Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ruhani Ab Rahman is active.

Publication


Featured researches published by Ruhani Ab Rahman.


international colloquium on signal processing and its applications | 2009

Performance analysis of Wireless Sensor Network

Faieza Hanum Yahaya; Yusnani Mohd Yussoff; Ruhani Ab Rahman; Nur Hafizah Abidin

This project presents the performance analysis of Wireless Sensor Network (WSN) used in the high-end applications such as weapons sensor ship, biomedical applications, habitat sensing and seismic monitoring. Recently WSN also focuses on national security applications and consumer applications. This project shall demonstrate the performance of WSN models, which are created and simulated using QualNet Developer software simulator. Several sensor nodes were uniformly deployed in the networks to create sensing phenomena. The simulation results recorded were the amount of data packets sent and received by each node, the throughput and the delay. All these graphical simulation results from several WSN models will be compared and analyzed separately. Therefore, the important factors and issues pertaining to the WSN performance will also be determined and describe briefly.


control and system graduate research colloquium | 2010

An evaluation data of solar irradiation and dry bulb temperature at Subang under Malaysian climate

M. Z. Hussin; M. H. A. Hamid; Zainazlan Md Zain; Ruhani Ab Rahman

Solar irradiation and the temperature played a major role in the PV designing system. This factor differs with the latitude, geographic and time of day due to the various sun positions. This paper presents an average of solar irradiation over 10 years data for the Subang area with respect to the complete set data of daily global solar radiation that monitored by the Malaysian Meteorological Department (MMD) from year 1993 to 2002. In this study, the data were analysed to understand the pattern of hourly solar irradiance and also to recommend the appropriate value of daily solar irradiation for the designing of PV system in Malaysia region especially for Subang and Klang Valley. The highest sum of 24 hours average solar irradiation per year was 4.72 kWh m−2 in 1998 as well as temperature 28.5 °C and the annually average solar irradiations for Subang were collected from 3.91 kWh m−2 to 4.30 kWh m−2 during 10 years period. Also, the recommended daily solar irradiation in Malaysian climate is 4.39 kWh m−2, 133.0 kWh m−2 for monthly and the standard value for annual is 1596.5 kWh m−2. The standard deviation for daily solar irradiation is 0.29.


ieee international conference on information management and engineering | 2010

Development of a PIC-based wireless sensor node utilizing XBee technology

Yusnani Mohd Yussoff; Husna Zainol Abidin; Ruhani Ab Rahman; Faieza Hanum Yahaya

This paper presents the performance analysis of Wireless Sensor Network (WSN) used in the high-end applications such as weapons sensor ship, biomédical applications, habitat sensing and seismic monitoring. Recently WSN also focuses on national security applications and consumer applications. This project shall demonstrate the performance of WSN models, which have been developed using PIC. Temperature sensor nodes were deployed in the networks to create sensing phenomena. The results recorded that successful throughput from sensor node, strongly depends on the delay setting. Therefore, the important factors and issues pertaining to the WSN performance will also be determined and describe briefly.


ieee symposium on wireless technology and applications | 2012

A-MSDU real time traffic scheduler for IEEE802.11n WLANs

Bakeel Maqhat; Mohd Dani Baba; Ruhani Ab Rahman

The IEEE 802.11n network main feature is to support high throughput of more than 100Mbps at the MAC layer. To achieve this, the 802.11n Task Group has introduced frame aggregation technique which reduces the overhead and increases the channel utilization efficiency. The MAC layer defines two frame aggregation mechanisms namely the MAC protocol data unit aggregation A-MPDU and MAC service data unit aggregation A-MSDU. A-MPDU is robust against error due to subframes retransmission and large aggregation size, whereas A-MSDU is effective in error free channel due to small headers. A-MPDU has poor performance in erroneous channel because of the absence of sub frames retransmission. It is worth mentioning that some recent researches have enabled the selective retransmission which makes it robust against error. The AMSDU has becomes compatible and able to fulfill the QoS requirements for applications with small frame size such as VoIP, videos as well as interactive gaming. In this paper, we propose A-MSDU real-time scheduler by exploiting the A-MSDU attributes and adopting the idea of enabling retransmission in our aggregation scheduler algorithm to obtain aggregation with small size to support time sensitive applications and satisfying the QoS requirements.


international colloquium on signal processing and its applications | 2009

Implementation of Quality of Service (QoS) in Multi Protocol Label Switching (MPLS) networks

Muhammad Romdzi Ahamed Rahimi; Habibah Hashim; Ruhani Ab Rahman

The recent evolution of IP networks are seeing IP applications becoming more complex and requiring higher bandwidth consumption. More recently, IP networks are employing Multi Protocol Label Switching (MPLS) which offers better switching and enables Virtual Private Network (VPN). However, the service quality is becoming a major issue in MPLS networks due to having to accommodate the higher bandwidth consumption by certain applications such as voice over IP (VoIP), client-server and peer-to-peer applications, java applications and customized applications. This paper will focus on the implementation of Quality of Service (QoS) in MPLS networks using the java network simulation tool called J-SIM. There are many types quality of service can be offered in MPLS network and one of them is Differentiated Services or Diffserv which is being used in this work. This paper presents the QoS benefits of Diff-Serv aware MPLS networks when simulating the network using J-Sim. Outputs such as throughput and packet drops will be discussed in this paper also.


ieee symposium on wireless technology and applications | 2012

LTE speech traffic estimation for network dimensioning

Elias Jailani; Muhamad Ibrahim; Ruhani Ab Rahman

LTE voice application is based on packet IP which is known as VoLTE by GSMA. To estimate VoLTE traffic, the UTRAN voice calls need to correctly convert into full-IP traffic and impose with a correct LTE codec. The knowledge to estimate data rate requirements is very important for network planning & dimensioning. This paper provides a dimensioning approach for LTE network using the readily available UTRAN traffic data from the speech traffic perspective. The estimated traffic throughput requirement per eNodeB as well as overall LTE network cluster is presented and can be used to dimension the eUTRAN as well as IP Transport nodes.


international conference on computer applications and industrial electronics | 2010

Technical comparison analysis of encryption algorithm on site-to-site IPSec VPN

Muhammad Hafiz Mazlan Zaharuddin; Ruhani Ab Rahman; Murizah Kassim

Virtual Private Network or VPN provide secure communication for remote users to access private data over public network. Although security is the main priority, the performance of VPN must also be considered. This paper presented how performance of VPN affected by choosing different encryption algorithms used by VPN devices. Analysis on performance of Windows Vista operating system was evaluated on a test-bed setup with combinations of encryption algorithms, different file sizes, and different protocols. Two encryption algorithms were used that are the AES 256 and 3DES and two hash algorithms that are MD5 and SHA-1 were used in the paper. Performance of the VPN is determined by the throughput parameter. Assessment task has found that different algorithms give different throughput readings. AES 256 — MD5 provide faster and more throughputs compared to other algorithm combination. Analysis also found that larger file size will reduce throughput of VPN, thus FTP performs faster than HTTP protocol.


ieee symposium on wireless technology and applications | 2012

Performance analysis of application layer firewall

Mohd Zafran Abdul Aziz; Muhammad Ibrahim; Abdullatif M. Omar; Ruhani Ab Rahman; Mahfudz Md Zan; Mat Ikram Yusof

Nowadays organizations are likely to have Internet presence and this has led to a significant increase in all kinds of network attacks. Network security became one of the highest priorities to protect valuable data from unauthorized access. One of the solutions to protect against illegal access is to use a firewall. A firewall is a device designed to permit or deny network traffic. This paper will investigate the performance of firewall based on two main factors, namely response time and link utilization. Various scenarios were considered to show the impact of firewall in network performance using the OPNET simulation program.


2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) | 2016

Evaluation of reliable UDP-based transport protocols for Internet of Things (IoT)

Madzirin Masirap; Mohd Harith Amaran; Yusnani Mohd Yussoff; Ruhani Ab Rahman; Habibah Hashim

For IoT applications that require near real-time wireless connections, the traditional TCP protocol is not adept enough due to the size of its packet header, its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and its slow start strategy. This paper mainly evaluates three kinds of reliable UDP-based transport protocols namely, RUBDP, UDT, and PA-UDP, for use in IoT applications. The evaluation was done on a test bed that consists of two machines connected by wireless ad-hoc network. We consider the effect of data size by monitoring throughput of the implemented protocol. This paper also discusses the CPU usage on the sender and receiver side of each protocol. The paper findings are, PA-UDP protocol has the best throughput performance but requires high CPU utilization during the start and end of transmission at the receiver side. Meanwhile, UDT protocol is most efficient in term of CPU usage although it provides lesser throughput. RBUDP, on the other hand, performed consistently in wireless network but CPU usage is very high at the sender side. The conclusion drawn on this paper is UDT protocol is the most suitable protocol of the three for IoT applications because it has consistent performance and is CPU friendly.


international conference on computer communications | 2015

Self-organizing network based handover mechanism for LTE networks

Ili Nadia Md Isa; Mohd Dani Baba; Ruhani Ab Rahman; Azita Laily Yusof

Self-Organizing Network (SON) mechanism comprises of three components of self-configuration, self-optimization and self-healing which can contribute to optimize the performance of the next generation broadband network such as the Long Term Evolution (LTE) networks. The aim of this study is to propose a self-organizing handover procedure based on the Self-Organizing Network (SON) concept for LTE network. The simulation scenario and analysis on the performance of the proposed SON-based handover was conducted using the QualNet software. The two main handover parameters that have been modified are the Hysteresis (Hys) and Time-To-Trigger (TTT). The outcome of the simulation shows the network performance is better after optimizing the Hys and TTT setting of the handover parameters. In particular the LTE network shows remarkable improvement in the network throughput and smaller network delay. This study will be beneficial to future research works as the trend in the communication technologies are always changing rapidly and the self-manage mechanism will become essential for the network operators.

Collaboration


Dive into the Ruhani Ab Rahman's collaboration.

Top Co-Authors

Avatar

Murizah Kassim

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar

Mat Ikram Yusof

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar

Mohd Dani Baba

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar

Bakeel Maqhat

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar

Mahfudz Md Zan

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar

Anwar Saif

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Farok Azmat

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar

Habibah Hashim

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar

Azlina Idris

Universiti Teknologi MARA

View shared research outputs
Researchain Logo
Decentralizing Knowledge