Suivre
Nor Asilah Wati Abdul Hamid
Nor Asilah Wati Abdul Hamid
Universiti Putra Malaysia, George Washington University, University of Adelaide
Adresse e-mail validée de upm.edu.my
Titre
Citée par
Citée par
Année
TCP performance in multi-hop wireless ad hoc networks: challenges and solution
AM Al-Jubari, M Othman, B Mohd Ali, NAW Abdul Hamid
EURASIP Journal on Wireless Communications and Networking 2011, 1-25, 2011
722011
Scheduling scientific workflow using multi-objective algorithm with fuzzy resource utilization in multi-cloud environment
M Farid, R Latip, M Hussin, NAWA Hamid
IEEE Access 8, 24309-24322, 2020
712020
An enhanced A-MSDU frame aggregation scheme for 802.11 n wireless networks
A Saif, M Othman, S Subramaniam, NAWA Hamid
Wireless Personal Communications 66, 683-706, 2012
652012
A survey on QoS requirements based on particle swarm optimization scheduling techniques for workflow scheduling in cloud computing
M Farid, R Latip, M Hussin, NAW Abdul Hamid
Symmetry 12 (4), 551, 2020
592020
Raccoon optimization algorithm
SZ Koohi, NAWA Hamid, M Othman, G Ibragimov
IEEE Access 7, 5383-5399, 2018
502018
A cluster-based proxy mobile IPv6 for IP-WSNs
AJ Jabir, SK Subramaniam, ZZ Ahmad, NAWA Hamid
EURASIP Journal on Wireless Communications and networking 2012, 1-17, 2012
492012
Improving reliability in resource management through adaptive reinforcement learning for distributed systems
M Hussin, NAWA Hamid, KA Kasmiran
Journal of parallel and distributed computing 75, 93-100, 2015
412015
An adaptive delayed acknowledgment strategy to improve TCP performance in multi-hop wireless networks
AM Al-Jubari, M Othman, B Mohd Ali, NAW Abdul Hamid
Wireless Personal Communications 69, 307-333, 2013
372013
A comprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol
AJ Jabir, S Shamala, Z Zuriati, N Hamid
IEEE Systems Journal 12 (1), 1065-1081, 2015
302015
Frame aggregation in wireless networks: Techniques and issues
A Saif, M Othman, S Subramaniam, NAW Abdul Hamid
IETE Technical Review 28 (4), 336-350, 2011
282011
Comparison of MPI benchmark programs on shared memory and distributed memory machines (point-to-point communication)
NAWA Hamid, P Coddington
The International Journal of High Performance Computing Applications 24 (4 …, 2010
242010
Progress in various TCP variants (February 2009)
B Qureshi, M Othman, NAW Hamid
2009 2nd International Conference on Computer, Control and Communication, 1-6, 2009
242009
On-demand channel reservation scheme for common traffic in wireless mesh networks
HA Mogaibel, M Othman, S Subramaniam, NAWA Hamid
Journal of Network and Computer Applications 35 (4), 1329-1351, 2012
202012
Review of channel assignment approaches in multi-radio multi-channel wireless mesh network
HA Mogaibel, M Othman, S Subramaniam, NAWA Hamid
Journal of Network and Computer Applications 72, 113-139, 2016
192016
QTCP: improving throughput performance evaluation with high-speed networks
B Qureshi, M Othman, S Subramaniam, NA Wati
Arabian Journal for Science and Engineering 38, 2663-2691, 2013
182013
Fog Offloading and Task Management in IoT-Fog-Cloud Environment: Review of Algorithms, Networks and SDN Application.
MR Rezaee, NAWA Hamid, M Hussin, ZA Zukarnain
IEEE Access, 2024
172024
An optimized A-MSDU frame aggregation with subframe retransmission in IEEE 802.11 n wireless networks
A Saif, M Othman, SK Subramaniam, NAWA Hamid
Procedia Computer Science 9, 812-821, 2012
172012
INTELLIGENT COOPERATIVE WEB CACHING POLICIES FOR MEDIA OBJECTS BASED ON J48 DECISION TREE AND NAÃ VE BAYES SUPERVISED MACHINE LEARNING ALGORITHMS IN STRUCTURED PEER-TO-PEER SYSTEMS
H Ibrahim, W Yasin, NI Udzir, NAWA Hamid
Journal of Information and Communication Technology 15 (2), 85-116, 2016
152016
Towards accelerated agent-based crowd simulation for Hajj and Umrah
A Rahman, NAWA Hamid, AR Rahiman, B Zafar
2015 International Symposium on Agents, Multi-Agent Systems and Robotics …, 2015
152015
Nonnegative matrix factorization and metamorphic malware detection
YT Ling, NFM Sani, MT Abdullah, NAWA Hamid
Journal of Computer Virology and Hacking Techniques 15, 195-208, 2019
142019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20