Search Results - "Wahab, Ainuddin Wahid Abdul"
-
1
Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art
Published in IEEE Communications surveys and tutorials (2017)“…The fundamental role of the software defined networks (SDNs) is to decouple the data plane from the control plane, thus providing a logically centralized…”
Get full text
Journal Article -
2
Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges
Published in The Artificial intelligence review (01-03-2020)“…Breast cancer is a common and fatal disease among women worldwide. Therefore, the early and precise diagnosis of breast cancer plays a pivotal role to improve…”
Get full text
Journal Article -
3
Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission
Published in Energy (Oxford) (2014)“…In recent years the use of renewable energy including wind energy has risen dramatically. Because of the increasing development of wind power production,…”
Get full text
Journal Article -
4
Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern
Published in PloS one (20-09-2022)“…Skin cancer is the most common type of cancer in many parts of the world. As skin cancers start as skin lesions, it is important to identify precancerous skin…”
Get full text
Journal Article -
5
An appraisal of wind speed distribution prediction by soft computing methodologies: A comparative study
Published in Energy conversion and management (01-08-2014)“…•Probabilistic distribution functions of wind speed.•Two parameter Weibull probability distribution.•To build an effective prediction model of distribution of…”
Get full text
Journal Article -
6
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
Published in Forensic science international (01-02-2019)“…•Performances copy–move forgery (CMF) detection methods against image quality, sizes and attacks in images are studied.•A method is proposed to deal with…”
Get full text
Journal Article -
7
An Overview of Audio Event Detection Methods from Feature Extraction to Classification
Published in Applied artificial intelligence (26-11-2017)“…Audio streams, such as news broadcasting, meeting rooms, and special video comprise sound from an extensive variety of sources. The detection of audio events…”
Get full text
Journal Article -
8
High-performance combination method of electric network frequency and phase for audio forgery detection in battery-powered devices
Published in Forensic science international (01-09-2016)“…Highlights • Introducing the combination method of ENF and phase. • Producing a high accurate method for audio forgery detection. • Highly performance method…”
Get full text
Journal Article -
9
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
Published in TheScientificWorld (01-01-2014)“…Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the…”
Get full text
Journal Article -
10
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
Published in Applied sciences (06-01-2019)“…Fog computing is a paradigm that extends cloud computing and services to the edge of the network in order to address the inherent problems of the cloud, such…”
Get full text
Journal Article -
11
Factors Influencing Social Media Adoption in Government Organizations: A TOE Framework and PLS-SEM Model Analysis
Published in IEEE access (2024)“…In an era marked by rapid technological advancements, societal activities across diverse domains have undergone significant transformation. Within the…”
Get full text
Journal Article -
12
A review on feature selection in mobile malware detection
Published in Digital investigation (01-06-2015)“…The widespread use of mobile devices in comparison to personal computers has led to a new era of information exchange. The purchase trends of personal…”
Get full text
Journal Article -
13
A hybrid approach for phishing web site detection
Published in Electronic library (01-01-2016)“…Purpose This paper aims to present a hybrid approach based on classification algorithms that was capable of identifying different types of phishing pages. In…”
Get full text
Journal Article -
14
Image steganography in spatial domain: A survey
Published in Signal processing. Image communication (01-07-2018)“…This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots…”
Get full text
Journal Article -
15
Source camera identification: a distributed computing approach using Hadoop
Published in Journal of cloud computing : advances, systems and applications (15-08-2017)“…The widespread use of digital images has led to a new challenge in digital image forensics. These images can be used in court as evidence of criminal cases…”
Get full text
Journal Article -
16
Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets
Published in IEEE access (2017)“…Soft set is a mathematical tool for dealing with vague and imprecise data. It is used in many applications and decision-making after representing the uncertain…”
Get full text
Journal Article -
17
Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder
Published in PloS one (24-05-2016)“…Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a…”
Get full text
Journal Article -
18
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
Published in IEEE access (2016)“…In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally…”
Get full text
Journal Article -
19
Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges
Published in IEEE access (2021)“…Internet of Drones (IoD) is a decentralized network and management framework that links drones' access to the controlled airspace and provides inter-location…”
Get full text
Journal Article -
20
Energy harvesting and battery power based routing in wireless sensor networks
Published in Wireless networks (2017)“…Wireless sensor networks (WSNs) are a collection of several small and inexpensive battery-powered nodes, commonly used to monitor regions of interests and to…”
Get full text
Journal Article