Showing results 35 to 54 of 68
< previous
next >
Issue Date | Title | Author(s) |
2015 | Integration of multiple soft biometrics for human identification | Arigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. |
2011 | An investigation of using parallel genetic algorithm for solving the shortest path routing problem | Yussof, S. ; Razali, R.A. ; See, O.H. |
2009 | Link utilization of GA-based QoS routing algorithm | Yussof, S. ; See, O.H. |
2009 | Link utilization of GA-based QoS routing algorithm | Yussof, S. ; See, O.H. |
2009 | Measurement program: Investigation on cache-timing attack | Khalid, Y. ; Dippel, U. ; Yussof, S. |
2012 | MIH: State of art and a proposed future direction in the heterogeneous wireless networks | Salih, Y.K. ; See, O.H. ; Yussof, S. |
2012 | MIH: State of art and a proposed future direction in the heterogeneous wireless networks | Salih, Y.K. ; See, O.H. ; Yussof, S. |
2012 | On the energy consumption in Optical Burst Switching (OBS) networks | Zaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. |
2012 | On the energy consumption in Optical Burst Switching (OBS) networks | Zaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. |
2014 | Online handwritten signature verification using neural network classifier based on principal component analysis | Iranmanesh, V. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Arigbabu, O.A. ; Malallah, F.L. |
2013 | Online signature verification using neural network and pearson correlation features | Iranmanesh, V. ; Ahmad, S.M.S. ; Wan Adnan, W.A. ; Malallah, F.L. ; Yussof, S. |
2008 | Overview of attacks on unencumbered cryptographic means and their prevention - Can the circle be squared? | Dippel, U. ; Yussof, S. |
2014 | An overview of intelligent selection and prediction method in heterogeneous wireless networks | Salih, Y.K. ; See, O.H. ; Ibrahim, R.W. ; Yussof, S. ; Iqbal, A. |
2011 | Path selection technique for highly transmission ratio and reliable routing in Manet | Jassim, H.S. ; Yussof, S. ; Tiong, S.K. ; Chong, K.H. ; Koh, S.P. |
2011 | Path selection technique for highly transmission ratio and reliable routing in Manet | Jassim, H.S. ; Yussof, S. ; Tiong, S.K. ; Chong, K.H. ; Koh, S.P. |
2011 | Performance analysis of genetic algorithm (GA)-based multi-constrained path routing algorithm | Yussof, S. |
2005 | QoS routing for multiple additive QoS parameters using genetic algorithm | Yussof, S. ; See, O.H. |
2005 | QoS routing for multiple additive QoS parameters using genetic algorithm | Yussof, S. ; See, O.H. |
2015 | Recent advances in facial soft biometrics | Arigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. |
2015 | A review of security attacks on IEC61850 substation automation system network | Rashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. |