Syed Farid Syed Adnan

Learn More
“Internet of Things” (IOT) has become the everyday buzz words in recent years. As part and parcel of the Smart environment where human beings and things interact intelligently, trust and mobility becomes the basic prerequisites. However, to unify trust and mobility, a security protocol must be used for information exchanges among human and(More)
Advances in smart devices has witnessed major developments in many mobile applications such as Android applications. These smart devices normally interconnect to the internet using wireless technology and applications using the TFTP protocol among these wireless devices are becoming commonplace. In this work, we present an enhanced lightweight security(More)
This paper presents an application of the Radial Basis Function Neural Network (RBFNN)-based identification of an essential oil extraction using Non-Linear Autoregressive Model with Exogenous Inputs (NARX) model. The dataset consisted of a Pseudo-Random Binary Sequence (PRBS) inputs as the control signal, and outputs depicting temperatures inside the(More)
Ease of use, cost-effective, faster and effective method to transfer information was the elements that exist in most of mobile phone nowadays. These elements might attain the need to gather information easily and affordably for the mobile phone application on health service. This paper intends to describe the implementation of the MIDlet application on(More)
Data compression technique such as Huffman coding, arithmetic coding, Lempel-Ziv-Welch (LZW) method and others has been playing a vital role in the area of data transmission for reducing time usage during retrieving and transmitting data. However, this technique does not prevent data which contain secret information from being tampered or hacked by(More)
Sensor nodes commonly rely on wireless transmission media such as radio frequency (RF) and typically run on top of CoAP and TFTP protocols which do not provide any security mechanisms. One method of securing sensor node communication over RF is to implement a lightweight encryption scheme. In this paper, a RF Simulator developed in our previous publication(More)
Advances in embedded RF devices and sensor nodes have witnessed major expansion of end user services such as Internet of Things (IoT) and Cloud Computing. These prospective smart embedded and sensor devices normally interconnect to the internet using wireless technology (e.g. radio frequency, Wi-Fi) and run on top of CoAP and TFTP protocols. In this paper,(More)
Internet of Things (IoT) is an interconnection of physical objects to the Internet which enables data exchange. When things are connected to the internet it becomes an open path for adversaries to unlawfully gain data over the internet leading to unaccountable security issues pertaining to data integrity and privacy. The need to secure the data gathered(More)
Mobile communication systems of today provide increased availability, minituarization and enhanced data rates. This emergence is expected to enhance the deployment of mobile systems in the health services. This paper intends to explain the medical mobile to web service application developed using the Java Micro Edition (J2ME) application platform. It(More)
This paper presents a database system of the rubber tree leaf diseases which compiled into a Personal Home Page (PHP) script and using Structured Query Language (MySQL). In this work, there are three selected diseases that can be identified using this database system which are Corynespora Leaf Spot, Bird's Eye Spot and Collectrotichum Leaf Disease.(More)