Mohamad Afendee Mohamed
National University of Malaysia
Distributed computingTopologyArtificial intelligenceNonlinear systemAttractorElliptic curve cryptographyScalar multiplicationLyapunov exponentWireless sensor networkEfficient energy useChaoticAddition chainApplied mathematicsComputer networkMathematicsComputer securityComputer scienceControl theoryBacksteppingConjugate gradient methodEquilibrium point
106Publications
6H-index
194Citations
Publications 101
Newest
#1Ammar Y. TuamaH-Index: 1
#2Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 6
Last. Khairul Azmi Abu BakarH-Index: 4
view all 6 authors...
1 CitationsSource
#1N. A. Asri (UniSZA: Universiti Sultan Zainal Abidin)
#2Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 6
Last. Norziana JamilH-Index: 9
view all 7 authors...
Source
Source
#1M. K. DaudaH-Index: 3
#2Mustafa MamatH-Index: 15
Last. M. Y. WaziriH-Index: 4
view all 5 authors...
Source
#1Ammar Y. TuamaH-Index: 1
#2Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 6
Last. Zurina Mohd Hanapi (UPM: Universiti Putra Malaysia)H-Index: 13
view all 4 authors...
Energy consumption is one of the most critical issues in wireless sensor network (WSN). For a sensor device, transmission of data is considered as the most energy consuming task, and it mostly depends on the size of the data. Fortunately, data compression can be used to minimise the transmitted data size and thus extend sensor's lifetime. In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. Using compression ratio, memory usage, number ...
1 CitationsSource
#1Abd Rasid Mamat (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 5
#2Nurul Hanis Abd. Rasid (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 1
Last. Fatimah Ghazali (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 1
view all 7 authors...
Pre-School education it is an important issue in modern family. Players in this field, whether private or government agencies, are trying to be the main operators for providing the best services. Selecting the best pre-schools put parents in dilemma due to the variety of options offered by the institutions. Parents are influenced by various factors such as fees, contents and facilities. However, parents have different preferences for their children education. The objectives of this research are ...
1 CitationsSource
#1Rajina R. Mohamed (TNB: Universiti Tenaga Nasional)H-Index: 2
#2Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 6
view all 5 authors...
Source
#1Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 6
#2Mohd Khalid Awang (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 5
Last. Abd Rasid Mamat (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 5
view all 4 authors...
Food additives may come from natural and chemical sources. In some countries, this ingredient is coded into e-numbering system. E-Number identifies the additive substance, and it can be used to determine its possible sources hence the halal status and its value for health. However the use of scientific name or the coded number is confusing to consumers. This article presents an android-based mobile application that provides a database access to the detailed information about the additives. Infor...
#1Ahmad Nazari Mohd Rose (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 4
#2Mohd Isa Awang (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 3
Last. Mustafa Mat Deris (Information Technology University)H-Index: 22
view all 6 authors...
The main intention of proposing an alternative technique is to ensure consistency is been upheld besides successfully reducing the file. Of all the reduction techniques available currently, only normal parameter reduction has managed to address the issue of consistency at optimal and suboptimal level. In this paper, we initiated another form of reduction known as hybrid reduction by complementing the normal parameter reduction with object reduction. It has already demonstrated that the proposed ...
1 CitationsSource
#1Mohd Isa Awang (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 3
#2Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 6
Last. Norkhairani Abdul Rawi (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 1
view all 5 authors...
The user usually uses password to avoid the attacks like a dictionary attack, brute force attack and shoulder surfing attack which is the famous attack nowadays. The shoulder surfing attack is a direct observation technique by watching over the user’s shoulder when they enter their password to get information. The most common authentication method used by the user is textual password. But, the textual password has many disadvantages because it is vulnerable to attack as it tends to shoulder surf...
Source