Search Results - "Ahmad, Amran"
-
1
Comparative Analysis of Popularity Aware Caching Strategies in Wireless-Based NDN Based IoT Environment
Published in IEEE access (2024)“…The fundamental objective of the Internet of Things (IoT) and Named Data Networking (NDN) architectures is to facilitate the provision of communication…”
Get full text
Journal Article -
2
Diversity Species and Dominance of Gastropod on Ekosistem Mangrove Ecosystem Lantebung, City of Kota Makassar
Published in Al-Hayat (27-05-2022)“…The Lantebung mangrove ecosystem in Makassar City is one of the mangrove ecosystems in Makassar City, which has been used by the community as a mangrove…”
Get full text
Journal Article -
3
Performance Measurement through Caching in Named Data Networking based Internet of Things
Published in IEEE access (01-01-2023)“…Named Data Networking (NDN) is considered the future of Internet architecture, providing a realistic solution for data delivery using a caching module in an…”
Get full text
Journal Article -
4
Development of Tracking Solar Panel with Smart Automatic Changeover System
Published in 2023 International Conference on Engineering Technology and Technopreneurship (ICE2T) (15-08-2023)“…With global warming rising faster than ever, the need to produce electricity from renewable energy is higher than before. Malaysia took part in Net Zero 2050,…”
Get full text
Conference Proceeding -
5
Development of Secured Network Design for Small Enterprise Server
Published in 2023 International Conference on Engineering Technology and Technopreneurship (ICE2T) (15-08-2023)“…The digitalization of businesses has become commonplace worldwide, driven by the understanding that a business without an online presence risks obsolescence…”
Get full text
Conference Proceeding -
6
Before the Badge: Tackling Initial Hurdles in Integrating Micro-Credentials at Institutes of Higher Learning
Published in 2024 18th International Conference on Ubiquitous Information Management and Communication (IMCOM) (03-01-2024)“…In recent years, there has been a surge of interest in integrating micro-credentials into academic programs at Institutes of Higher Learning (IHLs)…”
Get full text
Conference Proceeding -
7
TITLE YIELD INDEX BASED ON CONCEPT OF SIX- SIGMA SSCpk FOR ASSESSMENT PROCESS PERFORMANCE IN INDUSTRIES
Published in Proceedings on engineering sciences (Online) (14-05-2022)Get full text
Journal Article -
8
YIELD INDEX BASED ON CONCEPT OF SIX- SIGMA SSCPK FOR ASSESSMENT PROCESS PERFORMANCE IN INDUSTRIES
Published in Proceedings on engineering sciences (Online) (01-06-2021)“…Process quality is a key factor in facilitating product sales, (PCIs), which determine the relationship between the manufacturing specifications and the actual…”
Get full text
Journal Article -
9
Determining the Readiness Factors to Adapt Blockchain Technology in the Palm Oil Industry to Facilitate Circular Economy Transition
Published in 2024 5th International Conference on Artificial Intelligence and Data Sciences (AiDAS) (03-09-2024)“…The palm oil industry plays a pivotal role in Malaysia's economy, yet it is facing significant challenges in meeting the mounting Environmental, Social, and…”
Get full text
Conference Proceeding -
10
A Survey on Student Attendance System Using Face Recognition
Published in 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) (01-06-2020)“…The manual attendance system is a time- consuming method which creates many difficulties for teachers to record student's attendance. Therefore, there is a…”
Get full text
Conference Proceeding -
11
Channel optimization in mode division multiplexing using neural networks
Published in 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA) (01-03-2018)“…Mode division multiplexing (MDM) has emerged as a new multiplexing paradigm for enhancing the bandwidth by leveraging the orthogonal modes as a parallel…”
Get full text
Conference Proceeding -
12
Tools for Analytical and Simulation Investigation of Named Data Networking
Published in 2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) (01-10-2019)“…Named Data Networking is a consumer-driven network architecture that supports content consumer mobility due to the nature of in-network catching. The…”
Get full text
Conference Proceeding -
13
An evidential network forensics analysis model with adversarial capability and layering
Published in 2014 World Congress on Computer Applications and Information Systems (WCCAIS) (01-01-2014)“…With increasing crimes and attacks being committed online by adversaries from remote sites, it is vital for law enforcement and public security that forensics…”
Get full text
Conference Proceeding Journal Article -
14
WarBox: Portable wardriving over Raspberry PI
Published in 2016 International Conference on Information and Communication Technology (ICICTM) (2016)“…Wireless access points are everywhere, at home, offices and public places like shopping malls, on the road and open spaces. Network engineer would require a…”
Get full text
Conference Proceeding -
15
Automated Intrusion Detection and Prevention System over SPIT (AIDPoS)
Published in 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET) (01-08-2015)“…Systems employing the Internet and Voice over Internet Protocol (VoIP) are alternative to the legacy landline telephony system. The services offered by these…”
Get full text
Conference Proceeding -
16
Privacy and security gaps in mitigating Cyber crime: The review
Published in 2016 2nd International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR) (01-08-2016)“…Our motivation for this study is to provide new information to a researcher based on our field of study: Networking Systems. This is because Cyber crime is…”
Get full text
Conference Proceeding -
17
An evidential network forensics analysis with metrics for conviction evidence
Published in 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T) (01-08-2014)“…Analysing forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to any…”
Get full text
Conference Proceeding -
18
Metrics for network forensics conviction evidence
Published in 2009 International Conference for Internet Technology and Secured Transactions, (ICITST) (01-11-2009)“…Evaluation of forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to…”
Get full text
Conference Proceeding