zahariah manap | Universiti Teknikal Malaysia Melaka (original) (raw)

Papers by zahariah manap

Research paper thumbnail of Performance Analysis of TOA-based Positioning in LTE by utilizing MIMO Feature

Journal of Telecommunication, Electronic and Computer Engineering, 2017

This paper presents the performance analysis of a TOA-based positioning in LTE by utilizing MIMO ... more This paper presents the performance analysis of a TOA-based positioning in LTE by utilizing MIMO feature. In this work, the wireless channels between the mobile terminal (MT) and eNodeBs are modeled by using a geometric-based stochastic channel models in WINNER II to measure the propagation delay. Then, the location of the MT is estimated by using the geometric-based multiple linear line of position (MLLOP) technique. We focus the analysis on the typical urban microcell scenario (B1 Hotspot) with three fixed-located eNodeBs and a randomly located mobile terminal. The simulation works are executed in both LOS and NLOS conditions. We compare the performance of MIMO feature utilization to SISO antenna configuration system based on root mean square error. The results show that utilizing MIMO feature enhances the estimation accuracy. The number of antenna elements at the receiver and transmitter greatly influence the estimation accuracy of MT’s position. The best performance is achieved ...

Research paper thumbnail of Qualitative-based QoS performance study using hybrid ACO and PSO algorithm routing in MANET

Journal of Physics: Conference Series

Research paper thumbnail of Analysis of 4G mobile network coverage in UTeM technology campus

Indonesian Journal of Electrical Engineering and Computer Science

This paper proposes an analysis of the coverage performance of 4G cellular services in UTeM Techn... more This paper proposes an analysis of the coverage performance of 4G cellular services in UTeM Technology Campus. The performance of the cellular services is presented as the network’s coverage profile which is based on the received signal strength indicator (RSSI). The area under study is virtually divided into 64 grid points where the average RSSI measurements are captured by using an open source software namely G-Mon. The measured values are mapped into the network coverage profile which represents the signal reception quality at each of the grid points. A statistical analysis called Two-Way ANOVA is performed to investigate the correlation of the performance of 4G cellular services in UTeM Technology Campus with the mobile phone brands and service operators. Based on the analysis, it is found that the signal reception in outdoor areas are better than that of indoor areas. In addition, the analysis shows that the propagation loss and signal degradation are two factors that contribut...

Research paper thumbnail of Analyze of threshold voltage in SOI PMOSFET device using Taguchi method

2016 IEEE International Conference on Semiconductor Electronics (ICSE), 2016

—The short-channel effect (SCE) is the main problem of many metal-oxide-semiconductor field-effec... more —The short-channel effect (SCE) is the main problem of many metal-oxide-semiconductor field-effect transistor (MOSFET) industries. A lot of studies addressing the SCE effect have been conducted. One of the methods used for this is called SOI (silicon-on-insulator) technology. This method has been proven to effectively reduce the SCE effect. In this research paper, the electrical characteristic of an 18 nm gate length SOI PMOSFET was analyzed based on the prediction of the International Technology Roadmap for Semiconductors (ITRS). The threshold voltage would be the key characteristic in this research. Four process parameters were used with two noise factors in order to conduct nine sets of experiments using the L9 orthogonal array Taguchi method. At the end of the experiment, the best setting that was predicted by the Taguchi method would be utilized for the purpose of verification. The result shows that VTH after the optimization approach is closer to the nominal value (–0.533V), that is, within the appropriate range of ITRS 2013.

Research paper thumbnail of Design and optimization of TiSi<inf>x</inf>/HfO<inf>2</inf> channel vertical double gate NMOS device

2016 IEEE International Conference on Semiconductor Electronics (ICSE), 2016

Research paper thumbnail of Multi-response optimization in vertical double gate PMOS device using Taguchi method and grey relational analysis

2016 IEEE International Conference on Semiconductor Electronics (ICSE), 2016

Research paper thumbnail of Homes Appliances Controlled Using Speech Recognition in Wireless Network Environment

2009 International Conference on Computer Technology and Development, 2009

... Prof. Muhammad Syahrir Bin Johal and all Head of Departments in the faculty. REFERENCES [1] J... more ... Prof. Muhammad Syahrir Bin Johal and all Head of Departments in the faculty. REFERENCES [1] Julia Case Bradley, Anita C. Millspaugh. ... [3] Martyn Mallick. Mobile and Wireless Design Essentials. Indianapolis USA: Wiley Publishing, Inc ; 153-193.2003. [4] Roy Blake. ...

Research paper thumbnail of Designing a Low Cost Electronic Devices Switching System Controlled by Short Message Service

2009 International Conference on Computer Technology and Development, 2009

... zahariah@utem.edu.my, mardiana@utem.edu.my, hazura@utem.edu.my, fauziyah@utem.edu. my, hanim@... more ... zahariah@utem.edu.my, mardiana@utem.edu.my, hazura@utem.edu.my, fauziyah@utem.edu. my, hanim@utem.edu.my Abstract— This paper explains how a Short Message is used as a command to remotely control a switching system. ... [1] Siang, BK Bin Ramli, AR Prakash, V ...

Research paper thumbnail of Online Signature Verification system

2009 5th International Colloquium on Signal Processing & Its Applications, 2009

Online Signature Verification is a process of verifying the writer's identity by using signature ... more Online Signature Verification is a process of verifying the writer's identity by using signature verification system. This system can be use as a security system such as verification for assessing entry application and password substitutions. Signature verification technology requires primarily a digitizing tablet and a special pen connected to the Universal Serial Bus Port (USB port) of a computer. An individual can sign on the digitizing tablet using the special pen regardless of his signature size and position. The signature is characterized as pen-strokes consisting x-y coordinates and the data will be stored in the signature database in the form of a txt.file. These characteristics uniquely identify a person and cannot be mimicked or stolen. In this project, the method of Support Vector Machine (SVM) is used to focuses in verifying the signature.

Research paper thumbnail of Signature verification system using Support Vector Machine

2009 6th International Symposium on Mechatronics and its Applications, 2009

... AM, Hazura Haroon., Fakulti Kejuruteraan Elektronik dan Kejuruteraan Komputer (FKEKK) Univers... more ... AM, Hazura Haroon., Fakulti Kejuruteraan Elektronik dan Kejuruteraan Komputer (FKEKK) Universiti Teknikal Malaysia Melaka (UTeM) Hang Tuah Jaya, 75450 Ayer Keroh, Melaka fauziyah@utem.edu.my ,azlina othman1@yahoo ... SigVeriSVM [9][@J[ID Current User 10 : lina : ...

Research paper thumbnail of RFID Based Laboratory Management System

2009 International Conference on Computer Technology and Development, 2009

In this paper, we discuss the development of a functioning model for a laboratory inventory manag... more In this paper, we discuss the development of a functioning model for a laboratory inventory management system based on radio frequency identification (RFID) technology. The system allows users to track, search, and label laboratory equipment wirelessly. This system is able to locate inventory and report its status either present or missing. The collected inventory data from RFID is then stored

Research paper thumbnail of A Review on Hierarchical Routing Protocols for Wireless Sensor Networks

Wireless Personal Communications, 2013

Research paper thumbnail of Wireless Pers Commun A Review on Hierarchical Routing Protocols for Wireless Sensor Networks

The routing protocol for Wireless Sensor Networks (WSNs) is defined as the manner of data dissemi... more The routing protocol for Wireless Sensor Networks (WSNs) is defined as the manner of data dissemination from the network field (source) to the base station (destination). Based on the network topology, there are two types of routing protocols in WSNs, they are namely flat routing protocols and hierarchical routing protocols. Hierarchical routing protocols (HRPs) are more energy efficient and scalable compared to flat routing protocols. This paper discusses how topology management and network application influence the performance of cluster-based and chain-based hierarchical networks. It reviews the basic features of sensor connectivity issues such as power control in topology set-up, sleep/idle pairing and data transmission control that are used in five common HRPs, and it also examines their impact on the protocol performance. A good picture of their respective performances give an indication how network applications, i.e whether reactive or proactive, and topology management i.e. whether centralized or distributed would determine the network performance. Finally, from the ensuring discussion, it is shown that the chain-based HRPs guarantee a longer network lifetime compared to cluster-based HRPs by three to five times. .my 802.15.4 standard that is uniquely designed for low-rate wireless personal area networks (LR-WPAN) .

Research paper thumbnail of Performance Analysis of TOA-based Positioning in LTE by utilizing MIMO Feature

Journal of Telecommunication, Electronic and Computer Engineering, 2017

This paper presents the performance analysis of a TOA-based positioning in LTE by utilizing MIMO ... more This paper presents the performance analysis of a TOA-based positioning in LTE by utilizing MIMO feature. In this work, the wireless channels between the mobile terminal (MT) and eNodeBs are modeled by using a geometric-based stochastic channel models in WINNER II to measure the propagation delay. Then, the location of the MT is estimated by using the geometric-based multiple linear line of position (MLLOP) technique. We focus the analysis on the typical urban microcell scenario (B1 Hotspot) with three fixed-located eNodeBs and a randomly located mobile terminal. The simulation works are executed in both LOS and NLOS conditions. We compare the performance of MIMO feature utilization to SISO antenna configuration system based on root mean square error. The results show that utilizing MIMO feature enhances the estimation accuracy. The number of antenna elements at the receiver and transmitter greatly influence the estimation accuracy of MT’s position. The best performance is achieved ...

Research paper thumbnail of Qualitative-based QoS performance study using hybrid ACO and PSO algorithm routing in MANET

Journal of Physics: Conference Series

Research paper thumbnail of Analysis of 4G mobile network coverage in UTeM technology campus

Indonesian Journal of Electrical Engineering and Computer Science

This paper proposes an analysis of the coverage performance of 4G cellular services in UTeM Techn... more This paper proposes an analysis of the coverage performance of 4G cellular services in UTeM Technology Campus. The performance of the cellular services is presented as the network’s coverage profile which is based on the received signal strength indicator (RSSI). The area under study is virtually divided into 64 grid points where the average RSSI measurements are captured by using an open source software namely G-Mon. The measured values are mapped into the network coverage profile which represents the signal reception quality at each of the grid points. A statistical analysis called Two-Way ANOVA is performed to investigate the correlation of the performance of 4G cellular services in UTeM Technology Campus with the mobile phone brands and service operators. Based on the analysis, it is found that the signal reception in outdoor areas are better than that of indoor areas. In addition, the analysis shows that the propagation loss and signal degradation are two factors that contribut...

Research paper thumbnail of Analyze of threshold voltage in SOI PMOSFET device using Taguchi method

2016 IEEE International Conference on Semiconductor Electronics (ICSE), 2016

—The short-channel effect (SCE) is the main problem of many metal-oxide-semiconductor field-effec... more —The short-channel effect (SCE) is the main problem of many metal-oxide-semiconductor field-effect transistor (MOSFET) industries. A lot of studies addressing the SCE effect have been conducted. One of the methods used for this is called SOI (silicon-on-insulator) technology. This method has been proven to effectively reduce the SCE effect. In this research paper, the electrical characteristic of an 18 nm gate length SOI PMOSFET was analyzed based on the prediction of the International Technology Roadmap for Semiconductors (ITRS). The threshold voltage would be the key characteristic in this research. Four process parameters were used with two noise factors in order to conduct nine sets of experiments using the L9 orthogonal array Taguchi method. At the end of the experiment, the best setting that was predicted by the Taguchi method would be utilized for the purpose of verification. The result shows that VTH after the optimization approach is closer to the nominal value (–0.533V), that is, within the appropriate range of ITRS 2013.

Research paper thumbnail of Design and optimization of TiSi<inf>x</inf>/HfO<inf>2</inf> channel vertical double gate NMOS device

2016 IEEE International Conference on Semiconductor Electronics (ICSE), 2016

Research paper thumbnail of Multi-response optimization in vertical double gate PMOS device using Taguchi method and grey relational analysis

2016 IEEE International Conference on Semiconductor Electronics (ICSE), 2016

Research paper thumbnail of Homes Appliances Controlled Using Speech Recognition in Wireless Network Environment

2009 International Conference on Computer Technology and Development, 2009

... Prof. Muhammad Syahrir Bin Johal and all Head of Departments in the faculty. REFERENCES [1] J... more ... Prof. Muhammad Syahrir Bin Johal and all Head of Departments in the faculty. REFERENCES [1] Julia Case Bradley, Anita C. Millspaugh. ... [3] Martyn Mallick. Mobile and Wireless Design Essentials. Indianapolis USA: Wiley Publishing, Inc ; 153-193.2003. [4] Roy Blake. ...

Research paper thumbnail of Designing a Low Cost Electronic Devices Switching System Controlled by Short Message Service

2009 International Conference on Computer Technology and Development, 2009

... zahariah@utem.edu.my, mardiana@utem.edu.my, hazura@utem.edu.my, fauziyah@utem.edu. my, hanim@... more ... zahariah@utem.edu.my, mardiana@utem.edu.my, hazura@utem.edu.my, fauziyah@utem.edu. my, hanim@utem.edu.my Abstract— This paper explains how a Short Message is used as a command to remotely control a switching system. ... [1] Siang, BK Bin Ramli, AR Prakash, V ...

Research paper thumbnail of Online Signature Verification system

2009 5th International Colloquium on Signal Processing & Its Applications, 2009

Online Signature Verification is a process of verifying the writer's identity by using signature ... more Online Signature Verification is a process of verifying the writer's identity by using signature verification system. This system can be use as a security system such as verification for assessing entry application and password substitutions. Signature verification technology requires primarily a digitizing tablet and a special pen connected to the Universal Serial Bus Port (USB port) of a computer. An individual can sign on the digitizing tablet using the special pen regardless of his signature size and position. The signature is characterized as pen-strokes consisting x-y coordinates and the data will be stored in the signature database in the form of a txt.file. These characteristics uniquely identify a person and cannot be mimicked or stolen. In this project, the method of Support Vector Machine (SVM) is used to focuses in verifying the signature.

Research paper thumbnail of Signature verification system using Support Vector Machine

2009 6th International Symposium on Mechatronics and its Applications, 2009

... AM, Hazura Haroon., Fakulti Kejuruteraan Elektronik dan Kejuruteraan Komputer (FKEKK) Univers... more ... AM, Hazura Haroon., Fakulti Kejuruteraan Elektronik dan Kejuruteraan Komputer (FKEKK) Universiti Teknikal Malaysia Melaka (UTeM) Hang Tuah Jaya, 75450 Ayer Keroh, Melaka fauziyah@utem.edu.my ,azlina othman1@yahoo ... SigVeriSVM [9][@J[ID Current User 10 : lina : ...

Research paper thumbnail of RFID Based Laboratory Management System

2009 International Conference on Computer Technology and Development, 2009

In this paper, we discuss the development of a functioning model for a laboratory inventory manag... more In this paper, we discuss the development of a functioning model for a laboratory inventory management system based on radio frequency identification (RFID) technology. The system allows users to track, search, and label laboratory equipment wirelessly. This system is able to locate inventory and report its status either present or missing. The collected inventory data from RFID is then stored

Research paper thumbnail of A Review on Hierarchical Routing Protocols for Wireless Sensor Networks

Wireless Personal Communications, 2013

Research paper thumbnail of Wireless Pers Commun A Review on Hierarchical Routing Protocols for Wireless Sensor Networks

The routing protocol for Wireless Sensor Networks (WSNs) is defined as the manner of data dissemi... more The routing protocol for Wireless Sensor Networks (WSNs) is defined as the manner of data dissemination from the network field (source) to the base station (destination). Based on the network topology, there are two types of routing protocols in WSNs, they are namely flat routing protocols and hierarchical routing protocols. Hierarchical routing protocols (HRPs) are more energy efficient and scalable compared to flat routing protocols. This paper discusses how topology management and network application influence the performance of cluster-based and chain-based hierarchical networks. It reviews the basic features of sensor connectivity issues such as power control in topology set-up, sleep/idle pairing and data transmission control that are used in five common HRPs, and it also examines their impact on the protocol performance. A good picture of their respective performances give an indication how network applications, i.e whether reactive or proactive, and topology management i.e. whether centralized or distributed would determine the network performance. Finally, from the ensuring discussion, it is shown that the chain-based HRPs guarantee a longer network lifetime compared to cluster-based HRPs by three to five times. .my 802.15.4 standard that is uniquely designed for low-rate wireless personal area networks (LR-WPAN) .