A H Azni
A H Azni
Associate Professor at Universiti Sains Islam Malaysia
Vahvistettu sähköpostiosoite verkkotunnuksessa usim.edu.my
Performance analysis of routing protocol for WSN using data centric approach
AH Azni, MM Saudi, A Azman, AS Johari
World Academy of Science, Engineering and Technology 53, 2009
Correlated node behavior model based on semi Markov process for MANETS
AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin
arXiv preprint arXiv:1203.4319, 2012
Bluetooth mobile advertising system using pull-based approach
AH Halim, AH Fauzi, S Tarmizi
2008 International Symposium on Information Technology 4, 1-4, 2008
Analysis of Packets Abnormalities in Wireless Sensor Network
AH Azni, A Azman, MM Saudi, AH Fauzi, DNFA Iskandar
2009 Fifth International Conference on MEMS NANO, and Smart Systems, 259-264, 2009
Denial of service:(DoS) Impact on sensors
M Daud, R Rasiah, M George, D Asirvatham, AFA Rahman, A Ab Halim
2018 4th International Conference on Information Management (ICIM), 270-274, 2018
Systematic review for network survivability analysis in MANETS
AH Azni, R Ahmad, ZAM Noh, F Hazwani, N Hayaati
Procedia-Social and Behavioral Sciences 195, 1872-1881, 2015
Epidermic modelling for correlated node behavior in ad hoc networks
AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin
International Journal of Chaotic Computing 1 (1), 22-30, 2013
MAC protocol to reduce packet collision in wireless sensor network
AHA Halim, K Zen
2008 International Conference on Computer and Communication Engineering …, 2008
Extracting software features from online reviews to demonstrate requirements reuse in software engineering
NH Bakar, ZM Kasirun, N Salleh, AH Halim
Survivability modeling and analysis of mobile ad hoc network with correlated node behavior
AH Azni, R Ahmad, ZAM Noh
Procedia Engineering 53, 435-440, 2013
Factors influencing knowledge sharing in higher learning
AH Azni, AA Baker, N Shah, H Abd Hamid
2010 International Symposium on Information Technology 3, 1606-1609, 2010
An overview of STAKCERT framework in confronting worms attack
MM Saudi, AJ Cullen, ME Woodward, HA Hamid, AH Abhalim
2009 2nd IEEE International Conference on Computer Science and Information …, 2009
The adaptive multi-level phase coding method in audio steganography
AA Alsabhany, F Ridzuan, AH Azni
IEEE Access 7, 129291-129306, 2019
Visual perception games for autistic learners: Research findings
F Shahbodin, CKNCK Mohd, AH Azni, Z Jano
Proceedings of the 2019 Asia Pacific Information Technology Conference, 56-60, 2019
An efficient network security system through an ontology approach
AH Azni, MM Saudi, A Azman, EM Tamil, MYI Idris
2008 International Conference on Innovations in Information Technology, 267-271, 2008
Measuring sensor to cloud energy consumption
AFA Rahman, AA Halim, NHM Alwi, KS Alwi, FA Mohamad, MN Taufiq, ...
Proceedings of the 2018 2nd High Performance Computing and Cluster …, 2018
Correlated node behavior in wireless ad hoc networks: an epidemic model
AH Azni, R Ahmad, ZAM Noh
2012 International Conference for Internet Technology and Secured …, 2012
A., AzreenAzman, and AriffSyahJohari,“Performance Analysis of Routing Protocol for WSN Using Data Centric Approach,”
A Azni, MM Saudi, AzreenAzman, AriffSyahJohari
International Journal of Electrical and Computer Engineering 5 (4), 208-211, 2010
Randomness Analysis on RECTANGLE Block Cipher
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
7th International Cryptology and Information Security Conference 2020 …, 2020
Lightweight cryptography techniques for MHealth cybersecurity
F Shahbodin, AH Azni, T Ali, CKNCK Mohd
Proceedings of the 2019 Asia Pacific Information Technology Conference, 44-50, 2019
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20