Syed Umar
KL University

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Information Base Security Threats and Challenges' in Information Forensic: A Survey Dilip Kumar Barai; G. Sridevi; Syed Umar; MSR Prasad
Indonesian Journal of Electrical Engineering and Computer Science Vol 1, No 2: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v1.i2.pp406-410

Abstract

Generally to store the information or Information of any organization then they will be maintain Information base to manage that Information base we use some management techniques like Information base management systems so called DBMS. In this paper we introduced Relational DBMS which is a collection of applications that can store various information which can be easily retrieve, manipulate and storage of Information. So in this we are concentrating on forensic analysis and Information base of it which is very sensitive Information. In this paper we are analyzing and surveying of forensic Information based using various methodologies with different tools and algorithms for investigations, through which we got what are the challenges are facing in the forensic Information bases since the years.
Notification of Data Congestion Intimation [NDCI] for IEEE 802.11 Adhoc Network with Power Save Mode Azeem Mohammed Abdul; Syed Umar
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 2: February 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i2.pp317-320

Abstract

IEEE 802.11-power save mode (PSM) independent basic service set (IBSS) Save, the time is divided into intervals of the signals. At the beginning of each interval signal and power saving alarm periodically all open windows (vocals). The station will be in competition with the rest of the frame window frame sent voice data leakage range. Element depends frame transmission IEEE CSMA / CA as defined in 802.11 DCF. A chance of transmit voice frames type of collision energy IBSS success. This article gives an analysis model with a chance of success output transmission window fixed size element. The results of the simulation analysis of the accuracy of the analysis.