Murizah Kassim | Universiti Teknologi Mara (original) (raw)

Papers by Murizah Kassim

Research paper thumbnail of Incorporating VHDL in teaching combinational logic circuit

2010 2nd International Congress on Engineering Education, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance Analysis on Wan Optimizations: Bandwidth Management in Multi Protocol Level Switching (MPLS) VirtualPrivate Network (VPN)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Technique on Comparative Analysis of Bandwidth Estimation Tools on 802.11g Wireless Local Area Network

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A New Adaptive Throughput Policy Algorithm on Live Internet Traffic of IP-based Network

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A case study: Reliability of smartcard applications and implementation in university environment, Malaysia

2009 International Semiconductor Device Research Symposium, 2009

Smartcard technologies application and implementation is a need in the workplace. The technology ... more Smartcard technologies application and implementation is a need in the workplace. The technology demand is increasing at an overwhelming rate today in Malaysia. The process of implementing it seems difficult although most of the smartcard applications have been implemented successfully in certain country. Satisfactory and successful of the smartcard implementation would likely be the aim of an organization. The process of deploying it in a huge university area and communities would really need a detail research and extensive ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Internet usage bandwidth management

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Web Based Temperature Monitoring System

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A prototype of Halal product recognition system

2012 International Conference on Computer & Information Science (ICCIS), 2012

Abstract Halal industry has been the fastest growing global business in Malaysia, therefore Malay... more Abstract Halal industry has been the fastest growing global business in Malaysia, therefore Malaysia has focused to set up the world's first development corporation in making Halal development business communities. Today, Muslim consumer still faces problem in identifying, verify or recognized Halal products in the market. Time to time technology development in communications has given advantage in deploying the system to solve this issue. Today new technology would be one the advantage in verifying Halal product. This ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Framework on Halal Product Recognition System through Smartphone Authentication

Lecture Notes in Electrical Engineering, 2011

Muslim consumer faces a problem in identifying the halal products in the market especially in Mal... more Muslim consumer faces a problem in identifying the halal products in the market especially in Malaysia. A fake halal logo and unknown detail ingredients is the major problem for Muslim consumer. This framework study will be presented and with the implemented proposed system would help consumer to verify through Smartphone barcode capture straightaway on time with the applied halal product alert database system. All the information regarding halal logo, company, product name, barcode number, ingredients, ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Analysis of Drinks Base Concentration Using Microprocessor Based Sensor

Advanced Materials Research, Feb 3, 2012

This paper presents an analysis of liquid drinks concentration using microprocessor based sensor.... more This paper presents an analysis of liquid drinks concentration using microprocessor based sensor. A prototype model based on hardware and software is used to run this analysis. The model then is tested and a few type of branded sold drinks base is analyzed on its concentration. The hardware comprises of a portable device that has been design to detect the differences between selected liquid drinks concentration. Those tested experimental drinks are Sunquick Blackcurrant, Sunquick Orange, Greenhill Rose, ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Broadband Internet performance (QoS measurement) view from home access gateway in Malaysia

2014 IEEE 5th Control and System Graduate Research Colloquium, 2014

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Flow forensic analysis on traffic pattern and bandwidth utilization for network security management

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Systematic Test and Evaluation Process (STEP) approach on Shared Banking Services (SBS) System identification

This paper presented the concept of Systematic Test and Evaluation Process (STEP) for Shared Bank... more This paper presented the concept of Systematic Test and Evaluation Process (STEP) for Shared Banking Services (SBS) System on one developed banking system at HeiTech, Malaysia. The approach using STEP provides a model process and a step-by-step sequence of activities and tasks for performing software testing at any level from unit testing through acceptance testing. STEP is a proprietary methodology developed by Software Quality Engineering for software development as guidance to measure the quality of a ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fan Speed Control on Heat Detector Technique Using Zigbex Wireless Sensor Network

Advanced Materials Research, Feb 6, 2013

this paper presented the study on fan speed control on heat detector technique using Zigbex wirel... more this paper presented the study on fan speed control on heat detector technique using Zigbex wireless Sensor Network. The updated wireless application technology called Zigbex wireless sensor network (WSN) is used to simulate the system to control automatically the fan speed. The wireless sensor network will be based on the temperature warmth which reaches at a circumstances heat. This system could be used for the road tunnel fan control system. In wired road tunnel fan control, the system requires high cost ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Developing a customized software engineering testing for Shared Banking Services (SBS) System

2011 IEEE International Conference on System Engineering and Technology, 2011

Abstract This paper presented the concept of developing a customized software testing process for... more Abstract This paper presented the concept of developing a customized software testing process for software engineering in Shared Banking Services (SBS) System on one developed banking system in Malaysia. Software testing is one of the main activities in software development life cycle. This process consists of a few activities, which includes developing test plan and strategy, test design, test execution and evaluation of test result. However, a customized testing process is required for a specific domain in order to ensure ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Statistical Analysis and Modeling of Internet Traffic IP-based Network for Tele-Traffic Engineering

This paper presents a statistical analysis and best fitted distribution model of internet traffic... more This paper presents a statistical analysis and best fitted distribution model of internet traffic IP-based Network for tele-traffic engineering. One IP-based campus network architecture is studied which support of 16Mbps Committed Access Rate (CAR) speed line to Wide Area Network (WAN). Solarwinds network monitoring traffic toolbox is setup at the gateway router from inside campus network to the WAN in collecting real live throughput internet traffics. Daily throughput flows in Mbyte are collected in every ten minutes inter-arrival time. Statistical method on fitted Cumulative Distribution Function (CDF) is evaluated on collected throughput with Matlab software. Maximum Likelihood Estimator (MLE) technique is used to identify the maximum MLE log-likelihood which characterized as best fitted CDF distribution. Normal, Lognormal, Exponential and Weibull CDF fitted on throughput are presented. Among the four distributions, CDF Weibull is identified as the best traffic characteristic based on MLE maximum log-likelihood. Day7 is identified as best fitted that presents fitted 2-parameter Weibull which is Scale a =641.04 and Shape ß =1.36 and fitted 3-parameter Weibull which is Scale a =551.76, Shape ß =1.15 and threshold ?=63. Detail characteristics on day 7 and day 1 are presented and taken as benchmark model for future traffic algorithm.These results are valuable on modeling future tele-traffic
engineering algorithm like policing, shaping, scheduling or queue which is based in real IP-based campus network environment. It is also useful for future prediction of tele-traffic models.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Implementation of High Availability Concept Based on Traffic Segregation Over MPLS-TE

This paper presents performance analysis of high availability concept based on traffic segregatio... more This paper presents performance analysis of high availability concept based on traffic segregation over Multi-Protocol Label Switching (MPLS) Traffic Engineering (TE). Recent years presents many deployment of Virtual Public Network (VPN) over Multi Protocol Label Switching (MPLS) network. This deployment benefits an organization or group of business for their own private network at a much lower costs compared to traditional point-to-point (P2P) private link. Hence, enterprise benefits from the VPN in reducing cost, increasing scalability and increasing productivity without costing the security of their network. Basic requirement of today systems on the design enterprise network is high availability. Deployment of high availability in load balancing and redundancy on existing service provider backbone network is still a challenging task. This paper presents ensured implementation on the network traffic. It immediately segregates and transparent to customer when the network edge device or access circuit was failures. Virtual Router Redundancy Protocol (VRRP) is configured to support high availability. Two gateways are provided at customer edge router, where one router elected as primary gateway, and another as a standby gateway. This situation presents the backup link which is not fully utilized. Traffic diversity concept is used where Policy Based Routing (PBR) handles the traffic segregation to utilize the traffic at both links. Results on analyzed implementation of high availability concept based on traffic segregation over MPLS-TE are presented.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Web-based student attendance system using RFID technology

This paper describes the development of a student attendance system based on Radio Frequency Iden... more This paper describes the development of a student attendance system based on Radio Frequency Identification (RFID) technology. The existing conventional attendance system requires students to manually sign the attendance sheet every time they attend a class. As common as it seems, such system lacks of automation, where a number of problems may arise. This include the time unnecessarily consumed by the students to find and sign their name on the attendance sheet, some students may mistakenly or purposely ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Service Level Agreement Performance Analysis on Quality of Service UPE-METRO Ethernet

A Service Level Agreement (SLA) between a service provider and its customers is an assurance to c... more A Service Level Agreement (SLA) between a service provider and its customers is an assurance to customers in fulfills the best services. Customers can get the service they pay for which obligates the service provider to achieve its service promises. Failing to meet SLAs could result in serious financial consequences for a provider and lost customers trust. This paper presents an analysis on performance of Quality of Service (QoS) SLA on a User Provider Edge –Metro Ethernet (UPE-ME) network. A QoS SLA tested method called RFC 2544 is performed on four customers in one industrial area. Actual data on four of QoS parameters which are throughput, jitter, latency and frame loss are tested by using test gear VeEX Vepal MX-120. The customers are focus to the User Provider Edge (UPE) customer. A few measurement and techniques are presented on the tested method. Analysis result on the tested throughput, jitter, latency and frame loss performance are presented based on growth of bytes. Network performance tested is identified that it is qualify as a perform network link. Performance presented results on growth of throughput with growth of frame length and latency increased with growth of frame length. Analyzed on frames loss presented that there are no errors thus this proved good quality network. Some jitters presented that they are in a low value which means that less jitter presents system with a better operation. Identifications on parameter value are presented based on an analyzed QoS using Minitab 16. The produce result shows the implemented of SLA QOS UPE-ME follow the QoS and this result is a better proved for customer satisfaction and good services from the service provider.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A New Adaptive Throughput Policing Algorithm On Campus IP-Based Network Internet Traffic

This paper presents the development of a new scheme called Adaptive Throughput Policy (ATP) algor... more This paper presents the development of a new scheme called Adaptive Throughput Policy (ATP) algorithm to control internet inbound throughput utilization in an IP-based network by considering traffic flows and their processing times. Real live inbound internet traffics collected from a Campus Network with
Committed Access Rate (CAR) of 16 Mbps bandwidth allocations to internal users are analyzed. New mathematical model with identified parameters are derived and policies are simulated using Token Bucket theory control mechanism. Three main policies conditions called P1 which is controlled on 5% under threshold, P2 which is controlled on threshold rate and P3 which is controlled beyond 10% threshold are defined as filtered condition. ATP simulation evaluated throughput performance on the real live internet traffic. Result present achievement in throughput performance which includes Bucket Capacity, Bandwidth Saving and Processing Time for daily and weekly traffics. The findings show that ATP algorithm resulted in higher bandwidth saving and faster traffic process time in particular during under threshold (P1). Burst throughput are managed to control according to identified implement policies in the development system.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Incorporating VHDL in teaching combinational logic circuit

2010 2nd International Congress on Engineering Education, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance Analysis on Wan Optimizations: Bandwidth Management in Multi Protocol Level Switching (MPLS) VirtualPrivate Network (VPN)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Technique on Comparative Analysis of Bandwidth Estimation Tools on 802.11g Wireless Local Area Network

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A New Adaptive Throughput Policy Algorithm on Live Internet Traffic of IP-based Network

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A case study: Reliability of smartcard applications and implementation in university environment, Malaysia

2009 International Semiconductor Device Research Symposium, 2009

Smartcard technologies application and implementation is a need in the workplace. The technology ... more Smartcard technologies application and implementation is a need in the workplace. The technology demand is increasing at an overwhelming rate today in Malaysia. The process of implementing it seems difficult although most of the smartcard applications have been implemented successfully in certain country. Satisfactory and successful of the smartcard implementation would likely be the aim of an organization. The process of deploying it in a huge university area and communities would really need a detail research and extensive ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Internet usage bandwidth management

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Web Based Temperature Monitoring System

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A prototype of Halal product recognition system

2012 International Conference on Computer & Information Science (ICCIS), 2012

Abstract Halal industry has been the fastest growing global business in Malaysia, therefore Malay... more Abstract Halal industry has been the fastest growing global business in Malaysia, therefore Malaysia has focused to set up the world's first development corporation in making Halal development business communities. Today, Muslim consumer still faces problem in identifying, verify or recognized Halal products in the market. Time to time technology development in communications has given advantage in deploying the system to solve this issue. Today new technology would be one the advantage in verifying Halal product. This ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Framework on Halal Product Recognition System through Smartphone Authentication

Lecture Notes in Electrical Engineering, 2011

Muslim consumer faces a problem in identifying the halal products in the market especially in Mal... more Muslim consumer faces a problem in identifying the halal products in the market especially in Malaysia. A fake halal logo and unknown detail ingredients is the major problem for Muslim consumer. This framework study will be presented and with the implemented proposed system would help consumer to verify through Smartphone barcode capture straightaway on time with the applied halal product alert database system. All the information regarding halal logo, company, product name, barcode number, ingredients, ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Analysis of Drinks Base Concentration Using Microprocessor Based Sensor

Advanced Materials Research, Feb 3, 2012

This paper presents an analysis of liquid drinks concentration using microprocessor based sensor.... more This paper presents an analysis of liquid drinks concentration using microprocessor based sensor. A prototype model based on hardware and software is used to run this analysis. The model then is tested and a few type of branded sold drinks base is analyzed on its concentration. The hardware comprises of a portable device that has been design to detect the differences between selected liquid drinks concentration. Those tested experimental drinks are Sunquick Blackcurrant, Sunquick Orange, Greenhill Rose, ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Broadband Internet performance (QoS measurement) view from home access gateway in Malaysia

2014 IEEE 5th Control and System Graduate Research Colloquium, 2014

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Flow forensic analysis on traffic pattern and bandwidth utilization for network security management

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Systematic Test and Evaluation Process (STEP) approach on Shared Banking Services (SBS) System identification

This paper presented the concept of Systematic Test and Evaluation Process (STEP) for Shared Bank... more This paper presented the concept of Systematic Test and Evaluation Process (STEP) for Shared Banking Services (SBS) System on one developed banking system at HeiTech, Malaysia. The approach using STEP provides a model process and a step-by-step sequence of activities and tasks for performing software testing at any level from unit testing through acceptance testing. STEP is a proprietary methodology developed by Software Quality Engineering for software development as guidance to measure the quality of a ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fan Speed Control on Heat Detector Technique Using Zigbex Wireless Sensor Network

Advanced Materials Research, Feb 6, 2013

this paper presented the study on fan speed control on heat detector technique using Zigbex wirel... more this paper presented the study on fan speed control on heat detector technique using Zigbex wireless Sensor Network. The updated wireless application technology called Zigbex wireless sensor network (WSN) is used to simulate the system to control automatically the fan speed. The wireless sensor network will be based on the temperature warmth which reaches at a circumstances heat. This system could be used for the road tunnel fan control system. In wired road tunnel fan control, the system requires high cost ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Developing a customized software engineering testing for Shared Banking Services (SBS) System

2011 IEEE International Conference on System Engineering and Technology, 2011

Abstract This paper presented the concept of developing a customized software testing process for... more Abstract This paper presented the concept of developing a customized software testing process for software engineering in Shared Banking Services (SBS) System on one developed banking system in Malaysia. Software testing is one of the main activities in software development life cycle. This process consists of a few activities, which includes developing test plan and strategy, test design, test execution and evaluation of test result. However, a customized testing process is required for a specific domain in order to ensure ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Statistical Analysis and Modeling of Internet Traffic IP-based Network for Tele-Traffic Engineering

This paper presents a statistical analysis and best fitted distribution model of internet traffic... more This paper presents a statistical analysis and best fitted distribution model of internet traffic IP-based Network for tele-traffic engineering. One IP-based campus network architecture is studied which support of 16Mbps Committed Access Rate (CAR) speed line to Wide Area Network (WAN). Solarwinds network monitoring traffic toolbox is setup at the gateway router from inside campus network to the WAN in collecting real live throughput internet traffics. Daily throughput flows in Mbyte are collected in every ten minutes inter-arrival time. Statistical method on fitted Cumulative Distribution Function (CDF) is evaluated on collected throughput with Matlab software. Maximum Likelihood Estimator (MLE) technique is used to identify the maximum MLE log-likelihood which characterized as best fitted CDF distribution. Normal, Lognormal, Exponential and Weibull CDF fitted on throughput are presented. Among the four distributions, CDF Weibull is identified as the best traffic characteristic based on MLE maximum log-likelihood. Day7 is identified as best fitted that presents fitted 2-parameter Weibull which is Scale a =641.04 and Shape ß =1.36 and fitted 3-parameter Weibull which is Scale a =551.76, Shape ß =1.15 and threshold ?=63. Detail characteristics on day 7 and day 1 are presented and taken as benchmark model for future traffic algorithm.These results are valuable on modeling future tele-traffic
engineering algorithm like policing, shaping, scheduling or queue which is based in real IP-based campus network environment. It is also useful for future prediction of tele-traffic models.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Implementation of High Availability Concept Based on Traffic Segregation Over MPLS-TE

This paper presents performance analysis of high availability concept based on traffic segregatio... more This paper presents performance analysis of high availability concept based on traffic segregation over Multi-Protocol Label Switching (MPLS) Traffic Engineering (TE). Recent years presents many deployment of Virtual Public Network (VPN) over Multi Protocol Label Switching (MPLS) network. This deployment benefits an organization or group of business for their own private network at a much lower costs compared to traditional point-to-point (P2P) private link. Hence, enterprise benefits from the VPN in reducing cost, increasing scalability and increasing productivity without costing the security of their network. Basic requirement of today systems on the design enterprise network is high availability. Deployment of high availability in load balancing and redundancy on existing service provider backbone network is still a challenging task. This paper presents ensured implementation on the network traffic. It immediately segregates and transparent to customer when the network edge device or access circuit was failures. Virtual Router Redundancy Protocol (VRRP) is configured to support high availability. Two gateways are provided at customer edge router, where one router elected as primary gateway, and another as a standby gateway. This situation presents the backup link which is not fully utilized. Traffic diversity concept is used where Policy Based Routing (PBR) handles the traffic segregation to utilize the traffic at both links. Results on analyzed implementation of high availability concept based on traffic segregation over MPLS-TE are presented.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Web-based student attendance system using RFID technology

This paper describes the development of a student attendance system based on Radio Frequency Iden... more This paper describes the development of a student attendance system based on Radio Frequency Identification (RFID) technology. The existing conventional attendance system requires students to manually sign the attendance sheet every time they attend a class. As common as it seems, such system lacks of automation, where a number of problems may arise. This include the time unnecessarily consumed by the students to find and sign their name on the attendance sheet, some students may mistakenly or purposely ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Service Level Agreement Performance Analysis on Quality of Service UPE-METRO Ethernet

A Service Level Agreement (SLA) between a service provider and its customers is an assurance to c... more A Service Level Agreement (SLA) between a service provider and its customers is an assurance to customers in fulfills the best services. Customers can get the service they pay for which obligates the service provider to achieve its service promises. Failing to meet SLAs could result in serious financial consequences for a provider and lost customers trust. This paper presents an analysis on performance of Quality of Service (QoS) SLA on a User Provider Edge –Metro Ethernet (UPE-ME) network. A QoS SLA tested method called RFC 2544 is performed on four customers in one industrial area. Actual data on four of QoS parameters which are throughput, jitter, latency and frame loss are tested by using test gear VeEX Vepal MX-120. The customers are focus to the User Provider Edge (UPE) customer. A few measurement and techniques are presented on the tested method. Analysis result on the tested throughput, jitter, latency and frame loss performance are presented based on growth of bytes. Network performance tested is identified that it is qualify as a perform network link. Performance presented results on growth of throughput with growth of frame length and latency increased with growth of frame length. Analyzed on frames loss presented that there are no errors thus this proved good quality network. Some jitters presented that they are in a low value which means that less jitter presents system with a better operation. Identifications on parameter value are presented based on an analyzed QoS using Minitab 16. The produce result shows the implemented of SLA QOS UPE-ME follow the QoS and this result is a better proved for customer satisfaction and good services from the service provider.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A New Adaptive Throughput Policing Algorithm On Campus IP-Based Network Internet Traffic

This paper presents the development of a new scheme called Adaptive Throughput Policy (ATP) algor... more This paper presents the development of a new scheme called Adaptive Throughput Policy (ATP) algorithm to control internet inbound throughput utilization in an IP-based network by considering traffic flows and their processing times. Real live inbound internet traffics collected from a Campus Network with
Committed Access Rate (CAR) of 16 Mbps bandwidth allocations to internal users are analyzed. New mathematical model with identified parameters are derived and policies are simulated using Token Bucket theory control mechanism. Three main policies conditions called P1 which is controlled on 5% under threshold, P2 which is controlled on threshold rate and P3 which is controlled beyond 10% threshold are defined as filtered condition. ATP simulation evaluated throughput performance on the real live internet traffic. Result present achievement in throughput performance which includes Bucket Capacity, Bandwidth Saving and Processing Time for daily and weekly traffics. The findings show that ATP algorithm resulted in higher bandwidth saving and faster traffic process time in particular during under threshold (P1). Burst throughput are managed to control according to identified implement policies in the development system.

Bookmarks Related papers MentionsView impact