Items where Author is "Rahim, L.B.A."

Group by: Item Type | No Grouping
Number of items: 16.

Article

Bhattacharjee, S. and Chakkaravarhty, D.M. and Chakkaravarty, M. and Rahim, L.B.A. and Ramadhani, A.W. (2021) A GPU Unified Platform to Secure Big Data Transportation Using an Error-Prone Elliptic Curve Cryptography. Advances in Intelligent Systems and Computing, 1174. pp. 263-280.

Bhattacharjee, S. and Midhun Chakkaravarthy, D. and Chakkaravarthy, Midhun and Rahim, L.B.A. (2020) An Integrated Technique to Ensure Confidentiality and Integrity in Data Transmission Through the Strongest and Authentic Hotspot Selection Mechanism. Advances in Intelligent Systems and Computing, 1016. pp. 459-474.

Bhattacharjee, S. and Rahim, L.B.A. and Ramadhani, A.W. and Midhunchakkravarthy and Midhunchakkravarthy, D. (2020) A Study on Seismic Big Data Handling at Seismic Exploration Industry. Lecture Notes in Networks and Systems, 118. pp. 421-429.

Bhattacharjee, S. and Rahim, L.B.A. and Watada, J. and Roy, A. (2020) Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission. IEEE Access, 8. pp. 45477-45495.

Hafeez, S. and Arshad, N.I. and Rahim, L.B.A. and Ariffin, M.M. and Ariff, M.I.M. and Shabbir, M.F. (2020) The role of ICT ecosystem for sustainable innovation: Evidence from the gaming industry of China. International Journal of Innovation, Creativity and Change, 13 (5). pp. 293-306.

Aslam, M. and Rahim, L.B.A. and Watada, J. and Hashmani, M. (2018) Clustering-based cloud migration strategies. Journal of Advanced Computational Intelligence and Intelligent Informatics, 22 (3). pp. 295-305.

Aslam, M. and Rahim, L.B.A. and Watada, J. and Hashmani, M. (2018) Clustering-based cloud migration strategies. Journal of Advanced Computational Intelligence and Intelligent Informatics, 22 (3). pp. 295-305.

Bhattacharjee, S. and Rahim, L.B.A. and Aziz, I.B.A. (2015) Enhancement of confidentiality and integrity during big data transmission using a hybrid technique. ARPN Journal of Engineering and Applied Sciences, 10 (23). pp. 18029-18038.

Besrour, S. and Rahim, L.B.A. and Dominic, P.D.D. (2015) Exploratory study to assess and evaluate requirement specification techniques using analysis determination requirements framework. Research Journal of Applied Sciences, Engineering and Technology, 9 (3). pp. 165-171.

Besrour, S. and Rahim, L.B.A. and Dominic, P.D.D. (2014) The study of available techniques for existing requirements engineering challenges based on literature review evidences. Research Journal of Applied Sciences, Engineering and Technology, 8 (19). pp. 2082-2091.

Conference or Workshop Item

Bhattacharjee, S. and Rahim, L.B.A. and Aziz, I.B.A. (2016) Hiding of compressed bit stream into audio file to enhance the confidentiality and portability of a data transmission system. In: UNSPECIFIED.

Besrour, S. and Rahim, L.B.A. and Dominic, P.D.D. (2016) Investigating requirement engineering techniques in the context of small and medium software enterprises. In: UNSPECIFIED.

Besrour, S. and Rahim, L.B.A. and Dominic, P.D.D. (2016) A quantitative study to identify critical requirement engineering challenges in the context of small and medium software enterprise. In: UNSPECIFIED.

Bhattacharjee, S. and Rahim, L.B.A. and Aziz, I.B.A. (2016) A security scheme to minimize information loss during big data transmission over the internet. In: UNSPECIFIED.

Besrour, S. and Rahim, L.B.A. and Dominic, P.D.D. (2014) Assessment and evaluation of requirements elicitation techniques using analysis determination requirements framework. In: UNSPECIFIED.

Bhattacharjee, S. and Rahim, L.B.A. and Aziz, I.B.A. (2014) A multibit burst error detection and correction mechanism for application layer. In: UNSPECIFIED.

This list was generated on Sun May 5 02:18:20 2024 +08.