scispace - formally typeset
Search or ask a question
Author

Borhanuddin Mohd Ali

Other affiliations: MIMOS
Bio: Borhanuddin Mohd Ali is an academic researcher from Universiti Putra Malaysia. The author has contributed to research in topics: Reduction (complexity) & Wireless sensor network. The author has an hindex of 17, co-authored 43 publications receiving 1095 citations. Previous affiliations of Borhanuddin Mohd Ali include MIMOS.

Papers
More filters
Journal ArticleDOI
TL;DR: Modified double-weight (MDW) code is shown here to provide a much better performance compared to Hadamard and modified frequency-hopping codes.
Abstract: A new code structure for spectral-amplitude-coding optical code-division multiple-access system based on double-weight (DW) code families is proposed. The DW code has a fixed weight of two. By using a mapping technique, codes that have a larger number of weights can be developed. Modified double-weight (MDW) code is a DW code family variation that has variable weights of greater than two. The newly proposed code possesses ideal cross-correlation properties and exists for every natural number n. Based on theoretical analysis and simulation, MDW code is shown here to provide a much better performance compared to Hadamard and modified frequency-hopping codes.

285 citations

Journal ArticleDOI
TL;DR: This paper discusses how topology management and network application influence the performance of cluster-based and chain-based hierarchical networks, and it is shown that the chain- based HRPs guarantee a longer network lifetime compared to Cluster-based HRPs by three to five times.
Abstract: The routing protocol for Wireless Sensor Networks (WSNs) is defined as the manner of data dissemination from the network field (source) to the base station (destination). Based on the network topology, there are two types of routing protocols in WSNs, they are namely flat routing protocols and hierarchical routing protocols. Hierarchical routing protocols (HRPs) are more energy efficient and scalable compared to flat routing protocols. This paper discusses how topology management and network application influence the performance of cluster-based and chain-based hierarchical networks. It reviews the basic features of sensor connectivity issues such as power control in topology set-up, sleep/idle pairing and data transmission control that are used in five common HRPs, and it also examines their impact on the protocol performance. A good picture of their respective performances give an indication how network applications, i.e whether reactive or proactive, and topology management i.e. whether centralized or distributed would determine the network performance. Finally, from the ensuring discussion, it is shown that the chain-based HRPs guarantee a longer network lifetime compared to cluster-based HRPs by three to five times.

71 citations

Journal ArticleDOI
TL;DR: A novel technique for reducing the peak to average power ratio (PAPR) in OFDM systems by using the combination of the dummy sequence insertion (DSI) and partial transmit sequence (PTS) is proposed, which can remarkably reduce the computational complexity.
Abstract: In this paper a novel technique for reducing the peak to average power ratio (PAPR) in OFDM systems by using the combination of the dummy sequence insertion (DSI) and partial transmit sequence (PTS) is proposed. In DSI increasing the number of dummy sequence decrease the transmission efficiency (TE) and in PTS the complexity increases when the number of subblock increases. Unlike the conventional PTS which needs several inverse fast fourier transform (IFFT) operations, the proposed DSI-PTS technique requires half IFFT operations only, while the PAPR performance is even better. So, it can remarkably reduce the computational complexity. Simulation results are examined with IEEE 802.16-2004 standard. By applying the DSI-PTS method about 0.5 dB reduction in PAPR at complementary cumulative distribution function (CCDF) of 0.01% is achieved compared to the conventional PTS while the complexity is reduced.

70 citations

Proceedings ArticleDOI
03 Jul 2013
TL;DR: This paper surveys IPv6 mobility protocols and proposes some solutions which make it more suitable to a hospital architecture based on 6LoWPAN technology, and initial numerical results show a reduction of the handoff costs on the mobile router which normally constitute a bottleneck in such a system.
Abstract: IPv6 Low-power Personal Area Networks (6LoWPANs) have recently found renewed interest because of the emergence of Internet of Things (IoT).However, mobility support in 6LoWPANs is still in its infancy for large-scale IP-based sensor technology in future IoT. The hospital wireless network is one important 6LoWPAN application of the IoT, where it keeps continuous monitoring of patients' vital signs while the patients are on the move. Proper mobility management is needed to maintain connectivity between patient nodes and the hospital network to monitor their exact locations. It should also support fault tolerance and optimize energy consumption of the devices. In this paper, we survey IPv6 mobility protocols and propose some solutions which make it more suitable to a hospital architecture based on 6LoWPAN technology. Our initial numerical results show a reduction of the handoff costs on the mobile router which normally constitute a bottleneck in such a system. We also discuss important metrics such as signaling overload, bandwidth efficiency and power consumption and how they can be optimized through the mobility management.

69 citations

Journal ArticleDOI
01 Dec 2014
TL;DR: The motivation of this survey is to present some decentralised energy‐aware routing using optimization methods that is generic and applicable to most of WSN applications that require reduction of energy consumptions and extend a network's life time.
Abstract: Over recent years, enormous amounts of research in wireless sensor networks WSNs have been conducted; this is because of its multifarious applications such as in environmental monitoring, object tracking, disaster management, manufacturing, monitoring and control. Nevertheless, optimising the energy consumption of sensor nodes SNs in WSNs and realising the anticipated quality of solutions supplied from them present considerable challenges. In WSNs, the sudden 'death' of critical nodes can cause an entire network to malfunction. This is usually caused by uneven depletion of battery power of the individual nodes. Therefore, this survey investigates the methods that aim to minimise usage of energy in SNs, especially during routing. This is because network activities start to be challenged when the first SN exhausts its battery. In addition, this paper introduces a comprehensive categorization of the energy-aware protocols in WSNs. Thus, the motivation of this survey is to present some decentralised energy-aware routing using optimization methods that is generic and applicable to most of WSN applications that require reduction of energy consumptions and extend a network's life time. Copyright © 2013 John Wiley & Sons, Ltd.

63 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An intelligent collaborative security model to minimize security risk is proposed; how different innovations such as big data, ambient intelligence, and wearables can be leveraged in a health care context is discussed; and various IoT and eHealth policies and regulations are addressed to determine how they can facilitate economies and societies in terms of sustainable development.
Abstract: The Internet of Things (IoT) makes smart objects the ultimate building blocks in the development of cyber-physical smart pervasive frameworks. The IoT has a variety of application domains, including health care. The IoT revolution is redesigning modern health care with promising technological, economic, and social prospects. This paper surveys advances in IoT-based health care technologies and reviews the state-of-the-art network architectures/platforms, applications, and industrial trends in IoT-based health care solutions. In addition, this paper analyzes distinct IoT security and privacy features, including security requirements, threat models, and attack taxonomies from the health care perspective. Further, this paper proposes an intelligent collaborative security model to minimize security risk; discusses how different innovations such as big data, ambient intelligence, and wearables can be leveraged in a health care context; addresses various IoT and eHealth policies and regulations across the world to determine how they can facilitate economies and societies in terms of sustainable development; and provides some avenues for future research on IoT-based health care based on a set of open issues and challenges.

2,190 citations

Journal ArticleDOI
TL;DR: In this article, the authors review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning and investigate their employment in the compelling applications of wireless networks, including heterogeneous networks, cognitive radios (CR), Internet of Things (IoT), machine to machine networks (M2M), and so on.
Abstract: Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of Things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.

413 citations