Collection's Items (Sorted by Submit Date in Descending order): 161 to 180 of 651
Issue Date | Title | Author(s) |
2016 | Trust system architecture for securing GOOSE communication in IEC 61850 substation network | Rashid, M.T.A. ; Yussof, S. ; Yusoff, Y. |
2016 | Improvement keys of advanced encryption standard (AES) Rijndael_M | Shakir, M. ; Bit Abubakar, A. ; Bin Yousoff, Y. ; Sheker, M. |
2005 | Algorithm for robot writing using character segmentation | Yussof, S. ; Anuar, A. ; Fernandez, K. |
2005 | QoS routing for multiple additive QoS parameters using genetic algorithm | Yussof, S. ; See, O.H. |
2007 | Finding multi-constrained path using genetic algorithm | Yussof, S. ; See, O.H. |
2008 | Overview of attacks on unencumbered cryptographic means and their prevention - Can the circle be squared? | Dippel, U. ; Yussof, S. |
2008 | The effect of GA parameters on the performance of GA-based QoS routing algorithm | Yussof, S. ; See, O.H. |
2009 | A routing protocol based on trusted and shortest path selection for mobile ad hoc network | Jassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. |
2009 | Link utilization of GA-based QoS routing algorithm | Yussof, S. ; See, O.H. |
2009 | Measurement program: Investigation on cache-timing attack | Khalid, Y. ; Dippel, U. ; Yussof, S. |
2010 | A robust GA-based QoS routing algorithm for solving multi-constrained path problem | Yussof, S. ; See, O.H. |
2012 | MIH: State of art and a proposed future direction in the heterogeneous wireless networks | Salih, Y.K. ; See, O.H. ; Yussof, S. |
2011 | Performance analysis of genetic algorithm (GA)-based multi-constrained path routing algorithm | Yussof, S. |
2011 | Finding the optimum level of wavelet decomposition for reducing noise in wireless communication | Omar, S.F. ; Yussof, S. ; Islam, T. |
2011 | Path selection technique for highly transmission ratio and reliable routing in Manet | Jassim, H.S. ; Yussof, S. ; Tiong, S.K. ; Chong, K.H. ; Koh, S.P. |
2013 | Online signature verification using neural network and pearson correlation features | Iranmanesh, V. ; Ahmad, S.M.S. ; Wan Adnan, W.A. ; Malallah, F.L. ; Yussof, S. |
2012 | On the energy consumption in Optical Burst Switching (OBS) networks | Zaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. |
2013 | A review of biometric template protection techniques for online handwritten signature application | Layth Malallah, F. ; Sharifah Mumtazah Syed, A. ; Yussof, S. ; Wan Adnan, W.A. ; Iranmanesh, V. ; Arigbabu, O.A. |
2014 | Estimating body related soft biometric traits in video frames | Arigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Iranmanesh, V. ; Malallah, F.L. |
2014 | Online handwritten signature verification using neural network classifier based on principal component analysis | Iranmanesh, V. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Arigbabu, O.A. ; Malallah, F.L. |
Collection's Items (Sorted by Submit Date in Descending order): 161 to 180 of 651