Browsing by Author "Azni, AH"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication The Adaptive Multi-Level Phase Coding Method in Audio Steganography(IEEE-Inst Electrical Electronics Engineers Inc, 2019) ;Alsabhany, AA ;Ridzuan, FAzni, AHAudio steganography allows and inspires many researchers to design methods for secure communication. Based on the evaluation on the existing methods, it was found that most methods focused on one or two requirements while disregarding others, causing imbalanced performance. Moreover, most methods lack adaptivity and dynamic allocation. Therefore, in this research, a method called Adaptive Multi-level Phase Coding (AMPC) was proposed to optimize the above issues. The reverse logic of the main tradeoffs was used to empirically design several embedding levels that that simultaneously attained good performance for all aspects as much as possible. Then, an adaptive component was added by selecting the embedding level that provided the best performance for each embedding process. Moreover, the error spreading factor was introduced to achieve a fair payload distribution. The performance balance objective requires a new formulation that will enable the accurate selection of the degree of modification, multiple-bit embedding per modification, and reduced retrieval errors. As a result, the interval centering quantization (ICQ) was formulated and implemented in the proposed method. The experimental results show that AMPC successfully fulfilled the research objectives. Also, AMPC surpassed other phase coding methods in all aspects while time-domain methods achieved the highest transparency and capacity with the lowest robustness. Moreover, experiments show that the implementation of adaptive multi-level concept is able to improve the existing method's performance significantly. In summary, AMPC was able to achieve a stable embedding rate of 33 Kbps at 35 dB of SNR, which is higher than the recorded embedding rate of other phase coding methods. - Some of the metrics are blocked by yourconsent settings
Publication An Efficient Network Security System through an Ontology Approach(IEEE, 2008) ;Azni, AH ;Saudi, MM ;Azman, A ;Tamil, EMIdris, MYIOntology analysis has been shown to be an effective first step in the construction of robust knowledge based system. Moreover, the popularity of semantic technologies and the semantic web has provided several beneficial opportunities for the modeling and computer security communities of interest. This paper describes the role of ontologies in facilitating network security modeling. It outlines the technical challenges in distributed network security simulation modeling and describes how ontology-based methods may be applied to address these challenges. The paper concludes by describing an ontology-based solution framework for network security simulation modeling and analysis and outlining the benefits of this solution approach. - Some of the metrics are blocked by yourconsent settings
Publication Lightweight Cryptography Techniques for MHealth Cybersecurity(Assoc Computing Machinery, 2019) ;Shahbodin, F ;Azni, AH ;Ali, TMohd, CKNCKA new integration of wireless communication technologies into the mobile heath system also known as mHealth has instigated a momentous research interest in the field of mobile security. mHealth systems are unique in terms of characteristics, challenges, architecture, and applications. Consequently, security requirements related to mHealth system are more complex as compared to mobile networks and conventional wireless networks. This article presents a survey about developments in mHealth system from the perspective of lightweight cryptographic protocols and privacy preserving algorithms. Unique characteristics of mHealth systems are presented which make the embedded security applications computationally hard as well as memory constrained. The current study also deals with the fundamental security requirements, essential for mHealth communication. Furthermore, awareness of security threats and their cryptographic solutions in terms of future health industry are discussed. In addition, lightweight cryptographic solutions are summarized. These strategies can be enhanced or incorporated all in all to meet the security perquisites of future patients' data security. - Some of the metrics are blocked by yourconsent settings
Publication Multivariate Survival Analysis for Correlated Node Behavior in MANETS(IEEE, 2014) ;Azni, AH ;Ahmad, RNoh, ZAMThis paper present correlated hazard function in multivariate network survival analysis in MANETS. Correlated hazard function is an extended hazard function in Cox model to capture correlated events. The function takes correlated degree as a covariate to measure the effect of correlated node behavior and describe the relationship between correlated degree and survival times. The covariates analysis shows that the effect of correlated degree is significant in measuring survival analysis in MANETS. - Some of the metrics are blocked by yourconsent settings
Publication Network Survivability Analysis Modeling Approach for MANETS : A Systematic Review(IEEE, 2014) ;Azni, AH ;Ahmad, R ;Noh, ZAM ;Hazwani, FHayaati, NNetwork survivability analysis modeling in MANETs was hardly an issue in the early years of wireless technology because there was no critical network system that depended on wireless technology yet. Today, network survivability analysis is an essential aspect of reliable communication especially in MANETs. Although various methods have been proposed to model network survivability analysis in MANETs, no related review has been published as to date for this topic. Thus, a comprehensive review of this body of work would be beneficial to researchers to have an overview of the current state of research trend in this area. This paper provides a systematic literature review (SLR) of the state of the art approach in modeling network survivability analysis in MANETs. We used studies from a number of relevant article sources, and our results showed the existence of twenty six articles. From this SLR we found that the existing of modeling method is focusing on individual node in which the node is treated as independent event. Furthermore, the analysis also reveals the less popular methods in modeling network survivability analysis are with statistical methods such as regression analysis and survival analysis. The implication of this study is to give a clear direction to future researchers in this area for a better and accurate analysis in measuring network survivability in MANETs. - Some of the metrics are blocked by yourconsent settings
Publication Visual Perception Games for Autistic Learners: Design & Development(Assoc Computing Machinery, 2019) ;Mohd, CKNCK ;Shahbodin, F ;Azni, AHJano, ZThe use of information communication technologies (ICTs) in therapy offers new perspectives for treating many domains in individuals with autism spectrum disorders (ASD) because it is used in many different ways and settings and they are attractive to the patients. Students with autism have a high incidence of visual perception problems. They often have difficulty recognizing, remembering, organizing and interpreting visual images. As a result, they are easily confused in situations where written or pictorial symbols are utilised for learning. The paper reported the design and development of autism diagnostic tool using serious games technique. It is a tool for special education teachers to diagnose visual perception problems among autistic students. The game is known as Vi-Per Games. A diagnostic tool known as Vi-Per Games has been developed based on ADDIE model. Vi-Per Games is able to diagnose autistic students without the needs for teachers to have some experience and knowledge of diagnosing visual perception. This prototype will be a high-tech solution to diagnose visual perception problems designed for autistic children. - Some of the metrics are blocked by yourconsent settings
Publication Visual Perception Games for Autistic Learners: Research Findings(Assoc Computing Machinery, 2019) ;Shahbodin, F ;Mohd, CKNCK ;Azni, AHJano, ZEarly identification and diagnosis of autism is the key to minimize its negative effects and get the autistic children on the right path. This paper analyzed autism diagnostic tool using serious games technique namely Vi-Per Games. It is a tool for special education teachers to diagnose visual perception problems among autistic students. The development of the game is based on ADDIE model. The results show that the use of Vi-Per Games successfully assist and facilitate teachers when making a diagnosis of visual perception problems in autistic students, compared with conventional methods of diagnosis. Diagnosing visual perception problems using serious games gives teachers and students enjoyable experiences in a way that no other medium can offer.