Verified email at
TitleCited byYear
Symbiotic Organism Search optimization based task scheduling in cloud computing environment
M Abdullahi, MA Ngadi
Future Generation Computer Systems 56, 640-650, 2016
A review of current routing attacks in mobile ad hoc networks
RH Khokhar, MA Ngadi, S Mandala
International journal of computer science and security 2 (3), 18-29, 2008
Red blood cell segmentation using masking and watershed algorithm: A preliminary study
JM Sharif, MF Miswan, MA Ngadi, MSH Salam, MM bin Abdul Jamil
2012 International Conference on Biomedical Engineering (ICoBE), 258-262, 2012
Machine learning techniques for anomaly detection: an overview
S Omar, A Ngadi, HH Jebur
International Journal of Computer Applications 79 (2), 2013
A survey on MANET intrusion detection
S Mandala, MA Ngadi, AH Abdullah
International Journal of Computer Science and Security 2 (1), 1-11, 2007
Overview of data routing approaches for wireless sensor networks
MH Anisi, AH Abdullah, SA Razak, M Ngadi
Sensors 12 (4), 3964-3996, 2012
Hybrid symbiotic organisms search optimization algorithm for scheduling of tasks on cloud computing environment
M Abdullahi, MA Ngadi
PloS one 11 (6), e0158229, 2016
Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges
M Faheem, SBH Shah, RA Butt, B Raza, M Anwar, MW Ashraf, MA Ngadi, ...
Computer Science Review 30, 1-30, 2018
Fuzzy-assisted social-based routing for urban vehicular environments
RH Khokhar, RM Noor, KZ Ghafoor, CH Ke, MA Ngadi
EURASIP Journal on Wireless Communications and Networking 2011 (1), 178, 2011
An efficient next hop selection algorithm for multi-hop body area networks
V Ayatollahitafti, MA Ngadi, J bin Mohamad Sharif, M Abdullahi
PloS one 11 (1), e0146464, 2016
A taxonomy of cross layer routing metrics for wireless mesh networks
MAB Ngadi, S Ali, AH Abdullah, RH Khokhar
EURASIP Journal on Wireless Communications and Networking 2012 (1), 177, 2012
MPEG-4 video transmission using distributed TDMA MAC protocol over IEEE 802.15. 4 wireless technology
NSN Ismail, F Yunus, SHS Ariffin, AA Shahidan, RA Rashid, W Embong, ...
2011 Fourth International Conference on Modeling, Simulation and Applied …, 2011
Cyber security for cyber physcial systems: A trust-based approach
A Saqib, RW Anwar, OK Hussain, M Ahmad, MA Ngadi, MM Mohamad, ...
J Theor Appl Inf Technol 71 (2), 144-152, 2015
Enhancing MANET security using secret public keys
T Eissa, SA Razal, MD Asringadi
2009 International Conference on Future Networks, 130-134, 2009
A novel lightweight authentication scheme for mobile ad hoc networks
T Eissa, SA Razak, MA Ngadi
Arabian Journal for Science and Engineering 37 (8), 2179-2192, 2012
A review of blackhole attack in mobile adhoc network
S Mandala, AH Abdullah, AS Ismail, H Haron, MA Ngadi, Y Coulibaly
2013 3rd International Conference on Instrumentation, Communications …, 2013
Towards providing a new lightweight authentication and encryption scheme for MANET
T Eissa, SA Razak, MDA Ngadi
Wireless Networks 17 (4), 833-842, 2011
Comprehensive study of transmission techniques for reducing packet loss and delay in multimedia over ip
M Ngatman, M Ngadi, J Sharif
International Journal of Computer Science and Network Security 8 (3), 292-299, 2008
A review of delay aware routing protocols in MANET
SM Zaki, MA Ngadi, SA Razak
Computer Science Letters 1 (1), 48-60, 2009
A review on wireless sensor networks routing protocol: Challenge in energy perspective
I Ahmedy, MA Ngadi, SN Omar, J Chaudhry
Scientific Research and Essays 6 (26), 5628-5649, 2011
The system can't perform the operation now. Try again later.
Articles 1–20