Mohd Sanusi Azmi
Universiti Teknikal Malaysia Melaka

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

New instances classification framework on Quran ontology applied to question answering system Fandy Setyo Utomo; Nanna Suryana; Mohd Sanusi Azmi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 1: February 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i1.9794

Abstract

Instances classification with the small dataset for Quran ontology is the current research problem which appears in Quran ontology development. The existing classification approach used machine learning: Backpropagation Neural Network. However, this method has a drawback; if the training set amount is small, then the classifier accuracy could decline. Unfortunately, Holy Quran has a small corpus. Based on this problem, our study aims to formulate new instances classification framework for small training corpus applied to semantic question answering system. As a result, the instances classification framework consists of several essential components: pre-processing, morphology analysis, semantic analysis, feature extraction, instances classification with Radial Basis Function Networks algorithm, and the transformation module. This algorithm is chosen since it robustness to noisy data and has an excellent achievement to handle small dataset. Furthermore, document processing module on question answering system is used to access instances classification result in Quran ontology.
Framework of diacritic segmentation for Arabic handwritten document Ahmed Abdalla Shiekh; Mohd Sanusi Azmi; Maslita Abd Aziz; Mohammed Nasser Al-Mhiqani; Salem Saleh Bafjaish
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i2.pp1001-1008

Abstract

In recent Arabic standard language and Arabic dialectal texts, diacritics and short vowels are absent. There are some exceptions have been made for the Arabic beginner learner scripts, religious texts and as well as a significant political text. In addition, the text without diacritics is considered ambiguous due to numerous words with different diacritic marks seem identical. However, this paper we present a framework for segmenting diacritics from Arabic handwritten document by using region-based segmentation technique. Since Arabic handwritten and Mushaf Al-Quran contain many diacritical marks. Hence, the diacritics must be properly extracted from Arabic handwritten document to avoid losing some good features. Furthermore, the proposed framework is devised specifically to segment diacritics from Arabic handwritten image, thus there will be no feature extraction, feature selection, and classification processes included. Besides, we will present the methodology that is used to fulfil the objectives of this paper. The pre-processing phases will be explained and more specifically segmentation phase for segmenting diacritics which is the phase we concentrate more in this article. Lastly, we will identify the proposed technique region-based segmentation to facilitate our development throughout the experimental process.
Skew correction for mushaf Al-Quran: a review Salem Saleh Bafjaish; Mohd Sanusi Azmi; Mohammed Nasser Al-Mhiqani; Ahmed Abdalla Sheikh
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 1: January 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i1.pp516-523

Abstract

Skew correction have been studied a lot recently. However, the content of skew correction in these studies is considered less for Arabic scripts compared to other languages. Different scripts of Arabic language are used by people. Mushaf A-Quran is the book of Allah swt and used by many people around the world. Therefore, skew correction of the pages in Mushaf Al-Quran need to be studied carefully. However, during the process of scanning the pages of Mushaf Al-Quran and due to some other factors, skewed images are produced which will affect the holiness of the Mushaf Al-Quran. However, a major difficulty is the process of detecting the skew and correcting it within the page. Therefore, this paper aims to view the most used skew correction techniques for different scripts as cited in the literature. The findings can be used as a basis for researchers who are interested in image processing, image analysis, and computer vision.
Internet of things: security requirements, attacks and counter measures Maria Imdad; Deden Witarsyah Jacob; Hairulnizam Mahdin; Zirawani Baharum; Shazlyn Milleana Shaharudin; Mohd Sanusi Azmi
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v18.i3.pp1520-1530

Abstract

Internet of Things (IoT) is a network of connected and communicating nodes. Recent developments in IoT have led to advancements like smart home, industrial IoT and smart healthcare etc. This smart life did bring security challenges along with numerous benefits. Monitoring and control in IoT is done using smart phone and web browsers easily.  There are different attacks being launched on IoT layers on daily basis and to ensure system security there are seven basic security requirements which must be met. Here we have used these requirements for classification and subdivided them on the basis of attacks, followed by degree of their severity, affected system components and respective countermeasures. This work will not only give guidelines regarding detection and removal of attacks but will also highlight the impact of these attacks on system, which will be a decision point to safeguard  system from high impact attacks on priority basis.