Asadel, Ahmad
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Smart Helmet for Motorcycle Safety Internet of Things Based Matondang, Mhd Hafizh Azman; Asadel, Ahmad; Fauzan, Daris; Setiawan, Anwar Rudi
Tsabit Journal of Computer Science Vol. 1 No. 1 (2024): June Edition
Publisher : Ilmu Bersama Center

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56211/tsabit20

Abstract

IoT (Internet of Things) is a concept that aims to utilize continuously connected internet connectivity, there are several IoT capabilities including data sharing, remote control and so on. One use that can be used is for security purposes, such as for safety riding , namely a Smart Helmet. The emergence of cases of motorbike theft and robbery requires vehicle owners to be more careful and increase their vigilance. Much has been done to prevent motorbike theft and robbery, for example using multiple locks and installing alarms on vehicles, but unfortunately some of these methods cannot completely overcome the rampant theft and robbery that is currently occurring. Apart from that, awareness among motorcyclists regarding the use of helmets is currently very minimal, which will have a fatal impact if the rider is involved in a high-profile accident without wearing a helmet. This thesis proposes a solution by developing a smart helmet, namely by providing facilities and equipment to anticipate crime while driving. Apart from that, this smart helmet will send a message if a robbery occurs and immediately send the driver's position. This helmet is integrated with the motorbike engine so the motorbike engine will stop if it is far from the helmet and the motorbike will not start if the helmet is not used. This Smart Helmet is designed based on IoT by using a Wireless module to connect to the motorbike engine, a GSM module for the alarm and notification system, and a GPS module to determine the location which is integrated with Google Maps.
Detecting Zero-Width Characters Obfuscated in Phishing URLs using the XGBOOST Algorithm Asadel, Ahmad; Zulherry, Andi
Hanif Journal of Information Systems Vol. 3 No. 1 (2025): August Edition
Publisher : Ilmu Bersama Center

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56211/hanif.v3i1.56

Abstract

Phishing attacks represent one of the most common and damaging cyber threats, with techniques continuously evolving to become more sophisticated and harder to detect. One of the latest evasion methods of concern is the use of Zero-Width Characters (ZWC)—invisible Unicode Characters inserted into URLs to deceive traditional detection systems and human visual perception. This research aims to develop and evaluate an effective and reliable machine learning model to detect phishing URLs that have been obfuscated using ZWC. The eXtreme Gradient Boosting (XGBoost) algorithm was chosen for its proven superiority in handling complex data and its performance optimization capabilities. This study utilized a public dataset from Kaggle consisting of 11,430 URL samples, which was then modified through a feature engineering process. Specifically, 50% of the phishing URLs were injected with one of five types of ZWC (ZWSP, ZWNJ, ZWJ, RLM, LRM), and a dedicated binary feature was created to flag the presence of these Characters. Initial training revealed signs of minor overfitting. Consequently, a hyperparameter tuning process was conducted by adjusting the max_depth and min_child_weight parameters to create a more robust model. The final model was evaluated on 20% of the test data and demonstrated exceptionally high performance, achieving an Accuracy of 97.24%, Precision of 97.03%, Recall of 97.37%, and an AUC score of 0.9972. The high Recall value is particularly crucial, proving the model's reliability in minimizing the risk of missed threats. This research successfully proves that an XGBoost-based approach with targeted feature engineering can be an effective solution against advanced phishing attacks.