Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G

    6G is more likely prone to a range of known and unknown cyber-attacks because of its highly distributive nature. Current literature and research prove that a trust boundary can be used as a security door (e.g....

    Rabeya Basri, Gour Karmakar in Information Security Practice and Experien… (2023)

  2. No Access

    Article

    Light intensity and efficiency enhancement of n-ZnO/NiO/p-GaN heterojunction-based white light-emitting diodes using micro-pillar array

    This study presents a unique method of enhancing light intensity and efficiency of light-emitting diodes (LEDs) by incorporating micro-pillars’ array on top of the substrate layer. The micro-pillars’ array on ...

    Apurba Adhikary, Md. Shamim Ahsan, Md. Bipul Hossain, Abidur Rahaman in Journal of Optics (2022)

  3. Article

    Open Access

    Evaluating TCP performance of routing protocols for traffic exchange in street-parked vehicles based fog computing infrastructure

    As most vehicles remain parked 95% of its time, this suggests that leveraging the use of On-board Units (OBUs) in parked vehicles would provide communication and computation services to other mobile and fixed ...

    Awangku Muhammad Iqbal Yura, S. H. Shah Newaz in Journal of Cloud Computing (2020)

  4. No Access

    Chapter

    Information and Communication Technology for Small-Scale Farmers: Challenges and Opportunities

    With the rapid growth in the world population, food production is going to be the biggest challenge for the 21st century. Industrialisation and urbanisation are taking away the available agricultural land and ...

    Shahriar Shams, S. H. Shah Newaz, Rama Rao Karri in Smart Village Technology (2020)

  5. No Access

    Chapter and Conference Paper

    A Performance Study of High-End Fog and Fog Cluster in iFogSim

    Fog computing is introduced to help leverage the processing burden in cloud as it can no longer sustain the ever-growing volume, velocity and variety of the IoT-generated data. Existing studies have shown that...

    Fatin Hamadah Rahman, Thien Wan Au in Computational Intelligence in Information … (2019)

  6. No Access

    Chapter and Conference Paper

    Background Traffic Load Aware Video Class-Lecture Client Admission in a Bandwidth Constrained Campus Network

    Video class-lecture streaming is regarded as a popular means in improving quality of teaching and learning in schools and universities. Several research findings reveal that, recorded lecture videos (streamed ...

    Siti Aisyah binti Haji Jalil in Computational Intelligence in Information … (2019)

  7. No Access

    Chapter and Conference Paper

    Energy Efficient Operational Mechanism for TDM-PON Supporting Broadband Access and Local Customer Internetworking

    Considering ever increasing importance of traffic sharing am- ong the users connected with different Optical Network Units (ONUs) of a TDM-Passive Optical Network (TDM-PON), to date, different TDM-PON architec...

    S. H. Shah Newaz in Computational Intelligence in Information … (2017)

  8. No Access

    Article

    LPC \(_\mathrm{FreqSchd}\) : A local power controller using the frequency scheduling approach for virtualized servers

    For more than a decade, the power consumption of data centers has been addressed from different perspectives. Many solutions have been proposed to reduce (or optimize) this power consumption, such as controlli...

    Fawaz AL-Hazemi, Dong-Ki Kang, Seong-Hwan Kim, Yuyang Peng in Cluster Computing (2016)