Personal information

Verified email domains

Nigeria

Biography

Shafi’i Muhammad ABDULHAMID received his PhD in Computer Science from University of Technology Malaysia (UTM), MSc in Computer Science from Bayero University Kano (BUK), Nigeria and a Bachelor of Technology in Mathematics/Computer Science from the Federal University of Technology Minna, Nigeria. His current research interests are in Cyber Security, Cloud Computing, Soft Computing, Internet of Things Security, Malware Detection and Big Data. He has published many academic papers in reputable International journals, conference proceedings and book chapters. He has been appointed as an Editorial board member for Journal of Computer Science and Information Technology (JCSIT). He has also been appointed as a reviewer of several ISI and Scopus indexed International journals such as Journal of Network and Computer Applications (JNCA) Elsevier, Applied Soft Computing (ASOC) Elsevier, Journal of King Saud University Computer and Information Sciences (JKSU-CIS) Elsevier, Neural Computing and Applications (NCAA) Springer, Cluster Computing Springer, Egyptian Informatics Journal (EIJ) Elsevier, IEEE Access Journal (U.S.A.), Wireless Networks Springer, Plos One Journal, an International Journal Engineering Science and Technology (JESTHC) Elsevier, Brazilian Journal of Science and Technology (BJST) Springer to mention but a few. He has also served as Program Committee (PC) member in many National and International Conferences. He is a member of IEEE Computer Society, International Association of Computer Science and Information Technology (IACSIT), Computer Professionals Registration Council of Nigeria (CPN), International Association of Engineers (IAENG), The Internet Society (ISOC), Cyber Security Experts Association of Nigeria (CSEAN) and Nigerian Computer Society (NCS).

RESEARCH STATEMENT
Cloud computing system is a huge cluster of interconnected servers residing in a data center and dynamically provisioned to clients on-demand via a front-end interface on pay-per-use economic plan. Recently, a number of metaheuristics optimization techniques have been mostly applied to address the challenges of task scheduling in the cloud system being a Non-deterministic Polynomial time (NP-hard) problem without much emphasis on the issue of fault tolerance awareness. In my PhD thesis titled “Fault Tolerance Aware Task Scheduling Techniques for Cloud Computing Environment”, I developed tasks scheduling techniques using an enhanced computational intelligence algorithm called League Championship Algorithm (LCA) in cloud computing system with emphasis on fault tolerance awareness by extending the algorithm to be dynamic, clustered and checkpointed. I have published large body of scientific research work related to resource management in cloud computing in high impact journals and indexed conferences. Before that, I have contributed in the area of cyber security, which includes; spam detection using novel classification algorithms, cyber forensic analysis, internet content filters and resource allocation in cloud and grid systems.

Presently, I have large number of research manuscripts that are waiting to be published or under review in high impact journals in the areas of Bigdata, IoT security, Soft Computing, Ransomware attack, Cryptography, Steganography and Cloud computing. In addition, we are currently carred out a research on “Protecting the Public Core of the Internet Services” which was sponsored by Global Commission on the Stability of Cyberspace (GCSC), Hague, Netherlands.

Cyber forensic is an area of research which we are working to propose new cyber forensic investigation frameworks for effective tracking of cybercrime pathways and documentation for court prosecution. My future research plans is to intensify my research on are; the applications of new soft computing algorithms in new emerging cloud services; Fog, Edge, Cloudlet, Ad hoc cloud, Volunteer cloud, Multi-cloud and Software-defined cloud computing. I also have some prospective future research plans in the areas of improving the performance of computational intelligence optimization schemes in addressing new multifaceted emerging issues in IoT and Big data analytics. To summarize, at this point in my career, my primary interests are in Cloud Computing, Soft Computing, Cyber forensic and Cyber Security. I have pursued these interests to date by conducting different reviews and experiments before, during and after PhD studies. In the long term I see myself working & expanding my expertise in these areas by a mixture of experimental and empirical works.

Activities

Employment (1)

Federal University of Technology Minna: Minna, Niger, NG

2005 to present | Senior Lecturer (Cyber Security Science )
Employment
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID

Education and qualifications (3)

Universiti Teknologi Malaysia (UTM): Skudai, Johor, MY

2013-02-28 to 2016-06-13 | Ph.D in Computer Science (Computer Science)
Education
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID

Bayero University Kano (BUK): Kano, NG

2007 to 2011 | M. Sc. in Computer Science (Computer Science )
Education
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID

Federal University of Technology Minna (FUT): Minna, NG

1997 to 2004 | B. Tech. in Mathematics/Computer Science (Mathematics/Computer Science)
Education
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID

Works (50 of 85)

Items per page:
Page 1 of 2

Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

IEEE Open Journal of the Communications Society
2024 | Journal article
Contributors: Shakeel Ahmad; Muhammad Zaman; Ahmad Sami AL-Shamayleh; Tanzila Kehkashan; Rahiel Ahmad; Safi’ I Muhammad Abdulhamid; Ismail Ergen; Adnan Akhunzada
Source: check_circle
Crossref

The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study

IEEE Access
2023 | Journal article
Contributors: Imran Javed; Uzair Iqbal Janjua; Shafi’i Muhammad Abdulhamid; Tahir Mustafa Madni; Adnan Akhunzada
Source: check_circle
Crossref

A Systematic Literature Review on Face Morphing Attack Detection (MAD)

2022 | Book chapter
Contributors: Mary Ogbuka Kenneth; Bashir Adebayo Sulaimon; Shafii Muhammad Abdulhamid; Laud Charles Ochei
Source: check_circle
Crossref

A hybrid whale optimization algorithm with differential evolution optimization for multi-objective virtual machine scheduling in cloud computing

Engineering Optimization
2022-12-02 | Journal article
Contributors: Nadim Rana; Muhammad Shafie Abd Latiff; Shafi’i Muhammad Abdulhamid; Sanjay Misra
Source: check_circle
Crossref

Application of Grey Wolf Optimization Algorithm: Recent Trends, Issues, and Possible Horizons

Gazi University Journal of Science
2022-06-01 | Journal article
Contributors: Emmanuel DADA; Stephen JOSEPH; David OYEWOLA; Alaba Ayotunde FADELE; Haruna CHİROMA; Shafi'i Muhammad ABDULHAMİD
Source: check_circle
Crossref

A Panacea to Soft Computing Approach for Sinkhole Attack Classification in a Wireless Sensor Networks Environment

Communications in Computer and Information Science
2021 | Book
EID:

2-s2.0-85107360336

Part of ISSN: 18650937 18650929
Contributors: Nwankwo, K.E.; Abdulhamid, S.’M.; Ojeniyi, J.A.; Misra, S.; Oluranti, J.; Ahuja, R.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Genetic Algorithm based feature selection and Naïve Bayes for anomaly detection in fog computing environment

Machine Learning with Applications
2021-12 | Journal article
Contributors: John Oche Onah; Shafi’i Muhammad Abdulhamid; Mohammed Abdullahi; Ibrahim Hayatu Hassan; Abdullah Al-Ghusham
Source: check_circle
Crossref

Deep Learning-Based Big Data Analytics for Internet of Vehicles: Taxonomy, Challenges, and Research Directions

Mathematical Problems in Engineering
2021-11-10 | Journal article
Contributors: Haruna Chiroma; Shafi’i M. Abdulhamid; Ibrahim A. T. Hashem; Kayode S. Adewole; Absalom E. Ezugwu; Saidu Abubakar; Liyana Shuib; Mohammad Yaghoub Abdollahzadeh Jamalabadi
Source: check_circle
Crossref

Adopting automated whitelist approach for detecting phishing attacks

Computers & Security
2021-09 | Journal article
Contributors: Nureni Ayofe Azeez; Sanjay Misra; Ihotu Agbo Margaret; Luis Fernandez-Sanz; Shafi'i Muhammad Abdulhamid
Source: check_circle
Crossref

A review of detection methodologies for quick response code phishing attacks

2020 2nd International Conference on Computer and Information Sciences, ICCIS 2020
2020 | Conference paper
EID:

2-s2.0-85097993643

Contributors: Subairu, S.; Alhassan, J.; Abdulhamid, S.; Ojeniyi, J.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

A survey of symbiotic organisms search algorithms and applications

Neural Computing and Applications
2020 | Journal article
EID:

2-s2.0-85064346567

Contributors: Abdullahi, M.; Ngadi, M.A.; Dishing, S.I.; Abdulhamid, S.M.; Usman, M.J.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

An Intelligent Machine Learning-Based Real-Time Public Transport System

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2020 | Book
EID:

2-s2.0-85092668191

Part of ISSN: 16113349 03029743
Contributors: Skhosana, M.; Ezugwu, A.E.; Rana, N.; Abdulhamid, S.’M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Comparative analysis of classical and post-quantum digital signature algorithms used in bitcoin transactions

2020 2nd International Conference on Computer and Information Sciences, ICCIS 2020
2020 | Conference paper
EID:

2-s2.0-85098000855

Contributors: Noel, M.D.; Waziri, O.V.; Abdulhamid, M.S.; Ojeniyi, A.J.; Okoro, M.U.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives

Journal of Ambient Intelligence and Humanized Computing
2020 | Journal article
EID:

2-s2.0-85096013995

Part of ISSN: 18685145 18685137
Contributors: Bello, I.; Chiroma, H.; Abdullahi, U.A.; Gital, A.Y.; Jauro, F.; Khan, A.; Okesola, J.O.; Abdulhamid, S.M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Nature Inspired Meta-heuristic Algorithms for Deep Learning: Recent Progress and Novel Perspective

Advances in Intelligent Systems and Computing
2020 | Book
EID:

2-s2.0-85065478343

Contributors: Chiroma, H.; Gital, A.Y.; Rana, N.; Abdulhamid, S.’M.; Muhammad, A.N.; Umar, A.Y.; Abubakar, A.I.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Smart Home Automation System Using ZigBee, Bluetooth and Arduino Technologies

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2020 | Book
EID:

2-s2.0-85092657675

Part of ISSN: 16113349 03029743
Contributors: Taiwo, O.; Ezugwu, A.E.; Rana, N.; Abdulhamid, S.’M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments

Neural Computing and Applications
2020 | Journal article
EID:

2-s2.0-85082937516

Part of ISBN:

14333058 09410643

Contributors: Rana, N.; Latiff, M.S.A.; Abdulhamid, S.M.; Chiroma, H.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend

Applied Soft Computing
2020-11 | Journal article
Contributors: Fatsuma Jauro; Haruna Chiroma; Abdulsalam Y. Gital; Mubarak Almutairi; Shafi’i M. Abdulhamid; Jemal H. Abawajy
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives

Neural Computing and Applications
2020-09-17 | Journal article
Contributors: Auwal Ahmed Bello; Haruna Chiroma; Abdulsalam Ya’u Gital; Lubna A. Gabralla; Shafi’i M. Abdulhamid; Liyana Shuib
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption

Green Energy and Technology
2019 | Book
EID:

2-s2.0-85069435045

Contributors: Chiroma, H.; Abdullahi, U.A.; Hashem, I.A.T.; Saadi, Y.; Al-Dabbagh, R.D.; Ahmad, M.M.; Dada, G.E.; Danjuma, S.; Maitama, J.Z.; Abubakar, A. et al.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

An efficient symbiotic organisms search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing environment

Journal of Network and Computer Applications
2019 | Journal article
EID:

2-s2.0-85061810230

Contributors: Abdullahi, M.; Ngadi, M.A.; Dishing, S.I.; Abdulhamid, S.M.; Ahmad, B.I.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Enhanced Testbed Arch. for Network Security Baseline Traffic Modeling

2019 | Book
ISBN:

978-620-0-26669-9

Contributors: Joshua Edward Mamza; Idris Ismaila; Shafi'i Muhammad Abdulhamid
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Deutsche Nationalbibliothek (DNB)

Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment

Cluster Computing
2019 | Journal article
EID:

2-s2.0-85055724469

Contributors: Madni, S.H.H.; Abd Latiff, M.S.; Abdulhamid, S.M.; Ali, J.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Job Scheduling Technique for Infrastructure as a Service Cloud Using an Improved League Championship Algorithm

Lecture Notes in Electrical Engineering
2019 | Book
EID:

2-s2.0-85071451128

Part of ISBN:

18761119 18761100

Contributors: Abdulhamid, S.’M.; Latiff, M.S.A.; Abdullahi, M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Machine Learning Classification Algorithms for Phishing Detection: A Comparative Appraisal and Analysis

2019 2nd International Conference of the IEEE Nigeria Computer Chapter, NigeriaComputConf 2019
2019 | Conference paper
EID:

2-s2.0-85078696425

Contributors: Gana, N.N.; Abdulhamid, S.M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Machine learning for email spam filtering: review, approaches and open research problems

Heliyon
2019 | Journal article
EID:

2-s2.0-85067303397

Part of ISBN:

24058440

Contributors: Dada, E.G.; Bassi, J.S.; Chiroma, H.; Abdulhamid, S.M.; Adetunmbi, A.O.; Ajibuwa, O.E.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Multi-objective-Oriented Cuckoo Search Optimization-Based Resource Scheduling Algorithm for Clouds

Arabian Journal for Science and Engineering
2019 | Journal article
EID:

2-s2.0-85063278690

Contributors: Madni, S.H.H.; Latiff, M.S.A.; Ali, J.; Abdulhamid, S.M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Non-nested generalisation (NNGE) algorithm for efficient and early detection of diabetes

Frontiers in Artificial Intelligence and Applications
2019 | Book
EID:

2-s2.0-85060877220

Contributors: Gbenga, D.E.; Hemanth, D.J.; Chiroma, H.; Abdulhamid, S.M.; Taiwo, A.J.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Progress on Artificial Neural Networks for Big Data Analytics: A Survey

IEEE Access
2019 | Journal article
EID:

2-s2.0-85056499682

Contributors: Chiroma, H.; Abdullahi, U.A.; Abdulhamid, S.M.; Abdulsalam Alarood, A.; Gabralla, L.A.; Rana, N.; Shuib, L.; Targio Hashem, I.A.; Gbenga, D.E.; Abubakar, A.I. et al.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Secure electronic medical records transmission using NTRU Cryptosystem and LSB in audio steganography

CEUR Workshop Proceedings
2019 | Conference paper
EID:

2-s2.0-85078448841

Part of ISBN:

16130073

Contributors: Abdulkadir, A.; Abdulhamid, S.M.; Osho, O.; Idris, I.; Alhassan, J.K.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Sinkhole Attack Detection in A Wireless Sensor Networks using Enhanced Ant Colony Optimization to Improve Detection Rate

2019 2nd International Conference of the IEEE Nigeria Computer Chapter, NigeriaComputConf 2019
2019 | Conference paper
EID:

2-s2.0-85078695928

Contributors: Nwankwo, K.E.; Abdulhamid, S.M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Stateful hash-based digital signature schemes for bitcoin cryptocurrency

2019 15th International Conference on Electronics, Computer and Computation, ICECCO 2019
2019 | Conference paper
EID:

2-s2.0-85083492326

Contributors: Noel, M.D.; Waziri, O.V.; Abdulhamid, M.S.; Ojeniyi, A.J.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Variable Neighborhood Search-Based Symbiotic Organisms Search Algorithm for Energy-Efficient Scheduling of Virtual Machine in Cloud Data Center

Green Energy and Technology
2019 | Book
EID:

2-s2.0-85069514659

Contributors: Abdullahi, M.; Abdulhamid, S.’M.; Dishing, S.I.; Usman, M.J.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Security challenges in fog-computing environment: a systematic appraisal of current developments

Journal of Reliable Intelligent Environments
2019-12-03 | Journal article
Contributors: Jimoh Yakubu; Shafi’i Muhammad Abdulhamid; Haruna Atabo Christopher; Haruna Chiroma; Mohammed Abdullahi
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Recent advances in mobile touch screen security authentication methods: A systematic literature review

Computers & Security
2019-08 | Journal article
Contributors: Tahir Musa Ibrahim; Shafi'i Muhammad Abdulhamid; Ala Abdusalam Alarood; Haruna Chiroma; Mohammed Ali Al-garadi; Nadim Rana; Amina Nuhu Muhammad; Adamu Abubakar; Khalid Haruna; Lubna A. Gabralla
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms

Journal of Reliable Intelligent Environments
2019-07-03 | Journal article
Contributors: Abdullahi Mohammed Maigida; Shafi’i Muhammad Abdulhamid; Morufu Olalere; John K. Alhassan; Haruna Chiroma; Emmanuel Gbenga Dada
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification

SN Applied Sciences
2019-05 | Journal article
Contributors: Maryam Shuaib; Shafi’i Muhammad Abdulhamid; Olawale Surajudeen Adebayo; Oluwafemi Osho; Ismaila Idris; John K. Alhassan; Nadim Rana
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A forensic evidence recovery from mobile device applications

International Journal of Digital Enterprise Technology
2018 | Journal article
Part of ISSN: 1756-2554
Contributors: John K. Alhassan; Agbejule Gbolahan; Ismaila Idris; N.A. Shafi'; i Muhammad Abdulhamid; Victor O. Waziri
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Crossref Metadata Search

Energy aware routing protocol for energy constrained mobile Ad-hoc networks

International Journal of Electrical and Computer Engineering
2018 | Journal article
EID:

2-s2.0-85051728165

Contributors: Iqbal, N.; Latiff, M.S.B.A.; Abdulhamid, S.M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm

Neural Computing and Applications
2018 | Journal article
EID:

2-s2.0-84978911323

Contributors: Abdulhamid, S.M.; Abd Latiff, M.S.; Madni, S.H.H.; Abdullahi, M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

A Cloud-based Conceptual Framework for Multi-Objective Virtual Machine Scheduling using Whale Optimization Algorithm

International Journal of Innovative Computing
2018-11 | Journal article
Part of ISSN: 2180-4370
Contributors: Nadim Rana; Muhammad Shafie Abd Latiff; Shafi'i Muhammad Abdulhamid
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Crossref Metadata Search

Comparative Analysis of Classification Algorithms for Email Spam Detection

International Journal of Computer Network and Information Security
2018-01-08 | Journal article
Part of ISSN: 2074-9090
Contributors: Shafi’i Muhammad Abdulhamid; Department of Cyber Security; Federal University of Technology; Minna; Nigeria; Maryam Shuaib; Oluwafemi Osho; Idris Ismaila; John K. Alhassan
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Crossref Metadata Search

A Review on Mobile SMS Spam Filtering Techniques

IEEE Access
2017 | Journal article
EID:

2-s2.0-85029501342

Contributors: Abdulhamid, S.M.; Abd Latiff, M.S.; Chiroma, H.; Osho, O.; Abdul-Salaam, G.; Abubakar, A.I.; Herawan, T.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Distributed Denial of Service Detection using Multi Layered Feed Forward Artificial Neural Network

International Journal of Computer Network and Information Security
2017 | Journal article
Part of ISSN: 2074-9090
Contributors: Ismaila Idris; Department of Cyber Security; Federal University of Technology; Minna; Nigeria.; Obi Blessing Fabian; Shafi’i M. Abdulhamid; Morufu Olalere; Baba Meshach
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Crossref Metadata Search

Recent advancements in resource allocation techniques for cloud computing environment: a systematic review

Cluster Computing
2017 | Journal article
EID:

2-s2.0-85001544905

Contributors: Madni, S.H.H.; Latiff, M.S.A.; Coulibaly, Y.; Abdulhamid, S.M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

Secure e-examination systems compared: Case studies from two countries

Journal of Information Technology Education: Innovations in Practice
2017 | Journal article
EID:

2-s2.0-85026199421

Contributors: Fluck, A.; Adebayo, O.S.; Abdulhamid, S.M.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier

A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness

Applied Soft Computing
2017-08 | Journal article
Contributors: Shafi’i Muhammad Abdulhamid; Muhammad Shafie Abd Latiff
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment

PLOS ONE
2017-05-03 | Journal article
Contributors: Syed Hamid Hussain Madni; Kim-Kwang Raymond Choo; Muhammad Shafie Abd Latiff; Mohammed Abdullahi; Shafi’i Muhammad Abdulhamid; Mohammed Joda Usman
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Optimal Resource Scheduling for IaaS Cloud Computing using Cuckoo Search Algorithm

Sains Humanika
2017-01 | Journal article
Part of ISSN: 2289-6996
Contributors: Syed Hamid Hussain Madni; Muhammad Shafie Abd Latiff; Shafi’i Muhammad Abdulhamid
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Crossref Metadata Search

A support vector machine classification of computational capabilities of 3D map on mobile device for navigation aid

International Journal of Interactive Mobile Technologies
2016 | Journal article
EID:

2-s2.0-84982182560

Contributors: Abubakar, A.; Mantoro, T.; Moedjiono, S.; Ayu, M.A.; Chiroma, H.; Waqas, A.; Abdulhamid, S.M.; Hamza, M.F.; Gital, A.Y.
Source: Self-asserted source
Shafi'i Muhammad ABDULHAMID via Scopus - Elsevier
Items per page:
Page 1 of 2

Peer review (1 review for 1 publication/grant)

Review activity for Engineering applications of artificial intelligence. (1)