31 research outputs found

    Pixel Value Graphical Password Scheme: Analysis on Time Complexity performance of Clustering Algorithm for Passpix Segmentation

    Get PDF
    Passpix is a key element in pixel value access control, containing a pixel value extracted from a digital image that users input to authenticate their username. However, it is unclear whether cloud storage settings apply compression to prevent deficiencies that would alter the file's 8-bit attribution and pixel value, causing user authentication failure. This study aims to determine the fastest clustering algorithm for faulty Passpix similarity classification, using a dataset of 1,000 objects. The source code for the K-Means, ISODATA, and K-Harmonic Mean scripts was loaded into a clustering experiment prototype compiled as Clustering.exe. The results demonstrate that the number of clusters affects the time taken to complete the clustering process, with the 20-cluster setting taking longer than the 10-cluster setting. The K-Harmonic Mean algorithm was the fastest, while K-Means performed moderately and ISODATA was the slowest of the three clustering algorithms. The results also indicate that the number of iterations did not affect the time taken to complete the clustering process. These findings provide a basis for future studies to increase the number of clusters for better accuracy

    SIEM Network Behaviour Monitoring Framework using Deep Learning Approach for Campus Network Infrastructure

    Get PDF
    One major problem faced by network users is an attack on the security of the network especially if the network is vulnerable due to poor security policies. Network security is largely an exercise to protect not only the network itself but most importantly, the data. This exercise involves hardware and software technology. Secure and effective access management falls under the purview of network security. It focuses on threats both internally and externally, intending to protect and stop the threats from entering or spreading into the network. A specialized collection of physical devices, such as routers, firewalls, and anti-malware tools, is required to address and ensure a secure network. Almost all agencies and businesses employ highly qualified information security analysts to execute security policies and validate the policies’ effectiveness on regular basis. This research paper presents a significant and flexible way of providing centralized log analysis between network devices. Moreover, this paper proposes a novel method for compiling and displaying all potential threats and alert information in a single dashboard using a deep learning approach for campus network infrastructure

    A watermarking technique to improve the security level in face recognition systems: An experiment with Principal Component Analysis (PCA) for face recognition and Discrete Cosine Transform (DCT) for watermarking

    Get PDF
    This paper presents a proposal for a suitable and viable combination of a face recognition system and a watermarking system, with a watermarking technique that will ensure the authenticity of the data being transmitted in the face recognition system, which will then enhance its level of security. The proposed combination is a PCA-DCT system. © 2016 IEEE

    Effects of moisture level on nitrogen availability in tropical peat soil cultivated with oil palm (Elaeis guineensis Jacq.)

    Get PDF
    Nitrogen release from soil is controlled by the soil moisture. Soil incubation was conducted to evaluate the effect of different moisture condition (75%, 100% and 150%) on water holding capacity and fluctuating conditions between (150% and 100% water holding capacity) after application of urea and without urea addition. Ammonium and nitrate released were measured periodically over 70 days of incubation. Net mineralization and nitrification were measured at the end of the incubation period. Potential nitrification rate (PNR) was measured at the start and the end of incubation period. The results showed that the dynamics of NO3- did not show significant change with increased soil moisture without addition of urea. This results indicated nitrification in peat soil needed reactive N supply (urea) regardless of soil moisture conditions. Addition of urea increased the PNR ranging from 27.91 to 55.10% compared to without urea. Fluctuating moisture condition with urea addition increased PNR by 21.82% compared with a waterlogged condition. However, increasing soil moisture condition resulted in lower nitrate and PNR which reflect that soil moisture controlled the magnitude of PNR when urea was added

    The effect of assembly design parameters on assembly time

    Get PDF
    Reducing cycle time has an impact in many aspects such as productivity and capacity of industry. This study investigates the effect of assembly design parameters such as workstation design, working posture: standing and sitting and jig design on plug assembly time. The parameters or factors involved were three jig designs; number of holders, working postures: standing and sitting to assembly time and gender. An experiment with a full factorial design with four factors of 2 and 3 levels was applied. Ten participants consisting of five males and fives females were asked to assemble the plugs. The study concluded that all main factors, and some interaction factors significantly contributed to assembly time. The lowest assembly time per plug for assembly setting was sitting posture by male operators , using rectangular jig with 3 holders per jig. Meanwhile the highest assembly time per plug was performed by the female operator using horizontal jig with 5 plugs holder per jig. The study also generates the regression model that describes the relationship of all factors involved. Validation of the model also was performed by taking some runs of experiments. The average deviation of actual data and predicted is less than five per cent

    Pixel Value Graphical Password Scheme: K-Means as Graphical Password Fault Tolerance

    Get PDF
    Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users to load their image as their password. PVAC extracts the image to obtain a three-octet 8-bits Red-Green-Blue (RGB) value as its password to authenticate a user. The pixel value must be matched with the record stored in the database or otherwise, the user is failed to authenticate. However, users which prefer to store images on cloud storage would unintentionally alter and as well as the pixel value due to media compression and caused faulty pixels. Thus, the K-Means clustering algorithm is adapted to fix the issue where the faulty pixel value would be recognized as having the same pixel value cluster as the original. However, most of K-Means algorithm works were mainly developed for content-based image retrieval (CBIR) which having opposite characteristics from PVAC. Thus, this study was aimed to investigate the crucial criteria of PVAC and its compatibility with the K-Means algorithm for the problem. The theoretical analysis is used for this study where the suitable characteristics of K-Means are analyze based on PVAC requirements. The compliance analysis might become a referencing work for digital image clustering techniques adaptation on security system such as image filtering, image recognition, and object detection since most of image clustering works was focused on less sensitive image retrieval

    Nutritional Burden in Tuberculosis and Inter-sectoral Nutritional Management for Tuberculosis Patients in Malaysia

    Get PDF
    Undernutrition and tuberculosis (TB) are a vital issue in most developing countries of the world. Both of these medical problems tend to have interacted with each other and bidirectional. The undernutrition creates a more significant problem in patients with active TB rather than among healthy individuals. Despite that, there is no protocol available on nutritional support in Malaysia to tackle on this issue. The objective of this review is to explore the nutrition burden of TB disease and the management available in Malaysia. The treatment for TB lasts for six months and above. Hence, it causes a financial burden not only for the healthcare provider but for the patient and the family members. If treatment is not successful and extends to a few months, it will increase the cost of the treatment. Malnutrition in TB patients will cause a problem in the outcome of TB treatment. It includes worsening of the disease, delayed sputum conversion, and increased risk of mortality. Other problems include malabsorption of Rifampicin, drug-induced hepatotoxicity, increased rate of relapse, and persistent of positive cultures in MDR-TB. Benefits of nutritional support for tuberculosis patients include improved body weight, increase in adherence/compliance to the tuberculosis treatment and increase in the success of the treatment. Implementation of nutritional support protocol by the government and Non-profit organization (NGO) will be beneficial and improve the quality of life of tuberculosis patients

    Self-switching diodes as RF rectifiers: evaluation methods and current progress

    Get PDF
    In the advancement of the Internet of Things (IoT) applications, widespread uses and applications of devices require higher frequency connectivity to be explored and exploited. Furthermore, the size, weight, power and cost demands for the IoT ecosystems also creates a new paradigm for the hardware where improved power efficiency and efficient wireless transmission needed to be investigated and made feasible. As such, functional microwave detectors to detect and rectify the signals transmitted in higher frequency regions are crucial. This paper reviewed the practicability of self switching diodes as Radio Frequency (RF) rectifiers. The existing methods used in the evaluation of the rectification performance and cut-off frequency are reviewed, and current achievements are then concluded. The works reviewed in this paper highlights the functionality of SSD as a RF rectifier with design simplicity, which may offer cheaper alternatives in current high frequency rectifying devices for application in low-power devices
    corecore