Salman Yussof

Salman Yussof
Universiti Tenaga Nasional (UNITEN) | uniten · Department of Systems and Networking

Doctor of Philosophy

About

120
Publications
53,598
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
960
Citations
Citations since 2016
67 Research Items
797 Citations
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150

Publications

Publications (120)
Article
Full-text available
Since LiFi and WiFi do not interfere with one another, a LiFi/WiFi hybrid network may provide superior performance to existing wireless options. With a large number of users and constant changes, a network can easily become overloaded, leading to slowdowns and fluctuations in data transfer speeds. Handover (HO) increases significantly with an incre...
Article
Full-text available
Due to the COVID-19 pandemic, intensive controls were put in place to prevent the pandemic from spreading. People's habits have been altered by the COVID-19 measures and restrictions imposed such as social distance and lockdown measures. These unexpected changes created a significant impact on cellular networks, such as increased use of online serv...
Article
Full-text available
Artificial intelligence plays an essential role in the medical and health industries. Deep convolution networks offer valuable services and help create automated systems to perform medical image analysis. However, convolution networks examine medical images effectively; such systems require high computational complexity when recognizing the same di...
Article
Full-text available
This research aims to provide a comprehensive background on social distancing as well as effective technologies that can be used to facilitate the social distancing practice. Scenarios of enabling wireless and emerging technologies are presented, which are especially effective in monitoring and keeping distance amongst people. In addition, detailed...
Chapter
Data sharing is a process of interchanging data among multiple data sources in a controllable access manner. Successful data sharing of information belong to public depends on public support. Analyzing household electric consumption data and user behaviour profile based on household electricity demand are also vital to enhance energy efficiency in...
Chapter
This paper presents an IoT based real-time water quality monitoring system for swimming pools. For most swimming pools, the maintenance work is done based on fixed schedule irrespective of the water quality condition. This may cause some issues, such as unnecessary waste of water in the case of over maintenance. In the case of under maintenance, th...
Article
Internet of Things (IoT) is a potential technology to be used for data collection tasks in real-world environments. However, due to the difficulty of deploying and testing a real IoT implementation, many researchers end up having to use software simulation to evaluate their proposed techniques. This paper focuses on the use of IoT for collecting fl...
Article
Full-text available
Mobility is one of the important issues in Mobile Ad hoc Networks (MANET). By definition, MANET nodes are free to move around and this may cause difficulty in routing. MANET routing protocols must consider this factor when making routing decision. Zone Routing Protocol (ZRP) is a hybrid routing protocol, which utilizes the proactive and reactive ro...
Article
Full-text available
Mobile Ad hoc Network (MANET) is a network that consists of several nodes that connect without using a permanent infrastructure. Each node in MANET moves inside and outside of the network freely and randomly. The free and random movements of nodes may cause the topology of the network to change constantly. Therefore, the task of finding routes betw...
Article
Full-text available
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations p...
Chapter
Forensic age estimation is usually requested by courts, but applications can go beyond the legal requirement to enforce policies or offer age-sensitive services. Various biological features such as the face, bones, skeletal and dental structures can be utilised to estimate age. This article will cover how modern technology has developed to provide...
Article
Telemedicine is one of the medical services related to information exchange tools (eHealth). In recent years, the monitoring and classification of acoustic signals of respiratory-related disease is a significant characteristic in the pulmonary analysis. Lung sounds produce appropriate evidence related to pulmonary disorders, and to assess subjects...
Chapter
Due to the offering of many benefits, blockchain is a useful environment to build many applications in multiple fields such as cryptocurrency, Internet of Things (IoT), mobile applications and healthcare industry. However, it has a problem in ensuring the privacy of user data due to its public nature. Data on a blockchain is public and can reveal s...
Article
Full-text available
p class="MsoNormal" style="text-align: justify;"> During Hajj, pilgrims suffer from various emergencies that should be managed in a real-time manner thus require deploying emerging technology. Based on our research it is found that the emergency medical circumstances among the pilgrims are due to the criticality level of certain physiological condi...
Chapter
Phishing is the act of sending e-mails pretending to be from genuine financial organizations and requesting private info such as username and password. Information security awareness of phishing attacks becomes the first line of data protection defence. Human factors are recognized as the main factors in addressing the issue of information security...
Article
Full-text available
Recently, cloud computing has appeared as a modern technology used to host and deliver services over the Internet. Business owners see the cloud as an interesting technology because it abrogates the demand for customers to plan ahead for provisioning. In addition, the cloud simplifies infrastructure planning for new companies starting as small busi...
Article
Secure communication in Low power and Lossy Network (LLN) requires the authentication of the identities of nodes for that node to join the network. Since LLN may consist of many different nodes, where some nodes may contain sensitive and subtle information such as military data, monitoring data, or health data, that node needs to be authenticated b...
Article
Full-text available
Due to lack of deployment of information and communication technology (ICT) for real-time pilgrims' health monitoring during Hajj, many pilgrims left untreated, get lost and suffer from severe health problems which sometimes end with injury, traum and even death. WBAN is an emergent healthcare technology and can be deployed at Hajj ritual sites for...
Article
Full-text available
IEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the most common attacks which has a catastrophic impact o...
Article
Full-text available
Due to the hardship of expedition, instability, and fluctuation of rough weather, continuous walking, hassle and mental stress during the Hajj at Makkah in Saudi Arabia, many pilgrims get injured, sick and tired. Besides, those who are suffering from various chronic diseases may also contract severe heart, chest, abdominal, and kidney diseases alon...
Article
Full-text available
Hajj pilgrimage has been the focus of public health initiatives for centuries because it is one of the biggest and oldest annual mass gatherings in the world. But a little is done to objectively monitor pilgrims’ health during Hajj who has been suffering from infectious and chronic diseases. The main objective of this study is to identify the techn...
Article
Full-text available
Flood disaster is one of the most frequent natural disasters that occur all around the world. For flood prone areas or countries, flood management is an essential part of their governance. In recent years, there has been an increasing use of Information Technology (IT) to facilitate in flood management. For example, the use of sensors to measure hy...
Article
Full-text available
Cloud computing is a fascinating and profitable area in modern distributed computing. Aside from providing millions of users the means to use offered services through their own computers, terminals, and mobile devices, cloud computing presents an environment with low cost, simple user interface, and low power consumption by employing server virtual...
Article
Cloud computing is a fascinating and profitable area in modern distributed computing. Aside from providing millions of users the means to use offered services through their own computers, terminals, and mobile devices, cloud computing presents an environment with low cost, simple user interface, and low power consumption by employing server virtual...
Article
Full-text available
With the advent of big data era, it is commendable if this facility could also be a method of problem solving to the environmental issues, disaster management, and geographical sciences. In this research, the study of flood events particularly in Malaysia is using the approach of prescriptive big data analytics. The big data of flood events which i...
Chapter
Full-text available
Data, Information, Knowledge, and Wisdom (DIKW) Hierarchy is represented by a taxonomical pyramid illustrating its significance and the key role played by the sets of data. The pyramid becomes complex when the big data floods out of the storage stream and challenges the wisdom of the hierarchy. The reason is the incompetence of the systems deployed...
Article
Full-text available
Objectives: SCADA systems are turning into the central nerve system of the electric power system critical infrastructure. With the increasing availability and use of computer networks and the Internet as well as the convenience of cloud computing, SCADA systems have increasingly adopted Internet-of-Things technologies to significantly reduce infras...
Article
Cloud computing offers a dynamic provisioning of server capabilities as a scalable virtualized service. Big datacenters which deliver cloud computing services consume a lot of power. This results in high operational cost and large carbon emission. One way to lower power consumption without affecting the cloud services quality is to consolidate reso...
Article
Full-text available
Introduction: Every year 2-3 million pilgrims with different background and most of them are elderly from 184 countries in the world congregate in the holy place 'Haram' at Makkah in Saudi Arabia to perform Hajj. During the pilgrimage, they come across a great deal of rough and tough environment, physical hassle and mental stress. Due to the hardsh...
Chapter
Full-text available
Recent trending in making viral of images, audios and videos via social media had challenged the affected communities to be of selective on the reliability and accuracy of the news disseminated. This had also alerted the communities to be better aware on the disaster incident and assess on the wisdom of the information. This paper is proposing on t...
Article
Full-text available
IEC 61850 is the standard for substation automation which enables substation equipment called Intelligent Electronic Devices (IEDs) to communicate with each other. The communication protocol used by the IEDs to communicate is called GOOSE. Unfortunately, there are security researchers who have identified a number of vulnerabilities in the GOOSE pro...
Conference Paper
Full-text available
Cloud computing is a model for delivering information technology services, wherein resources are retrieved from the Internet through web-based tools and applications instead of a direct connection to a server. The capability to provision and release cloud computing resources with minimal management effort or service provider interaction led to the...
Article
Full-text available
In Iraq, many student abduction cases are reported due to the lack of safety mechanisms and the lack of law enforcement. Educational institutions such as primary schools are looking for a better mechanism to monitor the student attendance so that the safety of the students can be better monitored. Currently, student attendance in schools is done in...
Article
Full-text available
Every year, authorities in Malaysia are putting efforts on disaster management mechanisms including the flood incidence that might hit the east coast of Peninsular Malaysia. This includes the state of Kelantan of which it was reported that flood is just a normal event occurred annually. However, the aftermath was always unmanageable and had left th...
Article
Recently, cloud computing has appeared as a modern technology used to host and deliver services over the Internet. Business owners see the cloud as an interesting technology because it abrogates the demand for customers to plan ahead for provisioning. In addition, the cloud simplifies infrastructure planning for new companies starting as small busi...
Conference Paper
Full-text available
Big data analytics is expected to be of useful approach to many aspects of problem solving. For this research, the authors are trying to utilize this facility for flood disaster management specifically for the state of Kelantan, Malaysia. This research is considering the ordinal type data obtained from the state authorities and proposing on data ma...
Conference Paper
Many cloud security complexities can be concerned as a result of its open system architecture. One of these complexities is multi-tenancy security issue. This paper discusses and addresses the most common public cloud security complexities focusing on Multi-Tenancy security issue. Multi-tenancy is one of the most important security challenges faced...
Article
We propose a computational approach to human identification based on the integration of face and body related soft biometric traits. In previous studies on soft biometrics, several methods for human identification using semantic descriptions have been introduced. Though the results attained exhibit the effectiveness of such techniques in image retr...
Article
Full-text available
Cloud computing is an interesting and beneficial area in modern distributed computing. It enables millions of users to use the offered services through their own devices or terminals. Cloud computing offers an environment with low cost, ease of use and low power consumption by utilizing server virtualization in its offered services (e.g., Infrastru...
Article
Gender recognition from unconstrained face images is a challenging task due to the high degree of misalignment, pose, expression, and illumination variation. In previous works, the recognition of gender from unconstrained face images is approached by utilizing image alignment, exploiting multiple samples per individual to improve the learning abili...