Hatim Mohamad Tahir
Universiti Utara Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hatim Mohamad Tahir.
international conference on information and communication technologies | 2006
Hatim Mohamad Tahir; Azman Ta'a; Norshakinah Nasir
Moving from Internet protocol version four (IPv4) to Internet protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incompatible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been proposed by IETF IPng Transition Working Group (NGTrans). One of them is dual stack transition mechanism (DSTM). This paper reviews the implementation of DSTM over our IPv6 test-bed (6iNet) in University Utara Malaysia (UUM). This paper also describes our experience of configuring 6iNet. 6iNet is the first IPv6 test-bed in UUM and has become a platform for IPv6 research in UUM
Archive | 2015
Norliza Katuk; Hatim Mohamad Tahir; Nur Haryani Zakaria; Mohamad Subri Halim
This article presents a research concerning password management and single sign-on for accessing Internet applications. Many Internet applications require users to subscribe to their services and authenticate themselves through the use of login credentials. The number of such applications is increasing exponentially, which caused ineffective login credential management among users. This study was conducted with two objectives (i) to identify how users manage their usernames and passwords and (ii) to examine whether users see the benefits of single sign-on. To achieve these objectives, a focus group interview was conducted on students from a local university. The results of the study suggested that the students did not practise proper password management. Further, it suggested that single sign-on may not be the immediate solution to improve the students’ password management.
international conference on multimedia computing and systems | 2011
Mohamad Rizal Abdul Rejab; Khuzairi Mohd Zaini; Fazli Azzali; Hatim Mohamad Tahir
This paper conduct a comprehensive simulation study on the behavior of TCP-friendly Rate Control (TFRC) protocol over Ad-Hoc On Demand Vector (AODV) routing protocol and Dynamic Source Routing (DSR) protocol. The aim are first, to measure the performance of TFRC in terms of throughput, delay and jitter. The second objective is to identify which Mobile Ad-Hoc Network (MANET) routing protocols work well with TFRC. We conduct the experiment by sending multimedia streaming traffic carried by TFRC over AODV and DSR respectively. Random-Waypoint mobility model is used for both experiments. Results obtained shows that in average TFRC over AODV has more throughput and less delay as compared with TFRC over DSR. However, in terms of jitter, TFRC over DSR gives better result.
international conference on multimedia computing and systems | 2014
Hatim Mohamad Tahir; Abdullah Hussein Al-Ghushami; Zainor Ridzuan Yahya
the challenge for future generation of wireless environment is on how to choose the appropriate wireless access network connection when there are several different wireless networks are existed. Hence, a vertical handover network selection (VHONS) being used to aid in term of service quality for users satisfaction of the mobile terminal. This article intends to propose a new method of choosing the vertical handover network. This method covers the weight distribution and cost factor techniques. The weight distribution is used to measure different weights for existing wireless network based on the users preference and mobile terminal power. The cost factor technique is also used to identify the cost for performing handover target by considering every network parameters and its weight. Results obtained showed that the algorithm has the ability to increase users satisfaction compared to other algorithms, which consistently choose one accessible network.
International Journal of Future Computer and Communication | 2013
Mohd Nuruzzaman; Azham Hussain; Hatim Mohamad Tahir
Software development remains complex, expensive and risky.Thus, the need for reusability has become obvious.Through reusability web developers/engineers can save countless hours and millions of dollars in development cost. Object-oriented (OO) framework mechanism provides a new vehicle for reuse and enables web engineers to customize or reuse various aspects in web engineering such as customizing one or more elements of user interface, automatically generate event handlers, data handlers or related data elements based on changes made by them.The OO framework mechanism includes tags and scripts that predefine some generic web application activities and a common programming interface for generating a framework customization environment. This study provides a novel solution to produce high quality web applications within a shortest development timeframe through the means of customization, reusability, extensibility and flexibility.At the end, this study will conduct a comprehensive evaluation on the proposed OO framework. Building on previous works, this study emphasized the reuse of design, code and testing as a tool to uncover strengths and weaknesses of the OO framework for dynamic web engineering.
Advanced Science Letters | 2017
Nur Haryani Zakaria; Nadia Hasidah Mat Nayan; Hatim Mohamad Tahir; Norliza Katuk; Abubakar Mohammed
The problem of password memorability among users has led to the introduction of Single Sign-On (SSO) authentication. It enables users to login using a set of username and password which then allows an access into multiple websites without the hassle of repeating the same usernames and passwords. One of the most common SSO protocol is OpenID which is said to offer flexibility and security. Unfortunately, the existing OpenID model is prone to phishing attack whereby there is a lack of mechanism to ensure the authenticity of the OpenID provider. This scenario complicates the situation especially when there exists tools to generate phishing attacks are easily available without requiring much technical expertise. Moreover, users awareness are claimed to be insufficient to rely on since statistics of phishing attacks are shown to be increasing. Thus, this research attempts to propose page token as a mechanism to thwart phishing attack. This research produced and evaluated an improved requirement model that incorporates the page token as proposed mechanism. The outcomes show promising result towards the effort of thwarting phishing attacks.
international conference on computer and information sciences | 2016
Hatim Mohamad Tahir; Abas Md Said; Nor Hayani Osman; Nur Haryani Zakaria; Puteri Nurul 'Ain M Sabri; Norliza Katuk
Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the network security issue by detecting, identifying, assessing and reporting any unauthorized and illegal network connections and activities. The purpose of this research is to improve on the existing Anomaly Based Intrusion Detection (ABID) method using K-Means clustering technique as to maximize the detection rate and accuracy while minimizing the false alarm. The problem with outliers may disturb the K-Means clustering process as it might be avoided in the clustering process from mixing with the normal data that make the NIDSs become less accurate. Thus this research aims to improve the performance of the ABID systems that balance the loss of information or ignored data in clustering. An integrated machine learning algorithm using K-Means Clustering with discretization technique and Naïve Bayes Classifier (KMC-D+NBC) is proposed against ISCX 2012 Intrusion Detection Evaluation Dataset. The outcome depicts that the proposed method generates better detection rate and accuracy up to 99.3% and 99.5% respectively and reduces the false alarm to 1.2% with better efficiency of 0.03 seconds time taken to build model.
international conference on digital information processing and communications | 2011
Hatim Mohamad Tahir; Abas Md Said; Mohammed J. M. Elhalabi; Nurnasran Puteh; Azliza Othman; Nurzaid Muhd Zain; Zulkhairi Md Dahalin; Muhammad Hafiz Ismail; Khuzairi Mohd Zaini; Mohd Zabidin Hussin
The need for a reliable transmission protocol that can cover the Transport Control Protocol (TCP) and User Datagram Protocol (UDP) has prompted the Internet Engineering Task Force (IETF) to define a new protocol called the Stream Control Transmission Protocol (SCTP). This paper proposes adding Explicit Congestion Notification (ECN) mechanism into SCTP chunks (INIT chunk, and INIT-ACK chunk) to reduce the delay of transferring important data during congestion as compared with the TCP and UDP protocols. This paper also discusses the details of adding ECN, and the reason for choosing Random Early Detection (RED). Through the experimental analysis, we compare SCTP enabled ECN in INIT-ACK chunk to SCTP without ECN enabled in INIT-ACK chunk and demonstrate the result of ECN impact on SCTP delay time.
Archive | 2005
Hatim Mohamad Tahir; Roshidi Din
Archive | 2015
Hatim Mohamad Tahir; Wail Hasan; Abas Md Said; Nur Haryani Zakaria; Norliza Katuk; Nur Farzana Kabir; Mohd Hasbullah Omar; Osman Ghazali; Noor Izzah Yahya