Jafreezal Jaafar’s research while affiliated with Universiti Teknologi Petronas and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (23)


Metoceanvis: A Web-Based Interactive Visualization Framework for Multidimensional Spatio-Temporal Metocean Data Analysis Using Open Source Technologies
  • Preprint

January 2025

·

19 Reads

Azlan Ismail

·

·

·

[...]

·

Izzatdin Abdul Azis


Retraction Note: Reward-based residential wireless sensor optimization approach for appliance monitoring
  • Article
  • Publisher preview available

October 2024

·

3 Reads

Soft Computing

View access options

Fig. 1: The study area. The red dot is the feature locations.
Fig. 3: Mean Residual Life Chart for Wind Speed SEAFINE A9
Fig. 4: Mean Residual Life Chart for SigniĄcant Wave Height SEAFINE A9
Fig. 5: Extracted extreme wind speed
Fig. 6: Return value plot for wind speed

+12

Comparative Analysis of Outlier Detection Approaches in MetOcean Domain: Extreme Value Analysis, Functional Data Analysis, and Unsupervised Learning

June 2024

·

59 Reads

Detecting outliers within MetOcean datasets is crucial for identifying extreme weather conditions to facilitate informed decision-making whilst various outlier detection approaches and methods are available to be selected. However, choosing the most appropriate one requires an in-depth understanding of their capabilities and this poses a great challenge to the novice within the domain. Therefore, this study is proposed to empirically compare these approaches and provide insights on their performance when dealing with large MetOcean data. The comparison is driven by three outlier detection approaches using the SEAFINE dataset: Extreme Value Analysis (EVA), Functional Data Analysis (FDA), and Unsupervised Learning (UL). A framework is designed to systematically conduct the comparative analysis, which involves five phases: data preprocessing, model training, outlier detection, parameter estimation, and evaluation. This analysis provides insights into the performance of each outlier detection method for each approach and the comparison between them. Overall, the results indicate that the EVA approach exhibits the fastest average execution time compared to the FDA and UL. Within the EVA approach, Peak-Over-Threshold is the most effective, closely aligning the distribution of extreme values with the estimated distribution. Functional Boxplot emerges as the optimal method for FDA, capable of detecting outliers far from the median. Cluster-Based Local Outlier Factor (CBLOF) is the most effective UL method, predicting outliers close to the expected total, with high Excess-Mass values and fast execution.




FIGURE 1. Anomaly Classification in Time Series Data: Types and Examples
Challenges in DL-Based Anomaly Detection for Time-Series Data: Process Descriptions and Insights
Type of Anomaly Detection Technique and the Algorithms used.
Parameters used in the Anomaly Detection Method.
Overview of Key Attributes and Description of the Datasets used in the Experiments
Deep Learning for Anomaly Detection in Time-Series Data: An Analysis of Techniques, Review of Applications, and Guidelines for Future Research

January 2024

·

42 Reads

IEEE Access

Industries are generating massive amounts of data due to increased automation and interconnectedness. As data from various sources becomes more available, the extraction of relevant information becomes crucial for understanding complex systems’ behavior and performance. The growing volume and complexity of time-series data in diverse industries have created a demand for effective anomaly detection methods. Detecting anomalies in multivariate time-series data presents unique challenges, such as the presence of multiple correlated variables and intricate relationships among them. Traditional approaches often fall short in detecting anomalies, making deep learning methods a promising solution. This review article provides a comprehensive analysis of different deep learning techniques for anomaly detection in time-series data, examining their applicability across various industries and discussing the associated challenges. The article emphasizes the significance of deep learning in detecting anomalies and offers valuable insights to inform decision-making processes. Furthermore, it proposes recommendations for model developers, advocating for the development of hybrid models that combine different deep learning techniques and the exploration of attention mechanisms in Recurrent Neural Networks (RNNs). These recommendations aim to overcome the challenges associated with deep learning-based anomaly detection in multivariate time-series data.


An Adaptive Heuristic Approach to Optimize Equity Market Neutral Portfolio

October 2023

·

7 Reads

Communications in Mathematics and Applications

An Equity Market Neutral Portfolio (EMNP) safeguards a safe portfolio concerning exposure to pertinent market benchmarks. Although it is possible to efficiently solve the problem of EMNP optimization through linear programming techniques, combining the risk budget constraint of risky assets with other constraints of EMNP where there is no market exposure, leveraging, or portfolio beta makes it challenging to resolve this problem via conventional approaches directly. This study aims to propose a novel technique to solve the problem of constrained optimization of EMNP via differential evolution strategies involving multiple crossovers (Exponential as well as binomial together with the Hall of Fame). The suggested automated technique enables portfolio managers to select the portfolio with the highest potential return. Monitoring the optimal combination of evolutionary techniques also confirms the results’ consistency. Therefore, impending outcomes were chosen depending on the optimal balance of portfolio returns and risk. This analysis includes Nifty50’s monthly stock prices.


Machine Learning and Synthetic Minority Oversampling Techniques for Imbalanced Data: Improving Machine Failure Prediction

May 2023

·

829 Reads

·

6 Citations

Prediction of machine failure is challenging as the dataset is often imbalanced with a low failure rate. The common approach to handle classification involving imbalanced data is to balance the data using a sampling approach such as random undersampling, random oversampling, or Synthetic Minority Oversampling Technique (SMOTE) algorithms. This paper compared the classification performance of three popular classifiers (Logistic Regression, Gaussian Naïve Bayes, and Support Vector Machine) in predicting machine failure in the Oil and Gas industry. The original machine failure dataset consists of 20,473 hourly data and is imbalanced with 19945 (97%) ‘non-failure’ and 528 (3%) ‘failure data’. The three independent variables to predict machine failure were pressure indicator, flow indicator, and level indicator. The accuracy of the classifiers is very high and close to 100%, but the sensitivity of all classifiers using the original dataset was close to zero. The performance of the three classifiers was then evaluated for data with different imbalance rates (10% to 50%) generated from the original data using SMOTE, SMOTE-Support Vector Machine (SMOTE-SVM) and SMOTE-Edited Nearest Neighbour (SMOTE-ENN). The classifiers were evaluated based on improvement in sensitivity and F-measure. Results showed that the sensitivity of all classifiers increases as the imbalance rate increases. SVM with radial basis function (RBF) kernel has the highest sensitivity when data is balanced (50:50) using SMOTE (Sensitivitytest = 0.5686, Ftest = 0.6927) compared to Naïve Bayes (Sensitivitytest = 0.4033, Ftest = 0.6218) and Logistic Regression (Sensitivitytest = 0.4194, Ftest = 0.621). Overall, the Gaussian Naïve Bayes model consistently improves sensitivity and F-measure as the imbalance ratio increases, but the sensitivity is below 50%. The classifiers performed better when data was balanced using SMOTE-SVM compared to SMOTE and SMOTE-ENN.


A Review of Random Walk-Based Method for the Identification of Disease Genes and Disease Modules

January 2023

·

68 Reads

·

1 Citation

IEEE Access

Traditional techniques for identifying disease genes and disease modules involve high-cost clinical experiments and unpredictable time consumption for analysis. Network-based computational approaches usually focus on the systematic study of molecular networks to predict the associations between diseases and genes. The random walk-based method is a network-based approach that utilises biological networks for analysis. As the random walk models efficiently capture the complex interplay among molecules in diseases, it is extensively applied in biological problem-solving based on networks. Despite their comprehensive employment, the fundamentals of random walk and overall background may not be fully understood, leading to misinterpretation of results. This review aims to cover the fundamental knowledge of random walk models for biological network analysis. This study reviewed diffusion-based random walk methods for disease gene prediction and disease module identification. The random walk-based disease gene prediction methods are categorised into node classification and link prediction tasks. This study details the advantages and limitations of each method. Finally, the potential challenges and research directions for future studies on random walk models are highlighted.


Citations (11)


... Incorporating additional security measures like intrusion detection systems and firewalls can further enhance network security. Continued research and development in ML algorithms will improve anomaly detection capabilities, reducing limitations and enhancing network security without heavy reliance on external research [42] [43]. ...

Reference:

Deep Learning for Anomaly Detection in Time-Series Data: An Analysis of Techniques, Review of Applications, and Guidelines for Future Research
A Deep Learning Algorithm to Monitor Social Distancing in Real-Time Videos: A Covid-19 Solution
  • Citing Chapter
  • February 2012

... After preprocessing, data balancing has been performed to addresses any imbalances in the dataset, such as an unequal distribution of classes in a classification problem [28]. In this work Adaptive Synthetic Sampling (ADASYN) [29] has been applied that is an effective technique designed to address class imbalances by generating synthetic samples for the minority class in a data-driven manner. This approach is particularly useful for our crop yield prediction model, where the minority class (e.g., years or regions with significantly lower yields) is underrepresented. ...

Machine Learning and Synthetic Minority Oversampling Techniques for Imbalanced Data: Improving Machine Failure Prediction

... In [17], Usmani et al. explored the potential of blockchain technology in healthcare, exploring its applications in mobile health, medical record management, and data exchange. They discussed privacy strategies in public blockchains like Bitcoin and Ethereum, as well as privacy-preserving solutions in both public and private blockchains. ...

A Systematic Review of Privacy-Preserving Blockchain in e-Medicine
  • Citing Chapter
  • November 2022

Studies in Computational Intelligence

... The development and deployment of advanced AI tools that are designed to manage disparate data sources are imperative for a comprehensive understanding and utilization of the assimilated data. Employing contemporary data connectors, i.e., sophisticated software components designed for the seamless integration of diverse data, is advocated to centralize diverse data sources and to facilitate the effective allocation of pristine data [91]. ...

Machine Learning in Healthcare: Current Trends and the Future
  • Citing Chapter
  • November 2022

Lecture Notes in Electrical Engineering

... To further address the task at hand, it is necessary to determine the selected optimization methods. NSGA-2 is used for multi-objective optimization problems, aiming to find a set of optimal solutions known as the Pareto set [119,120]. NSGA-2 is designed for problems with multiple optimization criteria, ensuring diversity in the population to prevent premature convergence and achieve uniform coverage of the Pareto set. ...

Different Approaches of Evolutionary Algorithms to Multiple Objective RCPSP
  • Citing Conference Paper
  • September 2022

... where the The mathematical formulation can be seen in Equation (15)- (20) when applied to the portfolio optimization model. Subject to : ...

Metaheuristic Algorithms Based on Compromise Programming for the Multi-Objective Urban Shipment Problem

... Weak or default passwords, lack of secure firmware updates, and insecure communication protocols are common weaknesses that can be exploited by attackers. [41][42] Additionally, many IoT devices lack proper security controls and may have inherent design flaws, making them prime targets for compromise. ...

A reinforcedactivelearningalgorithm forsemanticsegmentationincomplex imaging

IEEE Access

... This can benefit researchers and engineers to develop a better optimizer for variants of VRP. This research also contributes to the developed methodology for multi-objective scheduling and planning problems [38]. The remainder of this paper is organized as follows. ...

Introduction to A Compromise Programming Based Method for Complex Scheduling and Planning Problems
  • Citing Conference Paper
  • August 2021

... Although some of these values are predictable [43], most other cases require the problem to be solved as a single objective function multiple times, which may be costly. Other studies [44,46] show that the referential point may be selected from business estimations, which can provide better performance for the agents in the searching process. However, in this study, the normalization method using both of z * and z worst resulted in a solution having better quality. ...

The Effectiveness of Reference Point Selection Methods for Compromise Programming in Multi-Criteria Learning Path Search Algorithm
  • Citing Conference Paper
  • August 2021