Showing results 27 to 46 of 68
< previous
next >
Issue Date | Title | Author(s) |
2015 | Financial impacts of smart meter security and privacy breach | Yussof, S. ; Rusli, M.E. ; Yusoff, Y. ; Ismail, R. ; Ghapar, A.A. |
2007 | Finding multi-constrained path using genetic algorithm | Yussof, S. ; See, O.H. |
2007 | Finding multi-constrained path using genetic algorithm | Yussof, S. ; See, O.H. |
2011 | Finding the optimum level of wavelet decomposition for reducing noise in wireless communication | Omar, S.F. ; Yussof, S. ; Islam, T. |
2014 | Gender recognition on real world faces based on shape representation and neural network | Arigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Iranmanesh, V. ; Malallah, F.L. |
2015 | Green cloud platform for flood early detection warning system in smart city | Yusoff, A. ; Mustafa, I.S. ; Yussof, S. ; Din, N.M. |
2015 | Green cloud platform for flood early detection warning system in smart city | Yusoff, A. ; Mustafa, I.S. ; Yussof, S. ; Din, N.M. |
2015 | Green cloud platform for flood early detection warning system in smart city | Yusoff, A. ; Mustafa, I.S. ; Yussof, S. ; Din, N.M. |
2015 | Integration of multiple soft biometrics for human identification | Arigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. |
2011 | An investigation of using parallel genetic algorithm for solving the shortest path routing problem | Yussof, S. ; Razali, R.A. ; See, O.H. |
2009 | Link utilization of GA-based QoS routing algorithm | Yussof, S. ; See, O.H. |
2009 | Link utilization of GA-based QoS routing algorithm | Yussof, S. ; See, O.H. |
2009 | Measurement program: Investigation on cache-timing attack | Khalid, Y. ; Dippel, U. ; Yussof, S. |
2012 | MIH: State of art and a proposed future direction in the heterogeneous wireless networks | Salih, Y.K. ; See, O.H. ; Yussof, S. |
2012 | MIH: State of art and a proposed future direction in the heterogeneous wireless networks | Salih, Y.K. ; See, O.H. ; Yussof, S. |
2012 | On the energy consumption in Optical Burst Switching (OBS) networks | Zaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. |
2012 | On the energy consumption in Optical Burst Switching (OBS) networks | Zaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. |
2014 | Online handwritten signature verification using neural network classifier based on principal component analysis | Iranmanesh, V. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Arigbabu, O.A. ; Malallah, F.L. |
2013 | Online signature verification using neural network and pearson correlation features | Iranmanesh, V. ; Ahmad, S.M.S. ; Wan Adnan, W.A. ; Malallah, F.L. ; Yussof, S. |
2008 | Overview of attacks on unencumbered cryptographic means and their prevention - Can the circle be squared? | Dippel, U. ; Yussof, S. |