Shamsul Jamel Elias
Universiti Teknologi MARA (UiTM) Kedah

Published : 7 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 7 Documents
Search

The evaluation performance of letter-based technique on text steganography system Roshidi Din; Rosmadi Bakar; Sunariya Utama; Jamaluddin Jasmis; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (386.851 KB) | DOI: 10.11591/eei.v8i1.1440

Abstract

Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the implementation of steganography in text domain called text steganography. It intends to concentrate on letter-based technique as one of the representative techniques in text steganography. This paper displays some techniques of letter-based that is integrated in one system technique displayeed in a logical and physical design. The integrated system is evaluated using some parameter that is used in order to discover the performance in term of capacity after embedding process and the time consuming in the development process. This paper is anticipated to contribute in describing the implementation of the techniques in one system and to display the performance some parameter evaluation.
Routing performance of structured overlay in Distributed Hash Tables (DHT) for P2P Rafiza Ruslan; Ayu Shaqirra Mohd Zailani; Nurul Hidayah Mohd Zukri; Nur Khairani Kamarudin; Shamsul Jamel Elias; R. Badlishah Ahmad
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (449.88 KB) | DOI: 10.11591/eei.v8i2.1449

Abstract

This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network.
The evaluation performance of letter-based technique on text steganography system Roshidi Din; Rosmadi Bakar; Sunariya Utama; Jamaluddin Jasmis; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (522.055 KB) | DOI: 10.11591/eei.v8i1.1440

Abstract

Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the implementation of steganography in text domain called text steganography. It intends to concentrate on letter-based technique as one of the representative techniques in text steganography. This paper displays some techniques of letter-based that is integrated in one system technique displayeed in a logical and physical design. The integrated system is evaluated using some parameter that is used in order to discover the performance in term of capacity after embedding process and the time consuming in the development process. This paper is anticipated to contribute in describing the implementation of the techniques in one system and to display the performance some parameter evaluation.
Routing performance of structured overlay in Distributed Hash Tables (DHT) for P2P Rafiza Ruslan; Ayu Shaqirra Mohd Zailani; Nurul Hidayah Mohd Zukri; Nur Khairani Kamarudin; Shamsul Jamel Elias; R. Badlishah Ahmad
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (449.88 KB) | DOI: 10.11591/eei.v8i2.1449

Abstract

This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network.
The evaluation performance of letter-based technique on text steganography system Roshidi Din; Rosmadi Bakar; Sunariya Utama; Jamaluddin Jasmis; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (522.055 KB) | DOI: 10.11591/eei.v8i1.1440

Abstract

Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the implementation of steganography in text domain called text steganography. It intends to concentrate on letter-based technique as one of the representative techniques in text steganography. This paper displays some techniques of letter-based that is integrated in one system technique displayeed in a logical and physical design. The integrated system is evaluated using some parameter that is used in order to discover the performance in term of capacity after embedding process and the time consuming in the development process. This paper is anticipated to contribute in describing the implementation of the techniques in one system and to display the performance some parameter evaluation.
Routing performance of structured overlay in Distributed Hash Tables (DHT) for P2P Rafiza Ruslan; Ayu Shaqirra Mohd Zailani; Nurul Hidayah Mohd Zukri; Nur Khairani Kamarudin; Shamsul Jamel Elias; R. Badlishah Ahmad
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (449.88 KB) | DOI: 10.11591/eei.v8i2.1449

Abstract

This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network.
Verification and validation of IM-DeCRuD approach using DESMET for its applicability Jamaluddin Jasmis; Shamsul Jamel Elias; Azlan abdul Aziz; Mohd Zaki Zakaria; R Badlishah Ahmad; Roshidi Din; Rosmadi Bakar
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 3: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i3.pp1311-1317

Abstract

Requirements crosscutting in software development and maintenance have gradually become an important issue in software engineering with a growing need of traceability support to better understand the requirements crosscutting processes to comply with industrial standards. However, many recent works focusing on identification, modularization, composition and conflict dissolution of requirements crosscutting are mostly saturated at requirements level. Hence, these works fail to specify crosscutting properties for functional and non-functional requirements at other phases leading to insufficient support for software engineers. Recently, a new approach called the Identification, Modularization, Design Composition Rules and Conflict Dissolutions (IM-DeCRuD) was proposed to provide a special traceability to facilitate better understanding and reasoning towards requirements crosscutting implementation, along with a tool as a proof-of-concept. In this paper, the tool was evaluated and the results were verified by some experts in the industries. The feedbacks on applicability aspect were then gathered and analyzed using DESMET qualitative method. The outcome showed that the IM-DeCRuD was applicable to cope with the tedious engineering processes in handling crosscutting properties at requirements, analysis and design phases for system development and evolution.