Browsing by Author Yussof, S.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 35 to 54 of 68 < previous   next >
Issue DateTitleAuthor(s)
2015Integration of multiple soft biometrics for human identificationArigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. 
2011An investigation of using parallel genetic algorithm for solving the shortest path routing problemYussof, S. ; Razali, R.A. ; See, O.H. 
2009Link utilization of GA-based QoS routing algorithmYussof, S. ; See, O.H. 
2009Link utilization of GA-based QoS routing algorithmYussof, S. ; See, O.H. 
2009Measurement program: Investigation on cache-timing attackKhalid, Y. ; Dippel, U. ; Yussof, S. 
2012MIH: State of art and a proposed future direction in the heterogeneous wireless networksSalih, Y.K. ; See, O.H. ; Yussof, S. 
2012MIH: State of art and a proposed future direction in the heterogeneous wireless networksSalih, Y.K. ; See, O.H. ; Yussof, S. 
2012On the energy consumption in Optical Burst Switching (OBS) networksZaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. 
2012On the energy consumption in Optical Burst Switching (OBS) networksZaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. 
2014Online handwritten signature verification using neural network classifier based on principal component analysisIranmanesh, V. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Arigbabu, O.A. ; Malallah, F.L. 
2013Online signature verification using neural network and pearson correlation featuresIranmanesh, V. ; Ahmad, S.M.S. ; Wan Adnan, W.A. ; Malallah, F.L. ; Yussof, S. 
2008Overview of attacks on unencumbered cryptographic means and their prevention - Can the circle be squared?Dippel, U. ; Yussof, S. 
2014An overview of intelligent selection and prediction method in heterogeneous wireless networksSalih, Y.K. ; See, O.H. ; Ibrahim, R.W. ; Yussof, S. ; Iqbal, A. 
2011Path selection technique for highly transmission ratio and reliable routing in ManetJassim, H.S. ; Yussof, S. ; Tiong, S.K. ; Chong, K.H. ; Koh, S.P. 
2011Path selection technique for highly transmission ratio and reliable routing in ManetJassim, H.S. ; Yussof, S. ; Tiong, S.K. ; Chong, K.H. ; Koh, S.P. 
2011Performance analysis of genetic algorithm (GA)-based multi-constrained path routing algorithmYussof, S. 
2005QoS routing for multiple additive QoS parameters using genetic algorithmYussof, S. ; See, O.H. 
2005QoS routing for multiple additive QoS parameters using genetic algorithmYussof, S. ; See, O.H. 
2015Recent advances in facial soft biometricsArigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. 
2015A review of security attacks on IEC61850 substation automation system networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R.