Farkhana Muchtar
Universiti Teknologi Malaysia
ArduinoFeature selectionArtificial intelligenceNetwork packetReliability (computer networking)Network congestionHost (network)Mobile robotWireless sensor networkEfficient energy useEnergy consumptionContent based networkingComputer networkTestbedProtocol stackComputer scienceEnergy conservationFeature extractionPacket lossRemote controlReal-time computingRobotMobile ad hoc networkWireless ad hoc network
26Publications
3H-index
56Citations
Publications 23
Newest
#1Farkhana Muchtar (UTM: Universiti Teknologi Malaysia)H-Index: 3
#2Mosleh Hamoud Al-Adhaileh (King Faisal University)H-Index: 2
Last. Ajibade Lukuman Saheed (UTM: Universiti Teknologi Malaysia)
view all 7 authors...
This paper is a continuation of our previous paper under the same topic, ToMRobot 1.0. Our main goal of developing ToMRobot 2.0 is to improve the ToMRobot 1.0 that we developed earlier. ToMRobot was developed because we think mobile robot technology is more practical than other approaches as a real world mobility mechanism in MANET testbed. But to develop our own mobile robot at low cost and at the same time not complex is very challenging. The challenge is overcome through the use of easy-to-us...
Source
#1Farkhana Muchtar (UTM: Universiti Teknologi Malaysia)H-Index: 3
#2Mosleh Hamoud Al-Adhaileh (King Faisal University)H-Index: 2
Last. Ajibade Lukuman Saheed (UTM: Universiti Teknologi Malaysia)
view all 7 authors...
This article aims to share how to create a minimum MANET testbed facility as a requirement for evaluation of MANET research. Testbed facility that we have developed is called as Testbed on MANET or abbreviation ToM. We chose to use single board computer (SBC) to represent mobile devices in MANET. ToM facility and can be used either in a static mesh network or in a dynamic network topology, where each node in the testbed can move according to the needs of the researcher. To realize a real world n...
Source
#1Ili Najaa Aimi Mohd Nordin (UTHM: Universiti Tun Hussein Onn Malaysia)H-Index: 5
#2Najla Aiman Nazari (UTHM: Universiti Tun Hussein Onn Malaysia)H-Index: 1
Last. Nor Aira Zambri (UTHM: Universiti Tun Hussein Onn Malaysia)H-Index: 4
view all 7 authors...
This paper presents study on optimizing RF signal detection and alert system for restricted area. Nowadays, mobile phone utilization is very common among youngsters. Despite of being very useful for educational purpose, it turns into a noteworthy issue while being smuggled into restricted area, such as examination hall and used as a cheating tool. To overcome this problem, an advancement on the detection and alert system of active mobile phone was proposed by implementing RF signal detection sys...
Source
#1Deris StiawanH-Index: 9
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 7 authors...
Dragon Nest is one of Massively Multiplayer Online Role-playing Game (MMORPG online games. It has become the most popular online game played by people around the world. This work observes two examples of the MMORPG online games: the Dragon Nest INA and the Legend DN II. The purpose is to analyze the traffic data of the Dragon Nest to find and discern the patterns of behavior of the Dragon Nest INA and the Legend DN II using Deep Packet Inspection (DPI). A dataset is constructed by capturing traf...
1 CitationsSource
#1Deris StiawanH-Index: 9
#2Dimas WahyudiH-Index: 2
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 8 authors...
Focus of this research is TCP FIN flood attack pattern recognition in Internet of Things (IoT) network using rule based signature analysis method. Dataset is taken based on three scenario normal, attack and normal-attack. The process of identification and recognition of TCP FIN flood attack pattern is done based on observation and analysis of packet attribute from raw data (pcap) using a feature extraction and feature selection method. Further testing was conducted using snort as an IDS. The res...
1 CitationsSource
#1Farhan Masud (UTM: Universiti Teknologi Malaysia)H-Index: 4
#2Abdul Hanan Abdullah (UTM: Universiti Teknologi Malaysia)H-Index: 36
Last. Farkhana Muchtar (UTM: Universiti Teknologi Malaysia)H-Index: 3
view all 5 authors...
This paper proposes an improved Traffic Class Prioritization based Carrier Sense Multiple Access/Collision Avoidance (TCP-CSMA/CA) scheme for prioritized channel access to heterogenous-natured Bio-Medical Sensor Nodes (BMSNs) for IEEE 802.15.4 Medium Access Control (MAC) in intra-Wireless Body Area Networks (WBANs). The main advantage of the scheme is to provide prioritized channel access to heterogeneous-natured BMSNs of different traffic classes with reduced packet delivery delay, packet loss,...
8 CitationsSource
#1Farkhana Muchtar (UTM: Universiti Teknologi Malaysia)H-Index: 3
#2Pradeep Kumar SinghH-Index: 18
Last. Mohd Najwadi Yusoff (Universiti Sains Malaysia)H-Index: 2
view all 6 authors...
It has been identified from literature that affordability is the main constraint faced by the majority of MANET (Mobile Ad-hoc Network) researchers which sees them forgoing implementing real world experimental studies that are costlier, in favour of opting for cheaper simulation tools instead. While simulation tools provide a simple and inexpensive method to gain an understanding of algorithms and protocols in MANET research, its reliability and accuracy in representing real systems and contexts...
Source
#1Farkhana Muchtar (UTM: Universiti Teknologi Malaysia)H-Index: 3
#2Pradeep Kumar SinghH-Index: 18
Last. Suzi Iryanti Fadilah (Universiti Sains Malaysia)H-Index: 2
view all 6 authors...
Lately, Peer to Peer (P2P) over Mobile Ad hoc Network have become a hot topics. Thus, the main motivation of this paper is to review various techniques that have been used in previously reported research of Peer to Peer (P2P) over Mobile Ad hoc Network (MANET). From the said document, it is identified that all previously techniques used in P2P over MANET have one similarity; namely maintaining the use of TCP/IP stack as network solution, in which the source for high energy resources for their pr...
Source
#1Farkhana Muchtar (UTM: Universiti Teknologi Malaysia)H-Index: 3
#2Abdul Hanan Abdullah (UTM: Universiti Teknologi Malaysia)H-Index: 36
Last. Siti Nor Zawani Ahmmad (University of Kuala Lumpur)H-Index: 2
view all 6 authors...
MANET (Mobile Ad Hoc Network) researchers have shown increased interest in using mobile robot technology for their testbed platforms. Thus, the main motivation of this paper is to review various robot-based MANET testbeds that have been developed in previously reported research. Additionally, suggestions to heighten mobility mechanisms by using mobile robots to be more practical, easy and inexpensive are also included in this paper, as we unveils ToMRobot, a low-cost MANET robot created from an ...
3 CitationsSource
#1Farkhana MuchtarH-Index: 3
Last. Hafizul Fahri HanafiH-Index: 4
view all 6 authors...
Cloud computing technology has become familiar to most Internet users. Subsequently, there has been an increased growth in the use of cloud computing, including Infrastructure as a Service (IaaS). To ensure that IaaS can easily meet the growing demand, IaaS providers usually increase the capacity of their facilities in a vertical IaaS increase capability and the capacity for local IaaS amenities such as increasing the number of servers, storage and network bandwidth. However, at the same time, h...
Source