Browsing R. Badlishah Ahmad, Prof. Ir. Ts. Dr. by Title
Now showing items 120-139 of 147
-
Random diagonal codes for spectral amplitude coding optical CDMA systems using fiber Bragg-Grating
(Institute of Electrical and Electronics Engineering (IEEE), 2008-08-26)In this paper we study the use of a new code called Random Diagonal (RD) code for Spectral Amplitude Coding (SAC) optical Code Division Multiple Access (CDMA) networks, using Fiber Bragg-Grating (FBG), FBG consists of a ... -
Realization of wavelength-time modified double weigs-button-field
(Trans Tech Publications, 2014)Explosive growth of bandwidth demand together with advance in latest communication services and emerging applications have inspired interest in optical code division multiple access (OCDMA). The work focuses on analysis ... -
Rehabilitation systems for physically disabled patients: A brief review of sensor-based computerised signal-monitoring systems
(Scientific Publishers of India, 2013)This brief review addresses the existing systems and challenges and provides future recommendations on computer- and biosensor-assisted rehabilitation systems for physically disabled patients. We further list the types of ... -
Review and modeling of vegetation propagation model for wireless sensor networks using OMNeT++
(Institute of Electrical and Electronics Engineers (IEEE), 2010-09-22)In simulation environments, prediction of path losses, maximum communication coverage for each node and received signal strength are calculated by using propagation model. However, most of the simulation tools only offer ... -
Secured and robust information hiding scheme
(Malaysian Technical Universities Network (MTUN), 2012-11-20)The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have ... -
Secured and robust information hiding scheme
(Elsevier B.V., 2013)The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have ... -
Security protection using Simple Object Access Protocol (SOAP) messages techniques
(Institute of Electrical and Electronics Engineering (IEEE), 2008-12-01)Web Services are modular and distributed applications and are based on industry standard technologies. Nowadays, a message traveling through Internet is relatively simple to be read or modified [1]. This is due to the ... -
Significance of the electromyographic analysis of the upper limb muscles of cricket bowlers: Recommendations from studies of overhead-throwing athletes
(World Scientific Publishing Company., 2014-08)The purpose of this study was twofold: (i) to review the existing literature on electromyographic (EMG) analysis of the upper limb muscles of present overhead-throwing (OT) athletes during throwing and of cricket bowlers ... -
Smart prolong fuzzy wireless sensor-actor network for agricultural application
(Institute of Information Science, 2012-03)The advances in pervasive communication, sensing and computing of wireless sensor networks technologies are leading to the emergence of wireless sensor-actor networks. The spreading merit of WSAN has led to increasing ... -
Speaker recognition system: Vulnerable and challenges
(Engg Journals Publications, 2013-08)Recently speaker recognition system became high interesting by researchers for both software and hardware solutions. Different technologies have been adopted to implement speaker recognition system that has performance ... -
A study of TCP congestion control mechanisms
(Universiti Malaysia Perlis (UniMAP)Centre for Graduate Studies, 2010-10-16)In this paper, the TCP congestion control mechanisms are discussed. There are four intertwined mechanisms defined in the Internet standards track protocol, which are slow start, congestion avoidance, fast retransmit and ... -
Surface electromyographic analysis of the biceps brachii muscle of cricket bowlers during bowling
(Springer Netherlands, 2014-01)Cricket bowling generates forces with torques on the upper limb muscles and makes the biceps brachii (BB) muscle vulnerable to overuse injury. The aim of this study was to investigate whether there are differences in the ... -
Surface electromyography assessment of the biceps brachii muscle between the endplate region and distal tendon insertion: Comparison in terms of gender, dominant arm and contraction
(Society of Physical Therapy Science, 2013-01)[Purpose] In some earlier studies of electromyography (EMG) of the upper arm biceps brachii (BB), researchers preferred to place the electrodes on the middle of the biceps muscle to analyze its function. This study ... -
Surface electromyography for assessing triceps brachii muscle activities: A literature review
(Elsevier B.V., 2013)The goal of this review was to summarise the scientific findings of research conducted on the triceps brachii muscle using surface electromyography. To achieve this goal, we searched through several articles available from ... -
Synthesis of finite length multi level sequences for clutter rejection in radar
(Institute of Electrical and Electronics Engineers (IEEE), 2012-07-24)In radar systems the very low side-lobes that can be achieved with amplitude and phase modulated pulse trains make their use particularly attractive in systems requiring a large dynamic range. Moreover, the excellent ... -
TCP SYN flood attack analysis based on payload
(Universiti Malaysia Perlis (UniMAP)Centre for Graduate Studies, 2010-10-16)Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by malicious attackers. The malicious attackers can easily exploit ... -
TCP Vegas’ adaptive CWND in wireless IPv4 and IPv6 networks
(Universiti Malaysia Perlis (UniMAP)School of Mechatronic Engineering, 2012-02-27)In a network, TCP sends burst of data during its initial state due to the aggressive increase of congestion window (CWND) size. The aggressive increase in congestion window size causes traffic overload. In our work, we ... -
Triple-play services using random diagonal code for spectral amplitude coding OCDMA systems
(Fachverlag Schiele and Schoen GmbH, 2009)In this paper, a new code called Random Diagonal (RD) code for spectral amplitude coding optical code division multiple access (OCDMA) networks is presented. This code is compared with other codes like MQC, MFH and Hadamard ... -
The use of openCV in Traffic Surveillance System (TSS)
(Universiti Malaysia Perlis (UniMAP)Centre for Graduate Studies, 2010-10-16)Due to the increase of traffic accidents over the last few years; the development of surveillance systems has increasing attention. The use of the video cameras is one solution to solve the traffic problems, Smart cameras ... -
Variable structure system with sliding mode controller
(Malaysian Technical Universities Network (MTUN), 2012-11-20)This paper describes the application of sliding mode variable structure control (SMVSC) concept for DC motor position control. A mathematical procedure for determining the values of the gains of variable structure system ...