Browsing by Author Yussof, S.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 68  next >
Issue DateTitleAuthor(s)
2015A comparative analysis of task scheduling algorithms of virtual machines in cloud environmentAtiewi, S. ; Yussof, S. ; Ezanee, M. 
2014A network selection indicator based on golden relation between monetary cost and bandwidth in heterogeneous wireless networksSalih, Y.K. ; See, O.H. ; Ibrahim, R.W. ; Yussof, S. ; Iqbal, A. 
2014A novel mechanism for contention resolution in Parallel Optical Burst Switching (POBS) networksZaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Salih, A.I. 
2014A novel mechanism for contention resolution in Parallel Optical Burst Switching (POBS) networksZaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Salih, A.I. 
2015A novel noncooperative game competing model using generalized simple additive weighting method to perform network selection in heterogeneous wireless networksSalih, Y.K. ; See, O.H. ; Ibrahim, R.W. ; Yussof, S. ; Iqbal, A. 
2009A parallel genetic algorithm for shortest path routing problemYussof, S. ; Razali, R.A. ; See, O.H. 
2014A proactive fuzzy-guided link labeling algorithm based on MIH framework in heterogeneous wireless networksSalih, Y.K. ; See, O.H. ; Yussof, S. ; Iqbal, A. ; Mohammad Salih, S.Q. 
2016A review energy-efficient task scheduling algorithms in cloud computingAtiewi, S. ; Yussof, S. ; Ezanee, M. ; Almiani, M. 
2013A review of biometric template protection techniques for online handwritten signature applicationLayth Malallah, F. ; Sharifah Mumtazah Syed, A. ; Yussof, S. ; Wan Adnan, W.A. ; Iranmanesh, V. ; Arigbabu, O.A. 
2010A robust GA-based QoS routing algorithm for solving multi-constrained path problemYussof, S. ; See, O.H. 
2010A robust GA-based QoS routing algorithm for solving multi-constrained path problemYussof, S. ; See, O.H. 
2009A routing protocol based on trusted and shortest path selection for mobile ad hoc networkJassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. 
2005Algorithm for robot writing using character segmentationYussof, S. ; Anuar, A. ; Fernandez, K. 
2018An analysis of common vulnerability and exposure (CVE) of software products in the year 2016Bonandir, A. ; Yussof, S. 
2017An effective approach for managing power consumption in cloud computing infrastructureAbd, S.K. ; Al-Haddad, S.A.R. ; Hashim, F. ; Abdullah, A.B.H.J. ; Yussof, S. 
2016An investigation on the viability of using IoT for student safety and attendance monitoring in Iraqi primary schoolsKhaleel, A. ; Yussof, S. 
2016Big data analytics for Flood Information Management in Kelantan, MalaysiaYusoff, A. ; Din, N.M. ; Yussof, S. ; Khan, S.U. 
2016Big data analytics for Flood Information Management in Kelantan, MalaysiaYusoff, A. ; Din, N.M. ; Yussof, S. ; Khan, S.U. 
2016Cloud computing concept, classifications, applications and challengesAbd, S.K. ; Al-Haddad, S. ; Hashim, F. ; Abdullah, A.B. ; Yussof, S. 
2016Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocolAbd, S.K. ; Salih, R.T. ; Al-Haddad, S.A.R. ; Hashim, F. ; Abdullah, A.B.H. ; Yussof, S.