default search action
Abid Yahya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Muhammad Shamrooz Aslam, Hazrat Bilal, Wen-Jer Chang, Abid Yahya, Irfan Anjum Badruddin, Sarfaraz Kamangar, Mohamed Hussien:
Formation Control of Heterogeneous Multi-Agent Systems Under Fixed and Switching Hierarchies. IEEE Access 12: 97868-97882 (2024) - [j24]Harry D. Mafukidze, Action Nechibvute, Abid Yahya, Irfan Anjum Badruddin, Sarfaraz Kamangar, Mohamed Hussien:
Development of a Modularized Undergraduate Data Science and Big Data Curricular Using No-Code Software Development Tools. IEEE Access 12: 100939-100956 (2024) - [j23]Kegomoditswe Boikanyo, Adamu Murtala Zungeru, Abid Yahya, Caspar K. Lebekwe:
Performance Optimization for Mobile Wireless Sensor Networks Routing Protocol Using Adaptive Boosting With Sensitivity Analysis. IEEE Access 12: 146494-146512 (2024) - [j22]Hazrat Bilal, Muhammad Shamrooz Aslam, Yibin Tian, Abid Yahya, Basem Abu Izneid:
Enhancing Trajectory Tracking and Vibration Control of Flexible Robots With Hybrid Fuzzy ADRC and Input Shaping. IEEE Access 12: 150574-150591 (2024) - [j21]Mohammed Al-Ambusaidi, Zhang Yinjun, Yar Muhammad, Abid Yahya:
ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications. Soft Comput. 28(2): 1765-1784 (2024) - 2023
- [j20]Jwaone Gaboitaolelwe, Adamu Murtala Zungeru, Abid Yahya, Caspar K. Lebekwe, Dasari Naga Vinod, Ayodeji Olalekan Salau:
Machine Learning Based Solar Photovoltaic Power Forecasting: A Review and Comparison. IEEE Access 11: 40820-40845 (2023) - [j19]Dennies Tsietso, Abid Yahya, Ravi Samikannu, Muhammad Usman Tariq, Muhammad Babar, Basit Qureshi, Anis Koubaa:
Multi-Input Deep Learning Approach for Breast Cancer Screening Using Thermal Infrared Imaging and Clinical Data. IEEE Access 11: 52101-52116 (2023) - [j18]Bose A. Lungisani, Adamu Murtala Zungeru, Caspar K. Lebekwe, Abid Yahya:
Optimized Block-Based Lossy Image Compression Technique for Wireless Sensor Networks. IEEE Access 11: 131245-131259 (2023) - 2022
- [j17]Kebonyethebe Ramahatla, Modisa Mosalaosi, Abid Yahya, Bokamoso Basutli:
Multiband Reconfigurable Antennas for 5G Wireless and CubeSat Applications: A Review. IEEE Access 10: 40910-40931 (2022) - [j16]Bose A. Lungisani, Caspar K. Lebekwe, Adamu Murtala Zungeru, Abid Yahya:
Image Compression Techniques in Wireless Sensor Networks: A Survey and Comparison. IEEE Access 10: 82511-82530 (2022) - [j15]Otisitswe Kebotogetse, Ravi Samikannu, Abid Yahya:
A Concealed Based Approach for Secure Transmission in Advanced Metering Infrastructure. IEEE Access 10: 84809-84817 (2022) - [c8]Kegomoditswe Boikanyo, Adamu Murtala Zungeru, Abid Yahya, Caspar K. Lebekwe:
Performance Evaluation of Termite Hill Routing Algorithm on Mobile and Static Sources of RPMS. SmartNets 2022: 1-6 - [c7]Jwaone Gaboitaolelwe, Adamu Murtala Zungeru, Abid Yahya, Caspar K. Lebekwe:
Electricity Load Prediction Using Machine Learning. SmartNets 2022: 1-4 - [c6]Kebonyethebe Ramahatla, Modisa Mosalaosi, Abid Yahya, Bokamoso Basutli:
Design of a Dual-band Antenna Array for CubeSat Application. SmartNets 2022: 1-4 - 2021
- [j14]Otisitswe Kebotogetse, Ravi Samikannu, Abid Yahya:
Review of key management techniques for advanced metering infrastructure. Int. J. Distributed Sens. Networks 17(8): 155014772110415 (2021) - 2020
- [j13]Temitope O. Fajemilehin, Abid Yahya, Kibet Langat:
Improving Energy Detection in Cognitive Radio Systems Using Machine Learning. J. Commun. 15(1): 74-80 (2020) - [j12]Wei Yao, Fazlullah Khan, Mian Ahmad Jan, Nadir Shah, Izaz Ur Rahman, Abid Yahya, Ateeq Ur Rehman:
Artificial intelligence-based load optimization in cognitive Internet of Things. Neural Comput. Appl. 32(20): 16179-16189 (2020)
2010 – 2019
- 2019
- [j11]Wei Yao, Abid Yahya, Fazlullah Khan, Zhiyuan Tan, Ateeq Ur Rehman, Joseph Monamati Chuma, Mian Ahmad Jan, Muhammad Babar:
A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles. IEEE Access 7: 160889-160900 (2019) - [j10]Leatile Marata, Joseph Monamati Chuma, Ibo Ngebani, Abid Yahya, Onel L. Alcaraz López:
Monte Carlo mean for non-Gaussian autonomous object tracking. Comput. Electr. Eng. 76: 389-397 (2019) - [j9]Fazlullah Khan, Ateeq Ur Rehman, Abid Yahya, Mian Ahmad Jan, Joseph Monamati Chuma, Zhiyuan Tan, Khalid Hussain:
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors 19(19): 4321 (2019) - 2018
- [j8]Muhammad Babar, Fazlullah Khan, Mian Muhammad Waseem Iqbal, Abid Yahya, Fahim Arif, Zhiyuan Tan, Joseph Monamati Chuma:
A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access 6: 43088-43099 (2018) - [c5]Caspar K. Lebekwe, Abid Yahya, Ivan Astin:
An Improved Accuracy Model Employing an e-Navigation System. UEMCON 2018: 152-158 - 2015
- [j7]Zaid Ghanim Ali, R. Badlishah Ahmad, Abid Yahya, Layth A. Hassnawi:
Quantification of Design Challenges and Performance Assessment of WiMAX Resource Allocation Algorithms. Wirel. Pers. Commun. 81(1): 189-205 (2015) - [j6]M. K. Salman, R. Badlishah Ahmad, Abid Yahya:
New Dynamic Resource Utilization Technique Based on Fractional Frequency Reuse. Wirel. Pers. Commun. 83(2): 1183-1202 (2015) - 2014
- [j5]Jaafar A. Aldhaibani, Abid Yahya, R. Badlishah Ahmad, Rashid A. Fayadh, Ameer H. Abbas:
Reducing transmitted Power of Moving Relay Node in Long-Term Evolution-Advanced Cellular Networks. J. Comput. Sci. 10(6): 1051-1061 (2014) - 2013
- [j4]Tariq Adnan Fadil, Shahrul Nizam Yaakob, R. Badlishah Ahmad, Abid Yahya:
A chaotic neural network-based encryption algorithm for MPEG-2 encoded video signal. Int. J. Artif. Intell. Soft Comput. 3(4): 360-371 (2013) - [c4]Sameer K. Salih, Syed Alwee Aljunid, Syed M. Aljunid, Oteh Maskon, Abid Yahya:
High speed approach for detecting QRS complex characteristics in single lead electrocardiogram signal. ICCSCE 2013: 391-396 - 2012
- [j3]Naseer Sabri, Syed Alwee Aljunid, R. Badlishah Ahmad, M. F. Malek, Abid Yahya, R. Kamaruddin, M. S. Salim:
Smart Prolong Fuzzy Wireless Sensor-Actor Network for Agricultural Application. J. Inf. Sci. Eng. 28(2): 295-316 (2012) - [j2]Ali Amer Ahmed, R. B. Ahmad, Saadi A. Alobaidi, Abid Yahya, Layth A. Hassnawi, Zaid Ghanim Ali, Hazim H. Tahir:
Sliding Mode Simulation and Robustness Controller. J. Next Gener. Inf. Technol. 3(2): 19-28 (2012) - [c3]Muataz Hammed Salih, R. Badlishah Ahmad, Abid Yahya, Mohd Rizal Arshad:
Embedded Concurrent Computing Architecture using FPGA. SoSE 2012: 439-444 - 2011
- [p1]Abid Yahya, Farid Ghani, Othman Sidek, R. Badlishah Ahmad, M. F. M. Salleh, Khawaja M. Yahya:
Computational Intelligence in Future Wireless and Mobile Communications by Employing Channel Prediction Technology. Next Generation Data Technologies for Collective Computational Intelligence 2011: 225-250
2000 – 2009
- 2009
- [c2]Abid Yahya, Othman Sidek, M. F. M. Salleh, Farid Ghani:
Row Division Method to Generate QC-LDPC Codes. AICT 2009: 183-187 - [c1]Othman Sidek, Abid Yahya, M. F. M. Salleh:
System Model Performance Coupled with DPSK Modulation over Flat Rayleigh Fading Channels. AICT 2009: 194-197 - 2008
- [j1]Abid Yahya, Othman Sidek, Junita Mohamad-Saleh:
Performance Analyses of Fast Frequency Hopping Spread Spectrum and Jamming Systems. Int. Arab J. Inf. Technol. 5(2): 115-119 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint