Search Results - "Wahab, Ainuddin Wahid Abdul"

Refine Results
  1. 1

    Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art by Khan, Suleman, Gani, Abdullah, Abdul Wahab, Ainuddin Wahid, Guizani, Mohsen, Khan, Muhammad Khurram

    “…The fundamental role of the software defined networks (SDNs) is to decouple the data plane from the control plane, thus providing a logically centralized…”
    Get full text
    Journal Article
  2. 2

    Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges by Murtaza, Ghulam, Shuib, Liyana, Abdul Wahab, Ainuddin Wahid, Mujtaba, Ghulam, Mujtaba, Ghulam, Nweke, Henry Friday, Al-garadi, Mohammed Ali, Zulfiqar, Fariha, Raza, Ghulam, Azmi, Nor Aniza

    Published in The Artificial intelligence review (01-03-2020)
    “…Breast cancer is a common and fatal disease among women worldwide. Therefore, the early and precise diagnosis of breast cancer plays a pivotal role to improve…”
    Get full text
    Journal Article
  3. 3

    Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission by PETKOVIC, Dalibor, COJBASIC, Zarko, NIKOLIC, Vlastimir, SHAMSHIRBAND, Shahaboddin, MISS LAIHA MAT KIAH, NOR BADRUL ANUAR, AINUDDIN WAHID ABDUL WAHAB

    Published in Energy (Oxford) (2014)
    “…In recent years the use of renewable energy including wind energy has risen dramatically. Because of the increasing development of wind power production,…”
    Get full text
    Journal Article
  4. 4

    Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern by Samsudin, Siti Salbiah, Arof, Hamzah, Harun, Sulaiman Wadi, Abdul Wahab, Ainuddin Wahid, Idris, Mohd Yamani Idna

    Published in PloS one (20-09-2022)
    “…Skin cancer is the most common type of cancer in many parts of the world. As skin cancers start as skin lesions, it is important to identify precancerous skin…”
    Get full text
    Journal Article
  5. 5

    An appraisal of wind speed distribution prediction by soft computing methodologies: A comparative study by Petković, Dalibor, Shamshirband, Shahaboddin, Anuar, Nor Badrul, Saboohi, Hadi, Abdul Wahab, Ainuddin Wahid, Protić, Milan, Zalnezhad, Erfan, Mirhashemi, Seyed Mohammad Amin

    Published in Energy conversion and management (01-08-2014)
    “…•Probabilistic distribution functions of wind speed.•Two parameter Weibull probability distribution.•To build an effective prediction model of distribution of…”
    Get full text
    Journal Article
  6. 6

    CMF-iteMS: An automatic threshold selection for detection of copy-move forgery by Abd. Warif, Nor Bakiah, Idris, Mohd. Yamani Idna, Abdul Wahab, Ainuddin Wahid, Salleh, Rosli, Ismail, Ahsiah

    Published in Forensic science international (01-02-2019)
    “…•Performances copy–move forgery (CMF) detection methods against image quality, sizes and attacks in images are studied.•A method is proposed to deal with…”
    Get full text
    Journal Article
  7. 7

    An Overview of Audio Event Detection Methods from Feature Extraction to Classification by Babaee, Elham, Anuar, Nor Badrul, Abdul Wahab, Ainuddin Wahid, Shamshirband, Shahaboddin, Chronopoulos, Anthony T.

    Published in Applied artificial intelligence (26-11-2017)
    “…Audio streams, such as news broadcasting, meeting rooms, and special video comprise sound from an extensive variety of sources. The detection of audio events…”
    Get full text
    Journal Article
  8. 8

    High-performance combination method of electric network frequency and phase for audio forgery detection in battery-powered devices by Savari, Maryam, Wahab, Ainuddin Wahid Abdul, Juma’at, Nor Badrul Anuar

    Published in Forensic science international (01-09-2016)
    “…Highlights • Introducing the combination method of ENF and phase. • Producing a high accurate method for audio forgery detection. • Highly performance method…”
    Get full text
    Journal Article
  9. 9

    A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing by Han, Qi, Gani, Abdullah, Abdul Wahab, Ainuddin Wahid, Shiraz, Muhammad, Khan, Suleman, Bin Abdul Rahman, Zulkanain

    Published in TheScientificWorld (01-01-2014)
    “…Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the…”
    Get full text
    Journal Article
  10. 10

    A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing by Sudqi Khater, Belal, Abdul Wahab, Ainuddin Wahid Bin, Idris, Mohd Yamani Idna Bin, Abdulla Hussain, Mohammed, Ahmed Ibrahim, Ashraf

    Published in Applied sciences (06-01-2019)
    “…Fog computing is a paradigm that extends cloud computing and services to the edge of the network in order to address the inherent problems of the cloud, such…”
    Get full text
    Journal Article
  11. 11

    Factors Influencing Social Media Adoption in Government Organizations: A TOE Framework and PLS-SEM Model Analysis by Nahedh Alsehani, Fayez, Abdul Wahab, Ainuddin Wahid Bin, Shuib, Liyana

    Published in IEEE access (2024)
    “…In an era marked by rapid technological advancements, societal activities across diverse domains have undergone significant transformation. Within the…”
    Get full text
    Journal Article
  12. 12

    A review on feature selection in mobile malware detection by Feizollah, Ali, Anuar, Nor Badrul, Salleh, Rosli, Wahab, Ainuddin Wahid Abdul

    Published in Digital investigation (01-06-2015)
    “…The widespread use of mobile devices in comparison to personal computers has led to a new era of information exchange. The purchase trends of personal…”
    Get full text
    Journal Article
  13. 13

    A hybrid approach for phishing web site detection by Dadkhah, Mehdi, Shamshirband, Shahaboddin, Abdul Wahab, Ainuddin Wahid

    Published in Electronic library (01-01-2016)
    “…Purpose This paper aims to present a hybrid approach based on classification algorithms that was capable of identifying different types of phishing pages. In…”
    Get full text
    Journal Article
  14. 14

    Image steganography in spatial domain: A survey by Hussain, Mehdi, Wahab, Ainuddin Wahid Abdul, Idris, Yamani Idna Bin, Ho, Anthony T.S., Jung, Ki-Hyun

    Published in Signal processing. Image communication (01-07-2018)
    “…This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots…”
    Get full text
    Journal Article
  15. 15

    Source camera identification: a distributed computing approach using Hadoop by Faiz, Muhammad, Anuar, Nor Badrul, Wahab, Ainuddin Wahid Abdul, Shamshirband, Shahaboddin, Chronopoulos, Anthony T.

    “…The widespread use of digital images has led to a new challenge in digital image forensics. These images can be used in court as evidence of criminal cases…”
    Get full text
    Journal Article
  16. 16

    Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets by Khan, Muhammad Sadiq, Herawan, Tutut, Abdul Wahab, Ainuddin Wahid, Mujtaba, Ghulam, Al-Garadi, Mohammed Ali

    Published in IEEE access (2017)
    “…Soft set is a mathematical tool for dealing with vague and imprecise data. It is used in many applications and decision-making after representing the uncertain…”
    Get full text
    Journal Article
  17. 17

    Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder by Shamshirband, Shahaboddin, Banjanovic-Mehmedovic, Lejla, Bosankic, Ivan, Kasapovic, Suad, Abdul Wahab, Ainuddin Wahid Bin

    Published in PloS one (24-05-2016)
    “…Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a…”
    Get full text
    Journal Article
  18. 18

    Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis by Khan, Suleman, Gani, Abdullah, Abdul Wahab, Ainuddin Wahid, Iqbal, Salman, Abdelaziz, Ahmed, Mahdi, Omar Adil, Abdallaahmed, Abdelmuttlib Ibrahim, Shiraz, Muhammad, Al-Mayouf, Yusor Rafid Bahar, Ziar Khan, Kwangman Ko, Khan, Muhammad Khurram, Chang, Victor

    Published in IEEE access (2016)
    “…In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally…”
    Get full text
    Journal Article
  19. 19

    Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges by Yahuza, Muktar, Idris, Mohd Yamani Idna, Ahmedy, Ismail Bin, Wahab, Ainuddin Wahid Abdul, Nandy, Tarak, Noor, Noorzaily Mohamed, Bala, Abubakar

    Published in IEEE access (2021)
    “…Internet of Drones (IoD) is a decentralized network and management framework that links drones' access to the controlled airspace and provides inter-location…”
    Get full text
    Journal Article
  20. 20

    Energy harvesting and battery power based routing in wireless sensor networks by Anisi, Mohammad Hossein, Abdul-Salaam, Gaddafi, Idris, Mohd. Yamani Idna, Wahab, Ainuddin Wahid Abdul, Ahmedy, Ismail

    Published in Wireless networks (2017)
    “…Wireless sensor networks (WSNs) are a collection of several small and inexpensive battery-powered nodes, commonly used to monitor regions of interests and to…”
    Get full text
    Journal Article