Browsing R. Badlishah Ahmad, Prof. Ir. Ts. Dr. by Title
Now showing items 124-143 of 147
-
Secured and robust information hiding scheme
(Malaysian Technical Universities Network (MTUN), 2012-11-20)The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have ... -
Secured and robust information hiding scheme
(Elsevier B.V., 2013)The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have ... -
Security protection using Simple Object Access Protocol (SOAP) messages techniques
(Institute of Electrical and Electronics Engineering (IEEE), 2008-12-01)Web Services are modular and distributed applications and are based on industry standard technologies. Nowadays, a message traveling through Internet is relatively simple to be read or modified [1]. This is due to the ... -
Significance of the electromyographic analysis of the upper limb muscles of cricket bowlers: Recommendations from studies of overhead-throwing athletes
(World Scientific Publishing Company., 2014-08)The purpose of this study was twofold: (i) to review the existing literature on electromyographic (EMG) analysis of the upper limb muscles of present overhead-throwing (OT) athletes during throwing and of cricket bowlers ... -
Smart prolong fuzzy wireless sensor-actor network for agricultural application
(Institute of Information Science, 2012-03)The advances in pervasive communication, sensing and computing of wireless sensor networks technologies are leading to the emergence of wireless sensor-actor networks. The spreading merit of WSAN has led to increasing ... -
Speaker recognition system: Vulnerable and challenges
(Engg Journals Publications, 2013-08)Recently speaker recognition system became high interesting by researchers for both software and hardware solutions. Different technologies have been adopted to implement speaker recognition system that has performance ... -
A study of TCP congestion control mechanisms
(Universiti Malaysia Perlis (UniMAP)Centre for Graduate Studies, 2010-10-16)In this paper, the TCP congestion control mechanisms are discussed. There are four intertwined mechanisms defined in the Internet standards track protocol, which are slow start, congestion avoidance, fast retransmit and ... -
Surface electromyographic analysis of the biceps brachii muscle of cricket bowlers during bowling
(Springer Netherlands, 2014-01)Cricket bowling generates forces with torques on the upper limb muscles and makes the biceps brachii (BB) muscle vulnerable to overuse injury. The aim of this study was to investigate whether there are differences in the ... -
Surface electromyography assessment of the biceps brachii muscle between the endplate region and distal tendon insertion: Comparison in terms of gender, dominant arm and contraction
(Society of Physical Therapy Science, 2013-01)[Purpose] In some earlier studies of electromyography (EMG) of the upper arm biceps brachii (BB), researchers preferred to place the electrodes on the middle of the biceps muscle to analyze its function. This study ... -
Surface electromyography for assessing triceps brachii muscle activities: A literature review
(Elsevier B.V., 2013)The goal of this review was to summarise the scientific findings of research conducted on the triceps brachii muscle using surface electromyography. To achieve this goal, we searched through several articles available from ... -
Synthesis of finite length multi level sequences for clutter rejection in radar
(Institute of Electrical and Electronics Engineers (IEEE), 2012-07-24)In radar systems the very low side-lobes that can be achieved with amplitude and phase modulated pulse trains make their use particularly attractive in systems requiring a large dynamic range. Moreover, the excellent ... -
TCP SYN flood attack analysis based on payload
(Universiti Malaysia Perlis (UniMAP)Centre for Graduate Studies, 2010-10-16)Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by malicious attackers. The malicious attackers can easily exploit ... -
TCP Vegas’ adaptive CWND in wireless IPv4 and IPv6 networks
(Universiti Malaysia Perlis (UniMAP)School of Mechatronic Engineering, 2012-02-27)In a network, TCP sends burst of data during its initial state due to the aggressive increase of congestion window (CWND) size. The aggressive increase in congestion window size causes traffic overload. In our work, we ... -
Triple-play services using random diagonal code for spectral amplitude coding OCDMA systems
(Fachverlag Schiele and Schoen GmbH, 2009)In this paper, a new code called Random Diagonal (RD) code for spectral amplitude coding optical code division multiple access (OCDMA) networks is presented. This code is compared with other codes like MQC, MFH and Hadamard ... -
The use of openCV in Traffic Surveillance System (TSS)
(Universiti Malaysia Perlis (UniMAP)Centre for Graduate Studies, 2010-10-16)Due to the increase of traffic accidents over the last few years; the development of surveillance systems has increasing attention. The use of the video cameras is one solution to solve the traffic problems, Smart cameras ... -
Variable structure system with sliding mode controller
(Malaysian Technical Universities Network (MTUN), 2012-11-20)This paper describes the application of sliding mode variable structure control (SMVSC) concept for DC motor position control. A mathematical procedure for determining the values of the gains of variable structure system ... -
Variable structure system with sliding mode controller
(Elsevier B.V., 2013)This paper describes the application of sliding mode variable structure control (SMVSC) concept for DC motor position control. A mathematical procedure for determining the values of the gains of variable structure system ... -
Vehicle Speed Detection for Smart Surveillance System
(Universiti Malaysia Perlis, 2010-01-07)Vehicle tracking systems has been pervasively applied to monitor the traffic and road safety where existing vehicle tracking systems use video image processing technique. In visual monitoring a security analyst normally ... -
Vehicle speed detection using frame differencing for smart surveillance system
(Institute of Electrical and Electronics of Engineering (IEEE), 2010-05-10)This paper presents vehicle speed detection algorithm and its application for smart surveillance system using PC workstation at the selected road lane. Typical temporal resolution of 30 ms to 40ms of conventional camera ... -
Vision-based motion tracking rehabilitation system for gait disorder
(Institute of Electrical and Electronics Engineers (IEEE), 2012-11)Aim of the present study was to review the articles for the vision-based motion tracking, usually applied on the rehabilitation systems of gait disorder. Based on our ultimate goal, we searched several articles, available ...