Search Results - "Hashim, Fazirulhisyam"

Refine Results
  1. 1

    Totally opportunistic routing algorithm (TORA) for underwater wireless sensor network by Rahman, Ziaur, Hashim, Fazirulhisyam, Rasid, Mohd Fadlee A, Othman, Mohamed

    Published in PloS one (06-06-2018)
    “…Underwater Wireless Sensor Network (UWSN) has emerged as promising networking techniques to monitor and explore oceans. Research on acoustic communication has…”
    Get full text
    Journal Article
  2. 2

    SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems by Khalid, Haqi, Hashim, Shaiful Jahari, Ahmad, Sharifah Mumtazah Syed, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published in Sensors (Basel, Switzerland) (18-02-2021)
    “…The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to…”
    Get full text
    Journal Article
  3. 3

    Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks by Alezabi, Kamal Ali, Hashim, Fazirulhisyam, Hashim, Shaiful J., Ali, Borhanuddin M., Jamalipour, Abbas

    “…In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge…”
    Get full text
    Journal Article
  4. 4

    Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN) by Shaukat, Haafizah Rameeza, Hashim, Fazirulhisyam, Shaukat, Muhammad Arslan, Ali Alezabi, Kamal

    Published in Sensors (Basel, Switzerland) (17-04-2020)
    “…Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary…”
    Get full text
    Journal Article
  5. 5

    Pseudorandom sequence contention algorithm for IEEE 802.11ah based internet of things network by Raouf, Mohammed A, Hashim, Fazirulhisyam, Liew, Jiun Terng, Alezabi, Kamal Ali

    Published in PloS one (13-08-2020)
    “…The IEEE 802.11ah standard relies on the conventional distributed coordination function (DCF) as a backoff selection method. The DCF is utilized in the…”
    Get full text
    Journal Article
  6. 6

    Hierarchical blockchain structure for node authentication in IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Jahari Hashim, Shaiful, Abdullah, Azizol

    Published in Egyptian informatics journal (01-07-2022)
    “…Internet of Things (IoT) networks are large peer-to-peer networks of small devices that require a competent security system that is scalable and adaptable to…”
    Get full text
    Journal Article
  7. 7

    Channel Coding Scheme for 5G Mobile Communication System for Short Length Message Transmission by Hajiyat, Zahraa Raad Mayoof, Sali, Aduwati, Mokhtar, Makhfudzah, Hashim, Fazirulhisyam

    Published in Wireless personal communications (01-05-2019)
    “…Some channel coding schemes for 5G mobile communication system is facing difficulty in satisfying the user requirements in machine-type communication. This…”
    Get full text
    Journal Article
  8. 8

    Prediction of Peatlands Forest Fires in Malaysia Using Machine Learning by Lu Li, Aduwati Sali, Nor Kamariah Noordin, Alyani Ismail, Fazirulhisyam Hashim

    Published in Forests (01-07-2023)
    “…The occurrence of fires in tropical peatlands poses significant threats to their ecosystems. An Internet of Things (IoT) system was developed to measure and…”
    Get full text
    Journal Article
  9. 9

    Short-Term Load Forecasting Utilizing a Combination Model: A Brief Review by Faisul Arif Ahmad, Junchen Liu, Fazirulhisyam Hashim, Khairulmizam Samsudin

    Published in International Journal of Technology (25-01-2024)
    “…To deliver electricity to customers safely and economically, power companies encounter numerous economic and technical challenges in their operations. Power…”
    Get full text
    Journal Article
  10. 10

    Multi-Objective Multi-Exemplar Particle Swarm Optimization Algorithm With Local Awareness by Noori, Mustafa Sabah, Sahbudin, Ratna K. Z., Sali, Aduwati, Hashim, Fazirulhisyam

    Published in IEEE access (2024)
    “…Many machine learning algorithms excel at handling problems with conflicting objectives. Multi-Objective Optimization (MOO) algorithms play a crucial role in…”
    Get full text
    Journal Article
  11. 11

    Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review by Thajeel, Isam Kareem, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam

    “…Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage…”
    Get full text
    Journal Article
  12. 12

    A New Hybrid Online and Offline Multi-Factor Cross-Domain Authentication Method for IoT Applications in the Automotive Industry by Khalid, Haqi, Hashim, Shaiful Jahari, Ahmad, Sharifah Mumtazah Syed, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published in Energies (Basel) (01-11-2021)
    “…Connected vehicles have emerged as the latest revolution in the automotive industry, utilizing the advent of the Internet of Things (IoT). However, most…”
    Get full text
    Journal Article
  13. 13

    Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model by Kareem Thajeel, Isam, Samsudin, Khairulmizam, Jahari Hashim, Shaiful, Hashim, Fazirulhisyam

    “…Web applications’ popularity has raised attention in various service domains, which increased the concern about cyber-attacks. One of these most serious and…”
    Get full text
    Journal Article
  14. 14

    Worst-Case Latency Analysis for AVB Traffic under Overlapping-Based Time-Triggered Windows in Time-Sensitive Networks by Shalghum, Khaled M., Noordin, Nor K., Sali, Aduwati, Hashim, Fazirulhisyam

    Published in IEEE access (01-01-2022)
    “…Deterministic and low end-to-end latency communication is an urgent demand for many safety-critical applications such as autonomous vehicles and automated…”
    Get full text
    Journal Article
  15. 15

    Analysis on Target Detection and Classification in LTE Based Passive Forward Scattering Radar by Raja Abdullah, Raja Syamsul Azmir, Abdul Aziz, Noor Hafizah, Abdul Rashid, Nur Emileen, Ahmad Salah, Asem, Hashim, Fazirulhisyam

    Published in Sensors (Basel, Switzerland) (29-09-2016)
    “…The passive bistatic radar (PBR) system can utilize the illuminator of opportunity to enhance radar capability. By utilizing the forward scattering technique…”
    Get full text
    Journal Article
  16. 16

    A three-dimensional pattern recognition localization system based on a Bayesian graphical model by Alhammadi, Abdulraqeb, Hashim, Fazirulhisyam, A Rasid, Mohd. Fadlee, Alraih, Saddam

    “…Access points in wireless local area networks are deployed in many indoor environments. Device-free wireless localization systems based on available received…”
    Get full text
    Journal Article
  17. 17

    Fair Energy-Efficient Resource Allocation for Downlink NOMA Heterogeneous Networks by Ali, Zuhura J., Noordin, Nor K., Sali, Aduwati, Hashim, Fazirulhisyam

    Published in IEEE access (2020)
    “…The increasing in energy consumptions of the current wireless networks, leads towards designing energy-efficient 5G networks. The application of non-orthogonal…”
    Get full text
    Journal Article
  18. 18

    Clustering Transmission Opportunity Length (CTOL) Model over Cognitive Radio Network by Mohamad, Mas Haslinda, Sali, Aduwati, Hashim, Fazirulhisyam, Nordin, Rosdiadee, Takyu, Osamu

    Published in Sensors (Basel, Switzerland) (10-12-2018)
    “…This paper investigated the throughput performance of a secondary user (SU) for a random primary user (PU) activity in a realistic experimental model. This…”
    Get full text
    Journal Article
  19. 19

    Pliable Cognitive MAC for Heterogeneous Adaptive Cognitive Radio Sensor Networks by Al-Medhwahi, Mohammed, Hashim, Fazirulhisyam, Ali, Borhanuddin Mohd, Sali, Aduwati

    Published in PloS one (03-06-2016)
    “…The rapid expansion of wireless monitoring and surveillance applications in several domains reinforces the trend of exploiting emerging technologies such as…”
    Get full text
    Journal Article
  20. 20

    Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network by Rahman, Ziaur, Hashim, Fazirulhisyam, Rasid, Mohd Fadlee A., Othman, Mohamed, Ali Alezabi, Kamal

    Published in IEEE access (2020)
    “…Underwater wireless sensor network (UWSN) is the enabling technology for a new era of underwater monitoring and actuation applications. In this network, data…”
    Get full text
    Journal Article