Search Results - "Abdulhamid, Muhammad"

Refine Results
  1. 1

    Symbiotic Organism Search optimization based task scheduling in cloud computing environment by Abdullahi, Mohammed, Ngadi, Md Asri, Abdulhamid, Shafi’i Muhammad

    Published in Future generation computer systems (01-03-2016)
    “…Efficient task scheduling is one of the major steps for effectively harnessing the potential of cloud computing. In cloud computing, a number of tasks may need…”
    Get full text
    Journal Article
  2. 2

    Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment by Madni, Syed Hamid Hussain, Abd Latiff, Muhammad Shafie, Abdullahi, Mohammed, Abdulhamid, Shafi'i Muhammad, Usman, Mohammed Joda

    Published in PloS one (03-05-2017)
    “…Cloud computing infrastructure is suitable for meeting computational needs of large task sizes. Optimal scheduling of tasks in cloud computing environment has…”
    Get full text
    Journal Article
  3. 3

    Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments by Rana, Nadim, Latiff, Muhammad Shafie Abd, Abdulhamid, Shafi’i Muhammad, Chiroma, Haruna

    Published in Neural computing & applications (01-10-2020)
    “…Whale optimization algorithm (WOA) is a recently developed swarm-based meta-heuristic algorithm that is based on the bubble-net hunting maneuver technique—of…”
    Get full text
    Journal Article
  4. 4

    A hybrid whale optimization algorithm with differential evolution optimization for multi-objective virtual machine scheduling in cloud computing by Rana, Nadim, Abd Latiff, Muhammad Shafie, Abdulhamid, Shafi'i Muhammad, Misra, Sanjay

    Published in Engineering optimization (02-12-2022)
    “…Virtual machine (VM) scheduling in a dynamic cloud environment is often bound with multiple quality of service parameters; therefore, it is classed as an…”
    Get full text
    Journal Article
  5. 5

    Secure Scientific Applications Scheduling Technique for Cloud Computing Environment Using Global League Championship Algorithm by Abdulhamid, Shafi'i Muhammad, Abd Latiff, Muhammad Shafie, Abdul-Salaam, Gaddafi, Hussain Madni, Syed Hamid

    Published in PloS one (06-07-2016)
    “…Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end…”
    Get full text
    Journal Article
  6. 6

    Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm by Abdulhamid, Shafi’i Muhammad, Abd Latiff, Muhammad Shafie, Madni, Syed Hamid Hussain, Abdullahi, Mohammed

    Published in Neural computing & applications (2018)
    “…In cloud computing, resources are dynamically provisioned and delivered to users in a transparent manner automatically on-demand. Task execution failure is no…”
    Get full text
    Journal Article
  7. 7

    The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study by Javed, Imran, Janjua, Uzair Iqbal, Abdulhamid, Shafi'i Muhammad, Madni, Tahir Mustafa, Akhunzada, Adnan

    Published in IEEE access (01-01-2023)
    “…Global Software Development (GSD) offers several benefits to software development organizations, including reduced development costs, the availability of…”
    Get full text
    Journal Article
  8. 8

    A survey of symbiotic organisms search algorithms and applications by Abdullahi, Mohammed, Ngadi, Md Asri, Dishing, Salihu Idi, Abdulhamid, Shafi’i Muhammad, Usman, Mohammed Joda

    Published in Neural computing & applications (2020)
    “…Nature-inspired algorithms take inspiration from living things and imitate their behaviours to accomplish robust systems in engineering and computer science…”
    Get full text
    Journal Article
  9. 9

    Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment by Madni, Syed Hamid Hussain, Abd Latiff, Muhammad Shafie, Abdulhamid, Shafi’i Muhammad, Ali, Javed

    Published in Cluster computing (01-03-2019)
    “…Resource scheduling is a procedure for the distribution of resources over time to perform a required task and a decision making process in cloud computing…”
    Get full text
    Journal Article
  10. 10

    Multi-objective-Oriented Cuckoo Search Optimization-Based Resource Scheduling Algorithm for Clouds by Madni, Syed Hamid Hussain, Latiff, Muhammad Shafie Abd, Ali, Javed, Abdulhamid, Shafi’i Muhammad

    “…Scheduling problems in cloud computing environment are mostly influenced by multi-objective optimization but frequently deal with using single-objective…”
    Get full text
    Journal Article
  11. 11

    Genetic Algorithm based feature selection and Naïve Bayes for anomaly detection in fog computing environment by Onah, John Oche, Abdulhamid, Shafi’i Muhammad, Abdullahi, Mohammed, Hassan, Ibrahim Hayatu, Al-Ghusham, Abdullah

    Published in Machine learning with applications (15-12-2021)
    “…The sharp rise in network attacks has been a major source of concern in cyber security, particularly that now internet usage and connectivity are in high…”
    Get full text
    Journal Article
  12. 12

    A Review on Mobile SMS Spam Filtering Techniques by Abdulhamid, Shafii Muhammad, Shafie Abd Latiff, Muhammad, Chiroma, Haruna, Osho, Oluwafemi, Abdul-Salaam, Gaddafi, Abubakar, Adamu I., Herawan, Tutut

    Published in IEEE access (2017)
    “…Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable…”
    Get full text
    Journal Article
  13. 13

    Brain MRI Image Super-Resolution Reconstruction: A Systematic Review by Muhammad, Abdulhamid, Aramvith, Supavadee, Duangchaemkarn, Khanita, Sun, Ming-Ting

    Published in IEEE access (2024)
    “…Magnetic Resonance Imaging (MRI) is pivotal in clinical diagnostics and neurological research, providing high-contrast, non-invasive imaging. However, the…”
    Get full text
    Journal Article
  14. 14

    Machine learning for email spam filtering: review, approaches and open research problems by Dada, Emmanuel Gbenga, Bassi, Joseph Stephen, Chiroma, Haruna, Abdulhamid, Shafi'i Muhammad, Adetunmbi, Adebayo Olusola, Ajibuwa, Opeyemi Emmanuel

    Published in Heliyon (01-06-2019)
    “…The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters…”
    Get full text
    Journal Article
  15. 15

    SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework by Dave, Daksh, Sharma, Aditya, Abdulhamid, Shafi'i Muhammad, Ahmed, Adeel, Akhunzada, Adnan, Amin, Rashid

    Published in IEEE access (2023)
    “…Due to the rapid development of technology and the widespread usage of smartphones, the number of mobile applications is exponentially growing. Finding a…”
    Get full text
    Journal Article
  16. 16

    Analyzing Power and Energy Efficiency of Bitonic Mergesort Based on Performance Evaluation by Abulnaja, Osama Ahmed, Ikram, Muhammad Jawad, Al-Hashimi, Muhammad Abdulhamid, Saleh, Mostafa Elsayed

    Published in IEEE access (01-01-2018)
    “…In graphics processing unit ( GPU ) computing community, bitonic mergesort (BM) is recognized as one of the most investigated sorting algorithms. It is…”
    Get full text
    Journal Article
  17. 17

    Evaluating Power and Energy Efficiency of Bitonic Mergesort on Graphics Processing Unit by Al-Hashimi, Muhammad Abdulhamid, Abulnaja, Osama Ahmed, Saleh, Mostafa Elsayed, Ikram, Muhammad Jawad

    Published in IEEE access (01-01-2017)
    “…Excessive power consumption is expected to be the major obstacle to achieve exascale performance within a reasonable power budget in the upcoming years. In…”
    Get full text
    Journal Article
  18. 18

    Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms by Maigida, Abdullahi Mohammed, Abdulhamid, Shafi’i Muhammad, Olalere, Morufu, Alhassan, John K., Chiroma, Haruna, Dada, Emmanuel Gbenga

    “…Ransomware is advanced and upgraded malicious software which comes in the forms of Crypto or Locker, with the intention to attack and take control of basic…”
    Get full text
    Journal Article
  19. 19

    Secure E-Examination Systems Compared: Case Studies from Two Countries by Fluck, Andrew, Adebayo, Olawale S, Abdulhamid, Shafi'i M

    “…Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due…”
    Get more information
    Journal Article
  20. 20

    Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities by Madni, Syed Hamid Hussain, Latiff, Muhammad Shafie Abd, Coulibaly, Yahaya, Abdulhamid, Shafi’i Muhammad

    “…Resource scheduling assigns the precise and accurate task to CPU, network, and storage. The aim behind this is the extreme usage of resources. However, well…”
    Get full text
    Journal Article