RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Review of Facial Expression Recognition Issues, Challenges, and Future Research Direction

        Yan, Bowen,Azween, Abdullah,Lorita, Angeline,S.H., Kok International Journal of Computer ScienceNetwork S 2023 International journal of computer science and netw Vol.23 No.1

        Facial expression recognition, a topical problem in the field of computer vision and pattern recognition, is a direct means of recognizing human emotions and behaviors. This paper first summarizes the datasets commonly used for expression recognition and their associated characteristics and presents traditional machine learning algorithms and their benefits and drawbacks from three key techniques of face expression; image pre-processing, feature extraction, and expression classification. Deep learning-oriented expression recognition methods and various algorithmic framework performances are also analyzed and compared. Finally, the current barriers to facial expression recognition and potential developments are highlighted.

      • A Survey on the Mobile Crowdsensing System life cycle: Task Allocation, Data Collection, and Data Aggregation

        Xia Zhuoyue,Azween Abdullah,S.H. Kok International Journal of Computer ScienceNetwork S 2023 International journal of computer science and netw Vol.23 No.3

        The popularization of smart devices and subsequent optimization of their sensing capacity has resulted in a novel mobile crowdsensing (MCS) pattern, which employs smart devices as sensing nodes by recruiting users to develop a sensing network for multiple-task performance. This technique has garnered much scholarly interest in terms of sensing range, cost, and integration. The MCS is prevalent in various fields, including environmental monitoring, noise monitoring, and road monitoring. A complete MCS life cycle entails task allocation, data collection, and data aggregation. Regardless, specific drawbacks remain unresolved in this study despite extensive research on this life cycle. This article mainly summarizes single-task, multi-task allocation, and space-time multi-task allocation at the task allocation stage. Meanwhile, the quality, safety, and efficiency of data collection are discussed at the data collection stage. Edge computing, which provides a novel development idea to derive data from the MCS system, is also highlighted. Furthermore, data aggregation security and quality are summarized at the data aggregation stage. The novel development of multi-modal data aggregation is also outlined following the diversity of data obtained from MCS. Overall, this article summarizes the three aspects of the MCS life cycle, analyzes the issues underlying this study, and offers developmental directions for future scholars' reference.

      • Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices

        Saleh, Matasem,Jhanjhi, NZ,Abdullah, Azween,Saher, Raazia International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.8

        The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data.

      • A Numerical Framework for the Analysis of Handoff Delay Component in Proxy NEMO Environment

        Shayla Islam,Aisha-Hassan A. Hashim,Azween Abdullah,Mohammad Kamrul Hasan 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.8

        Network Mobility Basic Support Protocol (NEMO-BSP), the existing IETF standard for mobile network support, signifies an important portion for future heterogeneous wireless access networks. The reason is to provide continuous Internet connectivity during movement of Mobile Router (MR) in NEMO. This paper conducted a quantitative analysis on the handoff delay component of NEMO-BSP as well as its existing enhancements, i.e., Fast NEMO (F-NEMO) handoffs, and an Extension of F-NEMO (EF-NEMO), using the numerical framework. The mathematical scenario includes two access routers, one local home agent and up to 20 MRs that interrelate by two different wireless access networks are mainly WiFi and WiMAX. The analysis offers quantitative outcomes of the performance enhancements achieved via the proposed improvements concerning handoff delay gain, packet loss, and packet loss ratio. The numerical results assist in understanding the influence of link switching delay, mobility rate, and radius on the handoff delay gain, packet loss, and packet loss ratio. The results of this analysis will also be aided to pick an appropriate mobility management scheme for Proxy NEMO environment.

      • Evaluation of an Enhanced Multicast Data Flow Technique in Network Mobility

        Azana Hafizah Mohd Aman,Aisha-Hassan A. Hashim,Azween Abdullah,Huda Adibah Mohd Ramli,Shayla Islam 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.7

        Mobile IPTV applications are becoming very popular worldwide. According to CISCO research, mobile Internet video usage is increasing rapidly each year and soon reaching zettabyte threshold in 2019. With the increase number of traffic, it is a great effort for internet service provider to provide acceptable network performance. The objective of this paper is to mathematically evaluate a new proposed mobile multicast technique to support high performance mobile IP traffic. The new technique enhanced multicast services in Network Mobility Management which is Proxy Mobile IPv6 (PMIPv6). The evaluation is done using mathematical equations that are derived from signaling call flow of the multicast process in the proposed technique. Results are analyzed and compared with the current base solution technique. Using mathematical analysis this paper validates and highlights the strengths of the proposed technique compared to the existing technique.

      • Parametric Comparison of Multicast Support for Network Mobility Management : A Qualitative Analysis

        Azana Hafizah Mohd Aman,Aisha-Hassan A. Hashim,Azween Abdullah,Huda Adibah Mohd Ramli,Shayla Islam 보안공학연구지원센터 2016 International Journal of Multimedia and Ubiquitous Vol.11 No.9

        Proxy Mobile IPv6 (PMIPv6) was initially introduced to assist unicast network-based mobility. In recent years, new approaches have been introduced to provide multicast support in PMIPv6. IP multicast is an imperative mechanism for internet video provision. As the usage of internet data traffic remains to develop rapidly, there is a need to optimize and improve the performance of multicast service. Issues such as large overhead, high packet loss rate, single point of failure, service disruption time, handover latency, and non-route optimization needs to be tackled efficiently. To provide multicast services in PMIPv6, route optimization, global mobility, load balancing and context transfer approaches have been introduced. The foremost aim of this paper is to study and analyze these methods via qualitative analysis. This is to focus the advantages and the limitations of the current approaches.

      • Network Simulators Parametric Comparison for Network Mobility Management

        Azana Hafizah Mohd Aman,Aisha-Hassan A. Hashim,Azween Abdullah,Huda Adibah Mohd Ramli,Shayla Islam 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.10

        It is generally known that network simulator is a program used to verify new or existing network architecture and its activities. Basically network simulator helps to implement the virtual part of network research. This has save a lot of cost on analysis as the results of a network simulator is very close to real network cases. In recent researches, new models and prototypes are introduced to enable latest technologies support on network simulators. Some well-known network simulators are NS2, NS3, OMNET++ and QUALNET. As network research continues to grow rapidly, there is a need to analyze the supports and services offered by each network simulators. The objective of this paper is to investigate and analyze these network simulators in term of network mobility supports. This is because network mobility management has become a crucial topic in networking research. In selecting the right network simulators, issues such as CPU utilization, memory usage, computation time, feasibility, scalability and affordability need to be wisely studied. Using qualitative analysis this paper highlights the strengths and the limitations of these network simulators. The qualitative evaluations of these simulators are hereby presented.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼