Abdullah Gani

Abdullah Gani
University of Malaya | UM · Faculty of Computer Science & Information Technology

Phd (Sheffield)

About

46
Publications
51,956
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,243
Citations
Additional affiliations
September 2000 - August 2004
The University of Sheffield
Position
  • Researcher
January 1980 - present
University of Malaya
Position
  • Deputy dean of Research

Publications

Publications (46)
Article
Mobile learning is posited to be an effective learning tool for various learners. However, limited studies have been conducted to explore formal part-time learners’ behavior towards mobile learning. Therefore, this study investigated the level of acceptance of mobile learning by formal part-time learners in Malaysia. A theoretical model was develop...
Article
Adult learner performance has become a significant challenge in education. Adult learners are identified as being of productive age in engaging with multiple commitments, including studying. The multiple engagements make managing their time and focus difficult, contributing to a high institutional dropout rate. This situation has reduced the number...
Conference Paper
Full-text available
Recently, the preference of users shifted the computational platform to resource constrained smartphone devices as users prefer to work while on the go. The shift of information access paradigm on smartphone devices demands high functionality applications to enrich user experience that as a result surges battery's charge consumption rate. Energy es...
Article
Satellite-based remote sensing imaging can provide continuous snapshots of the Earth’s surface over long periods. River extraction from remote sensing images is useful for the comprehensive study of dynamic changes of rivers over large areas. This paper presents a new method of extracting rivers by using training samples based on the mathematical m...
Article
Full-text available
Wireless sensor network (WSN) has become part of human life as it is used in several applications including healthcare, environment and agricultural, public safety, military, transportation as well as in the industry. In spite of its usefulness, it is challenging to maintain long-term operations due to limited battery life. Several energy efficient...
Article
Full-text available
Mathematical models for rivers differ according to the properties of the river. These models can be classified into drying–wetting, motion, masses, resources, and so on. This paper studies a system for practical water level prognostication and prediction during dry–wet seasons at the Terengganu River. The mathematical model is a generalized master...
Conference Paper
Full-text available
An efficient and scalable broadcast are two essential features of structured overlay networks which used in large scale distributed computing systems and in peer-to-peer networks. The existing broadcast based algorithms over the structured overlays experience certain issues due to a decentralised nature of such networks in which nodes join and leav...
Article
Full-text available
Mobile devices have become a significant part of people's lives, leading to an increasing number of users involved with such technology. The rising number of users invites hackers to generate malicious applications. Besides, the security of sensitive data available on mobile devices is taken lightly. Relying on currently developed approaches is not...
Article
Full-text available
Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion device...
Article
Full-text available
Gripping and holding objects are key tasks for robotic manipulators. The development of universal fingers able to pick up unfamiliar objects of widely varying shapes and surfaces is a very challenging task. Passively compliant underactuated mechanisms are one way to obtain the finger which could accommodate to any irregular and sensitive grasping o...
Article
In this study, a hybrid algorithm based on a refined high-order weighted fuzzy algorithm and an imperialist competitive algorithm (RHWFTS-ICA) is developed. This method is proposed to perform efficiently under short-term load forecasting (STLF). First, autocorrelation analysis was used to recognize the order of the fuzzy logical relationships. Next...
Article
Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety and infotainment. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several techno...
Article
Full-text available
The latest developments in mobile devices technology have made smartphones as the future computing and service access devices. Users expect to run computational intensive applications on Smart Mobile Devices (SMDs) in the same way as powerful stationary computers. However in spite of all the advancements in recent years, SMDs are still low potentia...
Conference Paper
Full-text available
The recent efforts in Mobile Cloud Computing (MCC) focus on defining novel methods, policies and mechanisms for efficiently leveraging the services of cloud data centers for mitigating resources constraints in mobile devices. To test these newly developed methods and policies, researchers need tools for evaluating the hypothesis prior to deployment...
Conference Paper
Providing security for sensor nodes is one of the important issues in WSNs because they are deployed in the harsh environment. WSNs are distributed in nature and preparing centralized security solutions cannot be a suitable for WSNs. There are various sensor holes that may be formed in WSNs and create variations in network topologies and also threa...
Article
Full-text available
This paper presents a new design hybrid honeypot to improve the exposure aspect of intrusion deception systems and in particular, research server honeypots. A major attribute in the design of a server honeypot is its passiveness, which allows the honeypot to expose its services and passively wait to be attacked. Although passiveness of a server hon...
Article
Full-text available
This paper aims to present a model to achieve complex searching (e.g. Wild card searching, blind searching, full text searching, metadata searching, etc.) over Structured P2P Overlay under dynamic environment. Lack of complex searching over Structured Overlay network and poor resilience due to peer dynamics makes it unsuitable for implementing the...
Article
Full-text available
Today, communications, information networks, e-Commerce, e-Education, and all other e-Services and infrastructures tend to play a major role in our daily life and global economy. Nowadays, in modern society, Information and Communications Technology (ICT) is the force that drives productivity and creates a higher standard of living. The growing dep...
Article
Full-text available
The bandwidth allocation in both wired and wireless networks has posed great challenges to network engineers for improving desirable Quality of Service (QoS), Bandwidth allocation is always an important element for improve QoS of network. Despite this, IEEE 802.16e-2005 does not have a bandwidth allocation algorithm or mechanism to support (worldwi...
Conference Paper
This paper presents an analysis on performance of logarithmic degree structured P2P (peer-to-peer) overlay networks. P2P network consist of highly transient peers, where peers join and leave the network randomly also known as dynamic environment. It is, therefore difficult to measure the performance of the parameters in real environment. The design...
Article
Full-text available
This paper presents an efficient and effective framework for the design and development of enhanced selective video encryption scheme for H.264/AVC based on advanced encryption standard (AES). Due to the importance of maintaining the security of information that is publicly displayed, many approaches have been implemented to provide security for in...
Article
Full-text available
The heartbeat of network is the routing services which are available upon the execution of protocols. Many routing protocols emerge over one another to strive for betterment in performing the main function of routing the packets to destination efficiently. Despite the superiority of the new protocols in certain feature, the old routing information...
Article
Full-text available
The short message service (SMS) is one of the highly used and well-tried mobile services with global availability within all GSM networks. The existing SMS is limited to the transmission of secure plain text between different mobile phone subscribers. SMS does not have any built-in procedure to authenticate the text and offer security for the text...
Article
Full-text available
Today user authentication stands out as one of the most essential areas in information security which has several ways of being implemented. From time in memorial authentication schemes that apply strong text-based passwords have been typically expected to offer some assurance of security. But committing to memory such strong passwords can prove to...
Article
Bandwidth allocation is always an important element in both fixed and wireless networks. Despite this, IEEE 802.16e-2005 does not have a bandwidth allocation algorithm or mechanism to support WiMAX (worldwide interoperability for microwave access) network presently. This includes both uplink (UL) and downlink (DL) directions. Thus, most of the rese...
Article
Full-text available
Human life style change substantially when the cellular technology goes commercial. Short Messaging Service (SMS) and Multimedia Message Service (MMS) play important roles in our daily life. The recent report carried out by Mobile Data Association (MDA) [1] shows that the yearly growth of SMS and MMS achieves 30 percent from year 2007 to 2008. Conv...
Article
Full-text available
The 5th generation is envisaged to be a complete network for wireless mobile internet, which has the capability to offer services for accommodating the application potential requirements without suffering the quality. The ultimate goal of 5G is to design a real wireless world, that is free from obstacles of the earlier generations. This requires an...
Article
Full-text available
This paper presents our method to improve lightweight reservation protocol. This was inspired by the ever increasing volume of multimedia traffic over the Internet which demanding quality of service beyond the traditional best-effort. The Integrated Services model relies on the Resource reservation Protocol (RSVP) for signaling and reserving resour...
Article
Full-text available
This paper presents a new method to improve performance of DSR in Ad Hoc Network. We present an analysis of DSR protocol and propose our algorithm to improve the performance of DSR protocol by using ACK reply path as a backup route when an original route fails in Mobile Ad Hoc networks. In the traditional DSR protocol, a backup route will be initia...
Article
Full-text available
The growing dependence of modern society on telecommunication and information networks has become inevitable. The increase in the number of interconnected networks to the Internet has led to an increase in security threats and cybercrimes such as Distributed Denial of Service (DDoS) attacks. Any Internet based attack typically is prefaced by a reco...
Article
Full-text available
Although intelligent intrusion and detection strategies are used to detect any false alarms within the network critical segments of network infrastructures, reducing false positives is still a major challenge. Up to this moment, these strategies focus on either detection or response features, but often lack of having both features together. Without...
Article
Full-text available
In this paper, we present our new proposed protocol to enhance the TCP/IP versatility as the main protocol for wireless data transmission. TCP/IP has shown its superiority in the selection of protocol for establishing wired networks. Unfortunately, its superiority cannot be extended to wireless networks. However, we believe that the integration of...
Article
Full-text available
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user requirements as an effective communication and information delivering service. Since SMS/MMS become so popular...
Article
This paper presents an application of Markov Decision Process (MDP) into the provision of traffic prioritisation in the best-effort networks. MDP was used because it is a standard, general formalism for modelling stochastic, sequential decision problems. The implementation of traffic prioritisation involves a series of decision making processes by...
Conference Paper
Full-text available
This paper presents an intelligent User Manager Agent System (UMAS) in which it has a capability of making a management decision for balancing the network load with the users' requests for accessing network resources. A conventional users' request for accessing network resources depends on rigid rules setting and it can affect the overall performan...
Article
Full-text available
This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. Network resources, especially in a Smart School, are in short supply and relatively expensive to acquire, therefore a control mechanism should be in place so that available resources can be allocated for legitimate us...
Article
Full-text available
The increase in the number of interconnected networks to the Internet has led to an increase in security threats, such as DoS attacks. The existing network servers, routers' communications protocols, firewalls and Intrusion Detection Systems (IDSs) are not well designed to deal with DoS attacks. An effective solution to DoS attacks must be based on...
Article
Full-text available
A self-healing network is a 'dream' for every network designer today. Abstractly it is a network that c a-pable of maintaining the availability of network services. This would not be impossible to be turned into a reality if the networks are embedded with intelligence. By having the intelligent capability the network can be self-managed in response...
Article
Full-text available
This paper presents the implementation of traffic prioritisation in a packet switch using an intelligent arbiter. Today, equal treatment on network traffic is no longer can be accepted due to variation in requirements and criticality of applications. Ideally, network traffic has to be treated and to be managed as so to deliver a better quality of n...
Article
Full-text available
Steganography is an art that involves the concealing of information with the aim of making the communication invisible. Unlike cryptography, where the main aim is to secure communications from the Snooper by encoding that data in such a way that it becomes visible but not understood. In this paper, we propose a framework that will integrate both st...

Network

Cited By

Projects

Projects (2)
Project
Emergency department systems are meant to ensure the timely delivery for essential healthcare services through complex systems. (ED) offers various services and have several components in its parts. Examined long previous research on system engineering and quality of healthcare resulting on these are influenced by operational management. Real time data are very helpful for decision making for any systems. Patient output feedback and satisfaction can be ensured with engineered management. EDs have become evident particularly in current scenario when the world is in the grip of the deadly COVID-19. All this implies that analysis is significant for improvement of services in the emergency department. Digital health has become an essential feature of the healthcare sector specifically in present situation of COVID-19 pandemic. Capacity of ED resources are over-utilized and insufficient. Capacity management is less quality and poor specially in devolving countries. Overcrowd patients’ arrival put resources at high usages, Management readiness is not capable to mobilize available resources at very minimum time. Performance of ED is failed due to huge volume of unexpected patients. Absence of a model for simulating the KPIs of ED based on real time events to enhance advance decisions. Operational effective management is absent within Patient ambulance transfer. Abstraction of research from 2000 to 2019 to understand emergency department processes was involved to create taxonomy on emergency services and its operations management. The last twenty years methods, problems, solutions allocated with emergency department were abstracted. The assessment of service quality of emergency departments improved significantly with the development of new tool of system performance indicators. In this context, the formulation of sensitive assessment proved to be appropriate for simulation experiment. The new tool was validated and showed the value of Kappa to be 0.763 and reliability Cronbach’s alpha to be 0.827. a reduction of patient waiting time at emergency department specially in Saudi Arabia as 38.57 percent less than current actual waiting time at medium hazard scenarios for door-to-door service time and with 61.63 percent of ED possessing time in Malaysia. Ninety percent of simulated cases was found to be within optimal range for data was collected before COVID-19 pandemic.
Archived project
Study and survey on the Internet bandwidth allocation techniques