Abdullah Gani
YOU?
Author Swipe
View article: Automated Detection and Threshold-Based Alerting of Stray Dogs
Automated Detection and Threshold-Based Alerting of Stray Dogs Open
The free-roaming dog population of India poses a serious public safety, health, and animal welfare challenge. Approximately 20 million dog-bite cases and 20,000 rabies-related deaths occur each year in the country. Robust and widespread so…
View article: Strategy for Strengthening Pancasila Values Through Generation Z Character Education at Madrasah Aliyah Galesong, Indonesia)
Strategy for Strengthening Pancasila Values Through Generation Z Character Education at Madrasah Aliyah Galesong, Indonesia) Open
Generation Z, who are very close to digital technology, are often exposed to global values and cultures that can affect their understanding of local values such as Pancasila. This study aims to analyze effective learning strategies in inte…
View article: Analysis of the impact of magnetic and electric fields on the environment within the free space of SUTT segment Ulee Kareng - Banda Aceh
Analysis of the impact of magnetic and electric fields on the environment within the free space of SUTT segment Ulee Kareng - Banda Aceh Open
Public concerns exist regarding the potential negative impacts of magnetic and electric fields generated from SUTT lines on the environment and health. This study investigates the validity of this public concern by measuring and analyzing …
View article: Enhanced Quantum Long Short-Term Memory By Using Bidirectional Ring Variational Quantum Circuit
Enhanced Quantum Long Short-Term Memory By Using Bidirectional Ring Variational Quantum Circuit Open
With the rapid development of quantum machine learning, Quantum Long Short-Term Memory (QLSTM) have demonstrated quantum advantages in time series forecasting problems. Currently, it has found applications in fields such as financial marke…
View article: Quantum Particle Swarm Optimized Extreme Learning Machine for Intrusion Detection
Quantum Particle Swarm Optimized Extreme Learning Machine for Intrusion Detection Open
Ensuring a secure online environment hinges on the timely detection of network attacks. Nevertheless, existing detection methods often grapple with the delicate balance between speed and accuracy. In this paper, we introduce a novel intrus…
View article: Comparative study of SPI success factors in global and in-house environment for large-scale software companies
Comparative study of SPI success factors in global and in-house environment for large-scale software companies Open
Background Software process improvement (SPI) is an indispensable phenomenon in the evolution of a software development company that adopts global software development (GSD) or in-house development. Several software development companies d…
View article: Improved qARM algorithm for frequent itemsets search in large-scale data sets
Improved qARM algorithm for frequent itemsets search in large-scale data sets Open
The existing Quantum Algorithm for Association Rules Mining(qARM) need to set the quantum oracle of data artificially when mining frequent itemsets, which is very time-consuming when dealing with large-scale data. Based on the C n − X gate…
View article: SLMAS: A Secure and Light Weight Mutual Authentication Scheme for the Smart Wheelchair
SLMAS: A Secure and Light Weight Mutual Authentication Scheme for the Smart Wheelchair Open
The modern innovation called the Internet of Things (IoT) empowers individuals to connect to anybody and anything at any point, wherever. The application of the IoT in smart cities concerning smart healthcare management can improve patient…
View article: A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks Open
Underwater wireless sensor networks (UWSNs) are comprised of sensor nodes that are deployed under the water having limited battery power and other limited resources. Applications of UWSNs include monitoring the quality of the water, mine d…
View article: Formal Analysis of Trust and Reputation for Service Composition in IoT
Formal Analysis of Trust and Reputation for Service Composition in IoT Open
The exponential growth in the number of smart devices connected to the Internet of Things (IoT) that are associated with various IoT-based smart applications and services, raises interoperability challenges. Service-oriented architecture f…
View article: Analyzing the Impact of Active Attack on the Performance of the AMCTD Protocol in Underwater Wireless Sensor Networks
Analyzing the Impact of Active Attack on the Performance of the AMCTD Protocol in Underwater Wireless Sensor Networks Open
The exponentially growing concern of cyber-attacks on extremely dense underwater sensor networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel research challenges and issues. Primarily, varied protocol evalu…
View article: A framework for designing interactive mobile training course content using augmented reality
A framework for designing interactive mobile training course content using augmented reality Open
View article: UTILIZATION OF MOBILE AUGMENTED REALITY IN A COURSE CONTENT: AN IMPACT STUDY
UTILIZATION OF MOBILE AUGMENTED REALITY IN A COURSE CONTENT: AN IMPACT STUDY Open
With the rapid evolution of interactive technology, the popularity of mobile augmented reality (MAR) as a learning aid has continued to grow. However, several studies have revealed that research on the impact of AR in the educational domai…
View article: Risk Factors and Practices for the Development of Open Source Software From Developers’ Perspective
Risk Factors and Practices for the Development of Open Source Software From Developers’ Perspective Open
Open source software (OSS) has achieved popularity, however there are various software product quality problems, security issues and certain challenges confronting the OSS growth that need to be identified and addressed. The main focus of …
View article: International Student Profiling Framework
International Student Profiling Framework Open
The current conventional way of screening international students, solely based on prior admission and self-reported documents, is inadequate. Given the drastic increase in the number of incoming students, this inadequacy calls for better s…
View article: Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network
Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network Open
Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user.We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-D…
View article: Blockchain Federated Learning for In-Home Health Monitoring
Blockchain Federated Learning for In-Home Health Monitoring Open
This research combines two emerging technologies, the IoT and blockchain, and investigates their potential and use in the healthcare sector. In healthcare, IoT technology can be utilized for purposes such as remotely monitoring patients’ h…
View article: A Heterogeneous Ensemble Approach for Travel Time Prediction Using Hybridized Feature Spaces and Support Vector Regression
A Heterogeneous Ensemble Approach for Travel Time Prediction Using Hybridized Feature Spaces and Support Vector Regression Open
Travel time prediction is essential to intelligent transportation systems directly affecting smart cities and autonomous vehicles. Accurately predicting traffic based on heterogeneous factors is highly beneficial but remains a challenging …
View article: Collaborative Detection of Black Hole and Gray Hole Attacks for Secure Data Communication in VANETs
Collaborative Detection of Black Hole and Gray Hole Attacks for Secure Data Communication in VANETs Open
Vehicle ad hoc networks (VANETs) are vital towards the success and comfort of self-driving as well as semi-automobile vehicles. Such vehicles rely heavily on data management and the exchange of Cooperative Awareness Messages (CAMs) for ext…
View article: Automatic Modulation Recognition Based on the Optimized Linear Combination of Higher-Order Cumulants
Automatic Modulation Recognition Based on the Optimized Linear Combination of Higher-Order Cumulants Open
Automatic modulation recognition (AMR) is used in various domains—from general-purpose communication to many military applications—thanks to the growing popularity of the Internet of Things (IoT) and related communication technologies. In …
View article: Retraction Note: Image pattern recognition in big data: taxonomy and open challenges: survey
Retraction Note: Image pattern recognition in big data: taxonomy and open challenges: survey Open
View article: Design and Implementation of Real-Time Kitchen Monitoring and Automation System Based on Internet of Things
Design and Implementation of Real-Time Kitchen Monitoring and Automation System Based on Internet of Things Open
Automation can now be found in nearly every industry. However, home automation has yet to reach Pakistan. This paper presents an Internet of Things smart kitchen project that includes automation and monitoring. In this project, a system wa…
View article: Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks
Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks Open
Underwater wireless sensor networks have grown considerably in recent years and now contribute substantially to ocean surveillance applications, marine monitoring and target detection. However, the existing deployment solutions struggle to…
View article: QGA-QGCNN:A model of Quantum Gate Circuit Neural Network optimized by Quantum Genetic Algorithm
QGA-QGCNN:A model of Quantum Gate Circuit Neural Network optimized by Quantum Genetic Algorithm Open
Using global optimization algorithm to optimize the initial weights and thresholds of traditional neural network model can effectively address the problems of premature convergence and lower accuracy. However, the shortcomings such as slow…
View article: Human Activity Recognition: Review, Taxonomy and Open Challenges
Human Activity Recognition: Review, Taxonomy and Open Challenges Open
Nowadays, Human Activity Recognition (HAR) is being widely used in a variety of domains, and vision and sensor-based data enable cutting-edge technologies to detect, recognize, and monitor human activities. Several reviews and surveys on H…
View article: GRANULAR NETWORK TRAFFIC CLASSIFICATION FOR STREAMING TRAFFIC USING INCREMENTAL LEARNING AND CLASSIFIER CHAIN
GRANULAR NETWORK TRAFFIC CLASSIFICATION FOR STREAMING TRAFFIC USING INCREMENTAL LEARNING AND CLASSIFIER CHAIN Open
In modern networks, network visibility is of utmost importance to network operators. Accordingly, granular network traffic classification quickly rises as an essential technology due to its ability to provide high network visibility. Granu…
View article: Auction Mechanism-Based Sectored Fractional Frequency Reuse for Irregular Geometry Multicellular Networks
Auction Mechanism-Based Sectored Fractional Frequency Reuse for Irregular Geometry Multicellular Networks Open
Modern cellular systems have adopted dense frequency reuse to address the growing amount of mobile data traffic. The system capacity is improved accordingly; however, this is at the cost of augmented Inter-Cell Interference (ICI). Recently…
View article: Comparative Analysis of State-of-the-Art Deep Learning Models for Detecting COVID-19 Lung Infection from Chest X-Ray Images
Comparative Analysis of State-of-the-Art Deep Learning Models for Detecting COVID-19 Lung Infection from Chest X-Ray Images Open
The ongoing COVID-19 pandemic has already taken millions of lives and damaged economies across the globe. Most COVID-19 deaths and economic losses are reported from densely crowded cities. It is comprehensible that the effective control an…
View article: Deep Learning Based Disease, Pest Pattern and Nutritional Deficiency Detection System for “Zingiberaceae” Crop
Deep Learning Based Disease, Pest Pattern and Nutritional Deficiency Detection System for “Zingiberaceae” Crop Open
Plants’ diseases cannot be avoided because of unpredictable climate patterns and environmental changes. The plants like ginger get affected by various pests, conditions, and nutritional deficiencies. Therefore, it is essential to identify …
View article: Transfer Learning Auto-Encoder Neural Networks for Anomaly Detection of DDoS Generating IoT Devices
Transfer Learning Auto-Encoder Neural Networks for Anomaly Detection of DDoS Generating IoT Devices Open
Machine Learning based anomaly detection ap- proaches have long training and validation cycles. With IoT devices rapidly proliferating, training anomaly models on a per device basis is impractical. This work explores the “transfer- ability…