Osman Ghazali

Osman Ghazali
Universiti Utara Malaysia | UUM · School of Computing

PhD, MSc and BIT

About

92
Publications
48,933
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
691
Citations
Introduction
Research Interests: Internetworking, Cloud Computing and Information Security
Additional affiliations
June 1996 - August 2008
Universiti Utara Malaysia
Position
  • Lecturer

Publications

Publications (92)
Preprint
Full-text available
Recently, mobile computing is known as a fast-growing utilization of people's daily life. However, the main is the limited mobile devices’ resources such as processing capability, storage space and battery life. With the development of cloud computing, mobile devices’ resources are improved with the help of cloud services, which resulted an emerged...
Article
Full-text available
Fueled by the wide interest for achieving rich-storage services with the lowest possible cost, cloud computing has emerged into a highly desired service paradigm extending well beyond Virtualization technology. The next generation of mobile cloud services is now manipulated more and more sensitive data on VM-based distributed applications. Therefor...
Article
Full-text available
Document verification is a complex domain that involves various challenging and tedious processes to authenticate. Moreover various types of documents for instance banking documents, government documents, transaction documents, educational certificates etc. might involve customized verification and authentication practices. The content for each typ...
Chapter
The Blockchain Technology has recently been a hot topic proposed in many industries such as Financial, Healthcare, Business, E-Government, Education, etc. The Blockchain can simply be defined as a distributed database or public ledger that contains records of all digital transactions/events that have transpired amongst the parties involved. The tec...
Article
Full-text available
span lang="EN-US">The demands for cloud computing services is rapidly growing due to its fast adoption and the migration of workloads from private data centers to cloud data centers. Many companies, small and large, prefer switching their data to the enterprise cloud environment rather than expanding their own data centers. As a result, the network...
Article
Full-text available
Graduation certificates issued by universities and other educational institutions are one of the most important documents for a graduate. It is a proof of graduate's qualifications and can be used to advance forward in one's career and life. However, due to advances in software, printing and photocopying technologies, forgery of those certificates...
Article
Full-text available
Customer disposition to data, nature of the information on site, protection concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-commerce sites and consumers are trust as well as security. A belief that someone is good and honest...
Article
Full-text available
The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing into mobile devices to augment the capacities of the mobile devices resources such as smartphones...
Article
The main purpose of intrusion detection system (IDS) is to find out intrusions among normal audit data and this can be considered as a classification problem. This problem is brought about by the user datagram protocol (UDP) which is a connectionless protocol that means it does not require a formal handshake to get the data flowing and has no need...
Article
Full-text available
This paper reviews the method of classification of the types of images used in data concealment based on the perspective of the researcher’s efforts in the past decade. Therefore, all papers were analyzed and classified according to time periods. The main objective of the study is to infer the best types of images that researchers have discussed an...
Conference Paper
Full-text available
Academic performance of a student is one the main areas to be devoted to and implemented by the university. This study examined whether and how the technologies provided will affect students’ academic performance among university students. A sample of l47 UUM undergraduate students was analyzed from their Wi-Fi usage. The students’ Cumulative Grade...
Article
Full-text available
Named Data Network (NDN) architecture is one of the newest and future-aspired Internet communication systems. Video-on-Demand (VoD) has rapidly emerged as a popular online service. However, it is costly, considering its high bandwidth and popularity. Internet on-demand video traffic has been growing quite fast, and on-demand video streaming has gai...
Article
Full-text available
Named Data Network (NDN) architecture is one of the newest and future-aspired Internet communication systems. Video-on-Demand (VoD) has rapidly emerged as a popular online service. However, it is costly, considering its high bandwidth and popularity. Internet on-demand video traffic has been growing quite fast, and on-demand video streaming has gai...
Article
Full-text available
This paper reviews the method of classification of the types of images used in data concealment based on the perspective of the researcher's efforts in the past decade. Therefore, all papers were analyzed and classified according to time periods. The main objective of the study is to infer the best types of images that researchers have discussed an...
Conference Paper
Full-text available
Mobile Ad-hoc Networks (MANETs) have neither fixed routers nor fixed locations and their performance mainly depends on the routing mechanism and nature of node mobility. Due to mobility in Ad-hoc network, the topology of the network may change randomly. The mobility models represent the moving behavior of each mobile node (MNs) in the MANET that sh...
Article
Full-text available
Students' academic performance is one of the main concerns that demand serious investment from the educational provider. One of the investments pertains to the technology support, namely, the Wi-Fi facility in the campus, aiming at providing students a meaningful learning experience. The study elaborated in this paper, sought explanation on the rel...
Article
Information-Centric Networking (ICN) is an appealing architecture that has received a remarkable interest from the research community thanks to its friendly structure. Several projects have proposed innovative ICN models to cope with the Internet practice, which moves from host-centrism to receiver-driven communication. A worth mentioning component...
Article
Full-text available
The design of next generation networks in various technologies under the "Anywhere, Anytime" paradigm offers seamless connectivity across different coverage. A conventional algorithm such as RSSThreshold algorithm, that only uses the received strength signal (RSS) as a metric, will decrease handover performance regarding handover latency, delay, pa...
Article
This paper proposes the architecture and components of a web-based content sequencing system known IT-Tutor. It organizes an appropriate sequence of learning content based on individual students’ prior knowledge. The dynamic and flexible organization of learning content is meant to achieve adaptive computer-based learning. IT-Tutor was evaluated in...
Technical Report
Full-text available
With the surge in the offerings of the cloud computing services, transparency, trust and confidence towards cloud service providers are among the prominent issues in the cloud service selection processes. Since trust is regarded as an essentially secured relation within a distributed network environment, selecting cloud services via the internet fr...
Article
Full-text available
Cloud computing is one of the latest trends in IT; its values have been proven effectively in various sectors. Education is one of these sectors. In the 21st century, the students can no longer be restricted to the traditional teaching methods, an example of which is the lecturer lecturing and the student listening in the classroom. However, this c...
Article
Students' engagement in computer-based learning activity is hard to regulate and maintain at an optimal level. Hence, many students do not benefit from it, and they tend not to use it again after the first attempt. This is a challenge towards ensuring the sustainability of future computer-based learning. In order to overcome this issue, this resear...
Conference Paper
One of the major issues and challenges facing today’s IT experts is planned for unprepared or unforeseen incidents, particularly in response to a security incident. Premium Pension Limited Nigeria (PPLN) manages much information that is very confidential such as Government Retirement Savings Account (GRSA) salary pensions. However, in an organizati...
Conference Paper
Full-text available
The utilization of the Internet has grown tremendously resulting in more critical data are being transmitted and handled online. Hence, these occurring changes have led to draw the conclusion that the number of attacks on the important information over the internet is increasing yearly. Intrusion is one of the main threat to the internet. Various t...
Conference Paper
Full-text available
Stepping stone connection has always been assumed as intrusion since it first research past twenty years ago. However, not all stepping stone connection is malicious. This paper proposes an enhanced stepping stone detection (SSD) technique which capable in identifying legitimate connection from stepping stone connections. Stepping stone connection...
Chapter
With the introduction of computer networks and distributed computing, the utility of computing resources has been increased compared to individual isolated resources. Distributed systems enable multiple users to share the same resource, making the effectiveness of the resources high while reducing the per user cost of the resources. From time to ti...
Conference Paper
Full-text available
Cloud computing is the newest computing paradigm that makes computing resources available over the Internet on a utility costing basis. Cloud computing offers many advantages to users in terms of reduced cost, elimination of system administrative functions, increased flexibility, better reliability and location independence. Though these are defini...
Article
Full-text available
Cloud computing has become the most promising way of purchasing computing resources over the Internet. The main advantage of.cloud computing is its economic advantages over the traditional computing resource provisioning. For cloud computing to become acceptable to wider audience, it is necessary to maintain the quality of service (QoS) commitments...
Article
Full-text available
Quality of service piays an important role in making distributed systems. Users prefer service providers who meet the commitments specified in the Service Level Agreements to these who violate them. Cloud computing has been the recent entrant to the distributed system market and has revolutionized it by transforming the way the resources are access...
Article
Location information to be up todate is a fundamental operation in positionbased routing protocols for mobile ad hoc networks. The location information accuracy level depends on beacon sending frequency and the neighbors' entries timeout period. This instigates the need for dynamic updating approach with improved technique to refresh neighbors' ent...
Conference Paper
According to the United Nations, almost 50 percent of world population and more than 70 percent of that of developing countries are living in rural areas. Majority of this population live in poverty especially in North and sub Saharan Africa. Rural population face unique problems compared to their urban counterparts in terms of access to technologi...
Article
Full-text available
This paper evaluates the performance of Reliable Multipath Dynamic Source Routing Protocol RM-DSR protocol with different network size compared to DSR protocol. RM-DSR developed in the mobile ad-hoc network to recover from the transient failure quickly and divert the data packets into a new route before the link is disconnected. The performance of...
Article
Quality of service plays an important role in distributed systems. Cloud computing has been the recent entrant to the distributed system market and has revolutionized computing by changing the way computing resources are accessed and paid for. Users can access cloud services and pay only for the usage similar to utilities. Trust computing systems c...
Article
The Mobile Ad Hoc Network (MANET) is wireless network which provides communication among wireless mobile hosts without the need of any standing network infrastructure. In such networks, and to facilitate communication between participating nodes, every node has to offer routing services. Routing in MANET is responsible for selecting and forwarding...
Article
Full-text available
Anti-virus systems and most current intrusion-detection systems are signature based technology. The problem in signature-based technology is that they can only detect a known worm with identified signatures that have been produced recently. The detection system must therefore be able to handle known and likewise, unknown threats but the false alarm...
Article
Accessing required information via the Internet is becoming significant to improve the quality of life. The purpose of this study is to identify the information needs of rural communities. Fieldworks were carried out involving surveys, interviews and observations. The findings show that the types of information requested by these communities includ...
Article
Full-text available
Cloud computing has been attracting the attention of several researchers both in the academia and the industry as it provides many opportunities for organizations by offering a range of computing services. For cloud computing to become widely adopted by both the enterprises and individuals, several issues have to be solved. A key issue that needs s...
Conference Paper
Full-text available
Most of the multimedia applications use the User Datagram Protocol (UDP) as a transport layer protocol because it is suitable for the delivery of multimedia data over the Internet. However, the use of UDP could endanger the stability of the network because there is no congestion control applied. To a certain extent, the network can collapse if too...
Conference Paper
This paper introduces the notion of a reliable and efficient greedy routing provisioning (RGRS) in mobile ad hoc networks. The proposed RGRS constructed of two mechanisms in the context of improving and enhancing greedy routing. These mechanisms are Dynamic Beaconing Update Mechanism (DBUM), and Dynamic and Reactive Reliability Estimation with Sele...
Conference Paper
In Mobile Ad-hoc Networks (MANETs), greedy forwarding strategy (GFS) seems to be the method of choice for position-based routing protocols. During the last decade GFS has become the subject of research. However, with greedy routing there is no guarantee that a node could always find a suitable next-relay hop to forward its packet. Of such situation...
Conference Paper
Cloud computing has been the new paradigm in distributed systems where users can access computing resources and pay only for usage similar to other utilities like electricity, water, gas and telephony. Service Level Agreements signed at the beginning between the clients and service providers stipulate conditions of the services including the QoS re...
Article
Full-text available
A computer worm works without any user intervention. It is a self-replicating program by spreading copies of itself to other computers on the network. CodeRed I worm attack spread across the world and squandered more than twenty billion dollars. Anomaly detection systems are capable of detecting unknown worm by depending on failure connections but...
Conference Paper
Distributed computing has grown rapidly in the recent years. In addition to the increase in the size of individual networks, new types of networks have also emerged providing different types of services to clients. While these systems provide an invaluable service, they also face certain practical issues. Security is one of the most important issue...
Article
Full-text available
Worms are widely regarded to be a major security threat faced by the Internet today. Active worms spread in an automated fashion, which can flood the Internet in a very short time, Incidents such as Conficker worm, detected in November 2008, a computer worm targeting the Microsoft Windows operating system, once infected 15 million hosts. In this st...
Article
Full-text available
Forward Error Correction has been implemented with Automatic Repeat reQuest to overcome packet losses and avoid network congestion in various wireless network conditions. The number of FEC packets is needed to be generated adaptively due to various network states and burst error condition. There are a number of proposed Adaptive FEC mechanisms that...
Article
Full-text available
The performance of DCCP TCP-like degrades significantly over long delay link networks. Despite the TCP-like congestion control mechanism follows the TCP SACK, the performance is really affected by the congestion window growth algorithms as employed by Jacobson based TCP variants. In this paper, all the experiments are done using Network Simulator n...
Conference Paper
Cloud computing is considered the new paradigm in computing that would make computing a utility. Once the cloud computing becomes available widespread, many service providers would market their services at different qualities and prices. When this happens, the customers would be required to select the right service provider who could meet their ant...
Article
Anti-censorship software was originally developed to fight internet censorship in China. A anti-censorship software such as UltraSurf, Freegate, Gpass, GTunnel and FirePhoenix became popular with stubborn users who used the Internet for thier own purposes and disobeyed the organization's policies. Statistics show that Facebook, and YouTube are rank...
Article
This research focuses on investigating the FEC mechanism as an error recovery over the wireless network. The existing adaptive FEC mechanism faces major drawbacks which is the reduction of recovery performance by injecting too many excessive FEC packets into the network. Thus, this paper proposes the implementation of enhanced adaptive FEC (EnAFEC)...
Article
Full-text available
Cloud computing has been considered as the 5th utility after electricity, water, gas and telephony. When the cloud computing matures, there will be multiple vendors offering different services at different Quality of Services and at different prices. This would necessitate new tools and mechanisms for analyzing the performance of the system for mat...
Article
The aim of this paper is to present a new shaped Variable Bit Rate (VBR) for video transmission, which plays a crucial role in delivering video traffic over the Internet. This new shaped algorithm, referred to as Slight Delay - Shaped Variable Bit Rate (SD-SVBR). It is designed based on the Shaped VBR (SVBR) algorithm that is devised for real-time...
Article
Cloud computing has been considered the new computing paradigm that would make the computing a utility. With the widespread acceptance of cloud computing, computing resources including computational power, storage, development platform and applications will be available as services. Hitherto computing resources were considered capital items and cus...
Conference Paper
Full-text available
Video transmission over the wireless network faces many challenges, and the most critical challenge is packet loss. Therefore, Forward Error Correction (FEC) is used to recover the packet loss by adding extra packets known as redundant packet or parity packet. Currently, FEC techniques have been adopted with Automatic Repeat reQuest (ARQ) to overco...
Conference Paper
Full-text available
Mobile ad hoc networks are characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Design of efficient routing protocols in such networks is a challenging issue. A class of routing protocols called on-demand protocols have recently attained more attention as compared to proactive routing protoc...
Conference Paper
Full-text available
Recently, there has been a growing interest in Mobile Ad Hoc Network (MANET). Ad hoc network becomes popular since it can provide useful personal communication in certain applications such as battlefield, academic, and business without any support where no fixed infrastructure exists. All mobile nodes communicate with each other direct or through i...
Article
Full-text available
Recently, there has been a growing interest in Mobile Ad Hoc Network (MANET). Ad hoc network becomes popular since it can provide useful personal communication in certain applications such as battlefield, academic, and business without any support where no fixed infrastructure exists. All mobile nodes communicate with each other direct or through i...
Conference Paper
Cloud computing has been considered as the 5th utility as computing resources including computing power, storage, development platform and applications will be available as services and consumers will pay only for what consumed. This is in contrast to the current practice of outright purchase or leasing of computing resources. When the cloud comput...
Article
Full-text available
For the last few years, a number of routing protocols have been proposed and implemented for wireless mobile Ad hoc network. The motivation behind this paper is to discover and study the pause time effects on Ad hoc on Demand Distance Vector (AODV) protocol and find out the node pause time optimal setting for this protocol where Reference Point Gro...
Article
Full-text available
Ad-hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols plays an important role. Due to mobility in Ad-hoc network, the topology of the network may change rapidly. The mobility models represent the moving behavior of each mobile node in the MANET...
Conference Paper
Full-text available
Forward Error Correction (FEC) techniques have been adopted with Automatic Repeat reQuest (ARQ) to overcome packet losses and avoid network congestion in various wireless network conditions. Two factors have been used which are queue length and packet retransmission times. According to these two factors, two different weight values are used to gene...
Conference Paper
Packet pacing in TCP has been introduced as one of the solutions to alleviate bursty traffic in TCP. In this paper, we investigate the performance of paced and standard (unpaced) TCP when coexist with DCCP over short and long delay link networks. We found that paced TCP for the entire TCP connection performs better in long delay link, with smoother...
Article
Rate control plays an important role in delivering video traffic over the Internet due to highly bursty nature of the video data and variability of the network bandwidth. The researchers in this area are either controlling the video rate coding or optimizing the congestion control to support the video traffic transmission. As a consequence of layer...
Article
In this paper, we report an investigation on the impact of large block Forward Error Correction (FEC) with Drop Tail (DT) and Random Early Detection (RED) queue policies on network performance and quality of video streaming. FEC is a technique that uses redundant packets to reconstruct dropped packets, while DT and RED are the most popular queue ma...
Conference Paper
Video traffic is a variable bit rates (VBR) data source in nature and it generates highly bursty traffic. Recent implementations mostly buffer the media source in order to regenerate it in the form of constant bit rates (CBR). Consequently, it will add more delays to the system and thus unable to support the original nature of the video data. Inspi...
Conference Paper
The need for TCP friendly transport protocol is vital for the future Internet. With this motivation, IETF has defined a new transport protocol, DCCP, to be a friendly transport protocol when coexist with other congestion-controlled transport protocol such as TCP. DCCP is an unreliable transport protocol which is designed to be able to carry unrelia...