Ruhani Ab Rahman
Universiti Teknologi MARA
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ruhani Ab Rahman.
international colloquium on signal processing and its applications | 2009
Faieza Hanum Yahaya; Yusnani Mohd Yussoff; Ruhani Ab Rahman; Nur Hafizah Abidin
This project presents the performance analysis of Wireless Sensor Network (WSN) used in the high-end applications such as weapons sensor ship, biomedical applications, habitat sensing and seismic monitoring. Recently WSN also focuses on national security applications and consumer applications. This project shall demonstrate the performance of WSN models, which are created and simulated using QualNet Developer software simulator. Several sensor nodes were uniformly deployed in the networks to create sensing phenomena. The simulation results recorded were the amount of data packets sent and received by each node, the throughput and the delay. All these graphical simulation results from several WSN models will be compared and analyzed separately. Therefore, the important factors and issues pertaining to the WSN performance will also be determined and describe briefly.
control and system graduate research colloquium | 2010
M. Z. Hussin; M. H. A. Hamid; Zainazlan Md Zain; Ruhani Ab Rahman
Solar irradiation and the temperature played a major role in the PV designing system. This factor differs with the latitude, geographic and time of day due to the various sun positions. This paper presents an average of solar irradiation over 10 years data for the Subang area with respect to the complete set data of daily global solar radiation that monitored by the Malaysian Meteorological Department (MMD) from year 1993 to 2002. In this study, the data were analysed to understand the pattern of hourly solar irradiance and also to recommend the appropriate value of daily solar irradiation for the designing of PV system in Malaysia region especially for Subang and Klang Valley. The highest sum of 24 hours average solar irradiation per year was 4.72 kWh m−2 in 1998 as well as temperature 28.5 °C and the annually average solar irradiations for Subang were collected from 3.91 kWh m−2 to 4.30 kWh m−2 during 10 years period. Also, the recommended daily solar irradiation in Malaysian climate is 4.39 kWh m−2, 133.0 kWh m−2 for monthly and the standard value for annual is 1596.5 kWh m−2. The standard deviation for daily solar irradiation is 0.29.
ieee international conference on information management and engineering | 2010
Yusnani Mohd Yussoff; Husna Zainol Abidin; Ruhani Ab Rahman; Faieza Hanum Yahaya
This paper presents the performance analysis of Wireless Sensor Network (WSN) used in the high-end applications such as weapons sensor ship, biomédical applications, habitat sensing and seismic monitoring. Recently WSN also focuses on national security applications and consumer applications. This project shall demonstrate the performance of WSN models, which have been developed using PIC. Temperature sensor nodes were deployed in the networks to create sensing phenomena. The results recorded that successful throughput from sensor node, strongly depends on the delay setting. Therefore, the important factors and issues pertaining to the WSN performance will also be determined and describe briefly.
ieee symposium on wireless technology and applications | 2012
Bakeel Maqhat; Mohd Dani Baba; Ruhani Ab Rahman
The IEEE 802.11n network main feature is to support high throughput of more than 100Mbps at the MAC layer. To achieve this, the 802.11n Task Group has introduced frame aggregation technique which reduces the overhead and increases the channel utilization efficiency. The MAC layer defines two frame aggregation mechanisms namely the MAC protocol data unit aggregation A-MPDU and MAC service data unit aggregation A-MSDU. A-MPDU is robust against error due to subframes retransmission and large aggregation size, whereas A-MSDU is effective in error free channel due to small headers. A-MPDU has poor performance in erroneous channel because of the absence of sub frames retransmission. It is worth mentioning that some recent researches have enabled the selective retransmission which makes it robust against error. The AMSDU has becomes compatible and able to fulfill the QoS requirements for applications with small frame size such as VoIP, videos as well as interactive gaming. In this paper, we propose A-MSDU real-time scheduler by exploiting the A-MSDU attributes and adopting the idea of enabling retransmission in our aggregation scheduler algorithm to obtain aggregation with small size to support time sensitive applications and satisfying the QoS requirements.
international colloquium on signal processing and its applications | 2009
Muhammad Romdzi Ahamed Rahimi; Habibah Hashim; Ruhani Ab Rahman
The recent evolution of IP networks are seeing IP applications becoming more complex and requiring higher bandwidth consumption. More recently, IP networks are employing Multi Protocol Label Switching (MPLS) which offers better switching and enables Virtual Private Network (VPN). However, the service quality is becoming a major issue in MPLS networks due to having to accommodate the higher bandwidth consumption by certain applications such as voice over IP (VoIP), client-server and peer-to-peer applications, java applications and customized applications. This paper will focus on the implementation of Quality of Service (QoS) in MPLS networks using the java network simulation tool called J-SIM. There are many types quality of service can be offered in MPLS network and one of them is Differentiated Services or Diffserv which is being used in this work. This paper presents the QoS benefits of Diff-Serv aware MPLS networks when simulating the network using J-Sim. Outputs such as throughput and packet drops will be discussed in this paper also.
ieee symposium on wireless technology and applications | 2012
Elias Jailani; Muhamad Ibrahim; Ruhani Ab Rahman
LTE voice application is based on packet IP which is known as VoLTE by GSMA. To estimate VoLTE traffic, the UTRAN voice calls need to correctly convert into full-IP traffic and impose with a correct LTE codec. The knowledge to estimate data rate requirements is very important for network planning & dimensioning. This paper provides a dimensioning approach for LTE network using the readily available UTRAN traffic data from the speech traffic perspective. The estimated traffic throughput requirement per eNodeB as well as overall LTE network cluster is presented and can be used to dimension the eUTRAN as well as IP Transport nodes.
international conference on computer applications and industrial electronics | 2010
Muhammad Hafiz Mazlan Zaharuddin; Ruhani Ab Rahman; Murizah Kassim
Virtual Private Network or VPN provide secure communication for remote users to access private data over public network. Although security is the main priority, the performance of VPN must also be considered. This paper presented how performance of VPN affected by choosing different encryption algorithms used by VPN devices. Analysis on performance of Windows Vista operating system was evaluated on a test-bed setup with combinations of encryption algorithms, different file sizes, and different protocols. Two encryption algorithms were used that are the AES 256 and 3DES and two hash algorithms that are MD5 and SHA-1 were used in the paper. Performance of the VPN is determined by the throughput parameter. Assessment task has found that different algorithms give different throughput readings. AES 256 — MD5 provide faster and more throughputs compared to other algorithm combination. Analysis also found that larger file size will reduce throughput of VPN, thus FTP performs faster than HTTP protocol.
ieee symposium on wireless technology and applications | 2012
Mohd Zafran Abdul Aziz; Muhammad Ibrahim; Abdullatif M. Omar; Ruhani Ab Rahman; Mahfudz Md Zan; Mat Ikram Yusof
Nowadays organizations are likely to have Internet presence and this has led to a significant increase in all kinds of network attacks. Network security became one of the highest priorities to protect valuable data from unauthorized access. One of the solutions to protect against illegal access is to use a firewall. A firewall is a device designed to permit or deny network traffic. This paper will investigate the performance of firewall based on two main factors, namely response time and link utilization. Various scenarios were considered to show the impact of firewall in network performance using the OPNET simulation program.
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) | 2016
Madzirin Masirap; Mohd Harith Amaran; Yusnani Mohd Yussoff; Ruhani Ab Rahman; Habibah Hashim
For IoT applications that require near real-time wireless connections, the traditional TCP protocol is not adept enough due to the size of its packet header, its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and its slow start strategy. This paper mainly evaluates three kinds of reliable UDP-based transport protocols namely, RUBDP, UDT, and PA-UDP, for use in IoT applications. The evaluation was done on a test bed that consists of two machines connected by wireless ad-hoc network. We consider the effect of data size by monitoring throughput of the implemented protocol. This paper also discusses the CPU usage on the sender and receiver side of each protocol. The paper findings are, PA-UDP protocol has the best throughput performance but requires high CPU utilization during the start and end of transmission at the receiver side. Meanwhile, UDT protocol is most efficient in term of CPU usage although it provides lesser throughput. RBUDP, on the other hand, performed consistently in wireless network but CPU usage is very high at the sender side. The conclusion drawn on this paper is UDT protocol is the most suitable protocol of the three for IoT applications because it has consistent performance and is CPU friendly.
international conference on computer communications | 2015
Ili Nadia Md Isa; Mohd Dani Baba; Ruhani Ab Rahman; Azita Laily Yusof
Self-Organizing Network (SON) mechanism comprises of three components of self-configuration, self-optimization and self-healing which can contribute to optimize the performance of the next generation broadband network such as the Long Term Evolution (LTE) networks. The aim of this study is to propose a self-organizing handover procedure based on the Self-Organizing Network (SON) concept for LTE network. The simulation scenario and analysis on the performance of the proposed SON-based handover was conducted using the QualNet software. The two main handover parameters that have been modified are the Hysteresis (Hys) and Time-To-Trigger (TTT). The outcome of the simulation shows the network performance is better after optimizing the Hys and TTT setting of the handover parameters. In particular the LTE network shows remarkable improvement in the network throughput and smaller network delay. This study will be beneficial to future research works as the trend in the communication technologies are always changing rapidly and the self-manage mechanism will become essential for the network operators.