Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zul Azri Muhamad Noh is active.

Publication


Featured researches published by Zul Azri Muhamad Noh.


Wireless Personal Communications | 2014

Provisioning Quality of Service of Wireless Telemedicine for E-Health Services: A Review

Mustafa Almahdi Algaet; Zul Azri Muhamad Noh; Abdul Samad Shibghatullah; Ali Ahmad Milad; Aouache Mustapha

In general, on-line medical consultation reduces time required for medical consultation and induces improvement in the quality and efficiency of healthcare services. The scope of study includes several key features of present day e-health applications such as X-ray, ECG, video, diagnosis images and other common applications. Moreover, the provision of Quality of Service (QoS) in terms of specific medical care services in e-health, the priority set for e-health services and the support of QoS in wireless networks and techniques or methods aimed at IEEE 802.11 to secure the provision of QoS has been assessed as well. In e-health, medical services in remote places which include rustic healthcare centres, ships, ambulances and home healthcare services can be supported through the applications of e-health services such as medical databases, electronic health data and the transferring of text, video, sound and images. Given this, a proposal has been made for a multiple service wireless networking with multiple sets of priorities. In relation to the terms of an acceptable QoS level by the customers of e-health services, prioritization is an important criterion in a multi-traffic network. The requirement for QoS in medical networking of wireless broadband has paved the way for bandwidth prerequisites and the live transmission or real-time medical applications. The proposed wireless network is capable of handling medical applications for both normal and life-threatening conditions as characterized by the level of emergencies. In addition, the allocation of bandwidth and the system that controls admittance designed based on IEEE 802.16 especially for e-health services or wireless telemedicine will be discussed in this study. It has been concluded that under busy traffic conditions, the proposed architecture can used as a feasible and reliable infrastructure network for telemedicine.


international conference on information and communication technologies | 2013

Provisioning quality of service of wireless telemedicine for e-health services

Mustafa Almahdi Algaet; Zul Azri Muhamad Noh; Abdul Samad Shibghatullah; Ali Ahmad Milad

Telemedicine is not yet all worked out where it can be utilized constantly or flexibly. But, it has enormous potential to be a tremendous asset to the world and all its civilizations. Telemedicine has had a positive impact on some aspects of patient care. There is no arguing that the contributions it can make have endless possibilities however more time and effort will be needed to organize telemedicine for it to be confidently accepted. Asynchronous telemedicine does not require the simultaneous availability of the source and recipient of patient information. Telemedicine can be roughly characterized as either synchronous or asynchronous. Synchronous telemedicine involves caregivers acquiring and acting upon information about a remote patient in near real-time.


international conference on information and communication technologies | 2013

Design a novel reverse direction transmission using piggyback and piggyback with block ACK to improving the performance of MAC layer based on very high speed wireless lans

Ali Ahmad Milad; Zul Azri Muhamad Noh; Abdul Samad Shibghatullah; Mustafa Almahdi Algaet

A reverse direction transmission and block acknowledgement are the main features to improve the performance of MAC layer based on next generation wireless LANs. When the data send it in reverse direction from side A to B, side B does not need to send separate ACK, it may wait for a period of time is less than the senders time of period to avoid the retransmission at sender and send a piggyback frame (ACK+data) this called piggybacking. Piggyback with block ACK represented in multi data send from side A to B with block ACK request (BAR), side B send block ACK (BA) piggybacking with multi data to side A, this called piggybacking with block ACK. In our scheme here we want to propose a novel reverse direction transmission using piggyback and piggyback with block ACK which is divided each data frame send and receive into subframes and send each subframe separately, if there is an error happened during the transmission only retransmission the corrupted subframe instead of whole frame. We want to implement this work in NS2 simulator. The research contributions are summarized and the piggyback schemes that need to be investigated via high speed wireless LANs are also highlighted.


Journal of Computer Science | 2013

TRANSMISSION CONTROL PROTOCOL PERFORMANCE COMPARISON USING PIGGYBACK SCHEME IN WLANS

Ali Ahmad Milad; Zul Azri Muhamad Noh; Abdul Samad Shibghatullah; Shahrin Sahib; Rabiah Ahmad; Mustafa Almahdi Algaet

The main problem at wireless networks is the overhe ad at MAC layer; when the data physical rate is increasing it causes increasing the overhead and de creasing at the MAC efficiency. In this study we st udy the performance comparison of TCP protocol in WLANs with and without using piggyback. The study of results concerning of implemented both mechanisms in NS2 simulator and find out the good performance from this comparison. Based on the results from our experiments show that the Piggyback scheme is one of the efficient ways to reduce the overhead at MAC wi reless networks.


2013 International Conference on Technology, Informatics, Management, Engineering and Environment | 2013

Preliminary study of host and network-based analysis on P2P Botnet detection

Raihana Syahirah Abdullah; Mohd Faizal Abdollah; Zul Azri Muhamad Noh; Mohd Zaki Mas'ud; Shahrin Sahib; Robiah Yusof

Botnet is a network of compromised computer that running malicious software remotely controlled by an attacker known as Botmaster. The threat of Botnet threaten is widely dangerous and it is crucially to overcome this crisis. Some new bots use P2P protocols to construct command and control system are known as peer-to-peer (P2P) Botnet. More severe when P2P Botnet incorporated the centralized and distributed communication which make it more robust and complicated for detection. Hence, the analysis is necessary to be conducted especially in the combination of host-based and network-based in order to detect bots accurately. This paper provides the details analysis on host-based analysis and network-based analysis to detect P2P bots that will reveal their unique characteristic and behaviors. The result of experimental testbed on datasets show that it is possible to detect effectively P2P Botnet in standalone host and network packets payload. Thus, this analysis can be used for early warning of P2P Botnet activities in the host-and network-level as prevention mechanism.


Wireless Personal Communications | 2017

Development of Robust Medical Image Transmission via Wi-Fi IEEE 802.11b in the Hospital Area

Mustafa Almahdi Algaet; Zul Azri Muhamad Noh; Abd Samad Hasan Basari; Abdul Samad Shibghatullah; Ali Ahmad Milad; Ahmed Bashir Abugharsa; Aouache Mustapha

Recently, many clinical trials have used telemedicine as their major tool. This technology is used as it able quick diagnosis with visuals and quantitative assessment that helps both health practitioners and professionals. The vastness of the medical and healthcare sector and their importance in ensuring the quality of life for all citizens has made the need for a medical diagnosis with image vital. Hence, software like medical data simulation (Medata-SIM) that is used to assess medical image is developed further. The description of Medata-SIM software tool which consists of main step known as compress segment part will be processed by lossy and lossless technique with accepted compression methods, while transmission/receiver segment will be processed using Wi-Fi 802.11b with low-cost, Low-bandwidth transmission. Finally, the outcome segment will be for decompression and results are featured in this paper.


International Journal of Advanced Computer Science and Applications | 2017

Multivariate Statistical Analysis on Anomaly P2P Botnets Detection

Raihana Syahirah Abdullah; M. A. Faizal; Zul Azri Muhamad Noh

Botnets population is rapidly growing and they become a huge threat on the Internet. Botnets has been declared as Advanced Malware (AM) and Advanced Persistent Threat (APT) listed attacks which is able to manipulate advanced technology where the intricacy of threats need for continuous detection and protection. These attacks will be almost exclusive for financial gain. P2P botnets act as bots that use P2P technology to accomplish certain tasks. The evolution of P2P technology had generated P2P botnets to become more resilient and robust than centralized botnets. This poses a big challenge on detection and defences. In order to detect these botnets, a complete flow analysis is necessary. In this paper, we proposed anomaly detection through chi-square multivariate statistical analysis which currently focuses on time duration and time slot. This particular time is considered to identify the existence of botserver. We foiled both of host level and network level to make coordination within a P2P botnets and the malicious behaviour each bot exhibits for making detection decisions. The statistical approach result show a high detection accuracy and low false positive that make it as one of the promising approach to reveal botserver.


Journal of Computer Science | 2015

Design a New Bidirectional Transmission Protocol to Improve the Performance of MAC Layer Based on Very High Speed WLANs

Ali Ahmad Milad; Zul Azri Muhamad Noh; Abdul Samad Shibghatullah; Mustafa Almahdi Algaet; Aouache Mustapha

This paper presents a new bidirectional transmission protocol with single data frame to computing the performance of MAC layer based on IEEE 802.11n. As high as 600 Mbps of physical data rate is achieved in IEEE 802.11n where high data rate the current MAC layer leads to high performance overhead and low performance of throughput and designing the MAC layer still ongoing to achieve high performance throughput. In this study, a new bidirectional transmission protocol with single data frame has been proposed called BTDF bidirectional transmission data fragmentation, which is divided each data frame from sender to receiver and reverse into subframes and send each subframe, Packets those exceed the size threshold are divided into fragments also where the corrupted subframe will be retransmitted during the disruption of transmission. We have implemented this scheme in NS2 simulator to show the results for TCP and HDTV traffics and compared with literature.


information assurance and security | 2013

Enhanced P2P botnets detection framework architecture with hybrid analyzer: Host-based and network-based

Raihana Syahirah Abdullah; M. A. Faizal; Zul Azri Muhamad Noh; Siti Rahayu Selamat; Mohd Zaki Mas'ud; Shahrin Sahib

Nowadays, botnets are the most advanced cybercrime as being powerful threaten to the internet infrastructure by risking the Internet stability and security. Millions of computers have been hijacking and infecting by botnets especially during peak activity. The P2P botnets exploit users and dominating the P2P technology which make botnets are harder to detect and terminated. As P2P botnets issues been highlighted as its dramatically evolvement, this paper addresses on current problems relate to P2P botnets faced by users and recommending the improvement. Also, this paper concentrated on proposing P2P botnets detection framework. Also, an in-depth analysis of P2P botnets has been conducted to understand and cope with their behaviors and characteristics. The new improvement has been introduced at the propose botnets framework architecture to improve the effectiveness of P2P detection analysis. The framework architecture has been structuralized with hybrid analyzer through the marriage of host-based and network based. Prior to this matter, this research has proposed a new enhancement on framework architecture that has been reinforced by hybrid detection technique to improve the effectiveness and efficiency of P2P botnets detection.


international conference on information technology | 2011

Retransmission-based additional TXOP allocation for audio-video transmission by IEEE 802.11e HCCA

Zul Azri Muhamad Noh; Mohd Najwan Md Khambari; Nor Azman bin Mat Ariff; Irda binti Roslan

This paper proposed a method of allocating additional TXOP duration to replenish the bandwidth used during the retransmission of frames at link layer in audio-video transmission by IEEE 802.11e HCCA. In the proposed scheme, the HC monitors the number of retransmission at link layer and utilize the surplus bandwidth to allocate additional TXOP duration on the basis of number of retransmission performed during the last transmission. The proposed scheme also reduces the polling overhead to gain surplus bandwidth by polling only a station in a polling interval. By simulation, we compare the application-level QoS of the TGe scheme and the proposed scheme. Numerical results show that the proposed scheme can keep the QoS of audio and video high under lossy wireless channel especially when the number of multimedia stations is small. Furthermore, the proposed scheme can admit more traffic flows than the TGe scheme.

Collaboration


Dive into the Zul Azri Muhamad Noh's collaboration.

Top Co-Authors

Avatar

Abdul Samad Shibghatullah

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Ali Ahmad Milad

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Mustafa Almahdi Algaet

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Raihana Syahirah Abdullah

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Aouache Mustapha

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Zaki Mas'ud

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Abd Samad Hasan Basari

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

M. A. Faizal

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Mohd Faizal Abdollah

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Robiah Yusof

Universiti Teknikal Malaysia Melaka

View shared research outputs
Researchain Logo
Decentralizing Knowledge