
Rudzidatul Akmam Dziyauddin- PhD in University of Bristol, UK
- Professor (Associate) at University of Technology Malaysia
Rudzidatul Akmam Dziyauddin
- PhD in University of Bristol, UK
- Professor (Associate) at University of Technology Malaysia
About
93
Publications
70,080
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
814
Citations
Introduction
I'm currently a lecturer in UTM Razak School, UTM Kuala Lumpur. I received my PhD from University of Bristol, UK. I did a year internship in Toshiba Research Europe Limited (TREL), UK and worked as an Engineer in Celcom for 4 years. I had involved in many local and international projects, such as Prepaid, 3G , GPRS, Faramir and Distributed Antenna System.
Currently, I have several interesting projects and I'm looking for dedicated students to work with me. email: rudzidatul.kl@utm.my
Current institution
Publications
Publications (93)
In iris biometric recognition systems, protecting the storage and transmission of iris templates is crucial, and template protection techniques are pivotal for ensuring their security. A prevalent approach involves using indexing methods as an effective algorithm for iris template protection, leveraging the index or rank of the extracted iris code...
Over the past years, Fall Detection System (FDS) has undergone extensive research to improve living risk, especially for the elderly who are vulnerable to these fall events. Devices employing sensors are crucial components of FDS in achieving high accuracy and sensitivity. This article overviews different sensor modalities, such as ambient-based an...
Healthcare monitoring systems in hospitals and other health facilities have grown significantly, and portable healthcare monitoring systems using emerging technologies such as Internet of Things (IoT) technologies have aided the advancement of healthcare monitoring systems. Many studies have focused on intelligent healthcare systems in an IoT conte...
Presents corrections to the paper, A Comprehensive Review on Wireless Healthcare Monitoring: System Components.
Smart healthcare is growing significantly in the healthcare sector due to the Internet of Things. A remote monitoring system is one of the smart healthcare implementations for rehabilitating stroke patients. Nowadays, as the COVID-19 pandemic continues tospread, patients undergoing home rehabilitation have difficulty meeting with their physicians d...
This paper discusses an extended modulation mapping technique to improve hybrid automatic repeat request (ARQ) protocols by reducing communication errors in wireless systems. The extended mapping (EM) hybrid ARQ (HARQ) protocol has been developed using irregular repetition code with turbo processing. This protocol uses EM and ARQ to improve efficie...
The healthcare industry has been transitioning from paper-based medical records to electronic health records (EHRs) in most healthcare facilities. However, the current EHR frameworks face challenges in secure data storage, credibility, and management. Interoperability and user control of personal data are also significant concerns in the healthcare...
This qualitative study aimed to explore the current status, practices, and challenges of Internet of Things (IoT) implementation and to develop an IoT framework for Industry 4.0 in Malaysia. Industry 4.0 enhances a company’s manufacturing competitiveness and efficiency. However, the implementation of Industry 4.0 in Malaysian small- and medium-size...
A peer-to-peer (P2P) decentralized information-sharing network is used to share data and maintain security, privacy, and integrity standards called blockchain. In this case, information sharing and updating require regular simplification. The presented systematic review mainly focuses on the interoperability of electronic health records (EHRs) usin...
Nowadays, smart health has been developing in the healthcare system by implementing the Internet of Things. One of the implementations of smart health is remote monitoring systems for rehabilitating patients such as stroke. Today, with the rising Covid-19 pandemic, patients undergoing rehabilitation at home have difficulties meeting with their doct...
Microstrip antennas are one of the most widely used types of antennas in various applications in communication systems. However, microstrip antenna experiences imbalance impedance, which in turn affects the performance of the antenna with narrow bandwidth as well as reducing the radiation emission of the radio wave. Therefore, in this paper increas...
The timing of traffic lights at intersections is determined by the Local Authority. It is based on the peak hour statistics and the timing is maintained even during an off-peak hour. This one standard green time will be used every time in a day regardless of the number of vehicles and the road width. This approach will have a long green traffic lig...
The past decade has witnessed the widespread adoption of Cloud Computing (CC) across automotive industries for a myriad of vehicular applications. A vehicular network that solely relies on CC, however, is susceptible to end-to-end latency due to the round-trip between data sources and cloud servers. Alternatively, the computing capability has been...
p>CubeSat is a small-sized satellite that provides a cheaper option for the manufacturer to have a fully operational satellite. Due to its size, CubeSat can only generate limited power, and this will restrict its functionality. This research aims to improve CubeSat’s power consumption by implementing the dynamic voltage and frequency scaling (DVFS)...
The minimization of tail latency is especially crucial in user interfacing services and fast responding apps. The literature on the datacenter load balancing protocols contains of many protocols but works discussing tail latency are scarce. This work proposes a novel variant of the Multi-Level Dynamic Traffic Load Balancing (MDTLB) protocol for a d...
The use of mobile communication is growing radically with every passing year. The new reality is the fifth generation (5G) of mobile communication technology. 5G requires expensive infrastructural adjustment and upgradation. Currently, Pakistan has one of the most significant numbers of biometrically verified mobile users. However, at the same time...
The localisation and positioning in Wireless Sensor Node (WSN) are prone to tracking loss because of battery depletion resulted from high power consumption. Considering this, Energy Harvesting (EH) is a significant factor to ensure the sustainability of WSN trackers. Therefore, the key objective of the paper is to review the existing EH approaches,...
Information and Communication Technology (ICT) is an important driver for socio-economic innovation, and a promising tool for better managing future risk in a changing climate. ICT technology has been widely applied to support disaster management cycles (prevention/mitigation, preparedness, response, and recovery/rehabilitation). This paper present...
The productivity and profitability of poultry farming are crucial to support its affordability issues in food security. Criteria in productivity measurement, including Feed Conversion Ratio (FCR) calculation, whereas economic management is essential for profitability. Hence, best management practices need to be implemented throughout the growth per...
WLAN indoor positioning system (IPS) has high accurate of position estimation and minimal cost. However, environmental conditions such as the people presence effect (PPE) greatly influence WLAN signal and it will decrease the accuracy. This research modelled the effect of people around user on signal strength and the accuracy. We have modelled the...
Cloud computing is a growing demand that allows a business
to drive their goals using good Information Technology (IT).
The tremendous increased in computing resources usage
introduce several challenges to IT service providers. One of
the key issues is the high energy consumption of the data
centres. Virtualization has been used as a technique to r...
Digital medical images have become a vital resource that supports decision-making and treatment procedures in healthcare facilities. The medical image consumes large sizes of memory, and the size keeps on growth due to the trend of medical image technology. The technology of telemedicine encourages the medical practitioner to share the medical imag...
Localisation can be defined as estimating or finding a position of the node. There are two techniques in localisation, which are range-based and range-free techniques. This paper focusses on the Received Signal Strength Indicator (RSSI) localisation method, which is categorised in a range-based technique along with the time of arrival, time differe...
The objective of this paper is to investigate the application of the cross-correlation technique in localizing the leakage in Acrylonitrile Butadiene Styrene (ABS) pipeline using wireless three-axis vibration sensors. Most of the existing leak localization techniques that utilized the cross-correlation method is using acoustic and pressure sensors....
Autonomous Vehicles (AVs) generated a plethora of data prior to support various vehicle applications. Thus, a big storage and high computation platform is necessary, and this is possible with the presence of Cloud Computing (CC). However, the computation for vehicular networks at the cloud computing suffers from several drawbacks, such as latency a...
span>Fiber-based wireless system has become a promising solution as a cost- effective communication and it offers high capacity network with millimeter- wave (mm-wave) signal transmission. The system significantly offers superior possible bandwidths for both fiber and free-space applications. Hence, with the increased capacity as well as wireless m...
Water pipeline leakage detection is still an important issue, particularly for the development of smart cities. Thus, this paper reviews water pipeline leakage detection techniques, which can be classified into three different categories, namely software-based, hardware-based and conventional methods. We compare the advantages and disadvantage for...
Natural flood disasters frequently happen in Malaysia especially during monsoon season and Kuala Kangsar, Perak, is one of the cities with the frequent record of natural flood disasters. Previous flood disaster faced by this city showed the failure in notifying the citizen with sufficient time for preparation and evacuation. The authority in charge...
They were once called the baby boomers, born between 1946 to 1964, but now aged above 50 years old, they contribute to the increasing number of elderly population in Malaysia. Age classification for elderly people varies between countries but commonly pre-elderly people is defined as those aged between 50 to 64 years old while those aged more than...
This paper highlights the fundamentals of the strong candidate Power Domain Non-Orthogonal Multiple Access (PD-NOMA) technique, and how it can best fit the requirements of fifth Generation (5G) in practical applications. PD-NOMA ensures flexibility in radio resource to improve user's access performance. Multiple users share the same radio resources...
This paper analyses the performances of the Infinite Impulse Response (IIR) and Finite Impulse Response (FIR) filters. By studying the relationship between filter responses with filter orders and delay, the goal is to choose feasible filters that can accommodate more carriers in a bandwidth thus, the spectral efficiency can be increased. For IIR fi...
Growing number of vehicles in recent years has an impact to road capacity and parking spaces. Even with support of an efficient public transport, some users prefer to use their personal vehicles. Hence, it resulted in lack of parking space in public areas. Looking for parking spaces is time, money and fuel consuming and causes unnecessary stress to...
Pipeline leakages in water distribution network (WDN) is one of the prominent issues that has gain an interest among researchers in the past few years. Time and accuracy play an important role in leak localization as it has huge impact to the human population and economic point of view. The complexity of WDN has prompt numerous techniques and metho...
Previous studies have proposed vibration of the water pipeline using accelerometer sensors as a mechanism to detect leaks. Nevertheless, they only relied on a single x-axis data, no single study investigates all the axes of the sensors. Therefore, this paper aims to investigate a vibration technique to detect leakage on plastic water pipeline using...
The movement of the aircraft pitch is very important to ensure the passengers and crews are in intrinsically safe and the aircraft achieves its maximum stability.The objective of this study is to provide a solution to the control system that features particularly on the pitch angle motion of aircraft systemin order to have a comfort boarding. Three...
Network lateral movement or simply called lateral movement is the latest techniques used by cyber attackers to progressively move through a network while they search and gathered key information data to be used for their cyber-attacks. The best defense mechanism to neutralize this attack method is by correlating data from various sources to reveal...
To a developing country, sustaining a consistent
water supply for industrial and domestic usages is a great
challenge. In Malaysia, this can be demonstrated by the
alarming rate of the Non-Revenue Water (NRW), which is >30%
and this is greater than the recommended NRW by the World
Bank. Therefore, this paper highlights several causes that lead
to t...
Energy harvesting (EH) module for wireless sensor network has become a promising feature to prolong the conventional battery inside the devices. This emerging technology is gaining interest from sensor manufacturers as well as academicians across the globe. The concept of employing EH module must be cost effective and practical. In such, the use of...
Leaking pipes are a primary concern for water utilities around the globe as they
compose a major portion of revenue loss. An acoustic method is preferred by the water
industry to detect and localise leaks in water pipelines. However, the acoustic leak
detection method is only feasible for metal pipes and has several limitations when applied
to soft...
The road traffic volume is the main criteria in the road planning and traffic management. Previous studies have discussed on the smart traffic monitoring, and little attention has been paid to the solution of smart traffic control. The objective of this paper is to propose a smart traffic monitoring and control architecture and also the respective...
Maintaining high quality of service (QoS) for sensor nodes is important in industrial wireless sensor networks (IWSNs). Wide range of factors severely affects QoS; however more research is still needed. In this article, a flexible online multi-objective optimization framework (FOMOF) in carrier sense multiple access with collision avoidance (CSMA/C...
Allocating resources to WiMAX (Worldwide Interoperability for Microwave Access) users in a rectangular region is often known as burst mapping. The WiMAX standard only specifies a horizontal-strip-based mapping for uplink transmission; the downlink (DL) mapping is not specified. Previous studies have proposed various solutions for DLs, and yet, only...
Wireless sensor communication has been an accelerating trend for industrial automation in controlling and monitoring processes. A variety of technologies has also emerged in fulfilling the industrial requirements. The ISA100.11a is an industrial technology to provide a vast range of industrial applications. Inevitably, scheduling schemes have a key...
Soft Frequency reuse (SFR) has been used as a method to reduce the inter-cell interference between cell edge user and cell center users. With a proper adjustment of the system, it can gives us the best throughput of the SFR. The objective of this study is to optimize the three parameters of the SFR obtained from Taguchi model. These three parameter...
Monitor and control traffic conditions are
important in intelligent transport systems to reduce congestion,
especially at intersections. The approach is needed to reduce the
negative effects of the congestion at junctions and steps taken to
control traffic at the intersection. The project identifies the
number of cars through video image detection...
Integrated research on biosphere as a result of human and natural activities in the tropics is very challenging. This paper presents multi-inter-trans-disciplinary (MIT) research initiatives carried out by TRANSROYAL focusing on the terrestrial- and aquatic ecosystem including human livelihoods in the Royal Belum-Temengor Forest Complex, Perak. Des...
Integrated research on biosphere as a result of human and natural activities in the tropics is very challenging. This paper presents multi-inter-trans-disciplinary (MIT) research initiatives carried out by TRANSROYAL focusing on the terrestrial- and aquatic ecosystem including human livelihoods in the Royal Belum-Temengor Forest Complex, Perak. Des...
An effective teaching and learning using Information and Communication Technology (ICT) is necessary to facilitate students to the easy access world of knowledge. The use of ICT essentially leads to significant impact on a condusive learning environment and also on the students’ achievements. In Malaysia, the students come from different backgro...
University Teknologi Malaysia (UTM) is recognized as the largest engineering-based university and promoted leading-edge research, with a vision to educating technologists and professionals, towards the development of creative human resources and advanced technological innovations in Malaysia.
UTM has taken a step forward to address the local, natio...
Managing supply chain is important for every organization because it has become a major element in a global economy. The supply chain is a primary system that moves the products or services from supplier to customer. Poor performance in delivering the services will essentially affect customer satisfaction. Previous studies have shown the effects of...
Quality of Service is particularly necessary to serve delay-sensitive applications in heavy-loaded wireless networks.
In this paper we evaluate a strategy of combining packet dropping and scheduling policies at Medium Access Control layer in guaranteeing maximum packet latency for real-time applications. The purpose of this work is to evaluate how...
This paper presents a development of water pipeline monitoring system using vibration sensor. The MPU6050 sensor is selected to measure the vibration occurred along the pipes. In this study, the water pipeline used is high pressure pipe, an inch of the Acrylonitrille Butadience Styrene (ABS) pipe size with 10 meters length. The Arduino controller b...
This paper proposes a low complexity joint source-channel coding (JSCC) technique that can well exploit two-dimensional (2D) source correlation using turbo single parity check (SPC) codes. Based on similar structure of the product accumulate code, a rate-1 inner code is serially concatenated to the turbo SPC code structure in order to overcome the...
This paper presents a numerical study to quantify the benefits of using Radio Environment Maps (REM) within resource management techniques. To date, there are no REM studies established to benchmark the impact of REM models and their accuracy for inter-cell interference coordination (ICIC) within multi-channel systems, such as based on OFDMA (Ortho...
Inter-Cell Interference (ICI) is a challenging problem for the next generation wireless systems which limits the system performance, especially for users located at the edge of a cell. In this paper, in order to achieve good user fairness, each user is given a guaranteed minimum number of resource blocks while the cell edge users were given a highe...
This paper proposes an adaptive soft frequency reuse (SFR) scheme with the goal of improving the cell-edge performance as well as the overall cell throughput. The proposed scheme is effective, flexible and cell environments adaptive. Specifically, we consider both consecutive and distributed subcarrier allocation for cell-edge users, and use the Qo...
This paper investigates the effectiveness of dynamic resource allocation scheme in WiMAX (Worldwide Interoperability for Microwave Access) system following to the WiMAX standard. Simulation experiments are performed for the case of MAC PDU (Media Access Control packet data unit) without fragmentation and numerically expanded for the fragmentation c...
In cases when system load approaches capacity (>90% of capacity), scarce radio resources are wasted when a scheduler serves video packets that exceed a required latency, as the decoder will ultimately discard any such packets. In this paper, we introduce a combination of a packet-dropping policy with a modified Greedy-based scheduler to guarantee m...
WiMAX promises an advanced framework to support Quality-of-Service (QoS) requirements of different types of applications and scheduling is a key part in its QoS provisioning. The scheduling algorithms used in this paper are based on our proposed Greedy-Latency scheduler, a modified form of Greedy algorithm which can guarantee delay requirements of...
WiMAX, based on the IEEE 802.16 standard, is designed to support a variety of applications, including voice and multimedia services, through scalable OFDMA, advanced antenna techniques supporting MIMO, and well-defined quality of service classes. This paper presents WiMAX downlink achievable user goodput and operating range for different modulation...
WiMAX performance evaluation considering different scheduling techniques has received considerable attention by WiMAX researchers and also WiMAX operators. The standard does not define MAC scheduling although it affects the overall QoS performance of users as well as the achievable total cell goodput. The primary goal of this paper is to compare th...