Syed Farid Syed Adnan

Learn More
“Internet of Things” (IOT) has become the everyday buzz words in recent years. As part and parcel of the Smart environment where human beings and things interact intelligently, trust and mobility becomes the basic prerequisites. However, to unify trust and mobility, a security protocol must be used for information exchanges among human and(More)
— Advances in smart devices has witnessed major developments in many mobile applications such as Android applications. These smart devices normally interconnect to the internet using wireless technology and applications using the TFTP protocol among these wireless devices are becoming commonplace. In this work, we present an enhanced lightweight security(More)
This paper presents an application of the Radial Basis Function Neural Network (RBFNN)-based identification of an essential oil extraction using Non-Linear Autoregressive Model with Exogenous Inputs (NARX) model. The dataset consisted of a Pseudo-Random Binary Sequence (PRBS) inputs as the control signal, and outputs depicting temperatures inside the(More)
This paper presents a database system of the rubber tree leaf diseases which compiled into a Personal Home Page (PHP) script and using Structured Query Language (MySQL). In this work, there are three selected diseases that can be identified using this database system which are Corynespora Leaf Spot, Bird's Eye Spot and Collectrotichum Leaf Disease.(More)
Advances in embedded RF devices and sensor nodes have witnessed major expansion of end user services such as Internet of Things (IoT) and Cloud Computing. These prospective smart embedded and sensor devices normally interconnect to the internet using wireless technology (e.g. radio frequency, Wi-Fi) and run on top of CoAP and TFTP protocols. In this paper,(More)
Internet of Things (IoT) is an interconnection of physical objects to the Internet which enables data exchange. When things are connected to the internet it becomes an open path for adversaries to unlawfully gain data over the internet leading to unaccountable security issues pertaining to data integrity and privacy. The need to secure the data gathered(More)
Data compression technique such as Huffman coding, arithmetic coding, Lempel-Ziv-Welch (LZW) method and others has been playing a vital role in the area of data transmission for reducing time usage during retrieving and transmitting data. However, this technique does not prevent data which contain secret information from being tampered or hacked by(More)
Mobile communication systems of today provide increased availability, minituarization and enhanced data rates. This emergence is expected to enhance the deployment of mobile systems in the health services. This paper intends to explain the medical mobile to web service application developed using the Java Micro Edition (J2ME) application platform. It(More)
Computer cluster is a collection of multiple computers connected together so that it can be viewed and perform as a single computer using an interconnected device. Graphical Processing Unit is a specialized hardware used to accelerate the creation of an image by manipulating and altering the memory to help CPU to produce an image. Previously, only CPU is(More)