Zobrazeno 1 - 10
of 194
pro vyhledávání: '"Fazirulhisyam Hashim"'
Autor:
Sangin Qahtan Wali, Aduwati Sali, Darko Suka, Sam Aerts, Mohammed Alkuraysi, Lu Li, Alyani Ismail, Fazirulhisyam Hashim, Yasser A. Alsaidosh, Victor P. Gil Jimenez, Manfred Ruttner, Anwar Faizd Osman
Publikováno v:
IEEE Access, Vol 12, Pp 130639-130653 (2024)
This study evaluates the maximum theoretical exposure to radiofrequency (RF) electromag- netic fields (EMFs) from a Fifth-generation (5G) New Radio (NR) base station (BS) while using four commonly used mobile applications: YouTube for video streaming
Externí odkaz:
https://doaj.org/article/c8b17983e8b045c9a103e91ba75f40f5
Publikováno v:
IEEE Access, Vol 12, Pp 125809-125834 (2024)
Many machine learning algorithms excel at handling problems with conflicting objectives. Multi-Objective Optimization (MOO) algorithms play a crucial role in this process by enabling them to navigate these trade-offs effectively. This capability is e
Externí odkaz:
https://doaj.org/article/1c1a6a1a62b64b66808ff0517fd1725a
Autor:
Bilal Omar Akram, Nor Kamariah Noordin, Fazirulhisyam Hashim, Mohd A. Fadlee Rasid, Mustafa Ismael Salman, Abdulrahman M. Abdulghani
Publikováno v:
IEEE Access, Vol 12, Pp 78379-78396 (2024)
The development of new technological applications is driving the need for deterministic network communication that exhibits reliable behavior. This is particularly relevant for applications like automation and autonomous vehicles, which require real-
Externí odkaz:
https://doaj.org/article/80140a4f2091454eb411bc54d73ff9f5
Publikováno v:
International Journal of Technology, Vol 15, Iss 1, Pp 121-129 (2024)
To deliver electricity to customers safely and economically, power companies encounter numerous economic and technical challenges in their operations. Power flow analysis, planning, and control of power systems stand out among these issues. Over
Externí odkaz:
https://doaj.org/article/446f4d53e2c24ddb8dd1268d0be8b6cd
Autor:
Bilal Omar Akram, Nor Kamariah Noordin, Fazirulhisyam Hashim, Mohd Fadlee A. Rasid, Mustafa Ismael Salman, Abdulrahman M. Abdulghani
Publikováno v:
IEEE Access, Vol 11, Pp 142764-142779 (2023)
Real-time communications characterized by low-latency, deterministic, and reliable behavior are crucial for the advancement of emerging technologies. Consequently, Time-Sensitive Networking (TSN) has been developed to address the distinct demands of
Externí odkaz:
https://doaj.org/article/e3fa9947c3e34b3fa3dfa660954df6a4
Publikováno v:
IEEE Access, Vol 11, Pp 128596-128617 (2023)
Intrusion Detection Systems (IDS) serve as critical components in safeguarding network security by detecting malicious activities. Although IDS has recently been treated primarily through the lens of machine learning, challenges persist, particularly
Externí odkaz:
https://doaj.org/article/d060cd77f81146e5afeb71dc2f9c6c37
Publikováno v:
IEEE Access, Vol 11, Pp 45098-45112 (2023)
Cloudlet-based optimization involves deploying a set of cloudlets in an environment and assigning user tasks to optimize various metrics, including energy consumption, quality of service (QoS), and cost. Typically, approaches deal with them separatel
Externí odkaz:
https://doaj.org/article/ca77b7630dc34c7cbeeec6ba1b74d849
Autor:
Nnamdi Henry Umelo, Nor Kamariah Noordin, Mohd Fadlee A. Rasid, Kim Geok Tan, Fazirulhisyam Hashim
Publikováno v:
IEEE Access, Vol 11, Pp 11102-11117 (2023)
Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. DFSA fails when the UHF RFID tag deployment becomes dense like in Internet of
Externí odkaz:
https://doaj.org/article/0ee36146b3804c2897dcc51ec25be560
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 7, Pp 101628- (2023)
Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage has resulted in a rise in cyberattacks. Cross-site scripting (XSS) is one of the most freq
Externí odkaz:
https://doaj.org/article/fe48f31eec624551872584b06bdcc078
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 6, Pp 101490- (2023)
Web applications’ popularity has raised attention in various service domains, which increased the concern about cyber-attacks. One of these most serious and frequent web application attacks is a Cross-site scripting attack (XSS). It causes grievous
Externí odkaz:
https://doaj.org/article/8373364c0bc84475b72abf46a3c797fd