About
112
Publications
42,514
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,700
Citations
Introduction
Current institution
Additional affiliations
January 2014 - present
Publications
Publications (112)
Blockchain provides a distributed digital ledger platform for not only cryptocurrencies but also many other distributed applications. Blockchain platforms work flow and performance are controlled by the used consensus algorithms. Although many studies evaluated cryptocurrency from the Shariah perspective, they focused only on the cryptocurrency con...
Cryptocurrency has emerged as the most promising digital asset, which serves as a medium of exchange with distributed control and highly secured financial system. This lead to an increase in stakeholders’ interest in digital currency investment. The cryptocurrencies majorly involve two phases including Initial Coin Offering (ICO) and blockchain cre...
With growing demand on resources situated at the cloud datacenters, the need for customers’ resource selection techniques becomes paramount in dealing with the concerns of resource inefficiency. Techniques such as metaheuristics are promising than the heuristics, most especially when handling large scheduling request. However, addressing certain li...
In this work, a new routing protocol designed exclusively for improving the connectivity of junction-based routing in city scenarios of vehicular ad hoc networks is introduced. The main objective of this protocol is eliminating the dependency of routing paths construction’s process on the current available traffic density inside the road segments....
With exponential growth in the number of customers accessing the cloud services, scheduling tasks at cloud datacenter poses the greatest challenge in meeting end-user’s quality of service (QoS) expectations in terms of time and cost. Recent research makes use of metaheuristic task scheduling techniques in addressing this concern. However, metaheuri...
Cloud is transmigrating to network edge where they are seen as virtualized resources called “Fog Computing” that expand the idea of Cloud Computing perspective to the network edge. This chapter proposes an integrated resource allocation model for energy-efficient Infrastructure as a Service (IaaS) that extends from the network edge of the Fog to th...
Inefficient scheduling of tasks on cloud datacenter resources can result in underutilization leading to poor revenue generation. To show efficient tasks scheduling on cloud datacenter, the makespan time needs to be minimized. In this paper, we introduced a conventional Cat Swarm Optimization (CSO) task scheduling technique as an ideal solution. Alt...
Cloud computing is a systematic delivery of computing resources as services to the consumers via the Internet. Infrastructure as a Service (IaaS) is the capability provided to the consumer by enabling smarter access to the processing, storage, networks, and other fundamental computing resources, where the consumer can deploy and run arbitrary softw...
Cloud computing has attracted significant interest due to the increasing service demands from organizations offloading computationally intensive tasks to datacenters. Meanwhile, datacenter infrastructure comprises hardware resources that consume high amount of energy and give out carbon emissions at hazardous levels. In cloud datacenter, Virtual Ma...
In this work, a new routing protocol has been exclusively designed for reducing the generated overhead of beacon-based routing at the road segments of city environments in Vehicular Ad hoc Network. The main objective is to reduce the resulted overhead from the periodic exchange of beacon messages while preserving the same network awareness. To do s...
Optical Burst Switching (OBS) is an optical network that is efficient and reliable. However, there are some critical issues in OBS such as burst loss ratio, which occur due to contending bursts as optical buffers are lacked at the core node. Many techniques have been proposed to tackle the problem such as using offset time. Offset time is managed t...
Cloud Computing is modernizing how Computing resources are created and disbursed over the Internet on a model of pay-per-use basis. The wider acceptance of Cloud Computing give rise to the formation of datacenters. Presently these datacenters consumed a lot of energy due to high demand of resources by users and inefficient resource allocation techn...
In cloud computing datacenter, task execution delay is a common phenomenal cause by task imbalance across virtual machines (VMs). In recent times, a number of artificial intelligence scheduling techniques are applied to reduced task execution delay. These techniques have contributed toward the need for an ideal solution. The objective of this study...
The unpredictable number of task arriving at cloud datacentre and the rescaling of virtual processing elements can affect the provisioning of better Quality of Service expectations during task scheduling in cloud computing. Existing researchers have contributed several task scheduling algorithms to provide better QoS expectations but are characteri...
The unpredictable number of task arriving at cloud datacentre and the rescaling of virtual processing elements can affect the provisioning of better Quality of Service expectations during task scheduling in cloud computing. Existing researchers have contributed several task scheduling algorithms to provide better QoS expectations but are characteri...
The increasing violation of Service Level Agreements (SLA) cause as a result of imbalance tasks allocation across Virtual Machines (VMs) has affected consumers’ Quality of Service (QoS) expectations. Researchers in the literature have put forward several models and tried to solve the problem using Artificial Intelligence (AI) scheduling techniques....
Introduction:
Information and communication technologies (ICTs) have changed the trend into new integrated operations and methods in all fields of life. The health sector has also adopted new technologies to improve the systems and provide better services to customers. Predictive models in health care are also influenced from new technologies to p...
In cloud computing datacenter, task execution delay is no longer accidental. In recent times, a number of artificial intelligence scheduling techniques are proposed and applied to reduce task execution delay. In this study, we proposed an algorithm called Orthogonal Taguchi Based-Cat Swarm Optimization (OTB-CSO) to minimize total task execution tim...
Resource discovery is one of the most important services that significantly affects the efficiency of grid computing systems. The inherent dynamic and large-scale characteristics of grid environments make their resource discovery a challenging task. In recent years, different approaches have been proposed for resource discovery, attempting to tackl...
Recently, real-time traffic occupied a large portion of the internet's traffic, which has strict quality of service (QoS) requirements in terms of delay. Thus, guaranteeing the network end-to-end delay is one of the main important factors to guarantee the QoS for the real time traffic over the internet. Constant bit rate (CBR) traffic is one of the...
Objectives: To present the state of the art on energy efficient frameworks in cloud computing environments Methods/ Statistical Analysis: To propose a conceptual framework for energy efficient IaaS (Infrastructure as a Service) of single and multi-cloud data centre. Findings: The approach is based on virtualization and consolidation technique that...
In Collaborative Virtual Environment (CVE) systems, one of the main research topics in is how to efficiently transmit message to minimized delay, provide scalability and reliability, and also the choice of transport protocol. TCP is the most widely used protocol in the design of CVE systems, and its throughput deteriorates in the network with large...
Optical burst switching (OBS) networks have been attracting much consideration as a promising approach to build the next generation optical Internet. A solution for enhancing the Quality of Service (QoS) for high priority real time traffic over OBS with the fairness among the traffic types is absent in current OBS' QoS schemes. In this paper we pre...
Collaborative Virtual Environment (CVE) has become popular in the last few years. In CVE the state of the virtual objects is witnessing rapid change. When a user performs an action in CVE, the information of the action needs to be transmitted to other users to maintain consistency in the cooperative work. Currently, in the design of most CVE system...
The resource discovery is one of the most important services in Grid systems because providing the resources is critical to handle the applications. But some inherent characteristics of Grid environments such as large-scale and dynamicity make the resource discovery a challenging task. The hierarchical structure is widely used in Grid resource disc...
Rapid development of Information and Communication Technology (ICT) in this era is very significant, increasing number of users accessing data keeps growing by the time. Data centre have to serve high volume transaction of data every day, thus a Big Data Centre is required to solve of insufficient of data storage in some of provider. High speed com...
The Optical burst switching (OBS) networks have been attracting much consideration as a promising approach to build the next generation optical Internet. Aggregating the burst in the OBS networks from the high priority traffic will increase the average of the loss of its packets. However, the ratio of the high priority traffic (e.g. real-time traff...
Optical Burst Switching (OBS) is perceived as the most favorable switching method for the next generation all optical networks to support the growth of the number of Internet users and to satisfy bandwidth demands for greedy-bandwidth applications which are in continuous growth. OBS consists of an edge node and a core node. The edge node is respons...
Collaborative Virtual Environment (CVE) is becoming popular in the last few years; this is because CVE is designed to allow geographically distributed users to work together over the network. Currently, in the development of CVE Systems, Client server architectures with multiple servers are used with TCP as update transmitting transport protocol be...
In recent years, directional sensor networks composed of directional sensors have attracted a great deal of attention due to their extensive applications. The main difficulties associated with directional sensors are their limited battery power and restricted sensing angle. Moreover, each target may have a different coverage quality requirement tha...
Resource discovery is one of the most important services that significantly affects the efficiency of grid computing systems. The inherent dynamic and large-scale characteristics of grid environments make their resource discovery a challenging task. In recent years, different approaches have been proposed for resource discovery, attempting to tackl...
Store-Carry-Forward (SCF) approach provides a new paradigm to route messages in Pocket Switched Network (PSN). In this approach, a router node will store and carry the messages while roaming from one place to another place. Whenever the node meets a destination node, the routing messages
will be immediately forwarded to the destination node. Unfort...
In the traditional Collaborative Virtual Environment (CVE) system, architecture such as the client-server with multiple architecture that is typically used has communications constraints due to the increasing number of users and huge server-to-server communications. In this paper, we propose a zone-based architectural model of CVE to circumvent con...
A Wireless Sensor Network (WSN) consists of many sensors that communicate wirelessly to monitor a physical region. Location information is critical essential and indispensable for many applications of WSNs. A promising solution for localizing statically deployed sen-sors is to benefit from mobile location-aware nodes called beacons. However, the es...
Optical burst switching (OBS) is the most favourable switching paradigm for future all-optical networks. Burst assembly is the first process in OBS and it consists of aggregating clients packets into bursts. Assembled bursts wait for an offset time before being transmitted to their intended destinations. Offset time is used to allow burst control p...
In many Wireless Sensor Network (WSN) applications such as warning systems or healthcare services it is necessary to update the captured data with location information. A promising solution for statically deployed sensors is to benefit from mobile beacon assisted localization. The main challenge is to design and develop an optimum path planning mec...
Collaborative Virtual Environment (CVE) has become popular in the last few years, this is because CVE is designed to allow geographically distributed users to work together over the network. In CVE the state of the virtual objects is witnessing unprecedentant change. When a user performs an action in CVE, the information of the action needs to be t...
Collaborative Virtual Environment (CVE) provides opportunity for users in a distant location to share and access Information and Communication Technology resources. In this paper, we propose the design of architectural framework of CVE based on cloud computing based paradigm in order to improve the effectiveness of the conventional CVE. The propose...
Recent years have witnessed a significant increase in employing wireless sensor networks (WSNs) for a variety of applications. Monitoring a set of discrete targets and, at the same time, extending the network lifetime is a critical issue in WSNs. One method to solve this problem is designing an efficient scheduling algorithm that is able to organiz...
IntroductionHaemangiopericytoma is a rare, soft-tissue tumor of vascular origin derived from pericyte that surrounds the smooth muscles of small blood vessels. The common sites are the musculatures of the lower extremities, head and neck. Computed tomographic angiography facilitates the diagnosis of vascular neoplasms, preoperative definition of bl...
Recently, directional sensor networks that are composed of a large number of directional sensors have attracted a great deal of attention. The main issues associated with the directional sensors are limited battery power and restricted sensing angle. Therefore, monitoring all the targets in a given area and, at the same time, maximizing the network...
Many-to-one (corona-based) wireless sensor network has many potential applications such as environmental monitoring, biomedical health monitoring and data gathering. The sensor nodes placed around a sink relay more traffic than the other nodes where placed in the outer coronas and nodes in the interior coronas suffer much faster energy consumption...
Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models. Abstract In our paper Gital et al, 2014, we proposed a cloud based communication architecture for improving the efficiency of CVE systems in terms of Scalability and Consistency requirements. This paper evaluat...
Collaborative Virtual Environment (CVE) systems allow the sharing of virtual space, and each participant is represented by an entity in the CVE. Resources are consumed when interaction among several users occurs. The resources are consumed as a result of updating its own state, and the communication resources required to distribute the update of co...
Wireless sensor networks have been used in a wide variety of applications. Recently, networks consisting of directional sensors have gained prominence. An important challenge facing directional sensor networks (DSNs) is maximizing the network lifetime while covering all the targets in an area. One effective method for saving the sensors’ energy and...
Wireless sensor networks (WSNs) have been widely used in different applications. One of the most significant issues in WSNs is developing an efficient algorithm to monitor all the targets and, at the same time, extend the network lifetime. As sensors are often densely deployed, employing scheduling algorithms can be considered a promising approach...
Mobile ad hoc network (MANET) is used in a wide range of application from civilian usage to military battlefield communications. Using multi-hop communication model, a source node can directly communicate with the destination node without infrastructure. Unfortunately, this feature causes the network vulnerable to various attacks. Security preventi...
Sensor networks have been employed in a variety of applications. Directional sensor networks (DSNs) are a class of sensor networks that have emerged more recently and received noticeable attention from scholars. One of the most significant challenges associated with DSNs is designing an effective algorithm to cover all the targets and, at the same...
Grid resource discovery which is the mechanism of indexing and locating the resources affects significantly the efficiency of grid systems. Some specific characteristics of grid environments such as dynamicity and large-scale make the resource discovery a challenging task. Different approaches for grid resource discovery have been proposed by resea...
In contrast to the random deployment method for wireless sensor networks, there are various applications that require manual deployment. While the deployment is costly and usually there is no change in the position of the nodes, it is better to evaluate the deployment scheme before doing it. There are different existing metrics to evaluate a deploy...
E-learning is one of the most powerful responses to the growing need for education. It could be as effective as conventional face to face classroom learning under certain situation. Some researchers have proved that e-learning has a positive impact not only for learners, but also for instructors and providers. In fact, e-learning reduces costs, tim...
Underwater Wireless Sensor Networks (UWSNs) provide new opportunities to observe and predict the behavior of aquatic environments. In some applications like target tracking or disaster prevention, sensed data is meaningless without location information. In this paper, we propose a novel 3D centralized, localization scheme for mobile underwater wire...
Energy conservation is a vital issue in wireless sensor networks. Recently, employing mobile sinks for data gathering become a pervasive trend to deal with this problem. The sink can follow stochastic or pre-defined paths; however the controlled mobility pattern nowadays is taken more into consideration. In this method, the sink moves across the ne...
During the last decade, Localization in wireless sensor networks (WSNs) is a broad topic that has received considerable attention from the research community. The approaches suggested to estimate location are implemented with different concepts, functionalities, scopes and technologies. This paper introduces a methodological approach to the evaluat...
Web proxy caching is one of the most successful solutions for improving the performance of Web-based systems. In Web proxy caching, the popular Web objects that are likely to be revisited in the near future are stored on the proxy server, which plays the key roles between users and Web sites in reducing the response time of user requests and saving...
In this paper, machine learning techniques are used to enhance the performances of conventional Web proxy caching policies such as Least-Recently-Used (LRU), Greedy-Dual-Size (GDS) and Greedy-Dual-Size-Frequency (GDSF). A support vector machine (SVM) and a decision tree (C4.5) are intelligently incorporated with conventional Web proxy caching techn...
Mobile wireless sensor networks (MWSNs) have recently launched a growing popular class of WSN in which mobility plays a key
role in the execution of the application. In recent years, mobility has become an important area of research for the WSN community. The
increasing capabilities and the decreasing costs of mobile sensors make mobile sensor netw...
Obtaining hundreds of sensor nodes to experiment new algorithms on Wireless Sensor Network (WSN) in real testbed is costly and time consuming. Simulation environment can reduce these costs though it may not produce exactly same results as real testbeds. There is many kind of simulations available for WSN such as Cooja and Tossim. None of these simu...
Ambient data generated by sensor nodes must be forwarded to sink node and made available to central system for further processing. Additionally, in a densely deployed sensor network, data are correlated and redundancy may occur. To minimize energy consumption, data may be aggregated during forwarding process. Although clustering helps in eliminatin...
Web caching is one of the most successful solutions for improving the performance of Web-based systems. In Web proxy caching, the popular Web objects that are likely to be revisited in the near future are stored on the proxy server, which plays the key roles between users and Web sites in reducing the response time of user requests and saving the n...
One of the challenges for resource discovery in unstructured peer to peer grid is the minimizing of network traffic that is produced by query messages which are broadcasted to other nodes to find appropriate resources in the grid. These methods do not work well because each specific query generates a large amount of network traffic, and network is...
Resource discovery is the most important challenge of Grid systems. Lately many researchers tried to improve indexing and searching methods. To this aim, there are several factors affecting improvement such as time and message complexities, scalability, dynamicity, reliability, support of different types of queries, and so on.
This paper proposes a...
Web proxy caching is one of the most successful solutions for improving the performance of Web-based systems. In Web proxy caching, the popular web objects that are likely to be revisited in the near future are stored on the proxy server which plays the key roles between users and web sites in reducing the response time of user requests and saving...
Mobile Ad hoc Network (MANET) consists of a group of mobile nodes that can communicate with each other without the need of infrastructure. The movement of nodes in MANET is random; therefore MANETs have a dynamic topology. Because of this dynamic topology, the link breakages in these networks are something common. This problem causes high data loss...
Since the sensors collect personal medical data, security and privacy are important factors in wireless sensor networks. Due to small memory capacity, constrained power supply, limited computational capability and communications bandwidth of WSNs, applying key management in wireless sensor networks is hard to achieve. Energy is a central concern in...
Localization is one of the key issues in the wireless sensors network. Regarding the mobility of the nodes in some of the applications, it is necessary to have a localization algorithm that can support the mobility of nodes. Most of the approaches that have been presented so far have required instruments for the measurement of the distance and the...
Network simulator is a significant tool for researchers to simulate the actual network. The main advantage of the simulator is that it gives results much closer to the reality than the mathematical modeling. Furthermore, its cost is much lesser as compared to the real experimentation. The scale and size of the large networks (e.g. Internet) complic...
The Internet has become a very important communication medium of our daily lives in many fields. People nowadays can study, buy, watch, and obtain more information and more and more services from the Internet. Therefore, the Internet networks have to carry different types of data, such as voice, video, image, and text data. These several types of d...
The dramatic and continuous use of the Internet has increased the network traffic that is needed to be transferred through the Internet network. Optical Burst Switching (OBS) has met the requirements of such demands and is considered as a solution of the issues present in Internet networks. However, there are still some issues in OBS network have n...
Web caching and prefetching are the most popular techniques that play a key role in improving the Web performance by keeping web objects that are likely to be visited in the near future closer to the client. Web caching can work independently or integrated with the web prefetching. The Web caching and prefetching can complement each other since the...
Optical Burst Switching (OBS) seems to be the next generation of the optical Internet backbone infrastructure due to its attractive characteristics. It combines the benefits of the circuit switching and packet switching method. Thus, more studies that highlight the features of OBS should be provided. In this paper, a detailed survey on OBS networks...
Web proxy caching plays a key role in improving the world wide web performance. However, the difficulty in determining which web objects will be re-visited in the future is still a big problem faced by existing web proxy caching techniques. In this study, we present a new approach which depends on the capability of support vector machine to learn f...
The capability of sensor nodes to collect and aggregate ambient data enables a mobile user to receive assistance from the network in charting a safe path through a potentially dangerous area. However, the information would be meaningless without localization. Applying an existing coarse-grain location-aware cluster (virtual infrastructure i.e. VI)...
Wireless mobile Ad-Hoc networks (MANETs) are networks of mobile nodes with no fixed infrastructures. Their peer-to-peer communication
architectures over shared wireless medium with no clear line of defense pose a number of challenges to security design. Some
previous works have used a form of digital signature for protection. However, there are sti...
The capability of sensor nodes to collect ambient data makes environmental monitoring as one of the prime applications of wireless sensor networks. Mobile sink traverses an area of interest in collecting data. With the help of virtual infrastructure (VI), an area is divided into cluster. However, the nature of the structure causes various sizes of...
The constant and rapid expansion of the Internet at such a high rate has caused its traffic to double every four to six months. A large portion of this traffic is known to be multimedia and real time traffic, which has strict requirements in term of bandwidth, delay, jitter, and loss rate. Recent studies showed that constant bit rate (CBR) and vari...
In this article, we explore the usage of Hilbert space filling curves in solving area covering for a target field, and also ensuring accurate gathering of periodic data collection. In covering the area, the mobility pattern that is based on modified Hilbert space filling curves suited best for ellipsoidal bounded area of interest. Comparative study...
With continuous acceptance of WWW as a de facto standard for human- computer interaction and human-human communication, it is desirable to develop collaborative applications under the framework of WWW. In this paper, we present a new script language called JACIE, which is designed to support rapid implementation of a wide range of multimedia collab...
Most current intrusion detection methods cannot process large amounts of audit data for real-time operation. In this paper, anomaly network intrusion detection method based on principal component analysis (PCA) for data reduction and fuzzy adaptive resonance theory (fuzzy ART) for classifier is presented. Moreover, PCA is applied to reduce the high...
1 abdsamad@utm.my, 2 yoes_mantho@sigma-snt.com, 3 witcha_chi@dusit.ac.th, 4 hanan@utm.my,, 5 knizam@utm.my, 6 dr.asri@utm.my ABSTRACT Intrusions pose a serious security risk in a network environment. The intrusion detection in computer networks is a complex research problem. Applying intrusion detection to the fast growing computational Grid enviro...
Sensor nodes are deployed to sense an environment for observing the physical world. The sensing field (an area of interest) can be represented as an ellipse. This paper proposes an algorithm for covering an elliptical shaped area of interest within wireless sensor network fields by modifying the Hilbert-space filling curve. Conventionally, an area...