Showing results 1 to 20 of 25
next >
Issue Date | Title | Author(s) |
2018 | An improved indoor location technique using Kalman Filter | Fariz, N. ; Jamil, N. ; Din, M.M. ; Rusli, M.E. ; Sharudin, Z. ; Mohamed, M.A. |
2018 | Digital dissemination of information about mosque activities to communities | Asri, N.A. ; Mohamed, M.A. ; Mamat, A.R. ; Mohamad, Z. ; Amin, M.A.M. ; Nor, M.A.M. ; Jamil, N. |
2018 | Enhanced buffer management policy and packet prioritization for wireless sensor network | Rabileh, A.A. ; Abu Bakar, K.A. ; Dahnil, D.P. ; Mohamed, R.R. ; Mohamed, M.A. |
2018 | Enhanced buffer management policy and packet prioritization for wireless sensor network | Rabileh, A.A. ; Abu Bakar, K.A. ; Dahnil, D.P. ; Mohamed, R.R. ; Mohamed, M.A. |
2018 | Entity entity -based parameterization for distinguishing distributed denial of service from flash events | Mohamed, M.A. ; Jamil, N. ; Abidin, A.F. ; Din, M.M. ; Nik, W.N.S.W. ; Mamat, A.R. |
2018 | Evaluating the performance of three classification methods in diagnosis of parkinson’s disease | Mostafa, S.A. ; Mustapha, A. ; Khaleefah, S.H. ; Ahmad, M.S. ; Mohammed, M.A. |
2018 | Food freshness using electronic nose and its classification method: A review | Mohamed, R.R. ; Yaacob, R. ; Mohamed, M.A. ; Dir, T.A.T. ; Rahim, F.A. |
2017 | Formulating layered adjustable autonomy for unmanned aerial vehicles | Mostafa, S.A. ; Ahmad, M.S. ; Mustapha, A. ; Mohammed, M.A. |
2019 | A Framework for experience based user authentication technique for minimizing risk of brute-force attacks | Mohamad, A.I. ; Mohamed, M.A. ; Makhtar, M. ; Mamat, M. ; Jamil, N. ; Din, M.M. |
2018 | A fuzzy logic control in adjustable autonomy of a multi-agent system for an automated elderly movement monitoring application | Mostafa, S.A. ; Mustapha, A. ; Mohammed, M.A. ; Ahmad, M.S. ; Mahmoud, M.A. |
2019 | Hazardous gas detection using gas sensors arrays and fuzzy-based classification | Mohamed, R.R. ; Mohamed, M.A. ; Hashim, W. ; Rahim, A. ; Fuad, M.S. |
2019 | Improve of contrast-distorted image quality assessment based on convolutional neural networks | Ahmed, I.T. ; Der, C.S. ; Jamil, N. ; Mohamed, M.A. |
2018 | Indoor positioning: Technology comparison analysis | Din, M.M. ; Jamil, N. ; Maniam, J. ; Mohamed, M.A. |
2017 | A pattern-based password authentication scheme for minimizing shoulder surfing attack | Awang, M.I. ; Mohamed, M.A. ; Mohamed, R.R. ; Ahmad, A. ; Rawi, N.A. |
2019 | Performance comparison of some addition chain methods based on integer family | Kadir, M.F.A. ; Mohamed, M.A. ; Mohamad, R. ; Mamat, M. ; Muhammed, A. |
2018 | Photon: A new mix columns architecture on FPGA | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Mohamed, M.A. |
2011 | Quality and first flush analysis of stormwater runoff from a tropical commercial catchment | Chow, M.F. ; Yusop, Z. ; Mohamed, M. |
2018 | Recent advances in energy efficient-QoS aware MAC protocols for wireless sensor networks | Muzakkari, B.A. ; Mohamed, M.A. ; Abdul Kadir, M.F. ; Mohamad, Z. ; Jamil, N. |
2018 | Recent advances of data compression in Wireless Sensor Network | Tuama, A.Y. ; Mohamed, M.A. ; Muhammed, A. ; Hanapi, Z.M. ; Mohamed, R.R. ; Abu Bakar, K.A. |
Oct-2019 | A review of fog computing and machine learning: Concepts, applications, challenges, and open issues | Abdulkareem, K.H. ; Mohammed, M.A. ; Gunasekaran, S.S. ; Al-Mhiqani, M.N. ; Mutlag, A.A. ; Mostafa, S.A. ; Ali, N.S. ; Ibrahim, D.A. |