Abstract—The Glowworm Swarm Optimization (GSO) is a
population-based metaheuristic algorithm for ... more Abstract—The Glowworm Swarm Optimization (GSO) is a population-based metaheuristic algorithm for optimization problems. Limitations of GSO are shown at the convergence speed and a weakness in the capability of global search which need to be improved. Thus, Memory Mechanism and Mutation for Glowworm Swarm Optimization (MMGSO) are proposed in this study to improve the GSO performance at the reported aspects. The proposed method is examined on Unimodal and Multimodal benchmark functions to prove the productivity of the MMGSO algorithm regarding to three metrics which are solution quality, convergence speed and robustness. The results of MMGSO are analyzed and compared with the basic GSO to show the efficiency of the proposed method. Keywords—Glowworm Swarm Optimization; Mutation; Memory less; Metaheuristic algorithm; Optimization
The tradeoff between the embedding energy of watermark and the perceptual translucence and the im... more The tradeoff between the embedding energy of watermark and the perceptual translucence and the image fidelity following attacks represents an important issue in watermarking images. This paper hence proposed a population based method called jumping particle swarm optimization algorithm (JPSO) to improve the ownership and imperceptibility of image. Accordingly, JPSO algorithm is utilized in the maximization the quality of watermarked image, particularly within the extracted watermarks. The former is resolvable via embedding owner’s watermark components of into the host image while the latter is determined by the amount of the embedded scaling factor of the principle components. The robustness of watermarking can be improved using JPSO, where the appropriate scaling factor is optimized. JPSO invisible watermarking involves the use of the host’s global and local characteristics, besides watermark images within the Singular Value Decomposition (SVD) domain. The obtained results of the recommended technique affirm the reliable identification of the watermark image ownership and even following severe attacks. Comparisons with other comparable techniques affirm the superiority of this study’s recommended technique.
Communications in computer and information science, 2013
Mobile robots work in unfamiliar and unconstructed environments with no previous knowledge. In or... more Mobile robots work in unfamiliar and unconstructed environments with no previous knowledge. In order to prevent any collisions between the robot and the other objects, dynamic path planning algorithms are presented. Researchers have been presenting new algorithms to overcome the dynamic path planning dilemma, continuously. Most of the time, the prepared algorithm cannot be implemented to the robot directly, since potential problems in the algorithm may lead to endanger the robot or cause other safety difficulties. Hence, it is preferred to test and examine the robot’s behaviour in a simulated environment, before the empirical test. In this paper, we propose a simulation of dynamic path planning algorithm. As a result of this work, D* algorithm is implemented with four different two-dimensional map modeling methods of Square Tiles, Hexagons, Enhanced Hexagons, and Octiles. Then the simulation results are compared based on their speed, number of searched cells, path cost and traveled distance, to point out the most effective map modeling methods.
Nowadays, researcher is focus in developing reliable iris recognition systems for non-cooperative... more Nowadays, researcher is focus in developing reliable iris recognition systems for non-cooperative situations. The demand for iris recognition is increasing due to its reliability, accuracy and uniqueness. There are major factors involved in unconstrained environment such as obstruction by eyelids, eyelashes, glass frames, hair, off-angle, presence of contact lenses, poor illumination, motion blur, lighting and specular reflections, partially eye image, etc. The performance of the iris will be deteriorated and this results in lower recognition rate. In this paper, an overview of iris recognition for noisy imaging environments is presented included various related databases for iris recognition systems.
Proceedings of the 2nd International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, 2018
This paper presents a novel method for the detection and extraction of shape feature for fingersp... more This paper presents a novel method for the detection and extraction of shape feature for fingerspelling recognition using boundary tracing and chain code. The method includes several steps such as conversion of RGB to YCbCr color space of an image and segmentation of skin pixel regions using thresholding method in order to construct binary images. Edge detection is applied and the location of candidate fingertips is estimated based on boundary tracing process and local extrema. The modified 2D chain code algorithm is then applied to the edge image to extract the fingerspelling shape feature and Support Vector Machine (SVM) is used for the classification task. The experimental findings show that the accuracy of the proposed method is 97.75% and 96.48% for alphabets and numbers, respectively.
This paper propose a robust image watermarking scheme based on the singular value decomposition (... more This paper propose a robust image watermarking scheme based on the singular value decomposition (SVD) and genetic algorithm (GA). SVD based watermarking techniques suffer with an issue of false positive problem. This leads to even authentication the wrong owner. Prevention of false positive errors is a major challenge for ownership identification and proof of ownership application using digital watermarking. We employed GA algorithm to optimize the watermarked image quality (robustness) of the extracted watermarks. The former can be overcome by embedding the owner’s components of the watermark into the host image, the latter is dependent on how much the quantity for the scaling factor of the principle components is embedded. To improve the quality of watermarking (robustness), GA is used for optimize the suitable scaling factor. Experimental result of the proposed technique proves the watermark image ownership and can be reliably identified even after severe attacks. The comparison of the proposed technique with the state of the art show the superiority of our proposed technique where it is outperforming the methods in comparison.
The advancement of technology has enabled powerful microprocessors to render high-quality graphic... more The advancement of technology has enabled powerful microprocessors to render high-quality graphics for computer gaming. Despite being intended for leisure purposes, several components of the games alongside the gamer’s environmental factors have resulted in digital addiction (DA) towards computer games such as massively multiplayer online games (MMOG). Excessive gaming among adolescents has various negative impacts on an individual. However, only a few researchers have addressed the impact of DA on physical health. Thus, the primary objective of this research is to study the impact of DA on physical health among Malaysian adolescents. This study focuses on Malaysian adolescents of ages 12–18 years old who are addicted to computer games, specifically the MMOG. The methodology used for the study involves focus group discussions (FGD) and extensive literature study. The FGD sessions have involved both medical experts and game experts. The outcome of FGD discussion is recorded and justi...
2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), 2015
Archaeology is the scientific study of the remnants of human civilization, and involves exploring... more Archaeology is the scientific study of the remnants of human civilization, and involves exploring the lives of ancient peoples by examining their waste. Numerous researchers proposed numerous methods and ideas for the (semi or automated) reconstruction of a (usually large) number of broken irregular fragments. Hence, this paper aims to provide an in-depth review of the most notable publications on computer applications related to the area of classification and reconstruction of archaeological pottery fragments using two-dimensional images during the period between the early 1970s and 2014. The considered publications were classified on the basis of the study type, which is divided into two categories: studies that focus on classification of ancient fragments into groups, and those that focus on the reconstruction of archaeological fragments. This paper reviews and analyzes the most relevant works published according to the extracted features, classification processes involved, matching techniques that have been implemented for the restoration of pottery objects to their original form, as well as the yielded results.
Abstract—The Glowworm Swarm Optimization (GSO) is a
population-based metaheuristic algorithm for ... more Abstract—The Glowworm Swarm Optimization (GSO) is a population-based metaheuristic algorithm for optimization problems. Limitations of GSO are shown at the convergence speed and a weakness in the capability of global search which need to be improved. Thus, Memory Mechanism and Mutation for Glowworm Swarm Optimization (MMGSO) are proposed in this study to improve the GSO performance at the reported aspects. The proposed method is examined on Unimodal and Multimodal benchmark functions to prove the productivity of the MMGSO algorithm regarding to three metrics which are solution quality, convergence speed and robustness. The results of MMGSO are analyzed and compared with the basic GSO to show the efficiency of the proposed method. Keywords—Glowworm Swarm Optimization; Mutation; Memory less; Metaheuristic algorithm; Optimization
The tradeoff between the embedding energy of watermark and the perceptual translucence and the im... more The tradeoff between the embedding energy of watermark and the perceptual translucence and the image fidelity following attacks represents an important issue in watermarking images. This paper hence proposed a population based method called jumping particle swarm optimization algorithm (JPSO) to improve the ownership and imperceptibility of image. Accordingly, JPSO algorithm is utilized in the maximization the quality of watermarked image, particularly within the extracted watermarks. The former is resolvable via embedding owner’s watermark components of into the host image while the latter is determined by the amount of the embedded scaling factor of the principle components. The robustness of watermarking can be improved using JPSO, where the appropriate scaling factor is optimized. JPSO invisible watermarking involves the use of the host’s global and local characteristics, besides watermark images within the Singular Value Decomposition (SVD) domain. The obtained results of the recommended technique affirm the reliable identification of the watermark image ownership and even following severe attacks. Comparisons with other comparable techniques affirm the superiority of this study’s recommended technique.
Communications in computer and information science, 2013
Mobile robots work in unfamiliar and unconstructed environments with no previous knowledge. In or... more Mobile robots work in unfamiliar and unconstructed environments with no previous knowledge. In order to prevent any collisions between the robot and the other objects, dynamic path planning algorithms are presented. Researchers have been presenting new algorithms to overcome the dynamic path planning dilemma, continuously. Most of the time, the prepared algorithm cannot be implemented to the robot directly, since potential problems in the algorithm may lead to endanger the robot or cause other safety difficulties. Hence, it is preferred to test and examine the robot’s behaviour in a simulated environment, before the empirical test. In this paper, we propose a simulation of dynamic path planning algorithm. As a result of this work, D* algorithm is implemented with four different two-dimensional map modeling methods of Square Tiles, Hexagons, Enhanced Hexagons, and Octiles. Then the simulation results are compared based on their speed, number of searched cells, path cost and traveled distance, to point out the most effective map modeling methods.
Nowadays, researcher is focus in developing reliable iris recognition systems for non-cooperative... more Nowadays, researcher is focus in developing reliable iris recognition systems for non-cooperative situations. The demand for iris recognition is increasing due to its reliability, accuracy and uniqueness. There are major factors involved in unconstrained environment such as obstruction by eyelids, eyelashes, glass frames, hair, off-angle, presence of contact lenses, poor illumination, motion blur, lighting and specular reflections, partially eye image, etc. The performance of the iris will be deteriorated and this results in lower recognition rate. In this paper, an overview of iris recognition for noisy imaging environments is presented included various related databases for iris recognition systems.
Proceedings of the 2nd International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, 2018
This paper presents a novel method for the detection and extraction of shape feature for fingersp... more This paper presents a novel method for the detection and extraction of shape feature for fingerspelling recognition using boundary tracing and chain code. The method includes several steps such as conversion of RGB to YCbCr color space of an image and segmentation of skin pixel regions using thresholding method in order to construct binary images. Edge detection is applied and the location of candidate fingertips is estimated based on boundary tracing process and local extrema. The modified 2D chain code algorithm is then applied to the edge image to extract the fingerspelling shape feature and Support Vector Machine (SVM) is used for the classification task. The experimental findings show that the accuracy of the proposed method is 97.75% and 96.48% for alphabets and numbers, respectively.
This paper propose a robust image watermarking scheme based on the singular value decomposition (... more This paper propose a robust image watermarking scheme based on the singular value decomposition (SVD) and genetic algorithm (GA). SVD based watermarking techniques suffer with an issue of false positive problem. This leads to even authentication the wrong owner. Prevention of false positive errors is a major challenge for ownership identification and proof of ownership application using digital watermarking. We employed GA algorithm to optimize the watermarked image quality (robustness) of the extracted watermarks. The former can be overcome by embedding the owner’s components of the watermark into the host image, the latter is dependent on how much the quantity for the scaling factor of the principle components is embedded. To improve the quality of watermarking (robustness), GA is used for optimize the suitable scaling factor. Experimental result of the proposed technique proves the watermark image ownership and can be reliably identified even after severe attacks. The comparison of the proposed technique with the state of the art show the superiority of our proposed technique where it is outperforming the methods in comparison.
The advancement of technology has enabled powerful microprocessors to render high-quality graphic... more The advancement of technology has enabled powerful microprocessors to render high-quality graphics for computer gaming. Despite being intended for leisure purposes, several components of the games alongside the gamer’s environmental factors have resulted in digital addiction (DA) towards computer games such as massively multiplayer online games (MMOG). Excessive gaming among adolescents has various negative impacts on an individual. However, only a few researchers have addressed the impact of DA on physical health. Thus, the primary objective of this research is to study the impact of DA on physical health among Malaysian adolescents. This study focuses on Malaysian adolescents of ages 12–18 years old who are addicted to computer games, specifically the MMOG. The methodology used for the study involves focus group discussions (FGD) and extensive literature study. The FGD sessions have involved both medical experts and game experts. The outcome of FGD discussion is recorded and justi...
2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), 2015
Archaeology is the scientific study of the remnants of human civilization, and involves exploring... more Archaeology is the scientific study of the remnants of human civilization, and involves exploring the lives of ancient peoples by examining their waste. Numerous researchers proposed numerous methods and ideas for the (semi or automated) reconstruction of a (usually large) number of broken irregular fragments. Hence, this paper aims to provide an in-depth review of the most notable publications on computer applications related to the area of classification and reconstruction of archaeological pottery fragments using two-dimensional images during the period between the early 1970s and 2014. The considered publications were classified on the basis of the study type, which is divided into two categories: studies that focus on classification of ancient fragments into groups, and those that focus on the reconstruction of archaeological fragments. This paper reviews and analyzes the most relevant works published according to the extracted features, classification processes involved, matching techniques that have been implemented for the restoration of pottery objects to their original form, as well as the yielded results.
2008 International Symposium on Information Technology, 2008
Abstract Automated programming assessment is a method to evaluate and grade studentspsila program... more Abstract Automated programming assessment is a method to evaluate and grade studentspsila programming exercises aided by the computer. This application is developed to assess student C programming exercises based on the pseudocodes. The purpose of developing this application is to find the percentage of the pseudocode similarity between studentpsilas answer and the instructorpsilas scheme. The method used in the software is by translating the studentspsila programming answer and all the instructorspsila answer ...
Uploads
Conference Presentations by Md Jan Nordin
population-based metaheuristic algorithm for optimization
problems. Limitations of GSO are shown at the convergence
speed and a weakness in the capability of global search which
need to be improved. Thus, Memory Mechanism and Mutation
for Glowworm Swarm Optimization (MMGSO) are proposed in
this study to improve the GSO performance at the reported
aspects. The proposed method is examined on Unimodal and
Multimodal benchmark functions to prove the productivity of the
MMGSO algorithm regarding to three metrics which are solution
quality, convergence speed and robustness. The results of
MMGSO are analyzed and compared with the basic GSO to
show the efficiency of the proposed method.
Keywords—Glowworm Swarm Optimization; Mutation;
Memory less; Metaheuristic algorithm; Optimization
Papers by Md Jan Nordin
population-based metaheuristic algorithm for optimization
problems. Limitations of GSO are shown at the convergence
speed and a weakness in the capability of global search which
need to be improved. Thus, Memory Mechanism and Mutation
for Glowworm Swarm Optimization (MMGSO) are proposed in
this study to improve the GSO performance at the reported
aspects. The proposed method is examined on Unimodal and
Multimodal benchmark functions to prove the productivity of the
MMGSO algorithm regarding to three metrics which are solution
quality, convergence speed and robustness. The results of
MMGSO are analyzed and compared with the basic GSO to
show the efficiency of the proposed method.
Keywords—Glowworm Swarm Optimization; Mutation;
Memory less; Metaheuristic algorithm; Optimization