35 research outputs found

    Professional Talk Series Webinar UMP

    Get PDF
    PEKAN, 19 August 2021 - A Professional Talk on Navigating Academia towards IP Commercialization and Research Grants availability in Malaysia was conducted on 19 August 2021, as an implementation towards FK’s External research grant strategic plan

    A new parking guidance system for outdoor environment

    Get PDF
    At the off hazard which you are any other motive force then it's miles highly difficult to choose the separation even as stopping the automobile. Reverse indicating that allows you to forestall sensor circuit tackles this problem the separation with the help of 3 LED's. we can without a great deal of a stretch mastermind this framework at the posterior of the car. This framework works with 12V rechargeable battery. this newsletter discloses you how to define opposite preventing sensor. we can likewise utilize the identical concept in IR Water level Detector Circuit too. The separation in the center of vehicle and snag is comprehended through the gathering of LED's (D5 to D7)

    A Better Engineering Design: Low Cost Assistance Kit for Manual Wheelchair Users with Enhanced Obstacle Detection

    Get PDF
    This paper proposes a better engineering design of an assistance kit for manual wheelchair users. The design is aimed  to enhance the detection of obstacles in the travelling path of the wheelchair  user at low cost. This is facilitated by microcontroller and sensor technologies. The proposed design provides the intended user with obstacle detection, light detection, a light emitting diode (LED) emergency light system, and an emergency alarm system. The microcontroller is the main controller that receives input from the sensors and produces output to the light crystal display (LCD) screen, the LED emergency light system, and the emergency alarm system. An ultrasonic sensor is used to detect the presence of obstacles directly behind the wheelchair. If any obstacle exists behind the wheelchair within a set range, the system will alert the wheelchair user through different alarm sounds. In the case of absence of light, the LED emergency light system is activated and turns on a light source, which is attached to the wheelchair to provide a bright and clear path for the user. The distance between the obstacle and the wheelchair, and the status of the LED emergency light system are displayed on the LCD screen

    Li-ION battery from industrial waste water

    Get PDF
    The proposed system is an IoT based bus seat occupancy detection system consists of force sensitive sensor. The system able to detect pressure applied on the seat. The needs of manually count number of passengers is eliminated as bus driver able to monitor bus seat occupancy status remotely in visual form

    A secured data hiding using affine transformation in video steganography

    Get PDF
    Network security is the most essential aspect of information technology among today’s emerging digital technologies which demands secured communication of information. In this digital network, it is essential to secure the data from intruders and unauthorized receivers. Steganography plays a vital role in secure transmission of data. This paper proposes a steganography method to hide data using affine transformation technique. The secret data are embedded in the coefficients of integer wavelet transform of the video frames. While embedding, the pixel values are distributed using affine transformation. The proposed method has been tested on many input data and the performance is evaluated both quantitatively and qualitatively. The results indicate the enhanced capability of the proposed method that can ensure imperceptible distortions with minimum computational cost in terms of PSNR factor over the existing methods

    An Improved Imperceptibility and Robustness of 4x4 DCT-SVD Image Watermarking with a Modified Entropy

    Get PDF
    A digital protection against unauthorized distribution of digital multimedia is highly on demand. Digital watermarking is a defence in multimedia protection for authorized ownership. This paper proposes an improved watermarking based on 4Ă—4 DCT-SVD blocks using modified entropy in image watermarking. A modified entropy is used to select unnoticeable blocks. The proposed watermarking scheme utilizes the lowest entropy values to determine unnoticeable regions of the watermarked image. This paper investigates the relationship between U(2,1) and U(3,1) coefficients of the U matrix 4Ă—4 DCT-SVD in image watermarking. The proposed watermarking scheme produces a great level of robustness and imperceptibility of the watermarked image against different attacks. The proposed scheme shows the improvement in terms of structural similarity index and normalized correlation of the watermarked image

    Analysis of energy consumption in a wireless sensor network using fuzzy memberships function

    Get PDF
    The use of sensors in every application as well as in today's life has become a huge demand. Since that, the public sphere is starting to move to mobile applications that are easy to access. For example, child monitoring at school, health monitoring, tracking system, fire detection and so on. Thus, the Wireless Sensor Network (WSN) is the preferred choice to meet these needs. However, despite the enthusiasm of building various applications using sensors, the WSN itself is still hampered by limited battery usage. Due to some applications that require long battery life, various types of research have been conducted to address this problem. One of these is the involvement of artificial intelligent (AI) in extending the life of a battery on a sensor. Fuzzy Logic (FL) is one of the preferred AI that have been chosen by researchers to be implemented with WSN especially to protract the lifetime of WSN. In Fuzzy Logic, there are three membership functions that need to investigate the capability of it towards the WSN applications. The proposed approach is by combining different types of Fuzzy Logic membership functions which are Triangular with Gaussian, Gaussian with Trapezoidal and Trapezoidal with Triangular to get the best results for analysing the use of sensor batteries. The parameters involved for the cluster head selection are communication cost, centrality and residual energy as Fuzzy inputs. This approach will use an existing algorithm which is Multi- Tier Algorithm (MAP) and this is a part of the MAP enhancement towards the WSN lifetime. The results will compare, discuss and analyst the number of dead nodes and energy usage of the sensor node during data transmission. In conclusion, through this approach, it able to prolong the lifetime for the sensor network since the proposed technique can reduce the energy usage of the sensor nodes

    An experimental research on GPS based boundary intruding boat monitoring system

    Get PDF
    Boundary detection and alert system is a straightforward and effective idea, which utilizes Internet of Things technology. By utilizing this framework border monitoring is 100% protected and secure. It naturally alarms the intruder when the vehicle goes over the specific range in borders. This is finished by a sensor called Global positioning system (GPS). It detects the current position of the vehicle and switch on the caution framework naturally. In this anticipate, no need of manual operations like on time and off time setting. GPS and IoT are the fundamental segments of the task. The resistances of the alert system changes as per the distance between the current position of the vehicle and the border get decreased or increased

    An improved image compression technique using large adaptive DCT psychovisual thresholds

    Get PDF
    High quality multimedia requires high bandwidth and data transfer rate to transmit multimedia data in communication networks. Image compression is one of solutions to reduce the storage of multimedia data which in turn allows an efficient transmission through networks. An adaptive image compression technique through customized quantization tables based on user preference has been widely used in many applications. Scaling quantization table can significantly influence the reconstruction error and compression rate. This paper proposes an adaptive psychovisual threshold for customizing large quantization tables to improve image compression. An adaptive psychovisual threshold is computed based on a smooth curve of the absolute reconstruction error by incrementing the DCT frequency order. Experimental results show that the performance of adaptive large DCT psychovisual threshold achieves high image quality and minimum average bit length of Huffman code. The proposed method also demonstrates that boundary effects do not appear when the compressed image is zoomed in to 400

    Performance Comparison Between AODV and DSR In Mobile Ad-Hoc Network (MANET)

    Get PDF
    Wireless communication technology has advanced rapidly, thanks to the proliferation of wireless devices and services. The spectrum depletion issue was discovered due to the growing number of users and to the fixed spectrum assignment strategies. A mobile ad hoc network (MANET) is a network that doesn’t require a central server, specialized gear, or fixed routers to function. As it operates in a distributed peer- to-peer style, each system acts as an individual router and produces individual data where MANET may be used as a stand-alone network or as part of a cellular network that connects to the internet. There are different types of a routing protocol can be applied in MANET, each with its capabilities, advantages, and disadvantage. There is a need to investigate the performance of routing protocol for better network planning. The Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) are two MANET routing protocols investigated in this paper. Four different performance metrics are used to measure these protocols: throughput, path discovery time, traffic received and sent delay, and media access delay. To investigate the behavior of these protocols in the Manet context, a Manet simulation is run using OPNET Modeler Student Edition. According to the data, AODV outperforms other protocols in terms of throughput, amount of traffic received, and transmit performance, whereas DSR has the longest delay. Even when run in the same environment with the same number of nodes, different protocols produce different readings and behaviors. This proves the theory that AODV performs better in terms of performance, delay, and packet transfer ratio
    corecore