
Jasni Mohamad Zain- PhD Digital Watermarking
- Professor at MARA University of Technology
Jasni Mohamad Zain
- PhD Digital Watermarking
- Professor at MARA University of Technology
About
223
Publications
159,350
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,878
Citations
Introduction
Jasni Mohamad Zain currently works at the Centre for Computer Science Studies, Universiti Teknologi MARA. Jasni does research in Artificial Neural Network,Digital watermarking, Data Security and Information Systems (Business Informatics). Their current project is 'Processing and Power Efficiency of Mobile Devices through Computational Offloading'.
Current institution
Additional affiliations
December 2016 - December 2016
January 2002 - present
Publications
Publications (223)
Diagnosis of cancer at the benign stage is crucial. Recently, pathologists have been using computer-aided diagnostics with machine learning to diagnose patients from medical images. The limitation of the medical image dataset is a challenge to obtain a robust model for cancer identification. This research was conducted to address this issue. The we...
The race to develop the next generation of wireless networks, known as Sixth Generation (6G) wireless, which will be operational in 2030, has already begun. To realize its full potential over the next decade, 6G will undoubtedly necessitate additional improvements that integrate existing solutions with cutting-edge ones. However, the studies about...
One of the main issues in power systems relates to scheduling of energy resources. With the ever-increasing penetration of renewable energies with intermittent power output, this issue has turned into an even more significant problem. Renewable energy sources (RESs) have captured attention due to their low environmental emission and also low runnin...
Detecting outliers within MetOcean datasets is crucial for identifying extreme weather conditions to facilitate informed decision-making whilst various outlier detection approaches and methods are available to be selected. However, choosing the most appropriate one requires an in-depth understanding of their capabilities and this poses a great chal...
Faced with the increasing complexity and uncertainty of decision-making information, interval-valued Fermatean hesitant fuzzy sets (IVFHFSs) were presented as a novel mathematical model that handled uncertain data more effectively. However, existing multi-attribute group decision-making (MAGDM) methods based on IVFHFSs do not thoroughly investigate...
Forecasting with a precise evaluation of new cases and the rate of occurrence is essential for the effective implementation of governmental initiatives and early prevention of any infectious illness. Despite the extensive research done on the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) virus since the outbreak, not enough knowledge...
Interval-valued Fermatean hesitant fuzzy set (IVFHFS) was presented as a novel mathematical model that handled uncertain data more effectively in 2022. In this study, firstly, we introduce the interval-valued Fermatean hesitant fuzzy Einstein Bonferroni mean (IVFHFEBM) operator and the interval-valued Fermatean hesitant fuzzy Einstein weighted Bonf...
Due to complex nature of metabolic pathways, E. coli metabolic model kinetic parameters are difficult to detect experimentally. Thus, obtaining accurate kinetic data for all reactions in an E. coli metabolic model is a technically-challenging process. So, Garra Rufa-inspired Optimization (GRO) Algorithm is applied to the primary metabolic network o...
Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance, transportation, healthcare, education, and supply chain management. Blockchain interactions in the heterogeneous network have fascinated more attention due to the authe...
The pilgrimage quota for each country is 0.1% of the total population. The demand to perform Hajj increases yearly and demands more quotas, but it is limited due to providing exemplary services and maintaining comfort for pilgrims. The selection process is challenging and informative. Upon registration, the Malaysian waiting period was between 89 a...
The study of renewable energy is expanding quickly, particularly in the areas of modeling and photovoltaic (PV) technology. The utilization of photovoltaic systems is prevalent in diverse renewable energy applications. The primary concern of photovoltaic systems is the optimization of output power to achieve maximum efficiency. Consequently, numero...
The global pandemic of the coronavirus disease COVID-19 has impacted a variety of operations. This dilemma is also attributable to the lockdown measures taken by the afflicted nations. The entire or partial shutdown enacted by nations across the globe affected the majority of hospitals and clinics until the pandemic was contained. The judgements ma...
To lower operational costs as well as emissions when wind and solar resources are available in a microgrid (MG), this study discusses the scheduling of electric vehicles (EVs) and responsive demands simultaneously. To mitigate the effects associated with undispatchable energy sources such as wind and solar, the proposed system makes use of EVs for...
Prediction of machine failure is challenging as the dataset is often imbalanced with a low failure rate. The common approach to handle classification involving imbalanced data is to balance the data using a sampling approach such as random undersampling, random oversampling, or Synthetic Minority Oversampling Technique (SMOTE) algorithms. This pape...
Due to the importance of renewable energies in providing energy for the future of human beings, a simulation is
performed in this paper on the nanofluid (NFD) flow inside a U-shaped tube placed under a solar panel (SPL). The
tube is placed under the panel inside the enclosure containing phase change material (PCM). Alumina-water NFD
and an organic...
In bilingual translation, attention-based Neural Machine Translation (NMT) models are used to achieve synchrony between input and output sequences and the notion of alignment. NMT model has obtained state-of-the-art performance for several language pairs. However, there has been little work exploring useful architectures for Urdu-to-English machine...
In December 2019, a bulletin started to circulate out from China that a novel disease named Coronavirus (COVID-19) was speedily spreading over the nation and population getting infected in larger volume, it was caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). Due to the severity of the disease with higher transmission rate, i...
The article is about THE IMPACT OF COVID-19 PANDEMIC ON EDUCATIONAL STRUCTURE AND EMERGENCE OF TEACHING PLATFORMS ON INTERNET
Breast cancer is diagnosed using histopathological imaging. This task is extremely time-consuming due to high image complexity and volume. However, it is important to facilitate the early detection of breast cancer for medical intervention. Deep learning (DL) has become popular in medical imaging solutions and has demonstrated various levels of per...
Biohydrogen production from organic waste not only provides a sustainable way to produce biofuel but it also resolves the growing environmental concerns associated with agro-industrial waste. This research study investigated the biological hydrogen production potential in batch mode through co-digestion of domestic kitchen food waste (DKFW) and pal...
The COVID-19 pandemic has spread globally, resulting in financial instability in many countries and reductions in the per capita gross domestic product. Sentiment analysis is a cost-effective method for acquiring sentiments based on household income loss, as expressed on social media. However, limited research has been conducted in this domain usin...
Central Bank Digital Currency (CBDC) is a digital form of central bank money, and is different from traditional reserves or settlement accounts balances. In line with the digital technology era, CBDC has gained interest among the majority of the countries. Central banks in a number of countries have started experimenting, piloting, launching, and h...
The ability to create “structured models” of biological simulations is becoming more and more commonplace. Although computer simulations can be used to estimate the model, they are restricted by the lack of experimentally available parameter values, which must be approximated. In this study, an Enhanced Segment Particle Swarm Optimization (ESe-PSO)...
A considerable portion of the world frequently experiences flooding during the monsoon season. As a result of this catastrophic event, hundreds of individuals have become homeless. In addition, rescuers are not usually effective enough to rescue the majority of victims. This is due to inadequate rescue operations infrastructure, a severe flaw in to...
A zoonotic orthopoxvirus known as monkeypox inadvertently produces a smallpox-like illness in humans but with far fewer fatalities. This infection is indigenous to most parts of the African continent, with outbreaks throughout the Western World linked to the exotic animal trade and travel abroad, making it therapeutically significant. Vaccinating a...
With recent developments in power electronics devices, today there is increasing interest in renewable energies at the level of distribution networks and close to consumers. However, it is obvious that with the high integration of such resources in the form of distributed generation (DGs), the operation and management of distribution networks will...
The resolution of an optimization issue is a topic studied and debated by academics from a wide variety of areas continuously. Without an optimal solution, a lot of time and resources are likely to be wasted, and the issue will remain unsolved in the worst-case scenario. Due to these concerns, researchers are increasingly resorting to the developme...
Due to the economic and technical advantages, the use of solar energy is expanding in developed countries. The extraction of maximum power in solar power plants is an important issue that requires extensive research. Extracting the maximum possible power in solar power plants can increase the efficiency of this type of renewable energy sources (RES...
As part of city planning and urban studies, it is customary to use the phrase urban density to describe people and other human activity and development throughout a certain area of land. Urban regions in affluent nations are not only more densely populated (DPUA), but they also have a greater population density per unit of land area than rural area...
Social media is broadly used for various reasons and one being for academic purposes in universities. Although it has its own repercussion such as cyber-crime victimization. This study intends to investigate the relationship between social networking and cybercrime victimization among university students. It identifies illegal behaviours carried th...
Digital form nowadays has been easily manipulated by many corrupters especially in formal business. PDFdocument is one of the main digital forms that need to be accessed when dealing with offer letters, scanneddocuments, digital receipt, etc. Thus, PDF is one of the critical data that needs to be protected from anymanipulations of its originality....
Information and communication technology have accelerated the rate of change in society. As a result, digital identities have begun to form throughout this moment of transition. These identities are related to the acts people carry out in online settings. Through these actions, a digital footprint is created. However, many cybercrime attacks have o...
The building walls are composed of several layers to protect the building from temperature fluctuations of the external environment. Increasing the number of layers in a building certainly strengthens the wall's ability to reduce heat transfer. But on the other hand, it increases the thickness of the walls and thus reduces the useful floor area of...
Penetration of plug-in hybrid electric vehicles (PHEVs) are capable of alleviating numerous global environmental and energy challenges. Utilization of a significant number of PHEVs with significant capacity and control capabilities can increase electrical grid flexibility. However, optimum management of such vehicles with renewable energy sources (...
Question and answer websites such as Quora, Stack Overflow, Yahoo Answers and Answer Bag are used by professionals. Multiple users post questions on these websites to get the answers from domain specific professionals. These websites are multilingual meaning they are available in many different languages. Current problem for these types of websites...
The development of an accurate soft computing method for groundwater level (GWL)
forecasting is essential for enhancing the planning and management of water resources. Over the past two decades, significant progress has been made in GWL prediction using machine learning (ML) models. Several review articles have been published, reporting the advanc...
Recently, applying Software-Defined Networking (SDN) in automotive industry has sparked a lot of interest due to its capacity to ensure focused organization across the board coupled with its vast versatility of isolating data from the control plane. However, the major concern in traffic network is that varied crisis and diversion messages are expec...
In arid climate zones, more than 70% of electricity is used for cooling purposes on hot days of the summer. On the other hand, in these areas, the intensity of radiation is so high that it can be called a stable source of energy for cooling. This study is focusing on the ejector cooling method. Two procedures are employed to reduce energy consumpti...
In this paper, a building air conditioning channel was simulated. In the channel, a number of rods made of phase-change material with triangular arrangement were placed. The air flow in the channel melts the phase change material during the day. During the night, the energy stored in the phase change material was used to heat the building. For this...
This paper analyses an air conditioning system (ACS) of a building using phase change materials (PCMs) numerically. PCMs of CaCl2.6H2O are placed inside the tubes in the ACS. The tubes are linearly arranged in 10 rows, with 17 tubes in each row. The freezing time of PCM is estimated by changing the diameter of the tubes in the range of 1–3 cm, the...
Infrastructure is essential for the activity of a smart city in lighting framework, water conveyance system, smart monitoring infrastructure, and so on. Presently the transport framework is set at the task of such smart city by making smooth portability of the individuals and products, particularly with the probability of managing traffic clog, giv...
This book constitutes the refereed proceedings of the 6th International Conference on Soft Computing in Data Science, SCDS 2021, which was held virtually in November 2021.
The 31 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on AI techniques and applications; da...
Nowadays, countless industrial IIoT contraptions and sensors are conveyed a sharp plant to gather tremendous information regarding system conditions and a computerized bodily framework for handling industrial plant's mist point of convergence by using keen assembling projects. By then, the system utilizes an array of condition‐based support model (...
The advancement of technologies has rapidly risen for the past few years, which brings a lot of benefits especially to the users. However, the developments have also contributed many security issues, where security attacks have also become more advanced. Phishing is one of the security attacks that describe spoof emails or websites to trick users i...
The purpose of this paper is to propose a conceptual model for data security in the Internet of thing devices. Estimated by Jumoki in early 2018 to 2022, there will be about 18 billion connected IoT devices. Therefore many issue related to IoT devices were discussed especially data security. Cryptography with lightweight features is one of the focu...
Steganography is one of the techniques that can be used to hide information in any file types such as audio, image, text and video format. The image steganography is about concealing the hidden data into digital images that alter the pixel of the image. This paper will examine how steganography affect the quality of digital images. Two types of ima...
One of the most significant information resources that often overlooked and it is mostly owned by the modern organization today is logs data. Likewise, logs data analytics is practised in many industries for different purposes, including website/system performance improvement, web development, information architecture, web-based campaigns/programs,...
One of the most significant information resources that often overlooked and it is mostly owned by the modern organization today is logs data. Likewise, logs data analytics is practised in many industries for different purposes, including website/system performance improvement, web development, information architecture, web-based campaigns/programs,...
An open access peer reviewed international journal named “Malaysian Journal of Computing” (MJoC) ISSN: 2231-7473 and eISSN: 2600-8238 (Online) is managed by the faculty of Computer & Mathematical Sciences, Universiti Teknologi MARA for the dissemination of original research in all fields of Computing.
MJoC is dedicated to address the challenges in...
A privilege escalation in the Windows system can be defined as a method of gaining access to the kernel system and allowing the user to have an administrative access to the local admin account system on the computer. This paper describes the proof of concept attack scheme using Universal Serial Bus (USB) Hacktool. The attack scheme, the same intera...
Image compression leads to minimize the storage-requirement of an image by reducing the size of the image. This paper presents a bit allocation strategy based on psychovisual threshold in image compression considering a similar idea of audio coding. In the audio coding, a dynamic bit allocation to each signal is related to the concept of variable b...
Mobile computing in conjunction with Mobile web services drives a strong approach where the limitations of mobile devices may possibly be tackled. Mobile Web Services are based on two types of technologies; SOAP and REST, which works with the existing protocols to develop Web services. Both the approaches carry their own distinct features, yet to k...
The use of cloud computing has increased exponentially in data resources storage over the past few years. Cloud storage reduces the overall costs of server maintenance, whereby companies only pay for the resources they actually use in the cloud storage. Despite this, security concerns in cloud computing must be a top priority. One of the common enc...
Android devices have gained a lot of attention in the last few decades due to several reasons including ease of use, effectiveness, availability and games, among others. To take advantage of Android devices, mobile users have begun installing an increasingly substantial number of Android applications on their devices. Rapid growth in many Android d...
With the rapid development of technology in digital multimedia, manipulation and misconduct of digital data are soaring. The watermarking procedure is seen as helpful to protect the security of digital images which are highly confidential such as medical images. In this study, an efficient watermarking method for greyscale images is proposed. The s...
Weather forecasting plays a vital role in daily routine, businesses and their decisions. The process of weather forecasting is developing as the effect of advancement in technology right from the realization of increasing size of data, Weather forecasting was found to be based on big data. The researchers have taken review with the objective to stu...
The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of third party applications. A cloud platform enables to share resources among mutually distrusting CC clients and offers cost- effective, on-demand scaling. With the exponential growth of CC environment, vulnerabilities and their corresponding exploitation...
In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response sys...
Tampering on medical image will lead to wrong diagnosis and treatment, which is life-threatening; therefore, digital watermarking on medical image was introduced to protect medical image from tampering. Medical images are divided into region of interest (ROI) and region of non-interest (RONI). ROI is an area that has a significant impact on diagnos...
In parallel to the increasing purchase rate of the smart devices, attacks on these devices are also increasing in an alarming rate. To prevent these attacks, many password-based authentication schemes are proposed. Among them, graphical password schemes are preferred on these devices due to their limited screen size and a lack of full sized keyboar...
Inside the sets of data, hidden knowledge can be acquired by using neural network. These knowledge are described within topology, using activation function and connection weight at hidden neurons and output neurons. Is hardly to be understanding since neural networks act as a black box. The black box problem can be solved by extracting knowledge (r...
The Synthetic Aperture Radar (SAR) image with its advantages is becoming more popular than the optical image in earth observation in using the remote-sensing techniques. However, the speckle noise that occurs in the SAR image causes difficulties in image interpretation. Thus, speckle noise reduction needs prepossessing procedure prior to the use of...
Weather is the most critical for human in many aspects of life. The study and knowledge of how weather Temperature evolves over time in some location or country in the world can be beneficial for several purposes. processing, Collecting and storing of huge amounts of weather data is necessary for accurate prediction of weather. Meteorological depar...
Synthetic Aperture Radar (SAR) image with its advantages, is
becoming popular than the optical image in earth observation
using the remote-sensing techniques. The SAR image has a
high resolution and not influenced by weather conditions either
day or night. SAR's image formation process led to speckle
noise; it causes difficulties during the process...
The use of mobile devices, including smartphones, tablets, smart watches, and notebooks are increasing day by day in our lives. As they mostly connected with the Internet and offering nearly the same functionality, same memory, and the same speed like a PC offering. To get much more ad-vantages from these mobile devices, applications should be inst...
In this paper, a novel idea is being presented
to perform Opinion Mining in a very simple and efficient
manner with the help of the One-Level-Tree (OLT) based
approach. To recognize opinions specific for features in
customer reviews having a variety of features
commingled with diverse emotions. Unlike some
previous ventures entirely using one...
The Synthetic Aperture Radar (SAR) image has a high resolution and not
influenced by weather conditions either day or night. SAR image with its
advantages, is becoming popular than the optical image in earth observation
using the remote-sensing techniques. However, the speckle noise that occurs
in the SAR image causes difficulties in image interpre...
The open accessibility of Internet-based medical images in teleradialogy face security threats due to the nonsecured communication media. This paper discusses the spatial domain watermarking of ultrasound
medical images for content authentication, tamper detection, and lossless recovery. For this purpose, the
image is divided into two main parts, t...
With the advancement of technology in communication network, it facilitated digital medical images transmitted to healthcare professionals via internal network or public network (e.g., Internet), but it also exposes the transmitted digital medical images to the security threats, such as images tampering or inserting false data in the images, which...
Smart Internet Devices (SIDs) particularly Smartphones are soon turned to be super computers, while the restricted battery timing is a focused issue which hinders the steady meeting expectations yield of these devices. In addition, various sensors, high resolution LCDs, wireless interfaces, GPS and other advanced features drain battery quickly, thu...
Educational data mining has been studied extensively as it provides useful information for educators to make more accurate decisions concerning their students, and to adapt their teaching strategies accordingly. Data clustering as one of data mining techniques can be considered as an alternative method for educational data mining. In this paper, a...
The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. However, the...
This paper proposes the Backpropagation Neural Network (BNN) for recognition of Dynamic Malaysian Sign Language. In the first stage, image acquisition data is obtained from the Kinect sensor, using skeletal data tracking with eight joint positions. In the second stage, for the skeletal feature extraction, the value of coordinate X, Y, Z of the data...
This paper proposes the Backpropagation Neural Network (BNN) for recognition of Dynamic Malaysian Sign Language. In the first stage, image acquisition data is obtained from the Kinect sensor, using skeletal data tracking with eight joint positions. In the second stage, for the skeletal feature extraction, the value of coordinate X, Y, Z of the data...
In recent years, it has been argued and experimentally shown that ion channel noise in neurons can have profound effects on the neuron’s dynamical behavior. Most profoundly, ion channel noise was seen to be able to cause spontaneous firing and stochastic resonance. It has been recently found that a non-trivially persistent cross correlation takes p...
In teleradiology, image contents may be altered due to noisy communication channels and hacker manipulation. Medical image data is very sensitive and can not tolerate any illegal change. Illegally changed image-based analysis could result in wrong medical decision. Digital watermarking technique can be used to authenticate images and detect as well...
This paper proposes the Backpropagation Neural Network (BNN) for recognition of Dynamic Malaysian Sign Language. In the first stage, image acquisition data is obtained from the Kinect sensor, using skeletal data tracking with eight joint positions. In the second stage, for the skeletal feature extraction, the value of coordinate X, Y, Z of the data...
Published in World Applied Sciences Journal (WASJ)
Today, millions of users worldwide experience pervasive email and Web access through IPhones, Black Berries, Windows Mobile, and other mobile devices (Laptops, PDAs). After information at the fingertip, energy efficiency of these devices is paramount which makes the devices first choice of communication for the new generation. On the other hand, Mo...
Today, millions of users worldwide experience pervasive email and Web access through IPhones, Black Berries,
Windows Mobile, and other mobile devices (Laptops, PDAs). After information at the fingertip, energy
efficiency of these devices is paramount which makes the devices first choice of communication for the
new generation. On the other hand, Mo...