Match!
Mohamad Afendee Mohamed
Universiti Sultan Zainal Abidin
Distributed computingMathematical optimizationComputer networkMathematicsComputer science
72Publications
3H-index
57Citations
What is this?
Publications 83
Newest
#1Yahia Alemami (UniSZA: Universiti Sultan Zainal Abidin)
#2Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 3
Last. Mustafa Mamat (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 11
view all 4 authors...
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdropping the calls and voice messages, One way to solve this problem is via cryptographic approach. Chaos cryptography build on top of nonlinear dynamics chaotic system has gained some footstep in data security. It provides an alternative to conventional...
Source
#1Kailun Eng (UPM: Universiti Putra Malaysia)
#2Abdullah Muhammed (UPM: Universiti Putra Malaysia)H-Index: 4
Last. Sazlinah Hasan (UPM: Universiti Putra Malaysia)H-Index: 1
view all 4 authors...
Abstract To achieve the ultimate success of global collaborative resource sharing in Grid computing, an effective and efficient Grid resource management system is necessary and it is only possible if its core component, the scheduler, can perform scheduling in an efficient manner. Scheduling tasks to resources in Grid computing is a challenging task and known as a NP hard problem. In this paper, we propose a novel hybrid heuristic-based algorithm, which synergised the excellent diversification c...
Source
In Wireless Sensor Networks (WSN), energy efficiency is a fundamental issue that requires attention in the design of communication protocols. Energy waste occurs as a result of collision and idle listening. The widely used mechanism for energy saving in WSN is duty cycling. Duty cycling coordinates the sleep/wake-up time of sensor nodes to maximize the network lifetime while achieving specific application goals such as high throughput or low latency. Most existing works focused more on static du...
Source
#2Razali Yaacob (UPM: Universiti Putra Malaysia)
Last. Abd Rasid Mamat (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 1
view all 6 authors...
Source
#2Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 3
Last. Wahidah HashimH-Index: 5
view all 5 authors...
Source
Source
#1Hana Ali-Pacha (University of the Sciences)
#2Naima Hadj-Said (University of the Sciences)H-Index: 2
Last. Mustafa Mamat (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 11
view all 5 authors...
Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of ran...
Source
In this paper we proposed KAJ Spiral method for supporting PlayFair cipher algorithm to use languages other than English and utilize block with more than two characters at once. Original method does not support block of characters and other languages. The method uses a spiral shape with two axes (X, Y) and the letters are spread on the axis within circles depending on the language. We use Friedman method analysis (index of coincidence) as a tool to test and prove the efficiency of KAJ Spiral met...
Source
#1Ismail Taha Ahmed (University of Anbar)H-Index: 2
#2Soong Der ChenH-Index: 5
Last. Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 3
view all 4 authors...
Many image quality assessment algorithms (IQAs) have been developed during the past decade. However, most of them are designed for images distorted by compression, noise and blurring. There are very few IQAs designed specifically for Contrast Distorted Images (CDI), e.g. Reduced-reference Image Quality Metric for Contrast-changed images (RIQMC) and NR-IQA for Contrast-Distorted Images (NR-IQA-CDI). The existing NR-IQA-CDI relies on features designed by human or handcrafted features because consi...
Source
123456789