International Journal of Computer Applications, 2013
Hybrid medium access control (MAC) design in Wireless Sensor Network (WSN) brings a new research ... more Hybrid medium access control (MAC) design in Wireless Sensor Network (WSN) brings a new research challenge nowadays. Hybrid MAC gives significant improvement in network performance especially in terms of energy efficiency and reliability of the network. Some of the data are sensitive to loss in the medium such as video data and data for emergency application. In MAC protocol, a contention access method which is Carrier Sense Multiple Access (CSMA) encounters collision problem when the number of nodes in the network increases. Meanwhile, the issue of slotted access which is Time Division Multiple Access (TDMA) is a strict synchronization problem. To avoid the weakness of both access methods, a hybrid MAC layer is proposed with unsynchronized TDMA, which is a token approach that calls the HMAC-TA. Token approach will be used in this protocol to avoid synchronization problems that can degrade network performance in TDMA protocol. The performance analysis of HMAC-TA shows 48% significan...
Nowadays, with the rapid use of Internet, the student becomes easy to copy information with just ... more Nowadays, with the rapid use of Internet, the student becomes easy to copy information with just click over the website. The opportunity to make a copy of someone else’s ideas or code without any citation of the original owner is known as plagiarism. Phenomena of plagiarism has become a serious issue among students where students are commit to copy information in class, whether it is plain text or source code. However, the plagiarism can be accidentally, especially for the source code. In a programming class, students study similar material of textbook and attended to the same class. Thus, it is hard to detect and determine the plagiarisms that occur among students. Therefore, plagiarism detection play an important roles in detecting any copy of information including source code. In this paper, the Programming Similarity Checking System has been proposed which is a source code plagiarism detection system in helping Information Technology’s (IT) lecturer for identifying plagiarism be...
2021 IEEE International Conference on Automatic Control & Intelligent Systems (I2CACIS)
Skim Pinjaman Buku Teks (SPBT) is a textbook loan program for elementary and secondary schools in... more Skim Pinjaman Buku Teks (SPBT) is a textbook loan program for elementary and secondary schools in Malaysia. This program is an initiative system by the Malaysia Ministry of Education to help students in the school by providing them with textbooks for their learning purpose. The current SPBT system is handled by storing all the records into a book or a file that can cause data missing, data redundant and incorrect data stored in the system. This project presents a new system for the textbook loan system known as Smart Skim Pinjaman Buku Teks (SBPT) School Operation system (SSSOS). This system upgrades the conventional method that manually records the loan information to a systematic approach using a web-based management system. The rapid application development (RAD) cycle is used as a methodology to develop the SSSOS system. The proposed system can efficiently handle borrowing and returning processes and reduce the textbook loan process period. This system also provides a complete report related to the textbook, such as the current status of a book and the previous information of the borrower. The proposed system can be used to enhance the conventional SPBT system in handling the textbook loan program. The system has been tested in Sekolah Kebangsaan Gambang, Pahang, where an SPBT coordinator acts as a client for the system.
2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM)
Nowadays, the Wireless Sensor Network (WSN) technology is extensively used in a large variety of ... more Nowadays, the Wireless Sensor Network (WSN) technology is extensively used in a large variety of applications. WSN has engaged humans and computers in many applications such as health monitoring and security. IEEE 802.15.4 wireless standard is the current demand on WSN which is used to transmit video or real-time data at low data rates. Reliable data transmission for video applications is a critical issue in low data rate transmissions due to the high collision from conventional protocol, which is Carrier Sense Multiple Access (CSMA). Therefore, a MAC layer with token approach protocol called MAC-TA protocol is proposed to solve this issue. In this protocol, the only node that holds the token can transmit the data. If other nodes intent to do the transmission, they have to wait for the token before sending the data. Token Holding Time (THT) is a duration time set at the node that holds the token, and the token is pass to the next node when the THT is finished. This paper is focusing on the development of the MAC-TA protocol onto test-bed TelG motes. Three types of MPEG-4 video samples have been tested which are Akiyo, Foreman, and Mobile both in Quarter Common Intermediate Format (QCIF) and Common Intermediate Format (CIF) format. The proposed protocol is compared with the existing CSMA protocol in IEEE 802.15.4 standard. The experimental results present that the MAC-TA protocol has improved the packet delivery ratio by 70%. Moreover, the results prove that MAC-TA provides good reliability of multimedia data and makes it possible to send over IEEE 802.15.4 environment.
Network coding is a technique known to efficiently utilize the bandwidth by exploiting the broadc... more Network coding is a technique known to efficiently utilize the bandwidth by exploiting the broadcast nature of the wireless medium. Network coding reduces the number of retransmissions by allowing the relay not only to forward the packets, but to do some logic operation. However, considering the randomness and the asymmetric nature of the traffic in the wireless medium, it is usually very challenging for the relay to predict when the next packet is coming, thus the main question for the relay when receives a packet is whether to hold the packet in order to obtain a network coding opportunity or to rebroadcast the packet directly and eliminate the delay. In this paper, we address this challenge by introducing two schemes; Bandwidth Consideration Scheme (BCS) which considers pure network coding to achieve the maximum improvement in network throughput, and Time Limited Scheme (TLS), which uses the network coding but considers the imposed delay. The results show that, BCS can lead to up...
Data transportation over resources constraint and noisy channel of wireless sensor network (WSN) ... more Data transportation over resources constraint and noisy channel of wireless sensor network (WSN) is very challenging in term of guaranteeing the data survival along the transmission. However, with the convergence of different research areas such as routing, source and channel coding techniques, the WSN technology has successfully been tremendously developed. This paper proposes an on-the-fly data recovery (ODR) scheme using network coding in order to enhance the robustness of the network against packet loss. Along with the ODR scheme, the packet loss formulation is presented while a network model for a network coding designed is also introduced namely for erasure channel. The data generated by the sources are transferred to the destination through relay nodes via three transmission paths. In ODR process, the lost packet is recovered by a relay node by listening to the transmission of two adjacent nodes and performing the XOR operation on the listened packets. We provide the analytic...
The need for reliable data delivery at the transport layer for video transmission over IEEE 802.1... more The need for reliable data delivery at the transport layer for video transmission over IEEE 802.15.4 Wireless Sensor Networks (WSNs) has attracted great attention from the research community due to the applicability of multimedia transmission for many applications. The IEEE 802.15.4 standard is designed to transmit data within a network at a low rate and a short distance. However, the characteristics of WSNs such as dense deployment, limited processing ability, memory, and power supply provide unique challenges to transport protocol designers. Additionally, multimedia applications add further challenges such as requiring large bandwidth, large memory, and high data rate. This chapter discusses the challenges and evaluates the feasibility of transmitting data over an IEEE 802.15.4 network for different transport protocols. The analysis result highlights the comparison of standard transport protocols, namely User Datagram Protocol (UDP), Transport Control Protocol (TCP), and Stream Control Transmission Protocol (SCTP). The performance metrics are analyzed in terms of the packet delivery ratio, energy consumption, and end-to-end delay. Based on the study and analysis that has been done, the standard transport protocol can be modified and improved for multimedia data transmission in WSN. As a conclusion, SCTP shows significant improvement up to 18.635% and 40.19% for delivery ratio compared to TCP and UDP, respectively.
Reliable data transport is one of the most important requirements in wireless sensor network wher... more Reliable data transport is one of the most important requirements in wireless sensor network where different applications have different reliability requirements. Additionally, the characteristic of wireless sensor network, especially dense deployment, limited processing ability, memory and power supply, provide unique design challenges at transport protocol. Therefore, assuring reliable data delivery between sensor nodes and the sink in Wireless Sensor Networks (WSN) is a challenging task. A reliable protocol in wireless sensor network is a protocol that allows data transfer reliably from source to destination with reasonable packet loss. The current issues of transport protocol are how to implement reliable data transport, congestion control and energy efficient. Most of the existing transport protocols only provide reliable data transport or congestion control. However, there are several protocols that provide both functions of the transport protocol. To overcome these issues, the transport layer protocols that provide both reliable data delivery and congestion control should be taken under consideration. Besides that, transport layer algorithm also allow maximum network lifetime due to limited operating lifetime of sensor node. Thus, to prolong the lifetime of wireless sensor network, an efficient transport protocol need to support reliable message delivery and provide congestion control in most energy efficient. This paper focuses on the existing transport protocols and the future protocol that provide the entire requirement of transport protocol.
The issues of green technology nowadays give an inspiration to the researcher to make all the fut... more The issues of green technology nowadays give an inspiration to the researcher to make all the future design to be energy efficient. Medium Access Control (MAC) layer is the most effective layer to provide energy efficient due to its ability to control the physical radio directly. One of the important applications in the future is a video transmission that can be transmitted with low-cost and low power consumption. MPEG-4 is one of the international standards for moving video. MPEG-4 provide better compression and primarily design at low bit rate communication. In order to achieve good quality for video application, the design at MAC layer must be strong. Therefore, to increase the performance of the MPEG-4 in IEEE 802.15.4, in this paper we propose a cross layer design between MAC layer and Application layer. A priority queue will be implemented at MAC scheduling depends on the level of frame important in MPEG-4 format frame. A distributed Time division Multiple Access (TDMA) will be used for MAC protocol to provide reliable data transmission for high priority frame.
Underwater wireless sensor networks (UWSN) consist of a certain number of sensors that interact t... more Underwater wireless sensor networks (UWSN) consist of a certain number of sensors that interact to send the sensed data to the sink node and perform collaborative task. Most UWSN choose acoustic as a communication medium for wireless transmission. However, electromagnetic waves are also offer a great merit in special underwater environment such as shallow water. UWSN is significantly different from terrestrial sensor networks in many aspects such as mobility of sensor nodes due to water current, propagation delay and propagation loss. These distinctions feature of underwater sensor network pose many new challenges for delivering information from sensor nodes to sink node effectively in UWSN. To achieve reliable data transfer in underwater sensor network scenarios, a new event MAC protocol need to be developed to provide energy efficient and reliable upstream data transfer.
Page 1. Proposed Network Coding for Wireless Multimedia Sensor Network (WMSN) AA Shahidan, N. Fis... more Page 1. Proposed Network Coding for Wireless Multimedia Sensor Network (WMSN) AA Shahidan, N. Fisal, Nor-Syahidatul N. Ismail and Farizah Yunus Abstract Wireless sensor network has caused a lot of interest in many ...
International Journal of Computer Applications, 2013
Hybrid medium access control (MAC) design in Wireless Sensor Network (WSN) brings a new research ... more Hybrid medium access control (MAC) design in Wireless Sensor Network (WSN) brings a new research challenge nowadays. Hybrid MAC gives significant improvement in network performance especially in terms of energy efficiency and reliability of the network. Some of the data are sensitive to loss in the medium such as video data and data for emergency application. In MAC protocol, a contention access method which is Carrier Sense Multiple Access (CSMA) encounters collision problem when the number of nodes in the network increases. Meanwhile, the issue of slotted access which is Time Division Multiple Access (TDMA) is a strict synchronization problem. To avoid the weakness of both access methods, a hybrid MAC layer is proposed with unsynchronized TDMA, which is a token approach that calls the HMAC-TA. Token approach will be used in this protocol to avoid synchronization problems that can degrade network performance in TDMA protocol. The performance analysis of HMAC-TA shows 48% significan...
Nowadays, with the rapid use of Internet, the student becomes easy to copy information with just ... more Nowadays, with the rapid use of Internet, the student becomes easy to copy information with just click over the website. The opportunity to make a copy of someone else’s ideas or code without any citation of the original owner is known as plagiarism. Phenomena of plagiarism has become a serious issue among students where students are commit to copy information in class, whether it is plain text or source code. However, the plagiarism can be accidentally, especially for the source code. In a programming class, students study similar material of textbook and attended to the same class. Thus, it is hard to detect and determine the plagiarisms that occur among students. Therefore, plagiarism detection play an important roles in detecting any copy of information including source code. In this paper, the Programming Similarity Checking System has been proposed which is a source code plagiarism detection system in helping Information Technology’s (IT) lecturer for identifying plagiarism be...
2021 IEEE International Conference on Automatic Control & Intelligent Systems (I2CACIS)
Skim Pinjaman Buku Teks (SPBT) is a textbook loan program for elementary and secondary schools in... more Skim Pinjaman Buku Teks (SPBT) is a textbook loan program for elementary and secondary schools in Malaysia. This program is an initiative system by the Malaysia Ministry of Education to help students in the school by providing them with textbooks for their learning purpose. The current SPBT system is handled by storing all the records into a book or a file that can cause data missing, data redundant and incorrect data stored in the system. This project presents a new system for the textbook loan system known as Smart Skim Pinjaman Buku Teks (SBPT) School Operation system (SSSOS). This system upgrades the conventional method that manually records the loan information to a systematic approach using a web-based management system. The rapid application development (RAD) cycle is used as a methodology to develop the SSSOS system. The proposed system can efficiently handle borrowing and returning processes and reduce the textbook loan process period. This system also provides a complete report related to the textbook, such as the current status of a book and the previous information of the borrower. The proposed system can be used to enhance the conventional SPBT system in handling the textbook loan program. The system has been tested in Sekolah Kebangsaan Gambang, Pahang, where an SPBT coordinator acts as a client for the system.
2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM)
Nowadays, the Wireless Sensor Network (WSN) technology is extensively used in a large variety of ... more Nowadays, the Wireless Sensor Network (WSN) technology is extensively used in a large variety of applications. WSN has engaged humans and computers in many applications such as health monitoring and security. IEEE 802.15.4 wireless standard is the current demand on WSN which is used to transmit video or real-time data at low data rates. Reliable data transmission for video applications is a critical issue in low data rate transmissions due to the high collision from conventional protocol, which is Carrier Sense Multiple Access (CSMA). Therefore, a MAC layer with token approach protocol called MAC-TA protocol is proposed to solve this issue. In this protocol, the only node that holds the token can transmit the data. If other nodes intent to do the transmission, they have to wait for the token before sending the data. Token Holding Time (THT) is a duration time set at the node that holds the token, and the token is pass to the next node when the THT is finished. This paper is focusing on the development of the MAC-TA protocol onto test-bed TelG motes. Three types of MPEG-4 video samples have been tested which are Akiyo, Foreman, and Mobile both in Quarter Common Intermediate Format (QCIF) and Common Intermediate Format (CIF) format. The proposed protocol is compared with the existing CSMA protocol in IEEE 802.15.4 standard. The experimental results present that the MAC-TA protocol has improved the packet delivery ratio by 70%. Moreover, the results prove that MAC-TA provides good reliability of multimedia data and makes it possible to send over IEEE 802.15.4 environment.
Network coding is a technique known to efficiently utilize the bandwidth by exploiting the broadc... more Network coding is a technique known to efficiently utilize the bandwidth by exploiting the broadcast nature of the wireless medium. Network coding reduces the number of retransmissions by allowing the relay not only to forward the packets, but to do some logic operation. However, considering the randomness and the asymmetric nature of the traffic in the wireless medium, it is usually very challenging for the relay to predict when the next packet is coming, thus the main question for the relay when receives a packet is whether to hold the packet in order to obtain a network coding opportunity or to rebroadcast the packet directly and eliminate the delay. In this paper, we address this challenge by introducing two schemes; Bandwidth Consideration Scheme (BCS) which considers pure network coding to achieve the maximum improvement in network throughput, and Time Limited Scheme (TLS), which uses the network coding but considers the imposed delay. The results show that, BCS can lead to up...
Data transportation over resources constraint and noisy channel of wireless sensor network (WSN) ... more Data transportation over resources constraint and noisy channel of wireless sensor network (WSN) is very challenging in term of guaranteeing the data survival along the transmission. However, with the convergence of different research areas such as routing, source and channel coding techniques, the WSN technology has successfully been tremendously developed. This paper proposes an on-the-fly data recovery (ODR) scheme using network coding in order to enhance the robustness of the network against packet loss. Along with the ODR scheme, the packet loss formulation is presented while a network model for a network coding designed is also introduced namely for erasure channel. The data generated by the sources are transferred to the destination through relay nodes via three transmission paths. In ODR process, the lost packet is recovered by a relay node by listening to the transmission of two adjacent nodes and performing the XOR operation on the listened packets. We provide the analytic...
The need for reliable data delivery at the transport layer for video transmission over IEEE 802.1... more The need for reliable data delivery at the transport layer for video transmission over IEEE 802.15.4 Wireless Sensor Networks (WSNs) has attracted great attention from the research community due to the applicability of multimedia transmission for many applications. The IEEE 802.15.4 standard is designed to transmit data within a network at a low rate and a short distance. However, the characteristics of WSNs such as dense deployment, limited processing ability, memory, and power supply provide unique challenges to transport protocol designers. Additionally, multimedia applications add further challenges such as requiring large bandwidth, large memory, and high data rate. This chapter discusses the challenges and evaluates the feasibility of transmitting data over an IEEE 802.15.4 network for different transport protocols. The analysis result highlights the comparison of standard transport protocols, namely User Datagram Protocol (UDP), Transport Control Protocol (TCP), and Stream Control Transmission Protocol (SCTP). The performance metrics are analyzed in terms of the packet delivery ratio, energy consumption, and end-to-end delay. Based on the study and analysis that has been done, the standard transport protocol can be modified and improved for multimedia data transmission in WSN. As a conclusion, SCTP shows significant improvement up to 18.635% and 40.19% for delivery ratio compared to TCP and UDP, respectively.
Reliable data transport is one of the most important requirements in wireless sensor network wher... more Reliable data transport is one of the most important requirements in wireless sensor network where different applications have different reliability requirements. Additionally, the characteristic of wireless sensor network, especially dense deployment, limited processing ability, memory and power supply, provide unique design challenges at transport protocol. Therefore, assuring reliable data delivery between sensor nodes and the sink in Wireless Sensor Networks (WSN) is a challenging task. A reliable protocol in wireless sensor network is a protocol that allows data transfer reliably from source to destination with reasonable packet loss. The current issues of transport protocol are how to implement reliable data transport, congestion control and energy efficient. Most of the existing transport protocols only provide reliable data transport or congestion control. However, there are several protocols that provide both functions of the transport protocol. To overcome these issues, the transport layer protocols that provide both reliable data delivery and congestion control should be taken under consideration. Besides that, transport layer algorithm also allow maximum network lifetime due to limited operating lifetime of sensor node. Thus, to prolong the lifetime of wireless sensor network, an efficient transport protocol need to support reliable message delivery and provide congestion control in most energy efficient. This paper focuses on the existing transport protocols and the future protocol that provide the entire requirement of transport protocol.
The issues of green technology nowadays give an inspiration to the researcher to make all the fut... more The issues of green technology nowadays give an inspiration to the researcher to make all the future design to be energy efficient. Medium Access Control (MAC) layer is the most effective layer to provide energy efficient due to its ability to control the physical radio directly. One of the important applications in the future is a video transmission that can be transmitted with low-cost and low power consumption. MPEG-4 is one of the international standards for moving video. MPEG-4 provide better compression and primarily design at low bit rate communication. In order to achieve good quality for video application, the design at MAC layer must be strong. Therefore, to increase the performance of the MPEG-4 in IEEE 802.15.4, in this paper we propose a cross layer design between MAC layer and Application layer. A priority queue will be implemented at MAC scheduling depends on the level of frame important in MPEG-4 format frame. A distributed Time division Multiple Access (TDMA) will be used for MAC protocol to provide reliable data transmission for high priority frame.
Underwater wireless sensor networks (UWSN) consist of a certain number of sensors that interact t... more Underwater wireless sensor networks (UWSN) consist of a certain number of sensors that interact to send the sensed data to the sink node and perform collaborative task. Most UWSN choose acoustic as a communication medium for wireless transmission. However, electromagnetic waves are also offer a great merit in special underwater environment such as shallow water. UWSN is significantly different from terrestrial sensor networks in many aspects such as mobility of sensor nodes due to water current, propagation delay and propagation loss. These distinctions feature of underwater sensor network pose many new challenges for delivering information from sensor nodes to sink node effectively in UWSN. To achieve reliable data transfer in underwater sensor network scenarios, a new event MAC protocol need to be developed to provide energy efficient and reliable upstream data transfer.
Page 1. Proposed Network Coding for Wireless Multimedia Sensor Network (WMSN) AA Shahidan, N. Fis... more Page 1. Proposed Network Coding for Wireless Multimedia Sensor Network (WMSN) AA Shahidan, N. Fisal, Nor-Syahidatul N. Ismail and Farizah Yunus Abstract Wireless sensor network has caused a lot of interest in many ...
Uploads
Papers by FARIZAH YUNUS