Results (80)
Search Parameters:
Keyword: CorrelationA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read MoreValidity of Mind Monitoring System as a Mental Health Indicator using Voice
We have been developing a method of evaluating the mental health condition of a person based on the sound of their voice. Currently, we have applied this technology to create a smartphone application that shows the vitality and the mental activity as mental health condition indices. Using voice to measure one’s mental health condition is…
Read MoreMIMO Performance and Decoupling Network: Analysis of Uniform Rectangular array Using Correlated-Based Stochastic Models
We explore the dependency of MIMO performance on azimuthal spread (AS) and elevation spread (ES) using correlated-based stochastic models (CBSMs). We represent the transmitter as uniform rectangular array (URA), and derive an analytical function for spatial correlation, in terms of maximum power when phase gradient of the incident wave follows a Student’s t-distribution. We model…
Read MoreStudents’ Perception of Library Services in Academia: A Case Study of Universiti Teknologi Brunei
This paper is an outcome of a case study conducted at the Universiti Teknologi Brunei in order to measure students’ perceptions of the library services offered in the university library. The main objectives were to identify the purpose of the library visit and to find out the service quality of university library, to determine whether…
Read MoreA Comparative Study For Color Systems Used In The DCT-DWT Watermarking Algorithm
This paper presents a comparative study of using different color systems on watermarking algorithms. This comparison aim is to determining the robustness and the stability of the color systems used in the watermarking scheme. The watermarking algorithm that is used in this paper is a hybrid scheme using the Discrete Wavelet Transform (DWT) in the…
Read More
