Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Mohd Helmy  Abd Wahab
  • Department of Computer Engineering
    Faculty of Electrical and Electronic Engineering
    Universiti Tun Hussein Onn Malaysia
    P.O. Box 101, Pt. Raja, Batu Pahat, Johor, Malaysia
  • Mohd Helmy Abd Wahab is a senior lecturer and former Head of Intelligent System Lab at the Department of Computer Eng... moreedit
This book story about the basic concept in designing and developing simple database system. It start with a brief history of database, basic principle of database architecture, database elements, construct entity relationship diagram,... more
This book story about the basic concept in designing and developing simple database system. It start with a brief history of database, basic principle of database architecture, database elements, construct entity relationship diagram, relational model, normalization and SQL queries.
Research Interests:
Buku ini membincangkan tentang pembangunan aplikasi WAP melalui pendekatan praktikal. Pembaca dapat mengetahui langkah-langkah yang perlu dilakukan untuk membangunkan aplikasi WAP. Buku ini memberi fokus kepada penggunaan bahasa XHTML MP... more
Buku ini membincangkan tentang pembangunan aplikasi WAP melalui pendekatan praktikal. Pembaca dapat mengetahui langkah-langkah yang perlu dilakukan untuk membangunkan aplikasi WAP. Buku ini memberi fokus kepada penggunaan bahasa XHTML MP untuk membina antaramuka pengguna dan ASP sebagai bahasa pengaturcaraan pihak pelayan untuk membangunkan aplikasi dinamik WAP. Oleh sebab dokumen XHTML MP adalah berasaskan bahasa XML, maka ia dapat dipaparkan pada sebarang pelayar iaitu tidak terhad kepada pelayar WAP sahaja. Selain itu, kita juga dapat menggunakan Wireless CSS bersama XHTML MP untuk membina gaya persembahan yang teratur dan terkawal. Ini merupakan kelebihan utama XHTML MP berbanding bahasa WML. Namun, langkah-langkah pembangunan aplikasi WAP adalah sama bagi kedua-dua bahasa ini. Buku ini ditulis untuk digunakan oleh individu-individu yang berminat dalam pembangunan aplikasi tanpa wayar berasaskan WAP. Ia juga boleh digunakan oleh penuntut di institut pengajian tinggi awam dan swasta. Adalah diharapkan buku ini dapat dimanfaatkan sepenuhnya oleh pembaca.
Evaluating a novel or enhanced algorithm is compulsory in data mining studies in order to measure it has superior performance than its previous version. In practice, most of studies apply a straightforward approach for evaluation where... more
Evaluating a novel or enhanced algorithm is compulsory in data mining studies in order to measure it has superior performance than its previous version. In practice, most of studies apply a straightforward approach for evaluation where appropriate performance metrics such as classification accuracy is selected, computes the mean and its variance over several repetitive experiments, and then compares it with the base algorithm or other comparative approach. However, there are limitations using this approach because dataset from different domain tend to produce different error rate thus make their average meaningless as well as susceptible to the outlier. This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. In this study, we evaluated the performance of the enhanced algorithm called dendrite cell algorithm using sensitivity, specificity, false positive rate, and accuracy and validated the result using parametric and non parametric statistical significant tests. From the evaluation, the new version of dendrite cell algorithm was statistically proven to have improvement with a significant difference compared to its previous versions in all performance metrics.
Research Interests:
Nowadays with the increasing amount of waste generated and limited landfill space for waste disposal, recycling is one of the important approaches to manage the waste effectively. The current manual recycling practice in which the user... more
Nowadays with the increasing amount of waste generated and limited landfill space for waste disposal, recycling is one of the important approaches to manage the waste effectively. The current manual recycling practice in which the user need to bring the waste in bulk to the recycling center might be hassle and hence become a discouraging factor for them to recycle. To overcome such an issue, in this project an automated recycle bin with a reward feature is proposed that derived from a reverse vending machine (RVM) concept. Basically, the system is implemented in a standard recycle bin provided by local municipal that equipped with microcontroller and collection of sensors. Throughout the process, the sensors responsible to identifying user information, weight the scale and eventually convert the weight to the corresponding points automatically. Once the process completed, the user can claim their points by using RFID point card. All the mentioned process will be controlled by a microcontroller. The system has been implemented in a small scale user testing and the framework shows its effectiveness for handling the whole process. The prototype is expected to aid in accelerating the motivation among Malaysian to recycle their waste, and can be one of the frameworks to overcome urban poverty issue by using waste to wealth concept.
Research Interests:
This paper discusses an ongoing project that serves the needs of people with disabilities and the elderly at home. It uses the WiFi technology to establish communication between a user's Smartphone and a controller board. The project uses... more
This paper discusses an ongoing project that serves the needs of people with disabilities and the elderly at home. It uses the WiFi technology to establish communication between a user's Smartphone and a controller board. The project uses a microcontroller to control the door lock and is equipped with a camera to identify the visitors. By connecting the servo motor and camera to the Raspberry Pi controller board, it can be controlled via WiFi to provide remote access from a smartphone.
Research Interests:
Studies have shown that many Malaysian non-technical students have low motivation in learning ICT course due to a number of reasons, such as a lack of learning practice and effective learning applications. In view of such a problem, the... more
Studies have shown that many Malaysian non-technical students have low motivation in learning ICT course due to a number of reasons, such as a lack of learning practice and effective learning applications. In view of such a problem, the researchers carried out a quasi-experimental study to examine the impact of a novel mobile augmented reality learning application (MARLA) on students' motivation in learning a topic of a university ICT course. The research was based on the pretest-posttest control group design, and the study sample consisted of 120 non-technical undergraduates majoring in social science, with a mean age of 19.5 years. They were divided into an experimental group and a control group. The dependent variable was students' motivation in learning, and the independent variables were learning method and gender. The experimental group used MARLA on their mobile devices to learn one of the topics of the ICT Competency course, namely Computer System; whereas the control group used a similar application on their desktop computers. The Intrinsic Motivation Inventory (IMI) was the research instrument used to measure students' motivation before and after learning sessions, which spanned 6 hours. Utilizing the SPSS (version 21), an analysis of covariance was performed, showing there was a main effect attributed to gender only, with male and female students attaining mean scores of 4.24 and 3.90 respectively for the motivation construct. This finding showed male students were more motivated than their opposite counterparts. In contrast, no such main effect attributed to learning method was observed, as evidenced from the mean scores of 4.08 and 4.07 of the experimental group and control group respectively for the measured construct, suggesting both methods were both equally effective. Additionally, there was an interaction effect between gender and learning method, with male students attaining different levels of motivation based on learning method. Arguably, such a mobile learning tool can be used to help non-technical undergraduates learn with greater motivation, but its success will rely on proper planning and implementation by considering students' demographic background.
Research Interests:
The smart vehicular ad-hoc network is the network that consists of vehicles for smooth movement and better management of the vehicular connectivity across the given network. This research paper aims to propose a set of solution for the... more
The smart vehicular ad-hoc network is the network that consists of vehicles for smooth movement and better management of the vehicular connectivity across the given network. This research paper aims to propose a set of solution for the VANETs consisting of the automatic driven vehicles, also called as the autonomous car. Such vehicular
networks are always prone to collision due to the natural or un-natural reasons which must be solved before the large-scale deployment of the autonomous transport systems. The newly designed intelligent transport movement control mechanism is based upon the intelligent data propagation along with the vehicle collision and traffic jam prevention
schema [8], which may help the future designs of smart cities to become more robust and less error-prone. In the proposed model, the focus is on designing a new dynamic and robust hazard routing protocol for intelligent vehicular networks for improvement of the overall performance in various aspects. It is expected to improve the overall transmission delay as well as the number of collisions or adversaries across the vehicular network zone.
Research Interests:
Automated Teller Machine (ATM) is an electronic banking outlet that allows bank customers to complete a banking transactions without the aid of any bank official or teller. Several problems are associated with the use of ATM card such... more
Automated Teller Machine (ATM) is an electronic banking outlet that allows bank customers to complete a banking transactions without the aid of any bank official or teller. Several problems are associated with the use of ATM card such card cloning, card damaging, card expiring, cast skimming, cost of issuance and maintenance and accessing customer account by third parties. The aim of this project is to give a freedom to the user by changing the card to biometric security system to access the bank account using Advanced Encryption Standard (AES) algorithm. The project is implemented using Field Programmable Gate Array (FPGA) DE2-115 board with Cyclone IV device, fingerprint scanner, and Multi-Touch Liquid Crystal Display (LCD) Second Edition (MTL2) using Very High Speed Integrated Circuit Hardware (VHSIC) Description Language (VHDL). This project used 128-bits AES for recommend the device with the throughput around 19.016Gbps and utilized around 520 slices. This design offers a secure banking transaction with a low rea and high performance and very suited for restricted space environments for small amounts of RAM or ROM where either encryption or decryption is performed.
Research Interests:
The VANET will facilitate new applications for e-business that will revolutionize the driving experience, providing everything from instant, localized traffic updates to warning signals when the vehicle ahead abruptly brakes. In the... more
The VANET will facilitate new applications for e-business that will revolutionize the driving experience, providing everything from instant, localized traffic updates to warning signals when the vehicle ahead abruptly brakes. In the emerging global economy, e-business has increasingly become a necessary component of business strategy and a strong catalyst for economic development. In near future, vehicles may be equipped with short-range radios capable of communicating with other vehicles and highway infrastructure using a VANET. Mobile Advertisement is a location-aware dissemination solution built on top of a vehicular ad-hoc network. We envision a network of 802.11p that dynamically disseminate data to clients running on the car’s smart device. The approach can be considered an alternative to the static
advertisement billboards and can be useful to business companies wanting to dynamically advertise their products and offers to people driving their car. The clients can subscribe to information based on specific topics. We present design solutions that use RSU in 802.11p network for transmitting messages to wireless-enabled devices equipped on vehicles. We also present implementation details for the evaluation of the proposed solution using a simulator designed for VANET application.
Research Interests:
With the development of computer technologies, the amount of data has explosive growth and the data volumes have approximately doubled each year. One of the tools that affect scalability and flexibility to handle structured as well as... more
With the development of computer technologies, the amount of data has explosive growth and the data volumes have approximately doubled each year. One of the tools that affect scalability and flexibility to handle structured as well as unstructured data called Hadoop. However, data cubes are widely used as a powerful tool to provide multi-dimensional
views in data warehousing and On-Line Analytical Processing (OLAP). Therefore, it is becoming expensive to perform the data cube analysis when the data sizes increases. In this paper, we will investigate and review the methods of MapReduce in Hadoop.
Research Interests:
This paper presents the numerical investigation on multi blimp motion using three dimensional computational fluid dynamic (CFD) approach. The cooperative flight configuration is important to reduce energy and improve the communication... more
This paper presents the numerical investigation on multi blimp motion using three dimensional computational fluid dynamic (CFD) approach. The cooperative flight configuration is important to reduce energy and improve the communication reliability within the group. Therefore, we examined the influence of drag and pressure force of cooperative configurations shape in several formations: vee, echelon, line and column. The use of different velocity is also presented to study the effect on a cooperative navigation process. The outcome of this analysis provides the optimal configuration for multi blimp operation. Based on the numerical results, the vee formation should be considered as the best cooperative configuration with low drag effect of drag coefficient and lift coefficient which offered good data overlapping.
Research Interests:
Red blood cells (RBCs) counting in blood smear image is very important to diagnose blood related diseases such as malaria and anemia before a proper treatment can be proposed. The conventional practice for such procedure is executed... more
Red blood cells (RBCs) counting in blood smear image is very important to diagnose blood related diseases such as malaria and anemia before a proper treatment can be proposed. The conventional practice for such procedure is executed manually by pathologist under light microscope. However, manual visual inspection is laborious task and depends on subjective assessment which leads to variation in the RBC counting especially when there are many clumped RBC areas. In this paper a computer-aided systems is proposed to automate the process of counting the RBC from the blood smear image by considering an overlapping constraint. Initially RBCs region are extracted from the background by using global threshold method applied on green channel color image. Next, noise and holes in the RBCs are abolished by utilizing morphological filter and connected component labeling. Following that, information from the RBCs’ area is extracted to determine single and overlapping RBC region. The former region can be counted directly while the latter need to be process further to estimate the number of individual cells. In this paper, two estimators which are Distance transform and Hough transform are utilized to count cells in the clumped regions. Eventually, the total RBCs is found by summing up information from the single cell number and from the estimator. The proposed method has been tested on blood cell images and it demonstrates that Hough transform is more reliable to predict number of total RBCs.
Research Interests:
Among the various means of transportation of products from oil and gas industry, pipelines are considered to be the safest way. Still pipelines are to failure due to corrosion resulting (that causes) leakage and rupture. Although... more
Among the various means of transportation of products from oil and gas industry, pipelines are considered to be the safest way. Still pipelines are to failure due to corrosion resulting (that causes) leakage and rupture. Although corrosion has the nature of uncertainty, the estimation of corrosion failure likelihood (CFL) is very difficult. To mitigate this difficulty, an analytic model for estimating CFL of oil and gas pipelines was developed by means of type-2 fuzzy logic controller system (T2FLCS) approach. The corrosion failure modes considered two types of events such as corrosion thinning and corrosion cracking. The major controlling factors of CFL of pipelines were Corrosion thinning factor, corrosion cracking factor, inspection effectiveness, and inspection times. The influence of controlling factors on type-2 fuzzy rules between the factors and CFL was determined. The assessment results derived from the model can be used as valuable reference for working out pipeline inspection and maintenance plans to a natural gas pipeline to assess the CFL.
Research Interests:
... 2010. [9] Digital Storytelling Association. Digital Storytelling. 2002. Retrieved on 6 March 2010 from http://www.dsaweb.org/ [10] Evangelista, C., Neri, V., Bergamasco, M,. & Carrozzimo, M. Interactive storytelling for children... more
... 2010. [9] Digital Storytelling Association. Digital Storytelling. 2002. Retrieved on 6 March 2010 from http://www.dsaweb.org/ [10] Evangelista, C., Neri, V., Bergamasco, M,. & Carrozzimo, M. Interactive storytelling for children education. ... 2003a. [23] Nielsen, J., Clemmensen, T. & ...
According to scientists in favor of the Big Bang Theory, all forms of energy and mass were once condensed into a tiny glob in distant space. With the collision of photons (charged energy that we most commonly refer to as light), there was... more
According to scientists in favor of the Big Bang Theory, all forms of energy and mass were once condensed into a tiny glob in distant space. With the collision of photons (charged energy that we most commonly refer to as light), there was an implosion that released all the matter ...
Crane is widely used in heavy loads transportation and hazardous material handling in industry to lift loads from one place to another. The transporting movement of heavy payload causing unwanted motion to the payload due to acceleration... more
Crane is widely used in heavy loads transportation and hazardous material handling in industry to lift loads from one place to another. The transporting movement of heavy payload causing unwanted motion to the payload due to acceleration and deceleration of crane trolley. To reduce these problems, a conventional Proportional-Integral-Derivative (PID) is proposed with Linear-Quadratic-Regulator (LQR) optimization enable the transfer the loads from one point to another as fast as possible and reducing the excessive movements to dissolve absolutely at the end of the load delivered point. In this method, LQR elements are used to generate and tune the PID controller gains according to the parameters given and desired specifications. Simulations are performed to demonstrate the effectiveness of the proposed control scheme using MATLAB/SIMULINK software. The simulation results show that the designed controller is effective for load swing suppression and reduction of the excessive movements...
ABSTRACT IrDa and Bluetooth have been used widely in many wireless monitoring and controlling devices. Although, these devices have been replaced the traditional wired systems and contribute in solving the high cost of such systems, there... more
ABSTRACT IrDa and Bluetooth have been used widely in many wireless monitoring and controlling devices. Although, these devices have been replaced the traditional wired systems and contribute in solving the high cost of such systems, there are drawbacks been emerged. The major disadvantages are the range limitation of Bluetooth module and the line of sight problem of IrDa device. A ZigBee is low cost and low power consumption wireless technology. It has a higher connectivity range than Bluetooth and doesn’t have line of sight problem. In this paper, an application model using ZigBee wireless remote controlling and data acquisition device as well as the use of internet connection to enable the device to be used worldwide is presented. Such system has several benefits such as portable, long wireless range, low power consumption, low cost and can be used worldwide using internet. The test results show its potential to be implemented in small offices and smart homes.
ABSTRACT This paper described an analysis the different capabilities and limitation of both IEEE technologies that has been utilized for data transmission directed to mobile device. In this work, we have compared an IEEE 802.11/g/n... more
ABSTRACT This paper described an analysis the different capabilities and limitation of both IEEE technologies that has been utilized for data transmission directed to mobile device. In this work, we have compared an IEEE 802.11/g/n outdoor environment to know what technology is better. The comparison consider on coverage area (mobility), throughput and measuring the interferences. The work presented here is to help the researchers to select the best technology depending of their deploying case, and investigate the best variant for outdoor. The tool used is Iperf software which is to measure the data transmission performance of IEEE 802.11n and IEEE 802.11g. INTRODUCTION The common set of implementing WLAN is the IEEE 802.11 standards. Positive growth of mesh network deployments that currently based on Wi-Fi technology shows that human nowadays depends on a wireless network. Previously, the best available data speeds being dominating by 802.11a, -b or -g standards reach data rates of 54 Mbps. However, over the past year, the arriving of new standard of 802.11n technology has become industry, manufacturer, media and consumer discussion and debate. The positive acceptance of 802.11n Wi-Fi in the enterprise and consumer markets is increase rapidly, with many customers changing older networks to meet new standards [1]. However, well planning wireless network is needed in order to deliver full coverage WLAN which offers, the flexibility to consumer and equipment and in expanding wireless devices in a future. Usually, an IEEE 802.11 standard is chosen based on their bandwidth and their coverage area. Sometimes there are cases where the best technology is not the latest one for indoor or outdoor environment installation [2]. One of the major issues in Wireless Local Area Network (WLAN) is the changes of physical environment [3]. This paper concern in comparing IEEE 802.11/g/n outdoor environments to know what technology is better. This comparison will look through the coverage area, throughput and measuring the interferences between channels. Several works in [2] [8] [9] have empirically investigated each one of them providing their drawbacks and benefits. But, it is not practical to model all wireless coverage area for each site when we are setting up a WLAN [6]. Moreover different 802.11 variants (a, b, g and n) provide different coverage areas and even, different signal strength inside the coverage area. The work presented here is to help researchers to select the best technology depending on their deploying case, and investigate the best alternative for outdoor between 802.11g and 802.11n. BACKGROUND Demand for more bandwidth access and wireless LAN equipment has experienced a phenomenal growth in recent times. The growing deployment of protocols from the Wi-Fi alliance is helping consumers take advantage of new electronic application such as VOIP telephony or video streaming. Officially known as 802.11n and often referred to as "Wireless N," this standard from the Wi-Fi (Wireless Fidelity) alliance paves the way for blazing fast high definition video and data. It is a new standard that promises both higher data rates and increased performance. This N wireless standard has also the ability to have up to four simultaneous streams of high-definition video, voice and data. It also promises easy backward compatibility which means new devices will work smoothly with older product. Unlike wireless G (802.11g), the Wireless N (802.11n) standard promises more bandwidth and high throughput to help consumers and businesses benefit from the Voice over IP (VoIP) technology. It is evidently known that huge amount of moneys can be saved on long distance calls trough VoIP as against traditional telephony, which is why individuals and corporate businesses are leered into using wireless N today and also migrating from existing wireless G to wireless N. The 802.11n standard is a successor to the 802.11g Wi-Fi protocol and therefore offers an improvement such as speeds of up to 54 Mbps. 802.11n supports much faster wireless connections over longer distances. The most important addition is the multiple-input multiple-output (MIMO) capability, alternatively called. MIMO allows for multiple antennas to resolve more information more quickly and improves the reliability, range and performance of connection that is almost close to Ethernet quality. This means users can get at least six (6) times the speed of Wireless G with Wireless N and high definition video can be transmitted across
Research Interests:
Abstract The needs of centralized control system has been long identified in office and industry application. Nevertheless, the same concept can be extended to home application in which a residence can control certain object through a... more
Abstract The needs of centralized control system has been long identified in office and industry application. Nevertheless, the same concept can be extended to home application in which a residence can control certain object through a centralized control system. Thus, a wireless appliance control system for home is proposed in this paper. It makes use of the computer as digital control and monitoring system to control the entire appliance within a house. The system includes a computer as the control centre, RF transmitter and receiver, ...

And 64 more

With the explosive growth of data available on the World Wide Web (WWW), discovery and analysis of useful information from such source becomes a practical necessity. Big data is primarily concerned with the handling of massive scalable... more
With the explosive growth of data available on the World Wide Web (WWW), discovery and analysis of useful information from such source becomes a practical necessity. Big data is primarily concerned with the handling of massive scalable data and discovery of knowledge and aims to provide answers to questions that people do not know how to ask. It is not an automatic process but one that exhaustively explores very large volumes of data to determine otherwise hidden relationships. The process extracts high quality information that can be used to draw conclusions based on relationships or patterns within the data. Web data analysis began as a way for IT administrators to ensure adequate bandwidth and server capacity on their organizations website. Log file data can offer valuable insight into web site usage. It reflects actual usage in natural working condition, compared to the artificial setting of a usability lab. It represents the activity of many users, over potentially long period of time, compared to a limited number of users for an hour or two each.
Research Interests:
Outdoor machine vision is getting a concern nowadays. Ranging from surveillance and monitoring system to automotive system such as driver assistance system require vision application or artificial eye to keep monitoring the situations.... more
Outdoor machine vision is getting a concern nowadays. Ranging from surveillance and
monitoring system to automotive system such as driver assistance system require vision
application or artificial eye to keep monitoring the situations. However, most of these
applications are working very well during clear weather and degrade during bad weather due to
the atmospheric particles mitigate the quality of vision system. This paper discuss the state of the art of image enhancement techniques used to adjust the contrast of an outdoor image degrade by fog, haze, and rain. A brief overview of bad weather will be discussed and several recent techniques on removing fog, haze and rain are discussed