Search Results - "Ahmad, Amran"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Comparative Analysis of Popularity Aware Caching Strategies in Wireless-Based NDN Based IoT Environment by Meng, Yahui, Ahmad, Amran Bin, Naeem, Muhammad Ali

    Published in IEEE access (2024)
    “…The fundamental objective of the Internet of Things (IoT) and Named Data Networking (NDN) architectures is to facilitate the provision of communication…”
    Get full text
    Journal Article
  2. 2

    Diversity Species and Dominance of Gastropod on Ekosistem Mangrove Ecosystem Lantebung, City of Kota Makassar by Janwar, Zul, Ahmad, Amran, Soma, Andang Suryana

    Published in Al-Hayat (27-05-2022)
    “…The Lantebung mangrove ecosystem in Makassar City is one of the mangrove ecosystems in Makassar City, which has been used by the community as a mangrove…”
    Get full text
    Journal Article
  3. 3

    Performance Measurement through Caching in Named Data Networking based Internet of Things by Meng, Yahui, Ahmad, Amran Bin

    Published in IEEE access (01-01-2023)
    “…Named Data Networking (NDN) is considered the future of Internet architecture, providing a realistic solution for data delivery using a caching module in an…”
    Get full text
    Journal Article
  4. 4

    Development of Tracking Solar Panel with Smart Automatic Changeover System by Amran, Ahmad Roshidi, Hishamuddin, Ungku Ahmad Ungku, Saad, Amna, Azhar, Wan Nur Shafiqah Wan, Razak, Mohd Raziff Abd

    “…With global warming rising faster than ever, the need to produce electricity from renewable energy is higher than before. Malaysia took part in Net Zero 2050,…”
    Get full text
    Conference Proceeding
  5. 5

    Development of Secured Network Design for Small Enterprise Server by Amran, Ahmad Roshidi, Ibrahim Zaki Ahmad Lutfi, Ahmad, Saad, Amna, Hilman Ahmad Jaafar, Ahmad Nabil, Mohamad, Suraya

    “…The digitalization of businesses has become commonplace worldwide, driven by the understanding that a business without an online presence risks obsolescence…”
    Get full text
    Conference Proceeding
  6. 6

    Before the Badge: Tackling Initial Hurdles in Integrating Micro-Credentials at Institutes of Higher Learning by Saad, Amna, Haziq bin Abdul Jamal, Muhammad, Roshidi bin Amran, Ahmad

    “…In recent years, there has been a surge of interest in integrating micro-credentials into academic programs at Institutes of Higher Learning (IHLs)…”
    Get full text
    Conference Proceeding
  7. 7
  8. 8

    YIELD INDEX BASED ON CONCEPT OF SIX- SIGMA SSCPK FOR ASSESSMENT PROCESS PERFORMANCE IN INDUSTRIES by Faisal Ali Mohammed Ali, Yahya Abdul Ghaffar, Abdullah Al-Swidi, Amran Ahmad

    “…Process quality is a key factor in facilitating product sales, (PCIs), which determine the relationship between the manufacturing specifications and the actual…”
    Get full text
    Journal Article
  9. 9
  10. 10

    A Survey on Student Attendance System Using Face Recognition by Abuzar, Muhammad, Ahmad, Amran bin, Ahmad, Adi Affandi bin

    “…The manual attendance system is a time- consuming method which creates many difficulties for teachers to record student's attendance. Therefore, there is a…”
    Get full text
    Conference Proceeding
  11. 11

    Channel optimization in mode division multiplexing using neural networks by Fazea, Yousef, Sajat, Mohd Samsu, Ahmad, Amran, Alobaedy, Mustafa Muwafak

    “…Mode division multiplexing (MDM) has emerged as a new multiplexing paradigm for enhancing the bandwidth by leveraging the orthogonal modes as a parallel…”
    Get full text
    Conference Proceeding
  12. 12

    Tools for Analytical and Simulation Investigation of Named Data Networking by Hussaini, Muktar, Bello-Salau, Habeeb, Hadi, Hiba Jasim, Nor, Shahrudin Awang, Ahmad, Amran, Hassan, Ibrahim Muhammad

    “…Named Data Networking is a consumer-driven network architecture that supports content consumer mobility due to the nature of in-network catching. The…”
    Get full text
    Conference Proceeding
  13. 13

    An evidential network forensics analysis model with adversarial capability and layering by Amran, Ahmad Roshidi, Saad, Amna

    “…With increasing crimes and attacks being committed online by adversaries from remote sites, it is vital for law enforcement and public security that forensics…”
    Get full text
    Conference Proceeding Journal Article
  14. 14

    WarBox: Portable wardriving over Raspberry PI by Saad, Amna, Amran, Ahmad Roshidi, Abu Hasan, M. Naim

    “…Wireless access points are everywhere, at home, offices and public places like shopping malls, on the road and open spaces. Network engineer would require a…”
    Get full text
    Conference Proceeding
  15. 15

    Automated Intrusion Detection and Prevention System over SPIT (AIDPoS) by Saad, Amna, Amran, Ahmad Roshidi, Norkhalim, Izzat, Adib Mohd Yusof, Mohd

    “…Systems employing the Internet and Voice over Internet Protocol (VoIP) are alternative to the legacy landline telephony system. The services offered by these…”
    Get full text
    Conference Proceeding
  16. 16

    Privacy and security gaps in mitigating Cyber crime: The review by Saad, Amna, Amran, Ahmad Roshidi, Afif, Ijlal Ibrahim, Zolkeple, Ahmad Hariri, Said, Aidy Izzuddin Ahmad, Hamzah, Muhammad Fiqri, Salim, Wan Nor Salwani Wan

    “…Our motivation for this study is to provide new information to a researcher based on our field of study: Networking Systems. This is because Cyber crime is…”
    Get full text
    Conference Proceeding
  17. 17

    An evidential network forensics analysis with metrics for conviction evidence by Amran, Ahmad Roshidi, Saad, Amna, Abd Razak, Mohd Raziff

    “…Analysing forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to any…”
    Get full text
    Conference Proceeding
  18. 18

    Metrics for network forensics conviction evidence by Amran, A.R., Phan, R.C.-W., Parish, D.J.

    “…Evaluation of forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to…”
    Get full text
    Conference Proceeding