Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Hussain, Sabahat
- A Real-Time Integrated Fire Detection and Alarm (FDA) System for Network Based Building Automation
Abstract Views :162 |
PDF Views:0
Authors
Farhat Anwar
1,
Rounakul Islam Boby
1,
Sabahat Hussain
2,
Muhammad Mahbubur Rashid
3,
Zuhaib Shaikh
3
Affiliations
1 Kulliyyah of Engineering, International Islamic University Malaysia, 53100, Gombak, Kuala Lumpur, MY
2 Kulliyyah of Electronic and Computer Engineering, International Islamic University Malaysia, 53100, Gombak,Kuala Lumpur, IN
3 Kulliyyah of Mechanical Engineering, International Islamic University Malaysia, 53100, Gombak, Kuala Lumpur, MY
1 Kulliyyah of Engineering, International Islamic University Malaysia, 53100, Gombak, Kuala Lumpur, MY
2 Kulliyyah of Electronic and Computer Engineering, International Islamic University Malaysia, 53100, Gombak,Kuala Lumpur, IN
3 Kulliyyah of Mechanical Engineering, International Islamic University Malaysia, 53100, Gombak, Kuala Lumpur, MY
Source
Indian Journal of Science and Technology, Vol 10, No 41 (2017), Pagination:Abstract
Objectives: An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm, signal drop and network breakdown. This work proposes an improved framework for FDA system to ensure a robust, intelligent network of FDA control panels in real-time. Methods/ Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. The declaration from every building connected to the same network appears on Central Control Room (CCR) for real-time monitoring. Findings: The proposed FDA system is different from traditional fire alarm and detection system regarding topology as it manages a group of buildings optimally and efficiently. The single mode fiber-optic connectivity was introduced to reduce signal noises, thus increasing large area coverage and long-term safety. Also, the distributed peer to peer network was proposed to ensure fire survivability where the information is sequentially transmitted. Based on this proposed method a prototype system was designed to validate the performance, where the prototype showed a positive response concerning time consumption and real-time monitoring process than traditional. Improvement: The proposed FDA system got improvement, by consistent network state monitoring framework, fast, reliable connectivity with variable changes possibility and easy maintenance process for increasing robustness and intelligence.Keywords
Framework, Fire Detection and Alarm (FDA), Real-Time, Reliability, Robustness and Intelligence- Snort-Based Smart and Swift Intrusion Detection System
Abstract Views :172 |
PDF Views:0
Authors
Rashidah Funke Olanrewaju
1,
Burhan Ul Islam Khan
1,
Athaur Rahman Najeeb
1,
Ku Nor Afiza Ku Zahir
1,
Sabahat Hussain
1
Affiliations
1 Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Jalan Gombak, 53100 Kuala Lumpur, Selangor, MY
1 Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Jalan Gombak, 53100 Kuala Lumpur, Selangor, MY
Source
Indian Journal of Science and Technology, Vol 11, No 4 (2018), Pagination:Abstract
Objectives: In this paper, a smart Intrusion Detection System (IDS) has been proposed that detects network attacks in less time after monitoring incoming traffic thus maintaining better performance. Methods/Statistical Analysis: The features are extracted using back-propagation algorithm. Then, only these relevant features are trained with the help of multi-layer perceptron supervised neural network. The simulation is performed using MATLAB. Findings: The proposed system has been verified to have high accuracy rate, high sensitivity as well as a reduction in false positive rate. Besides, the intrusions have been classified into four categories as Denial-of-Service (DoS), User-to-ischolar_main (U2R), Remote-to-Local (R2L) and Probe attacks; and the alerts are stored and shared via a central log. Thus, the unknown attacks detected by other Intrusion Detection Systems can be sensed by any IDS in the network thereby reducing computational cost as well as enhancing the overall detection rate. Applications/Improvements: The proposed system does not waste time by considering and analysing all the features but takes into consideration only relevant ones for the specific attack and supervised learning neural network is used for intrusion detection. By the application of Snort before backpropagation algorithm, the latter has only one function to perform – detection of unknown attacks. In this way, the time for attack detection is reduced.Keywords
Back-Propagation, Intrusion Detection System, Multi-Layer Feed-Forward Neural Network, Snort- Secure Annihilation of Out-of-Band Authorization for Online Transactions
Abstract Views :185 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Gombak, Kuala Lumpur, MY
1 Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Gombak, Kuala Lumpur, MY
Source
Indian Journal of Science and Technology, Vol 11, No 5 (2018), Pagination:Abstract
Objectives: In this paper, an approach to online banking authorization using one-time passwords has been illustrated. Methods/Statistical Analysis: The algorithm presented in this paper provides an infinite as well as forward One-Time- Password (OTP) generation mechanism employing two Secure Hash Algorithms viz. SHA3 and SHA2, followed by dynamic truncation to produce human-readable OTP. An inimitable authentication scheme has been presented in which a unique initial seed is used for generating a series of OTPs on the user’s handheld gadget (i.e. a mobile phone). Findings: The proposed scheme demonstrated better results than the previous schemes of authorization after a security analysis was conducted on it. This is attributed to the eradication of cellular network within the authorization process. A high level of performance and efficiency in authentication and authorization was evident from the results that are vital for transacting online. Applications/Improvements: In the proposed system, the inherent features of the user’s device (mobile phone) are utilized to form the initial seed. The application of hash functions to that seed eliminates the necessity to send one time passwords to the users via Short Message Service and decreases the limitations posed by out-of-band systems, thus making it suitable to be employed in online banking and other financial organizations.Keywords
Authentication, Authorization, Out-of-band Authorization, Hash Functions- Mitigating Storage Security Threats in Mobile Phones
Abstract Views :194 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical and Computer Engineering, Kulliyah of Engineering, IIUM, MY
1 Department of Electrical and Computer Engineering, Kulliyah of Engineering, IIUM, MY