Browsing by Author Jamil, N.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 55  next >
Issue DateTitleAuthor(s)
2019A Framework for experience based user authentication technique for minimizing risk of brute-force attacksMohamad, A.I. ; Mohamed, M.A. ; Makhtar, M. ; Mamat, M. ; Jamil, N. ; Din, M.M. 
2018A novel secret key generation based on image linkSulaiman, A.H. ; Al-Shaikhli, I.F.T. ; Wahiddin, M.R. ; Houri, S. ; Jamil, N. ; Ismail, A.F. 
2019A review of security assessment methodologies in industrial control systemsQassim, Q.S. ; Jamil, N. ; Daud, M. ; Patel, A. ; Ja’affar, N. 
2010A user authentication scheme based on identity-bits commitment for wireless sensor networksJamil, N. ; Sameon, S.S. ; Mahmood, R. 
2010A user authentication scheme based on identity-bits commitment for wireless sensor networksJamil, N. ; Sameon, S.S. ; Mahmood, R. 
2018Adopting Centroid and Amended Trilateration for better accuracy of range-based non-GPS localizationMd Din, M. ; Jamil, N. ; Nik Ahmad Aziz, N.F. 
2018Adopting Centroid and Amended Trilateration for better accuracy of range-based non-GPS localizationMd Din, M. ; Jamil, N. ; Nik Ahmad Aziz, N.F. 
2019An improved indoor location technique using combination of kalman filter and centroid positioningAziz, N.F.N.A. ; Jamil, N. ; Din, M.M. 
2018An improved indoor location technique using Kalman FilterFariz, N. ; Jamil, N. ; Din, M.M. ; Rusli, M.E. ; Sharudin, Z. ; Mohamed, M.A. 
2011An observation of cryptographic properties of 256 one-dimensional cellular automata rulesJamil, N. ; Mahmood, R. ; Zába, M.R. ; Zukamaen, Z.A. ; Udzir, N.I. 
2019Analysis of global spatial statistics features in existing contrast image quality assessment algorithmAhmed, I.T. ; Der, C.S. ; Jamil, N. ; Hammad, B.T. 
2019Analysis of Probability Density Functions in Existing No-Reference Image Quality Assessment Algorithm for Contrast-Distorted ImagesAhmed, I.T. ; Der, C.S. ; Jamil, N. ; Hammad, B.T. 
2018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
2018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
2018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
2018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
2011Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor NetworkJamil, N. ; Mahmood, R. 
2018A Comprehensive Review of Existing Risk Assessment Models in Cloud ComputingAmini, A. ; Jamil, N. 
2016Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle DanceIsa, H. ; Jamil, N. ; Z’aba, M.R. 
2013Diffusion and statistical analysis of STITCH-256Jamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A.