Learn More
Mobile crowd management is yet an emerging new research area for Search and Rescue (SAR) operations. The dynamic nature and mobility of Mobile Adhoc Networks (MANETs) demand for new set of networking strategies to be developed in order to provide reliable and efficient communication during catastrophe such as in battlefield, terrorist attacks and natural(More)
In the autonomous environment of Vehicular Ad hoc NETwork (VANET), vehicles randomly move with high speed and rely on each other for successful data transmission process. The routing can be difficult or impossible to predict in such intermittent vehicles connectivity and highly dynamic topology. The existing routing solutions do not consider the knowledge(More)
Ant-based algorithms simulate the cooperative behaviour of real ants in finding food resources. A significant number of studies have focused on the self-organised behaviour of ants in the natural environment to develop effective systems for dynamic problems. Ant-based systems have special properties such as scalability, adaptability, and dynamicity, which(More)
Vehicle traffic congestion leads to air pollution, driver frustration, and costs billions of dollars annually in fuel consumption. Finding a proper solution to vehicle congestion is a considerable challenge due to the dynamic and unpredictable nature of the network topology of vehicular environments, especially in urban areas. Instead of using static(More)
Vehicular Ad Hoc Network (VANET) has received increased attention from scholars and industries in recent years. Meanwhile, Congestion control remains the major concern for VANET application due to its characteristics such as bandwidth limitation, fast change of topology and lack of central coordination. Researchers have proposed a number of solutions to(More)
The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities,(More)
Increasing numbers of Internet users have recently been gaining interest in streaming services as they watch their favorite live football match or listen to the latest breaking news online through voice or video streaming services. It is known that in streaming services, even a small amount of quality disturbance can irritate users, in the form of, for(More)
Image splicing is a common operation in image forgery. Different techniques of image splicing detection have been utilized to regain people's trust. This study introduces a texture enhancement technique involving the use of fractional differential masks based on the Machado entropy. The masks slide over the tampered image, and each pixel of the tampered(More)