Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Kamal Ali Alezabi"'
Publikováno v:
International Journal of Information Science and Management, Vol 20, Iss 4, Pp 87-102 (2022)
Other languages have influenced Arabic because of several factors, such as geographical nearness, trade communication, past Islamic conquests, science and technology, new devices, brand names, models, and fashion. As a result of these factors, foreig
Externí odkaz:
https://doaj.org/article/00ff681fd28543b7bf6488e014ad47fb
Autor:
Munther Numan Munther, Fazirulhisyam Hashim, Nurul Adilah Abdul Latiff, Kamal Ali Alezabi, Jiun Terng Liew
Publikováno v:
Egyptian Informatics Journal, Vol 23, Iss 1, Pp 113-126 (2022)
Ethernet is one of the widespread protocols residing in the second layer of the seven-layers Open Systems Interconnection (OSI) model. Ethernet offers various advantages which enable its widespread use in all types of network topology and becomes an
Externí odkaz:
https://doaj.org/article/148047dd2716432780e926784b953349
Autor:
Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful J. Hashim, Borhanuddin M. Ali, Abbas Jamalipour
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2020, Iss 1, Pp 1-34 (2020)
Abstract In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless n
Externí odkaz:
https://doaj.org/article/865285820b6a4189a9ae0a43ba067d5c
Publikováno v:
IEEE Access, Vol 8, Pp 67484-67500 (2020)
Underwater wireless sensor network (UWSN) is the enabling technology for a new era of underwater monitoring and actuation applications. In this network, data aggregation and forwarding are intensely constrained due to channel impairment, and therefor
Externí odkaz:
https://doaj.org/article/6daa0bfab22a4bcabb357fbe034509e0
Publikováno v:
PLoS ONE, Vol 15, Iss 8, p e0237386 (2020)
The IEEE 802.11ah standard relies on the conventional distributed coordination function (DCF) as a backoff selection method. The DCF is utilized in the contention-based period of the newly introduced medium access control (MAC) mechanism, namely rest
Externí odkaz:
https://doaj.org/article/4ccf9ca6dd24406e94021a1180b98dd4
Publikováno v:
Symmetry, Vol 12, Iss 10, p 1638 (2020)
A crucial performance concern in distributed decentralized environments, like clouds, is how to guarantee that jobs complete their execution within the estimated completion times using the available resources’ bandwidth fairly and efficiently while
Externí odkaz:
https://doaj.org/article/c7e40d48907b44bf818bef298afc0db7
Publikováno v:
Sensors, Vol 20, Iss 8, p 2283 (2020)
Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes’ important credentials and subsequently replicate the nodes, which
Externí odkaz:
https://doaj.org/article/6e23c97b545b44aba7cf44e84ad1f9c0
Publikováno v:
Journal of King Saud University - Computer and Information Sciences. 34:6635-6642
Superior stemming algorithms aid significantly in many natural language processing (NLP) applications such as information retrieval. Arabic light-based stemmer is one of the most important stemming algorithms. However, partially due to the highly inf
Autor:
Nurul Adilah Abdul Latiff, Munther Numan Munther, Jiun Terng Liew, Fazirulhisyam Hashim, Kamal Ali Alezabi
Publikováno v:
Egyptian Informatics Journal, Vol 23, Iss 1, Pp 113-126 (2022)
Ethernet is one of the widespread protocols residing in the second layer of the seven-layers Open Systems Interconnection (OSI) model. Ethernet offers various advantages which enable its widespread use in all types of network topology and becomes an
Publikováno v:
Advances in Science, Technology and Engineering Systems Journal. 6:17-35