Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Mohd Nizam Mohmad Kahar"'
Autor:
Sharfah Ratibah Tuan Mat, Mohd Faizal Ab Razak, Mohd Nizam Mohmad Kahar, Juliza Mohamad Arif, Ahmad Firdaus
Publikováno v:
ICT Express, Vol 8, Iss 3, Pp 424-431 (2022)
The unprecedented growth of mobile technology has generated an increase in malware and raised concerns over malware threats. Different approaches have been adopted to overcome the malware attacks yet this spread is still increasing. To combat this is
Externí odkaz:
https://doaj.org/article/e6fbb9775dde4623ac3f1bd44dee5349
Publikováno v:
Iraqi Journal for Computer Science and Mathematics, Vol 4, Iss 2 (2023)
This study deals with an unrelated parallel machine scheduling problem with additional resources (UPMR). That is one of the important sub-problems in the scheduling. UPMR consists of scheduling a set of jobs on unrelated machines. In addition to that
Externí odkaz:
https://doaj.org/article/7ecbb98c08884a5eb02675ecfc1ce420
Publikováno v:
International Journal of Advanced Robotic Systems, Vol 14 (2017)
This article presents a critical evaluation of swarm intelligence techniques for solving combinatorial optimization problems. Since, unarguably, the traveling salesman’s problem is the most developed, studied, and popular combinatorial problem, thi
Externí odkaz:
https://doaj.org/article/7f8212fdf0814125872bda3facdaedbd
Publikováno v:
PLoS ONE, Vol 12, Iss 4, p e0175901 (2017)
In this paper, an attempt is made to apply the African Buffalo Optimization (ABO) to tune the parameters of a PID controller for an effective Automatic Voltage Regulator (AVR). Existing metaheuristic tuning methods have been proven to be quite succes
Externí odkaz:
https://doaj.org/article/a885f82ff35b4eb1878dc0a446d303a1
Autor:
Mohd Faizal Ab Razak, Mohd Nizam Mohmad Kahar, Juliza Mohamad Arif, Ahmad Firdaus, Sharfah Ratibah Tuan Mat
Publikováno v:
ICT Express. 8:424-431
The unprecedented growth of mobile technology has generated an increase in malware and raised concerns over malware threats. Different approaches have been adopted to overcome the malware attacks yet this spread is still increasing. To combat this is
This paper focuses on solving unrelated parallel machine scheduling with resource constraints (UPMR). There are j jobs, and each job needs to be processed on one of the machines aim at minimizing the makespan. Besides the dependence of the machine, t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2659::40ee6eccce5d0e798e821ad261c3d579
https://zenodo.org/record/7325382
https://zenodo.org/record/7325382
Autor:
Mohd Nizam Mohmad Kahar, Salwana Mohamad, Ahmad Firdaus, Mohd Faizal Ab Razak, Juliza Mohamad Arif, Sharfah Ratibah Tuan Mat
Publikováno v:
Scientometrics
Malware is a blanket term for Trojan, viruses, spyware, worms, and other files that are purposely created to harm computers, mobile devices, or computer networks. Malware commonly steals, encrypts, damages, and causes a mess in these devices. The gro
Publikováno v:
IAES International Journal of Artificial Intelligence (IJ-AI). 12:315
This paper focuses on solving unrelated parallel machine scheduling with resource constraints (UPMR). There are j jobs, and each job needs to be processed on one of the machines aim at minimizing the makespan. Besides the dependence of the machine, t
Autor:
Omar A. Hammood, Mohd Nizam Mohmad Kahar, Raed Abdulkareem Hasan, Ayoob A. Yoob, Waleed A. Hammood, Tole Sutikno, Mostafa Abdulghfoor Mohammed
Publikováno v:
Bulletin of Electrical Engineering and Informatics. 9:685-697
Vehicular ad-hoc networks (VANETs) are characterized by limited network resources such as limited bandwidth and battery capacity. Hence, it is necessary that unnecessary use of network resources (such as unnecessary packet transfers) is reduced in su
Publikováno v:
2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM).
The advance growth of technology today, has simply brought to the increasing of the Internet and online activities such as in business, management, education and other areas. However, this has exposed to the malicious activities and online threat to