Mohd Yamani Idna Bin Idris

According to our database1, Mohd Yamani Idna Bin Idris authored at least 53 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Combined State of Charge and State of Energy Estimation of Lithium-Ion Battery Using Dual Forgetting Factor-Based Adaptive Extended Kalman Filter for Electric Vehicle Applications.
IEEE Trans. Veh. Technol., 2021

Energy-Efficient Wireless Sensor Network with an Unequal Clustering Protocol Based on a Balanced Energy Method (EEUCB).
Sensors, 2021

An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network.
IEEE Access, 2021

Dental Impression Tray Selection From Maxillary Arch Images Using Multi-Feature Fusion and Ensemble Classifier.
IEEE Access, 2021

2020
Optimal Placement of Near Ground VHF/UHF Radio Communication Network as a Multi Objective Problem.
Wirel. Pers. Commun., 2020

Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things.
Sensors, 2020

A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges.
Sensors, 2020

Saliency-based bit plane detection for network applications.
Multim. Tools Appl., 2020

Correction to: Countering Statistical Attacks in Cloud-Based Searchable Encryption.
Int. J. Parallel Program., 2020

Countering Statistical Attacks in Cloud-Based Searchable Encryption.
Int. J. Parallel Program., 2020

Local descriptor for retinal fundus image registration.
IET Comput. Vis., 2020

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities.
IEEE Access, 2020

Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network.
IEEE Access, 2020

Informed RRT*-Connect: An Asymptotically Optimal Single-Query Path Planning Method.
IEEE Access, 2020

Hybrid RRT: A Semi-Dual-Tree RRT-Based Motion Planner.
IEEE Access, 2020

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things.
IEEE Access, 2020

An Enhanced Two-factor Authentication Protocol for V2V Communication in VANETs.
Proceedings of the ICISS 2020: The 3rd International Conference on Information Science and System, 2020

Route Optimization by using Dijkstra's Algorithm for the Waste Management System.
Proceedings of the ICISS 2020: The 3rd International Conference on Information Science and System, 2020

2019
LocPass: A Graphical Password Method to Prevent Shoulder-Surfing.
Symmetry, 2019

Investigation of Fusion Features for Apple Classification in Smart Manufacturing.
Symmetry, 2019

A scene image classification technique for a ubiquitous visual surveillance system.
Multim. Tools Appl., 2019

A new image size reduction model for an efficient visual sensor network.
J. Vis. Commun. Image Represent., 2019

Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges.
Inf. Process. Manag., 2019

An automatic zone detection system for safe landing of UAVs.
Expert Syst. Appl., 2019

Review on Security of Internet of Things Authentication Mechanism.
IEEE Access, 2019

Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model.
IEEE Access, 2019

2018
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme.
Symmetry, 2018

Image steganography in spatial domain: A survey.
Signal Process. Image Commun., 2018

Vision-Based Apple Classification for Smart Manufacturing.
Sensors, 2018

Intersection and Complement Set (IACS) Method to Reduce Redundant Node in Mobile WSN Localization.
Sensors, 2018

Comparative study of different binarization methods through their effects in characters localization in scene images.
Data Knowl. Eng., 2018

Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol.
IEEE Access, 2018

Empirical Study of Sperm Swarm Optimization Algorithm.
Proceedings of the Intelligent Systems and Applications, 2018

An Efficient Text Representation for Searching and Retrieving Classical Diacritical Arabic Text.
Proceedings of the Fourth International Conference On Arabic Computational Linguistics, 2018

2017
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks.
Wirel. Networks, 2017

Energy harvesting and battery power based routing in wireless sensor networks.
Wirel. Networks, 2017

An Estimation of QoS for Classified Based Approach and Nonclassified Based Approach of Wireless Agriculture Monitoring Network Using a Network Model.
Wirel. Commun. Mob. Comput., 2017

Multi-Objective Optimization Algorithm Based on Sperm Fertilization Procedure (MOSFP).
Symmetry, 2017

SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack.
J. Vis. Commun. Image Represent., 2017

Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review.
J. Sensors, 2017

Preserving Content Integrity of Digital Holy Quran: Survey and Open Challenges.
IEEE Access, 2017

2016
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation.
Wirel. Commun. Mob. Comput., 2016

WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs.
J. Sensors, 2016

Copy-move forgery detection: Survey, challenges and future directions.
J. Netw. Comput. Appl., 2016

Chroma key background detection for digital video using statistical correlation of blurring artifact.
Digit. Investig., 2016

2015
Using finite state machine and a hybrid of EEG signal and EOG artifacts for an asynchronous wheelchair navigation.
Expert Syst. Appl., 2015

2014
Blind source mobile device identification based on recorded call.
Eng. Appl. Artif. Intell., 2014

Passive video forgery detection techniques: A survey.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2013
Emergency vehicle preemption system based on global positioning system (GPS), A-star (A*) algorithm and FPGA.
Comput. Syst. Sci. Eng., 2013

2009
High-Speed Shortest Path Co-processor Design.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009

2008
Reverse Engineering: EDOWA Worm Analysis and Classification.
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008

Needleman Wunsch Implementation for SPAM/UCE Inline Filter.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

2005
The Use of Virtual Reality in Science Subjects among Form Four to Form Six Students in Malaysia.
Proceedings of the iiWAS'2005, 2005


  Loading...