Search Results - "ABDULHAMİD, Shafi'i Muhammad"

Refine Results
  1. 1

    A hybrid whale optimization algorithm with differential evolution optimization for multi-objective virtual machine scheduling in cloud computing by Rana, Nadim, Abd Latiff, Muhammad Shafie, Abdulhamid, Shafi'i Muhammad, Misra, Sanjay

    Published in Engineering optimization (02-12-2022)
    “…Virtual machine (VM) scheduling in a dynamic cloud environment is often bound with multiple quality of service parameters; therefore, it is classed as an…”
    Get full text
    Journal Article
  2. 2

    Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm by Abdulhamid, Shafi’i Muhammad, Abd Latiff, Muhammad Shafie, Madni, Syed Hamid Hussain, Abdullahi, Mohammed

    Published in Neural computing & applications (2018)
    “…In cloud computing, resources are dynamically provisioned and delivered to users in a transparent manner automatically on-demand. Task execution failure is no…”
    Get full text
    Journal Article
  3. 3

    The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study by Javed, Imran, Janjua, Uzair Iqbal, Abdulhamid, Shafi'i Muhammad, Madni, Tahir Mustafa, Akhunzada, Adnan

    Published in IEEE access (01-01-2023)
    “…Global Software Development (GSD) offers several benefits to software development organizations, including reduced development costs, the availability of…”
    Get full text
    Journal Article
  4. 4

    Multi-objective-Oriented Cuckoo Search Optimization-Based Resource Scheduling Algorithm for Clouds by Madni, Syed Hamid Hussain, Latiff, Muhammad Shafie Abd, Ali, Javed, Abdulhamid, Shafi’i Muhammad

    “…Scheduling problems in cloud computing environment are mostly influenced by multi-objective optimization but frequently deal with using single-objective…”
    Get full text
    Journal Article
  5. 5

    Genetic Algorithm based feature selection and Naïve Bayes for anomaly detection in fog computing environment by Onah, John Oche, Abdulhamid, Shafi’i Muhammad, Abdullahi, Mohammed, Hassan, Ibrahim Hayatu, Al-Ghusham, Abdullah

    Published in Machine learning with applications (15-12-2021)
    “…The sharp rise in network attacks has been a major source of concern in cyber security, particularly that now internet usage and connectivity are in high…”
    Get full text
    Journal Article
  6. 6

    Symbiotic Organism Search optimization based task scheduling in cloud computing environment by Abdullahi, Mohammed, Ngadi, Md Asri, Abdulhamid, Shafi’i Muhammad

    Published in Future generation computer systems (01-03-2016)
    “…Efficient task scheduling is one of the major steps for effectively harnessing the potential of cloud computing. In cloud computing, a number of tasks may need…”
    Get full text
    Journal Article
  7. 7

    Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment by Madni, Syed Hamid Hussain, Abd Latiff, Muhammad Shafie, Abdullahi, Mohammed, Abdulhamid, Shafi'i Muhammad, Usman, Mohammed Joda

    Published in PloS one (03-05-2017)
    “…Cloud computing infrastructure is suitable for meeting computational needs of large task sizes. Optimal scheduling of tasks in cloud computing environment has…”
    Get full text
    Journal Article
  8. 8

    Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities by Madni, Syed Hamid Hussain, Latiff, Muhammad Shafie Abd, Coulibaly, Yahaya, Abdulhamid, Shafi’i Muhammad

    “…Resource scheduling assigns the precise and accurate task to CPU, network, and storage. The aim behind this is the extreme usage of resources. However, well…”
    Get full text
    Journal Article
  9. 9

    Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments by Rana, Nadim, Latiff, Muhammad Shafie Abd, Abdulhamid, Shafi’i Muhammad, Chiroma, Haruna

    Published in Neural computing & applications (01-10-2020)
    “…Whale optimization algorithm (WOA) is a recently developed swarm-based meta-heuristic algorithm that is based on the bubble-net hunting maneuver technique—of…”
    Get full text
    Journal Article
  10. 10

    Machine learning for email spam filtering: review, approaches and open research problems by Dada, Emmanuel Gbenga, Bassi, Joseph Stephen, Chiroma, Haruna, Abdulhamid, Shafi'i Muhammad, Adetunmbi, Adebayo Olusola, Ajibuwa, Opeyemi Emmanuel

    Published in Heliyon (01-06-2019)
    “…The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters…”
    Get full text
    Journal Article
  11. 11

    Recent advancements in resource allocation techniques for cloud computing environment: a systematic review by Madni, Syed Hamid Hussain, Latiff, Muhammad Shafie Abd, Coulibaly, Yahaya, Abdulhamid, Shafi’i Muhammad

    Published in Cluster computing (01-09-2017)
    “…There are two actors in cloud computing environment cloud providers and cloud users. On one hand cloud providers hold enormous computing resources in the cloud…”
    Get full text
    Journal Article
  12. 12

    An adaptive symbiotic organisms search for constrained task scheduling in cloud computing by Abdullahi, Mohammed, Ngadi, Md Asri, Dishing, Salihu Idi, Abdulhamid, Shafi’i Muhammad

    “…Metaheuristic algorithms have been effective in obtaining near-optimal solutions for NP-Complete problems like task scheduling. However, most of these…”
    Get full text
    Journal Article
  13. 13

    A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness by Abdulhamid, Shafi’i Muhammad, Latiff, Muhammad Shafie Abd

    Published in Applied soft computing (01-12-2017)
    “…[Display omitted] •CPLCA scheme for secure fault tolerance scheduling in cloud system is presented.•Checkpointing and job migration strategies are also…”
    Get full text
    Journal Article
  14. 14

    A survey of symbiotic organisms search algorithms and applications by Abdullahi, Mohammed, Ngadi, Md Asri, Dishing, Salihu Idi, Abdulhamid, Shafi’i Muhammad, Usman, Mohammed Joda

    Published in Neural computing & applications (2020)
    “…Nature-inspired algorithms take inspiration from living things and imitate their behaviours to accomplish robust systems in engineering and computer science…”
    Get full text
    Journal Article
  15. 15

    Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment by Madni, Syed Hamid Hussain, Abd Latiff, Muhammad Shafie, Abdulhamid, Shafi’i Muhammad, Ali, Javed

    Published in Cluster computing (01-03-2019)
    “…Resource scheduling is a procedure for the distribution of resources over time to perform a required task and a decision making process in cloud computing…”
    Get full text
    Journal Article
  16. 16

    Secure Scientific Applications Scheduling Technique for Cloud Computing Environment Using Global League Championship Algorithm by Abdulhamid, Shafi'i Muhammad, Abd Latiff, Muhammad Shafie, Abdul-Salaam, Gaddafi, Hussain Madni, Syed Hamid

    Published in PloS one (06-07-2016)
    “…Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end…”
    Get full text
    Journal Article
  17. 17

    Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification by Shuaib, Maryam, Abdulhamid, Shafi’i Muhammad, Adebayo, Olawale Surajudeen, Osho, Oluwafemi, Idris, Ismaila, Alhassan, John K., Rana, Nadim

    Published in SN applied sciences (01-05-2019)
    “…Email has continued to be an integral part of our lives and as a means for successful communication on the internet. The problem of spam mails occupying a huge…”
    Get full text
    Journal Article
  18. 18

    A Review on Mobile SMS Spam Filtering Techniques by Abdulhamid, Shafii Muhammad, Shafie Abd Latiff, Muhammad, Chiroma, Haruna, Osho, Oluwafemi, Abdul-Salaam, Gaddafi, Abubakar, Adamu I., Herawan, Tutut

    Published in IEEE access (2017)
    “…Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable…”
    Get full text
    Journal Article
  19. 19

    SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework by Dave, Daksh, Sharma, Aditya, Abdulhamid, Shafi'i Muhammad, Ahmed, Adeel, Akhunzada, Adnan, Amin, Rashid

    Published in IEEE access (2023)
    “…Due to the rapid development of technology and the widespread usage of smartphones, the number of mobile applications is exponentially growing. Finding a…”
    Get full text
    Journal Article
  20. 20

    Progress on Artificial Neural Networks for Big Data Analytics: A Survey by Chiroma, Haruna, Abdullahi, Usman Ali, Abdulhamid, Shafi'i Muhammad, Abdulsalam Alarood, Ala, Gabralla, Lubna A., Rana, Nadim, Shuib, Liyana, Targio Hashem, Ibrahim Abaker, Gbenga, Dada Emmanuel, Abubakar, Adamu I., Zeki, Akram M., Herawan, Tutut

    Published in IEEE access (2019)
    “…Approximately 2.5 quintillion bytes of data are emitted on a daily basis, and this has brought the world into the era of "big data." Artificial neural networks…”
    Get full text
    Journal Article