


default search action
Normalia Samian
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j13]Omar Imhemed Alramli, Zurina Mohd Hanapi
, Mohamed Othman
, Normalia Samian
, Idawaty Ahmad:
MSS-TCP: A congestion control algorithm for boosting TCP performance in mmwave cellular networks. ICT Express 11(4): 631-635 (2025)
[j12]Congcong Sun
, Azizol Abdullah
, Normalia Samian
, Nuur Alifah Roslan:
Frame-Wise Steganalysis Based on Mask-Gating Attention and Deep Residual Bilinear Interaction Mechanisms for Low-Bit-Rate Speech Streams. J. Cybersecur. Priv. 5(3): 54 (2025)
[j11]Mohamed Aly Bouke
, Azizol Abdullah, Nur Izura Udzir, Normalia Samian:
Central Tendency Feature Selection (CTFS): a novel approach for efficient and effective feature selection in intrusion detection systems. Multim. Tools Appl. 84(34): 42627-42648 (2025)
[j10]Omar Imhemed Alramli, Zurina Mohd Hanapi
, Mohamed Othman
, Idawaty Ahmad, Normalia Samian:
An adaptive congestion control algorithm for improving Transmission Control Protocol performance over cellular-to-cloud networks. PeerJ Comput. Sci. 11: e2956 (2025)
[i3]Mohamed Aly Bouke, Omar Imhemed Alramli, Azizol Abdullah, Nur Izura Udzir, Normalia Samian, Mohamed Othman, Zurina Mohd Hanapi:
Entropy Mixing Networks: Enhancing Pseudo-Random Number Generators with Lightweight Dynamic Entropy Injection. CoRR abs/2501.08031 (2025)
[i2]Xiaohan Hu, Jyoti Sahni
, Colin R. Simpson
, Normalia Samian, Winston K. G. Seah:
Efficient patient-centric EMR sharing block tree. CoRR abs/2504.20544 (2025)- 2024
[j9]Ghaihab Hassan Adday
, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain
, Normalia Samian:
Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive Survey. IEEE Access 12: 22938-22977 (2024)
[j8]Omar Imhemed Alramli
, Zurina Mohd Hanapi, Mohamed Othman, Idawaty Ahmad, Normalia Samian:
RTTV-TCP: Adaptive congestion control algorithm based on RTT variations for mmWave networks. Ad Hoc Networks 164: 103611 (2024)
[c9]Guixia Xiao, Normalia Binti Samian, Winston K. G. Seah, Mohd Izuan Hafez Ninggal, Masnida Hussin, Jyoti Sahni
:
Correlation and Workload-Based Transaction Allocation Algorithm for Blockchain Sharding. ISPA 2024: 1968-1973
[i1]Zezheng Qin, Congcong Sun, Taiyi He
, Yuke He, Azizol Abdullah, Normalia Samian, Nuur Alifah Roslan:
ADLM - stega: A Universal Adaptive Token Selection Algorithm for Improving Steganographic Text Quality via Information Entropy. CoRR abs/2410.20825 (2024)- 2023
[j7]Amirah Alomari
, Shamala K. Subramaniam, Normalia Samian, Rohaya Latip
, Zuriati Ahmad Zukarnain
:
Dual-Phase Resource Allocation Algorithm in Software-Defined Network SDN-Enabled Cloud. IEEE Access 11: 102301-102315 (2023)
[j6]Ghaihab Hassan Adday
, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain
, Normalia Samian:
Friendship Degree and Tenth Man Strategy: A New Method for Differentiating Between Erroneous Readings and True Events in Wireless Sensor Networks. IEEE Access 11: 127651-127668 (2023)
[c8]Chung Yup Kim, Bryan C. K. Ng, Jyoti Sahni
, Normalia Samian, Winston K. G. Seah:
Blockchain Network Platform for IoT Data Integrity and Scalability. QRS 2023: 162-171- 2022
[j5]Ghaihab Hassan Adday
, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain
, Normalia Samian:
Fault Tolerance Structures in Wireless Sensor Networks (WSNs): Survey, Classification, and Future Directions. Sensors 22(16): 6041 (2022)- 2021
[j4]Amirah Alomari
, Shamala K. Subramaniam, Normalia Samian, Rohaya Latip, Zuriati Zukarnain:
Resource Management in SDN-Based Cloud and SDN-Based Fog Computing: Taxonomy Study. Symmetry 13(5): 734 (2021)
[c7]Nurul Amelina Nasharuddin, Nurfadhlina Mohd Sharef, Evi Indriasari Mansor, Normalia Samian, Masrah Azrifah Azmi Murad
, Mohd Khaizer Omar
, Noreen Izza Arshad, Faaizah Shahbodin, Mohammad Hamiruce Marhaban:
Designing an Educational Chatbot: A Case Study of CikguAIBot. CAMP 2021: 19-24
2010 – 2019
- 2017
[c6]Normalia Samian, Winston K. G. Seah
:
Trust-based Scheme for Cheating and Collusion Detection in Wireless Multihop Networks. MobiQuitous 2017: 205-214- 2016
[c5]Normalia Samian, Winston K. G. Seah
, Zuriati Ahmad Zukarnain
, Azizol Abdullah
, Zurina Mohd Hanapi
:
Recharge-as-Reward Mechanism to Incentivize Cooperative Nodes in Mobile Ad Hoc Networks. LCN 2016: 535-538- 2015
[j3]Normalia Samian
, Zuriati Ahmad Zukarnain
, Winston Khoon Guan Seah
, Azizol Abdullah
, Zurina Mohd Hanapi
:
Cooperation stimulation mechanisms for wireless multihop networks: A survey. J. Netw. Comput. Appl. 54: 88-106 (2015)
[c4]Normalia Samian, Zuriati Ahmad Zukarnain
, Azizol Abdullah
, Zurina Mohd Hanapi
:
Compare and measure selfishness detection (CMSD) mechanism: Promptness and accuracy. ICUFN 2015: 851-856- 2014
[j2]Tameem Eissa
, Shukor Abd Razak
, Rashid Hafeez Khokhar, Normalia Samian:
Erratum to: Trust-Based Routing Mechanism in MANET: Design and Implementation. Mob. Networks Appl. 19(5): 682 (2014)- 2013
[j1]Tameem Eissa
, Shukor Abd Razak
, Rashid Hafeez Khokhar, Normalia Samian
:
Trust-Based Routing Mechanism in MANET: Design and Implementation. Mob. Networks Appl. 18(5): 666-677 (2013)
[c3]Normalia Samian
, Winston Khoon Guan Seah
, Gang Chen:
Quantifying selfishness and fairness in wireless multihop networks. LCN 2013: 459-467
2000 – 2009
- 2008
[c2]Shukor Abd Razak
, Normalia Samian
, Mohd Aizaini Maarof:
A Friend Mechanism for Mobile Ad Hoc Networks. IAS 2008: 243-248
[c1]Normalia Samian
, Mohd Aizaini Maarof, Shukor Abd Razak
:
Towards Identifying Features of Trust in Mobile Ad Hoc Network. Asia International Conference on Modelling and Simulation 2008: 271-276
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-22 05:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







