Showing results 594 to 613 of 719
< previous
next >
Issue Date | Title | Author(s) |
2009 | A routing protocol based on trusted and shortest path selection for mobile ad hoc network | Jassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. |
2018 | Seawater intrusion mapping using electrical resistivity imaging (eri) at malaysian coastal area | Hazreek, Z.A.M. ; Hashim, M.M.M. ; Asmawisham, A.M.N. ; Hafiz, Z.M. ; Fairus, Y.M. ; Fahmy, K.A. ; Ashraf, M.I.M. ; Rosli, S. ; Nordiana, M.M. |
2018 | Security Enhancement during Agents Communication in GNA Approach | Mohammed, K.A. ; Majid, M.A. ; Ahmad, M.S. |
2008 | Security enhancement of digital motion image transmission using hybrid AES-DES algorithm | Vishnu, M.B. ; Tiong, S.K. ; Zaini, M. ; Koh, S.P. |
2019 | Security factors based evaluation of verification algorithm for an IoT access system | Al-Ghaili, A.M. ; Kasim, H. ; Othman, M. ; Hassan, Z. |
2016 | Selected papers from 6th annual conference of energy economics and management | Bing Wang and Ning Zhang editors |
2019 | Self-reflective visualizations of patient-centered health information systems | Visvalingam, A. ; Dhillon, J.S. ; Gunasekaran, S.S. ; Hoe, A.C.K. |
2012 | The semantics of norms mining in multi-agent systems | Mahmoud, M.A. ; Ahmad, M.S. ; Ahmad, A. ; Yusoff, M.Z.M. ; Mustapha, A. |
2019 | SERVICE FREQUENCY and SERVICE HOURS EVALUATION for BUS SERVICE in WEST KLANG VALLEY | Norhisham, S. ; Fadhlullah Abu Bakar, M. ; Hazwani Abd Samad, Z. ; Syamsir, A. ; Zaini, N. ; Yati Katman, H. ; Zakwan Ramli, M. |
2009 | The setup of national IP Multimedia Subsystem (IMS) testbed - Approach and challenges | Choong, K.N. ; Abbas, M. ; Mohd Said, O. ; Lee, C.S. ; Mohamed, R.R. |
2009 | Shape-based sorting of agricultural produce using support vector machines in a MATLAB/SIMULINK environment | Kyaw, M.M. ; Ahmed, S.K. ; Md Sharrif, Z.A. |
2019 | Shifting Dataset to Preserve Data Privacy | Pozi, M.S.M. ; Bakar, A.A. ; Ismail, R. ; Yussof, S. ; Rahim, F.A. ; Ramli, R. |
2019 | Shoulder surf resistant screen locking for smartphones: A review of fifty non-biometric methods | Aris, H. ; Yaakob, W.F. |
2011 | Signal analysis to detect water tree location in polymeric underground cables | Kuan, T.M. ; Mohd Ariffin, A. ; Sulaiman, S. |
2019 | Similarity Search Techniques in Exploratory Search: A Review | Mahdi, M. ; Ahmad, A.R. ; Ismail, R. |
2007 | Simulated electromagnetic field profile inside and outside XLPE power cable due to partial discharge | Ghani, A.B.A. ; Shafi, H. ; Chakrabarty, C.K. |
2018 | Simulation analysis on CIGS solar cell on different absorber layer thickness subject to temperature change using SCAPS 1-D software | Harif, M.N. ; Abdullah, S.F. ; Mahmood Zuhdi, A.W. ; Za'Abar, F. ; Bahrudin, M.S. ; Hasani, A.H. |
2019 | Simulation and Optimization of Emitter Thickness for Indium Arsenide-Based Thermophotovoltaic Cell | Wong, B.W.A. ; Gamel, M.M.A. ; Lee, H.J. ; Rashid, W.E. ; Yao, L.K. ; Jern, K.P. |
2019 | Simulation of alkali-silica reaction model in a concrete gravity dam at the macroscale and mesoscale | Itam, Z. ; Beddu, S. ; Mohammad, D. ; Kamal, N.L.M. ; Razak, N.A. ; Hamid, Z.A.A. |
2008 | Simulation study of UWB interference effects on GSM 900 system | Abdullah, A. ; Ahmad, A. ; Sauti, M.S. ; Erana, Y. ; Shaaya, S.A. ; Mustafa, I.S. |