Johari Abdullah
Information Technology University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Johari Abdullah.
international conference on computer and communication engineering | 2008
Syahrul N. Junaini; Johari Abdullah
With the steady growth and affordability of camera phones, more mobile applications are necessary. Nowadays the mobile industry began to pay more attention to barcode applications for domestic users need. This paper describes a mobile-based support application for Muslims to identify the Halal status (prepared in accordance to Islamic law) of the product using mobile device. We argue that our MMS camera phone-based application is an economical and effective way to speed up the Halal verification process as opposed to text entry in SMS. This paper discusses the barcode concept and its applications in consumer product industry. First we analyze the issue of Halal among the Muslim consumers and how mobile technology can be used. Then we discuss the framework and design of our system that we called MyMobiHalal 2.0.
Advanced Science Letters | 2017
M. N Jambli; Adnan Shahid Khan; H Lenando; Johari Abdullah; S. M Suhaili
Mobile Ad-hoc and Sensor Networks (MASNETs) are energy constrained networks which have been the focus of many recent research and development efforts. In MASNETs, the network topologies are frequently change due to the moving sensor nodes that have low radio frequency coverage which make the design and implementation of a routing protocol in this networks very challenging. Thus, the Dynamic Energy Savvy (DES-AODV) routing algorithm is proposed to enhance the performance of Ad-hoc On Demand Distance Vector (AODV) by changing the routing metric from hop count to estimated distance that is based on the Received Signal Strength Indicator (RSSI) values. The performance of DES-AODV is evaluated and compared with the existing AODV in terms of the average percentage of packet loss and energy consumption with the density of mobile nodes. The simulation results show that the proposed DES-AODV outperforms the existing AODV in both percentage of packet loss and energy consumption.
international conference on information and communication technology | 2014
Halikul Lenando; Qin Feng; Mohamad Nazim Jambli; Johari Abdullah; Kartinah Zen
In opportunistic network, the nodes have no knowledge regarding network topology. Hence, forwarding from the source node to the target destination node is a challenging issue. A connection between two nodes is unstable in opportunistic network, but the store-carry-forward scheme and nodes mobility enable nodes to dissemination information between them. Flooding forward technique delivers message to every encounter node in transmission range. It incurs network congestion and consumes amount of network resources. This paper presents the location code-based data dissemination forward technique which utilizes the similarity between neighbor nodes location code and the destination nodes location code. The match degree approach is used to identify the relay node for a better way to disseminate data in opportunistic network. The experimental results show that code location approach delivers messages to the target destination with less overheads, and better performance as compared to flooding approach.
international conference on artificial intelligence | 2013
Mohamad Nazim Jambli; Sinarwati Mohamad Suhaili; Nurul Sahida Mansor; Johari Abdullah; Halikul Lenando
In recent years, extensive research has been conducted on Wireless Sensor Networks (WSNs) due to their wide range of potential applications ranging from commercial to critical military and health care applications. For most of these applications, security is an important requirement. However, security mechanisms in WSNs differ from traditional ad-hoc networks due to their energy and resource constraints. Due to these constraints, the sensor nodes are vulnerable to security threats because the traditional security measures are not enough to protect these nodes during information dissemination in WSNs. Thus, in this paper we have studied TinySec security measures, Authentication-only (TinySec-Auth) and Authentication Encryption (TinySec-AE) in order to evaluate the suitability of these security measures for WSN applications. We have evaluated these TinySec mechanisms in terms of packet transmission time, average number of packet received and energy consumption. The simulation results show that TinySec-AE consumed more energy and required more time to transmit packet in comparing to TinySec-Auth due to higher computational time and longer packet size for extra encryption mechanism.
ieee conference on open systems | 2013
Johari Abdullah; Halikul Lenando; Mohamad Nazim Jambli
The Internet has become a necessity to many organizations and also to the general public, similar to utilities such as electricity and water supply. Disruption or interruption to Internet availability would means reduced productivity and can be of negative consequence to many organizations. Therefore, it is critical that there is a mechanism to monitor Internet performance periodically in order to detect performance issues, and more importantly a mechanism to correlate the changes in the performance metrics with the event that causes the changes. Currently, there is no existing event correlation mechanism that is able to provide automated correlation between the changes in the end-to-end Internet performance with the occurrence of certain events or activities within an organization. Our goal is to develop an event correlation mechanism for end-to-end Internet performance monitoring which is automated and intelligent. In this paper, we describe in details the PingER monitoring framework, the challenges in interpreting the data collected from the framework, and finally discuss the requirements to develop an intelligent correlation engine for events correlation.
2013 IEEE Conference on Wireless Sensor (ICWISE) | 2013
Mohamad Nazim Jambli; A. J. Azlina; A. M. Farha Anati; Halikul Lenando; Johari Abdullah; M. S. Sinarwati
International Review on Computers and Software | 2014
Adnan Shahid Khan; Halikul Lenando; Johari Abdullah; Mohamad Nazim Jambli
Journal of Telecommunication, Electronic and Computer Engineering | 2017
Yasir Javed; Adnan Shahid Khan; Abdul Qahar; Johari Abdullah
Advanced Science Letters | 2017
Adnan Shahid Khan; Johari Abdullah; K Zen; S Tarmizi
Archive | 2016
Halikul Lenando; Sanjay Charles Albert; Mohamad Nazim Jambli; Johari Abdullah