Azeem Mohammed Abdul
KL University

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

VMM based Secured Virtualization in Cloud-Computing P. ILA Chandana Kumari; S. Swarajya Laxmi; B. Rekha; B. Pravallika; G. Chaitanya; Syed Umar; Azeem Mohammed Abdul
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 3: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i3.pp643-648

Abstract

Cloud computing, utility computing, the future will be the main IT field. The government and companies are realizing that foreigners can clearly increase the cloud with minimal costs and maximum flexibility in the plant or existing equipment. But the clouds to ensure user privacy and digital asset management challenge in cloud client. Protection must always contain a performance. The complex is a sure way to end the occupation of the problem, the study suggests two Ebionitism security architecture. The movement and different approaches to health and safety and the level of the best things for their security costs hyper-visor layer to a reduction in order to avoid false alarms
Designing of Medical processor unit for Intelligent network-based Medical usage P. ILA Chandana Kumari; P. Gayathri; N. Rajesh; Syed Umar; G. Chandra Sekhar; Azeem Mohammed Abdul
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 3: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i3.pp532-537

Abstract

This medical design conventions of books and deductive method (MPU). the development of research and the success of many already, we have found the cause of architecture MPU. On the unique features of the processor in question it is coded in different areas of medicine (MOPC). working from a very close bilateral processor MPU. Each issue has a special feature code for the hardware supply chain on the steps and produce a special version of the code and the victim (s). Illness, Doctor MOPC mph dismounted and made a series of sub-processes, and to launch the second law of medical devices. If the computer system of a victim and has a specific digital for logic, and victims of medical devices that operate in the blood, tissues, operating theaters, medical staff, medical costs and variables, etc. We follow the process that the patient design of medical networks and overlapping and development computer.
Notification of Data Congestion Intimation [NDCI] for IEEE 802.11 Adhoc Network with Power Save Mode Azeem Mohammed Abdul; Syed Umar
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 2: February 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i2.pp317-320

Abstract

IEEE 802.11-power save mode (PSM) independent basic service set (IBSS) Save, the time is divided into intervals of the signals. At the beginning of each interval signal and power saving alarm periodically all open windows (vocals). The station will be in competition with the rest of the frame window frame sent voice data leakage range. Element depends frame transmission IEEE CSMA / CA as defined in 802.11 DCF. A chance of transmit voice frames type of collision energy IBSS success. This article gives an analysis model with a chance of success output transmission window fixed size element. The results of the simulation analysis of the accuracy of the analysis.