Z. L. Chuan, David Chong Teak Wei, Connie Lee Wai Yan, Muhammad Fuad Ahmad Nasser, Nor Azura Md. Ghani, A. Jemain, C. Liong
{"title":"A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application","authors":"Z. L. Chuan, David Chong Teak Wei, Connie Lee Wai Yan, Muhammad Fuad Ahmad Nasser, Nor Azura Md. Ghani, A. Jemain, C. Liong","doi":"10.11113/mjfas.v19n4.2917","DOIUrl":"https://doi.org/10.11113/mjfas.v19n4.2917","url":null,"abstract":"IBIS, ALIS, EVOFINDER, and CONDOR are the massive ballistics computerised technological machines that have typically been utilised in forensic laboratories to automatically locate similarities between images of cartridge cases and bullets. However, it imposed a long execution time and requires physical interpretation to consolidate the analysis results when employing these market-available technologies to accomplish ballistics matching tasks. Therefore, the principal objective of this study is to propose an improvised automated probabilistic machine learning identification algorithm by extracting the two-dimensional (2D) statistical moment invariants from the segmented region of interest (ROI) corresponding to the cartridge case and bullets images. To pursue this principal objective, several 2D statistical moment invariants have been compared and tested to determine the most suitable feature set applied in the proposed identification algorithm. The 2D statistical moment invariants employed include Orthogonal Legendre moments (OLM), Hu moments (HM), Tsirikolias-Mertzois moments (TMM), Pan-Keane moments (PKM), and Central Geometric moments (CGM). Moreover, the proposed identification algorithm is also tested in different scenarios, including based on the classification of strength association measurements between the extracted feature sets. The empirical results in this article revealed that the proposed identification algorithm applied with the CGM comprising the weak association classification yielded the best identification accuracy rates, which are >96.5% across all the sample sizes of the training set. These empirical results also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"50 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76594142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mustafa Qahtan Alsudani, Safa Riyadh Waheed, K. A. Kadhim, M. M. Adnan, Ameer Al-khaykan
{"title":"Automatic Car Number Plate Detection using Morphological Image Processing","authors":"Mustafa Qahtan Alsudani, Safa Riyadh Waheed, K. A. Kadhim, M. M. Adnan, Ameer Al-khaykan","doi":"10.11113/mjfas.v19n3.2910","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2910","url":null,"abstract":"One of the most common uses of computer vision, automatic number plate recognition (ANPR) is also a pretty well-explored subject with numerous effective solutions. Due to regional differences in license plate design, however, these solutions are often optimized for a specific setting. Number plate recognition algorithms are often dependent on these aspects, making a universal solution unlikely due to the fact that the image analysis methods used to develop these algorithms cannot guarantee a perfect success rate. In this research, we offer an algorithm tailor-made for use with brand-new license plates in Iraq. The method employs edge detection, Feature Detection, and mathematical morphology to find the plate; it was developed in C++ using the OpenCV library. When characters were found on the plate, they were entered into the Easy OCR engine for analysis.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"112 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85834836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. F. Fakhruldeen, Ahlam R. Khekan, Ibrahim H. Al-Kharsan
{"title":"Design and Performance Analysis of Simple WDM Optical Fiber Communication System","authors":"H. F. Fakhruldeen, Ahlam R. Khekan, Ibrahim H. Al-Kharsan","doi":"10.11113/mjfas.v19n3.2990","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2990","url":null,"abstract":"WDM (wavelength division multiplexing) is used in this project to simultaneously send data over several channels at high speed. Single mode fiber is favored over Multimode fiber for long-distance communication. As data rate and optical fiber length grow, the quality factor falls. Dispersion effects on an 8-channel dense WDM system at a high data rate will be examined using the Optisystem 10 simulator. A dispersion compensation fiber (DCF) and an Erbium doped fiber amplifier (EDFA) are used to compensate for the dispersion and attenuation in the transmitted optical signal, respectively. Bit error rate (BER) and eye diagram analyzers were used to evaluate the optical communication system's performance.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"37 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88652376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Suharti, Hanif Nur Rozaq, Aulia Qisti, M. Alvionita, S. Wonorahardjo
{"title":"Keratinase Production by Bacillus sp. MD24 in Sub-merge and Solid State Fermentation","authors":"S. Suharti, Hanif Nur Rozaq, Aulia Qisti, M. Alvionita, S. Wonorahardjo","doi":"10.11113/mjfas.v19n3.3028","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.3028","url":null,"abstract":"Chicken feathers are valuable solid waste that mainly contains insoluble proteins called keratin. Naturally, keratin is degraded by microbes that produce a specific protease called keratinase. Many reports have been addressed to study Bacillus species as keratin-degrading microbes. However, most reported works were using pathogenic soil Bacillus. Our work has been concentrated on keratinase produced by a soil bacterium, Bacillus sp. MD24 and we confirmed it as a non-pathogenic bacterium. This report describes the different profiles of keratinase fermentation between sub-merged fermentation (SmF) and solid-state fermentation (SSF) using chicken feathers as a sole carbon and nitrogen source. Keratinase production and weight loss were followed for 10 consecutive days, the keratinase molecular weight was investigated, the type and concentration of 18 amino acids were determined using LC-MS/MS after 10 days to seek its potential as the amino acid source, and protein by-product concentration was measured. The results showed that keratinase production as well as weight loss in SmF was better compared to SSF with different optimum production times. Surprisingly, L-arginine was a dominant amino acid in SmF hydrolysate which contained 42.06% of total amino acids and made Bacillus sp. MD24 is a potential organism for L-arginine production. As protein by-product concentration was relatively low in both conditions showing effective utilization of chicken feathers as matter and energy source, consequently, cell-free keratinase should be applied to degrade chicken feathers into valuable materials.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"7 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83822252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Random Color Image Encryption Using the Genetic Algorithm","authors":"Hanan Abbas Salman, Duha Amer Mahdi","doi":"10.11113/mjfas.v19n3.2907","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2907","url":null,"abstract":"This paper implements a combined pseudo-random sequence generator based on neural networks and chaotic, random variable color images based on an algorithm for chaotic encryption, secure image storage, and transmission. The generator that controls the operation of the encryption algorithm: the arrangement of pixel positions, the use of random color images of the AES algorithm to achieve encryption, creation algorithms, and neural networks by dynamically updating control parameters and numbers to increase the generated chaotic sequence randomness by using simulation MATLAB for getting output. The chaotic function's iteration of the neural networks. The experimental results are presented in the form of a pixel correlation coefficient and security analysis to prove the security and effectiveness of the proposed chaos-based ANN encryption.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"59 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75153877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. F. Fakhruldeen, Karrar A. Kadhim, Tahreer Abdulridha Shyaa, Heba Abdul-Jaleel Al-Asady
{"title":"Models and Methods of Information and Control System Cyber–security for Smart Buildings","authors":"H. F. Fakhruldeen, Karrar A. Kadhim, Tahreer Abdulridha Shyaa, Heba Abdul-Jaleel Al-Asady","doi":"10.11113/mjfas.v19n3.2902","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2902","url":null,"abstract":"Smart building management systems today employ the architectural multi-level creation of a system of unified components. Such a market is dynamic and always expanding, and sometimes the developers of such components stop maintaining their products or even collapse and vanish. It's not always possible to use professional-level components from proven developers when a building automation system (BAS) project budget is limited. The construction and analysis of models that consider the dependability and cyber security aspects of maintenance as well as ways of validating the selection of components, strategies, and service parameters are both necessary steps in finding compromises between the BAS architecture's value and quality. Use of information technology to determine maintenance parameters based on a model and model development approach.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"46 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75584602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. A. Kadhim, Farhan Mohamed, Ammar AbdRaba Sakran, M. M. Adnan, G. A. Salman
{"title":"Early Diagnosis of Alzheimer's Disease using Convolutional Neural Network-based MRI","authors":"K. A. Kadhim, Farhan Mohamed, Ammar AbdRaba Sakran, M. M. Adnan, G. A. Salman","doi":"10.11113/mjfas.v19n3.2908","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2908","url":null,"abstract":"Alzheimer's disease (AD) is a neurodegenerative ailment that causes cognitive deterioration due to changes in brain structure. Individuals usually see diagnostic symptoms after irreversible brain damage has occurred. In order to slow the course of the illness and enhance the quality of life for AD patients, early diagnosis is crucial. Recent advances in machine learning and scanning have made the use of these methods to detect AD in its earliest stages possible. This article uses deep learning using CNN methods to extract picture characteristics from ADNI (Alzheimer's Disease Neuroimaging Initiative) datasets to improve Alzheimer's disease diagnosis techniques. This descriptor will be used in conjunction with the CNN to categorize the illness and add new characteristics that are more accurate, quicker, and stable than the current features. In this process, an Alzheimer's detection System will be implemented to mitigate the adverse effects of data imbalance on recognition performance, and an integrated multi-depth architectural technology will be introduced to boost recognition quality. Using the suggested model of the convolution neural network (CNN) technique, classification accuracy results were obtained above 97%.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"14 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81785253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. F. Fakhruldeen, Rana Abbas Al-Kaabi, Feryal Ibrahim Jabbar, Ibrahim H. Al-Kharsan, Sarah Jawad Shoja
{"title":"Post-quantum Techniques in Wireless Network Security: An Overview","authors":"H. F. Fakhruldeen, Rana Abbas Al-Kaabi, Feryal Ibrahim Jabbar, Ibrahim H. Al-Kharsan, Sarah Jawad Shoja","doi":"10.11113/mjfas.v19n3.2905","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2905","url":null,"abstract":"Post quantum is a general name to all the techniques which are safe against the quantum computer attack. The wireless network is one of the most important means of communication. Wireless network security is a top priority. Wireless networks use conventional cryptography, which has various flaws, whereas quantum cryptography claims to be completely secure. It wasn't long after quantum computers became operational that people began to think about new ways to secure electronic communications. After considering all of the weaknesses in conventional cryptosystems, individuals began to look for new ways to secure electronic communications. Traditional cryptography has many problems, but quantum cryptography addresses nearly all of them.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"15 12 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86937349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Riyam Adnan Hammudi, Yamam A. Hammudi, A. A. Salim, Zeid Alsadoon, R. S. Radh, I. M. Abbas, Aboo-Thar Ali Hammad
{"title":"Plasma in Dentistry","authors":"Riyam Adnan Hammudi, Yamam A. Hammudi, A. A. Salim, Zeid Alsadoon, R. S. Radh, I. M. Abbas, Aboo-Thar Ali Hammad","doi":"10.11113/mjfas.v19n3.2904","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2904","url":null,"abstract":"Plasma technologies are mostly used in dentistry; our work focuses on Plasma scopes and plasma applications in dentistry. We will directly deliberate about liquid, solid, and gas only without sophisticated about the fourth state (Plasma), which is the most abundant and the most important state and is considered the new technology in dentistry that may create a revolution in this field as a painless free technology in all dental fields. The study results showed that cold atmospheric Plasma could be a new and painless method before the preparation of the cavities. Also, it is very effective in bacterial inactivation, sterilization, oral diseases, root canal treatment, and disordered tissues; therefore, Plasma is used mostly for treating tooth diseases and tooth whitening.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"3 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82852086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One Time Password based Mutual Text Authentication","authors":"Salah H Abbdal Refish","doi":"10.11113/mjfas.v19n3.2994","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2994","url":null,"abstract":"Many applications in the internet using Password for identify users. So, this password must be strong and safe to avoid unauthorized users. The critical issue in many applications such as web-sites and data base systems is password authentication code (PAC). In this paper, PAC between two parties to confirm password authentication between them based mutual text authentication has presented. Two factors is the best solution in this field. But to be more secure and to be more efficient a legitimate user needs to make sure about his partner to ensure their communications should use another method without need more costs and avoid plurality of algorithms. So, this solution uses mutual text authentication as new solution which the text is predetermined by users. This method is considered new in this field, as this method tries to make the password highly secure in front of unauthorized users and to make the process of accessing information specific only to the actual authorized users. When analysing this method, we find that it has many characteristics such as the confidentiality of the session key and privacy, in addition to the exchange of authentication between the two parties to ensure that others do not interfere.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"99 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81091322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}