Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by Iskandar Ishak
Total Records ( 2 ) for Iskandar Ishak
  Iskandar Ishak and Naomie Salim
  Problem statement: Efficient searching is a fundamental problem for unstructured peer to peer networks. Flooding requires a lot of resources in the network and thus will increase the search cost. Searching approach that utilizes minimum network resources is required to produce efficient searching in the robust and dynamic peer-to-peer network. Approach: This study addressed the need for efficient flood-based searching in unstructured peer-to-peer network by considering the content of query and only selecting peers that were most related to the query given. We used minimum information to perform efficient peer selection by utilizing the past queries data and the query message. We exploited the nearest-neighbor concept on our query similarity and query hits space metrics for selecting the most relevant peers for efficient searching. Results: As demonstrated by extensive simulations, our searching scheme achieved better retrieval and low messages consumption. Conclusion: This study suggested that, in an unstructured peer-to-peer network, flooding that was based on the selection of relevant peers, can improve searching efficiency.
  Fatimah Sidi , A. Jabar Marzanah , Lilly Suriani Affendey , Iskandar Ishak , Nurfadhlina Mohd Sharef , Maslina Zolkepli , Tan Ming Ming , Muhammad Faidhi Abd Mokthi , Maslina Daud , Naqliyah Bt Zainuddin and Rafidah Abdul Hamid
  This study describes a comparative analysis study conducted on existing approaches, frameworks and relevant references used in field of information security. The purpose of this study is to identify suitable components in developing a threat factor profiling. By having a threat factor profiling, organizations will have a clear understanding of the threats that they face and enable them to implement a proactive incident management program that focuses on the threat components. This study also discusses the proposed threat factor profiling.
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility