Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Md. Asri Ngadi is active.

Publication


Featured researches published by Md. Asri Ngadi.


Sensors | 2012

An overview of data routing approaches for wireless sensor networks.

Mohammad Hossein Anisi; Abdul Hanan Abdullah; Shukor Abd Razak; Md. Asri Ngadi

Recent years have witnessed a growing interest in deploying large populations of microsensors that collaborate in a distributed manner to gather and process sensory data and deliver them to a sink node through wireless communications systems. Currently, there is a lot of interest in data routing for Wireless Sensor Networks (WSNs) due to their unique challenges compared to conventional routing in wired networks. In WSNs, each data routing approach follows a specific goal (goals) according to the application. Although the general goal of every data routing approach in WSNs is to extend the network lifetime and every approach should be aware of the energy level of the nodes, data routing approaches may focus on one (or some) specific goal(s) depending on the application. Thus, existing approaches can be categorized according to their routing goals. In this paper, the main goals of data routing approaches in sensor networks are described. Then, the best known and most recent data routing approaches in WSNs are classified and studied according to their specific goals.


Wireless Networks | 2011

Towards providing a new lightweight authentication and encryption scheme for MANET

Tameem Eissa; Shukor Abd Razak; Md. Asri Ngadi

Mobile Ad hoc Network (MANET) is a wireless technology for mobile nodes. This network is setup on fly without any infrastructure. The mobility nature of this network and the lack of infrastructure make it very challenging to be secured. In this paper, we introduce a formal model for Identity-based RSA (Id-RSA) scheme proven secure in the random oracle model. The proposed scheme relies on establishing fast cryptography operations to enhance the network performance. We compare our scheme with RSA-based Threshold Cryptography scheme (RSA-TC) and ECC-based Threshold Cryptography scheme (ECC-TC) in terms of speed and overheads caused by the security messages. We show that the threshold cryptography operations involved in RSA-TC and ECC-TC schemes cause a lot of overheads and delay. We implement these three schemes using the JAVA-based simulation framework (JIST/SWANS). The results show that our Id-RSA scheme is more suitable for MANET mobility environment that require lightweight and secure solutions.


ubiquitous computing | 2012

Reactive traffic-aware routing strategy for urban vehicular environments

R. H. Khokhar; Md. Asri Ngadi; Muhammad Shafie Abdul Latiff; M. A. Amin

In this paper, we propose a Reactive Traffic-Aware Routing Strategy (ReTARS) for real-time urban vehicular environments that makes dynamic routes to avoid unnecessary and dead-end routes. ReTARS leverages prior global knowledge of real-time vehicular traffic to create paths between each vehicle. In ReTARS, the critical decisions are taken by decision making node at intersections which is based on prior global knowledge of real-time vehicular traffic. The simulation results in urban environment for with and without obstacles scenarios show that the ReTARS has better performance as compare to some existing VANET routing protocols in terms of packet delivery ratio, average delay, and hops count.


2nd International Conference on Wireless and Mobile networks, WiMo 2010 | 2010

A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol

Satria Mandala; Md. Asri Ngadi; Abdul Hanan Abdullah; Abdul Samad Ismail

Wireless mobile Ad-Hoc networks (MANETs) are networks of mobile nodes with no fixed infrastructures. Their peer-to-peer communication architectures over shared wireless medium with no clear line of defense pose a number of challenges to security design. Some previous works have used a form of digital signature for protection. However, there are still limitations in the implementation. This paper proposes a variant of the Merkle Signature Scheme (MSS) to protect an Ad-Hoc On-demand Distance Vector (AODV) protocol, a common routing protocol for MANETs. The new protocol is named Extra Secure AODV or ESAODV in short. ESAODV provides hop-count protection, digital signature and protocol enforcement. Through these features several security benefits on the routing packets have been established, namely fast authentication, integrity, and non-repudiation. Several experiments have been conducted using different digital signatures of the MSS variant signatures. The result shows that ESAODV is effective for combating routing attacks, and works properly although the malicious are 20% of the nodes total number in MANETs. In terms of features, ESAODV are also far superior than secure AODV (SAODV) and Authenticated Routing for Ad hoc Networks (ARAN).


international conference on biomedical engineering | 2011

An Overview: Segmentation Method for Blood Cell Disorders

M. F. Miswan; Johan Mohamad Sharif; Md. Asri Ngadi; Dzulkifli Mohamad; M. M. Abdul Jamil

Blood make up of 45% blood cells and 55% plasma. Blood cells consist of red blood cell (RBC), white blood cell (WBC) and platelet (thrombocytes). Each of the cells has the role to carry oxygen and carbon dioxide in the blood, work as an antibody and function for clot mechanism. Complete blood count (CBC) is done to measure all of the blood cells and including hematocrit and hemoglobin. Any abnormal reading which beyond the normal reading is considered blood cell disorder like leukimia, aplastic anemia, and others. Many analyzing methods has been developed to give a precise and reliable reading for CBC such as flow cythometric immunophenotyping, manual blood reading, blood smear, segmentation and others. Segmentation is among the best way for analyzing in term of cost effective and time consuming compared to other methods. A continuous improvement for 3D image segmentation will lead to a better result in the future.


International Journal of Computer Theory and Engineering | 2011

Automated Matching Systems and Correctional Method for Improved Inspection Data Quality

Mazura Mat Din; Norhazilan Md Noor; Md. Asri Ngadi; Khadijah Abd. Razak; Maheyzah Md Siraj

Advances in computing technology, and data gathering tools provides a great opportunity in engineering area such as civil structure analysis domain to better understand its phenomenon. Our case study utilize these advances in pipeline structure in order to study the corrosion behavior that been one of the problem that leads to its failure. The availability of ILI data from MFL tools provides a better insight of corrosion process by using an efficient systems and data analysis method in order to extract important information regarding the condition of the pipeline. Our paper will discuss an implementation of automated matching systems and data correctional method that shown a promising result to improve the quality of data for future reliability assessment. The automated matching systems was evaluated using linear regression method for its sensitivity analysis whereby a modified corrosion rate method was used along with linear prediction method to verify the accuracy of the corrected data. Issues and advantage gain from this research is threefold; timeliness, accuracy, and consistencies in data sampling. This is a preliminary work towards a reliable pipeline assessment method.


international conference on computer and electrical engineering | 2009

Intruder Location Tracking

Hossein Rouhani Zeidanloo; Md. Asri Ngadi

Since wireless networks provide flexibility, mobility and convenience in setup, they became more widespread today. However, due to the nature of wireless networks that use shared medium for communications it needs more security features as its wired counterpart. Attackers can use proper devices and techniques to pull signals from the air and gain access to the unprotected wireless networks from anywhere in range of wireless network which receive wireless signals. Therefore, it is very difficult to trace back to the attacker. The three current location tracking solution: Closest Access Point, Triangulation and Radio Frequency Fingerprinting have their own limitations in tracing wireless intruders. In this paper, in the beginning we consider discovering wireless networks techniques and then overview the three current solutions for location tracking and also propose an amendment for Triangulation method that aims to overcome the limitations of this method.


Computer Science Review | 2018

Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges

M. Faheem; S.B.H. Shah; R.A. Butt; B. Raza; M. Anwar; M.W. Ashraf; Md. Asri Ngadi; V.C. Gungor

Abstract The fourth industrial revolution known as Industry 4.0 has paved the way for a systematical deployment of the modernized power grid (PG) to manage continuously growing energy demand by integrating renewable energy resources. In the context of Industry 4.0, a smart grid (SG) by employing advanced Information and Communication Technologies (ICTs), intelligent information processing (IIP) and future-oriented techniques (FoT) allows energy utilities to monitor and control power generation, transmission and distribution processes in more efficient, flexible, reliable, sustainable, decentralized, secure and economic manners. Despite providing immense opportunities, SG has many challenges in the context of Industry 4.0 (I 4.0). To this end, this paper presents a comprehensive presentation on critical smart grid components with international standards and information technologies in the context of Industry 4.0. In addition, this study gives an overview of different smart grid applications, their benefits, characteristics, and requirements. Also, this research investigates and explores different wired and wireless communication technologies used in smart grid with their benefits and characteristics. Finally, this article discusses a number of critical challenges and open issues and future research directions.


Advanced Science Letters | 2017

Authentication mechanisms in a control grid computing environment using identity based identification (IBI)

Saiful Adli Ismail; Md. Asri Ngadi; Johan Mohd Sharif; Mohd Nazri Kama

Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through verification process. However, most of the grid computing system is still using public key infrastructure (PKI) as an industry standard and certificate authority (CA) server to authenticate users to access the grid resources. Several works have been done enhancing RSA algorithm for grid authentication computing system. Though, none of the work has addressed specifically how to avoid the vulnerability. This paper proposed an alternative authentication mechanism using Identity based Identification (IBI) algorithm with a verification process to ensure the user identification, and carry out the experiment in the GridSim toolkit simulator.


International Journal of Ad Hoc and Ubiquitous Computing | 2013

Quorum-based location service protocol for vehicular ad hoc networks in urban environment

Salim M. Zaki; Md. Asri Ngadi; Maznah Kamat; Shukor Abd Razak

The existing location service protocols used in vehicular ad hoc network VANET environments suffer from poor scalability, and do not consider load distribution on location servers while the usage of unrealistic information for selecting location servers affects the efficiency of the protocols. This paper presents a vehicular quorum location service VQLS protocol, which is designed for an urban area topology. VQLS uses fuzzy inference engine FIE in selecting the most stable node to be a main location server MLS based on the distance of a node to intersection centre point and its speed. The server constructs a quorum group, which consists of the nominated nodes that passing through the intersection in order to distribute the load on quorum members. VQLS shows superior performance in reducing overhead of control packets, and balance the load on dense intersection vicinity. Additional achievement is low end-to-end delay for routing packets.

Collaboration


Dive into the Md. Asri Ngadi's collaboration.

Top Co-Authors

Avatar

Johan Mohamad Sharif

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Satria Mandala

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Shukor Abd Razak

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abdul Hanan Abdullah

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Salim M. Zaki

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abdul Samad Ismail

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Johan Mohd Sharif

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

M. S. S. Omar

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mazura Mat Din

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Muhammad Mahadi Abdul Jamil

Universiti Tun Hussein Onn Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge