Skip to main content

Showing 1–4 of 4 results for author: Razak, S A

Searching in archive cs. Search in all archives.
.
  1. Fairness-Oriented Semi-Chaotic Genetic Algorithm-Based Channel Assignment Technique for Nodes Starvation Problem in Wireless Mesh Network

    Authors: Fuad A. Ghaleb, Bander Ali Saleh Al-rimy, Maznah Kamat, Mohd. Foad Rohani, Shukor Abd Razak

    Abstract: Multi-Radio Multi-Channel Wireless Mesh Networks (WMNs) have emerged as a scalable, reliable, and agile wireless network that supports many types of innovative technologies such as the Internet of Things (IoT) and vehicular networks. Due to the limited number of orthogonal channels, interference between channels adversely affects the fair distribution of bandwidth among mesh clients, causing node… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

    Comments: 18 pages, 10 Figures

  2. A Conceptual Model for Holistic Classification of Insider

    Authors: Ikuesan Richard Adeyemi, Shukor Abd Razak, Mazleena Salleh

    Abstract: The process through which an insider to an organization can be described or classified is lined within the orthodox paradigm of classification in which an organization considers only subject with requisite employee criterion as an insider to that organization. This is further clouded with the relative rigidity in operational security policies being implemented in organizations. Establishing invest… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

    Journal ref: Asian J. Applied Sci., 7: 343-359 (2014)

  3. arXiv:1210.1645  [pdf

    cs.CR cs.CY

    Identifying critical features for network forensics investigation perspectives

    Authors: Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan

    Abstract: Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive model, containing relevant critical features requir… ▽ More

    Submitted 5 October, 2012; originally announced October 2012.

    Comments: International Journal of Computer Science and Information Security

  4. A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks

    Authors: Behnam Dezfouli, Marjan Radi, Shukor Abd Razak

    Abstract: In low power wireless sensor networks, MAC protocols usually employ periodic sleep/wake schedule to reduce idle listening time. Even though this mechanism is simple and efficient, it results in high end-to-end latency and low throughput. On the other hand, the previously proposed CSMA/CA-based MAC protocols have tried to reduce inter-node interference at the cost of increased latency and lower net… ▽ More

    Submitted 17 August, 2010; originally announced August 2010.

    Comments: 17 pages, 16 figures

    ACM Class: C.2.1; C.2.2

    Journal ref: International journal of Computer Networks & Communications, vol. 2, 2010, pp. 126-142