IIUM Repository

Items where Division is "Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science" and Year is 2012

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator/Author | Item Type | No Grouping
Jump to: A | B | E | G | H | K | M | N | P | R | S | T | U | W | Y | Z
Number of items: 99.

A

AL-Badareen, Anas Bassam and Selamat, Mohd Hasan and Din, Jamilah and A. Jabar, Marzanah and Turaev, Sherzod (2012) Maintainability and reusability: The relationships. In: Workshop on Advanced Information Technology (WIT - A2012), 25 – 26 June 2012, Sydney, Australia.

Abawajy, Jemal and Pathan, Mukaddim and Rahman, Mustafizur and Pathan, Al-Sakib Khan and Deris, Mustafa Mat (2012) Internet and distributed computing advancements : theoretical frameworks and practical applications. IGI Global, USA, USA. ISBN ISBN13: 9781466601611, ISBN10: 1466601612

Abdul Aziz, Normaziah and Mabrouk, Ahmed Hassan (2012) Development of communication module for semi-autonomos UAV and robots. Research Report. s.n, Kuala Lumpur. (Unpublished)

Abdul Rahman, Abdul Wahab and Abdul Majid, Hariyati Shahrima (2012) Understanding meditation through neural computing approach. Research Report. [s.n]. (Unpublished)

Abdul Rahman, Abdul Wahab and Abdul Majid, Hariyati Shahrima (2012) Understanding pre-emotion and post accident analysis by using valence arousal. Project Report. s.n, Kuala Lumpur. (Unpublished)

Abdullah, Matin Saad and Pathan, Al-Sakib Khan and Rahman, Muhammad Abdur (2012) Using the web for critical learning of al-Qur’an’s ‎language: an ‎‎ exploratory case study. In: World Conference on Islamic Thought 2012 (WCIT 2012), 11-12 September 2012, Ipoh, Perak. (In Press)

Abduvaliyev, Abror and Pathan, Al-Sakib Khan and Jianying, Zhou and Roman, Rodrigo and Wai-Choong, Wong (2012) On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 15 (3). pp. 1223-1237. ISSN 1553-877X

Adamu, Abubakar Ibrahim and Mantoro, Teddy and SHAFI’I, M.A. (2012) Dynamic interactive 3D mobile navigation aid. Journal of Theoretical and Applied Information Technology, 37 (2). ISSN 1992-8645 (Print) 1817-3195 (Online)

Ahmad Zabidi, Muhammad Najmi (2012) Malicious software prevention for Muslim communities. Research Report. s.n, Kuala Lumpur. (Unpublished)

Ahmad Zabidi, Muhammad Najmi and Maarof, Mohd Aizaini and Zainal, Anazida (2012) Malware Analysis with Multiple Features. In: UKSim 14th International Conference on Computer Modelling and Simulation, UKSim2012 (UKSim2012), 28-30th March 2012, University of Cambridge, United Kingdom. (Unpublished)

Ahmed, Tarem and Wei, Xianglin and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2012) Automated intruder detection from image sequences using minimum volume sets. International Journal of Communication Networks and Information Security, 4 (1). pp. 11-17. ISSN 2073-607X (O), 2076-0930 (P)

Ahmed, Tarem and Wei, Xianglin and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2012) Efficient and effective automated surveillance agents using kernel tricks. SIMULATION: Transactions of the SCS. ISSN Print ISSN: 0037-5497, Online ISSN: 1741-3133 (In Press)

Akhand, M.A.H and Shill, P.C. and Rahman, M.M. Hafizur and Murase, K. (2012) Ensembles of diverse classifiers using synthetic training data. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Seri Pacific Hotel Kuala Lumpur.

Akhand, M.A.H. and Akter, Shahina and Rahman, S. Sazzadur and Rahman, M.M. Hafizur (2012) Particle swarm optimization with partial search to solve traveling salesman problem. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Seri Pacific Hotel Kuala Lumpur.

Al-Safi, Hassen Mohammed and Alshaikhli, Imad Fakhri Taha (2012) Rational drug design using genetic algorithm: case of malaria disease. Journal of Emerging Trends in Computing and Information Sciences, 3 (7). pp. 1093-1102. ISSN 2218-6301 (O), 2079-8407 (P)

Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and O. Alhussainan, Sondos (2012) Achieving security for images by LSB and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (3). pp. 127-139. ISSN 2231-8852

Alkalbani, Abdullah Said and Mantoro , Teddy and Md Tap, Abu Osman (2012) Improving the lifetime of wireless sensor networks based on routing power factor. In: Int Conference on Network Digital Technologies 2012, 24 - 26 April 2012, Canadian Univ Dubai.

Alkandari, Abdulrahman and Alnasheet, Meshal and Alshaikhli, Imad Fakhri Taha (2012) Smart cities: a survey. Journal of Advanced Computer Science and Technology Research (JACSTR), 2 (2). pp. 79-90. ISSN 2231-8852

Alkandari, Abdulrahman and Alshaikhli, Imad Fakhri Taha (2012) Designing a smart city in Kuwait: an initial study. Journal of Advanced Computer Science and Technology Research (JACSTR), 2 (3). pp. 116-126. ISSN 2231-8852

Alsafi, Hassen Mohammed and Abduallah, Wafaa Mustafa and Pathan, Al-Sakib Khan (2012) IDPS: an integrated intrusion handling model for cloud computing environment. International Journal of Computing & Information Technology (IJCIT), 4 (1). pp. 1-16. ISSN 0974-696X

Awang Abu Bakar, Normi Sham (2012) The effects of object-oriented coupling and cohesion measures on the quality of open source systems. Research Report. s.n, Kuala Lumpur. (Unpublished)

Awang Abu Bakar, Normi Sham and Boughton, Clive V. (2012) Validation of measurement tools to extract metrics from open source projects. In: 2012 IEEE Conference on Open Systems (ICOS), 21-24 Oct. 2012, Kuala Lumpur.

B

Batcha, Nowshath Kadhar and Murugesan, Raja Kumar and A. Aziz, Normaziah (2012) Study on sparseness effects over NMF applied for automatic text summarization. In: The 2nd IEEE International Conference on Cyber Technology In Automation, Control, and Intelligent Systems (IEEE-CYBER 2012), 27th - 31th May 2012, Imperial Queen’s Park Hotel, Bangkok, Thailand.

Becir, A and Wahiddin, Mohamed Ridza (2012) Phase coherent states for enhancing the performance of continuous variable quantum key distribution. Journal of the Physical Society of Japan , 81. pp. 1-9. ISSN 0031-9015

Becir, A. and Wahiddin, Mohamed Ridza (2012) Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement. Quantum Information Processing, 12 (2). pp. 1551-1171. ISSN 1570-0755 (Print) 1573-1332 (Online)

Becir, A. and Wahiddin, Mohamed Ridza (2012) Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement. International Journal of Modern Physics B, 26 (16). pp. 1-15. ISSN 0217-9792 ; 1793-6578

E

Ezani, Muhammad Faheem Mohd and Pathan, Al-Sakib Khan and Haseeb, Shariq (2012) Comparative analysis of IEEE 802.11g multimedia multicast performance using RTP with an implemented test-bed. In: The 2012 IEEE Conference on Open Systems (ICOS 2012), Kuala Lumpur, Malaysia, 21-24 October, 2012, Kuala Lumpur, Malaysia. (In Press)

G

Gan, Yee Siang and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2012) Weighted sticker system. In: International Science Postgraduate Conference 2012 (ISPC 2012), 27-30 November 2012, Skudai, Johor.

Gündüz, Feyza and Pathan, Al-Sakib Khan (2012) Usability improvements for touch-screen mobile flight booking application: a case study. In: International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012), 26-28 November 2012, Kuala Lumpur, Malaysia. (In Press)

H

Hamal, Abdul Qayoom and Othman, Marini and Yaacob, Hamwira Sakti and Abdul Rahman, Abdul Wahab (2012) EEG affect analysis based on KDE and MFCC. In: The ISCA 2nd International Conference on Advanced Computing and Communication (ISCA-ACC-2012), 27–29 June 2012, Los Angeles, California USA.

K

Kamal Ismail, Normaly and Tengku Sembok, Tengku Mohd (2012) 2D text visualization for the retrieval of Malay documents. In: Applied Mathematics in Electrical and Computer Engineering. WSEAS, pp. 116-121. ISBN 978-1-61804-064-0

Kamaruddin, Norhaslinda and Abdul Rahman, Abdul Wahab (2012) Human behavior state profile mapping based on recalibrated speech affective space model. In: 34th Annual International Conference of the IEEE EMBS, 28 August - 1 September, 2012, San Diego, California USA.

Kamaruddin, Norhaslinda and Abdul Rahman, Abdul Wahab and Quek, Chai (2012) Cultural dependency analysis for understanding speech emotion. Expert Systems with Applications, 39. pp. 5115-5113. ISSN 0957-4174

Khan, Shafiullah and Pathan, Al-Sakib Khan (2012) Wireless Networks and Security: Issues, Challenges and Research Trends. Signals and Communication Technology . Springer, USA. ISBN ISBN 978-3-642-36168-5 (In Press)

Khanam, Shapla and Saleem, Habibullah Yusuf and Pathan, Al-Sakib Khan (2012) An efficient detection model of selective forwarding attacks in wireless mesh networks. Lecture Notes in Computer Science (LNCS), 7646. pp. 1-14. ISSN 1611-3349 (O), 0302-9743 (P) (In Press)

M

Mantoro, Teddy and Ayu, Media Anugerah and Borovac, Amir and Zuhedy Zay, Aqqiela Zuhra (2012) IPv4 and IPv6 client-server designs: the sockets performance. In: International Conference on Multimedia Computing and Systems (ICMCS 2012), 10-12 May 2012, Tangiers, Morocco.

Mathuri, S. and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2012) Some properties of probabilistic semi-simple splicing systems. In: International Science Postgraduate Conference 2012 (ISPC 2012), 27-30 November 2012, Skudai, Johor.

Messikh, Azeddin and Umarov, Bakhram (2012) Study of localized solutions of the nonlinear discrete model for dipolar Bose-Einstein condensate in an optical lattice by the homoclinic orbit method. In: International Conference of Application Science & Technology (iCAST2012), 7-10 November 2012, Kuantan, Pahang.

Mohamed Hassan, Ahmed Abbas and Abdul Aziz, Normaziah (2012) Ground penetrating radar system using OFDM technology. Research Report. [s.n]. (Unpublished)

Mohd Tamrin, Mohd Izzuddin and Sembok, Tengku Mohd (2012) Collaboration of integrative processes intermediaries supporting supply chain management. In: Mathematical Methods for Information Science & Economics. WSEAS Press, pp. 59-64. ISBN 978-1-61804-148-7

Muataz Hazza, Zubaidah and Abdul Aziz, Normaziah (2012) Detecting computer generated images for image spam filtering. In: 2012 International Conference on Advanced Computer Science Applications and Technologies, 26-28 Nov. 2012, Kuala Lumpur.

N

Noor Rodi, Nur Syazwani and Ismail , Amelia Ritahani and Abdul Malik, Marlinda (2012) Daily rainfall prediction using clonal selection algorithm. In: International Conference on Water Resources (ICWR 2012), 5-9 November 2012, BayView Hotel, Langkawi, Kedah. (In Press)

Nordin, Azlin (2012) Analysis of Existing Approaches to Constructing Component-based Systems Directly from Natural Language Requirements. In: The 6th Malaysian Software Engineering Conference (MySec12), 4-5 December 2012, UKM.

P

Pathan, Al-Sakib Khan (2012) Multi-dimensional networking and distributed computing services. International Journal on Internet and Distributed Computing Systems, 2 (1). i-ii. ISSN 2219-1887 (O), 2219-1127 (P)

Pathan, Al-Sakib Khan (2012) Tackling the threats of Internet worms. International Journal on Internet and Distributed Computing Systems, 3 (1). i-ii. ISSN 2219-1887 (O), 2219-1127 (P)

Pathan, Al-Sakib Khan (2012) Wireless network security: 3G, 4G, wireless PAN/LAN/MAN. In: Special Invited Lecture at Universiti Teknologi Malaysia, Johor Bahru, Malaysia, 23 May 2012, Johor Bahru, Malaysia. (Unpublished)

Pathan, Al-Sakib Khan and Abduallah, Wafaa Mustafa and Khanam, Shapla and Saleem, Habibullah Yusuf (2012) A pay-and-stay model for tackling intruders in hybrid wireless mesh networks. Simulation-Transactions of the Society for Modeling and Simulation International, 89 (5). pp. 616-634. ISSN 0037-5497

Pathan, Al-Sakib Khan and Monowar, Muhammad Mostafa (2012) Future trends in security issues in internet and web applications. International Journal of Computational Science and Engineering. ISSN ISSN online: 1742-7193, ISSN print: 1742-7185 (In Press)

R

R. Othman, R. Azrina and A. Aziz, Normaziah (2012) Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing. 1875-7669, 6 . Atlantis Press, Paris, France, pp. 65-78. ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online)

Rahman, M.M. Hafizur (2012) Tori-connected torus network and its derivative. In: 4th ICDIP/ICSEM, 7-8 Apr 2012, Kuala Lumpur, Malaysia.

Rahman, M.M. Hafizur and Akhand, M. A. H (2012) A cost and delay estimation of a suite of low-cost adaptive routers for hierarchical torus network. In: IEEE/OSA/IAPR International Conference on Informatics, Electronics & Vision, 18-19 May, 2012, Dhaka, Bangladesh.

Rahman, M.M. Hafizur and Sato, Yukinori and Inoguchi, Yasushi (2012) Dynamic communication performance enhancement in hierarchical torus network by selection algorithm. Journal of Networks, 7 (3). pp. 468-479. ISSN 1796-2056

Rahman, M.M. Hafizur and Sato, Yukinori and Inoguchi, Yasushi (2012) High performance hierarchical torus network under adverse traffic patterns. Journal of Networks, 7 (3). pp. 456-467. ISSN 1796-2056

Rahman, M.M. Hafizur and Shah, Asadullah and Inoguchi, Yasushi (2012) High performance hierarchical torus network. In: IRIIE2012, 21-22 February 2012, Gombak, Kuala Lumpur.

Rahman, M.M. Hafizur and Shah, Asadullah and Inoguchi, Yasushi (2012) On dynamic communication performance of a hierarchical 3D-mesh network. In: The 9th IFIP International Conference on Network and Parallel Computing (NPC 2012), 6-8 Sep 2012, Gwangju, South Korea.

Rahman, M.M. Hafizur and Shah, Asadullah and Inoguchi, Yasushi (2012) A deadlock-free dimension order routing for hierarchical 3D-mesh network. In: 2012 International Conference on Computer & Information Science (ICCIS), 12-14 June 2012, Kuala Lumpur, Malaysia.

Ramli, Noraza and A. Aziz, Normaziah (2012) Risk identification for an information security management system implementation. In: SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies , 19 August 2012, Rome, Italy.

S

Salim, Sufya and Taha, Imad (2012) Lightweight block ciphers: A comparative study. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (4). pp. 159-165. ISSN 2231-8852

Salleh, Norsaremah (2012) Towards evidence-based software engineering research in Malaysia. In: 6th Malaysian Software Engineering Conference, 4-5 December 2012, UKM, Bangi. (Unpublished)

Salleh, Norsaremah and Hussein, Ramlah and Mohamed, Norshidah (2012) An empirical investigation on internet privacy on social network sites among Malaysian youths. Journal of Information Technology Research, 5 (3). pp. 85-97. ISSN 1938-7865 (O), 1938-7857 (P)

Salleh, Norsaremah and Hussein, Ramlah and Mohamed, Norshidah and Abdul Karim, Nor Shahriza and Ahlan, Abdul Rahman and Aditiawarman, Umar (2012) Privacy concern on social network sites: the role of protection motivation, trust and risk. In: 18th IBIMA Conference, 9-10 May 2012, Istanbul, Turkey .

Salleh, Norsaremah and Hussein, Ramlah and Mohamed, Norshidah and Abdul Karim, Nor Shahriza and Ahlan, Abdul Rahman and Aditiawarman, Umar (2012) Social network sites: information disclosure, perceived vulnerability, privacy concerns and perceived benefits. In: IADIS International Conference Information Systems 2012, 10-12 March 2012, Berlin, Germany.

Salleh, Norsaremah and Mendes, Emilia and Grundy, John (2012) Investigating the effects of personality traits on pair programming in a higher education setting through a family of experiments. Empirical Software Engineering, 19 (3). pp. 714-752. ISSN 1382-3256

Salleh , Norsaremah and Hussein, Ramlah and Mohamed, Norshidah and Abdul Karim, Nor Shahriza and Ahlan, Abdul Rahman and Aditiawarman, Umar (2012) Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. Journal of Internet Social Networking & Virtual Communities. pp. 1-11. ISSN 2166-0794

Shah, Asadullah and Zeeshan Ahmed, Bhatti (2012) Widget based automated rigging of bipedal character with custom manipulators. In: 11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2012;, 2 - 4 Dec 2012, Singapore.

Shahidi, Farruh (2012) On infinite dimensional dissipative stochastic operators. In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE2012), 3-4 Jul 2012, Kuala Lumpur.

Shahidi, Farruh (2012) The relation between extreme doubly stochastic operators and extreme doubly stochastic matrices. Research Report. s.n, Kuala Lumpur. (Unpublished)

Shahidi, Farruh and Ganiev, Inomjon (2012) Vector valued martingale-ergodic and ergodic-martingale theorems. Stochastic Analysis and Applications, 30 (5). pp. 916-932. ISSN 1532-9356 (O), 0736-2994 (P)

Shahidi, Farruh and Md Tap, Abu Osman (2012) The asymptotic behaviour of trajectories dissipative quadratic stochastic operators 2D simplex. International Journal of Modern Physics: Conference Series, 9. pp. 293-298. ISSN 2010-1945

Shaikh, Asadullah and Anjum, Naveed and Samad, Fahad and Shah, Asadullah (2012) Building wireless sensor networks application using Sun SPOTs. In: Second International Multi Topic Conference, IMTIC 2012, 28 - 30 March 2012 , Mehran University of Engineering & Technology, Jamshoro, Pakistan.

Shaikh, Asadullah and Soomro, Safeeullah and Shah , Asadullah and Aziz, Abdul (2012) NoMadCar: the interactive design using human computer interaction techniques. In: International Multi-TopIc Conference (IMTIC 2012), 28 - 30 March 2012 , Mehran University of Engineering & Technology, Jamshoro, Pakistan. (In Press)

Shams, Wafa Khazal and Abdul Rahman, Abdul Wahab (2012) Characterizing autistic disorder based on principle component analysis. Australian Journal of Basic and Applied Sciences, 6 (1). pp. 149-155. ISSN 1991-8178

Shams, Wafa Khazal and Abdul Rahman, Abdul Wahab and Qidwai, Uvais A. (2012) Detecting Different Tasks Using EEG-Source-Temporal Features. In: Proceedings of Neural Information Processing - 19th International Conference, ICONIP 2012, November 12-15, 2012, Doha, Qata.

Shams, Wafaa Khazaal and Abdul Rahman, Abdul Wahab and A. Qidwai, Uvais (2012) Fuzzy model for detection and estimation of the degree of autism spectrum disorder. In: Proceedings of the 19th International Conference on Neural Information Processing (ICONIP 2012), November 12-15, 2012, Doha, Qatar.

Sie Chun, Ting and Ismail , Amelia Ritahani and Abdul Malik, Marlinda (2012) Analysis of sequence batch reactor for COD and TSS removal identification from septic sludge treatment plant using bio inspired algorithm: a case study in Sarawak. In: National Graduate Conference 2012 (NATGRAD 2012), 8-11 Novermber 2012, Selangor, Malaysia.

Suhaimi, Mohd Adam and Yasrib, Asma and Rahman, M.M. Hafizur (2012) An integrated approach of biomedical image management system. LAP Lambert Academic Publishing, Saarbrucken, Germany. ISBN 978-3-8433-6052-4

Sultana, Shaheena and Akhand, M. A. H and Das, Prodip Kumar and Rahman, M.M. Hafizur (2012) Bangla speech-to-text conversion using SAPI. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Seri Pacific Hotel Kuala Lumpur.

T

Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012, 4-6 June, 2012, Langkawi.

Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (1). pp. 22-34. ISSN 2231-8852

Taha, Imad and Alahmad, Mohammad and Munther, Khansaa (2012) Comparison and analysis study of sha-3 finallists. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses, KL.

Taha, Imad and Alkandari, Abdulrahman (2012) An anatomy of IGP and BGP routing protocols. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses, KL.

Taha, Imad and Alkandari, Abdulrahman and alnasheet, Meshal (2012) Traffic management system based on wsn in Kuwait: an initial design. In: International Conference on Informatics and Applications 2012, 3-5 June 2012, Kuala Terengganu, Malaysia.

Taha, Imad and Alzuabi, Haifa (2012) Quality evaluation of “safeer” portal for Saudi students studying abroad. In: International Conference on Advanced Computer Science Applications and Technologies .

Taha, Imad and Farid, Sumaira and Hussain, Ayyaz (2012) Comparative study on content-based image retrieval CBIR). In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses- KL.

Taha, Imad and Salim, Sufyan (2012) Security of present s-box. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses- KL.

Taha, Imad and Zeki, Akram M. and Pathan, Al-Sakib Khan and makarim, rusydi (2012) Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim), 28-30 March 2012, Cambridge, UK. (In Press)

Tarmudi, Zamali and Md. Tap, Abu Osman and Abdullah, Mohd Lazim (2012) Equilibrium linguistic computation method for fuzzy group decision making. Malaysian Journal of Mathematical Sciences, 6 (2). pp. 225-242. ISSN 1823-8343

Termudi, Zamali and Abdullah, Mohd Lazim and Md Tap, Abu Osman (2012) Sustainable decision-making model for municipal solid-waste management: bifuzzy approach. Journal of Sustainability Science and Management, 7 (1). pp. 56-68. ISSN 1823-8556

Ting, Sie Chun and Ismail , Amelia Ritahani and Abdul Malik, Marlinda (2012) Bio-engineered solution in enhancement of septic sludge with artificial immune system. In: International Conference on Water Resources (ICWR 2012), 5-9 November 2012, BayView Hotel, Langkawi, Kedah. (In Press)

Toral-Cruz, Homero and Pathan, Al-Sakib Khan and Pacheco, Julio C. Ramírez (2012) Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models. Mathematical and Computer Modelling Journal. ISSN 0895-7177 (In Press)

U

Uddin, Mueen and Abdul Rahman, Azizah and Alarifi, Abdulrahman and Talha, Muhammad and Shah, Asadullah and Iftikhar, Mohsin and Zomaya, Albert (2012) Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm. International Journal of Innovative Computing, Information and Control, 8 (6). pp. 4375-4389. ISSN 1349-4198

Uddin, Mueen and Abdul Rahman, Azizah and Shah, Asadullah and Memon, Jamshed (2012) Virtualization implementation approach for data centers to maximize performance. Asian Journal of Scientific Research, 5 (2). pp. 45-57. ISSN 1992-1454

W

Wahiddin, Mohamed Ridza and Becir, A and El-Orany, Faisal A. A. (2012) Continuous-variable quantum key distribution protocols with eight-state discrete modulation. International Journal of Quantum Information, 10 (1). pp. 1-15.

Wahiddin, Mohamed Ridza and Geong, Sen Poh and Abdullah, Nik Nailah and Zaba, Muhammad Reza (2012) Reasoning of collaborative human behaviour in security-critical work practices: a framework. In: Trustworthy Ubiquitous Computing. Atlantis Press, Paris, France, pp. 99-106. ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online)

Wei, Xianglin and Ahmed, Tarem and Chen, Ming and Pathan, Al-Sakib Khan (2012) PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA. In: International Conference on Computing, Networking and Communications (IEEE ICNC 2012), January 30 - February 2, 2012, Maui, Hawaii, USA.

Y

Yaacob, Hamwira Sakti and Abdul Rahman, Abdul Wahab and Kamaruddin, Norhaslinda (2012) EEG source imaging analysis of affect using sLoreta. In: The ISCA 2nd International Conference on Advanced Computing and Communication (ACC-2012), 27-29th June 2012, Los Angeles, California USA.

Z

Zeadally, Sherali and Pathan, Al-Sakib Khan and Alcaraz, Cristina and Badra, Mohamad (2012) Towards privacy protection in smart grid. Wireless Personal Communications, 73 (1). pp. 23-50. ISSN 0929-6212 (Print) 1572-834X (Online)

Zeki, Ahmed M. and Serda Ali, Ruzanna and Appalasamy, Patma (2012) K-Means approach to facial expressions recognition. In: 2012 International Conference on Information Technology and e-Services, 24-26 March 2012, Sousse, Tunisia.

Zeki, Akram M. and Alsafi, Hassen Mohammed and Nassr, R.M. and Mantoro, Teddy (2012) A mobile dictionary for pilgrims. In: 2012 International Conference on Information Technology and e-Services, 24-26 March 2012, Sousse, Tunisia.

This list was generated on Wed Oct 21 02:51:36 2020 +08.