Zobrazeno 1 - 10
of 67
pro vyhledávání: '"Shafi'I Muhammad Abdulhamid"'
Autor:
Imran Javed, Uzair Iqbal Janjua, Shafi'i Muhammad Abdulhamid, Tahir Mustafa Madni, Adnan Akhunzada
Publikováno v:
IEEE Access, Vol 11, Pp 99499-99518 (2023)
Global Software Development (GSD) offers several benefits to software development organizations, including reduced development costs, the availability of low-wage and highly skilled employees, and an improved marketplace. Meanwhile, it faces severe c
Externí odkaz:
https://doaj.org/article/9bc25c76bace4f79b6fd0f802f0f2674
Autor:
Daksh Dave, Aditya Sharma, Shafi'i Muhammad Abdulhamid, Adeel Ahmed, Adnan Akhunzada, Rashid Amin
Publikováno v:
IEEE Access, Vol 11, Pp 76751-76767 (2023)
Due to the rapid development of technology and the widespread usage of smartphones, the number of mobile applications is exponentially growing. Finding a suitable collection of apps that aligns with users’ needs and preferences can be challenging.
Externí odkaz:
https://doaj.org/article/3e5f1a1bfa6d40ab81c127dd2186af12
Autor:
John Oche Onah, Shafi’i Muhammad Abdulhamid, Mohammed Abdullahi, Ibrahim Hayatu Hassan, Abdullah Al-Ghusham
Publikováno v:
Machine Learning with Applications, Vol 6, Iss , Pp 100156- (2021)
The sharp rise in network attacks has been a major source of concern in cyber security, particularly that now internet usage and connectivity are in high demand. As a complement to cloud computing, fog computing can offer low-latency services among u
Externí odkaz:
https://doaj.org/article/0eb409d75520449fb5033ac08b3102c7
Autor:
Haruna Chiroma, Usman Ali Abdullahi, Shafi'i Muhammad Abdulhamid, Ala Abdulsalam Alarood, Lubna A. Gabralla, Nadim Rana, Liyana Shuib, Ibrahim Abaker Targio Hashem, Dada Emmanuel Gbenga, Adamu I. Abubakar, Akram M. Zeki, Tutut Herawan
Publikováno v:
IEEE Access, Vol 7, Pp 70535-70551 (2019)
Approximately 2.5 quintillion bytes of data are emitted on a daily basis, and this has brought the world into the era of “big data.” Artificial neural networks (ANNs) are known for their effectiveness and efficiency for small datasets, and this e
Externí odkaz:
https://doaj.org/article/bbeb342002184515b568c6b17da8d78b
Autor:
Shafi'I Muhammad Abdulhamid, Muhammad Shafie Abd Latiff, Haruna Chiroma, Oluwafemi Osho, Gaddafi Abdul-Salaam, Adamu I. Abubakar, Tutut Herawan
Publikováno v:
IEEE Access, Vol 5, Pp 15650-15666 (2017)
Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable nuisance to the mobile subscribers. This marketing practice also worries service providers
Externí odkaz:
https://doaj.org/article/ad35d65651314a72ba9b4ef2f5d746c8
Autor:
Emmanuel Gbenga Dada, Joseph Stephen Bassi, Haruna Chiroma, Shafi'i Muhammad Abdulhamid, Adebayo Olusola Adetunmbi, Opeyemi Emmanuel Ajibuwa
Publikováno v:
Heliyon, Vol 5, Iss 6, Pp e01802- (2019)
The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters. Machine learning methods of recent are being used to successfully detect and filter spam emails.
Externí odkaz:
https://doaj.org/article/81217243526b49299348e70385edbfc3
Autor:
Syed Hamid Hussain Madni, Muhammad Shafie Abd Latiff, Mohammed Abdullahi, Shafi'i Muhammad Abdulhamid, Mohammed Joda Usman
Publikováno v:
PLoS ONE, Vol 12, Iss 5, p e0176321 (2017)
Cloud computing infrastructure is suitable for meeting computational needs of large task sizes. Optimal scheduling of tasks in cloud computing environment has been proved to be an NP-complete problem, hence the need for the application of heuristic m
Externí odkaz:
https://doaj.org/article/a9029a686b0243ce9b93efa708201b54
Autor:
Shafi'i Muhammad Abdulhamid, Muhammad Shafie Abd Latiff, Gaddafi Abdul-Salaam, Syed Hamid Hussain Madni
Publikováno v:
PLoS ONE, Vol 11, Iss 7, p e0158102 (2016)
Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identifie
Externí odkaz:
https://doaj.org/article/78067c7634564e2aa6dd7a173447ec6b
Publikováno v:
Journal of Reliable Intelligent Environments. 8:397-414
Over the years, digital signature algorithms such as Rivest–Shamir–Adleman (RSA) and elliptic curve digital signature algorithm (ECDSA) are the commonly used algorithms to secure data in the public key infrastructure and other computing devices.
Publikováno v:
Engineering Optimization. 54:1999-2016
Virtual machine (VM) scheduling in a dynamic cloud environment is often bound with multiple quality of service parameters; therefore, it is classed as an NP-hard optimization problem. Swarm-based m...