Kamaruzzaman Seman
Universiti Sains Islam Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kamaruzzaman Seman.
Archive | 2015
Fitri Maya Puspita; Kamaruzzaman Seman; Bachok M. Taib
Internet Service Providers (ISPs) nowadays deal with high demand to promote good quality information. However, the knowledge to develop new pricing scheme that serve both customers and supplier is known, but only a few pricing plans involve QoS networks. This study will seek new proposed pricing plans are offered with multi service multi link networks involved. The multi service multi link Networks scheme is solved as an optimization model by comparing two models in multi QoS networks. The results showed that by fixing the base price and varying the quality premium or varying the base price and quality and setting up the equal capacity link values, ISP achieved the goal to maximize the profit.
information assurance and security | 2011
Fatin Norsyafawati Mohd Sabri; Norita Md Norwawi; Kamaruzzaman Seman
Denial of Service (DoS) attacks is one of the security threats for computer systems and applications. It usually make use of software bugs to crash or freeze a service or network resource or bandwidth limits by making use of a flood attack to saturate all bandwidth. Predicting a potential DOS attacks would be very helpful for an IT departments or managements to optimize the security of intrusion detection system (IDS). Nowadays, false alarm rates and accuracy become the main subject to be addressed in measuring the effectiveness of IDS. Thus, the purpose of this work is to search the classifier that is capable to reduce the false alarm rates and increase the accuracy of the detection system. This study applied Artificial Immune System (AIS) in IDS. However, this study has been improved by using integration of rough set theory (RST) with Artificial Immune Recognition System 1 (AIRS1) algorithm, (Rough-AIRS1) to categorize the DoS samples. RST is expected to be able to reduce the redundant features from huge amount of data that is capable to increase the performance of the classification. Furthermore, AIS is an incremental learning approach that will minimize duplications of cases in a knowledge based. It will be efficient in terms of memory storage and searching for similarities in Intrusion Detection (IDS) attacks patterns. This study use NSL-KDD 20% train dataset to test the classifiers. Then, the performances are compared with single AIRS1 and J48 algorithm. Results from these experiments show that Rough-AIRS1 has lower number of false alarm rate compared to single AIRS but a little bit higher than J48. However, accuracy for this hybrid technique is slightly lower compared to others.
international conference on computer communications | 2015
Mohanad Al-Hasanat; Kamaruzzaman Seman; Kamarudin Saadan
In this paper we introduced two enhancement modifications to the well-known TCP Westwood fast retransmission and fast recovery mechanisms. Firstly, a new modification is introduced to fasten the fast retransmission procedure by preventing the TCP sender side from waiting the third duplicate ACKs to retransmit lost packets. Secondly, further modification is presented to achieve better recovery for the congestion window size in the fast recovery phase based on last round trip time and bandwidth estimation. The two modifications are implemented and evaluated using ns-3 simulator. We compared the throughput and congestion window size of the new proposed modifications to TCPW and NewReno. As a result, the proposed algorithm has shown significant improvement over the two implementations.
international conference on information and communication technology | 2014
Omar Najah; Kamaruzzaman Seman; Khairi Abdulrahim
Packet contention in photonic packet switches is a key issue in network performance. Without using a proper contention scheme, switches will get congested earlier. Although Optical Code Division Multiplexing, Wavelength Division Multiplexing (OCDM/WDM) applies a code and wavelength as a path in the node, the capacity granularity of OCDM/WDM may become too large to switch the packets among input and output. A possible solution for this issue is to employ optical buffering techniques that incorporate fiber delay lines (FDLs) in OCDM/WDM architecture. The proposed scheme takes the advantage of shared buffering, optical coding and wavelength conversion to enhance the switch performance. The performance evaluation of the hybrid optical switch architecture is validated through extensive simulation. This paper analyzes the performance of proposed system based on fixed sized packet (synchronized packet). It is shown that with this algorithm, the hybrid optical-buffered switch can achieve a throughput of ~ 0.99 and a loss rate of 1.9*10-3 respectively, at a heavy load of 0.9.
ieee international conference on computer applications and industrial electronics | 2011
A. A. Abdul Rahman; Kamaruzzaman Seman; Kamarudin Saadan; Ahmad Kamsani Samingan; A. Azman
Shared buffer is commonly used to utilize the buffer in the switch. In order to minimize the cell lost of high class traffic in multi-class switch, the threshold is set to drop the low class cells in the shared buffer. This will give more space to accommodate the high class traffic cells. In this paper, we analyse the performance of shared buffer with different threshold settings. The multi-class shared buffer architecture is developed for 16×16 ports switch, which is targeted for Xilinx FPGA implementation. The performance of the multi-class shared buffer switch is analysed in term of the achievable throughput as well as the drop probability. Based on the simulation with different threshold settings, it is observed that the optimum selection of cell drop threshold depends on the size of the shared buffer that triggers the RAM threshold.
the internet of things | 2017
A. H. Azni; Abdul Fuad Abdul Rahman; Najwa Hayaati Mohd Alwi; Kamaruzzaman Seman
IoT devices must provide seamless connectivity while obeying stringent power and size constraints. Power consumption plays important factor to determine the status and connectivity of Sensor Node. This paper describes a series of simple experiments which measure the energy consumption of two IoT Sensor Nodes transmitting data to the cloud. The experiments will be used to compare the best solution between wire and wireless for IoT Sensor Nodes implementation. The experimental result shows that wireless connection consume more power compared to wire connection. Apart from comparison of two methods, the goal of this paper is also to develop a solid experimental basis, thus setting a better foundation for future research on IoT Sensor Nodes.
Archive | 2016
A. H. Azni; Rabiah Ahmad; Kamaruzzaman Seman; Najwa Hayaati Mohd Alwi; Zul Azri Mohamad Noh
This paper proposed a new correlated topology control (CTC) algorithm to achieve optimal survival networks topology under correlated node behavior. CTC algorithm enable every node to selects its own neighbors with highly correlated cooperative node dynamically. To select neighbors, measurement scheme of correlated node cooperativity is proposed to determine misbehave node and critical node. The scheme will check on correlated degree of neighboring nodes for any misbehave node and at the same time will check if the removal of node cause network to partition. In the case if nodes removal will partition the network, a new reconstruction scheme LNL is proposed to reconnect the broken link. The simulation results show that CTC algorithm can prolong node lifetime and maintain generated survival network topology. Besides that, the algorithm successfully prevented correlated event from misbehave node and network partitioning from isolated node. Further, it is also shown that as energy consumption decreased, network performance especially packet forwarding can be significantly improved and network survivability is optimally achieved.
Applied Mechanics and Materials | 2015
Ezeddin Sanam; Kamaruzzaman Seman; Jawad; Abadal Salam T. Hussain; Mohd Zalisham Jali
There will be increasing demand for high confidentiality, integrity, authentication, for widely deployment of the next RFID generation beside that, the focus will be on avoiding encryption algorithms; as these require more complex modulation, to secure communication between RFID’s tags and readers. In this paper, the focus will be on securing the communication channel between tags and readers at the physical layer, rather than to secure the contents of RFIDs data by encryption. The RFID reader initially will communicate with the tag through a narrowband communication and subsequently through broadband communication, by generating ultra wide-band signal using pulse position modulation with time hopped, it can be a novel approach for RFID security as it simplify or eliminate cryptographic requirements with the same security level of existing passive RFIDs, also it allow simultaneous multiple access without-collision, which will enhance the overall RFID systems performance. The design of the system will be shown by modeling the communication, the designing details of the transmitter as well as the receiver, finally showing the simulated results of modulated signal with its specific parameters as well as the receiver performance.
Archive | 2014
Nik Azura Nik Abdullah; Kamaruzzaman Seman; Norita Md Norwawi
In this research paper, we present the statistical analysis on full round lightweight block cipher; LBlock. This block cipher has a fixed block size of 64-bit, utilizes an 80-bit key and executes in 32 rounds. To determine the randomness of ciphertext produced by this algorithm, NIST Statistical Test Suite is used. Inputs (plaintext and key) for this block cipher algorithm are generated using nine different types of data. From the analysis done, it is concluded that the LBlock block cipher is not random based on 1 % significance level only.
Gyroscopy and Navigation | 2014
Khairi Abdulrahim; Kamaruzzaman Seman; Marinah Othman; F. M. Shuib; Terry Moore; Christopher Hide; Chris Hill
A magnetometer is often used to aid heading estimation of a low-cost Inertial Pedestrian Navigation System (IPNS) without which the latter will not be able to accurately estimate heading for more than a few seconds, even with the help of Zero Velocity Update (ZVU). Heading measurements from the magnetometer are typically integrated with gyro heading in an estimation filter such as Kalman Filter (KF) — to best estimate the true IPNS heading, resulting in a better positioning accuracy. However indoors the reliability of these measurements is often questionable because of the magnetic disturbances that can disrupt the measurements. To solve this problem, a filtering method is often used to select the best measurements. However, the importance of the frequency of these measurement updates has not been highlighted.In this paper, the impact of frequency of magnetometer updates on the overall accuracy of the navigation system is presented. The paper starts by discussing the use of a magnetometer in a low-cost IPNS. An exemplary filter to extract reliable heading measurements from the magnetometer is then described. From real field trial results, it will be shown that even if reliable heading measurements may be obtained indoors, it is still insufficient to increase the positioning accuracy of the low-cost IPNS unless it is reliable on every epoch.