Zarina Tukiran
Universiti Tun Hussein Onn Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Zarina Tukiran.
international conference on intelligent and advanced systems | 2010
Mohd Helmy Abd Wahab; Herdawatie Abdul Kadir; Zarina Tukiran; Md. Razali Tomari; Ariffin Abdul Mutalib; M. Farhan M. Mohsin; Mohd. Nazrul Effendy Mohd. Idrus
Monitoring laboratory equipment record is important to ensure every item is always in place. Generally, in and out equipment is handled manually by technician by writing down the equipment information, including time and date in equipment circulation form. To automate the process, Radio Frequency Identification (RFID) is one of the most practical and applicable in real implementation in-line with the nature where most of the systems are made computerized. In this paper, a solution has been provided for the problem encountered in laboratory equipment monitoring system using RFID technology. This project consist four main parts: the tag, tag reader, system development and networking system. The RFID tag is tagged on the laboratory equipment where the tag contains laboratory equipment information and RFID reader is located at the door of each laboratory room. This monitoring system enables the head of laboratory and technician to monitor in-out equipment in actual environment and also increase the efficiency in managing equipment in the laboratory. Benefits of the system include enhancement of the safety of University asset and reduce losses of assets and enhancement of the laboratory inventory control of equipment.
ieee international conference on control system computing and engineering | 2014
Nurulhuda Ismail; Zarina Tukiran; N. N. Shamsuddin; Eddy Irwan Shah Saadon
This paper discusses about an ongoing project that serves the needs of people with physical disabilities at home. It uses the Bluetooth technology to establish communication between users Smartphone and controller board. The prototype support manual controlling and microcontroller controlling to lock and unlock home door. By connecting the circuit with a relay board and connection to the Arduino controller board it can be controlled by a Bluetooth available to provide remote access from tablet or smartphone. This paper addresses the development and the functionality of the Android-based application (Android app) to assist disabled people gain control of their living area.
international symposium on information technology | 2008
Khalid Isa; Shamsul Mohamad; Zarina Tukiran
This paper presents a simulation of Neuro-Fuzzy application for analysing studentspsila performance based on their CPA and GPA. The analysis is an extension of our previous study, which was called an analysis on studentpsilas performance using fuzzy systems. The main function of this analysis is to support the development of intelligent planning system (INPLANS) using fuzzy systems, neural networks, and genetic algorithms which will be used by the academic advisory domain in educational institutions by evaluating and predicting studentspsila performance as well as comparing the results with the previous study. The neuro-fuzzy model is connectionist feed-forward architecture with five layers of neurons and four connections. The system has been tested for 26 cases of studentspsila results. The results show that the studentspsila performances have improved significantly compared to the prediction of the same case using fuzzy systems.
international conference on electronic design | 2008
H. binti Abdul Kadir; S.N.A. binti Mohd Kanafiah; M.H. bin Abd. Wahab; Zarina Tukiran; Z. Kadir
Automatic identification technologies have been used to reduce the time and manpower to input data manually i.e. Barcode, smart card, radio frequency identification (RFID), biometric technology and optical character recognition. Currently RFID has become one of the hottest technologies implemented in a wide range of application i.e.; these include road tolls, bus and trains payment, security tags and luggage labels used in some airports. In Malaysia, the usage of this technology has not yet been expanded; It is only used as a personal identity in the working place, smart tag in PLUS highway and price tags in market. Based on the above-described overview on RFID, this study attempts to apply the technology in online supervision system to ease the school /university management system to monitor the interest group. The OSS system used the main component of passive RFID system, database management system and online networking. When the RFID tags pass through the RFID reader, the system will record the data from the RFID tag to the database systems. Then the data will be sent online to the management for the supervision of students. This system will ease the school/university management people to monitor the availability of each student in the interest zone and this enhance the school management procedures, monitor the interest group movement automatically and increase the safety of students.
ieee embs conference on biomedical engineering and sciences | 2016
Muhammad Syafoan Safiee; Afandi Ahmad; Zarina Tukiran; Muhammad Faris Roslan; Muhammad Muzakkir Mohd Nadzri
In sports, injury is inevitable, whilst high performance is our vision. This study presents the design and implementation of high-performance low-injury real-time rowing simulator. The proposed simulator is built based on the weaknesses appear with the current training system using ergometer machine that only focuses towards high-performance. In this simulator, three (3) parts have been integrated — input, process and output. Two (2) accelerometers (for rib back and knee) and flexible sensors (for both elbows) were placed on the rowers body as an input for data acquisition. These data were then being processed by an embedded hardware device National Instrument (NI) MyRIO that has been programmed and results obtained were displayed via liquid crystal display (LCD) monitor. Graphical user interface (GUI) of the simulator has been designed using graphical code (G-code) using LabVIEW software and data for the simulation were also available either in txt and xlsx formats. Results obtained have shown promising results since all data can be visualised and monitored in real-time, profiling and history of the training can be retrieved and with the bench mark data, injury can be also minimised.
ieee international conference on control system, computing and engineering | 2013
Suhaila Sari; Sharifah Zahidah Hasan Al Fakkri; Hazli Roslan; Zarina Tukiran
A good noise reduction is a method that can reduce the noise level and preserve the details of the image. This paper proposes the development of a denoising method through hybridization of bilateral filters and wavelet thresholding for digital images in low light condition.In the first stage, the noisy image is passed through Bilateral Filter. However, only some amount of noise gets reduced and the image gives a blurred appearance. Hence to preserve the edge details and reduce the blur effect, Wavelet Thresholding is applied and it is proved that the proposed method is more successful to preserve the edges while suppressing the noise.
soft computing | 2018
Zarina Tukiran; Afandi Ahmad
Field Programmable Gate Arrays (FPGAs) platform has been increasingly used in sensor-based applications because of reconfigurable and parallelisms features offered in the FPGA. However, most of the application designers are unfamiliar with hardware programming and design concepts of the FPGA. This paper presents an implementation of real-time sensor data acquisition (ReSDAq) for rowing monitoring system using LabVIEW FPGA which utilising the high-level synthesis (HLS) technique. The HLS allows application designers to use high-level language for configuring the FPGA. The ReSDAq application comprises of a tri-axis accelerometer sensor, an LCD monitor, and a National Instrument (NI) sbRIO-9632 board. The sbRIO-9632 board was targeted programmed on the Xilinx FPGA core to acquire sensor data and compute acceleration of the arm movement of the rower. From this study, it was found that the compilation time to convert G-code into hardware description language (HDL) code depends on the size of the code. Apart from having an interesting experience in graphical programming approach, the LabVIEW FPGA module could be used by application designers to facilitate and accelerate the development of FPGA-based systems.
Archive | 2015
Suhaila Sari; Sharifah Zahidah Hasan Al Fakkri; Hazli Roslan; Zarina Tukiran
A good noise reduction is a method that can reduce the noise level and preserve the details of the image. This paper proposes a denoising method through hybridization of bilateral filters and wavelet thresholding for digital image in low-light condition. The proposed method is experimented on selected night vision images and the performances are evaluated in terms of Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR) and visual effects. Results demonstrate that the proposed denoising method has improved the PSNR and MSE of average performance of bilateral filter by 0.97 dB and 1.33 respectively and the average performance of wavelet thresholding has improved by 0.98 dB and 1.19 respectively.
Archive | 2011
Mohd Helmy Abd Wahab; Herdawatie Abdul Kadir; Zarina Tukiran; Noraisah Sudin; Mohd Hafizz Ab. Jalil; Ayob Johari
Automated monitoring systems are becoming trends, creating easier method to identify item, tracking, monitoring and add on security values. In places where there are lots of items accessed by many users, the tendency of loss is high due to weakness in items monitoring. Here, we briefly describe our research on the university’s laboratory perspectives. The main aim of the research is to work out a generic approach of monitoring items in a place with several rooms. For example, there are laboratories with expensive equipments are available in a university to support teaching and learning session. Conventional approach of checking items for every session is difficult for lab administrator as most libraries are being used by more than 20 students per session.These leads to a challenge for lab administrator to monitor the flow of these items are always in place. Currently, the monitoring of laboratory equipments is performed manually by the lab administrator during each laboratory sessions. For every loan of equipment, a log book needs to be filled up in order to keep track the transaction information.This system was found to have a lot of weaknesses such as misuse of the equipment log records, losses of equipment, no in-out transaction record and misplace of equipments. To automate the process, Radio Frequency Identification (RFID) is identified as one of the most practical and applicable in real time implementation in-line with the nature where most of the systems are made computerized. In this paper, a solution has been provided for the problem encountered in laboratory equipment monitoring system using RFID technology. Therefore RFID-based monitoring system has been designed and developed to solve the problem associated with the handling of laboratory equipments. This chapter is organised as follows. Section 2 describes related works on RFID-based monitoring system. The architecture of the system is mentioned in section 3. Application scenario and the implementation are briefly explained in section 4 and 5 respectively. Finally, the chapter is concluded in Chapter 6.
IEEE Potentials | 2009
Nik Shahidah Afifi Taujuddin; Zaleha Mohamad Noor; Zarina Tukiran; Mohd Helmy Abd Wahab; Ariffin Abdul Mutalib
One of the most useful features in any personal digital assistant (PDA) is that it can accumulate information needed including easy-to-forget details. Some of the information stored is likely to be very sensitive including credit card numbers, personal identification, and passwords. To protect this sensitive data, most PDAs offer password protection as a basic authentication. However, to rely on this type of protection alone is not enough. As the writing of secret message cryptography, also known as science and mathematical lock and key (Schafer, 2003), evolved people rely on the encryption process to increase their level of data protection.