Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Abstract Recently, Machine Learning techniques have become very popular because of its effectiveness. This study, applies Kernel Logistic Regression (KLR) to the credit risk classification in an attempt to suggest a model with better... more
Abstract Recently, Machine Learning techniques have become very popular because of its effectiveness. This study, applies Kernel Logistic Regression (KLR) to the credit risk classification in an attempt to suggest a model with better classification accuracy. Credit risk classification is an interesting and important data mining problem in financial analysis domain. In this study, the optimal parameter values (regularization and kernel function) of KLR. are found by using a grid search technique with 5-fold cross-validation. Credit risk ...
Digital watermarking medical images provides security to the images. The purpose of this study was to see whether digitally watermarked images changed clinical diagnoses when assessed by radiologists. We embedded 256 bits watermark to... more
Digital watermarking medical images provides security to the images. The purpose of this study was to see whether digitally watermarked images changed clinical diagnoses when assessed by radiologists. We embedded 256 bits watermark to various medical images in the region of non-interest (RONI) and 480K bits in both region of interest (ROI) and RONI. Our results showed that watermarking medical images did not alter clinical diagnoses. In addition, there was no difference in image quality when visually assessed by the medical radiologists. We therefore concluded that digital watermarking medical images were safe in terms of preserving image quality for clinical purposes.
Abstract The Road Transport Department of Malaysia has endorsed a specification for car plates that includes the font and size of characters that must be followed by car owners. However, there are cases where this specification is not... more
Abstract The Road Transport Department of Malaysia has endorsed a specification for car plates that includes the font and size of characters that must be followed by car owners. However, there are cases where this specification is not followed. This will cause problems in the recognition phase because the existing systems will find difficulty in recognizing characters in car plates. To ensure the recognition can be done correctly, the thinning and feature extraction phases should be done successfully by applying appropriate ...
Medical image is seen as one of crucial data that demand for authentication method as it is highly confidential and used in insurance claim, evidence of jurisdiction and personal identification. Nowadays, Hospital Information System (HIS)... more
Medical image is seen as one of crucial data that demand for authentication method as it is highly confidential and used in insurance claim, evidence of jurisdiction and personal identification. Nowadays, Hospital Information System (HIS) is used widely at hospitals and clinical departments and it handles thousands of crucial electronic data in medical. We have introduced a fragile watermarking method using spiral manner numbering which showed a good numbering system and excellent embedding, but due to the technique, it only embedded in square shape. We enhanced the scheme to the Hilbert numbering scheme, which is more compatible with medical image modalities, which is not only specific to square shape of image but applicable to all kinds of image.
This paper will discuss the properties of watermarking medical images. We will also discuss the possibility of such images being compressed by JPEG and give an overview of JPEG compression. We will then propose a watermarking scheme that... more
This paper will discuss the properties of watermarking medical images. We will also discuss the possibility of such images being compressed by JPEG and give an overview of JPEG compression. We will then propose a watermarking scheme that is reversible and robust to JPEG compression. The purpose is to verify the integrity and authenticity of medical images. We used 800x600x8 bits ultrasound (US) images in our experiment. SHA-256 of the image is then embedded in the Least significant bits (LSB) of an 8x8 block in the Region of Non Interest (RONI). The image is then compressed using JPEG and decompressed using Photoshop 6.0. If the image has not been altered, the watermark extracted will match the hash (SHA256) of the original image. The result shown that the embedded watermark is robust to JPEG compression up to image quality 60 (~91% compressed).
Abstract: This paper opens a discussion about securing telemedicine by looking at attacks to the security by viewing the function of the computer system as provision of information. Categories of attacks are discussed and an overview of... more
Abstract: This paper opens a discussion about securing telemedicine by looking at attacks to the security by viewing the function of the computer system as provision of information. Categories of attacks are discussed and an overview of watermarking is introduced as one of the security tool, using the medical image as the channel for watermarking. The main objectives for medical image watermarking are that the watermarks are imperceptible and act as a mean of authentication and integrity control. The issues in watermarking medical ...
The research on incomplete soft sets is an integral part of the research on soft sets and has been initiated recently. However, the existing approach for dealing with incomplete soft sets is only applicable to decision making and has low... more
The research on incomplete soft sets is an integral part of the research on soft sets and has been initiated recently. However, the existing approach for dealing with incomplete soft sets is only applicable to decision making and has low forecasting accuracy. In order to solve these problems, in this paper we propose a novel data filling approach for incomplete soft sets. The missing data are filled in terms of the association degree between the parameters when a stronger association exists between the parameters or in terms of the distribution of other available objects when no stronger association exists between the parameters. Data filling converts an incomplete soft set into a complete soft set, which makes the soft set applicable not only to decision making but also to other areas. The comparison results elaborated between the two approaches through UCI benchmark datasets illustrate that our approach outperforms the existing one with respect to the forecasting accuracy.
ABSTRACT The paper proposes for the mathematical modelling surfaces of celestial bodies by the given radar data use the models, produced from the geometrical metamodel G. The metamodel G consists of the corresponding to the dimensions of... more
ABSTRACT The paper proposes for the mathematical modelling surfaces of celestial bodies by the given radar data use the models, produced from the geometrical metamodel G. The metamodel G consists of the corresponding to the dimensions of a space geometrical objects (points, lines, surfaces), the mathematical methods of interpolation, interlineations , interflatation, and the set of rules for producing mathematical models. Using the metamodelling approach allows us to consider from a unique point of view the different methods for the modelling surfaces of bodies and also to develop a computer tool which accelerates and simplify the modelling process, starting from the problem specification and finishing visualization and interpretation of the obtained solution. The correctness of the derived from the metamodel G the set of the models results from the correspondence of the structure of the model objects of G to the structure of experimental data, recorded in the process of radiolocation as values of the function in the points, and traces of the functions on the given lines and surfaces. Widely used in cartography Digital Elevation Model (DEM), can be also produced from G by using for the description of the bodies the surfaces in the form of triangles. Using the metamodel G allows us to integrate the DEM method for the data specification with setting data in points and on lines (which are the basic objects of the metamodel G) and so apply more precise (comparatively with the classical interpolation) methods of interlination and interflatation of functions. Another advantage of the proposed metamodelling approach is a possibility of development of complex geometrical models by composition of the basic elements of the metamodel. As an example, the paper proposes a new method for reconstructing the surface of a celestial body by the data, given on the system of strips – interstripation (form the inter – in between – of the strips).
Abstract During normal cash deposit process, the bank customer will fill in the account number, amount of cash and name of the account holder at the bank in slip, then key in the account number and amount manually into the computer. If... more
Abstract During normal cash deposit process, the bank customer will fill in the account number, amount of cash and name of the account holder at the bank in slip, then key in the account number and amount manually into the computer. If there are numbers of customer at one time, the process will take times and sometime the banker will make errors during reading or keying the data. The recognition process was executed using integration of Artificial Intelligent techniques: image preprocessing and Neural Network. Image ...
Energy efficiency of mobile devices is paramount after the tremendous advancement in technology while the explosion of smart mobile applications such as, YouTube, Facebook, Twitters and Google... more
Energy  efficiency  of  mobile  devices  is  paramount after  the  tremendous  advancement  in  technology  while  the
explosion  of  smart  mobile  applications  such  as,  YouTube, Facebook,  Twitters  and  Google  maps  makes  Smart  Internet Devices  (SIDs)  the  first  choice  of  communication.  On  the  other hand,  multiple  sensors  and  wireless  interfaces  drain  battery swiftly,  thus  reducing  the  operational  time  of  SIDs.  Therefore, extending  battery  life  problem  has  become  of  crucial  research importance,  at  hardware  and  software  levels,  both  alike.  This paper    firstly,    makes    contribution    by    reviewing    different techniques  at software level used to  enhance  battery life  of SIDs in particular Smartphones. At the end, suggestions and opinions
related  to  energy  efficiency  of  SIDs  are  given,  based  on  the comparative studies.
Research Interests:
ABSTRACT Management of higher education must continue to evaluate on an ongoing basis in order to improve the quality of institutions. This will be able to do the necessary evaluation of various data, information, and knowledge of both... more
ABSTRACT Management of higher education must continue to evaluate on an ongoing basis in order to improve the quality of institutions. This will be able to do the necessary evaluation of various data, information, and knowledge of both internal and external institutions. They plan to use more efficiently the collected data, develop tools so that to collect and direct management information, in order to support managerial decision making. The collected data could be utilized to evaluate quality, perform analyses and diagnoses, evaluate dependability to the standards and practices of curricula and syllabi, and suggest alternatives in decision processes. Data minings to support decision making are well suited methods to provide decision support in the education environments, by generating and presenting relevant information and knowledge towards quality improvement of education processes. In educational domain, this information is very useful since it can be used as a base for investigating and enhancing the current educational standards and managements. In this paper, a review on data mining for academic decision support in education field is presented. The details of this paper will review on recent data mining in educational field and outlines future researches in educational data mining.
Abstract Car plate recognition (CPR) system is an important application of image detection and recognition used to overcome the challenges of monitoring modern day traffic. The Freeman chain codes (FCC) is applied in this research to... more
Abstract Car plate recognition (CPR) system is an important application of image detection and recognition used to overcome the challenges of monitoring modern day traffic. The Freeman chain codes (FCC) is applied in this research to study on the accuracy and efficiency of this technique as an alternative recognition approach to recognize characters on car plates because of its ability to recognize characters and digits successfully. Therefore, this paper is mainly focused on conducting an experiment using FCC to test on its ...
Abstract Deng et al.[Deng, S., He, Z., Xu, X.: G-ANMI: A mutual information based genetic clustering algorithm for categorical data, Knowledge-Based Systems 23, 144–149 (2010)] proposed a mutual information based genetic clustering... more
Abstract Deng et al.[Deng, S., He, Z., Xu, X.: G-ANMI: A mutual information based genetic clustering algorithm for categorical data, Knowledge-Based Systems 23, 144–149 (2010)] proposed a mutual information based genetic clustering algorithm named G-ANMI for categorical data. While G-ANMI is superior or comparable to existing algorithms for clustering categorical data in terms of clustering accuracy, it is very time-consuming due to the low efficiency of genetic algorithm (GA). In this paper, we propose a new initialization ...
Abstract This paper proposes a novel geometrically invariant watermarking scheme based on Hessian-Laplace detector and Bessel–Fourier moments. Firstly, Hessian-Laplace detector is adopted to extract feature points. Then, non-overlapped... more
Abstract This paper proposes a novel geometrically invariant watermarking scheme based on Hessian-Laplace detector and Bessel–Fourier moments. Firstly, Hessian-Laplace detector is adopted to extract feature points. Then, non-overlapped disks centered at feature points are generated. These disks are normalized for the invariance to rotation, scaling and translation distortions. Finally, the watermark is embedded in magnitudes of Bessel–Fourier moments of each disk via dither modulation to realize the robustness to common image ...
Abstract In digital watermarking performance evaluation at least three major metrics: imperceptibility, robustness and capacity have been widely used by researchers to analyze the performance of watermarking schemes; however, they... more
Abstract In digital watermarking performance evaluation at least three major metrics: imperceptibility, robustness and capacity have been widely used by researchers to analyze the performance of watermarking schemes; however, they constantly conflict with each other. In this paper we propose an effective method to evaluate the trade-off balanced degree among these measures using three threshold conditions. These thresholds comprise of three factors: imperceptibility effect 'before attack and after watermarking', perceptibility ...
ABSTRACT
Abstract Problem statement: Research on Smooth Support Vector Machine (SSVM) is an active field in data mining. Many researchers developed the method to improve accuracy of the result. This study proposed a new SSVM for classification... more
Abstract Problem statement: Research on Smooth Support Vector Machine (SSVM) is an active field in data mining. Many researchers developed the method to improve accuracy of the result. This study proposed a new SSVM for classification problems. It is called Multiple Knot Spline SSVM (MKS-SSVM). To evaluate the effectiveness of our method, we carried out an experiment on Pima Indian diabetes dataset. The accuracy of previous results of this data still under 80% so far. Approach: First, theoretical of MKS-SSVM was presented. Then, ...
The research on incomplete soft sets is an integral part of the research on soft sets and has been initiated recently. However, the existing approach for dealing with incomplete soft sets is only applicable to decision making and has low... more
The research on incomplete soft sets is an integral part of the research on soft sets and has been initiated recently. However, the existing approach for dealing with incomplete soft sets is only applicable to decision making and has low forecasting accuracy. In order to solve these problems, in this paper we propose a novel data filling approach for incomplete soft sets.
Abstract—Nowadays parking area is an important place for customer parks their vehicles conveniently. For instance, shopping mall and recreations park also have their own parking area. Mostly car park management system faced problem... more
Abstract—Nowadays parking area is an important place for customer parks their vehicles conveniently. For instance, shopping mall and recreations park also have their own parking area. Mostly car park management system faced problem regarding on identifying vacant space in the parking area. Reason for this prototype system being researched and developed is to identify better technique involving image processing in order to improve the effectiveness of current parking process.
Abstract Wood identification is very important to enable the wood can be used for its correct usage. Unfortunately some of the organizations in Malaysia are still using traditional method to identify the wood type which can be influenced... more
Abstract Wood identification is very important to enable the wood can be used for its correct usage. Unfortunately some of the organizations in Malaysia are still using traditional method to identify the wood type which can be influenced by human error. Image processing technology can be used to solve this problem. The image of the wood block sample will be used as the input to identify the type of the wood.
Our study uncovers that histogram equalization (HE)-in a striking contrast to it's claim-is not related to enhancement of contrast. To understand this view, we start with real world images which have varying degree of image quality that... more
Our study uncovers that histogram equalization (HE)-in a striking contrast to it's claim-is not related to enhancement of contrast. To understand this view, we start with real world images which have varying degree of image quality that almost invariably require processing to improve image contrast. For this purpose, histogram equalization including its variants is a frequently relied upon technique. HE processes image by calculating pixel density of its constituent gray levels.
Mobile telemedicine is a new and evolving area of telemedicine that exploits the recent development in mobile networks for telemedicine applications [1]. The next step in the evolution of telemedicine will be mobile telemedicine systems.... more
Mobile telemedicine is a new and evolving area of telemedicine that exploits the recent development in mobile networks for telemedicine applications [1]. The next step in the evolution of telemedicine will be mobile telemedicine systems. Advances in mobile telecommunication technologies will enhance the telemedicine area by integrating cellular digital mobile systems and telemedicine applications.

And 87 more