Browsing by Author Jamil, N.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 46  next >
Issue DateTitleAuthor(s)
2018A novel secret key generation based on image linkSulaiman, A.H. ; Al-Shaikhli, I.F.T. ; Wahiddin, M.R. ; Houri, S. ; Jamil, N. ; Ismail, A.F. 
2018Adopting Centroid and Amended Trilateration for better accuracy of range-based non-GPS localizationMd Din, M. ; Jamil, N. ; Nik Ahmad Aziz, N.F. 
2018An improved indoor location technique using Kalman FilterFariz, N. ; Jamil, N. ; Din, M.M. ; Rusli, M.E. ; Sharudin, Z. ; Mohamed, M.A. 
2011An observation of cryptographic properties of 256 one-dimensional cellular automata rulesJamil, N. ; Mahmood, R. ; Zába, M.R. ; Zukamaen, Z.A. ; Udzir, N.I. 
2019Analysis of global spatial statistics features in existing contrast image quality assessment algorithmAhmed, I.T. ; Der, C.S. ; Jamil, N. ; Hammad, B.T. 
2019Analysis of Probability Density Functions in Existing No-Reference Image Quality Assessment Algorithm for Contrast-Distorted ImagesAhmed, I.T. ; Der, C.S. ; Jamil, N. ; Hammad, B.T. 
2018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
2011Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor NetworkJamil, N. ; Mahmood, R. 
2018A Comprehensive Review of Existing Risk Assessment Models in Cloud ComputingAmini, A. ; Jamil, N. 
2016Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle DanceIsa, H. ; Jamil, N. ; Z’aba, M.R. 
2013Diffusion and statistical analysis of STITCH-256Jamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. 
2018Digital dissemination of information about mosque activities to communitiesAsri, N.A. ; Mohamed, M.A. ; Mamat, A.R. ; Mohamad, Z. ; Amin, M.A.M. ; Nor, M.A.M. ; Jamil, N. 
2018Entity entity -based parameterization for distinguishing distributed denial of service from flash eventsMohamed, M.A. ; Jamil, N. ; Abidin, A.F. ; Din, M.M. ; Nik, W.N.S.W. ; Mamat, A.R. 
2017Faster multicollisions attack on sponge constructionHammad, B.T. ; Jamil, N. ; Zaba, M.R. ; Rusli, M.E. ; Ahmed, I.T. 
2019A Framework for experience based user authentication technique for minimizing risk of brute-force attacksMohamad, A.I. ; Mohamed, M.A. ; Makhtar, M. ; Mamat, M. ; Jamil, N. ; Din, M.M. 
2017Implementation of lightweight cryptographic primitivesHammad, B.T. ; Jamil, N. ; Rusli, M.E. ; Z’Aba, M.R. ; Ahmed, I.T. 
2015Implementation of PRINCE algorithm in FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. ; Tariq, B. 
2019Improve of contrast-distorted image quality assessment based on convolutional neural networksAhmed, I.T. ; Der, C.S. ; Jamil, N. ; Mohamed, M.A. 
2019An improved indoor location technique using combination of kalman filter and centroid positioningAziz, N.F.N.A. ; Jamil, N. ; Din, M.M. 
2016An Improved Indoor Positioning Algorithm Based on RSSI-Trilateration Technique for Internet of Things (IOT)Rusli, M.E. ; Ali, M. ; Jamil, N. ; Din, M.M.