MEDIU is an independent, non-profit educational institution, located in Malaysia. The university was established in 2006, founded on Islamic principles and values. MEDIU is licensed by the Malaysian Ministry of Higher Education and its programs are accredited by the Malaysian Qualification Agency . The university is managed by Rector Prof. Dr. Mohammad Khalifa Al-Tamimi. Wikipedia.
PubMed | Jabal Amman, Al-Madinah International University, Mu'tah University and Public Health England
Type: | Journal: Journal of infection and public health | Year: 2016
Little is known of carbapenemase producing Klebsiella pneumoniae (CPK) in Jordan. This study aimed to determine the prevalence of CPK in a major hospital in Amman, Jordan in 2012-2013 and to characterize the isolates and detect the types of carbapenemase(s) they produced. For the 296 isolates investigated, species identification and antimicrobial susceptibilities were determined (Vitek II, bioMrieux). Isolates with decreased ertapenem susceptibility were tested for carbapenemase production using the Modified Hodge Test. Isolates with a carbapenemase-positive phenotype were characterized further via multiplex PCRs for extended-spectrum -lactamase and carbapenemase genes and by Pulsed Field Gel Electrophoresis (PFGE). Seven of 296 K. pneumoniae isolated in 2012-2013 (2.4%) were carbapenemase producers, five produced class D carbapenemases (OXA-48-like) and two produced a NDM metallo-beta-lactamase. All seven isolates also encoded CTX-M enzymes; CTX-M-1-like enzymes were detected in five isolates (two co-producing NDM enzymes and three co-producing OXA-48-like enzymes), CTX-M-9 was found in the two remaining OXA-48-like producers. PFGE revealed five genetically distinct types amongst the seven carbapenemase producing K. pneumoniae, with two pairs of identical isolates associated with patients treated on the same wards. The emergence of OXA-48-like and NDM carbapenemases associated with multi-drug resistant (MDR) isolates in Jordan is concerning. The strict implementation of infection control practices will help to disrupt the spread of MDR carbapenemase producers in Jordanian hospitals.
Etengu R.,Multimedia University |
Abbou F.M.,Alcatel - Lucent |
Wong H.Y.,Multimedia University |
Abid A.,Al-Madinah International University |
And 2 more authors.
Journal of Optical Communications | Year: 2011
The performance of single photon pulsed polarization based BB84 and B92 platforms against individual attacks for free space quantum optical communication links between a ground station and a satellite in the low earth orbit is compared. The comparison is attained by evaluating the quantum bit error rate and secure communication bit rate on secure optical link loss and the sensitivity of different parameters. Precisely, realistic experimental parameters are used and the obtained results are compared with those of other papers. Quantum bit error rates as low as 3.5% have been regularly obtained. Moreover, with repetition rate of 10 MHz at the low earth orbit standard orbital altitude of 100 km and at zenith angle of 60 degrees, secure communication bit rates of ~ 280 kHz and ~ 70 kHz were received for the BB84 and B92, respectively. The obtained results show that the BB84 protocol exhibits better performance than B92 in the distribution of the secure communication key over long distance. Overall, these results reveal that it is possible to obtain secure key exchange in the low earth orbit, an idea which can be extended to other long distance laser links such as geostationary orbit. Copyright © 2011 De Gruyter.
Mat Kiah M.L.,University of Malaya |
Zaidan B.B.,Multimedia University |
Zaidan B.B.,Sunway University |
Zaidan B.B.,Al-Madinah International University |
And 5 more authors.
International Journal of Physical Sciences | Year: 2011
With the increasing usage of digital multimedia, the protection of intellectual property rights problem has become a very important issue. Everyday, thousands of multimedia files are being uploaded and downloaded. Therefore, multimedia copyrights become an important issue to protect the intellectual property for the authors of these files. In this paper, the domains of digital audio steganography, the properties of H.A.S, the audio and the digital representation transmission environments, and its software metric, are discussed. The main purpose of this paper is to provide a proper background on the usage of audio file for the purpose of implementing new approaches and techniques in digital watermarking and steganography. ©2011 Academic Journals.
Reza A.G.,Multimedia University |
Chin T.S.,Multimedia University |
Abbou F.M.,Al-Madinah International University
2nd International Conference on Computer Research and Development, ICCRD 2010 | Year: 2010
Packet contention is a major issue in optical packet switching network and it is not a trivial task to resolve contention due to lack of optical RAM technology. In order to resolve contention optical buffering approach is used which is usually implemented using fiber delay line (FDL). Most of the existing optical buffering schemes are output-based which require huge number of FDLs as well as larger switch size that incur extra implementation cost. In this paper, shared FDL buffering approach is considered to reduce implementation cost. However, shared buffering scheme requires an effective scheduling algorithm to utilize the buffers efficiently. This paper proposes a new algorithm called selective minimum delay value (SMDV) to resolve contention of an optical packet switch. In SMDV, contended packets are assigned to fiber delay line (FDL) in such a way that no two contended packets release from FDLs destined for same output port at the same time. The performance of the proposed scheme is analyzed based on normalized throughput and delay under different traffic load. Simulation result shows that proposed scheme can achieve a normalized throughput of ∼93.7% even at heavy traffic load of 0.9 for a 32×32 switch using 32 FDLs of different length. © 2010 IEEE.
Reza A.G.,Multimedia University |
Chin T.S.,Multimedia University |
Abbou F.M.,Al-Madinah International University
2010 International Conference on Photonics, ICP2010 | Year: 2010
This paper proposes a hybrid buffering architecture using feed-forward and feedback shared FDLs to resolve packet contention resolution of an optical packet switch. Feed-forward FDLs are used as primary buffer and feedback FDLs are implemented as supplementary buffer. The proposed switch can avoid time slot overlapping which enables to use FDL resources in a highly efficient manner. It is found that the proposed switch achieves satisfactory performance at the price of a reasonable amount of FDLs. Simulation result shows that proposed hybrid buffering switch achieves packet loss rate between 10-1 and 10-2 at heavy traffic load (ρ = 0.9) for a 32×32 switch using different FDL length. © 2010 IEEE.
Patel A.,National University of Malaysia |
Patel A.,Kingston University |
Seyfi A.,National University of Malaysia |
Tew Y.,National University of Malaysia |
And 2 more authors.
Library Hi Tech News | Year: 2011
Purpose: Grid computing, cloud computing (CC), utility computing and software as a service are emerging technologies predicted to result in massive consolidation as meta-level computing services of everything beneath one umbrella in the future. The purpose of this study is to foster the understanding and differentiation, by using the three aforementioned types of computing technologies and software, as a service by both public and private libraries to meet their expectations and strategic objectives. Design/methodology/approach: The approach in this study is a review based on comparing the four computing technologies with a brief analysis for researching and designing the mind map of a new meta-level computing service approach, taking into consideration the need for new economic tariff and pricing models as well as service-level agreements. Findings: Since it is anticipated that there will be likely potential consolidation and integration of computing services, a study of these four most advanced computing technologies and their methodologies is presented through their definition, characteristics, functionalities, advantages and disadvantages. This is a well-timed technological advancement for libraries. Practical implications: It appears that the future of library services will become even more integrated, running over CC platforms based on usage rather than just storage of data. Social implications: Libraries will become an open useful resource to all and sundry in a global context, and that will have huge societal benefits never imagined before. Originality/value: Concisely addresses the strategies, functional characteristics, advantages and disadvantages by comparing these technologies from several service aspects with a view to assisting in creating the next generation outer space computing. © Emerald Group Publishing Limited.
Liban A.,Al-Madinah International University |
Hilles S.M.S.,Al-Madinah International University
Proceedings - 2014 5th IEEE Control and System Graduate Research Colloquium, ICSGRC 2014 | Year: 2014
Securing the database against frequent attacks is a big concern; attackers usually intend to snitch private information and damage databases. These days, web applications are widely used as a meddler between computer users. Web applications are also used mostly by e-commerce companies, and these types of applications need a secured database in order to keep sensitive and confidential information. Since Blind SQL injection attacks occurred as a new way of accessing database through the application rather than directly through the database itself, they have become popular among hackers and malicious users. Many detection tools are developed to handle this problem but they have limitations. This study enhances SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks (MYSQL Injector) using time-based attack with Inference Binary Search Algorithm. It covers four types of blind SQL injection attacks, true/false, true error, time-based and order by attacks. This tool will automate the process of the blind SQL injection attacks to check the blind SQL injection vulnerability in the PHP-based websites that use MySQL databases. Forty four vulnerable websites and thirty non vulnerable websites were tested to ensure the accuracy of the tool. The result shows 93% accuracy for detecting the vulnerability while MySQL injector performs 84%. © 2014 IEEE.
Yafooz W.M.S.,Advanced Analytics Engineering Center |
Yafooz W.M.S.,University Technology of MARA |
Abidin S.Z.Z.,Advanced Analytics Engineering Center |
Abidin S.Z.Z.,University Technology of MARA |
And 2 more authors.
Communications in Computer and Information Science | Year: 2016
Big data is a popular term used to describe a massive volume of data, which is a key component of the current information age. Such data is complex and difficult to understand, and therefore, may be not useful for users in that state. News extraction, aggregation, clustering, news topic detection and tracking, and social network analysis are some of the several attempts that have been made to manage the massive data in social media. Current visualization tools are difficult to adapt to the constant growth of big data, specifically in online news articles. Therefore, this paper proposes Interactive Big Data Visualization Model Based on Hot Issues (IBDVM). IBDVM can be used to visualize hot issues in daily news articles. It is based on textual data clusters in textual databases that improve the performance, accuracy, and quality of big data visualization. This model is useful for online news reader, news agencies, editors, and researchers who involve in textual documents domains. © Springer Nature Singapore Pte Ltd. 2016.
Moussa A.N.,University of Technology Malaysia |
Ithnin N.B.,University of Technology Malaysia |
Miaikil O.A.M.,Al-Madinah International University
Proceedings - 2014 IEEE Conference on System, Process and Control, ICSPC 2014 | Year: 2014
Cloud computing provides to the consumers basic computing resources that range from storage and computing power to sophisticated applications. When digital forensics is needed for suspected cases involving cloud computing, the provider is responsible for collecting the digital evidence. Limitations of this approach include lack of efficient incident response, and that the consumers may have a little or no choice but to accept electronic evidences made available by the cloud provider. This research investigates whether it is possible to perform consumer-side digital forensics where a consumer independently collects all digital evidences required for a suspected case from Infrastructure as a Service resources (IaaS). In particular, the research contributes to a digital forensics readiness framework that shows how digital evidence collection can be made strongly consumer-centric, so that all the electronic evidences that digital forensic investigation requires for suspected cases can be provided independently by the IaaS consumers. © 2014 IEEE.
Hilles S.M.S.,Al-Madinah International University |
Maidanuk V.P.,Vinnytsia National Technical University
ARPN Journal of Engineering and Applied Sciences | Year: 2014
This paper present image coding which is gained many researchers attention in order to improve the quality of image after the compression process. Since this is expended most computing resources and research which is related not only to search for a mathematical transformation, but also to study the characteristics of visual perception of the image features and fail-safe transmission of images via communication channels. There are many methods of image coding with neural networks of 2D SOFM kohonen map have been suggested and investigated. The coding schemes are proposed methods vector quantization as the original image, and the spatial frequency image component derived from the adaptive to the contours of the two-dimensional analysis and synthesis. The calculation of the computational cost in compression based on Kohonen maps. The methods are characterized by a high level of adaptation due to the introduction of educational stage that provides for the increase of multiplication ratio and high quality of image restarting after coding. The modified method of image multiplexing based on characteristic feature of the given method is vector digitizing of image components. This paper considers the coding problem of photo realistic images, presented in a digital form. The characteristic feature of the method is the application of pair exchange, this increases processing speed and sorting of data arrays. However the result of proposed method is shown the image quality after compression processor. Using this approach the differences or lost pixels between the image after and before compression processer are considered. The propose method may useful for image representation and image coding researcher and such related field. © 2006-2014 Asian Research Publishing Network (ARPN).