Browsing by Author "Taib B.M."
Now showing 1 - 9 of 9
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Application of homotopy perturbation and variational iteration methods for fredholm integrodifferential equation of fractional order(2012) ;Elbeleze A.A. ;Kiliçman, A. ;Taib B.M. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Putra Malaysia (UPM)This paper presents the application of homotopy perturbation and variational iteration methods as numerical methods for Fredholm integrodifferential equation of fractional order with initial-boundary conditions. The fractional derivatives are described in Caputo sense. Some illustrative examples are presented. � 2012 Asma Ali Elbeleze et al.3 19 - Some of the metrics are blocked by yourconsent settings
Publication Application of homotopy perturbation method for fractional partial differential equations(Universiti Putra Malaysia, 2014) ;Elbeleze A.A. ;Kilicman A. ;Taib B.M. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Putra Malaysia (UPM)Fractional partial differential equations arise from many fields of physics and apply a very important role in various branches of science and engineering. Finding accurate and efficient methods for solving partial differential equations of fractional order has become an active research undertaking. In the present paper, the homotopy perturbation method proposed by J-H He has been used to obtain the solution of some fractional partial differential equations with variable coefficients. Exact and/or approximate analytical solutions of these equations are obtained. - Some of the metrics are blocked by yourconsent settings
Publication Designing a new model for Trojan horse detection using sequential minimal optimization(Springer Verlag, 2015) ;Saudi M.M. ;Abuzaid A.M. ;Taib B.M. ;Abdullah Z.H.Universiti Sains Islam Malaysia (USIM)Malwares attack such as by the worm, virus, trojan horse and botnet have caused lots of troublesome for many organisations and users which lead to the cybercrime. Living in a cyber world, being infected by these malwares becoming more common. Nowadays the malwares attack especially by the trojan horse is becoming more sophisticated and intelligent, makes it is harder to be detected than before. Therefore, in this research paper, a new model called Efficient Trojan Detection Model (ETDMo) is built to detect trojan horse attacks more efficiently. In this model, the static, dynamic and automated analyses were conducted and the machine learning algorithms were applied to optimize the performance. Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate. � Springer International Publishing Switzerland 2015.3 - Some of the metrics are blocked by yourconsent settings
Publication Designing a new model for worm response using security metrics(Springer Verlag, 2015) ;Saudi M.M. ;Taib B.M.Universiti Sains Islam Malaysia (USIM)Nowadays, worms are becoming more sophisticated, intelligent and hard to be detected and responded than before and it becomes as one of the main issues in cyber security. It caused loss millions of money and productivities in many organizations and users all over the world. Currently, there are many works related with worm detection techniques but not much research is focusing on worm response. Therefore, in this research paper, a new model to respond to the worms attack efficiently is built. This worm response model is called as eZSiber, inspired by apoptosis or also known as cell-programmed death. It is a concept borrowed from human immunology system (HIS), where it has been mapped into network security environment. Once the user�s computer detects any indication of the worm attacks, the apoptosis is triggered. In order to trigger the apoptosis, security metrics plays a very important role in identifying the weight and the severity of the worm attacks. In this model, the static and dynamic analyses were conducted and the machine learning algorithms were applied to optimize the performance. Based on the experiment conducted, it produced an overall accuracy rate of 99.38 % using Sequential Minimal Optimization (SMO) algorithm. This performance criteria result indicated that this model is an efficient worm response model. � Springer International Publishing Switzerland 2015.1 - Some of the metrics are blocked by yourconsent settings
Publication Extended Chebyshev polynomials for solving bounded and unbounded singular integral equations(Institute of Physics Publishing, 2019) ;Alhawamda H. ;Eshkuvatov Z.K. ;Taib B.M. ;Ibrahim R.I. ;Faculty of Science and Technology ;Ministry Deputy of Planning and DevelopmentUniversiti Sains Islam Malaysia (USIM)In this note, we have developed new classes of one dimensional orthogonal polynomials Zk(i,n)(x),i = {1,2},n = 0,1,2,..., namely extended Chebyshev polynomials (ECPs) of the first and second kinds, which are an extension of the Chebyshev polynomials of the first and second kinds respectively. For non-homogeneous SIEs (bounded and unbounded case) truncated series of the first and second kind of ECPs are used to find approximate solution. It is found that first and second kinds of ECPs Zk(in)(x),i = {1,2} are orthogonal with weights w(1,k)(x)= xk-1/1-x2k and w(2,k)(x) = xk-11-x2k, where k is positive odd integer. Spectral properties of first and second kind of ECPs are also proved. Finally, two examples are presented to show the validity and accuracy of the proposed method.4 21 - Some of the metrics are blocked by yourconsent settings
Publication Improved models of internet charging scheme of single bottleneck link in multi QoS networks(2013) ;Puspita F.M. ;Seman K. ;Taib B.M. ;Shafii Z.Universiti Sains Islam Malaysia (USIM)Internet Service Providers (ISPs) nowadays deal with high demand to promote good quality information. However, the knowledge to develop new pricing scheme that serve both customers and supplier is known, but only a few pricing plans involve QoS networks. This study will seek new proposed pricing plans are offered with QoS networks involved. The single link multi QoS Networks scheme is solved as an optimization model by comparing two models in multi QoS networks. The decisions whether to set up base price to be fixed to recover the cost or to be varied to compete in the market are considered. Also, the options of quality premium to be fixed to enable user to choose classes according to their preferences and budget or to be varied to enable ISP to promote certain service are set up. � 2013 Asian Network for Scientific Information.2 52 - Some of the metrics are blocked by yourconsent settings
Publication Note on the convergence analysis of homotopy perturbation method for fractional partial differential equations(2014) ;Elbeleze A.A. ;Kl�man A. ;Taib B.M. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM) ;DZawia UniversityUniversiti Putra Malaysia (UPM)We apply the homotopy perturbation method to obtain the solution of partial differential equations of fractional order. This method is powerful tool to find exact and approximate solution of many linear and nonlinear partial differential equations of fractional order. Convergence of the method is proved and the convergence analysis is reliable enough to estimate the maximum absolute truncated error of the series solution. The fractional derivatives are described in the Caputo sense. Some examples are presented to verify convergence hypothesis and simplicity of the method. � 2014 Asma Ali Elbeleze et al.4 - Some of the metrics are blocked by yourconsent settings
Publication On the symbolic manipulation for the cardinality of certain degree polynomials(American Institute of Physics Inc., 2016) ;Abdullah I. ;Seman K. ;Taib B.M. ;Puspita F.M. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)University of SriwijayaThe research on cardinality of polynomials was started by Mohd Atan [1] when he considered a set, V(f-;p?)={umodp?:f-(u)?0modp?}, where ? > 0 and f-=(f1,f2,?fn). The term f-(u)?0-modp? means that we are considering all congruence equations of modulo p? and we are looking for u that makes the congruence equation equals zero. This is called the zeros of polynomials. The total numbers of such zeros is termed as N(f-;p?). The above p is a prime number and Zp is the ring of p-adic integers, and x-=(x1,x2, ?xn). He later let N(f-;p?)=card V(f-;p?). The notation N(f-;p?) means the number of zeros for that the polynomials f-. For a polynomial f (x) defined over the ring of integers Z, Sandor [2] showed that N(f;p?)? mp12ordpD, where D ? 0, ? > ordpD and D is the discriminant of f. In this paper we will try to introduce the concept of symbolic manipulation to ease the process of transformation from two-variables polynomials to one-variable polynomials. � 2016 Author(s).4 - Some of the metrics are blocked by yourconsent settings
Publication The improved models of internet pricing scheme of multi service multi link networks with various capacity links(Springer Verlag, 2015) ;Puspita F.M. ;Seman K. ;Taib B.M.Universiti Sains Islam Malaysia (USIM)Internet Service Providers (ISPs) nowadays deal with high demand to promote good quality information. However, the knowledge to develop new pricing scheme that serve both customers and supplier is known, but only a few pricing plans involve QoS networks. This study will seek new proposed pricing plans are offered with multi service multi link networks involved. The multi service multi link Networks scheme is solved as an optimization model by comparing two models in multi QoS networks. The results showed that by fixing the base price and varying the quality premium or varying the base price and quality and setting up the equal capacity link values, ISP achieved the goal to maximize the profit. � Springer International Publishing Switzerland 2015.4