default search action
Anang Hudaya Muhamad Amin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c25]Fred N. Kiwanuka, Louay Karadsheh, Ja'far Alqatawna, Anang Hudaya Muhamad Amin:
Modeling Employee Flexible Work Scheduling As A Classification Problem. KES 2021: 3281-3290 - [c24]Fred N. Kiwanuka, Omar Eltaher Abuelmaatti, Anang Hudaya Muhamad Amin, Brian J. Mukwaya:
Tropical Skin Disease Classification using Connected Attribute Filters. VISIGRAPP (5: VISAPP) 2021: 338-345 - 2020
- [c23]Anang Hudaya Muhamad Amin, Nabih Abdelmajid, Fred N. Kiwanuka:
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network. SDS 2020: 171-176
2010 – 2019
- 2019
- [c22]Anang Hudaya Muhamad Amin, Ja'far Alqatawna, Sujni Paul, Fred N. Kiwanuka, Imtiaz Ahmad Akhtar:
Improving Event Monitoring in IoT Network Using an Integrated Blockchain-Distributed Pattern Recognition Scheme. BLOCKCHAIN 2019: 134-144 - [c21]Fred N. Kiwanuka, Ja'far Alqatawna, Anang Hudaya Muhamad Amin, Sujni Paul, Hossam Faris:
Towards Automated Comprehensive Feature Engineering for Spam Detection. ICISSP 2019: 429-437 - 2018
- [c20]Afizan Azman, Sumendra Yogarayan, Samuel Leong Wei Jian, Siti Fatimah Abdul Razak, Kirbana Jai Raman, Mohd Fikri Azli Abdullah, Siti Zainab Ibrahim, Anang Hudaya Muhamad Amin, Kalaiarasi Sonai Muthu:
A Study of Wireless Communication Technologies for Vehicular Communication. ICISA 2018: 3-13 - [c19]Afizan Azman, Kirbana Jai Raman, Imran Artwel Junior Mhlanga, Siti Zainab Ibrahim, Sumendra Yogarayan, Mohd Fikri Azli Abdullah, Siti Fatimah Abdul Razak, Anang Hudaya Muhamad Amin, Kalaiarasi Sonai Muthu:
Real Time Driver Anger Detection. ICISA 2018: 157-167 - 2016
- [c18]Asmath Fahad Thaha, Anang Hudaya Muhamad Amin, Subarmaniam Kannan, Nazrul Muhaimin Ahmad:
Data location aware scheduling for virtual Hadoop cluster deployment on private cloud computing environment. APCC 2016: 103-109 - 2015
- [j5]Nazrul Muhaimin Ahmad, Anang Hudaya Muhamad Amin, Mohd Faizal Abdollah, Robiah Yusof:
An empirical investigation of RSSI-based distance estimation for wireless indoor positioning system. Int. J. Wirel. Mob. Comput. 8(2): 206-212 (2015) - 2014
- [j4]Vasaki Ponnusamy, Tang Jung Low, Anang Hudaya Muhamad Amin:
Biologically inspired mobile agent-based sensor network (BIMAS). Int. J. Mob. Commun. 12(5): 449-476 (2014) - [j3]Nazrul Muhaimin Ahmad, Anang Hudaya Muhamad Amin, Subarmaniam Kannan, Mohd Faizal Abdollah, Robiah Yusof:
Detecting Access Point Spoofing Attacks Using Partitioning-based Clustering. J. Networks 9(12): 3470-3477 (2014) - [c17]Anang Hudaya Muhamad Amin, Asad I. Khan, Benny B. Nasution:
DHGN Network with Mode-Based Receptive Fields for 2-Dimensional Binary Pattern Recognition. HAIS 2014: 415-426 - [c16]Anang Hudaya Muhamad Amin, Nazrul Muhaimin Ahmad, Md Shohel Sayeed, Asad I. Khan:
Learning above-and-below relationship for vision-based robot navigation system using Distributed Hierarchical Graph Neuron (DHGN) algorithm. ICARCV 2014: 595-600 - [c15]Nazrul Muhaimin Ahmad, Anang Hudaya Muhamad Amin, Subarmaniam Kannan, Mohd Faizal Abdollah, Robiah Yusof:
A RSSI-based rogue access point detection framework for Wi-Fi hotspots. ISTT 2014: 104-109 - [c14]Nazrul Muhaimin Ahmad, Asrul Hadi Yaacob, Anang Hudaya Muhamad Amin, Subarmaniam Kannan:
Performance analysis of MapReduce on OpenStack-based hadoop virtual cluster. ISTT 2014: 132-137 - [c13]Mohd Zulfaezal Che Azemin, Fadilah Abd Hamid, Mohd Izzuddin Bin Mohd Tamrin, Anang Hudaya Muhamad Amin:
Supervised Retinal Vessel Segmentation Based on Neural Network Using Broader Aging Dataset. IWBBIO 2014: 1235-1242 - 2013
- [j2]Shuai Li, Congduc Pham, Arunita Jaekel, Mohammad Abdul Matin, Anang Hudaya Muhamad Amin, Yangming Li:
Perception, Reaction, and Cognition in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [c12]Waleed M. Alfehaid, Asad I. Khan, Anang Hudaya Muhamad Amin:
A combined pattern recognition scheme with genetic algorithms for robot guidance using Wireless Sensor Networks. ICARCV 2012: 759-764 - 2011
- [j1]Anang Hudaya Muhamad Amin, Asad I. Khan:
Distributed Multi-Feature Recognition Scheme for Greyscale Images. Neural Process. Lett. 33(1): 45-59 (2011) - [c11]Amiza Amir, Anang Hudaya Muhamad Amin, Asad I. Khan:
Developing Machine Intelligence within P2P Networks Using a Distributed Associative Memory. Algorithmic Probability and Friends 2011: 439-443 - [c10]Anang Hudaya Muhamad Amin, Asad I. Khan:
Recognising complex patterns through a distributed multi-feature approach. HIS 2011: 400-405 - 2010
- [c9]Anang Hudaya Muhamad Amin, Asad I. Khan:
A divide-and-distribute approach to single-cycle learning HGN network for pattern recognition. ICARCV 2010: 2118-2123 - [c8]Amir H. Basirat, Anang Hudaya Muhamad Amin, Asad I. Khan:
Under the Cloud: A Novel Content Addressable Data Framework for Cloud Parallelization to Create and Virtualize New Breeds of Cloud Applications. NCA 2010: 168-173
2000 – 2009
- 2009
- [c7]Anang Hudaya Muhamad Amin, Asad I. Khan:
Collaborative-Comparison Learning for Complex Event Detection Using Distributed Hierarchical Graph Neuron (DHGN) Approach in Wireless Sensor Network. Australasian Conference on Artificial Intelligence 2009: 111-120 - [c6]Raja Azlina Raja Mahmood, Anang Hudaya Muhamad Amin, Amiza Amir, Asad I. Khan:
Lightweight and distributed attack detection scheme in mobile ad hoc networks. MoMM 2009: 162-169 - [c5]Anang Hudaya Muhamad Amin, Asad I. Khan, Raja Azlina Raja Mahmood:
A distributed event detection scheme for wireless sensor networks. MoMM 2009: 295-299 - 2008
- [c4]Anang Hudaya Muhamad Amin, Asad I. Khan:
Single-Cycle Image Recognition Using an Adaptive Granularity Associative Memory Network. Australasian Conference on Artificial Intelligence 2008: 386-392 - [c3]Anang Hudaya Muhamad Amin, Asad I. Khan:
Commodity-Grid Based Distributed Pattern Recognition Framework. AusGrid 2008: 27-34 - [c2]Anang Hudaya Muhamad Amin, Asad I. Khan:
Parallel Pattern Recognition Using a Single-Cycle Learning Approach within Wireless Sensor Networks. PDCAT 2008: 305-308 - 2007
- [c1]Asad I. Khan, Anang Hudaya Muhamad Amin:
One Shot Associative Memory Method for Distorted Pattern Recognition. Australian Conference on Artificial Intelligence 2007: 705-709
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint