Items where Division is "Faculty of Information Science and Technology (FIST)" and Year is 2011

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Number of items: 48.

Ahmad, Nazrul Muhaimin and Khorram, Alireza and Fauzi, Ridza and Yaacob, Asrul Hadi (2011) Performance analysis of certificateless signature for IKE authentication. World Academy Science, Engineering and Technology, 50 (182). pp. 353-360.

Ahmad, Nazrul Muhaimin and Yaacob, Asrul Hadi (2011) IPSec authentication using certificateless signature in heterogeneous IPv4/IPv6 network. In: 2011 IEEE Symposium on Computers & Informatics. IEEE, pp. 668-673. ISBN 978-1-61284-689-7

Ahmad, Nazrul Muhaimin and Yaacob, Asrul Hadi and Khorram, Alireza and Tan, Jin Fu and Ong, Yi Hao and Leong, Yew Meng (2011) Comparative analysis and implementation of certificateless based authentication scheme. In: Informatics Engineering and Information Science. Communications in Computer and Information Science (251). Springer Berlin Heidelberg, pp. 151-162. ISBN 978-3-642-25326-3

Azman, Afizan and Azman, Hartini and Edirisinghe, Eran A. and Meng, Qinggang (2011) Non-intrusive physiological measurement for driver cognitive distraction: Eye and mouth movement. International Journal of Advanced Computer Science, 1 (3). pp. 92-96. ISSN 2251-6379

Behnia, R. and Gan, C. S. and Heng, S. H. (2011) Development of undeniable signature schemes without certificates. International Journal of Cryptology Research, 3 (1). pp. 48-67.

Behnia, R. and Gan, C. S. and Heng, S. H. (2011) The applications of DH-Tuple witness indistinguishable protocols. International Journal of Cryptology Research, 3 (1). pp. 34-47.

Chamasemani, F. F. and Singh, Y. P. (2011) Multi-class Support Vector Machine (SVM) Classifiers -- An Application in Hypothyroid Detection and Classification. In: 2011 Sixth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA). IEEE, Bio-Inspired Computing: Theories and Applications (BIC-TA), 351 -356. ISBN 978-1-4577-1092-6

Chiang, Mee Li and Lau, Siong Hoe (2011) Automatic multiple faces tracking and detection using improved edge detector algorithm. In: 2011 7th International Conference on Information Technology in Asia. IEEE Xplore, pp. 1-5. ISBN 978-1-61284-128-1

Chin, Yong Jian and Ong, Thian Song and Teoh, Andrew Beng Jin and Goh, Michael Kah Ong (2011) Multimodal biometrics based bit extraction method for template security. In: 2011 6th IEEE Conference on Industrial Electronics and Applications. IEEE Xplore, pp. 1971-1976. ISBN 978-1-4244-8754-7

Dahnil, Dahlila Putri and Singh, Yaswant Prasad and Ho, Chin Kuan (2011) Energy-efficient cluster formation in heterogeneous Wireless Sensor Networks: A comparative study. In: 2011 13th International Conference on Advanced Communication Technology (ICACT). IEEE, pp. 746-751. ISBN 978-1-4244-8830-8

Goh, Michael Kah Ong (2011) A contactless biometric system using multiple hand features. PhD thesis, Multimedia University.

Goh, Michael Kah Ong and Tee, Connie and Teoh, Andrew Beng Jin (2011) A preliminary acclimatization study of a contactless biometrics using palm vein feature. In: 2011 6th IEEE Conference on Industrial Electronics and Applications. IEEE Xplore, pp. 1022-1027. ISBN 978-1-4244-8754-7

Goh, Yi Zheng and Teoh, Andrew Beng Jin and Goh, Michael Kah Ong (2011) Wavelet local binary patterns fusion as illuminated facial image preprocessing for face verification. Expert Systems with Applications, 38 (4). pp. 3959-3972. ISSN 0957-4174

Jin, Zhe (2011) Fingerprint Template Protection With Minutiae Based Bit String. Masters thesis, Multimedia University.

Jin, Zhe and Ong, Thian Song and Tee, Connie and Teoh, Andrew Beng Jin (2011) Generating revocable fingerprint template using polar grid based 3-tuple quantization technique. In: 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE Xplore, pp. 1-4. ISBN 978-1-61284-856-3

Jin, Zhe and Ong, Thian Song and Tee, Connie and Teoh, Andrew Beng Jin (2011) Generating revocable fingerprint template using polar grid based 3-tuple quantization technique. In: 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE Xplore, pp. 1-4. ISBN 978-1-61284-856-3

Jin, Zhe and Teoh, Andrew Beng Jin (2011) Fingerprint template protection with Minutia Vicinity Decomposition. In: 2011 International Joint Conference on Biometrics (IJCB). IEEE Xplore, pp. 1-7. ISBN 978-1-4577-1358-3

Lew, Sook Ling (2011) Achieving Competitive Advantage (CA) through Information Infrastructure Capability (IIC): An empirical justification. Communications of the IBIMA, 2011. pp. 1-19. ISSN 1943-7765

Lew, Sook Ling (2011) Defining Knowledge Management (KM) activities from Information Communication Technologies (ICTs) perspective. Journal of Organizational Knowledge Management, 2011. pp. 1-10. ISSN 2166-0808

Lim, Way Soong and Wong, Wai Kit and Loo, Chu Kiong (2011) Quaternion based omnidirectional machine condition monitoring system. International Journal of Image Processing (IJIP), 5 (2). pp. 145-165. ISSN 1985-2304

Ling, Huo-Chong and Phan, Raphael C. -W. and Heng, Swee-Huay (2011) On the security of a hybrid SVD-DCT watermarking method based on LPSNR. In: Advances in Image and Video Technology. Lecture Notes in Computer Science, 7087 (7087). Springer Berlin Heidelberg, pp. 257-266. ISBN 978-3-642-25366-9

Ling, Huo-Chong and Phan, Raphael C. -W. and Heng, Swee-Huay (2011) On the security of a robust watermarking scheme based on RDWT-SVD. In: Future Generation Information Technology. Lecture Notes in Computer Science (7105). Springer Berlin Heidelberg, pp. 249-256. ISBN 978-3-642-27141-0

Ling, Huo-Chong and Phan, Raphael C.-W. and Heng, Swee-Huay (2011) On the security of a hybrid watermarking algorithm based on singular value decomposition and Radon transform. AEU - International Journal of Electronics and Communications, 65 (11). pp. 958-960. ISSN 1434- 8411

Mehrasa, Seyedehnegin and Ahmad, Nazrul Muhaimin and Yaacob, Asrul Hadi and Khorram, Alireza (2011) Secure partial secret key issuing in Certificateless Public Key Infrastructure. In: 2011 IEEE Student Conference on Research and Development (SCOReD). IEEE, 79 -84. ISBN 978-1-4673-0099-5

Ngeow, Yun Fong and Wong, Yan Ling and Ng, Kee Peng and Ong, Chia Sui and Aung, Wah Wah (2011) Rapid, Cost-Effective Application of Tibilia TB Rapid Test for Culture Confirmation of Live and Heat-Killed Mycobacterium tuberculosis. Journal of Clinical Microbiology, 49 (7). pp. 2776-2777. ISSN 0095-1137

Nor’ain Mohd Yusoff, and Ruhaiza Ishak, and Nor Syarafina Rusli, (2011) Le-ADS: Early Learning Disability Detection System for Autism and Dyslexia. In: HCI International 2011 – Posters’ Extended Abstracts. Communications in Computer and Information Science (174). Springer Berlin Heidelberg, pp. 433-437. ISBN Print ISBN: 978-3-642-22094-4, Online ISBN: 978-3-642-22095-1

Pang, Ying Han and Teoh, Andrew Beng Jin and Lim, Heng Siong (2011) Eigenvector weighting function in face recognition. Discrete Dynamics in Nature and Society, 2011. pp. 1-15. ISSN 1026-0226

Reza, Ahmed Wasif and Eswaran, C. and Dimyati, Kaharudin (2011) Diagnosis of Diabetic Retinopathy: Automatic Extraction of Optic Disc and Exudates from Retinal Images using Marker-controlled Watershed Transformation. Journal of Medical Systems, 35 (6). pp. 1491-1501. ISSN 0148-5598

Sayeed, Md. Shohel and Hossen, Md. Jakir and Rahman, A. and Samsuddin, K. and Rokhani, F. (2011) A modified hybrid fuzzy clustering algorithm for data partitions. Australian Journal of Basic and Applied Sciences, 5 (8). pp. 674-681. ISSN 1991-8178

Shing, Chiang Tan and Chee, Peng Lim (2011) Fuzzy ARTMAP and hybrid evolutionary programming for pattern classification. Journal of Intelligent and Fuzzy Systems, 22 (2-3). pp. 57-68. ISSN 1064-1246

Sonai Muthu Anbananthen, Kalaiarasi and Hossen, Md. Jakir and Sayeed, Md. Shohel (2011) Comparison of network pruning and tree pruning on artificial neural network tree. Australian Journal of Basic and Applied Sciences, 5 (9). pp. 1093-1098. ISSN 1991-8178

Su, Tze-Wei and Khor, Hao-Ming and Tan, Ian K. T (2011) Utilizing word matching for duplicate article removal : a study using Malaysian online news feed. Symposium on Information & Computer Sciences. pp. 70-73.

Subramaniam, Samini and Hoong, Poo Kuan and Haw, Su Cheng (2011) XML labeling schemes for dynamic updates: Strengths and limitations. In: International Journal on Advanced Science, Engineering and Information Technology. INSIGHT - Indonesian Society for Knowledge and Human Development, pp. 236-241. ISBN 978-983-42366-4-9

Tan, Choo Kim and Bava Harji, Madhubala and Lau, Siong Hoe (2011) Fostering positive attitude in probability learning using graphing calculator. Computers & Education, 57 (3). pp. 2011-2024. ISSN 0360-1315

Tan, Phit Ling and Tan, Shing Chiang and Lim, Chee Peng and Khor, Swee Eng (2011) A modified two-stage SVM-RFE model for cancer classification using microarray data. In: Neural Information Processing. Lecture Notes in Computer Science (7062). Springer Berlin Heidelberg, pp. 668-675. ISBN 978-3-642-24954-9

Tan, Shing Chiang and Lim, Chee Peng (2011) Integration of supervised ART-based neural networks with a hybrid genetic algorithm. Soft Computing, 15 (2). pp. 205-219. ISSN 1432-7643

Tan, Syh-Yuan and Heng, Swee-Huay and Goi, Bok-Min (2011) On the security of two fuzzy identity-based signature schemes. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security. IEEE Xplore, pp. 1-5. ISBN 978-1-4244-8705-9

Tan, Syh-Yuan and Heng, Swee-Huay and Phan, Raphael C. -W. and Goi, Bok-Min (2011) A variant of Schnorr identity-based identification scheme with tight reduction. In: Future Generation Information Technology. Lecture Notes in Computer Science (7105). Springer Berlin Heidelberg, pp. 361-370. ISBN 978-3-642-27141-0

Taufiq, Muhammad and Abdullah, Mohd Fikri Azli and Choi, Deokjai (2011) Wireless LAN Access Point Placement Based on User Mobility. Wireless Personal Communications, 60 (3). pp. 431-440. ISSN 1572-834X

Tee, Connie and Goh, Michael Kah Ong and Teoh, Andrew Beng Jin (2011) Personal recognition using multi-angles gait sequences. In: Digital Information Processing and Communications. Communications in Computer and Information Science (189). Springer Berlin Heidelberg, pp. 497-508. ISBN 978-3-642-22410-2

Teh, Pin Shen and Teoh, Andrew Beng Jin and Tee, Connie and Ong, Thian Song (2011) A multiple layer fusion approach on keystroke dynamics. Pattern Analysis and Applications, 14 (1). pp. 23-36. ISSN 1433-7541

W. Noorshahida Mohd-Isa, and Alam, Jahangir and Eswaran, Chikkanan and Junaidi Abdullah, (2011) Recognizing Individual Sib in the Case of Siblings with Gait Biometric. In: Informatics Engineering and Information Science. Communications in Computer and Information Science, 253 . Springer Berlin Heidelberg, pp. 112-122. ISBN Print ISBN: 978-3-642-25461-1, Online ISBN: 978-3-642-25462-8

Wee, Yit Yin and Cheah, Wooi Ping and Tan, Shing Chiang and Wee, Kuok Kwee (2011) Causal discovery and reasoning for intrusion detection using Bayesian network. International Journal of Machine Learning and Computing, 1 (2). pp. 185-192. ISSN 2010-3700

Wilkin, Tee and Yin, Ooi Shih (2011) State of the art: Signature verification system. In: 2011 7th International Conference on Information Assurance and Security (IAS). IEEE Xplore, pp. 110-115. ISBN 978-1-4577-2154-0

Wong, Wai Kit and Lim, Way Soong and Loo, Chu Kiong and Chew, Zeh Yang and Lim, Hong Liang (2011) Omnidirectional thermal imaging surveillance system featuring trespasser and faint detection. International Journal of Image Processing (IJIP), 4 (6). pp. 518-538. ISSN 1985-2304

Yaacob, Asrul H. and Ahmad, Nazrul M. and Fauzi, Ridza and Shikh, M. Shahir A. Majed (2011) IKE authentication using certificateless signature. In: The International Conference on Information Networking 2011 (ICOIN2011). IEEE Xplore, pp. 447-452. ISBN 978-1-61284-661-3

Yau, W. C. and Goi, B. M. and Heng, S. H. and Phan, R. C. (2011) Proxy re-encryption with keyword search: New definitions and algorithms with proofs. International Journal of Security and Its Applications, 5 (2). pp. 75-90. ISSN 1738-9984

Yau, Wei-Chuen and Phan, Raphael C. -W. and Goi, Bok-Min and Heng, Swee-Huay (2011) Cryptanalysis of a provably secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement protocol of CANS ’09. In: Cryptology and Network Security. Lecture Notes in Computer Science (7092). Springer Berlin Heidelberg, pp. 172-184. ISBN 978-3-642-25512-0

This list was generated on Wed Apr 17 07:05:29 2024 +08.