Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Salwani Mohd Daud is active.

Publication


Featured researches published by Salwani Mohd Daud.


international conference on digital information processing and communications | 2011

A Survey on Image Steganography Algorithms and Evaluation

Arash Habibi Lashkari; Azizah Abdul Manaf; Maslin Masrom; Salwani Mohd Daud

The technique of hiding confidential information within any media is known as Stegonography. Since both stegonography and cryptography are used to protect confidential information, the two are used interchangeably. This is wrong because the appearance of the output from the two processes is totally different; the output from a stegonography operation is not apparently visible while for cryptography the output is scrambled such that it easily draws attention. The detection of the presence of stegonography is referred to as Steganlysis. In this article we have attempted to elucidate the main image steganography approaches, and then we will evaluate the techniques and result will show in a table and discuss.


international conference on computer communications | 2014

Quality of service (QoS) model for web service selection

Meysam Ahmadi Oskooei; Salwani Mohd Daud

Nowadays, likewise the functionality of a web service, Quality of Service (QoS) has become an essential feature of web service characteristic for users to select the suitable web services for a distributed application by identifying which characteristics make service more qualified to be selected. Although proposed QoS models by existing works may satisfy the required quantitative measurement of QoS attributes, clustering all generic quality attributes in a same group may have a negative impact on technical QoS attributes such as Response time. Consequently, from technical point of view, lack of a comprehensive model to evaluate web services in terms of technical and non-technical QoS attributes is an important issue on topic, affecting the accuracy of the results in general, and is addressed in this paper.


International journal of innovation, management and technology | 2013

A Review on Predicting Outbreak of Tungro Disease in Rice Fields Based on Epidemiological and Biophysical Factors

Salwani Mohd Daud

This paper reviews on tungro disease predictive technique in rice fields. The success of a monitoring system can be measured by its ability to provide early detection of pests for prevention of a serious outbreak of rice tungro. This paper also discusses on spectral reflectance data of epidemiological and biophysical factors that are related to tungro outbreak and also propose using these data along with an algorithm to predict probability of tungro disease occurrence. This information then could be used in agricultural decision support system for taking actions according to the level of threats that have been predicted.


digital information and communication technology and its applications | 2011

Security evaluation for graphical password

Arash Habibi Lashkari; Azizah Abdul Manaf; Maslin Masrom; Salwani Mohd Daud

Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical Password or Graphical user authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. All of Graphical Password algorithms have two different aspects which are usability and security. This paper focuses on security aspects of algorithms that most of researchers work on this part and try to define security features and attributes. Unfortunately, till now there isn’t a complete evaluation criterion for graphical password security. At first, this paper tries to study on most of GUA algorithm. Then, collects the major security attributes in GUA and proposed an evaluation criterion.


Archive | 2009

Quality Issues Facing Malaysian Higher Learning Institutions: A Case Study of Universiti Teknologi Malaysia

Marlia Puteh; Salwani Mohd Daud; N. H. Mahmood; N. A. Azli

This chapter analyses the extent to which Malaysian universities have responded to the pressing call for enhancing institutional quality and advocating academic excellence. Malaysian universities have been challenged by both internal and external assessments that suggest that they are not on a par with their international competitors. As a result there have been great demands for an urgent remedy. This chapter explores the progress that has been made in responding to those demands and the limitations that have been encountered. In so doing it provides a case study that focuses on engineering programmes in particular. The chapter is intended to answer the question: can institutional quality improvement deliver the human capital that Malaysia needs in order to remain globally competitive?


Current Bioinformatics | 2017

Enhancing efficiency of protein functional prediction through association network using greedy weighting method

Atabak Kheirkhah; Salwani Mohd Daud; Kamilia Kamardin

Background: In spite of the significant data surrounding complex gene networks including gene function, the occurrence of huge redundancy affects the efficiency. Objective: This work proposes a mining method to reduce the number of redundant nodes in a composite weighted network. Method: The idea is to eliminate the redundancies of nodes via a hybrid approach, i.e. the integration of multiple functional association networks using a Greedy Algorithm. This is achieved by mining the gene function from weighted gene co-expression networks based on neighbor similarity, as per the available datasets. Subsequently, Linear Regression and Greedy Algorithm are applied simultaneously for exclusion of the redundant nodes. Then, assigning the indexing rates for the remaining nodes in the dataset further assists the process. Results and Conclusion: In comparison with other well-known algorithms, this method is 93% more efficient, as per three selected benchmarks.


PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES | 2014

Modeling quality attributes and metrics for web service selection

Meysam Ahmadi Oskooei; Salwani Mohd Daud; Fang Fang Chua

Since the service-oriented architecture (SOA) has been designed to develop the system as a distributed application, the service selection has become a vital aspect of service-oriented computing (SOC). Selecting the appropriate web service with respect to quality of service (QoS) through using mathematical solution for optimization of problem turns the service selection problem into a common concern for service users. Nowadays, number of web services that provide the same functionality is increased and selection of services from a set of alternatives which differ in quality parameters can be difficult for service consumers. In this paper, a new model for QoS attributes and metrics is proposed to provide a suitable solution for optimizing web service selection and composition with low complexity.


2013 International Conference on Informatics and Creative Multimedia | 2013

Discrete Wavelet Transform Domain Techniques

Farnaz Arab; Salwani Mohd Daud; Siti Zaiton Mohd Hashim

In this paper we focus on the process of embedding and retrieving on DWT domain in format of video. We therefore have chosen some proposed technique in DWT. We choose DWT because as it provides both spatial and frequency domain characteristic of the signal.


International Conference on Advanced Machine Learning Technologies and Applications | 2012

A New Dynamic Hash Algorithm in Digital Signature

Erfaneh Noroozi; Salwani Mohd Daud; Ali Sabouhi; Hafiza Abas

This paper presents adoption of a new hash algorithm in digital signature. Digital signature presents a technique to endorse the content of the message. This message has not been altered throughout the communication process. Due to this, it increased the receiver confidence that the message was unchanged. If the message is digitally signed, any changes in the message will invalidate the signature. The comparison of digital signature between Rivest, Shamir and Adleman (RSA) algorithms are summarized. The finding reveals that previous algorithms used large file sizes. Finally the new encoding and decoding dynamic hash algorithm is proposed in a digital signature. The proposed algorithm had reduced significantly the file sizes (8 bytes) during the transferring message.


International Conference on Advanced Machine Learning Technologies and Applications | 2012

Novel Binary Search Algorithm for Fast Tag Detection in Robust and Secure RFID Systems

Marizan Yaacob; Salwani Mohd Daud

Novel binary search algorithm for fast tag detection (BSF1) and (BSF2) in robust and secure RFID systems is presented in this paper. These algorithms introduce fast tag detection with the new method of inquiry. Tags were grouped in two groups and tag collisions of each group were solved by implementing dynamic searching and backtracking procedure. By grouping the tags, time for solving collision was reduced. It performed fast detection in a robust situation, a group of tags with all possibilities of ID arrangements. Tags attached to the products of different manufacturers may considerably have robust ID. For the security of RFID system, the number of bit (n) will be increased to provide allocation of 2n unique ID. The increasing number of bit and the uniqueness of ID will increase the security of the system from counterfeiting. However it will also increase time identification, but our algorithms will provide fast detection in the situation of high security.

Collaboration


Dive into the Salwani Mohd Daud's collaboration.

Top Co-Authors

Avatar

Azizah Abdul Manaf

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Hafiza Abas

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Erfaneh Noroozi

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Kamilia Kamardin

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Suriani Mohd Sam

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marlia Puteh

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Meysam Ahmadi Oskooei

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Noor Azurati Ahmad

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Suwaibah Shubli

Universiti Teknologi Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge