... Hatim Mohamad Tahir School of Information Technology Universiti Utara Malaysia 06010 Sintok, ... more ... Hatim Mohamad Tahir School of Information Technology Universiti Utara Malaysia 06010 Sintok, Kedah MALAYSIA Tel: (604)-700-3707 Fax: (604)- 700-5357 ... We managed to cover several studies by Chong (1995), Liong, Gan and Noran (1995) and Zainuddin (1997). ...
International Journal of Mathematical Models and Methods in Applied Sciences
Competition in the software market for industrial use is very challenging. Quality and productivi... more Competition in the software market for industrial use is very challenging. Quality and productivity of software is very important to the software industry to remain competitive. Most of the commercial and industrial web applications are complex, hard to implement, risky to maintain and customization requires deep understanding of the requirements. Research showed that customization and reusability may increase the productivity and quality of the software and also decrease the development time. Unfortunately, implementing systematic reuse and customize existing system has proven to be a difficult process. While software engineers continue to struggle with cost and time, reuse has emerged as a good engineering principles and practice in various fields. However, technology to completely integrate user interface, reuse design, customization and implementation is still immature. The aim of this study is to provide a novel visual object sharing technique for designing, customizing, reusin...
Abstract - Moving from Internet Protocol version Four (IPv4) to Internet Protocol version six (IP... more Abstract - Moving from Internet Protocol version Four (IPv4) to Internet Protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incompatible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been pro-posed by IETF IPng Transition Working Group (NGTrans). One of them is Dual Stack Transition Mecha-nism (DSTM). This paper reviews the implementation of DSTM over our IPv6 test-bed (6iNet) in University Utara Malaysia (UUM). This paper also describes our experi-ence of configuring 6iNet. 6iNet is the first IPv6 test-bed in UUM and has become a platform for IPv6 research in UUM.
In early 2013, household broadband penetration in Malaysia has exceeded 66.7 per cent. However, t... more In early 2013, household broadband penetration in Malaysia has exceeded 66.7 per cent. However, the digital gap between urban and rural areas still exists. The rural communities still facing some issue in internet connectivity since many internet providers have less motivation to invest their resources in such areas. This project is undertaken with two objectives. First, to provide internet access to rural community with reasonable cost through the implementation of "Super Wi-Fi" technology. Second, to develop interactive internet local contents using Content Management System that can be utilised among rural folks. Two rural areas were selected as testing grounds, Bandar Baru Beris Jaya, Sik, Kedah and Kampung Oran, Mata Air, Perlis. Using existing infrastructure, the Streamyx, a high power modem antenna that called "Super Wifi" assist Streamyx to increase the coverage of current Wi-Fi signals being developed. The coverage of existing Wi-Fi signal is quite limit...
ABSTRACT Mobile ad hoc networks (MANETS) are mobile nodes moving rapidly and they use wireless co... more ABSTRACT Mobile ad hoc networks (MANETS) are mobile nodes moving rapidly and they use wireless connections to connect to various networks or nodes. The dynamic nature of MANETs, make it vulnerable to attack by intruders. The sending and passing of nodes are based on several routing protocols. The packets do not reach the destination and some form of secure mechanism based on trust or friendship are deployed to protect the network integrity. Denial of service attacks is one of the typical attack type in mobile adhoc network. In this paper, we deployed Black hole and Grey hole attack. Black hole attack absord all data packets that are sent to its node whereas grey hole attack will drop some packet for a particular network destination based on packets type, time or randomly selected portion of packets. In this experiment we simulated several routing protocol to investigate the secure mechanism in protecting from the blackhole ad greyhole attack. The findings are presented and discussed.
2006 2nd International Conference on Information & Communication Technologies, 2006
Abstract - Moving fromInternet Protocol version Four (IPv4) to Internet Protocol version six (IPv... more Abstract - Moving fromInternet Protocol version Four (IPv4) to Internet Protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incom-patible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been ...
... Hatim Mohamad Tahir School of Information Technology Universiti Utara Malaysia 06010 Sintok, ... more ... Hatim Mohamad Tahir School of Information Technology Universiti Utara Malaysia 06010 Sintok, Kedah MALAYSIA Tel: (604)-700-3707 Fax: (604)- 700-5357 ... We managed to cover several studies by Chong (1995), Liong, Gan and Noran (1995) and Zainuddin (1997). ...
International Journal of Mathematical Models and Methods in Applied Sciences
Competition in the software market for industrial use is very challenging. Quality and productivi... more Competition in the software market for industrial use is very challenging. Quality and productivity of software is very important to the software industry to remain competitive. Most of the commercial and industrial web applications are complex, hard to implement, risky to maintain and customization requires deep understanding of the requirements. Research showed that customization and reusability may increase the productivity and quality of the software and also decrease the development time. Unfortunately, implementing systematic reuse and customize existing system has proven to be a difficult process. While software engineers continue to struggle with cost and time, reuse has emerged as a good engineering principles and practice in various fields. However, technology to completely integrate user interface, reuse design, customization and implementation is still immature. The aim of this study is to provide a novel visual object sharing technique for designing, customizing, reusin...
Abstract - Moving from Internet Protocol version Four (IPv4) to Internet Protocol version six (IP... more Abstract - Moving from Internet Protocol version Four (IPv4) to Internet Protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incompatible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been pro-posed by IETF IPng Transition Working Group (NGTrans). One of them is Dual Stack Transition Mecha-nism (DSTM). This paper reviews the implementation of DSTM over our IPv6 test-bed (6iNet) in University Utara Malaysia (UUM). This paper also describes our experi-ence of configuring 6iNet. 6iNet is the first IPv6 test-bed in UUM and has become a platform for IPv6 research in UUM.
In early 2013, household broadband penetration in Malaysia has exceeded 66.7 per cent. However, t... more In early 2013, household broadband penetration in Malaysia has exceeded 66.7 per cent. However, the digital gap between urban and rural areas still exists. The rural communities still facing some issue in internet connectivity since many internet providers have less motivation to invest their resources in such areas. This project is undertaken with two objectives. First, to provide internet access to rural community with reasonable cost through the implementation of "Super Wi-Fi" technology. Second, to develop interactive internet local contents using Content Management System that can be utilised among rural folks. Two rural areas were selected as testing grounds, Bandar Baru Beris Jaya, Sik, Kedah and Kampung Oran, Mata Air, Perlis. Using existing infrastructure, the Streamyx, a high power modem antenna that called "Super Wifi" assist Streamyx to increase the coverage of current Wi-Fi signals being developed. The coverage of existing Wi-Fi signal is quite limit...
ABSTRACT Mobile ad hoc networks (MANETS) are mobile nodes moving rapidly and they use wireless co... more ABSTRACT Mobile ad hoc networks (MANETS) are mobile nodes moving rapidly and they use wireless connections to connect to various networks or nodes. The dynamic nature of MANETs, make it vulnerable to attack by intruders. The sending and passing of nodes are based on several routing protocols. The packets do not reach the destination and some form of secure mechanism based on trust or friendship are deployed to protect the network integrity. Denial of service attacks is one of the typical attack type in mobile adhoc network. In this paper, we deployed Black hole and Grey hole attack. Black hole attack absord all data packets that are sent to its node whereas grey hole attack will drop some packet for a particular network destination based on packets type, time or randomly selected portion of packets. In this experiment we simulated several routing protocol to investigate the secure mechanism in protecting from the blackhole ad greyhole attack. The findings are presented and discussed.
2006 2nd International Conference on Information & Communication Technologies, 2006
Abstract - Moving fromInternet Protocol version Four (IPv4) to Internet Protocol version six (IPv... more Abstract - Moving fromInternet Protocol version Four (IPv4) to Internet Protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incom-patible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been ...
Uploads
Papers by Hatim Mohamad Tahir