Showing results 1 to 20 of 46
next >
Issue Date | Title | Author(s) |
2018 | A novel secret key generation based on image link | Sulaiman, A.H. ; Al-Shaikhli, I.F.T. ; Wahiddin, M.R. ; Houri, S. ; Jamil, N. ; Ismail, A.F. |
2018 | Adopting Centroid and Amended Trilateration for better accuracy of range-based non-GPS localization | Md Din, M. ; Jamil, N. ; Nik Ahmad Aziz, N.F. |
2018 | An improved indoor location technique using Kalman Filter | Fariz, N. ; Jamil, N. ; Din, M.M. ; Rusli, M.E. ; Sharudin, Z. ; Mohamed, M.A. |
2011 | An observation of cryptographic properties of 256 one-dimensional cellular automata rules | Jamil, N. ; Mahmood, R. ; Zába, M.R. ; Zukamaen, Z.A. ; Udzir, N.I. |
2019 | Analysis of global spatial statistics features in existing contrast image quality assessment algorithm | Ahmed, I.T. ; Der, C.S. ; Jamil, N. ; Hammad, B.T. |
2019 | Analysis of Probability Density Functions in Existing No-Reference Image Quality Assessment Algorithm for Contrast-Distorted Images | Ahmed, I.T. ; Der, C.S. ; Jamil, N. ; Hammad, B.T. |
2018 | Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant? | Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. |
2011 | Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network | Jamil, N. ; Mahmood, R. |
2018 | A Comprehensive Review of Existing Risk Assessment Models in Cloud Computing | Amini, A. ; Jamil, N. |
2016 | Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance | Isa, H. ; Jamil, N. ; Z’aba, M.R. |
2013 | Diffusion and statistical analysis of STITCH-256 | Jamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. |
2018 | Digital dissemination of information about mosque activities to communities | Asri, N.A. ; Mohamed, M.A. ; Mamat, A.R. ; Mohamad, Z. ; Amin, M.A.M. ; Nor, M.A.M. ; Jamil, N. |
2018 | Entity entity -based parameterization for distinguishing distributed denial of service from flash events | Mohamed, M.A. ; Jamil, N. ; Abidin, A.F. ; Din, M.M. ; Nik, W.N.S.W. ; Mamat, A.R. |
2017 | Faster multicollisions attack on sponge construction | Hammad, B.T. ; Jamil, N. ; Zaba, M.R. ; Rusli, M.E. ; Ahmed, I.T. |
2019 | A Framework for experience based user authentication technique for minimizing risk of brute-force attacks | Mohamad, A.I. ; Mohamed, M.A. ; Makhtar, M. ; Mamat, M. ; Jamil, N. ; Din, M.M. |
2017 | Implementation of lightweight cryptographic primitives | Hammad, B.T. ; Jamil, N. ; Rusli, M.E. ; Z’Aba, M.R. ; Ahmed, I.T. |
2015 | Implementation of PRINCE algorithm in FPGA | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. ; Tariq, B. |
2019 | Improve of contrast-distorted image quality assessment based on convolutional neural networks | Ahmed, I.T. ; Der, C.S. ; Jamil, N. ; Mohamed, M.A. |
2019 | An improved indoor location technique using combination of kalman filter and centroid positioning | Aziz, N.F.N.A. ; Jamil, N. ; Din, M.M. |
2016 | An Improved Indoor Positioning Algorithm Based on RSSI-Trilateration Technique for Internet of Things (IOT) | Rusli, M.E. ; Ali, M. ; Jamil, N. ; Din, M.M. |