Zobrazeno 1 - 10
of 250
pro vyhledávání: '"Abdul Hanan, Abdullah"'
Autor:
Satria Mandala, Ardian Rizal, Adiwijaya, Siti Nurmaini, Sabilla Suci Amini, Gabriel Almayda Sudarisman, Yuan Wen Hau, Abdul Hanan Abdullah
Publikováno v:
PLoS ONE, Vol 19, Iss 4 (2024)
Externí odkaz:
https://doaj.org/article/dbfc84db58074e05b7e2b04827abbdbd
Autor:
Satria Mandala, Sabilla Suci Amini, Adiwijaya, Aulia Rayhan Syaifullah, Miftah Pramudyo, Siti Nurmaini, Abdul Hanan Abdullah
Publikováno v:
IEEE Access, Vol 11, Pp 136654-136665 (2023)
Myocardial Infarction (MI), commonly known as a heart attack, is a type of cardiovascular disease characterized by the death of heart muscle cells. This condition occurs due to the blockage of blood vessels around the heart, inhibiting blood flow and
Externí odkaz:
https://doaj.org/article/2ed6901085dc47238309e9fad8057f05
Publikováno v:
Applied Sciences, Vol 14, Iss 1, p 262 (2023)
Water presents challenges in swiftly and accurately assessing its quality due to its intricate composition, diverse sources, and the emergence of new pollutants. Current research tends to oversimplify water quality, categorizing it as potable or not,
Externí odkaz:
https://doaj.org/article/3ca7f6cdb4204c3ab6b5ed0340e1cdd7
Autor:
Deris Stiawan, Ahmad Heryanto, Ali Bardadi, Dian Palupi Rini, Imam Much Ibnu Subroto, Kurniabudi, Mohd Yazid Bin Idris, Abdul Hanan Abdullah, Bedine Kerim, Rahmat Budiarto
Publikováno v:
IEEE Access, Vol 9, Pp 6930-6947 (2021)
Intrusion Detection System is yet an interesting research topic. With a very large amount of traffic in real-time networks, feature selection techniques that are effectively able to find important and relevant features are required. Hence, the most i
Externí odkaz:
https://doaj.org/article/30803e1d72e94829afa26e8039a4bcb8
Autor:
Farkhana, Muchtar, Abdul Hanan, Abdullah, Suhaidi, Hassan, Ahamad Tajudin, Khader, Kamal Zuhairi, Zamli
Publikováno v:
In Journal of Network and Computer Applications 1 April 2019 131:109-132
Autor:
Ahmed Aliyu, Abdul Hanan Abdullah, Omprakash Kaiwartya, Syed Hamid Hussain Madni, Usman Mohammed Joda, Abubakar Ado, Muhammad Tayyab
Publikováno v:
Journal of Computer Networks and Communications, Vol 2020 (2020)
Mobile cloud computing (MCC) holds a new dawn of computing, where the cloud users are attracted to multiple services through the Internet. MCC has a qualitative, flexible, and cost-effective delivery platform for providing services to mobile cloud us
Externí odkaz:
https://doaj.org/article/1f7262f8e57b4211932b829d9fb6648c
Publikováno v:
Advances in Distributed Computing and Artificial Intelligence Journal, Vol 7, Iss 1, Pp 13-28 (2018)
In spite of all security issues in the cloud system, distributed cloud environment requires an access control model which should be context aware to handle all issues intelligently. It must include role activation process based on the user's context
Externí odkaz:
https://doaj.org/article/8746b9c1500a4414a8ee9fad7f062632
Publikováno v:
IEEE Access, Vol 6, Pp 614-624 (2018)
The Internet of Things gateways with multi-radio facilities in wireless networks can simultaneously communicate using multiple available channels. This feature enhances the carrying capacity of wireless links and thus increases the overall network th
Externí odkaz:
https://doaj.org/article/e200f052d5934110b1c8c7cf89d5ef78
Autor:
Ahmed Aliyu, Abdul Hanan Abdullah, Nauman Aslam, Ayman Altameem, Raja Zahilah Radzi, Rupak Kharel, Mufti Mahmud, Shiv Prakash, Usman Mohammed Joda
Publikováno v:
IEEE Access, Vol 6, Pp 47610-47626 (2018)
The multipath transmission is one of the suitable transmission methods for high data rate oriented communication such as video streaming. Each video packets are split into smaller frames for parallel transmission via different paths. One path may int
Externí odkaz:
https://doaj.org/article/8fc75159bb444b9eb1409bc10caf8cf1
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 29, Iss 3, Pp 269-280 (2017)
Due to the absence of infrastructure support, secure data dissemination is a challenging task in scalable mobile ad hoc networks (MANETs) environment. In most of the traditional routing techniques for MANETs, either security has not been taken into a
Externí odkaz:
https://doaj.org/article/7ff585df74684871a53422cf3fc6f666