Displaying all 6 publications

Abstract:
Sort:
  1. Hameed SS, Hassan R, Muhammad FF
    PLoS One, 2017;12(11):e0187371.
    PMID: 29095904 DOI: 10.1371/journal.pone.0187371
    In this work, gene expression in autism spectrum disorder (ASD) is analyzed with the goal of selecting the most attributed genes and performing classification. The objective was achieved by utilizing a combination of various statistical filters and a wrapper-based geometric binary particle swarm optimization-support vector machine (GBPSO-SVM) algorithm. The utilization of different filters was accentuated by incorporating a mean and median ratio criterion to remove very similar genes. The results showed that the most discriminative genes that were identified in the first and last selection steps included the presence of a repetitive gene (CAPS2), which was assigned as the gene most highly related to ASD risk. The merged gene subset that was selected by the GBPSO-SVM algorithm was able to enhance the classification accuracy.
  2. Hameed SS, Hassan WH, Abdul Latiff L, Ghabban F
    PeerJ Comput Sci, 2021;7:e414.
    PMID: 33834100 DOI: 10.7717/peerj-cs.414
    Background: The Internet of Medical Things (IoMTs) is gradually replacing the traditional healthcare system. However, little attention has been paid to their security requirements in the development of the IoMT devices and systems. One of the main reasons can be the difficulty of tuning conventional security solutions to the IoMT system. Machine Learning (ML) has been successfully employed in the attack detection and mitigation process. Advanced ML technique can also be a promising approach to address the existing and anticipated IoMT security and privacy issues. However, because of the existing challenges of IoMT system, it is imperative to know how these techniques can be effectively utilized to meet the security and privacy requirements without affecting the IoMT systems quality, services, and device's lifespan.

    Methodology: This article is devoted to perform a Systematic Literature Review (SLR) on the security and privacy issues of IoMT and their solutions by ML techniques. The recent research papers disseminated between 2010 and 2020 are selected from multiple databases and a standardized SLR method is conducted. A total of 153 papers were reviewed and a critical analysis was conducted on the selected papers. Furthermore, this review study attempts to highlight the limitation of the current methods and aims to find possible solutions to them. Thus, a detailed analysis was carried out on the selected papers through focusing on their methods, advantages, limitations, the utilized tools, and data.

    Results: It was observed that ML techniques have been significantly deployed for device and network layer security. Most of the current studies improved traditional metrics while ignored performance complexity metrics in their evaluations. Their studies environments and utilized data barely represent IoMT system. Therefore, conventional ML techniques may fail if metrics such as resource complexity and power usage are not considered.

  3. Muhammad FF, Yahya MY, Hameed SS, Aziz F, Sulaiman K, Rasheed MA, et al.
    PLoS One, 2017;12(8):e0182925.
    PMID: 28793325 DOI: 10.1371/journal.pone.0182925
    In this research work, numerical simulations are performed to correlate the photovoltaic parameters with various internal and external factors influencing the performance of solar cells. Single-diode modeling approach is utilized for this purpose and theoretical investigations are compared with the reported experimental evidences for organic and inorganic solar cells at various electrical and thermal conditions. Electrical parameters include parasitic resistances (Rs and Rp) and ideality factor (n), while thermal parameters can be defined by the cells temperature (T). A comprehensive analysis concerning broad spectral variations in the short circuit current (Isc), open circuit voltage (Voc), fill factor (FF) and efficiency (η) is presented and discussed. It was generally concluded that there exists a good agreement between the simulated results and experimental findings. Nevertheless, the controversial consequence of temperature impact on the performance of organic solar cells necessitates the development of a complementary model which is capable of well simulating the temperature impact on these devices performance.
  4. Muhammad FF, Karim Sangawi AW, Hashim S, Ghoshal SK, Abdullah IK, Hameed SS
    PLoS One, 2019;14(5):e0216201.
    PMID: 31048867 DOI: 10.1371/journal.pone.0216201
    The behavior of solar cells and modules under various operational conditions can be determined effectively when their intrinsic parameters are accurately estimated and used to simulate the current-voltage (I-V) characteristics. This work proposed a new computational approach based on approximation and correction technique (ACT) for simple and efficient extraction of solar cells and modules parameters from the single-diode model. In this technique, an approximated value of series resistance (Rs) was first derived and used to determine the initial value of parallel resistance (Rp). Later, the final corrected values of Rs and Rp were obtained by resubstituting their approximated values in a five-loop iteration using the manipulated equations. For rapid evaluation and validation of the proposed technique, a software application was also created using MATLAB program. The correctness and robustness of the proposed technique was validated on five types of solar cells and modules operated at varied temperatures and irradiances. The lowest RMSE value was achieved for RTC France (7.78937E-4) and PVM 752 GaAs (2.10497E-4) solar cell. The legitimacy of ACT extracted parameters was established using a simple yet competitive implementation approach wherein the performance of the developed technique was compared with several state-of-the-art methods recently reported in the literature.
  5. Hameed SS, Hassan R, Hassan WH, Muhammadsharif FF, Latiff LA
    PLoS One, 2021;16(1):e0246039.
    PMID: 33507983 DOI: 10.1371/journal.pone.0246039
    The selection and classification of genes is essential for the identification of related genes to a specific disease. Developing a user-friendly application with combined statistical rigor and machine learning functionality to help the biomedical researchers and end users is of great importance. In this work, a novel stand-alone application, which is based on graphical user interface (GUI), is developed to perform the full functionality of gene selection and classification in high dimensional datasets. The so-called HDG-select application is validated on eleven high dimensional datasets of the format CSV and GEO soft. The proposed tool uses the efficient algorithm of combined filter-GBPSO-SVM and it was made freely available to users. It was found that the proposed HDG-select outperformed other tools reported in literature and presented a competitive performance, accessibility, and functionality.
  6. Hameed SS, Selamat A, Abdul Latiff L, Razak SA, Krejcar O, Fujita H, et al.
    Sensors (Basel), 2021 Dec 11;21(24).
    PMID: 34960384 DOI: 10.3390/s21248289
    Cyber-attack detection via on-gadget embedded models and cloud systems are widely used for the Internet of Medical Things (IoMT). The former has a limited computation ability, whereas the latter has a long detection time. Fog-based attack detection is alternatively used to overcome these problems. However, the current fog-based systems cannot handle the ever-increasing IoMT's big data. Moreover, they are not lightweight and are designed for network attack detection only. In this work, a hybrid (for host and network) lightweight system is proposed for early attack detection in the IoMT fog. In an adaptive online setting, six different incremental classifiers were implemented, namely a novel Weighted Hoeffding Tree Ensemble (WHTE), Incremental K-Nearest Neighbors (IKNN), Incremental Naïve Bayes (INB), Hoeffding Tree Majority Class (HTMC), Hoeffding Tree Naïve Bayes (HTNB), and Hoeffding Tree Naïve Bayes Adaptive (HTNBA). The system was benchmarked with seven heterogeneous sensors and a NetFlow data infected with nine types of recent attack. The results showed that the proposed system worked well on the lightweight fog devices with ~100% accuracy, a low detection time, and a low memory usage of less than 6 MiB. The single-criteria comparative analysis showed that the WHTE ensemble was more accurate and was less sensitive to the concept drift.
Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links