Mazliza Othman
Information Technology University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mazliza Othman.
IEEE Communications Surveys and Tutorials | 2014
Atta ur Rehman Khan; Mazliza Othman; Sajjad Ahmad Madani; Samee Ullah Khan
Smart phones are now capable of supporting a wide range of applications, many of which demand an ever increasing computational power. This poses a challenge because smart phones are resource-constrained devices with limited computation power, memory, storage, and energy. Fortunately, the cloud computing technology offers virtually unlimited dynamic resources for computation, storage, and service provision. Therefore, researchers envision extending cloud computing services to mobile devices to overcome the smartphones constraints. The challenge in doing so is that the traditional smartphone application models do not support the development of applications that can incorporate cloud computing features and requires specialized mobile cloud application models. This article presents mobile cloud architecture, offloading decision affecting entities, application models classification, the latest mobile cloud application models, their critical analysis and future research directions.
Mobile Computing and Communications Review | 1998
Mazliza Othman; Stephen Hailes
Power management is an important aspect of mobile computing. Previous works on power conservation have concentrated on the hardware approach. In this paper, we propose a different approach of power conservation strategy for mobile computers which is based on the concept of load sharing. User jobs are transferred from a mobile host to a fixed host to reduce power consumption by the CPU. Simulation results show that under suitable conditions, transferring job can extend battery lifetime by up to 20%. Transferring jobs to a fixed host does not only extend battery lifetime but also gives users access to faster machines, hence improving job response time.
IEEE Systems Journal | 2016
Junaid Shuja; Kashif Bilal; Sajjad Ahmad Madani; Mazliza Othman; Rajiv Ranjan; Pavan Balaji; Samee Ullah Khan
Cloud computing has emerged as the leading paradigm for information technology businesses. Cloud computing provides a platform to manage and deliver computing services around the world over the Internet. Cloud services have helped businesses utilize computing services on demand with no upfront investments. The cloud computing paradigm has sustained its growth, which has led to increase in size and number of data centers. Data centers with thousands of computing devices are deployed as back end to provide cloud services. Computing devices are deployed redundantly in data centers to ensure 24/7 availability. However, many studies have pointed out that data centers consume large amount of electricity, thus calling for energy-efficiency measures. In this survey, we discuss research issues related to conflicting requirements of maximizing quality of services (QoSs) (availability, reliability, etc.) delivered by the cloud services while minimizing energy consumption of the data center resources. In this paper, we present the concept of inception of data center energy-efficiency controller that can consolidate data center resources with minimal effect on QoS requirements. We discuss software- and hardware-based techniques and architectures for data center resources such as server, memory, and network devices that can be manipulated by the data center controller to achieve energy efficiency.
Communications of The ACM | 2006
Mazliza Othman; Rodziah Latih
The dwindling number of women pursuing a degree in CS is a growing frustration for many countries around the globe, but in Malaysia female CS/IT students outnumber the males. What accounts for this dichotomy?
Journal of Network and Computer Applications | 2017
Fadele Ayotunde Alaba; Mazliza Othman; Ibrahim Abaker Targio Hashem; Faiz Alotaibi
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the IoT are rapidly increasing with a major security concern. This study focuses on the state-of-the-art IoT security threats and vulnerabilities by conducting an extensive survey of existing works in the area of IoT security. The taxonomy of the current security threats in the contexts of application, architecture, and communication is presented. This study also compares possible security threats in the IoT. We discuss the IoT security scenario and provide an analysis of the possible attacks. Open research issues and security implementation challenges in IoT security are described as well. This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.
international conference on telecommunications | 2007
S. Buruhanudeen; Mazliza Othman; Borhanuddin Mohd Ali
A wireless ad hoc network is a collection of two or more devices/ nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralised administrator. Each node in a MANET (Mobile Ad Hoc Network) functions as both a host and a router. The network topology is in general dynamic, because the connectivity among the nodes may vary with time due to node mobility, node departures and new node arrivals. Hence, there is a need for efficient routing protocols to allow the nodes to communicate. This paper gives a state-of-the-art review on the existing routing protocols of MANET and the important routing metrics required in evaluating the performance of the protocols in terms of reliability and efficiency.
ieee international conference on control system, computing and engineering | 2012
Atta ur Rehman Khan; Sardar Muhammad Bilal; Mazliza Othman
Network simulation is the most useful and common methodology used to evaluate different network topologies without real world implementation. Network simulators are widely used by the research community to evaluate new theories and hypotheses. There are a number of network simulators, for instance, ns-2, ns-3, OMNET++, SWAN, OPNET, Jist, and GloMoSiM etc. Therefore, the selection of a network simulator for evaluating research work is a crucial task for researchers. The main focus of this paper is to compare the state-of-the-art, open source network simulators based on the following parameters: CPU utilization, memory usage, computational time, and scalability by simulating a MANET routing protocol, to identify an optimal network simulator for the research community.
ACM Computing Surveys | 2015
Shahbaz Akhtar Abid; Mazliza Othman; Nadir Shah
Mobile ad hoc networks (MANETs) are infrastructureless and distributed communication systems that require sophisticated approaches to routing to cope with node mobility and heterogeneous application requirements. In the past few years, distributed hash table (DHT) has come forth as a useful additional technique to the design and specification of spontaneous and self-organized networks. Researchers have exploited its advantages by implementing it at the network layer and developing scalable routing protocols for MANETs. The implementation of DHT-based routing in a MANET requires different algorithms and specifications compared to routing in the Internet because a MANET has its unique characteristics, such as node mobility, spontaneous networking, decentralized architecture, limited transmission range, dynamic topology, and frequent network partitioning/merging. In this article, we present a comprehensive survey of research related to DHT-based routing that aims at enhancing the scalability of MANETs. We present a vivid taxonomy of DHT-based routing protocols and the guidelines to design such protocols for MANETs. We compare the features, strengths, and weaknesses of existing DHT-based routing protocols and highlight key research challenges that are vital to address. The outcome of the analysis serves as a guide for anyone willing to delve into research on DHT-based routing in MANETs.
Computer Standards & Interfaces | 2008
Norleyza Jailani; Noor Faezah Mohd Yatim; Yazrina Yahya; Ahmed Patel; Mazliza Othman
Mobile agent based e-marketplace auction trading requires a secure and auditable system with a solid framework to support it. In investigating the requirements, it transpired that there is a lack of such a standardised framework. While mobility helps in avoiding network latency, particularly in increasing fairness in applications with bounded response times such as trading of auctions, it nevertheless raises issues concerning security, privacy and trust in protecting personal confidential information, managing and regulating legitimate trading and payment processing. These issues are of paramount importance and must be taken into consideration when designing a framework for modelling an auditable e-marketplace for mobile users. This also implies that there is also an underlying need to provide mobile users with simple, transparent and unobtrusive user interface. This paper proposes a framework that accommodates these requirements through protocol scenarios and highlight further research work that need to be performed.
Computer Networks | 2014
Shahbaz Akhtar Abid; Mazliza Othman; Nadir Shah
We study the challenging problems of the mismatch between the overlay and the physical network and the resilience of the overlay structure in peer-to-peer (P2P) protocols over a mobile ad hoc network (MANET). Existing P2P protocols have used inflexible overlay structures to arrange peers and do not consider intra-neighbor relationships of peers when assigning logical identifiers. The intra-neighbor relationships of peers are crucial to exactly interpret the physical proximity of peers in an overlay and to avoid the mismatch between the overlay and the physical network that causes extensive routing overhead, larger average file discovery delay, increased false-negative ratio, and high average path-stretch. In this paper, we present a novel P2P overlay over MANETs that exploits a 3-dimensional overlay and 3D space that takes into account the physical intra-neighbor relationship of a peer and exploits a 3D-overlay to interpret that relationship. In the proposed protocol, each peer runs a distributed algorithm that exploits a 3D-overlay to calculate a consecutive logical identifier to a peer. Moreover, the protocol utilizes the 3D-overlay to maintain multi-paths to a destination peer that provides resilience against a node/link failure. Simulation results show that the proposed 3D-overlay outperforms the existing P2P overlay protocol in terms of routing overhead, average file-discovery delay, false-negative ratio, and average path-stretch.