Search

Your search keyword '"Mohd Yamani Idna Idris"' showing total 189 results

Search Constraints

Start Over You searched for: Author "Mohd Yamani Idna Idris" Remove constraint Author: "Mohd Yamani Idna Idris"
189 results on '"Mohd Yamani Idna Idris"'

Search Results

1. Cognitive radio and machine learning modalities for enhancing the smart transportation system: A systematic literature review

2. PollenNet: A novel architecture for high precision pollen grain classification through deep learning and explainable AI

3. FruitSeg30_Segmentation dataset & mask annotations: A novel dataset for diverse fruit segmentation and classification

4. A review of security attacks and intrusion detection in the vehicular networks

5. Optimal topology planning of electromagnetic waves communication network for underwater sensors using multi-objective optimization algorithms (MOOAs)

6. The Study of Malay’s Prosodic Features Impact on Classical Arabic Accents Recognition

7. Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection

8. Optimized Routing of UAVs Using Bio-Inspired Algorithm in FANET: A Systematic Review

9. Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

10. A Hybrid Sperm Swarm Optimization and Genetic Algorithm for Unimodal and Multimodal Optimization Problems

11. Authenticated Encryption Schemes: A Systematic Review

12. Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces

13. Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks

14. Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions

15. Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment

16. An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network

17. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges

18. Local descriptor for retinal fundus image registration

19. Informed RRT*-Connect: An Asymptotically Optimal Single-Query Path Planning Method

20. Hybrid RRT: A Semi-Dual-Tree RRT-Based Motion Planner

21. Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network

22. A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things

23. Comparing Neuroplasticity Changes Between High and Low Frequency Gait Training in Subacute Stroke: Protocol for a Randomized, Single-Blinded, Controlled Study

24. Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern

25. Towards an Effective Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things (IoT)

26. Fundus Image Registration Technique Based on Local Feature of Retinal Vessels

27. Energy-Efficient Wireless Sensor Network with an Unequal Clustering Protocol Based on a Balanced Energy Method (EEUCB)

28. A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges

29. Residual-based approach for authenticating pattern of multi-style diacritical Arabic texts.

30. A new split based searching for exact pattern matching for natural texts.

31. LocPass: A Graphical Password Method to Prevent Shoulder-Surfing

32. Investigation of Fusion Features for Apple Classification in Smart Manufacturing

33. Vision-Based Apple Classification for Smart Manufacturing

34. High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution

35. iOS mobile malware analysis: a state-of-the-art

38. A Fog-Centric Secure Cloud Storage Scheme

40. A Survey on Cluster Head Selection and Cluster Formation Methods in Wireless Sensor Networks

43. A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs

44. An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network

45. A hybridization strategy using equal and unequal clustering schemes to mitigate idle listening for lifetime maximization of wireless sensor network

46. CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics

47. Combined State of Charge and State of Energy Estimation of Lithium-Ion Battery Using Dual Forgetting Factor-Based Adaptive Extended Kalman Filter for Electric Vehicle Applications

48. An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network

49. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges

50. RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption

Catalog

Books, media, physical & digital resources