
Muhammad Fermi Pasha- Ph.D.
- Monash University Malaysia
Muhammad Fermi Pasha
- Ph.D.
- Monash University Malaysia
About
89
Publications
28,605
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,757
Citations
Introduction
Current institution
Additional affiliations
August 2016 - present
July 2010 - October 2015
Education
August 2008
NAv6 Center of Excellence
Field of study
- Certified IPv6 Network Engineer
December 2006 - August 2009
July 2003 - May 2005
Publications
Publications (89)
Malaria, a disease transmitted by Anopheles mosquitoes carrying the plasmodium parasite, is a significant issue in the health world. To effectively achieve the substantial decrease in malaria cases, it is crucial to accurately forecast the anticipated aggregate count of malaria instances and promptly implement suitable preventive actions following...
This research is motivated by the limitations of the ARIMA method, which is only suitable for short-term forecasting and specific periods. Therefore, a combination of Regression and ARIMA methods (Reg- ARIMA) is introduced to predict stock prices over a longer period. The purpose of this study is to implement a combination of Regression and ARIMA m...
The accuracy of deep learning models in predicting dynamic and non-linear stock market data highly depends on selecting optimal hyperparameters. However, finding optimal hyperparameters can be costly in terms of the model's objective function, as it requires testing all possible combinations of hyperparameter configurations. This research aims to f...
Securing Electronic Medical Records (EMRs) is one of the most critical applications of cryptography over the Internet due to the value and importance of data contained in such EMRs. Although blockchain-based healthcare systems can provide security, privacy, and immutability to EMRs, several outstanding security and latency issues are associated wit...
Mobile healthcare application (mHealth app) assists the frontline health worker in providing necessary health services to the patient. Unfortunately, existing mHealth apps continue to have accuracy issues and limited number of disease detection systems. Thus, an intelligent disease diagnostics system may help medical staff as well as people in poor...
Recent advancements in the Internet of Things and Machine Learning techniques have allowed the deployment of sensors on a large scale to monitor the environment and model and predict individual thermal comfort. The existing techniques have a greater focus on occupancy detection, estimations, and localization to balance energy usage and thermal comf...
It is important to improve the detection of deepfake videos to differentiate between real and fake videos that cause disinformation in the digital age so that a high level of accuracy is required. The purpose of deepfake video detection is to aid digital content consumers to surmount disinformation and sever real videos from fake ones. Limited by t...
Forecasting on success or failure of software has become an interesting and, in fact, an essential task in the software development industry. In order to explore the latest data on successes and failures, this research focused on certain questions such as is early phase of the software development life cycle better than later phases in predicting s...
Web services show a rapid evolution and integration to meet the increased users' requirements. Thus, web services undergo updates and may have performance degradation due to undetected faults in the updated versions. Due to these faults, many performances and regression anomalies in web services may occur in real-world scenarios. This paper propose...
The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to sense the environment and gather the information. These devices continuously monitor, collect, exchange, analyze, and transfer the captured data to nearby devices or serv...
Smart building technology incorporates efficient and automated controls and applications that use smart energy products, networked sensors, and data analytics software to monitor environmental data and occupants’ energy consumption habits to improve buildings’ operation and energy performance. Smart technologies and controls are becoming increasing...
Digital healthcare is a composite infrastructure of networking entities that includes the Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS), base stations, services provider, and other concerned components. In the recent decade, it has been noted that the demand for this emerging technology is gradually increased with cost-effect...
t In digital healthcare systems, the patients face significant problems identifying an optimal vacant and available slot for their appointment as the number of
patient requests directly correlates with the slot availability. Existing smart healthcare systems facilitate the patient to reserve a particular time slot and attain real-time
healthcare in...
In digital healthcare systems, the patients face significant problems identifying an optimal vacant and available slot for their appointment as the number of patient requests directly correlates with the slot availability. Existing smart healthcare systems facilitate the patient to reserve a particular time slot and attain real-time healthcare info...
The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address th...
Due to the value and importance of patient health records (PHR), security is the most critical feature of encryption over the Internet. Users that perform keyword searches to gain access to the PHR stored in the database are more susceptible to security risks. Although a blockchain-based healthcare system can guarantee security, present schemes hav...
The enforcement of the Movement Control Order to curtail the spread of COVID-19 has affected home energy consumption, especially HVAC systems. Occupancy detection and estimation have been recognized as key contributors to improving building energy efficiency. Several solutions have been proposed for the past decade to improve the precision performa...
As nearly half of the incidents in enterprise security have been triggered by insiders, it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents caused by insiders or malicious software (malware) in real-time. Failing to do so may cause a serious loss of reputation as well as busin...
Abstract In digital healthcare systems, the patients face significant problems identifying an optimal vacant and available slot for their appointment as the number of patient requests directly correlates with the slot availability. Existing smart health-care systems facilitate the patient to reserve a particular time slot and attain real-time healt...
Blockchain is a promising technology in the context of digital healthcare systems, but there are issues related to the control of accessing the electronic health records. In this paper, we propose a novel framework based on blockchain and multiple certificate authority that implement smart contracts and access health records securely. Our proposed...
Web systems evolve by adding new functionalities or modifying them to meet users’ requirements. Web systems require retesting to ensure that existing functionalities are according to users’ expectations. Retesting a web system is challenging due to high cost and time consumption. Existing ‘systematic literature review’ (SLR) studies do not comprehe...
According to the security breach level index, millions of records are stolen worldwide on every single day. Personal health records are the most targeted records on the internet, and they are considered sensitive, and valuable. Security and privacy are the most important parameters of cryptography and encryption. They reduce the availability of dat...
Regression testing, as an important part of the software life cycle, ensures the validity of modified software. Researchers’ focus of this research is on functional requirement-based ‘Test Case Prioritization’ (TCP) because requirement specifications help keep the software correctness on customers’ perceived priorities. This research study is aimed...
[This corrects the article DOI: 10.2196/21929.].
PurposeThe coronavirus 2019 (COVID-19) pandemic has rapidly spread worldwide, with an ever-increasing number of confirmed positive cases and mortality rate. Moreover, frontline medical staff fighting with the COVID-19 infection have been infected and show psychological effects of the pandemic. This study presents an overview of the emerging literat...
Currently building structure sector takes lead in energy consumption across the globe and is expected to increase by 2% every year. Consequently, being a major energy consumer, it's required to make effort for energy conservation as well. However, this energy conservation has to be in line with occupant thermal comfort. Recent advancement in the In...
Personal health records and electronic health records are considered as the most sensitive information in the healthcare domain. Several solutions have been provided for implementing the digital health system using blockchain, but there are several challenges, such as secure access control and privacy is one of the prominent issues. Hence, we propo...
Occupancy-driven application research has been active research for a decade that focuses on improving or replacing new building infrastructure to improve building energy efficiency. Existing approaches for HVAC energy saving are putting more emphasis on occupancy detection, estimation, and localization to trade-off between energy consumption and th...
The dynamic behavior of web services is critical for researchers to determine their performance at different times. Many existing studies present the static information of web services that are not so effective for estimating web services' future performance. This research article reveals the acquisition of throughput metric dataset for thirty time...
Today, 44% of global energy has been derived from fossil fuel, which currently poses a threat to inhabitants and well-being of the environment. In a recent investigation of the global demand for energy consumption across various energy consumption sectors, the building sector has been shown to be one of the primary energy consumers, with a high per...
Along with many complications, diabetic patients have a high chance to suffer from critical level vision loss and in worst case permanent blindness due to Diabetic Retinopathy (DR). Detecting DR in the early stages is a challenge, since it has no visual indication of this disease in its preliminary stage, thus becomes an important task to accomplis...
Regression testing is a widely studied research area, with the aim of meeting the quality challenges of software systems. To achieve a software system of good quality, we face high consumption of resources during testing. To overcome this challenge, test case prioritization (TCP) as a sub-type of regression testing is continuously investigated to a...
Coronavirus disease 2019 (COVID-19) is an emerging disease caused by the coronavirus, SARS-CoV-2, which leads to severe respiratory infections in humans. COVID-19 was first reported in December 2019 in Wuhan city, a populated area of the Hubei province in China. As of now, Wuhan and other cities nearby have become safe places for locals. The rapid...
Test Case Prioritization (TCP) involves the rearrangement of test cases on a prioritized basis for various services. This research work focuses on TCP in web services, as it has been a growing challenge for researchers. Web services continuously evolve and hence require reforming and re-execution of test cases to ensure the accurate working of web...
Structure Query Language Injection Attack is among the top 10‐security threats that can be used on the web application to cause severe damage or gain unauthorized data access to the application server. Many reports have indicated an average of 64% of global websites are at risk of being attack by SQL injection, and many of the top companies have ex...
This paper presents a narrative review study of five popular data repositories focusing on challenges of pregnant women protection during the COVID-19 pandemic. The study concludes that the likelihood of a vertical transmission of COVID-19 infection from pregnant women to neonates was not observed. Nevertheless, it remains a serious risk for them d...
BACKGROUND
Information technology has shifted paper-based documentation in the health care sector into a digital form, in which patient information is transferred electronically from one place to another. However, there remain challenges and issues to resolve in this domain owing to the lack of proper standards, the growth of new technologies (mobi...
Background
Information technology has shifted paper-based documentation in the health care sector into a digital form, in which patient information is transferred electronically from one place to another. However, there remain challenges and issues to resolve in this domain owing to the lack of proper standards, the growth of new technologies (mobi...
SQL injection attack (SQLIA) is one of the most severe attacks that can be used against web database driving applications. Attackers use SQLIA to get unauthorized access and perform unauthorized data modification. To combat problem of SQLIA, different researchers proposed variety of tools and methods that can be used as defense barrier between clie...
To accurately rank various web services can be a very challenging task depending on the evaluation criteria used, however, it can play an important role in performing a better selection of web services afterward. This paper proposes an approach to evaluate trust prediction and confusion matrix to rank web services from throughput and response time....
Web services have emerged as an accessible technology with the standard ’Extensible Mark Up’ (XML) language, which is known as ’Web Services Description Language’ WSDL. Web services have become a promising technology to promote the interrelationship between service providers and users. Web services users’ trust is measured by quality metrics. Web s...
Web services is a growing technology to meet the multiple and concurrent users’ access requirements. Web services’ performance degrades when concurrent users face the delay in receiving replies from services. In an attempt to address the limitation of web services technology, Drupal 8 has been recently introduced. Drupal 8 enables the fast caching...
Performance anomaly detection is the process of identifying occurrences that do not conform to expected behavior or correlate with other incidents or events in time series data. Anomaly detection has been applied to areas such as fraud detection, intrusion detection systems, and network systems. In this paper, we propose an anomaly detection framew...
Compression, in general, aims to reduce file size, with or without decreasing data quality of the original file. Digital Imaging and Communication in Medicine (DICOM) is a medical imaging file standard used to store multiple information such as patient data, imaging procedures, and the image itself. With the rising usage of medical imaging in clini...
The need for public parking space is increasing nowadays due to the high number of cars available. Users of car parking services, in general, are still looking for vacant parking locations to park their vehicle manually. With the current technological developments, especially in image processing field, it is expected to solve the parking space prob...
Hand gesture has significant roles in human’s interaction and the hand gesture recognition itself nowadays becomes an active research area in human-computer interaction. Previous researches on hand gesture recognition used various techniques and tools such as Kinect and data glove. Hand gesture recognition area has many challenges, such as variatio...
Interaction between human and computer is generally performed with a keyboard and mouse. However, these interactions have certain drawbacks which cannot be done by users with physical disabilities or user who have disability from the wrist to the fingertip. To overcome this problem, an approach to recognize human hand gesture as a means of human-co...
Bekel is one of traditional Indonesian game that is rarely played nowadays. Bekel is a game to test dexterity level using a bekel ball and 6 to10 seeds. The game is played by throwing the ball up in the air, spreading the seeds randomly on the floor then picking the seeds up until the ground is clear. This game application is an adaptation of Bekel...
The network traffic of the Internet became huge and more complex due to the expansion of the Internet technology in supporting the convergence of IP networks, Internet of Things, and social networks. As a consequence, a more sophisticated network monitoring tool is desired in order to prevent an enterprise network from malware attacks, to maintain...
Neural networks have always been a popular approach for intelligent machine development and knowledge discovery. Although, reports have featured successful neural network implementations, problems still exists with this approach, particularly its excessive training time. In this paper, we propose a Gene-Regulated Nested Neural Network (GRNNN) model...
Invention of diffusion imaging has empowered the neuro-scientists with maps of microscopic structural information that could be taken in vivo. Different diffusion models have been proposed since the inception of the diffusion tensor imaging. Diffusion models have been mainly used for visualizing the brain tissues as precise as possible. However, in...
Ubiquitous healthcare system is becoming essential in the attempt to improve healthcare delivery. Not only it is able to facilitate two-way communication between physician and patient, but it is also useful for the caregivers to maximize efficiency in running daily activities. Managing ischemia heart disease, one of the deadly diseases, would defin...
The Local Binary Pattern (LBP) descriptor encodes the complementary information of the spatial patterns and intensity variations in a local image neighborhood. The richness of this multidimensional information offers many possible variations to the encoding process. Taking advantage of this, several variants of the LBP have been proposed. This work...
The collaborative teleradiology system detailed here would enable multiple medical experts to view, analyze, and discuss regions of interest in medical images remotely. Current research into similar systems have mostly focused on creating effective mechanisms to securely access and store expert opinions on the medical images, with additional work i...
Low contrast between tumor and healthy liver tissue is one of the significant and challenging features among others in the automated tumor delineation process. In this paper we propose kernel based clustering algorithms that incorporate Tsallis entropy to resolve long range interactions between tumor and healthy tissue intensities. This paper repor...
Automating the detection of lesions in liver CT scans requires a high performance and robust solution. With CT-scan start to become the norm in emergency department, the need for a fast and efficient liver lesions detection method is arising. In this paper, we propose a fast and evolvable method to profile the features of pre-segmented healthy live...
The importance of network discovery cannot be denied especially for network monitoring and network management purposes. Here, we present a fuzzy approach to perform hybrid network device discovery. The main goal is to solve the increased additional traffic load issues in active discovery technique and the low accuracy issues in passive discovery te...
Car-to-car communication starting to became important in the attempt to improve road safety. Not only it is able to reduce car accident rate, but also it is useful to minimize traffic jam. The communication media between the cars varied but the low cost solution is to use existing wireless networks such as 3G, Wi-Fi, WiMAX, etc. Car-to-car communic...
In this paper, we introduce a new machine learning tool: a distributed autonomous neuro-gen learning engine (DANGLE). The tool's motivation is to solve the lattice analysis of cubic structure identification problem. Our engine is also indirectly designed to solve common problems in existing neurogenetic implementations. The proposed DANGLE consists...
The purpose of Grid monitoring and management is to monitor services in Grid environment for fault detection, performance analysis,performance tuning, load balancing and scheduling. This paper emphasis on presenting a new framework namely iNet-Grid deployed for Grid monitoring and troubleshooting purposes. The iNet-Grid is integrated on top of Gang...
When diagnosing network problems, it is desirable to have a view of the traffic inside the network. This can be achieved by
profiling the traffic. A fully profiled traffic can contain significant information of the network’s current state, and can
be further used to detect anomalous traffic and manage the network better. Many has addressed problems...
Monitoring a large corporate network connecting thousands of computers which generate billions of packets everyday is a challenge and difficult task! This paper proposes a distributed approach of intelligent network traffic monitoring and anomaly detection system. By utilizing a distributed client-server scheme, our proposed system can monitor mult...
When diagnosing network problems, it is desirable to have a view of the traffic inside the network. This can be achieved by profiling the traffic. A fully profiled traffic can contain significant information of the network's current state, and can be further used to detect anomalous traffic. Many has addressed problems of profiling network traffic,...
This paper presents an application of a new type of fuzzy inference system, denoted as evolvable-neural-based fuzzy inference
system (EFIS), for adaptive network anomaly detection in the presence of a concept drift problem. This problem cannot be avoided
to happen in every network. It is a problem of modeling the behavior of normal traffic while it...