Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aisha-Hassan Abdalla is active.

Publication


Featured researches published by Aisha-Hassan Abdalla.


ieee conference on open systems | 2011

An investigation of femtocell network synchronization

Mohammad Kamrul Hasan; Rashid A. Saeed; Aisha-Hassan Abdalla; Shayla Islam; Omer Mahmoud; Othman Omran Khalifah; Shihab A. Hameed; Ahmad Fadzil Ismail

Currently, Femtocell technology emerged for cellular wireless networks, which has rapidly engrossed cellular industry. The principle of femtocell to the mobile operators is to reduce cost and improve signal quality in indoor coverage which is also considered a possible path to the fixed-mobile convergence (FMC) goal. Femtocell extends network coverage and delivers high-quality mobile services inside residential and business buildings through broadband network, i.e. ADSL. Femtocell access point (FAP) or home base station (HBS) intends to serve small number of users, i.e. 4 users and covers about 30 meter square similar to existing WiFi access points. However, femtocell introduces new challenges to the telecom industries in terms of handoff between femto and macrocells, interference management, localization and synchronization. Among all of these challenges, synchronization is considered corner stone for proper working for femtocell. The problematic issue in femtocell synchronization is that all the data and control traffics travel through IP broadband network. The IP broadband network is usually owned and managed by third party and not by the mobile operator, which is complicated the synchronization. Unsynchronized FAPs may cause harm interferences and wrong handover dictions. In this study we investigate and overview the current femtocell synchronization techniques and compare between them. Possible improvements and recommendation for each method is identified. Proposed schemes and indicated future research areas are also discussed.


international conference on computer and communication engineering | 2012

State-of-the-art digital watermarking attacks

Othman Omran Khalifa; Yusnita Yusof; Aisha-Hassan Abdalla; Rashidah Funke Olanrewaju

Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with the explicit goal of hindering watermark reception. In watermarking terminology, an “attack” is any processing that may impair detection of the watermark or communication of the information conveyed by the watermark. Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. An important aspect of any Watermarking scheme is its robustness against attacks. The notion of robustness is intuitively clear: A watermark is robust if it cannot be impaired without also rendering the attacked data useless. Watermark impairment can be measured by criteria such as miss probability, probability of bit error, or channel capacity. For multimedia, the usefulness of the attacked data can be gauged by considering its perceptual quality or distortion. Hence, robustness can be evaluated by simultaneously considering watermark impairment and the distortion of the attacked data. An attack succeeds in defeating a watermarking scheme if it impairs the watermark beyond acceptable limits while maintaining the perceptual quality of the attacked data. In this paper, JPEG compression (quality 50 and 75), noise (Gaussian noise), distortion (blurring) and contrast enhancement (histogram equalization and intensity adjustment) are testified. Results shown that embedding gain and DWT decomposition subbands were among the contribute against attacks performed.


international conference on computer and communication engineering | 2010

Watermarking in Safe Region of frequency domain using complex-valued Neural Network

Rashidah Funke Olanrewaju; Othman Omran Khalifa; Aisha-Hassan Abdalla; A. A. Aburas; Akram M. Zeki

It has been discovered by computational experiments that Complex Back-Propagation (CBP) algorithm is well suited for learning complex pattern [1], and it has been reported that this ability can successfully be applied in image processing with complex values. In this paper, a watermarking scheme based on Complex-Valued Neural Network, CVNN trained by CBP in transform domain is proposed. Fast Fourier Transform, FFT is used to obtain the complex values (real and imaginary part) of the host image. The complex values form the input data of CVNN. Neural networks performs best on detection, mapping, classification, learning and adaption. These features are employed to simulate the Safe Region (SR) to embed the watermark, thus, watermark are appropriately mapped to the safe region of selected coefficients. The implementation results have shown that this watermarking algorithm has high level of imperceptibility.


international conference on computer and communication engineering | 2014

Performance Analysis of Spectrum Sensing Methods: A Numerical Approach

M. K. Hasan; Ahmad Faris Ismail; Aisha-Hassan Abdalla; H. A. Mohd Ramli; Shayla Islam; Wahidah Hashim

Recent enhancement of Long Term Evolution / Advanced (LTE/LTE-A) is aimed to increase the throughput of the Orthogonal Frequency Division Multiplexing (OFDM) system. This is quite obvious where both frequency and time division are employed in order to augment the system capacity. In LTE/LTE-A heterogeneous Networks (Het Nets), femto cells (He Node Bs) are the optimal choice to extend the coverage within indoor environment. Nonetheless, the deployment of such base stations, somewhat to certain extent, does create cross-tier and co-tier interferences with the macro cell users (UEmacro-eNB) that ostensibly can become a critical challenge. It is implied that the unutilized / idle spectrums reallocation might be one of the solutions to mitigate such challenge. However, the errorless spectrum sensing does pose another issue. This paper outlines the investigation findings where spectrum sensing techniques is deployed to maximize the spectrum detection capacity with minimum error in OFDM based Het Nets. In addition, in the attempt to increase the efficiency of spectrum resources, this paper proposes a sensing technique which is imposed over advanced energy detection technique to detect the idle spectrums. The result of the proposed scheme is evaluated using Monte Carlo simulation.


international conference on mechatronics | 2013

Performance analysis of multi-radio routing protocol in cognitive radio ad hoc networks under different path failure rate

Zamree Che-Aron; Aisha-Hassan Abdalla; Khaizuran Abdullah; Wan Haslina Hassan

In recent years, Cognitive Radio (CR) technology has largely attracted significant studies and research. Cognitive Radio Ad Hoc Network (CRAHN) is an emerging self-organized, multi-hop, wireless network which allows unlicensed users to opportunistically access available licensed spectrum bands for data communication under an intelligent and cautious manner. However, in CRAHNs, a lot of failures can easily occur during data transmission caused by PU (Primary User) activity, topology change, node fault, or link degradation. In this paper, an attempt has been made to evaluate the performance of the Multi-Radio Link-Quality Source Routing (MR-LQSR) protocol in CRAHNs under different path failure rate. In the MR-LQSR protocol, the Weighted Cumulative Expected Transmission Time (WCETT) is used as the routing metric. The simulations are carried out using the NS-2 simulator. The protocol performance is evaluated with respect to performance metrics like average throughput, packet loss, average end-to-end delay and average jitter. From the simulation results, it is observed that the number of path failures depends on the PUs number and mobility rate of SUs (Secondary Users). Moreover, the protocol performance is greatly affected when the path failure rate is high, leading to major service outages.


ieee conference on open systems | 2012

An investigation of packet scheduling algorithms for Long Term Evolution-Advanced

H. A. Mohd Ramli; M. K. Hasan; Ahmad Faris Ismail; Aisha-Hassan Abdalla; Khaizuran Abdullah

Carrier Aggregation (CA) is a potential technique to increase the band width in LTE-Advanced system. However, the introduction of CA brings a number challenges to the traditional Radio Resource Management (RRM) mechanisms. This paper investigates the current algorithms of CA and packet scheduling forthe Long Term Evolution-Advanced (LTE-A). In the beginning, the evolution from third generation (3G) to fourth generation (4G) is illustrated in terms of featured performance requirements and the integration of current and future radio access technologies, is also highlighted. Additionally, this paper discusses the current technical trends and possible improvements of the packet scheduling algorithms with CA for LTE-A.


ieee international symposium on telecommunication technologies | 2014

E-D2CARP: A joint path and spectrum diversity based routing protocol with an optimized path selection for cognitive radio ad hoc networks

Zamree Che-Aron; Aisha-Hassan Abdalla; Wan Haslina Hassan; Khaizuran Abdullah; Md. Arafatur Rahman

Cognitive Radio (CR) is a new paradigm which offers a viable solution to deal with the spectrum shortage problem and enhance the spectrum utilization. In Cognitive Radio Ad Hoc Networks (CRAHNs), data routing is one of the most challenging tasks due to frequent topology changes and intermittent connectivity caused by the activity of Primary Users (PUs). This paper proposes a joint path and spectrum diversity based routing protocol with an optimized path selection for CRAHNs, referred to the Enhanced Dual Diversity Cognitive Ad-hoc Routing Protocol (E-D2CARP). The Expected Path Delay (EPD) routing metric used in the protocol for path decision is also introduced. The protocol utilizes the joint path and spectrum diversity and circumvents the PU regions during path establishment phase in order to make the transmission path less vulnerable to the impact of PU activities and provide efficient route recovery in presence of path failures resulting from PU activities. The performance evaluations are conducted through simulations using the NS-2 simulator. Simulation results obviously demonstrate that the E-D2CARP can achieve better performance in terms of average throughput, packet loss, average end-to-end delay, and average jitter as compared to the recently proposed D2CARP protocol in identical scenarios.


international conference on mechatronics | 2011

Investigative analysis of clustering routing protocols for scalable sensor networks

Abdulazeez F. Salami; Farhat Anwar; Abiodun Musa Aibinu; H. Bello-Salau; Aisha-Hassan Abdalla

New advancements in the technology of wireless sensors have contributed to the development of special protocols which are unique to sensor networks where minimal energy consumption is vital and very important. As a result, the focus and effort of researchers is on designing better routing algorithms for a given application and network architecture of interest. Flat-based routing protocols have been found to be less advantageous to clustering routing protocols when their performance are compared in a large-scale wireless sensor network scenario. This is due to the fact that clustering operation reduces the amount of redundant messages that are transmitted all over the network when an event is detected. This paper is an investigation of cluster-based routing protocols for wireless sensor networks.


international conference on computer and communication engineering | 2012

An improved wavelet digital watermarking software implementation

Othman Omran Khalifa; Yusnita Yusof; Aisha-Hassan Abdalla; Rashidah Funke Olanrewaju


Elektronika Ir Elektrotechnika | 2018

Performance Evaluation of Multi-Interfaced Fast Handoff Scheme for PNEMO Environment

Shayla Islam; Aisha-Hassan Abdalla; Farah Nadia Mohd Isa; Mohammad Kamrul Hasan

Collaboration


Dive into the Aisha-Hassan Abdalla's collaboration.

Top Co-Authors

Avatar

Othman Omran Khalifa

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Shayla Islam

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Khaizuran Abdullah

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohammad Kamrul Hasan

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Rashidah Funke Olanrewaju

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Wan Haslina Hassan

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ahmad Faris Ismail

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

H. A. Mohd Ramli

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

M. K. Hasan

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Shihab A. Hameed

International Islamic University Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge