
Mohd Murtadha Mohamad- PhD
- Professor (Associate) at University of Technology Malaysia
Mohd Murtadha Mohamad
- PhD
- Professor (Associate) at University of Technology Malaysia
About
99
Publications
33,361
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
914
Citations
Introduction
Underwater sensor network and software defined network
Current institution
Additional affiliations
Education
October 2002 - August 2006
October 2001 - August 2002
July 1995 - December 2000
Publications
Publications (99)
Against the backdrop of contemporary telecommunications, distinguishing, predicting, and alleviating deadlock have become crucial for optimizing transportation system control. With the advent of larger, higher-resolution datasets, deep learning is increasingly vital for these tasks. Recent scholarly assessments have highlighted the potential of dee...
The dramatic rise in data traffic being generated by modern telecommunications networks leverages challenges especially related to the control of congestion over distributed network topologies, as data traffics increases at the edges and core of sensor network, there is a sharp fall in the efficiency of signal and information propagation. This decr...
span lang="EN-US">Internet of healthcare things (IoHT) represents a burgeoning field that leverages pervasive technologies to create technology driven environments for healthcare professionals, thereby enhancing the delivery of efficient healthcare services. In remote and isolated areas, such as rural communities and boarding schools, access to hea...
Presents corrections to the paper, Corrections to “SSDWSN: A Scalable Software-Defined Wireless Sensor Networks”.
The paper puts forward a new broad intelligent architecture, representing desired solutions to the common problems of sensor integration and monitoring in telecommunication networks. Because the sensor layouts are different for each location and there is a diverse range of running requirements, traditional approaches struggle. We propose scalable d...
The paper puts forward a new broad intelligent architecture, representing desired solutions to the common problems of sensor integration and monitoring in telecommunication networks. Because the sensor layouts are different for each location and there is a diverse range of running requirements, traditional approaches struggle. We propose scalable d...
In multi-hop wireless sensor networks (WSNs), sensors operate autonomously and independently make routing decisions. However, these devices are often located in remote or inaccessible areas and have limited energy and memory resources. As the network scales, efficient management to conserve resources and extend its lifetime becomes increasingly cha...
Mobile Ad Hoc Networks (MANETs) are dynamic networks without fixed infrastructure, making them particularly vulnerable to security threats such as black and gray hole attacks. As these attacks grow more sophisticated, advancing detection methods become critical. This survey critically evaluates existing detection techniques and identifies major gap...
Mobile ad hoc networks (MANETs) face significant challenges in maintaining secure and efficient communication owing to their dynamic nature and vulnerability to security threats. Traditional routing protocols often struggle to adapt to rapidly changing topologies and potential malicious nodes, compromising network performance and security. This stu...
Autonomous underwater vehicles (AUVs) have become attractive and essential for underwater search and exploration because of the advantages they offer over manned underwater vehicles. Hence the need to improve AUV technologies. One crucial area of AUV technology involves efficiently solving the path planning problem. Several approaches have been ide...
Teaching lower school mathematic could be easy for everyone. For teaching in the situation that cannot speak, using sign language is the answer especially someone that have infected with vocal cord infection or critical spasmodic dysphonia or maybe disable people. However, the situation could be difficult, when the sign language is not understandab...
The vehicular ad hoc network (VANET) is a potential technology for intelligent transportation systems (ITS) that aims to improve safety by allowing vehicles to communicate quickly and reliably. The rates of merging collision and hidden terminal problems, as well as the problems of picking the best match cluster head (CH) in a merged cluster, may em...
There are many resources for media learning in online learning that all of the teachers made many media which it made a problem if there have the same subject and material. This problem made online learning having a big database and many materials made useless because the material has the same purpose. The big problem in overload database is that o...
many universities use online learning as media learning that each material of media which includes videos, textual content, or audio may be given remarks from college students. The lecture desires to recognize approximately the feelings of college students which include happy, disappointed, or unhappy when they accessed the media and instructors ge...
Software-Defined Networking (SDN) is a computer network technology that physically separates the traditional switch architecture’s control and data planes into two separate systems enabling the configuration of SDN compliant devices to become centralised and independent via the SDN controller. Essentially, the separation simplifies an administrator...
Water, mostly oceans, covers over two-third of the earth. About 95% of these oceans are yet to be explored which includes 99% of the sea-beds. The introduction of the Internet of Underwater Things (IoUT) underwater has become a powerful technology necessary to the quest to develop a SMART Ocean. Autonomous Underwater Vehicles (AUVs) play a crucial...
Water, mostly oceans, covers over two-third of the earth. About 95% of these oceans are yet to be explored which includes 99% of the sea-beds. The introduction of the Internet of Underwater Things (IoUT) underwater has become a powerful technology necessary to the quest to develop a SMART Ocean. Autonomous Underwater Vehicles (AUVs) play a crucial...
The introduction of the Internet of Underwater Things (IoUT), an extension of the Internet of Things (IoT) underwater has become powerful technology necessary to develop the Smart Oceans. Autonomous Underwater Vehicles (AUVs) play a crucial role in the Internet of IoUT technology largely because of their mobility and longer energy storage. However,...
Blockchain provides a distributed digital ledger platform for not only cryptocurrencies but also many other distributed applications. Blockchain platforms work flow and performance are controlled by the used consensus algorithms. Although many studies evaluated cryptocurrency from the Shariah perspective, they focused only on the cryptocurrency con...
Cryptocurrency has emerged as the most promising digital asset, which serves as a medium of exchange with distributed control and highly secured financial system. This lead to an increase in stakeholders’ interest in digital currency investment. The cryptocurrencies majorly involve two phases including Initial Coin Offering (ICO) and blockchain cre...
Nowadays, both academia and industries has been actively conducting research and development of Underwater Wireless Sensor Networks (UWSNs) to support various widely available application such as oil/gas monitoring system, tsunami monitoring, disaster prevention and environment monitoring. However, developing an efficient communication in UWSNs is...
The mobile navigation services in an obstructed areacan be extremely challenging especially if the Global PositioningSystem (GPS) is blocked. In such conditions, users will find itdifficult to navigate directly on-site. This needs to use inertialsensor in order to determine the location as standalone, low costand ubiquity. However, the usage of acc...
Nowadays, research and development of Underwater Wireless Sensor Networks (UWSNs) widely supporting various available application such as oil/gas monitoring system, tsunami monitoring, disaster prevention, and environmental monitoring has become increasingly popular among academicians and industries. However, to develop efficient communication in U...
Underwater Wireless Sensor Network (UWSN) is one of the promising technologies having a wide range of applications, which includes underwater natural resources exploration, marine life study and underwater pipeline monitoring. Due to the harsh underwater environment, it is very challenging to provide an energy-efficient mobility-aware routing proto...
MAC design in a vehicle network is a challenging task due to high node speed, frequent topology changes, lack of infrastructure, and different QoS requirements. Several medium access control protocols based on Time Division Multiple Access (TDMA) have recently been suggested for VANETs in an effort to guarantee that all cars have sufficient time to...
Software-Defined Networking (SDN) is an emerging network architecture that promises to simplify network management, improve network resource utilization, and boost evolution and innovation in traditional networks. SDN allows the abstraction and centralized management of the lower-level network functionalities by decoupling the network logic from th...
Currently, the Underwater Sensor Networks (UWSNs) is mainly an interesting area due to its ability to provide a technology to gather many valuable data from underwater environment such as tsunami monitoring sensor, military tactical application, environmental monitoring and many more. However, UWSNs is suffering from limited energy, high packet los...
The different of memory specification mobile devices or smart phone make it hard for developer to establish a resampling in emergency rescue location for specific smart phone. It took much time for developer to develop it. In this paper, we will introduce a good solution for developer to develop a resampling algorithm for different mobile devices o...
The range of memory specifications of location aware shopping assistance poses difficulties for the developer (in terms of increased time and effort) when it comes to developing a resampling algorithm for mobile devices. Thus, a new resampling algorithm is required with a flexible capacity that would cater for a range of computing device memory dev...
Online payment system have recently emerged as one of the available payment methods in purchase of goods and services over the Internet. However the acceptance of this system by users is not fully achieved because of concern about the system security and how its manages the privacy of user information. One of the most challenging issues associated...
The range of memory specifications of mobile pedestrian navigation systems poses difficulties for the developer (in terms of increased time and effort) when it comes to developing a resampling algorithm for mobile pedestrian navigation devices. Thus, a new resampling algorithm is required with a flexible capacity that would cater for a range of com...
The phenomenon of sample impoverishment during particle filtering always contribute computation burden to the inertial-based mobile IPS systems. This is due to the factor of noise measurement and number of particle. Usually, the special strategies resampling algorithms was used. However, these algorithms just can fit in certain environment. This ne...
The restrictions that are related to using single distribution resampling for some specific computing devices’ memory gives developers several difficulties as a result of the increased effort and time needed for the development of a particle filter. Thus, one needs a new sequential resampling algorithm that is flexible enough to allow it to be used...
This study presents a Computerised Heart Diagnostic System (CHDS) for classifying the different types of heart sounds. A major part of cardiac diagnosis consists of cardiac auscultation. In this study, we developed a simple model, which generates signals for heart sounds. This model could help in identifying the features for assisting in cardiac di...
ihak pentadbir dan pengurus pelajar asrama sering melaporkan statistik masalah yang dihadapi oleh pelajar berdasarkan rekod kes yang berlaku. Kes yang terpencil ini tidak boleh digeneralisasikan kerana ia tidak melambangkan masalah populasi pelajar yang sebenar. Statistik yang dilaporkan adalah tidak sah dan tidak boleh dipercayai. Malah data yang...
Outdoor experiential training is a popular technique in nurturing team effectiveness, particularly among the young. The distinctive characteristic of this technique is for the participants to be immersed in experiential learning, allowing them to apply leadership and team development concepts. This study aimed at investigating the effectiveness of...
Unique characteristic of underwater environments is challenging for wireless sensor network protocol. Opportunis- tic routing protocol is the most promising routing method to encounter the challenges. This paper will review three main algorithms; forwarding set selection and forwarding set ranking algorithms to handle FSR problem, void handling alg...
The aggressive deployment of 2.4 GHz unlicensed band in different technologies has introduced the challenge of co-existence of multiple networks in the same vicinity. The CSMA/CA protocol provides protection against co-channel interference by sensing the medium before sending the data. This is available only to the networks that employ CSMA/CA such...
Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic...
The simulation results of different runs with different traffic loads.
(PDF)
The simulation results of different runs with different number of nodes.
(PDF)
In high mobility and high traffic load network situations, the delay time is affected with high end-to-end delay in reactive routing protocols such as AODV. In this paper we proposed an enhanced receiver-based AODV (ERB-AODV) routing protocol by improving the maintenance phase in AODV. ERB-AODV protocol focuses on decreasing the end-to-end delay an...
Cardiovascular disease (CVD) is among the leading life threatening ailments [1] [2].Under normal circumstances, a cardiac examination utilizing electrocardiogram appliances or tools is proposed for a person stricken with a heart disorder. The logging of irregular heart behaviour and morphology is frequently achieved through an electrocardiogram (EC...
When an emergency occurs in a building, congestion avoidance becomes a very serious localisation issue, which is often ignored. If the emergency involves the outbreak of fire, the rescue team must establish the easiest and quickest exit route from the building. Any delay could be very dangerous, potentially even resulting in fatalities. To avoid co...
Congestion avoidance in emergencies is one of many overlooked localization issues.
During an emergency (such as a fire), it is difficult for rescuers to determine the best exit
route when inside a building. Any time delay during decision making can risk loss of life.
Therefore, an efficient Emergency Rescue Localization (ERL) system is essential to...
When Global Positioning Systems are obstructed, standalone pedestrian tracking can be very daunting. Users in such obstructed environments (especially in home environments) will find it difficult to perform on-site navigation. It is important to create a standalone pedestrian tracking system that provides better location determination services with...
Congestion avoidance in emergency situations is among one of many overlooked localization issues. During emergency situations (such as fires), sometimes the rescuers find it hard to find the best exit route from the inside to the outside of a building. Any time delay in decision making will risk the loss of lives. Therefore, an efficient Emergency...
Originally TCP was designed for early, low bandwidth, short distance networks, so Standard TCP did not utilize the maximum bandwidth in today’s high bandwidth network environments. Therefore a lot of TCP congestion control mechanisms also known as TCP variants have been developed for today’s long distance high bandwidth networks. In this paper the...
The location determination in an obstructed area can be extremely challenging particularly when the Global Positioning System (GPS) is blocked. When this happens, users will encounter difficulty in navigating directly onsite, especially within an indoor environment. Occasionally, there is a need to integrate with other sensors in order to establish...
Electronic control units (ECUs) of a vehicle control the behavior of its devices—e.g., break and engine. They communicate through the in-vehicle network. Vehicles communicate with other vehicles and road side units (RSUs) through vehicular ad-hoc networks (VANets), with personal devices through wireless personal area networks (WPANs), and with serv...
This paper introduces a new grey-world-based feature detection and matching algorithm, intended for use with mobile positioning systems. This approach uses a combination of a wireless local area network (WLAN) and a mobile phone camera to determine positioning in an illumination environment using a practical and pervasive approach. The signal combi...
A wheelchair navigation system have emerged in response to high demand for mobile location-aware applications. Nevertheless, single localization technology have several limitations and vulnerabilities; to provide a universal localization solution for various environment. In this paper, we present our new new feature detection and matching algorithm...
The location determination in an obstructed area can be extremely challenging especially if the Global Positioning System (GPS) is blocked. In such conditions, users will find it difficult to navigate directly on-site, especially within an indoor environment. Occasionally, this needs to integrate with other sensors in order to determine the locatio...
Many routing protocols have been proposed to enhance the performance of Mobile Ad Hoc Networks (MANETs) for various applications. This paper proposes a receiver-based Ad Hoc On-demand Distance Vector (RB-AODV) routing protocol to support high traffic load applications. In RB-AODV, we use the destination node to update the source node with the avail...
Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of our lives. Security vulnerabilities in these systems could cause financial losses, privacy/safety compromises, and operational interruptions. This paper demonstrates through examples, that techn...
Due to the significant advances of wireless sensor networks (WSNs), researchers are eager to use this technology in the subsea applications. Because of rapid absorption of high radio frequency in the water, acoustic waves are used as communication medium, which pose new challenges, including high propagation delay, high path loss, low bandwidth, an...
The location determination in obstructed area can be very challenging especially when the Global Positioning System is blocked. Disable users will find it difficult to navigate directly on-site in such condition, particularly in obstructed environment. Sometimes, it needs to integrate with other sensors and positioning methods in order to determine...
A various technologies have emerged in response to high demand for mobile location-aware applications. Nevertheless, single localization technology have several limitations and vulnerabilities; to provide a universal localization solution for various environment. In this paper, we present our new mobile indoor localization algorithm using inverse i...
A various technologies have emerged in response to high demand for mobile location-aware applications. Nevertheless, single localization technology have several limitations and vulnerabilities; to provide a universal localization solution for various environment. In this paper, we present our new mobile indoor localization algorithm using inverse i...
Almost two-third of earth covered by water. However, human knowledge about underwater is very negligible in comparison to land. The high pressure and harsh environment of underwater have been converted it to unknown and mysterious area for human. There are various methods to collect data from deep sea. However, in the recent years, researcher was i...
This paper present our mobile u-navigation system. This approach utilizes
hybridization of wireless local area network and Global Positioning System
internal sensor which to receive signal strength from access point and the same
time retrieve Global Navigation System Satellite signal. This positioning
information will be switched based on type of e...
Vehicular Ad Hoc Networks (VANETs) is a type of ad hoc network that allows vehicles to communicate with each other in the absence of fixed infrastructure. Inter-vehicle geographic routing has been proven to perform well in high speed vehicular environments. In connected and reliable vehicular scenarios, greedy based geographical routing protocols c...
This paper present our color constancy investigation in the hybridization of
Wireless LAN and Camera positioning in the mobile phone. Five typical color
constancy schemes are analyzed in different location environment. The results
can be used to combine with RF signals from Wireless LAN positioning by using
model fitting approach in order to establ...
This paper present our new intensity chromaticity space-based feature
detection and matching algorithm. This approach utilizes hybridization of
wireless local area network and camera internal sensor which to receive signal
strength from a access point and the same time retrieve interest point
information from hallways. This information is combined...
The location determination in obstructed area can be very challenging especially if Global Positioning System are blocked. Users will find it difficult to navigate directly on-site in such condition, especially indoor car park lot or obstructed environment. Sometimes, it needs to combine with other sensors and positioning methods in order to determ...
The location determination in obstructed area can be very challenging especially if Global PositioningSystem are blocked. Users will find it difficult to navigate directly on-site in such condition, especiallyindoor car park lot or obstructed environment. Sometimes, it needs to combine with other sensors andpositioning methods in order to determine...
This paper describes a new and simple motion planning method to find a path between start and goal configurations for an articulated robot using the foraging ant strategy, F-Ant. Observation by an ant looking from its current position to the target location will help to reduce the steps taken to get to the goal. While most of the previously develop...
A new approach to robot motion planning is proposed by applying ant colony optimization (ACO) with the probabilistic roadmap planner (PRM). The aim of this approach is to apply ACO to 3-dimensional robot motion planning which is complicated when involving mobile 6-dof or multiple articulated robots. An ant colony robot motion planning (ACRMP) metho...
Many different approaches to tackle the problem of motion planning for articulated robots in an environment with obstacles based on random sampling have been proposed. One popular approach is called single-query bi-directional motion planning with a lazy collision checking probabilistic road map (SBL-PRM). However, the performance of this method is...
A new approach to robot motion planning is proposed by applying ant colony optimization with the probabilistic roadmap planner (PRM). The PRM is a path planning method that consists of capturing the connectivity of the robot's free space in a network called the roadmap. An ant colony robot motion planning (ACRMP) method is proposed that takes the b...
Questions
Question (1)
NS2, OMNET++, etc are the common simulators for terrestrial networks. However, they are less capable to simulate the underwater wireless environment. What is the best simulator (open source) available?