Abdullah Muhammed

Orcid: 0000-0002-0088-7073

According to our database1, Abdullah Muhammed authored at least 23 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud.
J. Netw. Comput. Appl., 2024

Efficient Multi-Cloud Storage Using Online Dynamic Replication and Placement Algorithms for Online Social Networks.
IEEE Access, 2024

2023
An Estimation-Based Dynamic Load Balancing Algorithm for Efficient Load Distribution and Balancing in Heterogeneous Grid Computing Environment.
J. Grid Comput., March, 2023

A Multicriteria Decision-Making Framework for Access Point Selection in Hybrid LiFi/WiFi Networks Using Integrated AHP-VIKOR Technique.
Sensors, February, 2023

An optimised cuckoo-based discrete symbiotic organisms search strategy for tasks scheduling in cloud computing environment.
CoRR, 2023

2021
An Intrusion Detection System for the Internet of Things Based on Machine Learning: Review and Challenges.
Symmetry, 2021

An Enhanced Discrete Symbiotic Organism Search Algorithm for Optimal Task Scheduling in the Cloud.
Algorithms, 2021

2020
Hyper-Heuristic Framework for Sequential Semi-Supervised Classification Based on Core Clustering.
Symmetry, 2020

A hybrid heuristic of Variable Neighbourhood Descent and Great Deluge algorithm for efficient task scheduling in Grid computing.
Eur. J. Oper. Res., 2020

2018
Class-based QoS scheduling of WiMAX networks.
J. High Speed Networks, 2018

Cost Effective Expa-Max-Min Scientific Workflow Allocation and Load Balancing Strategy in Cloud Computing.
J. Comput. Sci., 2018

Correction to: Load balancing mechanism for clustered PMIPv6 protocol.
EURASIP J. Wirel. Commun. Netw., 2018

Load balancing mechanism for clustered PMIPv6 protocol.
EURASIP J. Wirel. Commun. Netw., 2018

Network Security Evaluation and Training Based on Real World Scenarios of Vulnerabilities Detected in Portuguese Municipalities' Network Devices.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Performance Comparison of Some Addition Chain Methods Based on Integer Family.
Proceedings of the Information Science and Applications 2018, 2018

2017
A Review on Heuristics for Addition Chain Problem: Towards Efficient Public Key Cryptosystems.
J. Comput. Sci., 2017

A new compression algorithm for small data communication in wireless sensor network.
Int. J. Sens. Networks, 2017

An Adaptive Call Admission Control With Bandwidth Reservation for Downlink LTE Networks.
IEEE Access, 2017

Incorporating the Range-Based Method into GridSim for Modeling Task and Resource Heterogeneity.
IEEE Access, 2017

2016
Mobility management for IoT: a survey.
EURASIP J. Wirel. Commun. Netw., 2016

Great Deluge and Extended Great Deluge Based Job Scheduling in Grid Computing Using GridSim.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

2015
A Secure Chat Application Based on Pure Peer-to-Peer Architecture.
J. Comput. Sci., 2015

Cost-Effective Scheduling Analysis Through Discrete Event Simulation for Distributed Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015


  Loading...