Shamala Subramaniam
Universiti Putra Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Shamala Subramaniam.
Wireless Personal Communications | 2012
Anwar Saif; Mohamed Othman; Shamala Subramaniam; Nor Asilah Wati Abdul Hamid
The main goal of the IEEE 802.11n standard is to achieve a minimum throughput of 100 Mbps at the MAC service access point. This high throughput has been achieved via many enhancements in both the physical and MAC layers. A key enhancement at the MAC layer is frame aggregation in which the timing and headers overheads of the legacy MAC are reduced by aggregating multiple frames into a single large frame before being transmitted. Two aggregation schemes have been defined by the 802.11n standard, aggregate MAC service data unit (A-MSDU) and aggregate MAC protocol data unit (A-MPDU). As a consequence of the aggregation, new aggregation headers are introduced and become parts of the transmitted frame. Even though these headers are small compared to the legacy headers they still have a negative impact on the network performance, especially when aggregating frames of small payload. Moreover, the A-MSDU is highly influenced by the channel condition due mainly to lack of subframes sequence control and retransmission. In this paper, we have proposed an aggregation scheme (mA-MSDU) that reduces the aggregation headers and implements a retransmission control over the individual subframes at the MSDU level. The analysis and simulations results show the significance of the proposed scheme, specifically for applications that have a small frame size such as VoIP.
Eurasip Journal on Wireless Communications and Networking | 2012
Adnan J. Jabir; Shamala Subramaniam; Zuriati Z. Ahmad; Nor Asilah Wati Abdul Hamid
The Sensor Proxy Mobile IPv6 (SPMIPv6) has been designed for IP-based wireless sensor networks mobility to potentially save energy consumption by relieving the sensor nodes from participating in the handoff process. However, SPMIPv6 is dependent on a single and central Local Mobility Anchor (LMA), and thus, it inherited most of the problems observed in the Proxy Mobile IPv6 (PMIPv6) protocol, including long handoff latency, non-optimized communication path, and bottleneck issues. In addition, SPMIPv6 extends the single point of failure to include both the authentication and network information. This study presents an enhanced architecture for SPMIPv6 called Clustered SPMIPv6 (CSPMIPv6) to overcome the problems above. In the proposed architecture, the Mobility Access Gateways (MAGs) are grouped into clusters, each with a distinguished cluster Head MAG (HMAG). The HMAG is mainly designed to reduce the load on LMA by performing intra-cluster handoff signaling and providing an optimized path for data communications. The proposed architecture is evaluated analytically, and the numerical results show that the proposed CSPMIPv6 outperforms both SPMIPv6 and PMIPv6 protocols in terms of LMA load, local handoff delay, and transmission cost performance metrics.
Future Generation Computer Systems | 2012
Amin Shokripour; Mohamed Othman; Hamidah Ibrahim; Shamala Subramaniam
Since the past decade, the use of parallel and distributed systems has become more common. In these systems, a huge chunk of data or computations is distributed among many systems in order to obtain better performance. Dividing data is one of the challenges in this type of systems. Divisible Load Theory (DLT) is a proposed method for scheduling data distribution in parallel or distributed systems. Many studies have been done in this field but only a few articles about distributing data in a heterogeneous multi-installment system can be found. In this paper, we present some closed-form formulas for the different steps of scheduling jobs in a heterogeneous multi-installment system (finding the proper number of processors, the proper number of installments, closed-form formula for scheduling internal installments and closed-form formula for scheduling last installment). Two different systems are studied: Computation-Based Systems and Communication-Based Systems. The results of our experiments show that both methods gave better performances than the previous methods (Hsu et al.s method and Beaumont et al.s method) and the Communication-Based method has a smaller response time than the Computation-Based method.
international conference on computer applications and industrial electronics | 2010
Anwar Saif; Mohamed Othman; Shamala Subramaniam; NorAsilaWati AbdulHamid
The main goal of the IEEE 802.11n standard is to achieve more than 100Mbps of throughput at the MAC service access point. This high throughput has been achieved via many enhancements in both the physical and MAC layers. A key enhancement is frame aggregation which reduces the overheads and increases the channel utilization efficiency. The MAC layer defines A-MSDU and A-MPDU frame aggregations in which MAC overheads are squeezed by aggregating multiple frames into a single large frame before being transmitted. As a consequence of the aggregation, new aggregation headers are introduced and become parts of the transmitted frame. The existence of such headers will have a negative impact on the performance, especially when aggregating frames of small payloads. In this paper, we have analysed the aggregation headers of the 802.11n aggregation schemes and introduced an MSDU frame aggregation that reduces the headers overhead and supports the applications that have a small frame size such as VoIP.
International Journal of Communication Systems | 2012
Mina Malekzadeh; Abdul Azim Abdul Ghani; Shamala Subramaniam
Wireless networks are deployed in many critical areas, such as health care centers, hospitals, police departments, and airports. In these areas, communication through the networks plays a vital role, and real-time connectivity along with constant availability of the networks is highly important. However, one of the most serious threats against the networks availability is the denial-of-service attacks. In wireless networks, clear text form of control frames is a security flaw that can be exploited by the attackers to bring the wireless networks to a complete halt. To prevent the denial-of-service attacks against the wireless networks, we propose two distinct security models. The models are capable of preventing the attacks by detecting and discarding the forgery control frames belonging to the attackers. The models are implemented and evaluated under various experiments and trials. The results have proved that the proposed models significantly improve the security performance of the wireless networks. This gives advantage of safe communication that can substantially enhance the network availability while maintaining the quality of the network performance. Copyright
Iete Technical Review | 2011
Anwar Saif; Mohamed Othman; Shamala Subramaniam; Nor Asila Wati Abdul Hamid
Abstract The timing and headers overheads of IEEE 802.11 PHY and MAC layers consume a large part of the chan-nel time leading to performance degradation especially at higher data rates. Several enhancements at both the PHY and MAC layers have been proposed in order to reduce these overheads and increase the channel utilization. A key enhancement is frame aggregation in which the timing and headers overheads are reduced by aggregating multiple frames into a single large frame and then transmit it in a single channel access. This paper addresses the frame aggregation techniques that have been proposed for the next generation wireless networks and the aggregation techniques that are adopted by IEEE 802.11n standard. It also high-lights the aggregation issues that need to be investigated in order to further enhance the frame aggregation performance.
international conference on conceptual structures | 2007
Mohamed Othman; Monir Abdullah; Hamidah Ibrahim; Shamala Subramaniam
In many data grid applications, data can be decomposed into multiple independent sub datasets and schedule for parallel execution and analysis. Divisible Load Theory (DLT) is a powerful tool for modelling data-intensive grid problems where both communication and computation load is partitionable. This paper presents an Adaptive DLT (ADLT) model for scheduling data-intensive grid applications. This model reduces the expected processing time approximately 80% for communication intensive applications and 60% for computation intensive applications compared to the previous DLT model. Experimental results show that this model can balance the loads efficiently.
Future Generation Computer Systems | 2010
Monir Abdullah; Mohamed Othman; Hamidah Ibrahim; Shamala Subramaniam
In many data grid applications, data can be decomposed into multiple independent sub-datasets and distributed for parallel execution and analysis. This property has been successfully employed using Divisible Load Theory (DLT), which has been proved a powerful tool for modeling divisible load problems in data-intensive grids. There are some scheduling models that have been studied but no optimal solution has been reached due to the heterogeneity of the grids. This paper proposes a new model called the Iterative DLT (IDLT) for scheduling divisible data grid applications. Recursive numerical closed form solutions are derived to find the optimal workload assigned to the processing nodes. Experimental results show that the proposed IDLT model leads to a better solution than other models (almost optimal) in terms of makespan.
international conference on computational science | 2008
Mohamed Othman; Monir Abdullah; Hamidah Ibrahim; Shamala Subramaniam
Scheduling an application in data grid is significantly complex and very challenging because of its heterogeneous in nature of the grid system. Divisible Load Theory (DLT) is a powerful model for modelling data-intensive grid problem where both communication and computation loads are partitionable. This paper presents a new divisible load balancing model known as adaptive ADLT (A2DLT) for scheduling the communication intensive grid applications. This model reduces the maximum completion time (makespan) as compared to the ADLT and Constraint DLT (CDLT) models. Experimental results showed that the model can balance the load efficiently, especially when the communication-intensive applications are considered.
Journal of Medical Systems | 2014
O. H. Salman; Mohd Fadlee A. Rasid; M. I. Saripan; Shamala Subramaniam
The healthcare industry is streamlining processes to offer more timely and effective services to all patients. Computerized software algorithm and smart devices can streamline the relation between users and doctors by providing more services inside the healthcare telemonitoring systems. This paper proposes a multi-sources framework to support advanced healthcare applications. The proposed framework named Multi Sources Healthcare Architecture (MSHA) considers multi-sources: sensors (ECG, SpO2 and Blood Pressure) and text-based inputs from wireless and pervasive devices of Wireless Body Area Network. The proposed framework is used to improve the healthcare scalability efficiency by enhancing the remote triaging and remote prioritization processes for the patients. The proposed framework is also used to provide intelligent services over telemonitoring healthcare services systems by using data fusion method and prioritization technique. As telemonitoring system consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the MSHA algorithm in the base station is demonstrated in this paper. The achievement of a high level of accuracy in the prioritization and triaging patients remotely, is set to be our main goal. Meanwhile, the role of multi sources data fusion in the telemonitoring healthcare services systems has been demonstrated. In addition to that, we discuss how the proposed framework can be applied in a healthcare telemonitoring scenario. Simulation results, for different symptoms relate to different emergency levels of heart chronic diseases, demonstrate the superiority of our algorithm compared with conventional algorithms in terms of classify and prioritize the patients remotely.