Hanan bin Abdullah

Learn More
In recent years, the security issues on MANET have become one of the primary concerns. The MANET is more vulnerable to be attacked than wired network. These vulnerabilities are nature of the MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple the(More)
Electronic government provides a variety of services to citizens on-line, which include carrying out a range of transactions. These transactions include people's personal information in electronic form. Some people remain suspicious of information technology (IT), either because they are unfamiliar with it or have concerns about how departments might use(More)
—The Kohonen self organizing map is an efficient tool in exploratory phase of data mining and pattern recognition. The SOM is a popular tool that maps high dimensional space into a small number of dimensions by placing similar elements close together, forming clusters. Recently, most of the researchers found that to take the uncertainty concerned in cluster(More)
In recent years, there has been a great deal of attention toward free radicals, reactive oxygen species (ROS) generated by exposure of crop plant cells to physical radiations. Henceforth, the current study was planned to compare oxidative stress and mutagenic potential of different irradiation doses of fast neutron (FN) and UV-B on meiotic-pollen mother(More)
The Wireless Sensor Networks (WSNs) can be used for many different applications. However, there are several applications where the sensor data is of no use and can result in an incorrect interpretation of the given data particularly if the coordinate's information is not known. Therefore, localization is of Paramount importance in several operations of(More)
Active RFID devices are gaining popularity in usage in many applications such as building evacuation, disaster monitoring, cargo tracking and so on. Equipped with batter cells and ability to send and receive signals distinguished active RFIDs from passive ones and convert them to smart network devices. Power tag is one of a kind in active RFID devices where(More)
This study presents Artificial Intelligence based channel estimation and monitoring technique call AI-Monitoring System (AIMS), for integration of Multimedia traffic in wireless network. Through AIMS technique every node in the network has the capability to monitor the neighbour node transmission and also before sending the traffic. The sending node(More)
  • 1