Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where hayati Mohamed Noor is active.

Publication


Featured researches published by hayati Mohamed Noor.


2010 International Conference on Information Retrieval & Knowledge Management (CAMP) | 2010

Performance evaluation between IPv4 and IPv6 on MPLS Linux platform

Rozita Yunos; Noorhayati Mohamed Noor; Siti Arpah Ahmad

This paper presents the performance evaluation between IPv4 and IPv6 with Linux MPLS tunnel. MPLS Linux tunneling is used to transport IPv6 data stream over IPv4 network for interoperable IPv4 and IPv6 deployment. The performance metrics such as jitter, datagram/packet loss and bandwidth were measured in both TCP and UPD traffic flow. The experiment test-bed was constructed using virtual machine tool for simulating the IPv4, IPv6, and the MPLS tunneling mechanism. This study revealed that IPv6 offered better performance than IPv4 in almost all of the testing except in TCP transfer. In addition, MPLS tunnel improved performance in packet transfer for TCP transfer, UDP transfer and bandwidth testing.


ieee international conference on control system, computing and engineering | 2013

Optic cup and disc color channel multi-thresholding segmentation

Noorhayati Mohamed Noor; Noor Elaiza Abdul Khalid; Norharyati Md Ariff

Cup to disc ratio (CDR) is very important indicators in glaucoma detection. This paper proposes a method for glaucoma detection using digital fundus images with color multi-thresholding segmentation. The objective of this paper is to segment the optic cup and optic disc using color multi-thresholding segmentation and extracted feature such as cup to disc (c/d) ratio. Three ophthalmologists analysis was used as a reference to the automated segmented fundus image for a cup-to-disc ratio (CDR) measurement to discriminate glaucomatous from normal eyes. The performance of the optic cup and optic disc using color multi-thresholding segmentation has been evaluated and compared to each other. The results presented in this paper indicate that the features are clinically significant in the detection of glaucoma.


control and system graduate research colloquium | 2010

Adaptive Neuro-Fuzzy Inference System for brain abnormality segmentation

Noorhayati Mohamed Noor; Noor Elaiza Abdul Khalid; Rohaida Hassan; Shafaf Ibrahim; Ihsan Mohd Yassin

This paper studies the application of the Adaptive Neuro-Fuzzy Inference System (ANFIS) for segmentation of brain abnormality in MRI images. Segmentation of MRI image is an important part of brain imaging research. In this study, 150 MRI images were used as testing data for the system. The data was created by combining the shapes and size of various abnormalities and pasting it onto normal brain image. Several types of backgrounds were tested — low, medium and high grey levels. The experimental results show good segmentation for medium and low background levels value for both light and dark abnormality levels over different backgrounds.


international conference on computer research and development | 2010

Fish Bone Impaction Using Adaptive Histogram Equalization (AHE)

Noorhayati Mohamed Noor; Noor Elaiza Abdul Khalid; Mohd Hanafi Ali; Alice Demi Anak Numpang

This paper presents the enhancement capability of adaptive histogram equalization (AHE) on the soft tissue lateral neck radiograph for suspected fish bone ingestion. Embedded fish bone lodge in the throat is not easily visible in unprocessed plain radiograph. Serious complication may cause perforation of the lodged and inflammation that can progress to abscess. Forty X-ray images of 23 male and 17 female patients between the ages of 6 to 72 years from different ethnic groups were collected from Hospital Sungai Buloh and Pusat Perubatan Hospital Universiti Kebangsaan Malaysia (PPUKM). Due to the high resolution, the images were crop before being processed using adaptive histogram equalization. The quality of the image was assessed and evaluated during pre and post processing by the radiologists. The result shows AHE as a promising contrast enhancement for detection of fish bone in soft tissue at the lateral neck radiographs.


international symposium on information technology | 2008

Evaluation of Sobel, Canny, Shen & Castan using sample line histogram method

Mohd Ashri Abu Hassan; Noor Elaiza Abdul Khalid; Asmah Ibrahim; Noorhayati Mohamed Noor

This paper introduces a sample line histogram method (SLHM) in evaluating the accuracy in detecting bone edges. CR images of bone joints namely the knee and the elbow joints are used in this experiment. The purpose of the project is to identify the suitable method for bone cortical edge detection. The performance of three edge detection method: Sobel, Canny and Shen & Castan are compared. The resulting images are evaluated by visual inspection and SLHM.


international conference on technological advances in electrical electronics and computer engineering | 2013

Windows registry analysis for forensic investigation

Raihana Md Saidi; Siti Arpah Ahmad; Noorhayati Mohamed Noor; Rozita Yunos

Cyber attack comes in various approach and forms, either internally or externally. Remote access and spyware are forms of cyber attack leaving an organization to be susceptible to vulnerability. This paper investigates illegal activities and potential evidence of cyber attack through studying the registry on the Windows 7 Home Premium (32 bit) Operating System in using the application Virtual Network Computing (VNC) and keylogger application. The aim is to trace the registry artifacts left by the attacker which connected using Virtual Network Computing (VNC) protocol within Windows 7 Operating System (OS). The analysis of the registry focused on detecting unwanted applications or unauthorized access to the machine with regard to the user activity via the VNC connection for the potential evidence of illegal activities by investigating the Registration Entries file and image file using the Forensic Toolkit (FTK) Imager. The outcome of this study is the findings on the artifacts which correlate to the user activity.


international conference on computer graphics, imaging and visualisation | 2008

Gaussian Rule Based Fuzzy (GRBF) Membership Edge Detection on Hand Phantom Radiograph Images

N.E. Abdul Khalid; Mazani Manaf; Mohd Ezane Aziz; Noorhayati Mohamed Noor; N. Zainol

This paper introduces the Gaussian shaped membership function to refine the Rule Based Fuzzy (RBF) image detection. It is expected that the proposed algorithm Gaussian Rule Based Fuzzy (GRBF) method can further refined the detection of periosteal and endosteal edges of hand phantom radiographs. The experimental data consists of four sets of hand phantom radiograph. Only metacarpal 2, 3 and 4 are considered. All of these data are processed with both GRBF and RBF. Mean and median filters are used as preprocessing tools. The results are compared both subjectively and statistically. The periosteal (strong edges) are well detected by both RBF and GRBF. However GRBF performs better than RBF in detecting the endosteal edges (weak edges).


international conference on software engineering and computer systems | 2011

A Review of Bio-inspired Algorithms as Image Processing Techniques

Noor Elaiza Abdul Khalid; Norharyati Md Ariff; Saadiah Yahya; Noorhayati Mohamed Noor

This paper reviews 80 out of 130 bio-inspired Algorithm (BIAs) researches published in google scholar and IEEExplore between the periods of 1995 to 2010 used to solve image processing problems. BIAs has been successfully applied in many sciences, medical and engineering fields. The evolving, dynamic and meta-heuristics nature of BIAs makes it more robust, accurate and efficient in solving image processing problems. However finding the appropriate BIAs that matches the problem at hand is a tedious and difficult task. The BIAs investigated in this study are Genetic Algorithms, Evolutionary strategies, Genetic programming, memetic algorithms, swarm intelligence and artificial immune system. The publications are categorized by year of publication, by specific BIAs and by application. The statistics shows exponential increases in the application of BIAs to solve image processing problems and some algorithms have yet to be explored.


IOP Conference Series: Materials Science and Engineering | 2016

Selfish Gene Algorithm Vs Genetic Algorithm: A Review

Norharyati Md Ariff; Noor Elaiza Abdul Khalid; Rathiah Hashim; Noorhayati Mohamed Noor

Evolutionary algorithm is one of the algorithms inspired by the nature. Within little more than a decade hundreds of papers have reported successful applications of EAs. In this paper, the Selfish Gene Algorithms (SFGA), as one of the latest evolutionary algorithms (EAs) inspired from the Selfish Gene Theory which is an interpretation of Darwinian Theory ideas from the biologist Richards Dawkins on 1989. In this paper, following a brief introduction to the Selfish Gene Algorithm (SFGA), the chronology of its evolution is presented. It is the purpose of this paper is to present an overview of the concepts of Selfish Gene Algorithm (SFGA) as well as its opportunities and challenges. Accordingly, the history, step involves in the algorithm are discussed and its different applications together with an analysis of these applications are evaluated.


ieee conference on systems process and control | 2013

Analysis of routing protocols of VoIP VPN over MPLS network

Rozita Yunos; Siti Arpah Ahmad; Noorhayati Mohamed Noor; Raihana Md Saidi; Zarina Zainol

Voice over internet protocols (VoIP)s quality communication relies significantly on the network; however guarantee the best quality of the traffic is difficult. This paper analyzes the performance of VoIP traffic in Border Gateway Protocol (BGP) -Multiprotocol Label Switching (MPLS) IP Virtual Private Network (VPN) between two interior routing protocols namely Enhanced Interior Gateway Protocol (EIGRP) and Open Shortest Path First (OSPF). The combination of MPLS and conventional routing improve the forwarding mechanism, scalability and overall network performance. OPNET Modeler 14.5 is used to simulate both scenarios and metrics such as delay, jitter and mean opinion score (MOS) value are measured. The simulation result shows OSPF and BGP-MPLS VPN provides better infrastructure for VoIP VPN application.

Collaboration


Dive into the hayati Mohamed Noor's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mazani Manaf

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar

Rozita Yunos

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohd Ezane Aziz

Universiti Sains Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Nasir Taib

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rathiah Hashim

Universiti Tun Hussein Onn Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge