NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 14
1.
  • Hybrid Multi-Level Detectio... Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)
    Shaukat, Haafizah Rameeza; Hashim, Fazirulhisyam; Shaukat, Muhammad Arslan ... Sensors (Basel, Switzerland), 04/2020, Letnik: 20, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes' important ...
Celotno besedilo

PDF
2.
  • Efficient authentication an... Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Alezabi, Kamal Ali; Hashim, Fazirulhisyam; Hashim, Shaiful J. ... EURASIP journal on wireless communications and networking, 05/2020, Letnik: 2020, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and ...
Celotno besedilo

PDF
3.
  • Normalized Advancement Base... Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network
    Rahman, Ziaur; Hashim, Fazirulhisyam; Rasid, Mohd Fadlee A. ... IEEE access, 2020, Letnik: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Underwater wireless sensor network (UWSN) is the enabling technology for a new era of underwater monitoring and actuation applications. In this network, data aggregation and forwarding are intensely ...
Celotno besedilo

PDF
4.
  • Pseudorandom sequence conte... Pseudorandom sequence contention algorithm for IEEE 802.11ah based internet of things network
    Raouf, Mohammed A; Hashim, Fazirulhisyam; Liew, Jiun Terng ... PloS one, 08/2020, Letnik: 15, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    The IEEE 802.11ah standard relies on the conventional distributed coordination function (DCF) as a backoff selection method. The DCF is utilized in the contention-based period of the newly introduced ...
Celotno besedilo

PDF
5.
  • Dynamic Job Scheduling Stra... Dynamic Job Scheduling Strategy Using Jobs Characteristics in Cloud Computing
    Alsaih, Mohammed A.; Latip, Rohaya; Abdullah, Azizol ... Symmetry (Bandung), 10/2020, Letnik: 12, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    A crucial performance concern in distributed decentralized environments, like clouds, is how to guarantee that jobs complete their execution within the estimated completion times using the available ...
Celotno besedilo

PDF
6.
  • Arabic light-based stemmer ... Arabic light-based stemmer using new rules
    Alshalabi, Hamood; Tiun, Sabrina; Omar, Nazlia ... Journal of King Saud University. Computer and information sciences, 10/2022, Letnik: 34, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Superior stemming algorithms aid significantly in many natural language processing (NLP) applications such as information retrieval. Arabic light-based stemmer is one of the most important stemming ...
Celotno besedilo

PDF
7.
Celotno besedilo

PDF
8.
  • Scalable and secure SDN bas... Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic
    Munther, Munther Numan; Hashim, Fazirulhisyam; Abdul Latiff, Nurul Adilah ... Egyptian informatics journal, March 2022, 2022-03-00, 2022-03-01, Letnik: 23, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Ethernet is one of the widespread protocols residing in the second layer of the seven-layers Open Systems Interconnection (OSI) model. Ethernet offers various advantages which enable its widespread ...
Celotno besedilo

PDF
9.
Celotno besedilo

PDF
10.
  • On the authentication and r... On the authentication and re‐authentication protocols in LTE‐WLAN interworking architecture
    Alezabi, Kamal Ali; Hashim, Fazirulhisyam; Hashim, Shaiful J. ... Transactions on emerging telecommunications technologies, April 2017, 2017-04-00, Letnik: 28, Številka: 4
    Journal Article
    Recenzirano

    For mobile users, interworking environment composed of Long Term Evolution (LTE) and wireless local area network (WLAN) has become a practical consideration. As a prevalent technology, LTE has ...
Celotno besedilo
1 2
zadetkov: 14

Nalaganje filtrov