NoYearTitleLinkAuthor 1Author 2Author
3
Author
4
12017M2M Device Connectivity Frameworkhttp://www.ijeei.org/docs-19794765935a00386bc5983.pdfCWWMMASPO
22019Increasing smoke classifier accuracy using naive bayes method on internet of thingshttps://pdfs.semanticscholar.org/
b2d1/e9d8b33c8c1bb83c
d23cdd568f3c7362c0ab.pdf
MMAAJG
32018Integrated lighting enabler system using M2M platforms for enhancing energy efficiencyhttps://www.koreascience.or.kr/
article/JAKO201828458534521
.page
MMAAJGSPOCWW
42017Design and Implementation of COTS-Based Aircraft Data Network Using Embedded Linuxhttps://pdfs.semanticscholar
.org/3dec/ba3f0b58e8692fb9e
4698ffc41e6deb4cdb1.pdf
CWWEND
52017The comparison of forwarding strategies between Best Route, Multicast, and Access on Named Data Networking (NDN). Case study: a node compromised by the prefix hijackhttp://www.jocm.us/uploadfile/
2017/0719/20170719054435614
.pdf
DWS
62015System on Chip Design Methodology as Systematic Steps for Handling System on Chip Design Complexity Based on Hardware/Software Codesignhttps://www.ingentaconnect
.com/contentone/asp
/asl/2015/00000021/
00000001/art00015
MMANGSEND
72019Design and implementation of smart advertisement display board prototypehttps://ieeexplore.ieee.org/
abstract/document/8884289/
DWSCWWEND
82016Upwelling Solution Prototype Using Wireless Sensor Networkhttps://socj.telkomuniversity
ac.id/ojs/index.php/ijoict
/article/view/128
ERFSPONGS
92016Design of connectivity preserving flocking using control lyapunov functionhttps://www.hindawi.com
/journals/jr/2016/8540761/
ERF
102013Simulation of Swarm Robot Flocking Assisted by Explicit Communicationhttp://ojs.unsysdigital.com/
index.php/just/article/view/28
ERF
112019A distributed principal component analysis compression for smart seismic acquisition networkshttps://ieeexplore.ieee.org/
abstract/document/8283806/
HHN
122010Wireless multi-path TCP Westwood+ modification to achieve fairness in HSDPAhttps://ieeexplore.ieee.org/
abstract/document/5703718
HHNFAZ
132013Deep neural networks with extreme learning machine for seismic data compressionhttps://link.springer.com/
article/10.1007/s13369-019-03942-3
HHN
142018Seismic data compression using auto-associative neural network and restricted Boltzmann machinehttps://library.seg.org/doi/
abs/10.1190/segam2018-2998185.1
HHN
152016Disributed principal component analysis for data compression of sequential seismic sensor arrayshttps://library.seg.org/doi/
abs/10.1190/segam2016-13868122.1
HHN
162012Great circle distance methode for improving operational control system based on gps tracking systemhttp://citeseerx.ist.psu.edu/
messages/downloadsexceeded
.html
MMA
172013Mobile tracking system based on event driven methodhttps://www.scientific.net/
AMM.321-324.536
MMA
182015Forest fire detection system reliability test using wireless sensor network and OpenMTC communication platformhttps://ieeexplore.ieee.org/
abstract/document/7231402/
CWWNGSSPOMMA
192017Cloud incident handling and forensic‐by‐design: cloud storage as a case studyhttps://onlinelibrary.wiley.com
/doi/abs/10.1002/cpe.3868
NKN
202017Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case studyhttps://onlinelibrary.wiley.com
/doi/abs/10.1002/cpe.3855
NKN
212017The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication appshttps://link.springer.com
/content/pdf/10.1007/
s11036-016-0791-8.pdf
NKN
222017Effectiveness of multimedia presentations in improving understanding of technical terminologies and concepts: a pilot studyhttps://www.tandfonline.com
/doi/abs/10.1080/00450618
.2015.1128968
NKN
232019An evidence‐based forensic taxonomy of Windows phone dating appshttps://onlinelibrary.wiley.com
/doi/abs/10.1111/1556-4029.13820
NKN
242018An evidence‐based forensic taxonomy of Windows Phone communication appshttps://onlinelibrary.wiley.com
/doi/abs/10.1111/1556-4029.13624
NKN
252019Improving adaboost-based intrusion detection system (IDS) performance on CIC IDS 2017 datasethttps://iopscience.iop.org
/article/10.1088/1742-
6596/1192/1/012018/meta
PMNNGS
262020Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web applicationhttps://pdfs.semanticscholar.org
/21d2/abaf6e2853c9e39fe1
dadeb42827baca1d20.pdf
PMNUIW
272019Context Awareness Adoption for Authentication Process in Log In System (Case Study: PT. XYZ)http://journal.uob.edu.bh
/handle/123456789/4059
RYJPMN
282019Smart pot implementation using fuzzy logichttps://iopscience.iop.org
/article/10.1088/1742-6596/1192/1/012058/meta
SKHADRNGS
292008A review of current routing attacks in mobile ad hoc networkshttps://www.researchgate.net
/profile/Md_Ngadi/publication
/41845830_A_Review_
of_Current_Routing_Attacks_
in_Mobile_Ad_Hoc_
Networks/links/
0deec51772d4ddcec6000000.pdf
SMD
302015Trust management in vehicular ad hoc network: a systematic reviewhttps://link.springer.com/article
/10.1186/s13638-015-0353-y
SMD
312007A survey on MANET intrusion detectionhttps://d1wqtxts1xzle7.
cloudfront.net
/35039885/NgadiMA2008
_ASurveyon
MANETIntrusionDetection.pdf?1412745436
=&response-content-disposition=
inline%3B+filename%3DA
_Survey_on_MANET_Intrusion_
Detection.pdf&Expires=
1612860206&Signature
=QMF-wN~v2VILMiyHWQYDAfG-
UerZy3xWV1KZSJKWTueuA6
~DyB2hHZc5Yk5zX9Ce-HQ1hNjNQMDHPXjb8PocHcf80rV-
pcMu6DAPX7rqUWsd2PIat~-
1iJocw9mTans4gRV4sVhbfy~
X8onFyOKw6fpdAfM9f9
NKnYC1wMKAxLALxn
MmiFFL1uxKAHXl-VacZYVeuSY-7XBg05rf~
YOze4NQgvpwo1l9yblB62avy
FHxLJ-JWKtTVQtCcWn9dshuZjgI8o
SVAZYoJl7CA1qhoOCKRren978
DP7SKwsEwOxCS
mSmhHaaiTyEuZ6PP3fGrNRy
R8RIHQYwPI4t7pMxeQ__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
SMD
322015Content based image retrieval using colour strings comparisonhttps://www.sciencedirect.com/
science/article/pii/
S1877050915005335
SMD
332017ECG Parameters for Malignant Ventricular Arrhythmias: A Comprehensive Reviewhttps://link.springer.com
/article/10.1007/s40846-
017-0281-x
SMD
342017BRAIN-F: Beacon rate adaption based on fuzzy logic in vehicular ad hoc networkhttps://link.springer.com/
content/pdf/10.1007/
s40815-016-0171-3.pdf
SMD
352013A review of blackhole attack in mobile adhoc networkhttps://ieeexplore.ieee.org
/document/6698520
SMD
362013A systematic review of security in vehicular Ad Hoc networkhttps://www.researchgate.net/profile
/Hossein_Anisi2/publication/
303737431_A_Systematic_
Review_of_Security_in_
Vehicular_Ad_Hoc_Network/links
/5750006708aeb753e7b49d6e/A-Systematic-Review-of-Security-in-Vehicular-Ad-Hoc-Network.pdf
SDM
372017M2M device connectivity frameworkhttp://www.ijeei.org/docs-19794765935a00386bc5983.pdfMMAAJGSPOCWW
382019Bit-Parallelism Score Computation with Multi Integer Weighthttp://www.ijeei.org/docs-5293732605ccbfd5c04a8e.pdfSRN
392017The implementation of bit-parallelism for DNA sequence alignmentSRN
402016Molecular communications: Channel model and physical layer techniqueshttps://ieeexplore.ieee.org
/abstract/document/7553035/
TFQ
412017Transposition errors in diffusion-based mobile molecular communicationhttps://ieeexplore.ieee.org/
abstract/document/7940049/
TFQ
422020Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practiceshttps://www.sciencedirect.com
/science/article/pii/S22
1067072030593X
TFQ
432017Orthogonal or superimposed pilots? a rate-efficient channel estimation strategy for stationary MIMO fading channelshttps://ieeexplore.ieee.org
/abstract/document/7880605
TFQ
442019The emergence of internet of things (Iot): Connecting anything, anywherehttps://www.mdpi.com/2073-431X/8/2/40TFQ
452012Nearest neighbor decoding in MIMO block-fading channels with imperfect CSIRhttps://ieeexplore.ieee.org/
abstract/document/6157055/
TFQ
462017Towards a predictive analytics-based intelligent malaria outbreak warning systemhttps://www.mdpi.com/2076-3417/7/8/836TFQ
472019IoT based hybrid green energy driven highway lighting systemhttps://ieeexplore.ieee.org
/abstract/document/8890258
TFQ
482018L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networkshttps://www.sciencedirect.com
/science/article/abs/pii/
S1084804518301097
492020Non-Line of Sight LoRa–Based Localization using RSSI-Kalman-Filter and Trilaterationhttps://socj.telkomuniversity
.ac.id/ojs/index.php/ijoict
/article/view/495
ADRUIW
502017Internet of Things (IoT) Framework for Granting Trust among Objects.http://jips-k.org/digital-library/manuscript/file/22845/JIPS-2017-13-6-1613.pdfVRA
512016Trust-Based Privacy for Internet of Thingshttps://search.proquest.com
/openview/be2ed7bb283b06da
549ad0297c7ffee6/1?pq-origsite=gscholar&cbl=1686344
VRA
522018Two-Phase Security Protection for the Internet of Things Object.http://xml.jips-k.org/full-text/view?doi=10.3745/JIPS.03.0106VRA
532016High Quality of Service Video Conferencing over IMShttps://pdfs.semanticscholar.org
/fb48/52094cae762d168243b8b
445215cd363f232.pdf
MMAVRA
542017ConTrust: A trust model to enhance the privacy in internet of thingshttp://www.inass.sakura.ne.jp
/inass/2017/2017063004.pdf
VRA
552014Development of Wireless Patient’s Vital Sign Monitor Using Wireless LAN (IEEE. 802.11. b/g) Protocolhttps://www.researchgate.net/profile
/Achmad_Rizal4/publication
/270106452_Development
_of_Wireless_Patient’s_Vital
_Sign_Monitor_Using_Wireless_LAN
_IEEE80211bg_Protocol/links
/554b0ccf0cf21ed2135903fc
/Development-of-Wireless-Patients-Vital-Sign-Monitor-Using-Wireless-LAN-IEEE80211b-g-Protocol.pdf
VRA
562016An Adaptive Wideband Delphi Method to Study State Cyber-Defence Requirementshttps://ieeexplore.ieee.org
/abstract/document/7005496/
YDN
572009Strategies for implementing a converged ICT regulator in Indonesiahttps://ro.uow.edu.au/cgi
/viewcontent.cgi?referer=https://scholar.google.com
/&httpsredir=1&article=
2474&context=infopapers
YDN