Showing results 31 to 50 of 68
< previous
next >
Issue Date | Title | Author(s) |
2014 | Gender recognition on real world faces based on shape representation and neural network | Arigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Iranmanesh, V. ; Malallah, F.L. |
2015 | Green cloud platform for flood early detection warning system in smart city | Yusoff, A. ; Mustafa, I.S. ; Yussof, S. ; Din, N.M. |
2015 | Green cloud platform for flood early detection warning system in smart city | Yusoff, A. ; Mustafa, I.S. ; Yussof, S. ; Din, N.M. |
2015 | Green cloud platform for flood early detection warning system in smart city | Yusoff, A. ; Mustafa, I.S. ; Yussof, S. ; Din, N.M. |
2015 | Integration of multiple soft biometrics for human identification | Arigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. |
2011 | An investigation of using parallel genetic algorithm for solving the shortest path routing problem | Yussof, S. ; Razali, R.A. ; See, O.H. |
2009 | Link utilization of GA-based QoS routing algorithm | Yussof, S. ; See, O.H. |
2009 | Link utilization of GA-based QoS routing algorithm | Yussof, S. ; See, O.H. |
2009 | Measurement program: Investigation on cache-timing attack | Khalid, Y. ; Dippel, U. ; Yussof, S. |
2012 | MIH: State of art and a proposed future direction in the heterogeneous wireless networks | Salih, Y.K. ; See, O.H. ; Yussof, S. |
2012 | MIH: State of art and a proposed future direction in the heterogeneous wireless networks | Salih, Y.K. ; See, O.H. ; Yussof, S. |
2012 | On the energy consumption in Optical Burst Switching (OBS) networks | Zaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. |
2012 | On the energy consumption in Optical Burst Switching (OBS) networks | Zaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. |
2014 | Online handwritten signature verification using neural network classifier based on principal component analysis | Iranmanesh, V. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Arigbabu, O.A. ; Malallah, F.L. |
2013 | Online signature verification using neural network and pearson correlation features | Iranmanesh, V. ; Ahmad, S.M.S. ; Wan Adnan, W.A. ; Malallah, F.L. ; Yussof, S. |
2008 | Overview of attacks on unencumbered cryptographic means and their prevention - Can the circle be squared? | Dippel, U. ; Yussof, S. |
2014 | An overview of intelligent selection and prediction method in heterogeneous wireless networks | Salih, Y.K. ; See, O.H. ; Ibrahim, R.W. ; Yussof, S. ; Iqbal, A. |
2011 | Path selection technique for highly transmission ratio and reliable routing in Manet | Jassim, H.S. ; Yussof, S. ; Tiong, S.K. ; Chong, K.H. ; Koh, S.P. |
2011 | Path selection technique for highly transmission ratio and reliable routing in Manet | Jassim, H.S. ; Yussof, S. ; Tiong, S.K. ; Chong, K.H. ; Koh, S.P. |
2011 | Performance analysis of genetic algorithm (GA)-based multi-constrained path routing algorithm | Yussof, S. |