Options
Rizalafande Che Ismail
Preferred name
Rizalafande Che Ismail
Official Name
Rizalafande, Che Ismail
Alternative Name
Ismail, Rizalafande C.
Rizalafande, Che Ismail
Chesmail, R.
Ismail, R. C.
Che Ismail, Rizalafande
Ismail, Rizalafande Che
Ismail, R. Che
Main Affiliation
Scopus Author ID
22634128600
Now showing
1 - 10 of 32
-
PublicationMachine vision for laser defect in PV solar modules( 2016)
;R. Shuaimi ; ;This paper presents a new methodology in inspection on laser scribe defect of PV thin film solar modules. The work focuses on the application of machine vision as an inspection tools which has successfully integrated in other manufacturing environment as pattern recognition utility. Compared to manual inspection by human, machine vision system could offer better measurement accuracy as scribe defects are extremely hard to detect due to their small sizes and complexity of the detection process. Studies were made to identify machine vision system screening capabilities to define different scribe defect by their inspection criteria. Current result with paper and broad samples indicates that the propose system can be used effectively to replace human evaluators that currently employs in manufacturing quality control. © 2016 IEEE. -
PublicationEnhancing fractal image compression speed using peer adjacent mapping with sum of absolute difference for computed radiography images( 2020)
;N. A. Z. Rahman ; ;The encoding phase in full-search fractal image compression (FIC) is time-intensive as a sequential search must be performed through a massive domain pool to find the best-matched domain for each block of ranges. In this paper, a peer adjacent with the sum of absolute difference (SAD) mapping has been suggested to enhance the FIC speed while retaining the reconstructed image quality. The SAD similarity measure applied in searching the most matching domain between domain pool for a range before transformation in order to shorten the mapping process. Therefore, instead of performing a complete search in the next level, one requires to only search a close neighbourhood of the region computed from the previous search. The efficiency of the proposed method is evaluated using standard test image, SMPTE test pattern and standard computed radiography digital images from JSRT database, from which the peak signal-to-noise ratio (PSNR), compression time and compression ratio are calculated. The experimental results validate the effectiveness of the proposed method. -
PublicationA Novel Double Co-Transformation for a Simple and Memory Efficient Logarithmic Number System( 2020-07-01)
;Basir M.S.S.M. ;To date, co-transformation architecture is typically used in resolving the singularity issue in the logarithmic number system (LNS). The co-transformation was first introduced by Coleman, by using a rule of sign(r1) ≠sign(r2) which translate the singularity into an argument that can be stored in two identical look-up tables (LUTs) with size of 2k. Recently, a portable 32-bit chipset preferred a small LUT, hitherto a co-transformation architecture is rearranged. This paper presents a novel double co-transformation, by means of first-order co-transformation architecture that covers-0.5 < r < 0 region is extended to r >-1 to replace the triumvirate F, D and E tables occupy by the interpolator. The accuracy settings at the co-transformation is compromised with the worst case error of 0.5 ulp. The outcome revealed a double co-transformation with Lagrange interpolator shows a decline in the total bit by 13% compared to European Logarithmic Microprocessor (ELM). With a simple architecture, the proposed double co-transformation is a promise for a fast LNS system. -
Publication"Look & Blink" two step verification security log in system( 2021-03-01)
;Kai Qi L. ; ; ; ;Naziri S.Z.M.A new artificial intelligence security design which is face recognition with eye blinking login system is proposed. It aims to strengthen the security account for each user using artificial intelligence technology and increase speed and user convenience for security during login. The face of a person cannot be copied and it can replace the username of the user, while eye blinking detection is another step for double verification replacing the password of a user. It is a two-step verification process that can be applied to all sorts of account login field so that this technology can replace the old school username with a password security system. The recognition system used a real-time where it is reducing the number of hackers in the field as it is impossible to hack a person's real-time face. The proposed system has been tested and analyzed the functionality by accessing the personal account in the university's portal.2 38 -
PublicationSignal propagation modelling for vehicle-to-infrastructure communication under the influence of metal obstruction( 2021-12)
;Jamie Siregar Cynthia Turner ; ; ; ; ;D L Ndzi ; ; ; ; ;M K N ZulkifliConnected car has become one of emerging technology in the automotive industries today. This development preludes a rise in vehicular communication studies that primarily targets radio channel modelling on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication mode. Considering vehicular obstruction, vast channel propagation studies have focused more on V2V mode while others consider the typical urban scenarios consisting of high traffic volumes of moving vehicles. Due to challenging propagation mechanisms and high complexity in such areas, radio propagation models applied in simulators assume an obstacle-free environment rather than considering the least effect imposed by metal obstruction on communication signal. Besides, there are limited studies pertaining to metal obstruction that considers several under-explored environments such as actual parking lots, junctions and other road infrastructure support. As such, this paper demonstrates signal attenuation analysis caused by the presence of metal objects in low density over obstacle-free environment on actual parking lot via V2I mode. Two scenarios such as LOS and NLOS conditions consisting of obstacle-free, cars and buses as static metal objects are evaluated. The aim of this research is to characterize signal strength caused by metal blockage on radio wave propagation predicated on the presence of vehicles as a subject of obstruction in comparison to obstacle-free vehicular environment. The validity of data is shown through received signal strength indicator (RSSI) and approximation analysis (RMSE) to demonstrate the efficiency of obtained measurements. The results demonstrated that Log-normal shadowing model yields the best fit to low-density metal obstruction scenario with smallest RMSE of 4.78 under bus obstruction whereas 5.72 under car obstruction.5 22 -
Publicatione-PADI: an iot-based paddy productivity monitoring and advisory system( 2019)
;M.A.F. Ismail ; ;S. N. Mohyar ; ;M. N. M. Ismail ; ;A. HarunRice is source of food calories and protein. This second most widely grown cereal crop is the staple food for more than half the world’s population especially in developing countries. The ability of global rice production to meet population demands (now estimated at more than 5 billion and projected to rise to 8.9 billion by 2050) remains in uncertainty in the near future unless challenges in rice production are properly addressed [1-3]. This paper proposed an IoT (Internet of things)-based paddy productivity monitoring and advisory system Using Dash7 Wireless Network Protocol. All collected data will be stored in a database management system to enable users to retrieve data either from tablets, smartphones or computers. The heart of the system is the ATmega328p microcontroller that will control the payload of the wireless network of dash7 and read data from sensor nodes. Results show all data from sensor nodes in representation of graph for analysis purpose.36 7 -
PublicationDesign of multiplicative inverse value generator using logarithm method for AES algorithm( 2020)
;Goh Yie Yen ; ; ;Advanced Encryption Standard (AES) algorithm is one of the most widely used symmetric block cipher that is utilized in data protection through symmetric cryptography algorithm, as it offers high efficiency and ability in securing information. In AES, the SubByte/InvSubByte transformation costs an amount of memories for the lookup tables (LUT) that leads to area usage in hardware. As per mathematical equations, the SubByte/InvSubByte is able to share the same resource which is the multiplicative inverse value table. Instead of using LUTs, the multiplicative inverse values can be generated on-the-fly as needed. Therefore, this paper presents the custom hardware design and implementation of multiplicative inverse value generator using logarithm method specifically for AES algorithm. The logarithm method benefits the usage of antilog and log values in obtaining the multiplicative inverse value. The EDA tools as Intel Quartus Prime, Synopsys Design Compiler and IC Compiler are used to perform functional simulation, on synthesis analysis and block-level implementation. Detailed comparison is made between this work and previous implementation. The newly designed multiplicative inverse value generator has achieved the improvement on speed and area as compared to previous implementation. The area of the design is reduced around 8.5% with current improvement of 63.091 μm2, while the speed has increased to 2.54 ns with a positive slack of 0.11 ns, which is shorter than the previous implementation. The new design also outreached the performance of the common LUT-based design. © 2020 IEEE.34 3 -
PublicationImage data compression using fast Fourier transform (FFT) technique for wireless sensor network( 2024-02-08)
;Haron M.H. ; ; ;Arshad M.A.M. ; ; ;Hussin R. ;Harun A. ;Agricultural settings present unique challenges for the transmission of huge amounts of images over long-range wireless networks. It is challenging to remotely gather data for transmission over a wireless network in research areas due to a lack of basic amenities like internet connections, especially in distant agricultural areas. In this research, the Fast Fourier Transform (FFT) method was used in conjunction with the Discrete Cosine Transform (DCT) method of image compression to achieve a higher compression ratio. In order for a Wireless Sensor Network (WSN) to provide compressed image data to a wireless based station, a LoRaWAN network has been identified. Low-power LoRaWAN networks may regularly transmit compressed images from an agricultural region to a monitoring system up to 15 km away. Images of golden apple snails were collected for this study from a variety of sources. The procedure was coded in MATLAB so that it could be run with input images being judged by the created algorithm. The input images can be compressed with a range of compression ratios (CR) from 3.00 to 50.00, as shown by the simulation results. Compressed image quality is measured not only by the above-mentioned criteria, but also by Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). According to the numbers, the best achievable compression ratio is 49.04, with an MSE of 172.72 and a PSNR of 25.75 at its highest.29 4 -
PublicationFace Recognition and Identification using Deep Learning Approach( 2021)
;KH Teoh ; ; ; ;Muhammad Sufyan Safwan BasirHuman face is the significant characteristic to identify a person. Everyone has their own unique face even for twins. Thus, a face recognition and identification are required to distinguish each other. A face recognition system is the verification system to find a person’s identity through biometric method. Face recognition has become a popular method nowadays in many applications such as phone unlock system, criminal identification and even home security system. This system is more secure as it does not need any dependencies such as key and card but only facial image is needed. Generally, human recognition system involves 2 phases which are face detection and face identification. This paper describes the concept on how to design and develop a face recognition system through deep learning using OpenCV in python. Deep learning is an approach to perform the face recognition and seems to be an adequate method to carry out face recognition due to its high accuracy. Experimental results are provided to demonstrate the accuracy of the proposed face recognition system.2 21 -
PublicationArea optimization of active reference band gap amplifier in cadence virtuoso( 2024-02-08)
;Sheng T.W. ; ; ; ; ; ;Band Gap Amplifier is mostly used in integrated circuit (IC) chips. It is commonly used to generate temperature independent reference voltage. Band Gap Amplifier is essential and implemented widely in analog and digital circuits because it is temperature independent thus produces low voltage. In this work, layout of active reference band gap amplifier is designed in cadence virtuoso and the percentages of differences sizes of layouts are compared. The different versions of layout design are compared in the result to show the percentages of area optimization. The main layout designs such as layout 1 (without sharing source, drain and well), layout 2 (sharing source, drain without sharing wells), and layout 3 (share the source, drain, and well) are designed to get the comparison of area optimization. The results show that there is 27.73% reduction overall layout by applied several techniques to optimize the area in layout design in order to get a compactable layout.6 35