Search Results - "Hashim, Fazirulhisyam"
-
1
Totally opportunistic routing algorithm (TORA) for underwater wireless sensor network
Published in PloS one (06-06-2018)“…Underwater Wireless Sensor Network (UWSN) has emerged as promising networking techniques to monitor and explore oceans. Research on acoustic communication has…”
Get full text
Journal Article -
2
SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems
Published in Sensors (Basel, Switzerland) (18-02-2021)“…The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to…”
Get full text
Journal Article -
3
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
Published in EURASIP journal on wireless communications and networking (24-05-2020)“…In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge…”
Get full text
Journal Article -
4
Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)
Published in Sensors (Basel, Switzerland) (17-04-2020)“…Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary…”
Get full text
Journal Article -
5
Pseudorandom sequence contention algorithm for IEEE 802.11ah based internet of things network
Published in PloS one (13-08-2020)“…The IEEE 802.11ah standard relies on the conventional distributed coordination function (DCF) as a backoff selection method. The DCF is utilized in the…”
Get full text
Journal Article -
6
Hierarchical blockchain structure for node authentication in IoT networks
Published in Egyptian informatics journal (01-07-2022)“…Internet of Things (IoT) networks are large peer-to-peer networks of small devices that require a competent security system that is scalable and adaptable to…”
Get full text
Journal Article -
7
Channel Coding Scheme for 5G Mobile Communication System for Short Length Message Transmission
Published in Wireless personal communications (01-05-2019)“…Some channel coding schemes for 5G mobile communication system is facing difficulty in satisfying the user requirements in machine-type communication. This…”
Get full text
Journal Article -
8
Prediction of Peatlands Forest Fires in Malaysia Using Machine Learning
Published in Forests (01-07-2023)“…The occurrence of fires in tropical peatlands poses significant threats to their ecosystems. An Internet of Things (IoT) system was developed to measure and…”
Get full text
Journal Article -
9
Short-Term Load Forecasting Utilizing a Combination Model: A Brief Review
Published in International Journal of Technology (25-01-2024)“…To deliver electricity to customers safely and economically, power companies encounter numerous economic and technical challenges in their operations. Power…”
Get full text
Journal Article -
10
Multi-Objective Multi-Exemplar Particle Swarm Optimization Algorithm With Local Awareness
Published in IEEE access (2024)“…Many machine learning algorithms excel at handling problems with conflicting objectives. Multi-Objective Optimization (MOO) algorithms play a crucial role in…”
Get full text
Journal Article -
11
Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review
Published in Journal of King Saud University. Computer and information sciences (01-07-2023)“…Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage…”
Get full text
Journal Article -
12
A New Hybrid Online and Offline Multi-Factor Cross-Domain Authentication Method for IoT Applications in the Automotive Industry
Published in Energies (Basel) (01-11-2021)“…Connected vehicles have emerged as the latest revolution in the automotive industry, utilizing the advent of the Internet of Things (IoT). However, most…”
Get full text
Journal Article -
13
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published in Journal of King Saud University. Computer and information sciences (01-06-2023)“…Web applications’ popularity has raised attention in various service domains, which increased the concern about cyber-attacks. One of these most serious and…”
Get full text
Journal Article -
14
Worst-Case Latency Analysis for AVB Traffic under Overlapping-Based Time-Triggered Windows in Time-Sensitive Networks
Published in IEEE access (01-01-2022)“…Deterministic and low end-to-end latency communication is an urgent demand for many safety-critical applications such as autonomous vehicles and automated…”
Get full text
Journal Article -
15
Analysis on Target Detection and Classification in LTE Based Passive Forward Scattering Radar
Published in Sensors (Basel, Switzerland) (29-09-2016)“…The passive bistatic radar (PBR) system can utilize the illuminator of opportunity to enhance radar capability. By utilizing the forward scattering technique…”
Get full text
Journal Article -
16
A three-dimensional pattern recognition localization system based on a Bayesian graphical model
Published in International journal of distributed sensor networks (01-09-2020)“…Access points in wireless local area networks are deployed in many indoor environments. Device-free wireless localization systems based on available received…”
Get full text
Journal Article -
17
Fair Energy-Efficient Resource Allocation for Downlink NOMA Heterogeneous Networks
Published in IEEE access (2020)“…The increasing in energy consumptions of the current wireless networks, leads towards designing energy-efficient 5G networks. The application of non-orthogonal…”
Get full text
Journal Article -
18
Clustering Transmission Opportunity Length (CTOL) Model over Cognitive Radio Network
Published in Sensors (Basel, Switzerland) (10-12-2018)“…This paper investigated the throughput performance of a secondary user (SU) for a random primary user (PU) activity in a realistic experimental model. This…”
Get full text
Journal Article -
19
Pliable Cognitive MAC for Heterogeneous Adaptive Cognitive Radio Sensor Networks
Published in PloS one (03-06-2016)“…The rapid expansion of wireless monitoring and surveillance applications in several domains reinforces the trend of exploiting emerging technologies such as…”
Get full text
Journal Article -
20
Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network
Published in IEEE access (2020)“…Underwater wireless sensor network (UWSN) is the enabling technology for a new era of underwater monitoring and actuation applications. In this network, data…”
Get full text
Journal Article