Mohd Nazri Bin Ismail

Mohd Nazri Bin Ismail
National Defence University of Malaysia | UPNM · Department of Computer Science

Assoc. Prof. Dr.

About

121
Publications
137,734
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
416
Citations
Citations since 2016
40 Research Items
229 Citations
2016201720182019202020212022010203040
2016201720182019202020212022010203040
2016201720182019202020212022010203040
2016201720182019202020212022010203040
Introduction
Mohd Nazri Ismail is lecturing at National Defence University of Malaysia. He is completed his PhD in Computer Industry department (FTSM faculty) and specializing in Computer Networking, at UKM (2010). He has many years experience in R&D Computer Networking.
Additional affiliations
May 2013 - present
National Defence University of Malaysia
Position
  • Professor
January 2001 - April 2013

Publications

Publications (121)
Conference Paper
For the past few years, the Third Generation Partnership Project (3GPP) has introduced the Long-Term Evolution (LTE) as a critical answer to supporting the users' demand for a faster data connection. Nevertheless, another problem arises as the users move from one location to another; they will face a service interruption. As a result, switching fro...
Conference Paper
The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attacks including Stuxnet and Night Dragon attacks. Unk...
Conference Paper
Floods in Malaysia are described as flash floods and monsoon floods by the Department of Irrigation and Drainage (DID). Forecasting is a specialized form of predictive analysis used to predict future trends or behavior from existing data. Weather forecasting predicts the weather in the future from current data circumstances. As flood forecasting mo...
Conference Paper
A clear and bright atmosphere is much needed when humans use imaging equipment outside. Bad weather conditions due to haze and fog cause the resulting image to fade and blur. This is because the colour in the image has undergone a condition known as colour fading. The method currently used can be divided into 2 main methods, the first is the use of...
Conference Paper
The full adoption of Industry 4.0, especially in the manufacturing sector, is undoubtedly challenging because the organisation must consider numerous factors. It is important to note that to transform to Industry 4.0, the organisation should first focus on the human component of their system. Surveys have shown that unsuccessful and failed attempts...
Article
With the current development of science and technology, big data technology, the Internet of Things (IoT), cloud computing, and mobile Internet in Malaysia, it is time for smart campuses to be established and Higher Education Institution (HEI) should not have left behind. The smart campus is the upgraded version of a digital university, providing a...
Chapter
Full-text available
Usage of Industry4.0 enablers such as cloud computing, IoT and data analytics is still not common among SMEs. Many SMEs had failed in adopting digital transformations due to the conflicting values of digitalization with the company’s organizational culture. There is a gap in examining the moderating influence of digital organizational culture and i...
Chapter
Full-text available
In accordance to the National Security Council (NSC) Directive concerning the coordination between responsible agencies and committee, the Malaysian government has established a national disaster management agency with the sole purpose to cater matters related to disaster in a fast, orderly, systematic and coordinated manner. Furthermore, coordinat...
Article
The pixel value graphical password scheme was introduced to reduce the burden on memorizing a hard textual password and to hide the password information. It gives freedom for the user to utilizing their personal image their password, called PassPix, that makes it is more memorable and hidden in the same time. However, when the PassPix is travelled...
Article
Full-text available
The study investigates and develops components for implementing an effective and efficient military knowledge/information/communication in closed network architecture. Since military personnel are always on the move, the dissemination of knowledge/information/communication needs a mobile platform to accommodate mobility of people. The mobile and wi...
Article
Full-text available
The evolution of infotainment industries yet the advancement of cellular gadgets such as smartphones, tablets, and laptop had increased the request on cellular traffic demands. As a result, a Heterogeneous Wireless Network (HWN) has been introduced to fulfil users requests in having seamless mobility and better Quality of Services (QoS) for the use...
Conference Paper
Full-text available
The proliferation of optical network technology has helped to alleviate the emerging of next generation transport networks; also known as intelligent optical network. Network functions previously processed in the electrical domain have now gradually migrated to the optical domain, thus giving a huge upgrade in terms of the network capacity. However...
Conference Paper
Full-text available
In Malaysia, floods are the natural disasters that happen every year during the monsoon season from November until January. These flood caused serious damage to houses, roads, businesses, public facilities and even killed people. Though many steps have been taken by the government in order to prevent these incidents, but it seems went unsolved. Her...
Article
The study investigates and develops components for implementing an effective and efficient military knowledge/information/communication in closed network architecture. Since, military personnel are always on the move, the dissemination of knowledge/information/communication needs a mobile platform to accommodate mobility of people. The mobile and w...
Article
The study investigates and develops components for implementing an effective and efficient militaryknowledge/information/communication in closed network architecture. Since, military personnel are always on the move, the dissemination of knowledge/information/communication needs a mobile platform to accommodate mobility of people. The mobile and wi...
Article
Full-text available
The focus of this paper is to evaluate the implementation of Integrated Logistics Support (ILS) in the Malaysian Armed Forces (MAF). ILS is a disciplined and structured analysis approach, encompasses of management and technical activities, aimed to identify and improve supportability to achieve reliability and availability at optimising life-cycle...
Article
Full-text available
Accident detection systems help reduce fatalities stemming from car accidents by decreasing the response time of emergency responders. This paper focuses on development a framework for detecting accident and sending alert message using android application. The proposed framework developed in order to produce the android application or system with t...
Conference Paper
Full-text available
In the era of Internet of Thing (IoT) which a lot of devices are connected to the internet, children are spending more hours online interacting in cyber space that increase exposure to cyber security including pedophile activity. Increase of time spend online could increase the potential of online sexual grooming behaviours of child molesters. Sinc...
Article
In this project, we propose the use of VoIP application as an video conference instead of using the normal telephone line. This technology facilitates the users in the aspect of cost saving as the conference can be made access to the internet without hav of carrying out this project is to test the performance of the codecs installed in the softphon...
Article
A digital image is basically formed together information about the file (e.g. location captured, aut keywords. These properties allow database. Those images later can be retrieved from the system by running a text which explained the characteristics of an image. Although retrieving by text method is a common and widely used to find images in a very...
Article
Full-text available
Chemical inventory management system has been experiencing a new revolution from traditional inventory system which is manual to an automated inventory management system. In this paper, some review of the classic and modern approaches to chemical inventory management system has been discussed. This paper also describe about both type of inventory m...
Article
Full-text available
Mobile services support various situations in everyday life and with the increasing sophistication of phone functions, the daily life is much more easier and better especially in term of managing tools and apparatus. Since chemical inventory management system has been experiencing a new revolution from antiquated to an automated inventory managemen...
Article
Full-text available
This project is designed to develop Gesture Recognition Robot via Kinect Sensor. The idea of this project is starting from research of Kinect on pc. This paper is to provide plenty useful feature of Kinect such as controlling robot by using our gesture and motion. It is a breakthrough in the market as many applications will be using gesture or moti...
Article
Full-text available
This paper discusses the implementation of OLSR routing protocol on TL-MR3040 routers for MANET experiment. To date, many devices are equipped with wireless module; however most system is set to be in the form of structured communication. Indeed the current wireless devices such as WiFi router and access point has the ability to communicate in ad h...
Article
Full-text available
High availability plays a vital role in the Information Age. Ensuring availability involves the protection against network threats that could lead to unavailability, such as a Distributed Denial of Service (DDoS) attack. Relatively, Domain Name System (DNS) amplification attack is one of the biggest DDoS to date. The attack takes advantage of the c...
Article
Full-text available
This paper describes the development of Emulation Network Analyzer (ENA) for heterogeneous services in campus environment. The purpose of this paper is to inform this ENA able to plan and predict network performance. For this purpose, our ENA development is differ from others system such as application and hardware network analyzer. This study focu...
Article
This paper describes the development of Emulation Network Analyzer (ENA) for heterogeneous services in campus environment. The purpose of this paper is to inform this ENA able to plan and predict network performance. For this purpose, our ENA development is differ from others system such as application and hardware network analyzer. This study focu...
Article
Full-text available
Distributed Denial of Service (DDoS) attack is a growing issue in the Information Age. Following the rise of IPv6 and Internet of Things (IoT), these attacks are undeniably becoming more abusive. Relatively, Domain Name System (DNS) amplification attack is one of the biggest DDoS to date. The attack leverages the fact that a single DNS request (sma...
Article
Full-text available
This paper describes a preliminary study for proposing a viable mesh network communication for knowledge sharing platform. This network structure is to support military infantry personnel for utilizing mobile knowledge based system in restricted operation areas. The study investigates several components for implementing an effective and efficient c...
Article
Full-text available
Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students . QR code technology is the best technology to solve the problems faced by the current system. The system is capable of decod QR,...
Article
Full-text available
Digital image processing techniques (DIP) have been widely used in various types of application recently. A variety of these techniques are now being used in many types of application area such as object classification, intelligent system, robotics, biometrics system, medical visualization, military, law enforcement, image enhancement and restorati...
Conference Paper
Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students. QR code technology is the best technology to solve the problems faced by the current system. The system is capable of decod QR, i...
Conference Paper
Full-text available
Digital image processing techniques (DIP) have been widely used in various types of application recently. A variety of these techniques are now being used in many types of application area such as object classification, intelligent system, robotics, biometrics system, medical visualization, military, law enforcement, image enhancement and restorati...
Conference Paper
This paper describes a preliminary study for proposing a viable mesh network communication for knowledge sharing platform. This network structure is to support military infantry personnel for utilizing mobile knowledge based system in restricted operation areas. The study investigates several components for implementing an effective and efficient c...
Article
Full-text available
The aim of this study is to analyse the file transfer performance based on CPU, RAM and Packet Loss as a baseline using wired and wireless connections on IPv6 environment. This study was carried out because nowadays most researchers tend to analyse the network file transfer performance rather than the device itself. This study is important for rese...
Article
Full-text available
Voice over Internet Protocol (VoIP) nowadays is the popular communication technology. This paper is about adding face recognition as the biometric authentication for VoIP architecture and added on the end-user workstation for user login. We compare the VoIP performance on IPv6 and IPv4 LANs in presence in difference uses of softphone codecs. Softph...
Article
Full-text available
This paper describes the development of Emulation Network Analyzer (ENA) for heterogeneous services in campus environment. The purpose of this paper is to inform this ENA able to plan and predict network performance. For this purpose, our ENA development is differ from others system such as application and hardware network analyzer. This study focu...
Article
Full-text available
Nowadays, alternative media especially social media has played an important role in influencing people on any issues. If there is no controls on social media contents such as illegitimate rumours, edited images or videos and unauthentic statements, then it will affects the way people perceive certain issues based on the social media writers' view....
Article
Full-text available
Malware includes network viruses, worms, Trojan horses, rootkits, spyware, adware, malicious BHOs, rogue security software and other malicious programs. Malware infections could also be obtained through websites, electronic mails, or viruses that run from macros. A malware program attacks first a single network as its host. If the network is connec...
Article
Full-text available
Congestion control and internet network resources management are complex and critical issues in a high-speed packet switch data network, due to the emergence growth of modern multimedia streaming services. The increasing number of computer users in various organizations and institutions of higher learning have spurred a great deal of research on ne...
Article
Full-text available
Congestion control and internet network resources management are complex and critical issues in a high-speed packet switch data network, due to the emergence growth of modern multimedia streaming services. The increasing number of computer users in various organizations and institutions of higher learning have spurred a great deal of research on ne...
Article
Full-text available
Disastrous flood in Malaysia, since December 2014, leaved huge number of victims with deficiency of water, food, energy and transportation. Lack of potable water is one of the most serious problems, since it is the most vital factor or human life. Since water is relatively heavy goods to be delivered with wrecked transportation system, mass-supplyi...
Article
Full-text available
Crash Notify System is a system developed based on Android application for smartphone. This application monitor smartphone acceleration sensor in order to detect the sudden deceleration produced in CRASH. In case of an accident, an alarm will warn you that a crash has been detected. This application will automatically detect crash location and at t...
Article
Full-text available
The flooding based Denial-of-service attacks is one of the most common DoS attack targeting the web servers. Availability of the web server under this kind of attacks in danger. this attacks also cause bad influence on the networks bandwidth or in computing resources (CPU, Memory, Storage). Therefore, this paper will focus on studying the effects o...
Article
Full-text available
This paper presents the development of next generation e-learning systems for real-time video, voice conferencing and streaming technology over secure socket layer (SSL) IPv6 in campus environment. Development of the V2oIP e-learning systems has contributed a significant value to distance learning. The aim of this study is to design real time inter...
Book
Voice over Internet Protocol (VoIP) nowadays is the popular communication technology. VoIP is easy to use and cheaper to make phone call over the internet. This paper is about adding Fingerprint Authentication as the biometric authentication for VoIP architecture and added on the end-user workstation for user login. We compare the VoIP performance...
Book
This study was designed to focus on image processing system that will be implement to mobile robot. Mobile robot is was the idea from RoboSurveyor that control by jeopardy trough WiFi attach to mobile robot. The mobile is using IP Camera to capture image before it will be sent to my netbook to be process. Image Processing System is developed by usi...
Article
Full-text available
In spam filtering, the use of machine learning as a filtering method is prone to a high dimensionality of features space. In order to overcome the problem, a lot of feature selection methods have been introduced. Besides, the number of features used as an input to machine learning classifier is still high, thus it will delay the delivery of incomin...
Conference Paper
Full-text available
The flooding of spam emails in email server is an arm- race issue. Even until today, filtering spam from email messages has still become as an ongoing work by researchers. Among all of the methods proposed, methods by using machine learning algorithms have achieved more success in spam filtering. Unfortunately in machine learning, a high dimensiona...
Article
Full-text available
The flooding of spam emails in email server is an arm-race issue. Even until today, filtering spam from email messages has still become as an ongoing work by researchers. Among all of the methods proposed, methods by using machine learning algorithms have achieved more success in spam filtering. Unfortunately in machine learning, a high dimensional...
Conference Paper
Full-text available
A performance of anti-spam filter not only depends on the number of features and types of classifier that are used, but it also depends on the other parameter settings. Deriving from previous experiments, we extended our work by investigating the effect of population sizes from our proposed method of feature selection on different learning classifi...
Article
Full-text available
In this research, we propose an architectural solution to implement file transfer service (FTP) in IPv6 environment network. IPv6 is considered to be the next-generation Internet protocol. Thus, this study is to analyze the size of files transfer performance and to measure Quality of Service (QoS) delivered by IPv6 using best effort approach in com...
Article
Full-text available
Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCA...
Article
Full-text available
The internet is gaining a lot of importance day by day, especially with the emergence of cloud technology. This new technology has made a new computing service to end users that include, PaaS, SaaS. On the other hand, this technology was accompanied with some shortages. The most serious obstacle is the security challenges because of the cloud is ch...
Article
Full-text available
As a result of integration of many techniques such as grading, clustering, utilization computing and resource's sharing, cloud computing has been appeared as multi element's composition technology, it offers several computing services such as IaaS (infrastructure as service), PaaS (platform as service) and SaaS (software as service) based on pay...
Article
Full-text available
In this research, we propose an architectural solution to implement VoIP over Virtual Private Network (VPN) technology in campus environment between branches. The objective of this evaluation is to measur