M2M (Machine to Machine) communication system allows a number of machines in one area connected to internet through one gateway. In the large plant system in which data to be delivered might be exceed one data package. The data must divide into several subdivision data packages. As a result, system... Selengkapnya
In the current digital era, patient data in the form of digital medical images in several hospitals are widely used. There are two important thin to use of digital medical images namely the ownership authority (integrity control) and the authenticity of the image (authentication), because digital... Selengkapnya
Recently, WiMAX (Worldwide Interoperability for Microwave Access) has been claimed as one of the fastest wireless technology and IEEE 802.16e based on WiMAX networking is able to provide better quality for mobile data service user. The main problem of 802.16e is that there are no specific... Selengkapnya
The purpose of this study is to identify channel management techniques for SMS message transmission that can overcome transmission failures caused by high traffic volumes within a voice service in a CDMA network. With the improved management of the SMS channel the desired goal is for a better... Selengkapnya
This paper proposes a transformation scheme for rendering the asymmetric watermarking technique into its asymmetric version. The asymmetric technique uses secret watermark as private key and public watermark as public key. The public watermark has a normal distribution and the private watermark is... Selengkapnya
This paper presents an asymmetric watermarking technique derived from Barni algorithm, a symmetric watermarking technique, using statistical approach. This asymmetric version uses secret watermark as private key and public watermark as public key. The public watermark has a normal distribution and... Selengkapnya