Mohd Hilal, M. - Academia.edu (original) (raw)
Uploads
Papers by Mohd Hilal, M.
Bulletin of Electrical Engineering and Informatics
The implementation of steganography in text domain is one the crutial issue that can hide an esse... more The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.
Bulletin of Electrical Engineering and Informatics, 2020
The implementation of steganography in text domain is one the crutial issue that can hide an esse... more The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.
IEEE, 2018
Mobile Ad-Hoc NETworks (MANET) designed specifically for WMNs. MANET plays an important role to f... more Mobile Ad-Hoc NETworks (MANET) designed specifically for WMNs. MANET plays an important role to find single the best path to a destination from various paths available using Ad-Hoc On Demand Distance Vector (AODV) routing protocol. However, when multiple nodes choose the same path, it will cause the path to be overload and deteriorating the overall performance of the network. Multipath Parallel Routing Protocol (MPRP) comes out to overcome this problem. The scope of this project is to study and discuss how MPRP and Coordinated Distributed Scheme (CDS) enhance the performance of WMNs. MPRP and CDS is combined to allow the selection of shortest path. The algorithm named Shortest Path Multipath Parallel Routing Protocol (S-MPRP). S-MPRP enhanced the performance of MPRP by allowing the selecting second best path when the best path is congested. Due to cost limitation, the simulation carried out using Network Simulation 2 (NS2) to compare the performance of WMNs between S-MPRP and AODV. Simple configurations have been done to configure the S-MPRP on the nodes. The simulation results shows S-MPRP helps WMNs produce a better result in terms of throughput, delay and normalized control overhead.
International Journal of Pure and Applied Mathematics, 2018
The purpose of this study is to measure the level and difference of self-efficacy of computer in ... more The purpose of this study is to measure the level and difference of self-efficacy of computer in programming for non-technical students using Scratch. Programming skills can be the basis of problem solving skills and it is important for both technical and non-technical students. Quantitative studies in this survey were carried out using questionnaires containing 21 items measuring the student's self efficacy. A pilot study of 23 respondents showed that the reliability of the instruments was at the level of α = .935. The respondents of the study consists of 48 non-technical undergraduate students selected based on simple random sampling technique. The data obtained were analyzed descriptively (frequency and percentage) and inference (mean analysis, t-test and pearson correlation) using SPSS v23. The findings show that the self-efficacy level of non-technical students on Scratch programming as a whole is quite high. The findings of the t-test analysis show that there is no statistically significant difference in self-efficacy based on gender and the background of the program study. Correlation analysis also found that there was no self-efficacy relationship between computers
in Scratch programming with academic achievement. Research shows that the level of self-efficacy of non-technical students is relatively high capable of providing an alternative problem solving skills using Scratch programming.
Bulletin of Electrical Engineering and Informatics
The implementation of steganography in text domain is one the crutial issue that can hide an esse... more The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.
Bulletin of Electrical Engineering and Informatics, 2020
The implementation of steganography in text domain is one the crutial issue that can hide an esse... more The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.
IEEE, 2018
Mobile Ad-Hoc NETworks (MANET) designed specifically for WMNs. MANET plays an important role to f... more Mobile Ad-Hoc NETworks (MANET) designed specifically for WMNs. MANET plays an important role to find single the best path to a destination from various paths available using Ad-Hoc On Demand Distance Vector (AODV) routing protocol. However, when multiple nodes choose the same path, it will cause the path to be overload and deteriorating the overall performance of the network. Multipath Parallel Routing Protocol (MPRP) comes out to overcome this problem. The scope of this project is to study and discuss how MPRP and Coordinated Distributed Scheme (CDS) enhance the performance of WMNs. MPRP and CDS is combined to allow the selection of shortest path. The algorithm named Shortest Path Multipath Parallel Routing Protocol (S-MPRP). S-MPRP enhanced the performance of MPRP by allowing the selecting second best path when the best path is congested. Due to cost limitation, the simulation carried out using Network Simulation 2 (NS2) to compare the performance of WMNs between S-MPRP and AODV. Simple configurations have been done to configure the S-MPRP on the nodes. The simulation results shows S-MPRP helps WMNs produce a better result in terms of throughput, delay and normalized control overhead.
International Journal of Pure and Applied Mathematics, 2018
The purpose of this study is to measure the level and difference of self-efficacy of computer in ... more The purpose of this study is to measure the level and difference of self-efficacy of computer in programming for non-technical students using Scratch. Programming skills can be the basis of problem solving skills and it is important for both technical and non-technical students. Quantitative studies in this survey were carried out using questionnaires containing 21 items measuring the student's self efficacy. A pilot study of 23 respondents showed that the reliability of the instruments was at the level of α = .935. The respondents of the study consists of 48 non-technical undergraduate students selected based on simple random sampling technique. The data obtained were analyzed descriptively (frequency and percentage) and inference (mean analysis, t-test and pearson correlation) using SPSS v23. The findings show that the self-efficacy level of non-technical students on Scratch programming as a whole is quite high. The findings of the t-test analysis show that there is no statistically significant difference in self-efficacy based on gender and the background of the program study. Correlation analysis also found that there was no self-efficacy relationship between computers
in Scratch programming with academic achievement. Research shows that the level of self-efficacy of non-technical students is relatively high capable of providing an alternative problem solving skills using Scratch programming.