Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by Norrozila Sulaiman
Total Records ( 4 ) for Norrozila Sulaiman
  Muamer N. Mohammad and Norrozila Sulaiman
  An efficient broadcasting algorithm in ad hoc network has received more attention because of its important role in topology information, route finding and diffusing data. This study attempted to propose a new broadcast algorithm based on combination of nodes signal strength and short path protocol in ad hoc network. The effect of network topology and traffic parameters were taken into account for the broadcast storm problem. The neighbor nodes signal was classified into two groups: good and poor signal strength. The selected short path depends on degree of signal strength and information tables to optimize route in case of any congestion. The simulation results show the effectiveness of the proposed algorithm to improve the network performance in term of reception rates and lower message travel time.
  Emad Taha Khalaf and Norrozila Sulaiman
  The security of templates is the critical part of biometric system and one of the most crucial issues in any proposed system. In fact, features such as voice, face, fingerprints and many others can be covertly acquired or stolen by an attacker and misused. Therefore, storing biometric templates a secure way is crucial. This study proposes a novel approach that combines an improved encryption method with a new concealment technique to establish a secure data template storing system. The Hill Cipher algorithm has been improved to be more secure by using a large and random key with large data block and also extending it to include the special characters. In the other hand a new concealment method proposed by combine two of the popular methods DWT and DCT for embedding and extraction the secret data in order to compensate the drawbacks of both of them and to make the hidden information much more secure against the attacks, wavelet transform which use dyadic filters to decompose cover image into 4-levels (HH, HL, LH and LL) and discrete cosine Transforms to convert a signal of the selected coefficients (HH, HL and LH) into elementary frequency components then according to the percentages entering by a user the encrypted data will distribute. The efficiency of encryption and concealment have been checked out with a number of widely used metrics such as Peak Signal to Noise Ratio (PSNR) and Normalized Correlation Coefficient (NCC).
  Mohammed Adam Ibrahim Fakheraldien , Jasni Mohamad Zain and Norrozila Sulaiman
  Problem statement: In this study, we propose a middleware that provides a transformation utility for storing and querying XML data in relational databases using model mapping method. Approach: To store XML documents in RDBMS, several mapping approaches can be used. We chose structure independent approach. In this middleware the model mapping method XParent and free of cost available technologies MYSQL, PhpMyAdmin and PHPclasses are used as examples. Results: This middleware stores XML tables and does not require a direct extension of SQL thus this middleware can be used with any relational databases management system with little changes in the middleware interface. The middleware offers two alternative methods -namely XParent and XReal- for storing XML in the database. Conclusion: The key to proposed middleware is to store XML document in a relational database through a user interface and with an XPath query processor. We present a comparative experimental study on the performance of insertion and retrieval of two types of XML documents with a set of XPath queries executed though the XPath. XML and Relational databases cannot be kept separately because XML is becoming the universal standard data format for the representation and exchanging the information whereas most existing data lies in RDBMS and their power of data capabilities cannot be degraded so the solution to this problem a middleware prototype is required. The proposed schema dependent solutions have a drawback that evens a small change in the logical structure of XML documents influence on the database schemas and several problems occur during the updating process. A new efficient data middleware is proposed in the study to face these issues.
  Waleed Khalid Ahmed , Muamer N. Mohammed and Norrozila Sulaiman
  With the rapid growth of the embedded system market, especially in the area of ubiquitous e-services, an increasing number of embedded systems are required to deal with sensitive and private information. In this study, a new algorithm to secure and protect databases is proposed by using a Dynamic Key (DK) and reverse string for each character in the string (or field in the file of a database) and each string (or record in the file of a database). In this paper, a new encryption algorithm for database protection based on Dynamic Key and Reverse String (DKRS). The proposed algorithm (DKRS) specifically protecting the sensitive data because the (DKRS) is using dynamic key for each character in the string. The dynamic key is generated using special equation that depends on length of string, order of the character in the string, ASCII code of the character and string sequence. The (DKRS) algorithm guarantees that no duplicate encryption for each character and each record will be different. Also, (DKRS) algorithm ensures a different encryption for the duplicate data. The (DKRS) algorithm is using the reverse string before the encryption and many steps after that to add more complexity.
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility