International Islamic University Malaysia

Displaying 1-25 of 25 results

  • White Papers // Mar 2012

    On the Boundaries of Trust and Security in Computing and Communications Systems

    This paper analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the other hand, security is about making sure...

    Provided By International Islamic University Malaysia

  • White Papers // Mar 2012

    IDPS: An Integrated Intrusion Handling Model for Cloud

    Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides...

    Provided By International Islamic University Malaysia

  • White Papers // Jan 2012

    Developing and Validating an Instrument for Measuring M-Commerce Adoption: An Exploratory Analysis

    Mobile Commerce, also known as, M-commerce is thought to be the next big phase in this technologically dependent society after E-commerce era. However, its adoption and level of use is low in Malaysia compared to others nations such as Korea, Singapore, and Japan. This study aims to identify some factors...

    Provided By International Islamic University Malaysia

  • White Papers // Jun 2011

    A Novel Biased Energy Distribution (BED) Technique for Cluster-Based Routing in Wireless Sensor Networks

    This paper presents the impact of utilizing a Biased Energy Distribution (BED) scheme for clustering sensor networks. In clustering sensor networks, some of the nodes are elected as aggregators and they compress the data from their cluster members before sending the aggregated data to the sink. Existing clustering routing protocols...

    Provided By International Islamic University Malaysia

  • White Papers // Jan 2011

    UHF RFID Antenna Architectures and Applications

    In order to use Radio Frequency IDentification (RFID) antenna for wireless communication and real world applications (e.g.) military and personal communication systems, mobile phones, Personal Digital Assistant (PDA), blue-tooth systems, Wireless Local Area Networks (WLAN), railway vehicle identification, road tolling systems, fish tracking systems etc, studying the nature and characteristics...

    Provided By International Islamic University Malaysia

  • White Papers // Dec 2010

    Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme

    Key management is an important issue in Wireless Sensor Networks (WSNs) for the secure communications among the nodes in the network. Based on the network settings and structure of the network, keys could be managed in various ways. Though there is quite a good number of key management schemes for...

    Provided By International Islamic University Malaysia

  • White Papers // Sep 2010

    Advancement of Android and Contribution of Various Countries in the Research and Development of the Humanoid Platform

    A human like autonomous robot which is capable to adapt itself with the changing of its environment and continue to reach its goal is considered as Humanoid Robot. These characteristics differs the Android from the other kind of robots. In recent years there has been much progress in the development...

    Provided By International Islamic University Malaysia

  • White Papers // Aug 2010

    Pin Type Clamping Attachment for Remote Setup of Machining Process

    Sharing the manufacturing facility through remote operation and monitoring of a machining process is challenge for effective use the production facility. Several automation tools in term of hardware and software are necessary for successfully remote operation of a machine. This paper presents a prototype of workpiece holding attachment for remote...

    Provided By International Islamic University Malaysia

  • White Papers // Aug 2010

    Geographical Multicast Quality of Service Routing Protocol for Mobile Ad-Hoc Networks

    Recently, the necessity of applications where many users have to interact in a close manner over mobile Ad-Hoc networks gains high popularity. Multicast communication is essential in this type of applications to reduce the overhead of group communication. For group-oriented multimedia applications Quality of Service (QoS) provision is a basic...

    Provided By International Islamic University Malaysia

  • White Papers // Jul 2010

    Annual Reports Of Malaysian Public Universities: The Extent Of Compliance And Accountability

    The paper intends to evaluate the extent of public universities' annual report disclosure in complying with the Malaysia Government Treasury Circular No. 4/2007 and in disclosing accountability information. Then, it compares the degree of annual report disclosure between established and new universities in Malaysia. Content analysis using two disclosure indexes...

    Provided By International Islamic University Malaysia

  • White Papers // Jul 2010

    Financial Management Accountability Index (FMAI) In Malaysian Public Sector: A Way Forward

    The National Audit Department (NAD) of Malaysia has introduced the Financial Management Accountability Index (FMAI) within the framework of the audit rating system. This paper shares the Malaysian experience in using FMAI as accountability medium, evaluates the FMAI scores obtained by Agencies, and proposes measures to enhance the usefulness of...

    Provided By International Islamic University Malaysia

  • White Papers // Apr 2010

    WiMAX, LTE, and WiFi Interworking

    Recently wireless network interworking has become an important area of research in academia and industry. This is due to the huge diversity of wireless network types, which range from Wireless Body Area Network (WBAN) covering areas up to a few inches to Wireless Regional Area Networks (WRANs) covering up to...

    Provided By International Islamic University Malaysia

  • White Papers // Feb 2010

    New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques

    A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods...

    Provided By International Islamic University Malaysia

  • White Papers // Oct 2009

    Proposed Enhancement of IEEE802.11e WLAN Through Real Time Simulation Study

    One of the most successful WLAN protocols is IEEE 802.11. That is due to the simplicity and robustness against failures of its medium access control protocol. In addition, IEEE introduces the standard 802.11e for quality of service support. However, this standard is not considered efficient when used for some applications...

    Provided By International Islamic University Malaysia

  • White Papers // Jul 2009

    Performance Comparison of Proactive and Reactive Multicast Routing Protocols Over Wireless Mesh Networks

    Multicast routing is a key technology for modern communication networks. It sends a single copy of a message from a source to multiple receivers over a communication link that is shared by the paths to the receivers. This is especially appropriate in wireless environments where bandwidth is scarce and many...

    Provided By International Islamic University Malaysia

  • White Papers // Jun 2009

    Modeling Low Voltage Power Line as a Data Communication Channel

    Power line communications may be used as a data communication channel in public and indoor distribution networks so that it does not require the installing of new cables. Industrial low voltage distribution network may be utilized for data transfer required by the on-line condition monitoring of electric motors. This paper...

    Provided By International Islamic University Malaysia

  • White Papers // Jun 2009

    Security Management System of Cellular Communication

    Cellular communication is being widely used by all over the world. The users of handsets are increasing due to the request from marketing sector. The important aspect that has to be touch in this paper is about the security system of cellular communication. It is important to provide users with...

    Provided By International Islamic University Malaysia

  • White Papers // Jun 2009

    Novel Approach for Secure Cover File of Hidden Data in the Unused Area Within EXE File Using Computation Between Cryptography and Steganography

    The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods...

    Provided By International Islamic University Malaysia

  • White Papers // Apr 2009

    Performance Evaluation of a Secure Low Level Reader Protocol (LLRP) Connection

    The recently ratified Low Level Reader Protocol (LLRP) specifies the interaction between a RFID Reader and Client. It has been of much interest in the RFID community but adoption is being stalled by its lack of formal scrutiny especially with regard to its security. This paper surveys the work that...

    Provided By International Islamic University Malaysia

  • White Papers // Apr 2009

    A Fuzzy-Based Mobility Prediction in the IEEE 802.16e

    Intersystem mobility having no awkward transitions or indications of disparity, roaming across wireless access networks is one of the main features of mobile WiMAX. In this paper, the authors propose a mobility prediction method based on fuzzy logic control and an algorithm similar to the fuzzy c-mean partitioning to predict...

    Provided By International Islamic University Malaysia

  • White Papers // Feb 2009

    A HMRSVP Approach to Support QoS Challenges in Mobile Environment

    The current Internet architecture with its best effort service model is inadequate for real time applications that need certain Quality of Service (QoS) assurances. Several QoS models are proposed, however, these models were proposed for static environment. The main aim of this paper is to propose a set of protocols...

    Provided By International Islamic University Malaysia

  • White Papers // Jan 2009

    Review of Multicast QoS Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is consisting of a collection of wireless mobile nodes, which form a temporary network without relying on any existing infrastructure or centralized administration. Since the bandwidth of MANETs is limited and shared between the participating nodes in the network, it is important to efficiently...

    Provided By International Islamic University Malaysia

  • White Papers // Jan 2009

    AMP - A Novel Architecture for IP-Based Mobility Management

    This paper presents an architecture called the Agent-based Mobility Protocol (AMP) comprising a multi-agent system residing in both the mobile host(s) and the access networks has been developed for the purpose of enhancing mobility management in IP-based networks. The agent system on the mobile host was designed and subsequently built...

    Provided By International Islamic University Malaysia

  • White Papers // Oct 2008

    Proposed QoS Multicast Routing Framework for Next-Generation Wireless Mesh Network

    Wireless Mesh Network (WMN) is the network architecture where nodes (e.g. APs, mesh routers) can communicate with one another via multi-hop routing or forwarding. This is possible because of its dynamic self-organization, self-configuration and self-correction characteristics, which enable flexible integration, quick deployment, easy maintenance, low-cost, reliable services and its capability...

    Provided By International Islamic University Malaysia

  • White Papers // Aug 2008

    Performance Analysis of Ad Hoc Routing Protocols in Mobile WiMAX Environment

    Worldwide Interoperability for Microwave Access (WiMAX) is a technology that bridges the gap between fixed and mobile access and offer the same subscriber experience for fixed and mobile user. Demand for such type of mobile broadband services and applications are growing rapidly as it provides freedom to the subscribers to...

    Provided By International Islamic University Malaysia

  • White Papers // Aug 2008

    Performance Analysis of Ad Hoc Routing Protocols in Mobile WiMAX Environment

    Worldwide Interoperability for Microwave Access (WiMAX) is a technology that bridges the gap between fixed and mobile access and offer the same subscriber experience for fixed and mobile user. Demand for such type of mobile broadband services and applications are growing rapidly as it provides freedom to the subscribers to...

    Provided By International Islamic University Malaysia

  • White Papers // Jun 2009

    Security Management System of Cellular Communication

    Cellular communication is being widely used by all over the world. The users of handsets are increasing due to the request from marketing sector. The important aspect that has to be touch in this paper is about the security system of cellular communication. It is important to provide users with...

    Provided By International Islamic University Malaysia

  • White Papers // Oct 2008

    Proposed QoS Multicast Routing Framework for Next-Generation Wireless Mesh Network

    Wireless Mesh Network (WMN) is the network architecture where nodes (e.g. APs, mesh routers) can communicate with one another via multi-hop routing or forwarding. This is possible because of its dynamic self-organization, self-configuration and self-correction characteristics, which enable flexible integration, quick deployment, easy maintenance, low-cost, reliable services and its capability...

    Provided By International Islamic University Malaysia

  • White Papers // Jul 2009

    Performance Comparison of Proactive and Reactive Multicast Routing Protocols Over Wireless Mesh Networks

    Multicast routing is a key technology for modern communication networks. It sends a single copy of a message from a source to multiple receivers over a communication link that is shared by the paths to the receivers. This is especially appropriate in wireless environments where bandwidth is scarce and many...

    Provided By International Islamic University Malaysia

  • White Papers // Feb 2009

    A HMRSVP Approach to Support QoS Challenges in Mobile Environment

    The current Internet architecture with its best effort service model is inadequate for real time applications that need certain Quality of Service (QoS) assurances. Several QoS models are proposed, however, these models were proposed for static environment. The main aim of this paper is to propose a set of protocols...

    Provided By International Islamic University Malaysia

  • White Papers // Jan 2009

    Review of Multicast QoS Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is consisting of a collection of wireless mobile nodes, which form a temporary network without relying on any existing infrastructure or centralized administration. Since the bandwidth of MANETs is limited and shared between the participating nodes in the network, it is important to efficiently...

    Provided By International Islamic University Malaysia

  • White Papers // Jan 2009

    AMP - A Novel Architecture for IP-Based Mobility Management

    This paper presents an architecture called the Agent-based Mobility Protocol (AMP) comprising a multi-agent system residing in both the mobile host(s) and the access networks has been developed for the purpose of enhancing mobility management in IP-based networks. The agent system on the mobile host was designed and subsequently built...

    Provided By International Islamic University Malaysia

  • White Papers // Apr 2009

    Performance Evaluation of a Secure Low Level Reader Protocol (LLRP) Connection

    The recently ratified Low Level Reader Protocol (LLRP) specifies the interaction between a RFID Reader and Client. It has been of much interest in the RFID community but adoption is being stalled by its lack of formal scrutiny especially with regard to its security. This paper surveys the work that...

    Provided By International Islamic University Malaysia

  • White Papers // Jun 2009

    Novel Approach for Secure Cover File of Hidden Data in the Unused Area Within EXE File Using Computation Between Cryptography and Steganography

    The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods...

    Provided By International Islamic University Malaysia

  • White Papers // Aug 2010

    Geographical Multicast Quality of Service Routing Protocol for Mobile Ad-Hoc Networks

    Recently, the necessity of applications where many users have to interact in a close manner over mobile Ad-Hoc networks gains high popularity. Multicast communication is essential in this type of applications to reduce the overhead of group communication. For group-oriented multimedia applications Quality of Service (QoS) provision is a basic...

    Provided By International Islamic University Malaysia

  • White Papers // Sep 2010

    Advancement of Android and Contribution of Various Countries in the Research and Development of the Humanoid Platform

    A human like autonomous robot which is capable to adapt itself with the changing of its environment and continue to reach its goal is considered as Humanoid Robot. These characteristics differs the Android from the other kind of robots. In recent years there has been much progress in the development...

    Provided By International Islamic University Malaysia

  • White Papers // Aug 2010

    Pin Type Clamping Attachment for Remote Setup of Machining Process

    Sharing the manufacturing facility through remote operation and monitoring of a machining process is challenge for effective use the production facility. Several automation tools in term of hardware and software are necessary for successfully remote operation of a machine. This paper presents a prototype of workpiece holding attachment for remote...

    Provided By International Islamic University Malaysia

  • White Papers // Jul 2010

    Annual Reports Of Malaysian Public Universities: The Extent Of Compliance And Accountability

    The paper intends to evaluate the extent of public universities' annual report disclosure in complying with the Malaysia Government Treasury Circular No. 4/2007 and in disclosing accountability information. Then, it compares the degree of annual report disclosure between established and new universities in Malaysia. Content analysis using two disclosure indexes...

    Provided By International Islamic University Malaysia

  • White Papers // Jul 2010

    Financial Management Accountability Index (FMAI) In Malaysian Public Sector: A Way Forward

    The National Audit Department (NAD) of Malaysia has introduced the Financial Management Accountability Index (FMAI) within the framework of the audit rating system. This paper shares the Malaysian experience in using FMAI as accountability medium, evaluates the FMAI scores obtained by Agencies, and proposes measures to enhance the usefulness of...

    Provided By International Islamic University Malaysia

  • White Papers // Jun 2009

    Modeling Low Voltage Power Line as a Data Communication Channel

    Power line communications may be used as a data communication channel in public and indoor distribution networks so that it does not require the installing of new cables. Industrial low voltage distribution network may be utilized for data transfer required by the on-line condition monitoring of electric motors. This paper...

    Provided By International Islamic University Malaysia

  • White Papers // Apr 2009

    A Fuzzy-Based Mobility Prediction in the IEEE 802.16e

    Intersystem mobility having no awkward transitions or indications of disparity, roaming across wireless access networks is one of the main features of mobile WiMAX. In this paper, the authors propose a mobility prediction method based on fuzzy logic control and an algorithm similar to the fuzzy c-mean partitioning to predict...

    Provided By International Islamic University Malaysia

  • White Papers // Jan 2011

    UHF RFID Antenna Architectures and Applications

    In order to use Radio Frequency IDentification (RFID) antenna for wireless communication and real world applications (e.g.) military and personal communication systems, mobile phones, Personal Digital Assistant (PDA), blue-tooth systems, Wireless Local Area Networks (WLAN), railway vehicle identification, road tolling systems, fish tracking systems etc, studying the nature and characteristics...

    Provided By International Islamic University Malaysia

  • White Papers // Jun 2011

    A Novel Biased Energy Distribution (BED) Technique for Cluster-Based Routing in Wireless Sensor Networks

    This paper presents the impact of utilizing a Biased Energy Distribution (BED) scheme for clustering sensor networks. In clustering sensor networks, some of the nodes are elected as aggregators and they compress the data from their cluster members before sending the aggregated data to the sink. Existing clustering routing protocols...

    Provided By International Islamic University Malaysia

  • White Papers // Apr 2010

    WiMAX, LTE, and WiFi Interworking

    Recently wireless network interworking has become an important area of research in academia and industry. This is due to the huge diversity of wireless network types, which range from Wireless Body Area Network (WBAN) covering areas up to a few inches to Wireless Regional Area Networks (WRANs) covering up to...

    Provided By International Islamic University Malaysia

  • White Papers // Dec 2010

    Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme

    Key management is an important issue in Wireless Sensor Networks (WSNs) for the secure communications among the nodes in the network. Based on the network settings and structure of the network, keys could be managed in various ways. Though there is quite a good number of key management schemes for...

    Provided By International Islamic University Malaysia

  • White Papers // Oct 2009

    Proposed Enhancement of IEEE802.11e WLAN Through Real Time Simulation Study

    One of the most successful WLAN protocols is IEEE 802.11. That is due to the simplicity and robustness against failures of its medium access control protocol. In addition, IEEE introduces the standard 802.11e for quality of service support. However, this standard is not considered efficient when used for some applications...

    Provided By International Islamic University Malaysia

  • White Papers // Jan 2012

    Developing and Validating an Instrument for Measuring M-Commerce Adoption: An Exploratory Analysis

    Mobile Commerce, also known as, M-commerce is thought to be the next big phase in this technologically dependent society after E-commerce era. However, its adoption and level of use is low in Malaysia compared to others nations such as Korea, Singapore, and Japan. This study aims to identify some factors...

    Provided By International Islamic University Malaysia

  • White Papers // Mar 2012

    On the Boundaries of Trust and Security in Computing and Communications Systems

    This paper analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the other hand, security is about making sure...

    Provided By International Islamic University Malaysia

  • White Papers // Feb 2010

    New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques

    A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods...

    Provided By International Islamic University Malaysia

  • White Papers // Mar 2012

    IDPS: An Integrated Intrusion Handling Model for Cloud

    Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides...

    Provided By International Islamic University Malaysia