Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mazliza Othman is active.

Publication


Featured researches published by Mazliza Othman.


IEEE Communications Surveys and Tutorials | 2014

A Survey of Mobile Cloud Computing Application Models

Atta ur Rehman Khan; Mazliza Othman; Sajjad Ahmad Madani; Samee Ullah Khan

Smart phones are now capable of supporting a wide range of applications, many of which demand an ever increasing computational power. This poses a challenge because smart phones are resource-constrained devices with limited computation power, memory, storage, and energy. Fortunately, the cloud computing technology offers virtually unlimited dynamic resources for computation, storage, and service provision. Therefore, researchers envision extending cloud computing services to mobile devices to overcome the smartphones constraints. The challenge in doing so is that the traditional smartphone application models do not support the development of applications that can incorporate cloud computing features and requires specialized mobile cloud application models. This article presents mobile cloud architecture, offloading decision affecting entities, application models classification, the latest mobile cloud application models, their critical analysis and future research directions.


Mobile Computing and Communications Review | 1998

Power conservation strategy for mobile computers using load sharing

Mazliza Othman; Stephen Hailes

Power management is an important aspect of mobile computing. Previous works on power conservation have concentrated on the hardware approach. In this paper, we propose a different approach of power conservation strategy for mobile computers which is based on the concept of load sharing. User jobs are transferred from a mobile host to a fixed host to reduce power consumption by the CPU. Simulation results show that under suitable conditions, transferring job can extend battery lifetime by up to 20%. Transferring jobs to a fixed host does not only extend battery lifetime but also gives users access to faster machines, hence improving job response time.


IEEE Systems Journal | 2016

Survey of Techniques and Architectures for Designing Energy-Efficient Data Centers

Junaid Shuja; Kashif Bilal; Sajjad Ahmad Madani; Mazliza Othman; Rajiv Ranjan; Pavan Balaji; Samee Ullah Khan

Cloud computing has emerged as the leading paradigm for information technology businesses. Cloud computing provides a platform to manage and deliver computing services around the world over the Internet. Cloud services have helped businesses utilize computing services on demand with no upfront investments. The cloud computing paradigm has sustained its growth, which has led to increase in size and number of data centers. Data centers with thousands of computing devices are deployed as back end to provide cloud services. Computing devices are deployed redundantly in data centers to ensure 24/7 availability. However, many studies have pointed out that data centers consume large amount of electricity, thus calling for energy-efficiency measures. In this survey, we discuss research issues related to conflicting requirements of maximizing quality of services (QoSs) (availability, reliability, etc.) delivered by the cloud services while minimizing energy consumption of the data center resources. In this paper, we present the concept of inception of data center energy-efficiency controller that can consolidate data center resources with minimal effect on QoS requirements. We discuss software- and hardware-based techniques and architectures for data center resources such as server, memory, and network devices that can be manipulated by the data center controller to achieve energy efficiency.


Communications of The ACM | 2006

Women in computer science: no shortage here!

Mazliza Othman; Rodziah Latih

The dwindling number of women pursuing a degree in CS is a growing frustration for many countries around the globe, but in Malaysia female CS/IT students outnumber the males. What accounts for this dichotomy?


Journal of Network and Computer Applications | 2017

Internet of Things security

Fadele Ayotunde Alaba; Mazliza Othman; Ibrahim Abaker Targio Hashem; Faiz Alotaibi

The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the IoT are rapidly increasing with a major security concern. This study focuses on the state-of-the-art IoT security threats and vulnerabilities by conducting an extensive survey of existing works in the area of IoT security. The taxonomy of the current security threats in the contexts of application, architecture, and communication is presented. This study also compares possible security threats in the IoT. We discuss the IoT security scenario and provide an analysis of the possible attacks. Open research issues and security implementation challenges in IoT security are described as well. This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.


international conference on telecommunications | 2007

Existing MANET routing protocols and metrics used towards the efficiency and reliability- an overview

S. Buruhanudeen; Mazliza Othman; Borhanuddin Mohd Ali

A wireless ad hoc network is a collection of two or more devices/ nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralised administrator. Each node in a MANET (Mobile Ad Hoc Network) functions as both a host and a router. The network topology is in general dynamic, because the connectivity among the nodes may vary with time due to node mobility, node departures and new node arrivals. Hence, there is a need for efficient routing protocols to allow the nodes to communicate. This paper gives a state-of-the-art review on the existing routing protocols of MANET and the important routing metrics required in evaluating the performance of the protocols in terms of reliability and efficiency.


ieee international conference on control system, computing and engineering | 2012

A performance comparison of open source network simulators for wireless networks

Atta ur Rehman Khan; Sardar Muhammad Bilal; Mazliza Othman

Network simulation is the most useful and common methodology used to evaluate different network topologies without real world implementation. Network simulators are widely used by the research community to evaluate new theories and hypotheses. There are a number of network simulators, for instance, ns-2, ns-3, OMNET++, SWAN, OPNET, Jist, and GloMoSiM etc. Therefore, the selection of a network simulator for evaluating research work is a crucial task for researchers. The main focus of this paper is to compare the state-of-the-art, open source network simulators based on the following parameters: CPU utilization, memory usage, computational time, and scalability by simulating a MANET routing protocol, to identify an optimal network simulator for the research community.


ACM Computing Surveys | 2015

A Survey on DHT-Based Routing for Large-Scale Mobile Ad Hoc Networks

Shahbaz Akhtar Abid; Mazliza Othman; Nadir Shah

Mobile ad hoc networks (MANETs) are infrastructureless and distributed communication systems that require sophisticated approaches to routing to cope with node mobility and heterogeneous application requirements. In the past few years, distributed hash table (DHT) has come forth as a useful additional technique to the design and specification of spontaneous and self-organized networks. Researchers have exploited its advantages by implementing it at the network layer and developing scalable routing protocols for MANETs. The implementation of DHT-based routing in a MANET requires different algorithms and specifications compared to routing in the Internet because a MANET has its unique characteristics, such as node mobility, spontaneous networking, decentralized architecture, limited transmission range, dynamic topology, and frequent network partitioning/merging. In this article, we present a comprehensive survey of research related to DHT-based routing that aims at enhancing the scalability of MANETs. We present a vivid taxonomy of DHT-based routing protocols and the guidelines to design such protocols for MANETs. We compare the features, strengths, and weaknesses of existing DHT-based routing protocols and highlight key research challenges that are vital to address. The outcome of the analysis serves as a guide for anyone willing to delve into research on DHT-based routing in MANETs.


Computer Standards & Interfaces | 2008

Secure and auditable agent-based e-marketplace framework for mobile users

Norleyza Jailani; Noor Faezah Mohd Yatim; Yazrina Yahya; Ahmed Patel; Mazliza Othman

Mobile agent based e-marketplace auction trading requires a secure and auditable system with a solid framework to support it. In investigating the requirements, it transpired that there is a lack of such a standardised framework. While mobility helps in avoiding network latency, particularly in increasing fairness in applications with bounded response times such as trading of auctions, it nevertheless raises issues concerning security, privacy and trust in protecting personal confidential information, managing and regulating legitimate trading and payment processing. These issues are of paramount importance and must be taken into consideration when designing a framework for modelling an auditable e-marketplace for mobile users. This also implies that there is also an underlying need to provide mobile users with simple, transparent and unobtrusive user interface. This paper proposes a framework that accommodates these requirements through protocol scenarios and highlight further research work that need to be performed.


Computer Networks | 2014

3D P2P overlay over MANETs

Shahbaz Akhtar Abid; Mazliza Othman; Nadir Shah

We study the challenging problems of the mismatch between the overlay and the physical network and the resilience of the overlay structure in peer-to-peer (P2P) protocols over a mobile ad hoc network (MANET). Existing P2P protocols have used inflexible overlay structures to arrange peers and do not consider intra-neighbor relationships of peers when assigning logical identifiers. The intra-neighbor relationships of peers are crucial to exactly interpret the physical proximity of peers in an overlay and to avoid the mismatch between the overlay and the physical network that causes extensive routing overhead, larger average file discovery delay, increased false-negative ratio, and high average path-stretch. In this paper, we present a novel P2P overlay over MANETs that exploits a 3-dimensional overlay and 3D space that takes into account the physical intra-neighbor relationship of a peer and exploits a 3D-overlay to interpret that relationship. In the proposed protocol, each peer runs a distributed algorithm that exploits a 3D-overlay to calculate a consecutive logical identifier to a peer. Moreover, the protocol utilizes the 3D-overlay to maintain multi-paths to a destination peer that provides resilience against a node/link failure. Simulation results show that the proposed 3D-overlay outperforms the existing P2P overlay protocol in terms of routing overhead, average file-discovery delay, false-negative ratio, and average path-stretch.

Collaboration


Dive into the Mazliza Othman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

May Zin Oo

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Abdul Nasir Khan

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Shahbaz Akhtar Abid

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Nadir Shah

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Sajjad Ahmad Madani

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Mazhar Ali

North Dakota State University

View shared research outputs
Top Co-Authors

Avatar

Samee Ullah Khan

North Dakota State University

View shared research outputs
Top Co-Authors

Avatar

Sardar Muhammad Bilal

Instituto de Salud Carlos III

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge