Mohd Kamir Yusof
Universiti Sultan Zainal Abidin
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mohd Kamir Yusof.
The Smart Computing Review | 2002
Mohd Kamir Yusof; Nor Surayati Mohamad Usop; Ahmad Faisal Amri Abidin
Cryptography is most popular in information security. Chaotic encryption is one of the technique can be used to secure the information from unauthorized person. In this paper, chaotic encryption was implemented in development of secure chat room application. Chat room application will use for communication by sending a message. Three components involved in the chat room application which are sender, receiver and server. Two core functions in chaotic encryption are encryption process and decryption process. Encryption process will convert plaintext to cipher text. Decryption process will convert ciphertext to plaintext with enter a secret key. Chat room application was developed using JAVA. This application was tested with several experiments. The result indicates implementation of chaotic encryption make a chat room application more secure and reliable.
asia-pacific conference on communications | 2011
Mohd Kamir Yusof; Ahmad Faisal Amri Abidin
Instant messenger is an IM application that allows communication in a secured manner. A secured private IM is needed to ensure data transmission between sender and recipient more secure. This paper presents a secure IM architecture. A secure architecture is divided into four modules; chat module, transceiver module, secure module, and routing module. In this research, hash algorithm was applied in secure module. The main function of hash algorithm is to encrypt and convert into hash value. The purpose of this encryption is to ensure unauthorized person cannot view the original data or information through the network. IM application was developed and tested. The result indicates this architecture and hash algorithm able to improve level of data security.
web intelligence, mining and semantics | 2011
Mohd Kamir Yusof; Ahmad Faisal Amri Abidin; Surayati Usop; Sufian Mat Deris
World Wide Web is important tool to web users. This tool enables the web users gain information about education, entertainment, etc. In this research, we investigate the issue for data access to heterogeneous data sources. Web query processing is issue for access the heterogeneous data sources. In this research, new architecture for improving web query processing in heterogeneous databases was presented. In this architecture components such initial query, exploit query, refinement query and match query is implemented in order to improve web query processing. Meanwhile, new algorithm designed to support this architecture. Based on approaches above, we also present architecture and prototype of a system for heterogeneous database access.
The Smart Computing Review | 2012
Mohd Kamir Yusof; Ahmad Faisal Amri Abidin; Mat Atar Mat Amin
An instant messenger is an application that allows communication in a secure manner. A secured private instant messenger is needed to ensure secure data transmission between the sender and recipient. This paper presents secure instant messenger architecture. It is divided into four modules: a chat module, transceiver module, secure module, and routing module. In this paper, a hash algorithm was applied to the secure module. The main function of the hash algorithm is to encrypt and convert the data into a hash value. The purpose of this encryption is to ensure that unauthorized persons cannot view the original data or information through the network. The instant messenger application was developed and tested, and the results indicate that this architecture and hash algorithm can improve data security for instant messenger applications.
Journal of Information Technology & Software Engineering | 2011
Mohd Kamir Yusof; Ahmad Faisal Amri Abidin; Mohd Sufian Mat Deris
Bioinformatics is combination between biology and informatics. Most of biological data is used by private or government sectors such clinics, hospitals, etc. Web based application is tool to access this biological data. A good methodology or technique is needed to store huge of biological data. In this research, two issues have been identified. First is data integration and second is web query processing. In this paper, technique for data integration and mapping algorithm will propose in order to improve web query processing in bioinformatics. Data integration means integration different data sources and store into a single data source. This single database source will store only important information such a keyword and data source destination. The keyword in data warehouse will match will information enter by web user. Then, a mapping algorithm will map to only relate data source for searching and retrieving process. A simple web based application was developed and tested. Several experiments have been done and results indicates a mapping algorithm and data warehouse approach for data integration able to improve web query processing in bioinformatics in term of time performance.
Indonesian Journal of Electrical Engineering and Computer Science | 2017
Mohd Kamir Yusof
Hilbert Vibration Decomposition (HVD) is introduced to the voltage flicker analysis. When voltage flicker accompanies with high order harmonics, the instantaneous frequency of its analytic signal in principle consists of two different parts, power frequency and a rapidly varying asymmetrical oscillating part. The important property of the instantaneous frequency offers a direct way to estimate the power frequency using a low-pass filter and remove the high order harmonics without pre-treatment procedures. Corresponding voltage flicker envelope is estimated using synchronous detection. The HVD method does not involves basic functions that the wavelet transform method needs. It can also adaptively estimate the frequency and amplitude of every modulation frequency component. Simulation results prove that the proposed method could accurately detect voltage flicker with high order harmonics. It has higher calculation efficiency and detection precision than wavelet transform method. Experimental results show that the new algorithm is feasible and efficient.
New Library World | 2015
Mohd Kamir Yusof; Andrew Abel; Yazid Mohd Saman; Mohd Nordin Abdul Rahman
Purpose – The purpose of this paper is to first review the implementation of automatic identification and data capture) technologies in library/information science, focusing on barcode technology, radio frequency identification (RFID) and near field communication (NFC). This paper then presents S-Library, a new android-based application, to enable users to perform a wide range of information science-related transactions, such as borrowing, searching, returning and viewing transaction records. Design/methodology/approach – This paper presents the design process and the database and software components. For analysis, the authors used application testing, and also usability testing, with a questionnaire distributed to 343 users. Findings – The implementation of NFC technology means that S-Library has a number of technical advantages over other approaches. It was also shown with user acceptance testing that there was a high degree of user satisfaction with S-Library. Research limitations/implications – Althou...
Malaysian orthopaedic journal | 2015
Kamudin Naf; M Firdouse; Mohd Kamir Yusof; Orth; Zainal Abidin; Sultan Haji; Ahmad Shah
Background Monteggia fracture-dislocation is rare in children. Various reports attest to its rarity, while recording the many variant of this injury. It is, therefore, easy to miss the diagnosis in the absence of proper clinical examination and radiographs. Case Report This report highlights two rare variants of Monteggia fracture-dislocation seen in children. The first case was a 12-year old girl alleged to have fallen from a 15- feet tall tree and sustaining a combined type III Monteggia injury with ipsilateral Type II Salter-Harris injury of distal end radius with a metaphyseal fracture of the distal third of the ulna. The second case was a 13-year old who had sustained a closed fracture of atypical Type I Monteggia hybrid lesion, in a road traffic accident. Conclusion This report highlights the rare variants of Monteggia fracture dislocation which could have been missed without proper clinical examinations and radiographs.
Journal of Computer Science | 2015
Mohd Kamir Yusof; Yazid Mohd Saman; Wan Nor Shuhadah Wan Nik
Six applications which are based on mediator approach have been reviewed in this study. In practice, The mediator is used to integrate and access data from different data sources. The important characteristics for the implementation of mediator approach have been identified. This include types of data, file format and object data. These characteristics together with the advantages and the disadvantages of each implementation mediator approach described in section 4. This is important for other researchers to do the literature review. Indeed, this study highlights important issues that need to be addressed before future directions for the research in the area of database integration based on mediator is channelled.
digital information and communication technology and its applications | 2011
Mohd Kamir Yusof; Ahmad Faisal Amri Abidin; Sufian Mat Deris; Surayati Usop
A good methodology for web query processing is needed to improve web query processing. In order to improve web processing in web based application, new and robust methods should be identified. In this research, web query processing for heterogeneous database access issue will determine and provide a proposed method to overcome this issue. The issue is time performance for searching and retrieving process in heterogeneous database access. In order to overcome this problem, intelligent algorithm was designed. This intelligent algorithm was integrated with XML language. XML is powerful tool for data exchange. Experiments have been done by comparing XML and integration between XML and proposed intelligent algorithm. The result indicates the integration between XML and proposed intelligent algorithm is better compared to XML in term of time performance.