Devi Priya Tole Sutikno Weng, Fong Cheng Yit, Tan Wen Yong, Pang Yee Yulherniwati, - Yuris Alkhalifi Zainodin, Muhammad Edzuan Zakaria, Mohd Zaki Zakaria, Noor Hidayah Zakaria, Noor Hidayah Binti Zakaria, Zalmiyah Zamri, Nurul Aqilah