Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kasmiran Jumari is active.

Publication


Featured researches published by Kasmiran Jumari.


Iet Image Processing | 2013

Fast and reliable iris segmentation algorithm

Abduljalil Radman; Kasmiran Jumari; Nasharuddin Zainal

Design a fast and reliable iris segmentation algorithm for less constrained iris images is essential to build a robust iris recognition system. Daugmans integrodifferential operator (IDO) is one of powerful iris segmentation mechanisms, but in contrast consumes a large portion of the computational time for localising the rough position of the iris centre and eyelid boundaries. To address this problem, a fast iris segmentation algorithm is proposed. First, the circular Gabor filter is adopted to find the rough position of the pupil centre. Second, the iris and pupil circles are localised using the IDO taken into account that the real centres of the iris and pupil are in the small area around the rough position of the pupil centre. Third, the upper and lower eyelid boundaries are extracted using the live-wire technique. Experimental results demonstrate that the proposed iris segmentation algorithm significantly minimises the required time to segment the iris without affecting the segmentation accuracy. Moreover, the comparison results with state-of-the-art iris segmentation algorithms show the superiority of the proposed algorithm in terms of segmentation accuracy and recognition performance. The challenging UBIRIS.v1 iris image database is utilised to evaluate the performance of the proposed algorithm.


asia international conference on modelling and simulation | 2008

Diagnostic Quality of Compressed Medical Images: Objective and Subjective Evaluation

S. E. Ghrare; Mohd. Alauddin Mohd. Ali; Munira Ismail; Kasmiran Jumari

Without image compression, images data would become much larger and consequently retrieval of images will be slow, thus telemedicine would in many situations be impractical. But it is natural to raise the question of how much an image can be compressed and still preserve sufficient information for a given clinical application. Evaluation of the diagnostic quality of compressed medical image still remains an important issue. In this paper, three different medical image modalities have been compressed and decompressed using DWT for different compression ratios and evaluated using objective and subjective testing. The quality of the reconstructed images has been measured using objective measures such as MSE, MAE, SNR, and PSNR. Ten observers have been involved to carry out the subjective evaluation. Based on the quality of the reconstructed images, the PSNR obtained has been between 35.3 dB to 58.0 dB for CT scan images, 38.6 dB to 55.0 dB for MRI and 34.5 dB to 51 MB for X-ray images. For radiology applications, the compression ratio of 30:1 is acceptable for CT images, and a compression ratio of 40:1 is acceptable for MRI, and compression ratio of 20:1 is acceptable for X-ray images.


computational intelligence communication systems and networks | 2011

Traffic Modeling of LTE Mobile Broadband Network Based on NS-2 Simulator

Ghassan A. Abed; Mahamod Ismail; Kasmiran Jumari

Recently, Long-Term Evolution (LTE) is the result of ongoing work by the Third Generation Partnership Project (3GPP) toward Fourth Generation (4G) systems. LTE will be used for mobile, fixed and portable wireless broadband access, and will offer several benefits to operators, aimed at increasing capacity, reducing network complexity and thus lowering deployment and operational costs. It will enable operators to meet the growing demand for mobile data solutions, making it possible for richer services to be delivered to consumers more cost effectively. The targets for LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink. However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network simulator and observation of TCP Reno performance investigated. The Evaluation of the network performance with TCP Reno is mainly based on congestion window behavior, throughput, average delay and lost packet.


Iet Communications | 2009

Transmission surveillance and self-restoration against fibre fault for time division multiplexing using passive optical network

Mohammad Syuhaimi Ab-Rahman; Boonchuan Ng; Aswir Premadi; Kasmiran Jumari

This study proposes a practical transmission surveillance and self-protection scheme for time division multiplexing using passive optical network (TDM-PON) with centralised monitoring and self-restorable apparatus. Troubleshooting a TDM-PON involves locating and identifying the source of an optical problem in what may be a complex optical network topology that includes several optical line terminals (OLTs), optical splitters, fibres and optical network units (ONUs). Since most components in the network are passive, a large part of the issues are due to dirty/damaged/misaligned connectors or breaks/macrobends in optical fibre cables. These will affect one, some or all subscribers in the network, depending on the location of the problems. The proposed scheme is able to prevent and detect the occurrence of fibre faults in a network system through centralised monitoring and remotely operate from a central office via Ethernet connection. Even with fibre fault prevention mechanisms, failures will still occur. Therefore fibre fault detection is required in order to detect potential faults and precisely localise the exact failure location. Whenever any failure occurs on the primary entity, the proposed system can protect and switch the failure line to the protection line to ensure that traffic flows continuously. Meanwhile, the failure information will be delivered to field engineers for taking appropriate recovery action to treat the fibre fault and failure link. One suggestion in point-to-multipoint (P2PM) applications has been proposed with the experimental results as the feasibility approach. This approach has bright prospects for improving the survivability and reliability as well as increasing the efficiency and monitoring capabilities in TDM-PON.


international conference on electronic design | 2008

The overview of fiber fault localization technology in TDM-PON network

Mohammad Syuhaimi Ab-Rahman; Ng Boon Chuan; Mohd Hadi Guna Safnal; Kasmiran Jumari

In this paper, we discussed the mechanism of optical fiber break in time division multiplexing passive optical network (TDM-PON) and the upwardly or downwardly monitoring issues with conventional fiber fault localization technique by using optical time domain reflectometer (OTDR). We also studied the previous fault localization technology that had been recommended. Finally, we proposed a centralized inline monitoring and network testing system named as centralized failure detection system (CFDS). CFDS will be installed with optical line terminal (OLT) at the central office (CO) or network operation center to centrally monitoring each optical fiber lines status and detecting the failure location that occurs in the multi-line drop region of fiber-to-the-home (FTTH) access network downwardly from CO towards the customer premises to improve the service reliability and reduce the restoration time and maintenance cost.


ieee international conference on control system, computing and engineering | 2011

Energy efficient algorithm for heterogeneous wireless sensor network

Norah Tuah; Mahamod Ismail; Kasmiran Jumari

Wireless sensor networks (WSNs) are composed of a large number of sensor nodes with sensing capability. The critical challenges in such network is the limited lifetime of the battery in the sensor node. Hence, an efficient node clustering algorithm to the heterogeneous network approach can be adopted to increase the lifetime of the network. In this paper, we proposed a new node clustering algorithm which called as ETLE (Efficient Three Level Energy) for selecting the cluster head in a distributed approach to three level hierarchical WSNs. The work has been compared with the EEHC algorithm in terms of a lifetime of the network. As a result, it shows that our proposed method may improve 10% the lifetime of the WSNs.


Annales Des Télécommunications | 2010

Access network survivability: An architecture approach for monitoring, protection and restoration in FTTH application

Aswir Premadi; Boon Chuan Ng; Mohammad Syuhaimi Ab-Rahman; Kasmiran Jumari

This paper presented a simple monitoring, protection switching, and fast restoration approach for fiber to the home passive optical network (FTTH-PON) using Access Control System (ACS). ACS is developed for centralized monitoring and failure detection from central office (CO) in downstream direction (from CO towards customer sides). The proposed system architecture incorporating low cost and enable the network service providers and field engineers to remotely control the testing module from anywhere in the world and automatically identify any fiber fault and address the failure location in the fiber field. Another unique function of ACS is to provide the activation for optical switching in a restoration scheme which implemented at the drop region of FTTH-PON. A protection device named Customer Protection Device that comprises of programmable optical switches will be employed at the customer sides, just before the optical network unit, for rerouting the disrupted signals to the protection line when failure occurs in the working line to ensure continuous service delivery to customers.


ieee region 10 conference | 2000

Computer network intrusion detection software development

Shaiful Jahari Hashim; Kasmiran Jumari; Mahamod Ismail

The recent proliferation of computer network usage for business and communication has witnessed an alarming rate of intrusion. The phenomenon is a grave concern in the academic environment since universities seldom have tight security measures, and the high bandwidth available makes them interesting targets as attack relay hosts. At Universiti Kebangsaan Malaysia, the software development process has adopted open-source approaches, where a simple open-source implementation of network intrusion detection has been improved to tailor it to the needs of the campus. The working prototype has been tested on a real-life implementation in the university environment for detecting, logging and alerting about computer network intrusions.


ieee international conference on space science and communication | 2009

Customer access protection unit for survivable FTTH network

Siti Asma Che Aziz; Mohammad Syuhaimi Ab-Rahman; Kasmiran Jumari

This paper describes a protection against fiber fault in fiber line which is called Customer Access Protection Unit (CAPU) that will also being placed in customer end user in order to perform as smart restoration if there is uncertainty of fiber cut occurs in distribution region. Furthermore, this paper also includes the power penalty analysis for optical switch cascaded in our network protection design according to the CAPU device. This device is expected to perform as fast protection against failure and only increase low insertion loss in each remote node (RN).


International Scholarly Research Notices | 2011

OBBP: An Efficient Burst Packing Algorithm for IEEE802.16e Systems

Omar M. Eshanta; Mahamod Ismail; Kasmiran Jumari

Mobile communications have witnessed a phenomenal increase in the amount of users, services, and applications. Orthogonal Frequency Division Multiple Access (OFDMA) targets to provide broadband connectivity to wide area coverage, in mobile environments, for Next Generation Networks (NGNs), which results in significant design challenges in the MAC (Medium Access Control) layer to provide an efficient resource allocation in a cost-effective manner. This paper proposes a two-dimensional (2D) Burst Packing (BP) algorithm for OFDMA downlink (DL) subframe that can provide the service providers with an efficient, fast, flexible, and high-spectral efficiency method to allocate system resources among the Mobile Stations (MSs). The proposed Orientation-Based Burst Packing (OBBP) algorithm uses the Orientation Factors (OFs) of the bursts as a criteria to achieve the challenging issues in the BP problem. The simulation results show that OBBP algorithm can achieve a high packing efficiency up to 99.2% when the burst size ratio (BSR) is 50%.

Collaboration


Dive into the Kasmiran Jumari's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mahamod Ismail

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Aswir Premadi

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Siti Asma Che Aziz

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Hazwan Harun

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Hadi Guna

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ghassan A. Abed

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ng Boon Chuan

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mastang

National University of Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge