{"title":"FORECASTING FRESH WATER AND MARINE FISH PRODUCTION IN MALAYSIA USING ARIMA AND ARFIMA MODELS","authors":"P. Mah, N. A. M. Ihwal, N. Azizan","doi":"10.24191/mjoc.v3i2.4887","DOIUrl":"https://doi.org/10.24191/mjoc.v3i2.4887","url":null,"abstract":"Malaysia is surrounded by sea, rivers and lakes which provide natural sources of fish for human consumption. Hence, fish is one source of protein supply to the country and fishery is a sub-sector that contribute to the national gross domestic product. Since fish forecasting is crucial in fisheries management for managers and scientists, time series modelling can be one useful tool. Time series modelling have been used in many fields of studies including the fields of fisheries. In a previous research, the ARIMA and ARFIMA models were used to model marine fish production in Malaysia and the ARFIMA model emerged to be a better forecast model. In this study, we consider fitting the ARIMA and ARFIMA to both the marine and freshwater fish production in Malaysia. The process of model fitting was done using the “ITSM 2000, version 7.0” software. The performance of the models were evaluated using the mean absolute error, root mean square error and mean absolute percentage error. It was found in this study that the selection of the best fit model depends on the forecast accuracy measures used.","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A COMPARATIVE STUDY OF UNIVARIATE TIME SERIES MODELLING FOR NATURAL RUBBER PRODUCTION IN MALAYSIA","authors":"P. Mah, F. N. Buhary, N. Abdullah, S. Saad","doi":"10.24191/mjoc.v3i2.4888","DOIUrl":"https://doi.org/10.24191/mjoc.v3i2.4888","url":null,"abstract":"Malaysia is one of the top countries that produces natural rubber and was ranked sixth place globally. The earnings from natural rubber products are making billions of ringgit for the country. However, over the past years the natural rubber production in Malaysia has been inconsistent and the deficiencies in the production can affect Malaysia’s economy. Therefore, it is important for relevant agencies and departments to understand the patterns and trends of natural rubber production in Malaysia besides having the ability to forecast. Hence, the integrated autoregressive moving average (ARIMA), seasonal autoregressive moving average (SARIMA) and the seasonal Holt-Winter’s model were being considered for the purpose of modelling and forecasting this study. The forecast accuracy criteria used to evaluate the performance of the models are the root mean square error (RMSE) and mean absolute percentage error (MAPE). The results showed that the seasonal Holt-Winter’s model appeared to be the best model as it yielded the lowest RMSE and MAPE values. The seasonal Holt-Winter’s model, however, is not a good choice of model as it was unable to forecast six months ahead values. On the other hand, the SARIMA model had a better forecast ability when forecasting the values for the same duration. Therefore, the SARIMA model is taken to be the model in forecasting the natural rubber production in Malaysia for that period. This study has shown that the best fit model that fulfil all the forecast accuracy criteria may not have the best forecast ability.","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114375393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PAIRWISE CLUSTERS OPTIMIZATION AND CLUSTER MOST SIGNIFICANT FEATURE METHODS FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEM (POC2MSF)","authors":"Gervais Hatungimana","doi":"10.24191/mjoc.v3i2.3598","DOIUrl":"https://doi.org/10.24191/mjoc.v3i2.3598","url":null,"abstract":" Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behavior. If the baseline is faulty, the IDS performance degrades. Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchical and agglomerative algorithms to baseline network traffic suffer from high false positive rate compared to signature-based IDS, simply because the nature of these algorithms risk to force some network traffic into wrong profiles depending on K number of clusters needed. In this paper we propose alternate method which instead of defining K number of clusters, defines t distance threshold. The unrecognizable IDS; IDS which is neither HIDS nor NIDS is the consequence of using statistical methods for features selection. The speed, memory and accuracy of IDS are affected by inappropriate features reduction method or ignorance of irrelevant features. In this paper we use two-step features selection and Quality Threshold with Optimization methods to design anomaly-based HIDS and NIDS separately. The performance of our system is 0% ,99.9974%, 1,1 false positive rates, accuracy , precision and recall respectively for NIDS and 0%,99.61%, 0.991,0.978 false positive rates, accuracy, precision and recall respectively for HIDS.","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COEFFICIENT BOUNDS FOR A CERTAIN SUBCLASS OF CLOSE-TO-CONVEX FUNCTIONS ASSOCIATED WITH THE KOEBE FUNCTION","authors":"S. Rathi, S. C. Soh, A. Akbarally","doi":"10.24191/mjoc.v3i2.4601","DOIUrl":"https://doi.org/10.24191/mjoc.v3i2.4601","url":null,"abstract":"We consider here the functions which are analytic and univalent in the open unit disc normalized by and . By , we denote a new subclass of close-to-convex function such that for which and . In this paper, we give the representation theorem and obtain the coefficient bounds for functions in ","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"META-MODELING CONSTRUCTS FOR REQUIREMENTS REUSE (RR): SOFTWARE REQUIREMENTS PATTERNS, VARIABILITY AND TRACEABILITY","authors":"B. Ya'u, Azlin Nordin, Norsaremah Salleh","doi":"10.24191/mjoc.v3i2.4181","DOIUrl":"https://doi.org/10.24191/mjoc.v3i2.4181","url":null,"abstract":"Reuse is a fundamental activity, which increases quality and productivity of software products. Reuse of software artifacts, such as requirements, architectures, and codes can be employed at any developmental stage of software. However, reuse at a higher level of abstraction, for instance at requirements level, provides greater benefits in software development than when applied at lower level of abstraction for example at coding level. To achieve full benefits of reuse, a systematic approach and appropriate strategy need to be followed. Although several reuse approaches are reported in the literature, these approaches lack a key strategy to synergize some essential drivers of reuse, which include reusable structure, variability management (VM) and traceability of software artifacts. In line with this, we make our contribution in this paper by (1) presenting the concepts and importance of software requirements patterns (SRP) for reusable structure; (2) proposing a strategy, which combines three sub-disciplines of Software Engineering (SE) such as Requirements Engineering (RE), Software Product Line Engineering (SPLE) and Model-driven Engineering (MDE); (3) proposing a meta-modeling constructs, which include SRP, VM and traceability and; (4) Relationship amongst the three sub-disciplines of the SE. This is a novel approach and we believe it can support and guide researchers and practitioners in SE community to have greater benefits of reuse during software developments.","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122287062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zura Izlita Razak, S. A. Rahman, S. Mutalib, Nurzeatul Hamimah Abdul Hamid
{"title":"WEB MINING IN CLASSIFYING YOUTH EMOTIONS","authors":"Zura Izlita Razak, S. A. Rahman, S. Mutalib, Nurzeatul Hamimah Abdul Hamid","doi":"10.24191/mjoc.v3i1.4748","DOIUrl":"https://doi.org/10.24191/mjoc.v3i1.4748","url":null,"abstract":"Social media sites are websites used as mediums to create and share various types of contents over the internet. These sites can also be accessed through applications on mobile gadgets. Different social media sites are available for free, and most teenagers or youths have at least one active account. They use social media sites to connect and share their online profiles, daily activities, stories, and emotions. Depending on their social settings, their activities may or may not be seen by others. One of the latest trends that is spreading over the social media is the Korean Pop entertainment or popularly known as KPop. Over the social media, youths share and express how they feel about their Korean celebrities, music, and drama. However, the issue of excessive sharing of emotion-sharing over social media may increase the risk of mental illness and affect their mental health. Their obsession to keep up-to-date with their idols might lead or cause adverse consequences on their emotional states of mind. Thus, the aim of this research is to study the changes of youths’ emotions in two different countries which are Malaysia and Korea that are related to the KPop trend. We extract texts from tweets from Twitter social media sites using the Twitter API as the basis of our study. Then, the keyword 'KPop' is used to filter the tweets. Web mining model classifies the 12,000 tweets into six emotion categories, which are joy, sadness, fear, anger, disgust, and surprise. The system then records the emotion changes and the triggering events respectively. ","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ibrahim, A. A. Ayoade, O. J. Peter, F. Oguntolu
{"title":"ON THE GLOBAL STABILITY OF CHOLERA MODEL WITH PREVENTION AND CONTROL","authors":"M. Ibrahim, A. A. Ayoade, O. J. Peter, F. Oguntolu","doi":"10.24191/mjoc.v3i1.4812","DOIUrl":"https://doi.org/10.24191/mjoc.v3i1.4812","url":null,"abstract":"In this study, a system of first order ordinary differential equations is used to analyse the dynamics of cholera disease via a mathematical model extended from Fung (2014) cholera model. The global stability analysis is conducted for the extended model by suitable Lyapunov function and LaSalle’s invariance principle. It is shown that the disease free equilibrium (DFE) for the extended model is globally asymptotically stable if 𝑅0 𝑞 < 1 and the disease eventually disappears in the population with time while there exists a unique endemic equilibrium that is globally asymptotically stable whenever 𝑅0 𝑞 > 1 for the extended model or 𝑅0 > 1 for the original model and the disease persists at a positive level though with mild waves (i.e few cases of cholera) in the case of𝑅0 𝑞 > 1. Numerical simulations for strong, weak, and no prevention and control measures are carried out to verify the analytical results and Maple 18 is used to carry out the computations.","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121551451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohd Zulhilmi Ab Jamil, S. Mutalib, S. A. Rahman, Z. A. Aziz
{"title":"CLASSIFICATION OF PADDY WEED LEAF USING NEURO-FUZZY METHODS","authors":"Mohd Zulhilmi Ab Jamil, S. Mutalib, S. A. Rahman, Z. A. Aziz","doi":"10.24191/mjoc.v3i1.4883","DOIUrl":"https://doi.org/10.24191/mjoc.v3i1.4883","url":null,"abstract":"Paddy weed appears to be one of the many visible threats to paddy crop production and subsequently farmers’ income. It is for this reason that the growth of paddy weeds in paddy fields should be controlled as it results in a significant decrease of paddy yields. However, farmers might have limited knowledge on weed types, and are thus unable to identify and determine the right prevention methods. This paper presents classification methods for paddy weeds through the leaf shape extraction and applies neuro-fuzzy methods for recognizing the types of weeds. The types being focussed are the Sphenoclea zeylanica, Ludwigia hyssopifolia and Echinochloa crus-galli. The developed e-prototype methods would be able to classify paddy weeds with 83.78% accuracy. Hopefully, the findings in this study would assist farmers and researchers in increasing their paddy yields and eliminating weed growth respectively. The production of paddy in Malaysia would eventually be improved with the proposed methods, which can be considered as a technology advancement in the field of paddy production.","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126039283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. J. Peter, O. B. Akinduko, C. Ishola, O. Afolabi, A. B. Ganiyu
{"title":"SERIES SOLUTION OF TYPHOID FEVER MODEL USING DIFFERENTIAL TRANSFORM METHOD","authors":"O. J. Peter, O. B. Akinduko, C. Ishola, O. Afolabi, A. B. Ganiyu","doi":"10.24191/mjoc.v3i1.4884","DOIUrl":"https://doi.org/10.24191/mjoc.v3i1.4884","url":null,"abstract":"This paper presents an analysis of PSIuIeTR type model, which are used to study the transmission dynamics of typhoid fever diseases in a population. Basic idea of typhoid fever disease transmission using compartmental modeling is discussed. Differential Transformation Method (DTM) is discussed in detail, which is used to compute the series solution of the non-linear system of differential equation governing the model equations. The validity of the (DTM) in solving the proposed model is established by classical fourth-order Runge-Kutta method which is implemented in Maple 18. Graphical results confirm that (DTM) is in good agreement with RK-4 and this produced correctly same behaviour of the model, thus validating the efficiency and accuracy of (DTM) in finding the series solution of an epidemic model.","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114332291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WINDOWS PRIVILEGE ESCALATION THROUGH NETWORK BACKDOOR AND INFORMATION MINING USING USB HACKTOOL","authors":"Hidayat Ul Hazazi Ab Wahab, Jasni Mohamad Zain","doi":"10.24191/mjoc.v3i1.4811","DOIUrl":"https://doi.org/10.24191/mjoc.v3i1.4811","url":null,"abstract":"A privilege escalation in the Windows system can be defined as a method of gaining access to the kernel system and allowing the user to have an administrative access to the local admin account system on the computer. This paper describes the proof of concept attack scheme using Universal Serial Bus (USB) Hacktool. The attack scheme, the same interaction on the physical access to the computer system could be accomplished by the attacker using a little effort on social engineering and specialized USB Hacktool to take over the computer system in full where it will collect valuable information and escalate the administrative privilege to gain unauthorized admin access which further attack can be done like setting up an open port for backdoor access. The evaluation of this paper gives a significant value as for educational purpose for proof of concept security project. The implementation on this project could help the responsible team to take necessary action toward physical security access to their computer or workstation.","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122313787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}