Options
Razaidi Hussin
Preferred name
Razaidi Hussin
Official Name
Razaidi, Hussin
Alternative Name
Hussin, R.
Razaidi, Hussin
Hussin, Razaidi Bin
Hussin, Razaidi
Razaidi, H.
Main Affiliation
Scopus Author ID
22634137400
Researcher ID
AAU-6856-2020
Now showing
1 - 10 of 15
-
PublicationLess memory and high accuracy logarithmic number system architecture for arithmetic operations( 2021-09-01)Interpolation is another important procedure for logarithmic number system (LNS) addition and subtraction. As a medium of approximation, the interpolation procedure has an urgent need to be enhanced to increase the accuracy of the operation results. Previously, most of the interpolation procedures utilized the first degree interpolators with special error correction procedure which aim to eliminate additional embedded multiplications. However, the interpolation procedure for this research was elevated up to a second degree interpolation. Proper design process, investigation, and analysis were done for these interpolation configurations in positive region by standardizing the same co-transformation procedure, which is the extended range, second order co-transformation. Newton divided differences turned out to be the best interpolator for second degree implementation of LNS addition and subtraction, with the best-achieved BTFP rate of +0.4514 and reduction of memory consumption compared to the same arithmetic used in european logarithmic microprocessor (ELM) up to 51%.
-
PublicationDevelopment of Soil Electrical Conductivity (EC) Sensing System in Paddy Field( 2021-03-01)
;Othaman N.N.C.The amount of fertilisers affects electrical conductivity (EC), and it is one of the major causes of the paddy yield decrease. The overuse of fertilisers can lead to environmental pollution and contamination. This study designed to develop soil electrical conductivity (EC) sensing system in the paddy field using the smart farming application. In this work, the study conducted in Kampung Ladang, Kuala Perlis, and the soil samples collected from a random location at two different depths from the paddy field. The EC value for the developed system was near the calibration solutions (12880µS and 150000µS) and directly proportional to the temperature. From the laboratory soil results, the EC values of the soils were higher with fertiliser. However, the EC values for 0-10cm soil depth were higher than 10-20cm soil depth. The soil EC is inversely proportional to the depth of soil and directly proportional to the amount of nutrients. It observed that the soil EC is linearly related to the amount of nutrients and temperature. The EC value decreases with the increase of soil depth displays a low amount of salts in the deep soil, while, increases with the increase of temperature indicates high current flow. -
PublicationFace Recognition and Identification using Deep Learning Approach( 2021)
;KH TeohMuhammad Sufyan Safwan BasirHuman face is the significant characteristic to identify a person. Everyone has their own unique face even for twins. Thus, a face recognition and identification are required to distinguish each other. A face recognition system is the verification system to find a person’s identity through biometric method. Face recognition has become a popular method nowadays in many applications such as phone unlock system, criminal identification and even home security system. This system is more secure as it does not need any dependencies such as key and card but only facial image is needed. Generally, human recognition system involves 2 phases which are face detection and face identification. This paper describes the concept on how to design and develop a face recognition system through deep learning using OpenCV in python. Deep learning is an approach to perform the face recognition and seems to be an adequate method to carry out face recognition due to its high accuracy. Experimental results are provided to demonstrate the accuracy of the proposed face recognition system. -
PublicationDesign of Multiplicative Inverse Value Generator using Logarithm Method for AES Algorithm( 2020-12-14)
;Yen, Goh YieAdvanced Encryption Standard (AES) algorithm is one of the most widely used symmetric block cipher that is utilized in data protection through symmetric cryptography algorithm, as it offers high efficiency and ability in securing information. In AES, the SubByte/InvSubByte transformation costs an amount of memories for the lookup tables (LUT) that leads to area usage in hardware. As per mathematical equations, the SubByte/InvSubByte is able to share the same resource which is the multiplicative inverse value table. Instead of using LUTs, the multiplicative inverse values can be generated on-the-fly as needed. Therefore, this paper presents the custom hardware design and implementation of multiplicative inverse value generator using logarithm method specifically for AES algorithm. The logarithm method benefits the usage of antilog and log values in obtaining the multiplicative inverse value. The EDA tools as Intel Quartus Prime, Synopsys Design Compiler and IC Compiler are used to perform functional simulation, on synthesis analysis and block-level implementation. Detailed comparison is made between this work and previous implementation. The newly designed multiplicative inverse value generator has achieved the improvement on speed and area as compared to previous implementation. The area of the design is reduced around 8.5% with current improvement of 63.091 μm2, while the speed has increased to 2.54 ns with a positive slack of 0.11 ns, which is shorter than the previous implementation. The new design also outreached the performance of the common LUT-based design. -
PublicationHardware Design of Combinational 128-bit Camellia Symmetric Cipher using 0.18µm Technology( 2022)
;Chawalit Udom SakCamellia is another symmetric key block cipher with a 128-bit block size and key sizes of 128, 192, and 256 bits. As the hardware version of cipher implementation is getting popular, the Camellia hardware design should be constantly improved in terms of performance. The key aim of this research is to design and implement the improved version of Camellia cipher using custom-based approach based on 0.18µm technology. The new hardware Camellia design is synthesized using timing, area and power constraints to achieve less area, less power and high-speed design. Finally the results are been compared and analyzed with previous implementation in terms of performance parameters. The design is described using Verilog HDL and been verified using functional simulation from the Modelsim-Intel FPGA, while Synopsys had been utilized for synthesis process. Based on the generated synthesis reports, the total area consumed by the design on ASIC platform is 1294.11-unit area with a total cell area of 1176.25-unit area, while the total power consumption is 0.1245mW, and an increased speed of more than 80% as compared to previous design. In conclusion, this design had achieved better performance compared to previous design. -
PublicationCrypto-Core Design using Camellia Cipher( 2021-03-01)
;Wei Ci C.Basir M.S.S.M.Camellia cipher is another symmetric block cipher which allows the encryption and decryption process to share the same key. The cipher permits a 128-bits input data with three different key size: 128, 192 and 256 bits. This paper presents two hardware design approach of Camellia cipher, which are FPGA and custom-based design approach. These approaches utilized design softwares of Altera Quartus II with device family of Cyclone II and Synopsys Design Compiler. The performance of Camellia crypto-core design is then been evaluated based on the implementation platform in terms of speed, area and power. With an equal base of 50MHz of clock frequency, custom-based design is found more efficient than FPGA-based design due to the execution time achieved with 8.46ns, which is faster than the latter that consumed double the time with 16.075ns. The custom-based design achieved 15.13 Gbps of throughput. Besides, the power consumption of custom-based design is 1.3519 mW which is lower than the FPGA-based design. In a nutshell, the design has successfully done as it achieved expected encryption and decryption outcomes with acceptable performance. -
PublicationDesign of multiplicative inverse value generator using logarithm method for AES algorithm( 2020)
;Goh Yie YenAdvanced Encryption Standard (AES) algorithm is one of the most widely used symmetric block cipher that is utilized in data protection through symmetric cryptography algorithm, as it offers high efficiency and ability in securing information. In AES, the SubByte/InvSubByte transformation costs an amount of memories for the lookup tables (LUT) that leads to area usage in hardware. As per mathematical equations, the SubByte/InvSubByte is able to share the same resource which is the multiplicative inverse value table. Instead of using LUTs, the multiplicative inverse values can be generated on-the-fly as needed. Therefore, this paper presents the custom hardware design and implementation of multiplicative inverse value generator using logarithm method specifically for AES algorithm. The logarithm method benefits the usage of antilog and log values in obtaining the multiplicative inverse value. The EDA tools as Intel Quartus Prime, Synopsys Design Compiler and IC Compiler are used to perform functional simulation, on synthesis analysis and block-level implementation. Detailed comparison is made between this work and previous implementation. The newly designed multiplicative inverse value generator has achieved the improvement on speed and area as compared to previous implementation. The area of the design is reduced around 8.5% with current improvement of 63.091 μm2, while the speed has increased to 2.54 ns with a positive slack of 0.11 ns, which is shorter than the previous implementation. The new design also outreached the performance of the common LUT-based design. © 2020 IEEE. -
PublicationDesign and Analysis of 32-Bit Signed and Unsigned Multiplier Using Booth, Vedic and Wallace Architecture( 2021-03-01)
;Yong K.M.This paper presents the implementation and performance comparison of the Booth encoding technique and Wallace Tree reduction scheme on Vedic architecture. The radix-4 Booth encoder is widely used to enhance the multiplication speed as it has the capability to reduce the number of partial products generated by half. Vedic multiplier partitions the inputs into two blocks to speed up the partial product generation and Wallace Tree reduction scheme speed up the partial product addition process by eliminating the carry chain of the addition. Radix-4 Booth encoding scheme Vedic multiplier with and without Wallace Tree partial product reduction scheme for signed and unsigned multiplication was designed and synthesized in Synopsys 130 nm technology. For unsigned multiplier, the Booth-Vedic multiplier is 37.29% faster and 26.13% smaller while the Booth-Vedic-Wallace multiplier is 39.79% faster and 28.81% smaller when compared with Vedic multiplier. The performance of both multipliers was dropped when used in signed multiplication due to signed extension during the partial product addition process. All the multiplier is functionally verified using modified testbench that is based on the concept of UVM testbench.4 11 -
PublicationIoT Based Soil Nutrient Sensing System for Agriculture Application( 2021-12-01)
;Othaman N.N.C. ;Zakaria S.M.M.S.Isa M.M.Rice is the primary food source for millions of Asians and satisfies the most fundamental requirement for human survival. The paddy scarcity has heightened public awareness of the global food problem. Rice yield and quality are affected by various factors, including soil nutrients, irrigation, types of soil, and pests. This work proposed developing an Internet of Things (IoT) based mobile device for measuring soil nutrients in real-time. The proposed system consists of electrical conductivity (EC) and temperature sensors with TTGO T-Beam microcontroller and IoT connectivity. During experimental work, the results showed that the observed EC data near the calibration solution conductivity of 12.88mS/cm and 150mS/cm, which are less than 2% from the calibration solution's stated value. Furthermore, it is found that the measured EC value increases with temperature (linearly proportional). The study showed that the soil's EC of sensor node 1 at 5 cm depth without fertiliser is 1.04375mS/cm and with fertiliser is 3.86mS/cm, while at 10 cm depth without fertiliser is 0.65625mS/cm and with fertiliser is 420mS/cm. These investigations show that soil EC is directly linked to nutrient availability and soil depth.1 21 -
PublicationIoT Monitoring System for Fig in Greenhouse Plantation( 2023-07-01)
;Yuan C.K.J.Abdullah A.F.T.Fig is rich in nutrients and has a high market value due to its extensive application in promoting a nutritious food supply and supporting various medical disciplines. However, the equatorial climate in Malaysia poses significant difficulties for the large-scale cultivation of figs. Therefore, a Smart Monitoring System for controlled Greenhouse Plantation was proposed in this study to enable more efficient cultivation. The proposed system was equipped with LoRa and GSM to overcome the distance and data transmission limitations, developed using the Arduino Uno microcontroller. The proposed system consists of sensors to measure soil moisture, temperature, and humidity, while the data is transmitted using long-range LoRa communication to the control unit. The sensors circuit also has a solar power supply for convenient application in rural areas. The control unit is placed at a location with good data coverage. The system functioned well, and the monitoring parameter was accurately read, collected, and updated every 30 minutes. The optimal temperature, humidity, and soil moisture for growing fig is 22°C-33°C, > 60%, and 50%-60%, respectively. Real-time data monitoring enabled the sensors and control unit to achieve LoRa data transmission over a distance of 2.5 km. Any data exceeding the controlled parameters will trigger an alarm so that the user can perform corrective actions.1