Loading [MathJax]/extensions/MathMenu.js
Zahereel Ishwar Abdul Khalib - IEEE Xplore Author Profile

Showing 1-14 of 14 results

Filter Results

Show

Results

Face and palmprint recognition system are the most popular biometric system. In certain situations, unimodal systems do not enough to fulfill the security system accuracy and performance. Multimodal is the proper way for providing high performance, security, and accuracy. The appropriate fusion technique also improves the accuracy of recognition system. This paper proposes a development of score l...Show More
Local binary pattern (LBP) features have been used widely in texture extraction because of its simplicity and high accuracy. In this paper, LBP as feature extraction is proposed with a modification of Huffman rule to enhance the feature extraction by handling the losing texture information from LBP in low resolution image. The wide dimension of feature is reduced by using the principal component a...Show More
Adaptive media playout (AMP) control, common receiver-based technique, is proposed to adjust the playout rate based on the bit-rate fluctuation of network channels to avoid playout interruptions. Most AMP techniques found in the literature adjust playout frame rate based on the buffer fullness or the buffer fullness variation. However, choosing an appropriate threshold to adjust a playout frame ra...Show More
Hyper-threading (HT) technology allows one thread to execute its task while another thread is stalled waiting for shared resource or other operations to complete. Thus, this reduces the idle time of a processor. If HT is enabled, an operating system would see two logical cores per each physical core. This gives one physical core the ability to run two threads simultaneously. However, it does not n...Show More
Hard real time systems were often implemented with preemptive scheduling, which gives priority to the highest priority task. In this paper we present a new non-preemptive scheduling of jobs meant for soft real time application. Our ultimate aim is to increase the deadline meeting rate of the Earliest Deadline First (EDF) algorithm during overload condition while maintaining the optimum performance...Show More
Scheduling algorithms for soft real time application should focus on increasing Deadline Meeting Rate (DMTR) during overload. Here we propose an algorithm which is based on EDF which boost the performance of soft real time system during overload while maintaining optimum performance during normal load poses by EDF. This algorithm does not require overload detection as many other overload handling ...Show More
Increasing Deadline Meeting Rate (DMTR) during overload is a concern of Soft Real Time (SRT) Scheduling. Here we present our non-preemptive non-resource constraint scheduling model implemented on an open source discrete event simulator named OmNET. The model is simple, yet it fulfill the simulation purpose, which mimics execution of jobs schedule under non-preemptive and non-resource constraint sy...Show More
This paper describes the design and implementation of a web-based portable network traffic monitoring system (PNtMS) on an embedded Linux platform, based on single board computer (SBC). The functionality of the monitoring system constitutes processing of TCP/IP network traffic in respect of network protocol analysis and traffic monitoring. The structural breakdown of this system can be generically...Show More
The principal role of embedded software is the transformation of data and the interaction with the physical world stimulus. The main concern in developing embedded software for network application is the lack of published best practice software architecture for optimizing performance by means of reducing protocol processing overhead, memory usage, and power consumption. This paper presents the imp...Show More
This paper presents our effort and to realize possible usage on embedded Linux platform for Intrusion Detection (Port Scan). The approach was to develop software which performs port scan using half-open and udp technique. The software is then executed on a Linux based Single Board Computer (SBC) which runs TS-Linux 2.4.23 kernel developed by Technology System (TS). It is interesting enough to find...Show More
Embedded system is known for its limitation in terms of processing power, memory, and power consumption. Incorporating solution into an embedded system, which requires optimum usage of these limitation, is thus a challenge. The aim of this study is to see how Embedded Linux could cope with those limitations in producing reliable embeddded web-based traffic monitoring system. The approach to the st...Show More
The purpose of this paper is to realize possible usage on embedded Linux platform for intrusion detection (port scan detection). The approach was to develop the software which performs port scan using half-open and udp technique. The software is then executed on Linux based single board computer (SBC) where run TS-Linux 2.4.23 kernel. Results show that the embedded port scan detector (EPSD) unit m...Show More
Implemented with a low speed CPU, small memory footprint, low static memory storage and developed specifically for low power requirement, small embedded devices are significantly affected by processing time. By cutting down processing time needed to complete a certain task, not only power consumption could be reduced, but it could also lead to greater system performance without the need to redevel...Show More
One of the few challenges facing face recognition systems is real time processing. In order for a face recognition system to be viable for real world implementations, it needs to be fast enough to track and identify facial images and do on-the-fly one-to-many identification from a multitude of database images. This is time consuming since face recognition requires a complex process of pre-processi...Show More