Search Results - "Buhari, Seyed M"
-
1
Navigating Virtual Environments Using Leg Poses and Smartphone Sensors
Published in Sensors (Basel, Switzerland) (13-01-2019)“…Realization of navigation in virtual environments remains a challenge as it involves complex operating conditions. Decomposition of such complexity is…”
Get full text
Journal Article -
2
Federated Learning-Based Security Attack Detection for Multi-Controller Software-Defined Networks
Published in Algorithms (01-07-2024)“…A revolutionary concept of Multi-controller Software-Defined Networking (MC-SDN) is a promising structure for pursuing an evolving complex and expansive…”
Get full text
Journal Article -
3
HLMCC: A Hybrid Learning Anomaly Detection Model for Unlabeled Data in Internet of Things
Published in IEEE access (2019)“…The Internet of Things (IoT) is a network of distributed devices or sensors connected through the internet to allow gathering and sharing of data. The data…”
Get full text
Journal Article -
4
Aroma Release of Olfactory Displays Based on Audio-Visual Content
Published in Applied sciences (14-11-2019)“…Variant approaches used to release scents in most recent olfactory displays rely on time for decision making. The applicability of such an approach is…”
Get full text
Journal Article -
5
Automatic Association of Scents Based on Visual Content
Published in Applied sciences (01-04-2019)“…Although olfaction can enhance the user’s experience in virtual environments, the approach is not widely utilized by virtual contents. This is because the…”
Get full text
Journal Article -
6
SPL Features Quantification and Selection Based on Multiple Multi-Level Objectives
Published in Applied sciences (01-06-2019)“…Software Product Lines (SPLs) can aid modern ecosystems by rapidly developing large-scale software applications. SPLs produce new software products by…”
Get full text
Journal Article -
7
Water Desalination Fault Detection Using Machine Learning Approaches: A Comparative Study
Published in IEEE access (01-01-2017)“…The presence of faulty valves has been studied in the literature with various machine learning approaches. The impact of using fault data only to train the…”
Get full text
Journal Article -
8
Grid Resource Allocation with Genetic Algorithm Using Population Based on Multisets
Published in Journal of intelligent systems (01-01-2017)“…The operational efficacy of the grid computing system depends mainly on the proper management of grid resources to carry out the various jobs that users send…”
Get full text
Journal Article -
9
Blockchain -Assisted Hybrid Deep Learning-Based Secure Mechanism for Software Defined Networks
Published in 2023 IEEE International Conference on Consumer Electronics (ICCE) (06-01-2023)“…Software Defined Network (SDN) has emerged as an autonomous concept for dynamic management and network configuration. Blockchain technology has the potential…”
Get full text
Conference Proceeding -
10
DroidRista: a highly precise static data flow analysis framework for android applications
Published in International journal of information security (01-10-2020)“…The Android operating system dominates the smartphone market. Thus, to service the market, the number of Android applications has risen dramatically. These…”
Get full text
Journal Article -
11
A supervised learning approach for the influence of comorbidities in the analysis of COVID-19 mortality in Tamil Nadu
Published in Soft computing (Berlin, Germany) (03-06-2023)“…COVID-19 has created many complications in today's world. It has negatively impacted the lives of many people and emphasized the need for a better health…”
Get full text
Journal Article -
12
An auction-based resource allocation in Cloud Radio Access Network (C-RAN)
Published in Revista română de informatică și automatică = Romanian journal of information technology and automatic control (07-12-2023)“…Cloud-based radio access networks (C-RANs) are an emerging technology for 5G cellular networks. The increasing demand for radio resources causes many…”
Get full text
Journal Article -
13
Trusted Secure Adhoc On-demand Multipath Distance Vector Routing in MANET
Published in 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA) (01-03-2016)“…A mobile ad hoc network (MANET) is a collectionof wireless nodes, which works well only if those mobile nodes aregood and behave cooperatively. The lack of…”
Get full text
Conference Proceeding Journal Article -
14
A Study of Faculty Retention Factors in Educational Institutes in Context With ABET
Published in Frontiers in education (Lausanne) (09-12-2021)“…A typical higher education institute classically has all the five major constituents, i.e. current students, alumni, faculty members, employers and industrial…”
Get full text
Journal Article -
15
A validation of security determinants model for cloud adoption in Saudi organisations’ context
Published in International journal of information technology (Singapore. Online) (01-03-2022)“…Governments across the world are starting to make a dynamic shift to cloud computing so as to increase efficiency. Although, the cloud technology brings…”
Get full text
Journal Article -
16
Neural network‐based multi‐agent approach for scheduling in distributed systems
Published in Concurrency and computation (10-01-2017)“…Summary A distributed system consists of a collection of autonomous heterogeneous resources that provide resource sharing and a common platform for running…”
Get full text
Journal Article -
17
Scheduling multi-component applications with mobile agents in heterogeneous distributed systems
Published in Concurrency and computation (10-04-2016)“…Summary In grid computing environment, several classes of multi‐component applications exist. These types of applications may often require additional…”
Get full text
Journal Article -
18
Minimizing signaling cost in green routing for software defined networks
Published in 2015 IEEE Symposium on Computers and Communication (ISCC) (01-07-2015)“…Research studies show that energy consumption in communication networks is mainly related to active network elements such as communication links. Based on this…”
Get full text
Conference Proceeding -
19
TCMD: A Two-Tier Classification Model for Anomaly-Based Detection in IoT
Published in 2019 6th Swiss Conference on Data Science (SDS) (01-06-2019)“…The Internet of Things (IoT) is a new technology paradigm that refers to distributed physical devices that are connected to the Internet. The large amount of…”
Get full text
Conference Proceeding -
20
Machine Learning Approaches for Anomaly Detection in IoT: An Overview and Future Research Directions
Published in Wireless personal communications (01-02-2022)“…The internet of things (IoT) is the networking of interrelated devices and sensors connected through the internet to transfer and share data. The data gathered…”
Get full text
Journal Article