@upnm.edu.my
RESEARCH FELLOW/SENIOR LECTURER
UNIVERSITI PERTAHANAN NASIONAL MALAYSIA
nonlinearity, chaos, communication, synchronization, cryptography
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Hayder Natiq, Animesh Roy, Santo Banerjee, A. P. Misra, and N. A. A. Fataf
Springer Science and Business Media LLC
D. Vignesh, Shaobo He, and N. A. A. Fataf
Springer Science and Business Media LLC
A. Agathiyan, A. Gowrisankar, Nur Aisyah Abdul Fataf, and Jinde Cao
Elsevier BV
A. Agathiyan, Nur Aisyah Abdul Fataf, and A. Gowrisankar
Springer Science and Business Media LLC
Dhakshinamoorthy Vignesh, Nur Aisyah Abdul Fataf, and Santo Banerjee
MDPI AG
This article addresses the telecommunications industry’s priority of ensuring information security during the transition to next-generation networks. It proposes an image encryption system that combines watermarking techniques and a discrete fractional sine chaotic map. The authors also incorporate the principles of blockchain to enhance the security of transmitted and received image data. The proposed system utilizes a newly developed sine chaotic map with a fractional difference operator, exhibiting long-term chaotic dynamics. The complexity of this map is demonstrated by comparing it with three other fractional chaotic maps from existing literature, using bifurcation diagrams and the largest Lyapunov exponent. The authors also show the map’s sensitivity to changes in initial conditions through time-series diagrams. To encrypt images, the authors suggest a method involving watermarking of two secret images and encryption based on blockchain technology. The cover image is watermarked with the two hidden images using discrete wavelet transformations. Then, the image pixels undergo diffusion using a chaotic matrix generated from the discrete fractional sine chaotic map. This encryption process aims to protect the image data and make it resistant to unauthorized access. To evaluate the algorithm, the authors perform statistical analysis and critical sensitivity analysis to examine its characteristics. They also analyse different attacks to assess the algorithm’s ability to resist such threats and maintain image quality after decryption. The results demonstrate that the proposed algorithm effectively defends against attacks and ensures image security.
Nursyuhadah Alghazali Binti Muhammad Zahruddin, Nur Diyana Kamarudin, Ruzanna Mat Jusoh, Nur Aisyah Abdul Fataf, and Rahmat Hidayat
Politeknik Negeri Padang
This study predicts student performance at Universiti Pertahanan Nasional Malaysia (UPNM) based on their socio-demographic profile; it also determines how a prediction algorithm can be used to classify the student data for the most significant demographic attributes. The analytical pattern in academic results per batch has been identified using demographic attributes and the student's grades to improve short-term and long-term learning and teaching plans. Understanding the likely outcome of the education process based on predictions can help UPNM lecturers enhance the achievements of the subsequent batch of students by modifying the factors contributing to the prior success. This study identifies and predicts student performance using data mining and classification techniques such as decision trees, neural networks, and k-nearest neighbors. This frequently adopted method comprises data selection and preparation, cleansing, incorporating previous knowledge datasets, and interpreting precise solutions. This study presents the simplified output from each data mining method to facilitate a better understanding of the result and determine the best data mining method. The results show that the critical attributes influencing student performance are gender, age, and student status. The Neural Networks method has the lowest Root of the Mean of the Square of Errors (RMSE) for accuracy measurement. In contrast, the decision tree method has the highest RMSE, which indicates that the decision tree method has a lower performance accuracy. Moreover, the correlation coefficient for the k-nearest neighbor has been recorded as less than one.
A. Agathiyan, A. Gowrisankar, and Nur Aisyah Abdul Fataf
Elsevier BV
Hassan Mohamed, Nur Aisyah Abdul Fataf, and Tengku Mohd Tengku Sembok
Politeknik Negeri Padang
In the era of IR4.0, Natural Language Processing (NLP) is one of the major focuses because text is stored digitally to code the information. Natural language understanding requires a computational grammar for syntax and semantics of the language in question for this information to be manipulated digitally. Many languages around the world have their own computational grammars for processing syntax and semantics. However, when it comes to the Malay language, the researchers have yet to come across a substantial computational grammar that can process Malay syntax and semantics based on a computational theoretical framework that can be applied in systems such as e-commerce. Hence, we intend to propose a formalism framework based on enhanced Pola Grammar with syntactic and semantic features. The objectives of this proposed framework are to create a linguistic computational formalism for the Malay language based on theoretical linguistic; implement templates for Malay words to handle syntax and semantic features in accordance with the enhanced Pola Grammar; and create a Malay Language Parser Algorithm that can be used for digital applications. To accomplish the objectives, the proposed framework will recursively formalise the computational Malay grammar and lexicon using a combination of solid theoretical linguistic foundations such as Dependency Grammar. A Malay parsing algorithm will be developed for the proposed model until the formalised grammar is deemed reliable. The findings of this indigenous Malay parser will help to advance Malay language applications in the digital economy.
Tan Sze Lin, Arniyati Ahmad, and Nur Aisyah Abdul Fataf
AIP Publishing
Punam Kumari Prasad, Jharna Tamang, and Nur Aisyah Binti Abdul Fataf
Springer International Publishing
Sayan Mukherjee, N. A. A. Fataf, M. F. Abdul Rahim, and Hayder Natiq
Springer Science and Business Media LLC
N.A.A. Fataf, M.F. Abdul Rahim, Shaobo He, and Santo Banerjee
Elsevier BV
Muhammad Firdaus Abdul Rahim, Hayder Natiq, and Nur Aisyah Abdul Fataf
Trans Tech Publications, Ltd.
In this paper, a 3D laser plasma interaction system is presented, analysed, and implemented. The system has two unstable equilibria, and two types of coexisting attractors in which the coexistence of two periodic orbits and the coexistence of two chaotic attractors can be clearly observed. The multistability behaviours are determined by the bifurcation diagrams, largest Lyapunov exponents, and phase spaces. Moreover, the complexity performance of the laser plasma interaction system is investigated by the contour plot of the Sample Entropy.
N. A. A. Fataf, N. A. L. Aladdin, and A. S. Normurniyati
Springer Singapore
N A A Fataf, A Gowrisankar, and Santo Banerjee
IOP Publishing
M. F. Abdul Rahim, Hayder Natiq, N. A. A. Fataf, and Santo Banerjee
Springer Science and Business Media LLC
Shaobo He, N.A.A. Fataf, Santo Banerjee, and Kehui Sun
Elsevier BV
N. A. A. Fataf, Sanjay Kumar Palit, Sayan Mukherjee, M. R. M. Said, Doan Hoai Son, and Santo Banerjee
Springer Science and Business Media LLC
Sanjay K. Palit, Nur Aisyah Abdul Fataf, Mohd Rushdan Md Said, Sayan Mukherjee, and Santo Banerjee
Springer Science and Business Media LLC
N. A. A. Fataf, S. Mukherjee, M. R. M. Said, U. F. A. Rauf, A. D. Hina, and S. Banerjee
IEEE
In this article, we have investigated synchronization phenomenon between two discrete chaotic systems. A general scheme for synchronization between two discrete maps with adaptive coupling has been studied analytically. The scheme can be successfully implemented for generalized synchronization between two chaotic maps. Conditional Lyapunov exponents (CLE) and Transverse Lyapunov exponents (TLE) can quantifies the robustness of synchronization. A secure communication scheme based on synchronization between two Logistic maps is also demonstrated. Numerical results show the effectiveness of our proposed scheme.