Imad Yaseen | International Islamic University Malaysia (original) (raw)

Papers by Imad Yaseen

Research paper thumbnail of Stress Assessment While Listening to Quran Recitation

2014 International Conference on Computer Assisted System in Health, 2014

Stress and anxiety are one of the most widespread problems presently, stress treatment has been f... more Stress and anxiety are one of the most widespread problems presently, stress treatment has been featured in many researches. The use of Quran offers a substantial help in treating stress. The purpose of this study is to examine the various aspects and perspectives of human emotions while listening to Quran Recitation. This study aims to identify and select verses that have more psychological impact than other verses and to identify the most Quran reciter that respondents believe his voice brings calmness and tranquility to their mind. Quantitative and qualitative methods were adopted. An online distributed questionnaire was sent to the academic staffs of all the Islamic faculties in the Malaysian public universities, five subjects participated in EEG experiment to identify their emotions while listening to these Quran verses. Five Quran verses and one reciter were identified, while experiment indicates that the subjects are more relieved and relaxed when listening to these Quran verses.

Research paper thumbnail of Cryptocurrency vs Fiat Currency: Architecture, Algorithm, Cashflow & Ledger Technology on Emerging Economy Subtitle: The Influential facts of Cryptocurrency and Fiat Currency

Typically, electronic currency like digital or cryptocurrency both are influencing the world econ... more Typically, electronic currency like digital or cryptocurrency both are influencing the world economy under the ledger technology, where as traditional fiat currency plays vital role in socio economy followed by conventional printing method. This review paper is basically focused on most influential facts behind the economical elements like the applicable operation via successful blockchain algorithm, architecture and mining operation based on contents from journal publications, online publications, news reports, seminars and workshops. Several aspects of crypto and fiat currencies are rolling on emerging economy, from this point, this paper tries to figure out how consensus algorithm and growing numbers of crypto and fiat currencies are performed with its existing pros and cons towards further developing process.

Research paper thumbnail of A study on the effects of EEG and ECG signals while listening to Qur'an recitation

The 5th International Conference on Information and Communication Technology For the Muslim World, Nov 17, 2014

Research paper thumbnail of Hash Function of Finalist SHA

The National Institute of Standard and Technology (NIST) has suggested different principles for h... more The National Institute of Standard and Technology (NIST) has suggested different principles for hash functions to avoid the blunders and to choice the ideal quality of hash function, which to be a measurement for the future of hash function generations. Therefore, the goal of the NIST contenders in SHA-3 between the hash functions is to be chosen as the winner in the end of 2012, and the beginning of 2013. Thus, for this reason the paper addresses the comparative and analysis study of the finalist SHA-3 candidates in: complexity of security, design and structure, as well as performance and cost, to measure the robustness of the algorithms in this area, through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). Therefore, main idea from this comparison and analysis study between the finalist of SHA-3 candidates such as (BLAKE, Grostl, JH, Keccak, and Skein) is to investigate the tight security in the suitable designs of lightweight such as JH and Keccak for the future security of hash function. Moreover, they are investigating the high trade-off in (speed/memory) that implemented in Virtex-7 2000T of FPGAs family hardware. Whereas, excluded the rest of hash functions in this finalist, which are not investigated all the measurements of hash function as mentioned above.

Research paper thumbnail of FYP A Robust Steganographic Technique for Hiding Text into Images Using Cryptography

This paper will take an in-depth look on steganography by proposing a new method of Image Stegano... more This paper will take an in-depth look on steganography by proposing a new method of Image Steganography. Recently, many digital techniques have been developed that perform steganography on electronic media, most notably sound and image files. Steganography works by following the concept of securing through obsecurity which is securing something by hiding it. Apparently, there are already many applications that can be used to reveal the hidden data. Therefore, this paper has been proposed to overcome this issue. This project model showed the combination of cryptography together with steganography and along with linear feedback shift register (LFSR) technique ensured the strength on the level of security for the message hiding. The combination of those concepts also ensured the robustness and efficiency of the method which the concept was encrypted data (plain text) had been hidden in the cover (image) in form of binary bits. The LFSR scattered the bits of the ciphertext and then those bits had been placed in the image randomly. This proposed method ensured that the difficulties of this image to be cracked by cryptanalyzer are high.

Research paper thumbnail of Evaluation of Usability Problems of Labor Portal in Saudi Arabia Authors

The purpose of this research was to evaluate the quality of Labor portal. Ministry of Labor focus... more The purpose of this research was to evaluate the quality of Labor portal. Ministry of Labor focused on over the past years to establish a database of the labor market in the Kingdom of Saudi Arabia. The data includes workers in Saudi private sector, whether Saudis or expatriates where mechanization included all labor of 39-office work in various regions. The governorates of the Kingdom operates IT management to develop this rule to get the information and data related to the labor market quickly and accurately. 7 experts evaluated the quality portal of Saudi Arabia Ministry of Labor using self-developed instrument containing eight factors from the literature review on 5-likert scale. The result of the study shows that, the Labor portal quality is fairly good by 78.2% and it needs further improvement and development by 21.8%. Suggestions were made to the Saudi government, particularly, the Saudi Ministry of labor that, there is a need to further test the portal empirically based on the experts' evaluation.

Research paper thumbnail of crypto conf langkawi

Research paper thumbnail of Lightweight Block Ciphers: a Comparative Study Sufyan Salim Mahmood AlDabbagh 1,a , Imad Al

Although the AES is an excellent and preferred choice for almost all block cipher applications, i... more Although the AES is an excellent and preferred choice for almost all block cipher applications, it is not suitable for extremely constrained environments such as RFID (Radio-Frequency IDentification) tags and sensor networks. Therefore lightweight cryptography has become very vital and a strong demand. This paper meant to be a reference (for the cryptographic designers) on the lightweight block ciphers. It starts by doing a survey to collect the latest proposed ciphers, then to study them in terms of their algorithms specifications, hardware implementation and attacks. Finally, after the explanation and comparison, this research can be the basement for starting point to improve the lightweight block cipher in many directions like number of clock cycle, size of memory, number of Chosen Plaintext, Gate equivalence ( GE), throughput and attacks.

Research paper thumbnail of 947-951

Multiprocessor Scheduling Problem (MSP) is an NP-complete optimization problem. The applications ... more Multiprocessor Scheduling Problem (MSP) is an NP-complete optimization problem. The applications of this problem are numerous, but are, as suggested by the name of the problem, most strongly associated with the scheduling of computational tasks in a multiprocessor environment. Many methods and algorithms were suggested to solve this problem due to its importance. Genetic algorithms were among the suggested methods. In this research, sound improvements were done on one of the known papers . Results show very good improvements in increasing the percentage of getting the exact solution as well as decreasing the number of generations needed to converge.

Research paper thumbnail of TRAFFIC MANAGEMENT SYSTEM BASED ON WSN IN KUWAIT: AN INITIAL DESIGN

This paper discusses traffic problems in the world and emphasizes on Kuwait city as case study. M... more This paper discusses traffic problems in the world and emphasizes on Kuwait city as case study. Many of these problems can be solve by building a Traffic Management System based on a Wireless Sensor Network (WSN). TMS is an innovative design for the road that saves time and money for the driver. This solution creates a city of intelligence, which can be control automatically through sensors. Some of the sensor nodes were portable and fixed that spread in buildings, streets, cars and traffic signals. We use two kinds of WSN motion sensors and physical sensors. We also use two kinds of WSN nodes: special-purpose sensor nodes and generic sensor nodes. Zigbee platform use to communicate between nodes in short speed and reduce energy consumption. The Database Management Systems (DBMS) supports a geospatial database by offering the GIS services such as fingerprints, photos and videos. The functionality of Network Operation Center (NOC) to supervise, maintains, and monitors the wireless network. GPS/routing protocols use to detect the location with longitude and latitude date information with Geographic information system (GIS) to discover geographic location for the city maps. The routing protocols were cheaper and provide same functionality as GPS. Our initial design describes the physical layer to explain the connectivity path from (NOC) to vehicle then network layer depending on routing protocols lastly, application layer shows the dashboard monitor system that controlled by (NOC) and how it solve a different issues in traffic problems.

Research paper thumbnail of 212 1036 1 PB m

The encryption process combines mathematics and computer science. Cryptography consists of a set ... more The encryption process combines mathematics and computer science. Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. This paper discusses an encryption method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The MD5 hash function is used to hash the encrypted file performed by Base64. As an example for the two protection mechanisms, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data.

Research paper thumbnail of Designing a Smart City in Kuwait: an Initial Study

This paper will discuss different humanity and environmental problems that face the Kuwait city, ... more This paper will discuss different humanity and environmental problems that face the Kuwait city, such problems are slowing down the wheel of development in the country. Much of these problems and challenges can be solved by building a smart infrastructure based on wireless sensor network (WSN) that will be connected with backbone system depending on global network in various aspects: GSM, 4G, GPS, GIS, WIFI, WIMAX, and Cloud computing. This solution will create a city of intelligence which can be controlled automatically through sensors. Some of the sensors will be portable and carried by humans (Bracelet) or vehicles (Tag) while carrying necessary information in memory storage which can read/write into/from the sensors. Furthermore, other sensors can be fixed at important places while transmitting and receiving data. Recently, most of the researchers and IT companies proposed the idea of smart cities while focusing on a certain problem inside the city and giving a smart solution to that problem. For example, smart grid, smart meter, smart healthcare, traffic management system, smart energy, and smart Building. The idea behind this paper is to solve different city issues by using WSN and building an initial smart infrastructure using Kuwait city as case study.

Research paper thumbnail of Setting-Up a Sulh-based, Community Mediation-type of Online Dispute Resolution (ODR) in Malaysia

Islam is a way of life that guides the Muslims from all perspectives, and as portion of Islam, it... more Islam is a way of life that guides the Muslims from all perspectives, and as portion of Islam, it also promotes peace and conciliation in resolving disputes. The Al-Quran provides guidelines in dispute resolution through a third party called Sulh. Sulh refers to the process of mediation, arbitration and reconciliation that takes place when the parties involved agree on a process of resolving a dispute with a third party mediator, who eventually will ensure that both disputed parties will be satisfied by the outcomes. This work is focused on community mediation, which involved with the disputes between the community members. In Malaysia, Sulh were actually practiced by the Malays prior to the time of the Portuguese, the Dutch and the British. The session will be conducted by a third party who normally a respected and elder person in the society, whom also held the position as the headman (Penghulu or Ketua Kampung) or Imam (a religious leader). Nowadays, given the plural society of Malaysia, and the era of Internet, it is crucial for Sulh to be available online. With the use of ICT tools, Sulh can be promoted to society, and if it is a part of e-government efforts, then it will encourage the society to be involved with the government's mission. The online Sulh will not merely act as an interface for those parties involved. The challenges of making the online system secured, the correct ways of ensuring the data accuracy, understanding on methods that will be used for data propagation (among others), are existed in the domain of Computer Science (CS). There are many possible CS approaches, but the work will focus on Computational Intelligence (CI) techniques, with special interest in connectionist models.

Research paper thumbnail of Achieving Security for Images by LSB and MD5

Steganography is a technique used to hide a message inside video, audio, or image files. A hash f... more Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant Bits (LSB replacement) technique. This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. If it has been manipulated after hiding the information, it can be discovered by the owner of the key because the serial hash value will be changed.

Research paper thumbnail of hewa 2013

Human face recognition systems have gained a considerable attention during last decade due to its... more Human face recognition systems have gained a considerable attention during last decade due to its vast applications in the field of computer and advantages over previous biometric methods. There are many applications with respect to security, sensitivity and secrecy. Face detection is the most important and first step of recognition system. This paper introduces a new approach to face detection systems using the skin color of a subject. This system can detect a face regardless of the background of the picture, which is an important phase for face identification. The images used in this system are color images which give additional information about the images than the gray images provide.

Research paper thumbnail of ict4m mohamad

we investigate SVG usage to display Arabic font on the web. SVG (Scalable Vector Graphics) is a s... more we investigate SVG usage to display Arabic font on the web. SVG (Scalable Vector Graphics) is a standard applied widely over several applications. It can be used to display vector graphics and text on web pages. SVG has witnessed several improvements and drew more attention as the devices used to surf the web are evolving in screen sizes and resolutions. This paper demonstrates how to convert normal font to SVG, then opens the opportunity for an engine that can render Arabic SVG font on different platforms and ends with challenges and solutions for them. We speculate that SVG will play great rule in future technologies and making use of it early on can lead to great benefits for Arabic language consumption over the web.

Research paper thumbnail of uk conference

Research paper thumbnail of Quality Evaluation of “Safeer” Portal For Saudi Students Studying Abroad Haifa Fahad AL-Zuabi Kulliyyah of Information and Communication

The purpose of this research was to evaluate the quality of Safeer portal. "Safeer" is a portal t... more The purpose of this research was to evaluate the quality of Safeer portal. "Safeer" is a portal through which a student can apply for any of the 86 available academic, administrative and financial services. It was launched on Sunday 29th of January 2009; to link the Saudi ministry of higher education to Saudi cultural missions around the world. The quality was evaluated by seven experts and eight factors. Every dimension was evaluated by different number of items on 5 Likert scales. The evaluation instrument was the survey developed by the researchers upon the reviewed literature. It was found that, the Safeer portal quality is fairly good by 75% and it needs further improvement and development by 25%. The researchers recommend further investigation on empirical surveys, in order to develop more acceptable and authentic instrument. Also, it needs further understanding of evaluators. The evaluators' uncertainty is an ambiguity issue raised in the difference between internal consistency of the survey and the lack of their concordance.

Research paper thumbnail of Comparative study on Content-Based Image Retrieval (CBIR

The process of retrieving desired images from a large collection is widely used in applications o... more The process of retrieving desired images from a large collection is widely used in applications of computer vision. In order to improve the retrieval performance an efficient and accurate system is required. Retrieving images based on the content i.e. color, texture, shape etc is called content based image retrieval (CBIR). The content is actually the feature of an image and is extracted through a meaningful way to construct a feature vector. Images having the least distance between their feature vectors are most similar. This paper gives comparison of three different approaches of CBIR based on image features and similarity measures taken for finding the similarity between two images. Results have shown that selecting an important image feature and calculating that through a meaningful way is of great importance in image retrieval. All the important features must be considered while constructing a feature vector and a proper similarity measure should be used for calculating the distance between two feature vectors. These parameters play very crucial role in deciding the overall performance of the any CBIR system. Some future direction were identified and under our future work.

Research paper thumbnail of COMPARISON AND ANALYSIS STUDY OF SHA-3 FINALISTS

The competition of the NIST contenders in SHA-3 increased between the candidates hash functions t... more The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to choose the winner in the end of 2012. However, NIST has outlined different requirements to measure different hash functions criteria such as; security, structure, and performance. Therefore, this paper addresses a comparative study of round 3 finalist SHA-3 candidates in; design of structure, complexity of security, with performance and cost, to measure the robustness of the algorithms through the Fundamentals

Research paper thumbnail of Stress Assessment While Listening to Quran Recitation

2014 International Conference on Computer Assisted System in Health, 2014

Stress and anxiety are one of the most widespread problems presently, stress treatment has been f... more Stress and anxiety are one of the most widespread problems presently, stress treatment has been featured in many researches. The use of Quran offers a substantial help in treating stress. The purpose of this study is to examine the various aspects and perspectives of human emotions while listening to Quran Recitation. This study aims to identify and select verses that have more psychological impact than other verses and to identify the most Quran reciter that respondents believe his voice brings calmness and tranquility to their mind. Quantitative and qualitative methods were adopted. An online distributed questionnaire was sent to the academic staffs of all the Islamic faculties in the Malaysian public universities, five subjects participated in EEG experiment to identify their emotions while listening to these Quran verses. Five Quran verses and one reciter were identified, while experiment indicates that the subjects are more relieved and relaxed when listening to these Quran verses.

Research paper thumbnail of Cryptocurrency vs Fiat Currency: Architecture, Algorithm, Cashflow & Ledger Technology on Emerging Economy Subtitle: The Influential facts of Cryptocurrency and Fiat Currency

Typically, electronic currency like digital or cryptocurrency both are influencing the world econ... more Typically, electronic currency like digital or cryptocurrency both are influencing the world economy under the ledger technology, where as traditional fiat currency plays vital role in socio economy followed by conventional printing method. This review paper is basically focused on most influential facts behind the economical elements like the applicable operation via successful blockchain algorithm, architecture and mining operation based on contents from journal publications, online publications, news reports, seminars and workshops. Several aspects of crypto and fiat currencies are rolling on emerging economy, from this point, this paper tries to figure out how consensus algorithm and growing numbers of crypto and fiat currencies are performed with its existing pros and cons towards further developing process.

Research paper thumbnail of A study on the effects of EEG and ECG signals while listening to Qur'an recitation

The 5th International Conference on Information and Communication Technology For the Muslim World, Nov 17, 2014

Research paper thumbnail of Hash Function of Finalist SHA

The National Institute of Standard and Technology (NIST) has suggested different principles for h... more The National Institute of Standard and Technology (NIST) has suggested different principles for hash functions to avoid the blunders and to choice the ideal quality of hash function, which to be a measurement for the future of hash function generations. Therefore, the goal of the NIST contenders in SHA-3 between the hash functions is to be chosen as the winner in the end of 2012, and the beginning of 2013. Thus, for this reason the paper addresses the comparative and analysis study of the finalist SHA-3 candidates in: complexity of security, design and structure, as well as performance and cost, to measure the robustness of the algorithms in this area, through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). Therefore, main idea from this comparison and analysis study between the finalist of SHA-3 candidates such as (BLAKE, Grostl, JH, Keccak, and Skein) is to investigate the tight security in the suitable designs of lightweight such as JH and Keccak for the future security of hash function. Moreover, they are investigating the high trade-off in (speed/memory) that implemented in Virtex-7 2000T of FPGAs family hardware. Whereas, excluded the rest of hash functions in this finalist, which are not investigated all the measurements of hash function as mentioned above.

Research paper thumbnail of FYP A Robust Steganographic Technique for Hiding Text into Images Using Cryptography

This paper will take an in-depth look on steganography by proposing a new method of Image Stegano... more This paper will take an in-depth look on steganography by proposing a new method of Image Steganography. Recently, many digital techniques have been developed that perform steganography on electronic media, most notably sound and image files. Steganography works by following the concept of securing through obsecurity which is securing something by hiding it. Apparently, there are already many applications that can be used to reveal the hidden data. Therefore, this paper has been proposed to overcome this issue. This project model showed the combination of cryptography together with steganography and along with linear feedback shift register (LFSR) technique ensured the strength on the level of security for the message hiding. The combination of those concepts also ensured the robustness and efficiency of the method which the concept was encrypted data (plain text) had been hidden in the cover (image) in form of binary bits. The LFSR scattered the bits of the ciphertext and then those bits had been placed in the image randomly. This proposed method ensured that the difficulties of this image to be cracked by cryptanalyzer are high.

Research paper thumbnail of Evaluation of Usability Problems of Labor Portal in Saudi Arabia Authors

The purpose of this research was to evaluate the quality of Labor portal. Ministry of Labor focus... more The purpose of this research was to evaluate the quality of Labor portal. Ministry of Labor focused on over the past years to establish a database of the labor market in the Kingdom of Saudi Arabia. The data includes workers in Saudi private sector, whether Saudis or expatriates where mechanization included all labor of 39-office work in various regions. The governorates of the Kingdom operates IT management to develop this rule to get the information and data related to the labor market quickly and accurately. 7 experts evaluated the quality portal of Saudi Arabia Ministry of Labor using self-developed instrument containing eight factors from the literature review on 5-likert scale. The result of the study shows that, the Labor portal quality is fairly good by 78.2% and it needs further improvement and development by 21.8%. Suggestions were made to the Saudi government, particularly, the Saudi Ministry of labor that, there is a need to further test the portal empirically based on the experts' evaluation.

Research paper thumbnail of crypto conf langkawi

Research paper thumbnail of Lightweight Block Ciphers: a Comparative Study Sufyan Salim Mahmood AlDabbagh 1,a , Imad Al

Although the AES is an excellent and preferred choice for almost all block cipher applications, i... more Although the AES is an excellent and preferred choice for almost all block cipher applications, it is not suitable for extremely constrained environments such as RFID (Radio-Frequency IDentification) tags and sensor networks. Therefore lightweight cryptography has become very vital and a strong demand. This paper meant to be a reference (for the cryptographic designers) on the lightweight block ciphers. It starts by doing a survey to collect the latest proposed ciphers, then to study them in terms of their algorithms specifications, hardware implementation and attacks. Finally, after the explanation and comparison, this research can be the basement for starting point to improve the lightweight block cipher in many directions like number of clock cycle, size of memory, number of Chosen Plaintext, Gate equivalence ( GE), throughput and attacks.

Research paper thumbnail of 947-951

Multiprocessor Scheduling Problem (MSP) is an NP-complete optimization problem. The applications ... more Multiprocessor Scheduling Problem (MSP) is an NP-complete optimization problem. The applications of this problem are numerous, but are, as suggested by the name of the problem, most strongly associated with the scheduling of computational tasks in a multiprocessor environment. Many methods and algorithms were suggested to solve this problem due to its importance. Genetic algorithms were among the suggested methods. In this research, sound improvements were done on one of the known papers . Results show very good improvements in increasing the percentage of getting the exact solution as well as decreasing the number of generations needed to converge.

Research paper thumbnail of TRAFFIC MANAGEMENT SYSTEM BASED ON WSN IN KUWAIT: AN INITIAL DESIGN

This paper discusses traffic problems in the world and emphasizes on Kuwait city as case study. M... more This paper discusses traffic problems in the world and emphasizes on Kuwait city as case study. Many of these problems can be solve by building a Traffic Management System based on a Wireless Sensor Network (WSN). TMS is an innovative design for the road that saves time and money for the driver. This solution creates a city of intelligence, which can be control automatically through sensors. Some of the sensor nodes were portable and fixed that spread in buildings, streets, cars and traffic signals. We use two kinds of WSN motion sensors and physical sensors. We also use two kinds of WSN nodes: special-purpose sensor nodes and generic sensor nodes. Zigbee platform use to communicate between nodes in short speed and reduce energy consumption. The Database Management Systems (DBMS) supports a geospatial database by offering the GIS services such as fingerprints, photos and videos. The functionality of Network Operation Center (NOC) to supervise, maintains, and monitors the wireless network. GPS/routing protocols use to detect the location with longitude and latitude date information with Geographic information system (GIS) to discover geographic location for the city maps. The routing protocols were cheaper and provide same functionality as GPS. Our initial design describes the physical layer to explain the connectivity path from (NOC) to vehicle then network layer depending on routing protocols lastly, application layer shows the dashboard monitor system that controlled by (NOC) and how it solve a different issues in traffic problems.

Research paper thumbnail of 212 1036 1 PB m

The encryption process combines mathematics and computer science. Cryptography consists of a set ... more The encryption process combines mathematics and computer science. Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. This paper discusses an encryption method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The MD5 hash function is used to hash the encrypted file performed by Base64. As an example for the two protection mechanisms, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data.

Research paper thumbnail of Designing a Smart City in Kuwait: an Initial Study

This paper will discuss different humanity and environmental problems that face the Kuwait city, ... more This paper will discuss different humanity and environmental problems that face the Kuwait city, such problems are slowing down the wheel of development in the country. Much of these problems and challenges can be solved by building a smart infrastructure based on wireless sensor network (WSN) that will be connected with backbone system depending on global network in various aspects: GSM, 4G, GPS, GIS, WIFI, WIMAX, and Cloud computing. This solution will create a city of intelligence which can be controlled automatically through sensors. Some of the sensors will be portable and carried by humans (Bracelet) or vehicles (Tag) while carrying necessary information in memory storage which can read/write into/from the sensors. Furthermore, other sensors can be fixed at important places while transmitting and receiving data. Recently, most of the researchers and IT companies proposed the idea of smart cities while focusing on a certain problem inside the city and giving a smart solution to that problem. For example, smart grid, smart meter, smart healthcare, traffic management system, smart energy, and smart Building. The idea behind this paper is to solve different city issues by using WSN and building an initial smart infrastructure using Kuwait city as case study.

Research paper thumbnail of Setting-Up a Sulh-based, Community Mediation-type of Online Dispute Resolution (ODR) in Malaysia

Islam is a way of life that guides the Muslims from all perspectives, and as portion of Islam, it... more Islam is a way of life that guides the Muslims from all perspectives, and as portion of Islam, it also promotes peace and conciliation in resolving disputes. The Al-Quran provides guidelines in dispute resolution through a third party called Sulh. Sulh refers to the process of mediation, arbitration and reconciliation that takes place when the parties involved agree on a process of resolving a dispute with a third party mediator, who eventually will ensure that both disputed parties will be satisfied by the outcomes. This work is focused on community mediation, which involved with the disputes between the community members. In Malaysia, Sulh were actually practiced by the Malays prior to the time of the Portuguese, the Dutch and the British. The session will be conducted by a third party who normally a respected and elder person in the society, whom also held the position as the headman (Penghulu or Ketua Kampung) or Imam (a religious leader). Nowadays, given the plural society of Malaysia, and the era of Internet, it is crucial for Sulh to be available online. With the use of ICT tools, Sulh can be promoted to society, and if it is a part of e-government efforts, then it will encourage the society to be involved with the government's mission. The online Sulh will not merely act as an interface for those parties involved. The challenges of making the online system secured, the correct ways of ensuring the data accuracy, understanding on methods that will be used for data propagation (among others), are existed in the domain of Computer Science (CS). There are many possible CS approaches, but the work will focus on Computational Intelligence (CI) techniques, with special interest in connectionist models.

Research paper thumbnail of Achieving Security for Images by LSB and MD5

Steganography is a technique used to hide a message inside video, audio, or image files. A hash f... more Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant Bits (LSB replacement) technique. This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. If it has been manipulated after hiding the information, it can be discovered by the owner of the key because the serial hash value will be changed.

Research paper thumbnail of hewa 2013

Human face recognition systems have gained a considerable attention during last decade due to its... more Human face recognition systems have gained a considerable attention during last decade due to its vast applications in the field of computer and advantages over previous biometric methods. There are many applications with respect to security, sensitivity and secrecy. Face detection is the most important and first step of recognition system. This paper introduces a new approach to face detection systems using the skin color of a subject. This system can detect a face regardless of the background of the picture, which is an important phase for face identification. The images used in this system are color images which give additional information about the images than the gray images provide.

Research paper thumbnail of ict4m mohamad

we investigate SVG usage to display Arabic font on the web. SVG (Scalable Vector Graphics) is a s... more we investigate SVG usage to display Arabic font on the web. SVG (Scalable Vector Graphics) is a standard applied widely over several applications. It can be used to display vector graphics and text on web pages. SVG has witnessed several improvements and drew more attention as the devices used to surf the web are evolving in screen sizes and resolutions. This paper demonstrates how to convert normal font to SVG, then opens the opportunity for an engine that can render Arabic SVG font on different platforms and ends with challenges and solutions for them. We speculate that SVG will play great rule in future technologies and making use of it early on can lead to great benefits for Arabic language consumption over the web.

Research paper thumbnail of uk conference

Research paper thumbnail of Quality Evaluation of “Safeer” Portal For Saudi Students Studying Abroad Haifa Fahad AL-Zuabi Kulliyyah of Information and Communication

The purpose of this research was to evaluate the quality of Safeer portal. "Safeer" is a portal t... more The purpose of this research was to evaluate the quality of Safeer portal. "Safeer" is a portal through which a student can apply for any of the 86 available academic, administrative and financial services. It was launched on Sunday 29th of January 2009; to link the Saudi ministry of higher education to Saudi cultural missions around the world. The quality was evaluated by seven experts and eight factors. Every dimension was evaluated by different number of items on 5 Likert scales. The evaluation instrument was the survey developed by the researchers upon the reviewed literature. It was found that, the Safeer portal quality is fairly good by 75% and it needs further improvement and development by 25%. The researchers recommend further investigation on empirical surveys, in order to develop more acceptable and authentic instrument. Also, it needs further understanding of evaluators. The evaluators' uncertainty is an ambiguity issue raised in the difference between internal consistency of the survey and the lack of their concordance.

Research paper thumbnail of Comparative study on Content-Based Image Retrieval (CBIR

The process of retrieving desired images from a large collection is widely used in applications o... more The process of retrieving desired images from a large collection is widely used in applications of computer vision. In order to improve the retrieval performance an efficient and accurate system is required. Retrieving images based on the content i.e. color, texture, shape etc is called content based image retrieval (CBIR). The content is actually the feature of an image and is extracted through a meaningful way to construct a feature vector. Images having the least distance between their feature vectors are most similar. This paper gives comparison of three different approaches of CBIR based on image features and similarity measures taken for finding the similarity between two images. Results have shown that selecting an important image feature and calculating that through a meaningful way is of great importance in image retrieval. All the important features must be considered while constructing a feature vector and a proper similarity measure should be used for calculating the distance between two feature vectors. These parameters play very crucial role in deciding the overall performance of the any CBIR system. Some future direction were identified and under our future work.

Research paper thumbnail of COMPARISON AND ANALYSIS STUDY OF SHA-3 FINALISTS

The competition of the NIST contenders in SHA-3 increased between the candidates hash functions t... more The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to choose the winner in the end of 2012. However, NIST has outlined different requirements to measure different hash functions criteria such as; security, structure, and performance. Therefore, this paper addresses a comparative study of round 3 finalist SHA-3 candidates in; design of structure, complexity of security, with performance and cost, to measure the robustness of the algorithms through the Fundamentals