Showing results 12 to 31 of 49
< previous
next >
Issue Date | Title | Author(s) |
2010 | Challenges in adopting and integrating ITIL and CMMi in ICT division of a public utility company | Abdul Latif, A. ; Md Din, M. ; Ismail, R. |
2019 | Characterization of mechanical properties on natural fibre reinforced polymer using kenaf and polyurethane | Isa, M.R. ; Suhaimi, A.B. ; Zaroog, O.S. ; Zahari, N.M. ; Sulaiman, S.N. ; Ismail, I.N. ; Mohamed, H. |
2015 | Comparing sound types for stress therapy in a virtual-reality environment | Abdul Latif, R. ; Ismail, R. |
2008 | Congestion avoidance: Network based schemes solution | Shaii, A.Q. ; Ismail, R. ; Jais, J. ; Manan, J. |
2018 | Construction and evaluation of a user interface acceptance questionnaire | Baharum, A. ; Ismail, R. ; Daruis, D.D.I. ; Fabeil, N.F. ; Bahar, I.A.A. ; Omar, M. |
2015 | Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents | Musa, N.A. ; Yusoff, M.Z.M. ; Yusoff, Y. ; Ismail, R. |
2018 | Demuse: Releasing stress using music mobile application | Baharum, A. ; Pitchay, S.A. ; Ismail, R. ; Fabeil, N.F. ; Rusli, N.M. ; Bahar, I.A.A. |
2019 | Design and development of fully automated water sprinkler system for small agriculture field | Mohanasundram, T. ; Isa, M.R. ; Ismail, I.N. ; Zahari, N.M. ; Roslan, M.E. ; Mohamed, H. ; Vicki, W.V. |
2017 | Evaluating the Localization for E-Learning Website: Case Study in Universiti Malaysia Sabah | Baharum, A. ; Ismail, R. ; Fabeil, N.F. ; Fatah, N.S.A. ; Tanalol, S.H. ; Zain, N.H.M. ; Hanapi, R. |
2015 | Financial impacts of smart meter security and privacy breach | Yussof, S. ; Rusli, M.E. ; Yusoff, Y. ; Ismail, R. ; Ghapar, A.A. |
2009 | Forming trust in mobile ad -hoc network | Abu Bakar, A. ; Ismail, R. ; Jais, J. ; Abdul Manan, J.-L. |
2009 | Group Based Access Control scheme (GBAC): Keeping information sharing secure in mobile ad-hoc environment | Bakar, A.A. ; Ismail, R. ; Ahmad, A.R. ; Manan, J.-L.A. ; Jais, J. |
2009 | Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks | Bakar, A.A. ; Ismail, R. ; Ahmad, A.R. ; Abdul Manan, J.-L. ; Jais, J. |
2019 | Headgear for weakening impact from concussion in rugby games: Design and development | Hussin, M.S.F. ; Shamsudin, M.A. ; Zakaria, A.A. ; Hassan, M.H.A. ; Yassim, H.M. ; Ismail, I.N. |
2018 | Heavy metal accumulation at the Bertam agricultural watershed in Cameron Highlands, Malaysia | Haron, S.H. ; Ismail, S. ; Sidek, L.M. |
2014 | Important features in text presentation for children with dyslexia | Ismail, R. ; Jaafar, A. |
2016 | In house calibration of pd detector system for field test result reliability | Raj, A. ; Chakrabarty, C.K. ; Ismail, R. ; Ghani, B.A. |
2013 | Information Technology program students' awareness and perceptions towards personal data protection and privacy | Chen, L.F. ; Ismail, R. |
2015 | Intelligent metadata web search engines: A brief review of literature on intelligent metadata based search engines | Mahdi, M.N. ; Ahmad, A.R. ; Ismail, R. |
2011 | Interactive screen-based design for dyslexic children | Ismail, R. ; Jaafar, A. |