Skip to main content

Showing 1–5 of 5 results for author: Razak, S A

.
  1. arXiv:2401.02096  [pdf

    q-bio.BM

    Isolation and Characterisation of Polypropylene Microplastic-Utilising Bacterium from the Antarctic Soil

    Authors: Nur Ain Shuhada Ab Razak, Syahir Habib, Mohd Yunus Abd Shukor, Siti Aisyah Alias, Jerzy Smykla, Nur Adeela Yasid

    Abstract: Despite its remoteness from other continents, the Antarctic region cannot escape the aftermath of human activities as it is highly influenced by anthropogenic impacts that occur both in the regional and global context. Contamination by microplastics, mostly caused by the improper disposal of plastic waste, is widely recognised as a serious environmental threat due to its ubiquity. In recent years,… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

  2. Fairness-Oriented Semi-Chaotic Genetic Algorithm-Based Channel Assignment Technique for Nodes Starvation Problem in Wireless Mesh Network

    Authors: Fuad A. Ghaleb, Bander Ali Saleh Al-rimy, Maznah Kamat, Mohd. Foad Rohani, Shukor Abd Razak

    Abstract: Multi-Radio Multi-Channel Wireless Mesh Networks (WMNs) have emerged as a scalable, reliable, and agile wireless network that supports many types of innovative technologies such as the Internet of Things (IoT) and vehicular networks. Due to the limited number of orthogonal channels, interference between channels adversely affects the fair distribution of bandwidth among mesh clients, causing node… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

    Comments: 18 pages, 10 Figures

  3. A Conceptual Model for Holistic Classification of Insider

    Authors: Ikuesan Richard Adeyemi, Shukor Abd Razak, Mazleena Salleh

    Abstract: The process through which an insider to an organization can be described or classified is lined within the orthodox paradigm of classification in which an organization considers only subject with requisite employee criterion as an insider to that organization. This is further clouded with the relative rigidity in operational security policies being implemented in organizations. Establishing invest… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

    Journal ref: Asian J. Applied Sci., 7: 343-359 (2014)

  4. arXiv:1210.1645  [pdf

    cs.CR cs.CY

    Identifying critical features for network forensics investigation perspectives

    Authors: Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan

    Abstract: Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive model, containing relevant critical features requir… ▽ More

    Submitted 5 October, 2012; originally announced October 2012.

    Comments: International Journal of Computer Science and Information Security

  5. A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks

    Authors: Behnam Dezfouli, Marjan Radi, Shukor Abd Razak

    Abstract: In low power wireless sensor networks, MAC protocols usually employ periodic sleep/wake schedule to reduce idle listening time. Even though this mechanism is simple and efficient, it results in high end-to-end latency and low throughput. On the other hand, the previously proposed CSMA/CA-based MAC protocols have tried to reduce inter-node interference at the cost of increased latency and lower net… ▽ More

    Submitted 17 August, 2010; originally announced August 2010.

    Comments: 17 pages, 16 figures

    ACM Class: C.2.1; C.2.2

    Journal ref: International journal of Computer Networks & Communications, vol. 2, 2010, pp. 126-142