Liza A Latiff

Liza A Latiff
Universiti Teknologi Malaysia | UTM · Razak Faculty of Technology and Informatics

PhD, Universiti Teknologi Malaysia

About

91
Publications
23,800
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
666
Citations
Citations since 2016
47 Research Items
386 Citations
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
Introduction
My area of interest is wireless communication, routing and quality of service of computer networks. Am also interested in mobility management based on positioning indoor and also outdoor environment. Optimization with AI in routing. Current project in IoT in Health and Agriculture.
Additional affiliations
February 2015 - February 2017
UTMSPACE
Position
  • Chief Operating Officer
Description
  • Manages the operation of UTMSPACE in Kuala Lumpur. Our headquarters is in Johor Bharu.
April 2010 - present
Universiti Teknologi Malaysia
Position
  • Professor (Associate)
April 2010 - February 2015
UTMSpace
Position
  • Head of Faculty
Description
  • Part of the top management of UTMSpace, and oversees all diploma programs offered.

Publications

Publications (91)
Chapter
Worm-like ransomware strains spread quickly to critical systems such as IoMT without human interaction. Therefore, detecting different worm-like ransomware attacks during their spread is vital. Nevertheless, the low detection rate due to the imbalanced ransomware data and the detection systems’ disability for multiclass simultaneous detection are t...
Chapter
The fog-based attack detection systems can surpass cloud-based detection models due to their fast response and closeness to IoT devices. However, current fog-based detection systems are not lightweight to be compatible with ever-increasing IoMT big data and fog devices. To this end, a lightweight fog-based attack detection system is proposed in thi...
Conference Paper
Full-text available
As humans, nearly eighty percent of our day-to-day activities are conducted in an indoor environment, making indoor tracking and monitoring extremely necessary. The needs of having an Indoor Positioning System (IPS) has become crucial as the development is critically challenged due to the fact that satellite signals via Global Positioning System (G...
Article
Full-text available
This paper investigates the performance of a number of channel and delay-based scheduling algorithms for an efficient QoS (Quality of Service) provision with more live video streaming users over the Fifth Generation Long-Term Evolution-Advanced (5G LTE-A) network. These algorithms were developed for use in legacy wireless networks and minor changes...
Article
Full-text available
Cyber-attack detection via on-gadget embedded models and cloud systems are widely used for the Internet of Medical Things (IoMT). The former has a limited computation ability, whereas the latter has a long detection time. Fog-based attack detection is alternatively used to overcome these problems. However, the current fog-based systems cannot handl...
Article
Full-text available
The timing of traffic lights at intersections is determined by the Local Authority. It is based on the peak hour statistics and the timing is maintained even during an off-peak hour. This one standard green time will be used every time in a day regardless of the number of vehicles and the road width. This approach will have a long green traffic lig...
Article
Full-text available
Identification of informative genes is essential for the disease and cancer studies. Metaheuristic algorithms have been widely used for this purpose. However, their performance on various high-dimensional datasets of genomic studies has not been fully addressed. This work was intended to perform a comprehensive comparative analysis on three well-kn...
Article
Full-text available
The minimization of tail latency is especially crucial in user interfacing services and fast responding apps. The literature on the datacenter load balancing protocols contains of many protocols but works discussing tail latency are scarce. This work proposes a novel variant of the Multi-Level Dynamic Traffic Load Balancing (MDTLB) protocol for a d...
Article
Full-text available
The progressions in telecommunication beyond the 5th generation have created a need to improve research drifts. The current 5G study has an important focus on non-orthogonal multiple access (NOMA) technology. Sparse Code Multiple Access (SCMA) is a promising technique within NOMA, enhancing the multi-user handling capability of next-generation comm...
Chapter
Smart healthcare applications such as smart fitness, smart watches, and elderly remote monitoring devices have reduced the load on traditional healthcare organizations and led to healthier lifestyles. Nevertheless, these devices are under high risk of zero-day attacks because of their fragile nature and network characteristics. Furthermore, few com...
Article
Full-text available
span lang="EN-GB">The progressions in telecommunication beyond the 5<sup>th</sup> generation have created a need to improve research drifts. The current 5G study has an important focus on non-orthogonal multiple access (NOMA) technology. sparse code multiple access (SCMA) is a promising technique within NOMA, enhancing the multi-user handling capab...
Article
The progressions in telecommunication beyond the 5th generation have created a need to improve research drifts. The current 5G study has an important focus on non-orthogonal multiple access (NOMA) technology. Sparse code multiple access (SCMA) is a promising technique within NOMA, enhancing the multi-user handling capability of next-generation comm...
Conference Paper
Full-text available
As humans, nearly eighty percent of our day-today activities are conducted in an indoor environment, making indoor tracking and monitoring extremely necessary. The needs of having an Indoor Positioning System (IPS) has become crucial as the development is critically challenged due to the fact that satellite signals via Global Positioning System (GP...
Article
Full-text available
Background The Internet of Medical Things (IoMTs) is gradually replacing the traditional healthcare system. However, little attention has been paid to their security requirements in the development of the IoMT devices and systems. One of the main reasons can be the difficulty of tuning conventional security solutions to the IoMT system. Machine Lea...
Article
Full-text available
The selection and classification of genes is essential for the identification of related genes to a specific disease. Developing a user-friendly application with combined statistical rigor and machine learning functionality to help the biomedical researchers and end users is of great importance. In this work, a novel stand-alone application, which...
Article
Full-text available
In many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of application...
Article
Full-text available
In many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of application...
Article
Full-text available
The processes of intelligent data processing in computer vision systems have been researched. The problem of structural image recognition is relevant. This is a promising way to assess the degree of similarity of objects. This approach provides the simplicity of construction and the high reliability of decision making. The main problem of an effect...
Article
Everyday people spend time indoor with average rates 80 to 90 percent. The needs and awareness on tracking mobile nodes indoor become one of important research worldwide. Localization specific on indoor environment rapidly grows nowadays as to locate and track nodes for security purpose, rescuing people trapped in fire, searching process and findin...
Article
Full-text available
Water pipeline leakage detection is still an important issue, particularly for the development of smart cities. Thus, this paper reviews water pipeline leakage detection techniques, which can be classified into three different categories, namely software-based, hardware-based and conventional methods. We compare the advantages and disadvantage for...
Article
Full-text available
Growing number of vehicles in recent years has an impact to road capacity and parking spaces. Even with support of an efficient public transport, some users prefer to use their personal vehicles. Hence, it resulted in lack of parking space in public areas. Looking for parking spaces is time, money and fuel consuming and causes unnecessary stress to...
Conference Paper
Full-text available
The road traffic volume is the main criteria in the road planning and traffic management. Previous studies have discussed on the smart traffic monitoring, and little attention has been paid to the solution of smart traffic control. The objective of this paper is to propose a smart traffic monitoring and control architecture and also the respective...
Article
Maintaining high quality of service (QoS) for sensor nodes is important in industrial wireless sensor networks (IWSNs). Wide range of factors severely affects QoS; however more research is still needed. In this article, a flexible online multi-objective optimization framework (FOMOF) in carrier sense multiple access with collision avoidance (CSMA/C...
Conference Paper
Microwave links have to be designed such that propagation effects do not reduce the quality of the transmitted signals. Measurements and the derived propagation parameters are analysed and discussed. Metrological parameters data(Visibility, Temperature, Relative humidity and Atmospheric Pressure) gotten from the Sudan Meteorological Authority (SMA)...
Article
Full-text available
Steam turbines (ST) need to be protected from damaging faults in the event it ends up in a danger zone. Some examples of faults include vibration, thrust, and eccentricity. Vibration fault represents one of the challenges to designers, as it could cause massive damages and its fault signal is rather complex. Researches in the field intend to preven...
Article
Full-text available
The Transmitted-Reference (TR) is a technique used to improve the performance (gain) of received noisy multipath component in indoor and outdoor UWB signal. This technique is utilized by ultra-wide band (UWB) transceiver which receives very short transmitted pulses (less than 1 ns) using popular modulation and spread spectrum of time hopping. It is...
Article
Full-text available
Wireless sensor networks have received increasing research attention and they can be found in every field of life. The industrial wireless sensor network is one of the boosting and emerging technologies for machine fault diagnosis and monitoring. This study provides a review on vibration fault diagnosis approaches in industrial wireless application...
Article
Full-text available
The UWB technique is employed in this study to exclude unusual multipath components by introducing a modified Hadamard matrix. Within the concept of this approach, IPI is totally removed and the S/N is improved. The successful UWB developments were always challenged by some external factors such as noise, interference and wrong multipath components...
Conference Paper
Full-text available
Recent development in the field of advanced communication services and applications has triggered interest in super high frequencies and significantly increased research activity in millimeter wave. In this paper, a new method of calculation of worst month in the statistical model has been developed for use in the rain and dust storm to predict the...
Article
Full-text available
Wireless techniques utilized in industrial applications face significant challenges in preventing noise, collision, and data fusion, particularly when wireless sensors are used to identify and classify fault in real time for protection. This study will focus on the design of integrated wireless fault diagnosis system, which is protecting the induct...
Article
Full-text available
Vibration fault exhibit a multifaceted and nonlinear behavior generation in rotated machines, for example in a steam turbine (ST). Vibration fault (VF) is collectedin the form of acceleration, velocity, and displacement via the vibration sensor. This fault damages the turbines if it strays into the danger zone. This paper first models the VF in a t...
Article
Full-text available
Vibration in a steam turbine-generator is one of the many default problems, similar to thrust, crack and low or high speeds, all of which causes damage to the steam turbine if leaves unprotected. It leads to accidents and damages, when overcome the limit of alarm or danger zones. The protection of steam turbine generators from danger leads to reduc...
Article
Full-text available
Wireless sensor communication has been an accelerating trend for industrial automation in controlling and monitoring processes. A variety of technologies has also emerged in fulfilling the industrial requirements. The ISA100.11a is an industrial technology to provide a vast range of industrial applications. Inevitably, scheduling schemes have a key...
Article
Full-text available
During the last three decades, ultra-wideband (UWB) has become one of the most prominent techniques encountered in the communication system. UWB brought advantages to the human community such as higher data rate, excellent time domain resolution, and immunity to both multipath and interference. The time domain resolution was earlier improved by rak...
Conference Paper
Monitor and control traffic conditions are important in intelligent transport systems to reduce congestion, especially at intersections. The approach is needed to reduce the negative effects of the congestion at junctions and steps taken to control traffic at the intersection. The project identifies the number of cars through video image detection...
Conference Paper
Full-text available
Wireless Sensors (WS) are utilized in industries, medical, greenhouses, and other applications to sense and monitor parameters required to control and utilize data. There are many challenges to implement WS networks such as collision, end-to-end delay, dead nodes and power consumption to name a few; however, the main challenge that face the impleme...
Article
Full-text available
The objective of this review is Comprehensive description for Peak to Average Power Ratio (PAPR) reduction methods in Orthogonal Frequency Division Multiplexing (OFDM) multicarrier modulation systems to provide the researchers in this field with a broader understanding of the high PAPR problem in OFDM systems and Classification of the available sol...
Conference Paper
Determining the Particle Size Distribution (PSD) of a solid and liquid particles is of great practical interest. An experimental research was conducted to explore the influence of PSD on propagation properties of electromagnetic wave specifically in microwave and millimeter wave bands. The majority of earlier studies have primarily concentrated on...
Conference Paper
Gas Turbine (GT) is a vital component to a power plant. This system contains many signals that are used to control and protect the GT from damage or accidents caused by vibration, speed, and temperature. Moreover, the vibrations of GT at dangerous levels might lead to damages to the system. In this paper, a concerted effort is made to identify the...
Conference Paper
Multicarrier system such as orthogonal frequency division multiplexing (OFDM) are significantly affected by peak-to-average-power ratio (PAPR). Many researchers introduce different techniques to reduce PAPR with tradeoffs of data rate loss and computations of approach. In some cases, the techniques of reduction may lead to increase average power of...
Article
Proxy Mobile IPv6 is the new protocol, but there is a problem on Localized Routing (LR) algorithm which it is not ready build in PMIPv6 protocol. As for this in PMIPv6 in RFC5213 address the needed to enable Localized Routing (LR) but it not specify a complete procedure to establish Route Optimization (RO). RFC6279 state the problem statement on LR...
Article
Full-text available
Vibration signal is a complex and nonlinear signal, especially in steam turbine (ST), where vibration in a dynamic system is classified as acceleration, velocity, and displacement. However, these modes either damage or destroy the turbines when they are in severity region. This work presents a modeling of vibration signal based on a FFT signals rel...
Article
Full-text available
Traditionally IP mobility support mechanisms, Mobile IPv4 or Mobile IPv6 are based on the host-based solution to keep on going sessions despite the movement. The current trend is towards networks-based solutions where mobility support is based on network operation. Proxy Mobile IPv6 (PMIPv6) has been developed by the Internet Engineering Task Force...
Data
Dalam Rangkaian Penderia Tanpa Wayar (WSN), penderia mengumpul maklumat tentang alam fizikal manakala stesen tapak membuat keputusan dan kemudiannya melaksanakan tindakan yang sesuai ke atas persekitaran tersebut. Proses ini membenarkan seseorang pengguna untuk mengesan dan mengawas rangkaian dengan berkesan pada jarak jauh dalam masa sebenar. Kert...
Article
Full-text available
A routing protocol is a core issue in Wireless Sensor Network (WSN) especially on undetermined situationand crucial condition to guarantee the transmission of data. Therefore, any implementation of routingprotocol in a tunnel environment will suit with their application to minimize dropped data in itscommunication. This paper presents a biological...
Article
Full-text available
The goal of this work-in-progress is to evaluate and analyze alternative conceptions among students about an open and short circuit concepts. This study was carried out among first-year electrical engineering students. In order to find out what these alternative conceptions were, students’ pre-and post-test answers to three questions on concept tes...