Skip to main content

Showing 1–10 of 10 results for author: Noor, R M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2107.14140  [pdf

    cs.CR

    Methodology and Analysis of Smart Contracts in Blockchain-Based International Trade Application

    Authors: Asif Bhat, Rizal Mohd Nor, Md Amiruzzaman, Md. Rajibul Islam

    Abstract: Blokchain is used in a variety of applications where trustworthy computing is re-quired. Trade finance is one of these areas that would benefit immensely from a decentralized way of doing transactions. This paper presents the preliminary as-sessment of Accepire-BT, a software platform developed for the practice of col-laborative Trade Finance. The proposed solution is enforced by smart contracts u… ▽ More

    Submitted 27 April, 2022; v1 submitted 14 July, 2021; originally announced July 2021.

    Comments: 10 pages, 2 figures, and 1 table. Preprint: submitted to Information and Communication Technology Journals

  2. arXiv:2106.04575  [pdf, other

    cs.CR

    DNS attack mitigation Using OpenStack Isolation

    Authors: Hassnain ul hassan, Rizal Mohd Nor, Md Amiruzzaman, Sharyar Wani, Md. Rajibul Islam

    Abstract: The Domain Name System (DNS) is essential for the Internet, giving a mechanism to resolve hostnames into Internet Protocol (IP) addresses. DNS is known as the world's largest distributed database that manages hostnames and Internet Protocol. By having the DNS, only simple names that can be easily memorized will be used and then the domain name system will map it into the numeric Internet Protocol… ▽ More

    Submitted 28 August, 2021; v1 submitted 8 June, 2021; originally announced June 2021.

    Comments: 6 pages, 3 figures, and 2 tables

  3. DistB-Condo: Distributed Blockchain-based IoT-SDN Model for Smart Condominium

    Authors: Anichur Rahman, Md. Jahidul Islam, Ziaur Rahman, Md. Mahfuz Reza, Adnan Anwar, M. A. Parvez Mahmud, Mostofa Kamal Nasir, Rafidah Md Noor

    Abstract: Condominium network refers to intra-organization networks, where smart buildings or apartments are connected and share resources over the network. Secured communication platform or channel has been highlighted as a key requirement for a reliable condominium which can be ensured by the utilization of the advanced techniques and platforms like Software-Defined Network (SDN), Network Function Virtual… ▽ More

    Submitted 17 December, 2020; originally announced December 2020.

    Comments: 17 Pages, 12 Tables, 17 Figures

    ACM Class: H.1.1

    Journal ref: EEE Access, vol. 8, pp. 209594-209609, 2020

  4. Hide Secret Information in Blocks: Minimum Distortion Embedding

    Authors: Md Amiruzzaman, Rizal Mohd Nor

    Abstract: In this paper, a new steganographic method is presented that provides minimum distortion in the stego image. The proposed encoding algorithm focuses on DCT rounding error and optimizes that in a way to reduce distortion in the stego image, and the proposed algorithm produces less distortion than existing methods (e.g., F5 algorithm). The proposed method is based on DCT rounding error which helps t… ▽ More

    Submitted 16 March, 2020; originally announced March 2020.

    Comments: This paper is accepted for publication in IEEE SPIN 2020 conference

    Journal ref: 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN)

  5. Process migration-based computational offloading framework for IoT-supported mobile edge/cloud computing

    Authors: Abdullah Yousafzai, Ibrar Yaqoob, Muhammad Imran, Abdullah Gani, Rafidah Md Noor

    Abstract: Mobile devices have become an indispensable component of Internet of Things (IoT). However, these devices have resource constraints in processing capabilities, battery power, and storage space, thus hindering the execution of computation-intensive applications that often require broad bandwidth, stringent response time, long battery life, and heavy computing power. Mobile cloud computing and mobil… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Comments: IoT, Edge Computing, Computational Offloading Framework, 2 Algorithms one for resource constraint client and another for edge server, and a unique and easy to setup real IoT testbed idea using of the shelf smartphones, 12 pages, 12 figures

    ACM Class: C.2

  6. Adaptive Beaconing Approaches for Vehicular ad hoc Networks: A Survey

    Authors: Syed Adeel Ali Shah, Ejaz Ahmed, Feng Xia, Ahmad Karim, Muhammad Shiraz, Rafidah MD Noor

    Abstract: Vehicular communication requires vehicles to self-organize through the exchange of periodic beacons. Recent analysis on beaconing indicates that the standards for beaconing restrict the desired performance of vehicular applications. This situation can be attributed to the quality of the available transmission medium, persistent change in the traffic situation and the inability of standards to cope… ▽ More

    Submitted 24 May, 2016; originally announced May 2016.

  7. arXiv:1605.04069  [pdf

    cs.DC

    Availability Aware Continuous Replica Placement Problem

    Authors: Abdullah Yousafzai, Abdullah Gani, Rafidah Md Noor

    Abstract: Replica placement (RP) intended at producing a set of duplicated data items across the nodes of a distributed system in order to optimize fault tolerance, availability, system performance load balancing. Typically, RP formulations employ dynamic methods to change the replica placement in the system potentially upon user request profile. Continuous Replica Placement Problem (CRPP) is an extension o… ▽ More

    Submitted 13 May, 2016; originally announced May 2016.

  8. arXiv:1207.3943  [pdf

    cs.NI

    A Taxonomy for Congestion Control Algorithms in Vehicular Ad Hoc Networks

    Authors: Mohammad Reza Jabbarpour Sattari, Rafidah Md Noor, Hassan Keshavarz

    Abstract: One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons and event-driven messages. Delay and reliab… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

  9. arXiv:1205.0480  [pdf

    cs.NI

    Session Initiation Protocol Attacks and Challenges

    Authors: Hassan Keshavarz, Mohammad Reza Jabbarpour Sattari, Rafidah Md Noor

    Abstract: In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are disc… ▽ More

    Submitted 2 May, 2012; originally announced May 2012.

  10. arXiv:1002.4047  [pdf

    cs.CR

    Intrusion Detection System: Overview

    Authors: Hamdan. O. Alanazi, Rafidah Md Noor, B. B Zaidan, A. A Zaidan

    Abstract: Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised lear… ▽ More

    Submitted 21 February, 2010; originally announced February 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/