Noorhayati Mohamed Noor

Learn More
This paper presents the performance evaluation between IPv4 and IPv6 with Linux MPLS tunnel. MPLS Linux tunneling is used to transport IPv6 data stream over IPv4 network for interoperable IPv4 and IPv6 deployment. The performance metrics such as jitter, datagram/packet loss and bandwidth were measured in both TCP and UPD traffic flow. The experiment(More)
This paper introduces the Gaussian shaped membership function to refine the Rule Based Fuzzy (RBF) image detection. It is expected that the proposed algorithm Gaussian Rule Based Fuzzy (GRBF) method can further refined the detection of periosteal and endosteal edges of hand phantom radiographs. The experimental data consists of four sets of hand phantom(More)
This paper presents the enhancement capability of adaptive histogram equalization (AHE) on the soft tissue lateral neck radiograph for suspected fish bone ingestion. Embedded fish bone lodge in the throat is not easily visible in unprocessed plain radiograph. Serious complication may cause perforation of the lodged and inflammation that can progress to(More)
Cup to disc ratio (CDR) is very important indicators in glaucoma detection. This paper proposes a method for glaucoma detection using digital fundus images with color multi-thresholding segmentation. The objective of this paper is to segment the optic cup and optic disc using color multi-thresholding segmentation and extracted feature such as cup to disc(More)
Cyber attack comes in various approach and forms, either internally or externally. Remote access and spyware are forms of cyber attack leaving an organization to be susceptible to vulnerability. This paper investigates illegal activities and potential evidence of cyber attack through studying the registry on the Windows 7 Home Premium (32 bit) Operating(More)
Spyware is considered as a great threat to confidentiality that it can cause loss of control over private data for computer users. This kind of threat might select some data and send it to another third party without the consent of the user. Spyware detection techniques have been presented traditionally by three approaches; signature, behavior and(More)
The paper proposes to prove the application of an adapted Rule Based Fuzzy(RBF) image detection in detecting periosteal and endosteal edges of hand phantom radiograph. The experimental data consists of four sets of hand phantom radiographs. Only the metacarpal 2, 3 and 4 are considered. The Rule Based Fuzzy is slightly modified due to the characteristic of(More)
  • Suhail Ahmad, Wajid Ali Hamdani, +9 authors Luc De Ghein
  • 2015
Over the last two decades, we have witnessed a rapid deployment of real-time applications on the Internet and many research works focus on Quality of Service (QoS), in particular using IPv4 (Internet Protocol Version 4). The inevitable exhaustion of the remaining IPv4 address pool has become progressively evident and as a result the evolution of Internet(More)
  • 1