default search action
Oluwatosin Ahmed Amodu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Oluwatosin Ahmed Amodu, Chedia Jarray, Raja Azlina Raja Mahmood, Huda Althumali, Umar Ali Bukar, Rosdiadee Nordin, Nor Fadzilah Abdullah, Nguyen Cong Luong:
Deep Reinforcement Learning for AoI Minimization in UAV-Aided Data Collection for WSN and IoT Applications: A Survey. IEEE Access 12: 108000-108040 (2024) - [j19]Mohd Hirzi Adnan, Zuriati Ahmad Zukarnain, Oluwatosin Ahmed Amodu:
Fundamental design aspects of UAV-enabled MEC systems: A review on models, challenges, and future opportunities. Comput. Sci. Rev. 51: 100615 (2024) - [j18]Umar Ali Bukar, Md Shohel Sayeed, Siti Fatimah Abdul Razak, Sumendra Yogarayan, Oluwatosin Ahmed Amodu:
An integrative decision-making framework to guide policies on regulating ChatGPT usage. PeerJ Comput. Sci. 10: e1845 (2024) - [j17]Umar Ali Bukar, Md Shohel Sayeed, Siti Fatimah Abdul Razak, Sumendra Yogarayan, Oluwatosin Ahmed Amodu, Raja Azlina Raja Mahmood:
Text Analysis on Early Reactions to ChatGPT as a Tool for Academic Progress or Exploitation. SN Comput. Sci. 5(4): 366 (2024) - 2023
- [j16]Zuriati Ahmad Zukarnain, Oluwatosin Ahmed Amodu, Cui Wenting, Umar Ali Bukar:
A Survey of Sybil Attack Countermeasures in Underwater Sensor and Acoustic Networks. IEEE Access 11: 64518-64543 (2023) - [j15]Oluwatosin Ahmed Amodu, Chedia Jarray, Sherif Adeshina Busari, Mohamed Othman:
THz-enabled UAV communications: Motivations, results, applications, challenges, and future considerations. Ad Hoc Networks 140: 103073 (2023) - [j14]Umar Ali Bukar, Md Shohel Sayeed, Siti Fatimah Abdul Razak, Sumendra Yogarayan, Oluwatosin Ahmed Amodu:
An exploratory bibliometric analysis of the literature on the age of information-aware unmanned aerial vehicles aided communication. Informatica (Slovenia) 47(6) (2023) - [j13]Oluwatosin Ahmed Amodu, Umar Ali Bukar, Raja Azlina Raja Mahmood, Chedia Jarray, Mohamed Othman:
Age of Information minimization in UAV-aided data collection for WSN and IoT applications: A systematic review. J. Netw. Comput. Appl. 216: 103652 (2023) - 2022
- [j12]Oluwatosin Ahmed Amodu, Sherif Adeshina Busari, Mohamed Othman:
Physical layer aspects of terahertz-enabled UAV communications: Challenges and opportunities. Veh. Commun. 38: 100540 (2022) - 2021
- [j11]Oluwatosin Ahmed Amodu, Mohamed Othman, Nor Kamariah Noordin, Idawaty Ahmad:
Outage Minimization of Energy Harvesting-Based Relay-Assisted Random Underlay Cognitive Radio Networks With Interference Cancellation. IEEE Access 9: 109432-109446 (2021) - [j10]Oluwatosin Ahmed Amodu, Mohamed Othman, Nor Kamariah Noordin, Idawaty Ahmad:
Transmission capacity analysis of relay-assisted D2D cellular networks with interference cancellation. Ad Hoc Networks 117: 102400 (2021) - [j9]Oluwatosin Ahmed Amodu, Mohamed Othman, Nor Kamariah Noordin, Idawaty Ahmad:
Outage Analysis of Energy-Harvesting-Based Relay-Assisted Random Underlay Cognitive Radio Networks With Multihop Primary Transmissions. IEEE Syst. J. 15(3): 3871-3880 (2021) - [j8]Oluwatosin Ahmed Amodu, Mohamed Othman, Nur Arzilawati Md Yunus, Zurina Mohd Hanapi:
A Primer on Design Aspects and Recent Advances in Shuffle Exchange Multistage Interconnection Networks. Symmetry 13(3): 378 (2021)
2010 – 2019
- 2019
- [j7]Oluwatosin Ahmed Amodu, Mohamed Othman, Nor Kamariah Noordin, Idawaty Ahmad:
Relay-Assisted D2D Underlay Cellular Network Analysis Using Stochastic Geometry: Overview and Future Directions. IEEE Access 7: 115023-115051 (2019) - [j6]Oluwatosin Ahmed Amodu, Mohamed Othman, Nor Kamariah Noordin, Idawaty Ahmad:
A primer on design aspects, recent advances, and challenges in cellular device-to-device communication. Ad Hoc Networks 94 (2019) - [j5]Oluwatosin Ahmed Amodu, Mohamed Othman, Nor Kamariah Noordin, Idawaty Ahmad:
Transmission capacity analysis of relay-assisted D2D cellular networks with M2M coexistence. Comput. Networks 164 (2019) - 2018
- [j4]Oluwatosin Ahmed Amodu, Mohamed Othman:
Machine-to-Machine Communication: An Overview of Opportunities. Comput. Networks 145: 255-276 (2018) - [j3]Oluwatosin Ahmed Amodu, Mohamed Othman:
A survey of hybrid MAC protocols for machine-to-machine communications. Telecommun. Syst. 69(1): 141-165 (2018) - [j2]Oluwatosin Ahmed Amodu, Raja Azlina Raja Mahmood:
Impact of the energy-based and location-based LEACH secondary cluster aggregation on WSN lifetime. Wirel. Networks 24(5): 1379-1402 (2018) - [j1]Oluwatosin Ahmed Amodu, Raja Azlina Raja Mahmood:
Erratum to: Impact of the energy-based and location-based LEACH secondary cluster aggregation on WSN lifetime. Wirel. Networks 24(5): 1403 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint