Roslina Mohamad
Universiti Teknologi MARA

Published : 12 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 12 Documents
Search

Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote monitoring Amirun Murtaza Abd Jalil; Roslina Mohamad; Nuzli Mohamad Anas; Murizah Kassim; Saiful Izwan Suliman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2669

Abstract

In this paper, an implementation of vehicle ventilation system using microcontroller NodeMCU is described, as an internet of things (IoT) platform. A low-cost wireless fidelity (Wi-Fi) microchip ESP8266 integrated with NodeMCU provides full-stack transmission control protocol/internet protocol (TCP/IP) to communicate between mobile applications. This chip is capable to monitor and control sensor devices connected to the IoT platform. In this reserach, data was collected from a temperature sensor integrated to the platform, which then monitored using Blynk application. The vehicle ventilation system was activated/deactivated through mobile application and controlled using ON/OFF commands sent to the connected devices. From the results, the vehicle ventilation system built using NodeMCU microcontroller is capable to provide near real-time data monitoring for temperature in the car before and after the ventilation system was applied.
QoS of Wi-Fi performance based on signal strength and channel for indoor campus network Adiba Abd Ghafar; Murizah Kassim; Norsuzila Ya’acob; Roslina Mohamad; Ruhani Ab Rahman
Bulletin of Electrical Engineering and Informatics Vol 9, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (900.89 KB) | DOI: 10.11591/eei.v9i5.2251

Abstract

The implementation of Wi-Fi on campuses brings huge benefits for campus users in communications and education development. Some campuses face existing poor quality of service (QoS) on the Wi-Fi performance which is also unjustified and issues on unsatisfied connections. This research aims to analyses the Wi-Fi performance of the campus network for three indoor access points. Signal strength, usage percentage, channel utilization, and the number of clients count per access points are measured. Results show that 56% is the highest signal percentage and the lowest signal percentage is at 1%. Access point of Ustudent is the highest at 53% and lowest at 38%. The highest signal strength of -45dBm is found and the other two are below by -2 dBm. The lowest signal strength is at -95 dBm. SSID CCNA_1 is identified has the best signal strength compared to other SSIDs because it runs on 5 GHz frequency. The most channels used are channels 1, 4, and 6. Respectively 151, 67, and 57 users are connected to Ustudent, UHotspot, and CCNA_1. This study is significant for the QoS in a campus network in providing good network services. Thus, the QoS on Wi-Fi performance is improvised, monitored and analyzed for continues supports users in the campus network successfully.
Genetic algorithm for intrusion detection system in computer network Hamizan Suhaimi; Saiful Izwan Suliman; Afdallyna Fathiyah Harun; Roslina Mohamad; Yuslinda Wati Mohamad Yusof; Murizah Kassim c
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1670-1676

Abstract

Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone’s life or sovereignty of a country if manipulated by wrong hands.  In network intrusion detection system (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of genetic algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD’99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar-patent of problems.   
Network intrusion detection system by using genetic algorithm Hamizan Suhaimi; Saiful Izwan Suliman; Ismail Musirin; Afdallyna Fathiyah Harun; Roslina Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1593-1599

Abstract

Developing a better intrusion detection systems (IDS) has attracted many researchers in the area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is proposed as a tool that capable to identify harmful type of connections in a computer network. Different features of connection data such as duration and types of connection in network were analyzed to generate a set of classification rule. For this project, standard benchmark dataset known as KDD Cup 99 was investigated and utilized to study the effectiveness of the proposed method on this problem domain. The rules comprise of eight variables that were simulated during the training process to detect any malicious connection that can lead to a network intrusion. With good performance in detecting bad connections, this method can be applied in intrusion detection system to identify attack thus improving the security features of a computer network.
Fault disturbances classification analysis using adaptive neuro-fuzzy inferences system Shahrani Shahbudin; Murizah Kassim; Roslina Mohamad; Saiful Izwan Suliman; Yuslinda Wati Mohamad Yusof
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1196-1202

Abstract

This paper affords the use of neuro-fuzzy technique called the Adaptive Network–based Fuzzy Inference System (ANFIS) to highlight its ability to perform fault disturbances classification tasks using extracted features based on S-transforms methods. The ANFIS model with a five-layered architecture was trained using extracted features to classify signal data comprising various faults disturbances, namely, voltage sag, swell, impulsive, interruption, notch, and pure signal.  Results obtained showed that the ANFIS model is very suitable and can generate excellent classification results provided that the right type and number of Membership Functions (MFs) are used in the classification task.
3D modeling of multimode and single mode fiber Murizah Kassim; Ahmad Syahir Arif Mohd Zaid; Azlina Idris; Shahrani Shahbudin; Roslina Mohamad; Cik Ku Haroswati Che Ku Yahaya
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1398-1406

Abstract

This paper presents a design of 3D modeling of Multimode and Single Mode Fiber using SolidWorks. Fiber technology is essential that presents optical fiber is the fastest optical cable laid by Internet Service Providers in network communication. The current design of both fibers has less detail animation on technical specifications of light propagations and cladding. Thus, characterization difficulties occur between this two fiber optics cables. It also has less promotion in media publications such as 3D model design as guidance to users. This paper presents details on 3D modeling of multimode mode and single mode fiber specifications held in the industry market.  A 3D design with SolidWorks and comparison of both fiber characteristics are presented. Based on the 3D designed model, users are analyzed on their perspective and searching information which benefits telecommunication’s company. Technical calculations like core-cladding diameter ratio in microns are animated. The propagation of light in 3D single mode and multimode fiber is simulated using SolidWorks animator that presents it real fiber conditions. Result presents 10 most country searching used of both fiber cables and the difference in users search for both cables. A number of user’s search presents 3% more of multimode than single mode fiber search cases. This research is significant in presenting an animator of single and multimode fiber to users of network infrastructure development especially network developers and Telecommunications Company which can present it lively with animator transitions.
Classification of Power Quality Disturbances at Transmission System using Support Vector Machines Shahrani Shahbudin; Zaki Firdaus Mohmad; Saiful Izwan Suliman; Murizah Kassim; Roslina Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 6, No 2: May 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v6.i2.pp310-317

Abstract

Power Quality has become one of the important issues in modern smart grid environment. Smart grid generally utilizes computational intelligence method from the generation of electricity to electricity distribution to the customers. This is done for the safety, reliability, tenacity and efficiency of the system. The classification of power disturbances has become a major topic in maintaining power quality. These disturbances occur due to faults, natural causes, load switching, energizing transformer, starting large motor, as well as utilization of power electronic devices. The key issue is about maintaining the continuous supply of electricity to the end-users without any problem. If a problem occurs, it might increase the production cost significantly especially to large-scale industries. In this paper, S-transform is used to extract distinctive features of real data from transmission system, and Support Vector Machine was utilized to classify four types PQ disturbances namely, voltage sag, interruption, transient and normal voltage. Results obtained indicate that performance of the One Against One classifier produces high accuracy using k-fold cross validation and RBF kernel.
The effects of the cross-entropy stopping criterion and quadrature amplitude modulation on iterative turbo decoding performance Roslina Mohamad; Mohamad Yusuf Mat Nasir; Nuzli Mohamad Anas
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1557-1564

Abstract

One of the most often-used stopping criteria is the cross-entropy stopping criterion (CESC). The CESC can stop turbo decoder iterations early by calculating mutual information improvements while maintaining bit error rate (BER) performance. Most research on iterative turbo decoding stopping criteria has utilised low-modulation methods, such as binary phase-shift keying. However, a high-speed network requires high modulation to transfer data at high speeds. Hence, a high modulation technique needs to be integrated into the CESC to match its speed. Therefore, the present paper investigated and analysed the effects of the CESC and quadrature amplitude modulation (QAM) on iterative turbo decoding. Three thresholds were simulated and tested under four situations: different code rates, different QAM formats, different code generators, and different frame sizes. The results revealed that in most situations, the use of CESC is suitable only when the signal-to-noise ratio (SNR) is high. This is because the CESC significantly reduces the average iteration number (AIN) while maintaining the BER. The CESC can terminate early at a high SNR and save more than 40% AIN compared with the fixed stopping criterion. Meanwhile, at a low SNR, the CESC fails to terminate early, which results in maximum AIN.
Implementation of embedded real-time monitoring temperature and humidity system Firdaus Hashim; Roslina Mohamad; Murizah Kassim; Saiful Izwan Suliman; Nuzli Mohamad Anas; Ahmad Zaki Abu Bakar
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i1.pp184-190

Abstract

Temperature and humidity are among the parameters that significant to the industrial and agricultural. Traditionally, these elements are monitored inefficiently through wired monitoring system that caused higher implementation and maintenance cost. In addition, the device to detect the temperature such thermometer is not suitable for real-time monitoring since it need a longer response time to measure. With the advent of wireless technology, the temperature and humidity are monitored remotely and effectively. This paper aims to describe the implementation of an embedded real-time temperature and humidity monitoring system, using Arduino for Internet of Things (IoT) application.  The system integrates the Arduino node with a dashboard system call Node-FRED, which interfaced to the LoRa radio through the Things Network gateway. This IoT application is deployed on both indoor and outdoor environment, to investigate the relation between the temperature and humidity level in order to manage the environment at more comfort level.
Network intrusion detection system using immune-genetic algorithm (IGA) Hamizan Suhaimi; Saiful Izwan Suliman; Ismail Musirin; Afdallyna Harun; Roslina Mohamad; Murizah Kassim; Shahrani Shahbudin
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp1059-1065

Abstract

Network security is an important aspect in maintaining computer network systems and personal information from being illegally accessed by third parties. The major problem that frequently occurs in computer network systems is the failure in detecting possible network-attacks. Apart from that, the process of recognizing the type of attack that occurs is very crucial as it will determine the elimination process that should take place to counter the intrusion. This paper proposes the application of standard Genetic Algorithm (GA) that combines with immune algorithm process to enhance the computer system’s capability in recognizing possible intrusion occurrence in a computer system. Simulation was conducted numerous times to test the effectiveness of the proposed intrusion detection system by manipulating the parameter values for genetic operators utilized in GA. The effectiveness of the proposed method is shown in the gathered results and the analysis conducted further supports and proves that Immune Genetic Algorithm (IGA) has the capability to predict the occurrence of intrusion in computer network.