Search

Your search keyword '"Ainuddin Wahid Abdul Wahab"' showing total 127 results

Search Constraints

Start Over You searched for: Author "Ainuddin Wahid Abdul Wahab" Remove constraint Author: "Ainuddin Wahid Abdul Wahab"
127 results on '"Ainuddin Wahid Abdul Wahab"'

Search Results

1. Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions

2. Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment

3. An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network

4. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges

5. Local descriptor for retinal fundus image registration

6. Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern

7. Breast Cancer Detection via Global and Local Features using Digital Histology Images

8. Permissions-Based Detection of Android Malware Using Machine Learning

9. Fundus Image Registration Technique Based on Local Feature of Retinal Vessels

10. An Overview of Audio Event Detection Methods from Feature Extraction to Classification

11. Source camera identification: a distributed computing approach using Hadoop

12. Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets

13. Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis

14. Virtual Community Detection Through the Association between Prime Nodes in Online Social Networks and Its Application to Ranking Algorithms

15. Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network.

16. High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution

17. A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

18. Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

21. Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment

23. A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs

26. CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics

27. An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network

28. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges

29. Local descriptor for retinal fundus image registration

30. A LIGHTWEIGHT AUTHENTICATION TECHNIQUE FOR SECURE COMMUNICATION OF EDGE/FOG DATA-CENTERS

33. Ensembled deep convolution neural network-based breast cancer classification with misclassification reduction algorithms

34. REAL-TIME AUTOMATED CONTOUR BASED MOTION TRACKING USING A SINGLE-CAMERA FOR UPPER LIMB ANGULAR MOTION MEASUREMENT

35. Authors’ Reply

36. Fundus Image Registration Technique Based on Local Feature of Retinal Vessels

37. Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges

38. Fractional means based method for multi-oriented keyword spotting in video/scene/license plate images

39. CMF-iteMS: An automatic threshold selection for detection of copy-move forgery

40. ACCELERATING FPGA-SURF FEATURE DETECTION MODULE BY MEMORY ACCESS REDUCTION

41. Enhanced Congestion Control Model Based on Message Prioritization and Scheduling Mechanism in Vehicle-to-Infrastructure (V2I)

42. Breast Cancer Detection via Global and Local Features using Digital Histology Images

43. 5G Networks

44. A tree-based multiclassification of breast tumor histopathology images through deep learning

45. An Efficient Anchor Nodes Distribution for Accurate Localization (EDAL) in Mobile Wireless Sensor Networks | توزيع نقاط الربط (المرساة) في شبكات الاستشعار اللاسلكية المتنقلة من اجل توطين دقيق (EDAL)

46. Understanding Link Fabrication Attack in Software Defined Network using Formal Methods

47. Understanding Link Fabrication Attack in Software Defined Network using Formal Methods

48. Image steganography in spatial domain: A survey

49. An Overview of Audio Event Detection Methods from Feature Extraction to Classification

50. Source camera identification: a distributed computing approach using Hadoop

Catalog

Books, media, physical & digital resources