Verified email at
Cited by
Cited by
Symbiotic organism search optimization based task scheduling in cloud computing environment
M Abdullahi, MA Ngadi
Future Generation Computer Systems 56, 640-650, 2016
A review of current routing attacks in mobile ad hoc networks
RH Khokhar, MA Ngadi, S Mandala
International journal of computer science and security 2 (3), 18-29, 2008
Machine learning techniques for anomaly detection: an overview
S Omar, A Ngadi, HH Jebur
International Journal of Computer Applications 79 (2), 2013
Red blood cell segmentation using masking and watershed algorithm: A preliminary study
JM Sharif, MF Miswan, MA Ngadi, MSH Salam, MM bin Abdul Jamil
2012 International Conference on Biomedical Engineering (ICoBE), 258-262, 2012
Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges
M Faheem, SBH Shah, RA Butt, B Raza, M Anwar, MW Ashraf, MA Ngadi, ...
Computer Science Review 30, 1-30, 2018
A survey on MANET intrusion detection
S Mandala, MA Ngadi, AH Abdullah
International Journal of Computer Science and Security 2 (1), 1-11, 2007
Hybrid symbiotic organisms search optimization algorithm for scheduling of tasks on cloud computing environment
M Abdullahi, MA Ngadi
PloS one 11 (6), e0158229, 2016
Overview of data routing approaches for wireless sensor networks
MH Anisi, AH Abdullah, SA Razak, M Ngadi
Sensors 12 (4), 3964-3996, 2012
Fuzzy-assisted social-based routing for urban vehicular environments
RH Khokhar, RM Noor, KZ Ghafoor, CH Ke, MA Ngadi
EURASIP Journal on Wireless Communications and Networking 2011 (1), 1-15, 2011
An efficient next hop selection algorithm for multi-hop body area networks
V Ayatollahitafti, MA Ngadi, J Mohamad Sharif, M Abdullahi
PloS one 11 (1), e0146464, 2016
An efficient symbiotic organisms search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing environment
M Abdullahi, MA Ngadi, SI Dishing, BI Ahmad
Journal of Network and Computer Applications 133, 60-74, 2019
A taxonomy of cross layer routing metrics for wireless mesh networks
MAB Ngadi, S Ali, AH Abdullah, RH Khokhar
EURASIP Journal on Wireless Communications and Networking 2012 (1), 1-16, 2012
Cyber security for cyber physcial systems: A trust-based approach
A Saqib, RW Anwar, OK Hussain, M Ahmad, MA Ngadi, MM Mohamad, ...
J Theor Appl Inf Technol 71 (2), 144-152, 2015
Towards providing a new lightweight authentication and encryption scheme for MANET
T Eissa, S Abd Razak, MDA Ngadi
Wireless Networks 17 (4), 833-842, 2011
MPEG-4 video transmission using distributed TDMA MAC protocol over IEEE 802.15. 4 wireless technology
NSN Ismail, F Yunus, SHS Ariffin, AA Shahidan, RA Rashid, W Embong, ...
2011 Fourth International Conference on Modeling, Simulation and Applied …, 2011
A review of blackhole attack in mobile adhoc network
S Mandala, AH Abdullah, AS Ismail, H Haron, MA Ngadi, Y Coulibaly
2013 3rd International Conference on Instrumentation, Communications …, 2013
Energy efficient and reliable data gathering using internet of software-defined mobile sinks for WSNs-based smart grid applications
M Faheem, RA Butt, B Raza, MW Ashraf, MA Ngadi, VC Gungor
Computer Standards & Interfaces 66, 103341, 2019
Enhancing MANET security using secret public keys
T Eissa, S Abd Razal, MD Asringadi
2009 International Conference on Future Networks, 130-134, 2009
A novel lightweight authentication scheme for mobile ad hoc networks
T Eissa, S Abd Razak, MA Ngadi
Arabian Journal for Science and Engineering 37 (8), 2179-2192, 2012
A review of delay aware routing protocols in MANET
SM Zaki, M Ngadi, SA Razak
Computer Science Letters 1 (1), 48-60, 2009
The system can't perform the operation now. Try again later.
Articles 1–20