Symbiotic organism search optimization based task scheduling in cloud computing environment M Abdullahi, MA Ngadi Future Generation Computer Systems 56, 640-650, 2016 | 235 | 2016 |
A review of current routing attacks in mobile ad hoc networks RH Khokhar, MA Ngadi, S Mandala International journal of computer science and security 2 (3), 18-29, 2008 | 158 | 2008 |
Machine learning techniques for anomaly detection: an overview S Omar, A Ngadi, HH Jebur International Journal of Computer Applications 79 (2), 2013 | 154 | 2013 |
Red blood cell segmentation using masking and watershed algorithm: A preliminary study JM Sharif, MF Miswan, MA Ngadi, MSH Salam, MM bin Abdul Jamil 2012 International Conference on Biomedical Engineering (ICoBE), 258-262, 2012 | 152 | 2012 |
Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges M Faheem, SBH Shah, RA Butt, B Raza, M Anwar, MW Ashraf, MA Ngadi, ... Computer Science Review 30, 1-30, 2018 | 110 | 2018 |
A survey on MANET intrusion detection S Mandala, MA Ngadi, AH Abdullah International Journal of Computer Science and Security 2 (1), 1-11, 2007 | 62 | 2007 |
Hybrid symbiotic organisms search optimization algorithm for scheduling of tasks on cloud computing environment M Abdullahi, MA Ngadi PloS one 11 (6), e0158229, 2016 | 56 | 2016 |
Overview of data routing approaches for wireless sensor networks MH Anisi, AH Abdullah, SA Razak, M Ngadi Sensors 12 (4), 3964-3996, 2012 | 53 | 2012 |
Fuzzy-assisted social-based routing for urban vehicular environments RH Khokhar, RM Noor, KZ Ghafoor, CH Ke, MA Ngadi EURASIP Journal on Wireless Communications and Networking 2011 (1), 1-15, 2011 | 43 | 2011 |
An efficient next hop selection algorithm for multi-hop body area networks V Ayatollahitafti, MA Ngadi, J Mohamad Sharif, M Abdullahi PloS one 11 (1), e0146464, 2016 | 42 | 2016 |
An efficient symbiotic organisms search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing environment M Abdullahi, MA Ngadi, SI Dishing, BI Ahmad Journal of Network and Computer Applications 133, 60-74, 2019 | 36 | 2019 |
A taxonomy of cross layer routing metrics for wireless mesh networks MAB Ngadi, S Ali, AH Abdullah, RH Khokhar EURASIP Journal on Wireless Communications and Networking 2012 (1), 1-16, 2012 | 34 | 2012 |
Cyber security for cyber physcial systems: A trust-based approach A Saqib, RW Anwar, OK Hussain, M Ahmad, MA Ngadi, MM Mohamad, ... J Theor Appl Inf Technol 71 (2), 144-152, 2015 | 25 | 2015 |
Towards providing a new lightweight authentication and encryption scheme for MANET T Eissa, S Abd Razak, MDA Ngadi Wireless Networks 17 (4), 833-842, 2011 | 24 | 2011 |
MPEG-4 video transmission using distributed TDMA MAC protocol over IEEE 802.15. 4 wireless technology NSN Ismail, F Yunus, SHS Ariffin, AA Shahidan, RA Rashid, W Embong, ... 2011 Fourth International Conference on Modeling, Simulation and Applied …, 2011 | 21* | 2011 |
A review of blackhole attack in mobile adhoc network S Mandala, AH Abdullah, AS Ismail, H Haron, MA Ngadi, Y Coulibaly 2013 3rd International Conference on Instrumentation, Communications …, 2013 | 20 | 2013 |
Energy efficient and reliable data gathering using internet of software-defined mobile sinks for WSNs-based smart grid applications M Faheem, RA Butt, B Raza, MW Ashraf, MA Ngadi, VC Gungor Computer Standards & Interfaces 66, 103341, 2019 | 19 | 2019 |
Enhancing MANET security using secret public keys T Eissa, S Abd Razal, MD Asringadi 2009 International Conference on Future Networks, 130-134, 2009 | 19 | 2009 |
A novel lightweight authentication scheme for mobile ad hoc networks T Eissa, S Abd Razak, MA Ngadi Arabian Journal for Science and Engineering 37 (8), 2179-2192, 2012 | 18 | 2012 |
A review of delay aware routing protocols in MANET SM Zaki, M Ngadi, SA Razak Computer Science Letters 1 (1), 48-60, 2009 | 17 | 2009 |