Browsing by Author Jamil, N.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 46  next >
Issue DateTitleAuthor(s)
2018A novel secret key generation based on image linkSulaiman, A.H. ; Al-Shaikhli, I.F.T. ; Wahiddin, M.R. ; Houri, S. ; Jamil, N. ; Ismail, A.F. 
2010A user authentication scheme based on identity-bits commitment for wireless sensor networksJamil, N. ; Sameon, S.S. ; Mahmood, R. 
2010A user authentication scheme based on identity-bits commitment for wireless sensor networksJamil, N. ; Sameon, S.S. ; Mahmood, R. 
2018Adopting Centroid and Amended Trilateration for better accuracy of range-based non-GPS localizationMd Din, M. ; Jamil, N. ; Nik Ahmad Aziz, N.F. 
2018Adopting Centroid and Amended Trilateration for better accuracy of range-based non-GPS localizationMd Din, M. ; Jamil, N. ; Nik Ahmad Aziz, N.F. 
2018An improved indoor location technique using Kalman FilterFariz, N. ; Jamil, N. ; Din, M.M. ; Rusli, M.E. ; Sharudin, Z. ; Mohamed, M.A. 
2011An observation of cryptographic properties of 256 one-dimensional cellular automata rulesJamil, N. ; Mahmood, R. ; Zába, M.R. ; Zukamaen, Z.A. ; Udzir, N.I. 
2018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
2018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
2018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
2018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
2011Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor NetworkJamil, N. ; Mahmood, R. 
2018A Comprehensive Review of Existing Risk Assessment Models in Cloud ComputingAmini, A. ; Jamil, N. 
2016Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle DanceIsa, H. ; Jamil, N. ; Z’aba, M.R. 
2013Diffusion and statistical analysis of STITCH-256Jamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. 
2018Digital dissemination of information about mosque activities to communitiesAsri, N.A. ; Mohamed, M.A. ; Mamat, A.R. ; Mohamad, Z. ; Amin, M.A.M. ; Nor, M.A.M. ; Jamil, N. 
2018Entity entity -based parameterization for distinguishing distributed denial of service from flash eventsMohamed, M.A. ; Jamil, N. ; Abidin, A.F. ; Din, M.M. ; Nik, W.N.S.W. ; Mamat, A.R. 
2018Entity entity -based parameterization for distinguishing distributed denial of service from flash eventsMohamed, M.A. ; Jamil, N. ; Abidin, A.F. ; Din, M.M. ; Nik, W.N.S.W. ; Mamat, A.R. 
2018Entity entity -based parameterization for distinguishing distributed denial of service from flash eventsMohamed, M.A. ; Jamil, N. ; Abidin, A.F. ; Din, M.M. ; Nik, W.N.S.W. ; Mamat, A.R. 
2017Faster multicollisions attack on sponge constructionHammad, B.T. ; Jamil, N. ; Zaba, M.R. ; Rusli, M.E. ; Ahmed, I.T.