Mohamad Afendee Mohamed
Universiti Sultan Zainal Abidin

Published : 14 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 7 Documents
Search
Journal : International Journal of Electrical and Computer Engineering

Cryptographic adaptation of the middle square generator Hana Ali-Pacha; Naima Hadj-Said; Adda Ali-Pacha; Mohamad Afendee Mohamed; Mustafa Mamat
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (889.016 KB) | DOI: 10.11591/ijece.v9i6.pp5615-5627

Abstract

Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.
A New Chaotic System with Line of Equilibria: Dynamics, Passive Control and Circuit Design Aceng Sambas; Mustafa Mamat; Ayman Ali Arafa; Gamal M Mahmoud; Mohamad Afendee Mohamed; W. S. Mada Sanjaya
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2267.016 KB) | DOI: 10.11591/ijece.v9i4.pp2336-2345

Abstract

A new chaotic system with line equilibrium is introduced in this paper. This system consists of five terms with two transcendental nonlinearities and two quadratic nonlinearities. Various tools of dynamical system such as phase portraits, Lyapunov exponents, Kaplan-Yorke dimension, bifurcation diagram and Poincarè map are used. It is interesting that this system has a line of fixed points and can display chaotic attractors. Next, this paper discusses control using passive control method. One example is given to insure the theoretical analysis. Finally, for the  new chaotic system, An electronic circuit for realizing the chaotic system has been implemented. The numerical simulation by using MATLAB 2010 and implementation of circuit simulations by using MultiSIM 10.0 have been performed in this study.
A simple multi-stable chaotic jerk system with two saddle-foci equilibrium points: analysis, synchronization via backstepping technique and MultiSim circuit design Aceng Sambas; Sundarapandian Vaidyanathan; Irene M. Moroz; Babatunde Idowu; Mohamad Afendee Mohamed; Mustafa Mamat; W. S. Mada Sanjaya
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 4: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i4.pp2941-2952

Abstract

This paper announces a new three-dimensional chaotic jerk system with two saddle-focus equilibrium points and gives a dynamic analysis of the properties of the jerk system such as Lyapunov exponents, phase portraits, Kaplan-Yorke dimension and equilibrium points. By modifying the Genesio-Tesi jerk dynamics (1992), a new jerk system is derived in this research study. The new jerk model is equipped with multistability and dissipative chaos with two saddle-foci equilibrium points. By invoking backstepping technique, new results for synchronizing chaos between the proposed jerk models are successfully yielded. MultiSim software is used to implement a circuit model for the new jerk dynamics. A good qualitative agreement has been shown between the MATLAB simulations of the theoretical chaotic jerk model and the MultiSIM results
Speech encryption by multiple chaotic map with fast fourier transform Yahia Alemami; Mohamad Afendee Mohamed; Saleh Atiewi; Mustafa Mamat
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (743.64 KB) | DOI: 10.11591/ijece.v10i6.pp5658-5664

Abstract

There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdropping the calls and voice messages, One way to solve this problem is via cryptographic approach. Chaos cryptography build on top of nonlinear dynamics chaotic system has gained some footstep in data security. It provides an alternative to conventional cryptography built on top of mathematical structures. This research focuses on the protection of speech recording by encrypting it with multiple encryption algorithms, including chaotic maps (Logistic Map and Sine Maps).
Improve of contrast-distorted image quality assessment based on convolutional neural networks Ismail Taha Ahmed; Chen Soong Der; Norziana Jamil; Mohamad Afendee Mohamed
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (771.32 KB) | DOI: 10.11591/ijece.v9i6.pp5604-5614

Abstract

Many image quality assessment algorithms (IQAs) have been developed during the past decade. However, most of them are designed for images distorted by compression, noise and blurring. There are very few IQAs designed specifically for Contrast Distorted Images (CDI), e.g. Reduced-reference Image Quality Metric for Contrast-changed images (RIQMC) and NR-IQA for Contrast-Distorted Images (NR-IQA-CDI). The existing NR-IQA-CDI relies on features designed by human or handcrafted features because considerable level of skill, domain expertise and efforts are required to design good handcrafted features. Recently, there is great advancement in machine learning with the introduction of deep learning through Convolutional Neural Networks (CNN) which enable machine to learn good features from raw image automatically without any human intervention. Therefore, it is tempting to explore the ways to transform the existing NR-IQA-CDI from using handcrafted features to machine-crafted features using deep learning, specifically Convolutional Neural Networks (CNN).The results show that NR-IQA-CDI based on non-pre-trained CNN (NR-IQA-CDI-NonPreCNN) significantly outperforms those which are based on handcrafted features. In addition to showing best performance, NR-IQA-CDI-NonPreCNN also enjoys the advantage of zero human intervention in designing feature, making it the most attractive solution for NR-IQA-CDI.
Cloud data security and various cryptographic algorithms Yahia Alemami; Ali M. Al-Ghonmein; Khaldun G. Al-Moghrabi; Mohamad Afendee Mohamed
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp1867-1879

Abstract

Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.
Advanced approach for encryption using advanced encryption standard with chaotic map Yahia Alemami; Mohamad Afendee Mohamed; Saleh Atiewi
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp1708-1723

Abstract

At present, security is significant for individuals and organizations. All information need security to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms to the information. Encipherment is the method that changes plaintext to a secure form called cipherment. Encipherment includes diverse types, such as symmetric and asymmetric encipherment. This study proposes an improved version of the advanced encryption standard (AES) algorithm called optimized advanced encryption standard (OAES). The OAES algorithm utilizes sine map and random number to generate a new key to enhance the complexity of the generated key. Thereafter, multiplication operation was performed on the original text, thereby creating a random matrix (4×4) before the five stages of the coding cycles. A random substitution-box (S-Box) was utilized instead of a fixed S-Box. Finally, we utilized the eXclusive OR (XOR) operation with digit 255, also with the key that was generated last. This research compared the features of the AES and OAES algorithms, particularly the extent of complexity, key size, and number of rounds. The OAES algorithm can enhance complexity of encryption and decryption by using random values, random S-Box, and chaotic maps, thereby resulting in difficulty guessing the original text.