Izzatdin Abdul Aziz
Universiti Teknologi Petronas
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Izzatdin Abdul Aziz.
DaEng | 2014
Lukman Ab. Rahim; Shiladitya Bhattacharjee; Izzatdin Abdul Aziz
Steganography is the concept of concealing information within a cover media. In this paper, we present a technique to hide the text information within an audio file using a higher Least Significant Bit (LSB) layer. To hide text information within the audio file, we propose an approach that uses two LSB layers of the host file. The data hiding is done by minimum modification to the host file, which implies that changes of host audio file do not impact the Human Auditory System (HAS). Hiding of dual bit in the 4th and 1st LSB layer improves the hiding capacity of the host file. The proposed approach is also robust with respect to the errors, occurred during embedding of text in the audio files, as minimum modifications are performed on the original host audio [1].
international symposium on information technology | 2008
Nazleeni Samiha Haron; Mohd Khuzaimi Mahamad; Izzatdin Abdul Aziz; Mazlina Mehat
This research paper proposes an aarchitecture for implementing a water quality monitoring system for the aquaculture industry. The system would enable monitoring of the water quality remotely via GSM. Conventional method used by aqua farms requires technical staff to visit ponds at designated time and perform manual testing on the water quality. Consequently, the technique consumes a lot of time and effort. This research project would focus on developing a prototype that can evaluate data collected through three criteria: Dissolved oxygen level, pH level, and temperature level. The system would also be able to send alert messages upon detecting degradation of water quality in the pond via SMS.
computer, information, and systems sciences, and engineering | 2010
Nazleeni Samiha Haron; Ruzaini Amir; Izzatdin Abdul Aziz; Low Tang Jung; Siti Rokhmah Mohd Shukri
In this paper, we present the design of parallel Sobel edge detection algorithm using Foster’s methodology. The parallel algorithm is implemented using MPI message passing library and master/slave algorithm. Every processor performs the same sequential algorithm but on different part of the image. Experimental results conducted on Beowulf cluster are presented to demonstrate the performance of the parallel algorithm.
international symposium on information technology | 2008
Izzatdin Abdul Aziz; Mohd Jimmy Ismail; Nazleeni Samiha Haron; Mazlina Mehat
This paper proposes a monitoring system that can remotely monitor and predict changes of humidity and temperature level in the greenhouse atmosphere. The objective of the research project is to implement an agro-environmental remote monitoring system using wired sensor and issue SMS notification. The system will includes active measurements, which capable of detecting degradation level for humidity and temperature; and be equipped with an alert mechanism to notify workers about the atmosphere quality in the greenhouse so that precaution steps can be taken promptly. Hypothetical -Deductive method will be used as development methodology because it serves as the typical method in similar research field. With development of this Remote Monitoring System, it is hope that it will benefit farmers in term of bringing new technical innovation in collecting data and monitoring greenhouse.
international symposium on information technology | 2008
Izzatdin Abdul Aziz; Sajee Mahamad; Mazlina Mehat; Nazleeni Samiha
This paper proposes a navigation aid for the blind using echolocation principle and ultrasonic sensors. The device is for obstacles avoidance by detecting near objects in front of the user and shall trigger an audible alarm. Based on the echolocation principle, the ultrasonic beam is emitted in a certain direction in space through a transmitter. The beam is reflected from objects it encounters on its way; a matching receiver detects the reflected beam and the distance to the object is calculated based on time difference between emitting and receiving beam. Experimental results are presented. It could plausibly deduce that the device produced is suitable to be use as a navigation aid for the visually impaired.
international conference on computer and information sciences | 2016
Muhamad Hariz Adnan; Mohd Fadzil Hassan; Izzatdin Abdul Aziz; Irving Vitra Paputungan
Autonomous negotiation needs certain protocol, a set of rules that defines the interaction boundaries between negotiating agents. This paper aims to allow readers, particularly agent-based autonomous negotiation designers to understand and differentiate various agent-based negotiation protocols. This paper reviews one-to-one, concurrent one-to-many and many-to-many negotiation protocols that are divided into general, Alternative-offers and auctions-based protocols. In total, 23 protocols are reviewed. Then, this paper discusses some limitations of current negotiation protocols. As a conclusion, there are several addressable issues arises in using the protocols in different domains. The protocols should meet negotiation objectives such as time efficiency, robustness, consistency and information sharing.
international conference on computer and information sciences | 2016
Sana Qaiyum; Izzatdin Abdul Aziz; Jafreezal Jaafar
The proliferation of smart devices, along with the availability of bandwidth-intensive applications are generating huge volumes of data that create challenges to IT industries. Data handling becomes more troublesome when mobile users gather in tens and thousands of quantity at confine locations and generates Big Data. Analysis and storing of this huge, varied and complex data put great challenges to the Network Service Providers (NSP). Thus, service providers are facing problems in managing big data in dense environment and maintaining users Quality of Experience (QoE). However, big data also provide great opportunities to NSP. The accurate analysis of big data in real-time reveals the user experience of network services which helps the service providers to take timely action to improve user QoE. Thus, this paper presents an overview of Big Data and QoE in High-Density Wireless Network (HDWN) environment.
international conference on computer and information sciences | 2014
Shiladitya Bhattacharjee; Lukman Ab. Rahim; Izzatdin Abdul Aziz
To enhance the correctness and robustness of received text information at the receiver end, we propose an error detection and correction mechanism that executes at the application layer. Basically the error checking bits are incorporated with the original information during transition at the network. The error positions are detected by these error checking bits and then corresponding errors are corrected accordingly. Generally, the data link layer performs the task of error detection and correction but it platform dependent. So we introduce such a mechanism which is totally platform independent and acts at the application layer. It is capable of detecting all the error position and correcting all the error bits while it is destroyed or corrupted during the transmission. The data link layer sometimes fails to detect and correct all the error bits which can be solved by our proposed mechanism.
international symposium on information technology | 2008
Izzatdin Abdul Aziz; Nurul Asyikin Mazelan; Nazleeni Samiha; Mazlina Mehat
This paper proposes a mean to produce 3-D image from the SEG-Y data format in order to assist in visualizing data for analysis purposes. The information regarding the SEG-Y data conversion into 3-D image is collected and studied. SEG-Y data format are usually represented in a 2-D image and very few method had been explored to represent it in a 3-D form. Evolutionary method had been applied to conduct the study, which consist of interviewing experts from an oil and gas company. A study on existing 2-D imaging system is presented to further understand the process flow of converting SEG-Y data format into a visualized form. As a conclusion, three elements should exist in the system to be developed; it should include an analysis tool, able to calculate hydrocarbon maturity and able to conduct thorough data testing.
international symposium on information technology | 2008
Izzatdin Abdul Aziz; Thayalan Sandran; Nazleeni Samiha Haron; Mazlina Mehat
This paper proposes a design of noise reduction algorithm for seismic data on a High Performance Computing (HPC) environment. The algorithm of interest is the F-k filter which can be optimized by executing it using parallel processing architecture. The implementation of the above mentioned noise filtering technique comprises of 3 stages which are Fast Fourier Transform followed by F-k filtering and finally inverse of Fast Fourier Transformation. Each of the slave nodes in the cluster would have the complete filtering algorithms and would be fed with the Seismic Shot Records in the form of binary codes. The number of Shot Records that would be given to a node at a given instance varies according to the complexity of each Shot Record. Load balancing is one of the major concerns for this project and that would be accomplished by the master node which acts as the coordinator for the entire process.