Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Ahmad Faisal Amri Abidin"'
Autor:
Rajina R. Mohamed, Mohd Sufian Mat Deris, Mohd Noor Derahman, Mohd Fadzil Abdul Kadir, Abd Rasid Mamat, Ahmad Faisal Amri Abidin, Mohamad Afendee Mohamed
Publikováno v:
International Journal of Engineering Trends and Technology. 69:36-40
Autor:
Mohd Fadzil Abdul Kadir, Ahmad Faisal Amri Abidin, Mohamad Afendee Mohamed, Nazirah Abdul Hamid
Because of its ease of use and speed compared to other communication applications, email is the most commonly used communication application worldwide. However, a major drawback is its inability to detect whether mail content is either spam or ham. T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e08014de77c6089695364b155d8b93e2
https://zenodo.org/record/7141569
https://zenodo.org/record/7141569
Autor:
Abd Rasid Mamat, Ahmad Faisal Amri Abidin, S. D. M. Satar, Wan Nor Shuhadah Wan Nik, Mohamad Afendee Mohamed, M. I. Awang
Publikováno v:
Far East Journal of Electronics and Communications. 17:1373-1388
Autor:
Ahmad Aiman Shallahuddin, Mohd Fadzil Abdul Kadir, Mohamad Afendee Mohamed, Ahmad Faisal Amri Abidin@Bharun, Nor Surayati Mohamad Usop, Zahrahtul Amani Zakaria
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811514647
In wireless sensor network (WSN), energy efficiency is the most fundamental issue that requires special attention during the design of communication protocols. Energy waste is largely contributed by collision, idle listening, overhearing and over-emi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7fd08af0386f4c094f84e4e12df7015b
https://doi.org/10.1007/978-981-15-1465-4_4
https://doi.org/10.1007/978-981-15-1465-4_4
Publikováno v:
International Journal of Information Technology and Computer Science. 4:25-31
This paper presents the architecture for accessing heterogeneous databases. Two major processes in this architecture which are extracting SQL statement and ontology. The algorithms for extracting SQL statement was created and tested in order to impro
Autor:
Wan Nor Shuhadah Wan Nik, Norziana Jamil, Abd Rasid Mamat, Marina Md Din, Ahmad Faisal Amri Abidin, Mohamad Afendee Mohamed
Publikováno v:
International Journal of Engineering & Technology. 7:5
In a perfect condition, there are only normal network traffic and sometimes flash event traffics due to some eye-catching or heart-breaking events. Nevertheless, both events carry legitimate requests and contents to the server. Flash event traffic ca
Publikováno v:
The Smart Computing Review.
An instant messenger is an application that allows communication in a secure manner. A secured private instant messenger is needed to ensure secure data transmission between the sender and recipient. This paper presents secure instant messenger archi
Publikováno v:
APCC
Instant messenger is an IM application that allows communication in a secured manner. A secured private IM is needed to ensure data transmission between sender and recipient more secure. This paper presents a secure IM architecture. A secure architec
Publikováno v:
WIMS
World Wide Web is important tool to web users. This tool enables the web users gain information about education, entertainment, etc. In this research, we investigate the issue for data access to heterogeneous data sources. Web query processing is iss
Publikováno v:
Journal of Information Technology & Software Engineering.
Bioinformatics is combination between biology and informatics. Most of biological data is used by private or government sectors such clinics, hospitals, etc. Web based application is tool to access this biological data. A good methodology or techniqu