Остановите войну!
for scientists:
default search action
Miss Laiha Mat Kiah
- > Home > Persons > Miss Laiha Mat Kiah
Publications
- 2016
- [j33]Mahmoud Reza Saybani, Shahaboddin Shamshirband, Shahram Golzari, Teh Ying Wah, Saeed Aghabozorgi, Miss Laiha Mat Kiah, Valentina Emilia Balas:
RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system. Medical Biol. Eng. Comput. 54(2-3): 385-399 (2016) - 2015
- [j30]Torki A. Altameem, Vlastimir Nikolic, Shahaboddin Shamshirband, Dalibor Petkovic, Hossein Javidnia, Miss Laiha Mat Kiah, Abdullah Gani:
Potential of support vector regression for optimization of lens system. Comput. Aided Des. 62: 57-63 (2015) - [j29]Mahnaz Kazemipoor, Majid Hajifaraji, Che wan Jasimah Bt wan Mohamed Radzi, Shahaboddin Shamshirband, Dalibor Petkovic, Miss Laiha Mat Kiah:
Appraisal of adaptive neuro-fuzzy computing technique for estimating anti-obesity properties of a medicinal plant. Comput. Methods Programs Biomed. 118(1): 69-76 (2015) - [j27]Babak Daghighi, Miss Laiha Mat Kiah, Shahaboddin Shamshirband, Salman Iqbal, Parvaneh Asghari:
Key management paradigm for mobile secure group communications: Issues, solutions, and challenges. Comput. Commun. 72: 1-16 (2015) - [j25]Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Shahaboddin Shamshirband, Atta ur Rehman Khan:
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. J. Grid Comput. 13(4): 651-675 (2015) - [j22]Shahaboddin Shamshirband, Babak Daghighi, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ahmed Patel, Ajith Abraham:
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network. J. Intell. Fuzzy Syst. 28(3): 1345-1357 (2015) - [j18]Babak Daghighi, Miss Laiha Mat Kiah, Shahaboddin Shamshirband, Muhammad Habib Ur Rehman:
Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges. J. Netw. Comput. Appl. 50: 1-14 (2015) - [j17]Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah, Shahaboddin Shamshirband, Steven Furnell:
A systematic review of approaches to assessing cybersecurity awareness. Kybernetes 44(4): 606-622 (2015) - [j16]Shahaboddin Shamshirband, Milan Gocic, Dalibor Petkovic, Hadi Saboohi, Tutut Herawan, Miss Laiha Mat Kiah, Shatirah Akib:
Soft-Computing Methodologies for Precipitation Estimation: A Case Study. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 8(3): 1353-1358 (2015) - 2014
- [j15]Dalibor Petkovic, Shahaboddin Shamshirband, Javed Iqbal, Nor Badrul Anuar, Nenad D. Pavlovic, Miss Laiha Mat Kiah:
Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper. Appl. Soft Comput. 22: 424-431 (2014) - [j13]Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ajith Abraham:
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng. Appl. Artif. Intell. 32: 228-241 (2014) - [j12]Afshin Jahangirzadeh, Shahaboddin Shamshirband, Saeed Aghabozorgi, Shatirah Akib, Hossein Basser, Nor Badrul Anuar, Miss Laiha Mat Kiah:
A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier. Neurocomputing 140: 172-184 (2014) - [j8]Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petkovic, Sanjay Misra, Abdul Nasir Khan:
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J. Netw. Comput. Appl. 42: 102-117 (2014) - [j7]Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Mazhar Ali, Atta ur Rehman Khan, Shahaboddin Shamshirband:
Incremental proxy re-encryption scheme for mobile cloud computing environment. J. Supercomput. 68(2): 624-651 (2014) - [j6]Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad Ahmad Madani, Atta ur Rehman Khan, Shahaboddin Shamshirband:
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment. J. Supercomput. 70(2): 946-976 (2014) - 2013
- [j5]Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ahmed Patel:
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng. Appl. Artif. Intell. 26(9): 2105-2127 (2013) - [c3]Ali Feizollah, Shahaboddin Shamshirband, Nor Badrul Anuar, Rosli Salleh, Miss Laiha Mat Kiah:
Anomaly Detection Using Cooperative Fuzzy Logic Controller. FIRA 2013: 220-231
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint