Items where Subject is "QA150-272.5 Algebra"
Up a level |
- Library of Congress Subject Areas (36)
- Q Science (36)
- QA Mathematics (36)
- QA150-272.5 Algebra (36)
- QA Mathematics (36)
- Q Science (36)
A
Abd. Aziz, Azlan and Amir Hamzah, Nur Asyiqin and Ab. Ghani, Hadhrami and Abd Hamid, Afiq Naufal and Mahmud, Azwan (2022) A Comparative Study of In-phase and Quadrature (IQ) Imbalance Estimation and Compensation Algorithms for OFDM Receivers. In: 2022 International Conference on Engineering & MIS (ICEMIS), 4-6 July 2022, Istanbul, Turkey.
Ahmad Ghani, Ahmad Noor Hazim and Rahmat, Hawa (2023) Confirmation Bias in Our Opinions on Social Media: A Qualitative Approach. Journal of Communication, Language and Culture, 3 (1). pp. 47-56. ISSN 2805-444X
Ahmed Alhanik, Ahmed Abdullah and Amir Hamzah, Nur Asyiqin and Abas, Fazly Salleh (2021) Interference Mitigation Mechanism For Larg Antenna System With Ant-Colony Based User Grouping Modeling. In: 2nd FET PG Engineering Colloquium Proceedings 2021, 1-15 Dec. 2021, Online Conference. (Unpublished)
Alaghbari, Khaled Ab. Aziz and Rumyantsev, Konstantin and Eltaif, Tawfig and Elmabrok, Osama and Lim, Heng Siong (2021) Adaptive Modulation for Continuous-Variable Quantum Key Distribution With Real Local Oscillators Under Phase Attack. IEEE Photonics Journal, 13 (5). pp. 1-7. ISSN 1943-0647
Alhammadi, Abdulraqeb Shaif Ahmed and Mohamad, Hafizal and Ahmad, Norulhusna and Ergen, Mustafa and Abdullah, Nor Fadzilah and Nordin, Rosdiadee and Ismail, Mahamod and Shayea, Ibraheem (2019) New Weight Function for Adapting Handover Margin Level over Contiguous Carrier Aggregation Deployment Scenarios in LTE-Advanced System. Wireless Personal Communication, 108. pp. 1179-1199. ISSN 0929-6212; eISSN: 1572-834X
B
Bashier, Housam Khalifa and Lau, Siong Hoe and Liew, Tze Hui and Abdullah, Mohd Fikri Azli and Pang, Ying Han and Wee, Kouk Kwee and Sayeed, Md. Shohel (2016) Texture classification via extended local graph structure. Optik - International Journal for Light and Electron Optics, 127 (2). pp. 638-643. ISSN 0030-4026
Buhari, Adamu Muhammad and Ooi, Chee Pun and Baskaran, Vishnu Monn and Phan, Raphael Chung Wei and Wong, Kok Sheik and Tan, Wooi Haw (2022) Invisible emotion magnification algorithm (IEMA) for real-time micro-expression recognition with graph-based features. Multimedia Tools and Applications. pp. 1-26. ISSN 1380-7501; eISSN: 1573-7721
Bukar, Umar Ali and Sayeed, Md. Shohel and Abdul Razak, Siti Fatimah and Yogarayan, Sumendra and Amodu, Oluwatosin Ahmed (2023) An exploratory bibliometric analysis of the literature on the age of information-aware unmanned aerial vehicles aided communication. Informatica, 47 (7). pp. 91-114. ISSN 0350-5596
C
Challaf, Omar and Chua, Sook Ling and Foo, Lee Kien (2023) Trip Itinerary Generation with 2-Opt Algorithm. In: AISS 2022: 2022 4th International Conference on Advanced Information Science and System, 25-27 Nov 2022, Sanya, China.
Chan, Koon Ming and Heng, Swee Huay and Tan, Syh Yuan and Tan, Shing Chiang (2024) Comment on “Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups”. IEEE Access, 12. pp. 91551-91555. ISSN 2169-3536
Cheong, Soon Nyean and Ling, Huo Chong and Teh, Pei Lee (2021) Encrypted Steganography Quick Response Scheme for Unified Hotel Access Control System. In: 2021 IEEE 11th International Conference on System Engineering and Technology (ICSET), 6-6 Nov. 2021, Shah Alam, Malaysia.
Chia, Jason and Chin, Ji Jian and Yip, Sook Chin (2021) OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit Loss. Lecture Notes in Computer Science, 13059. pp. 116-135. ISSN 0302-9743
Chin, Ji Jian and Mohamad, Moesfa Soeheila (2020) Improved Indistinguishability for Searchable Symmetric Encryption. In: Provable and Practical Security. Lecture Notes in Computer Science, 12505 . Springer Science and Business Media Deutschland GmbH, International Conference on Provable Security, pp. 190-212. ISBN 9783030625757
Chin, Ji Jian and Poh, Geong Sen and Mohamad, Moesfa Soeheila (2018) Searchable symmetric encryption over multiple servers. Cryptography and Communications, 10 (1). pp. 139-158. ISSN 1936-2447
G
Geethamma, V. G. and Gopinath, Deepa P. and Daniel, Jacob K. (2021) Complex Numbers and Rhythmic Changes. Resonance, 26 (8). pp. 1059-1080. ISSN 0971-8044
H
Hocquet, Alexandre and Wieber, Frédéric and Gramelsberger, Gabriele and Hinsen, Konrad and Diesmann, Markus and Pasquini Santos, Fernando and Landström, Catharina and Peters, Benjamin and Kasprowicz, Dawid and Borrelli, Arianna and Roth, Phillip and Lee, Clarissa Ai Ling and Olteanu, Alin and Böschen, Stefan (2024) Software in science is ubiquitous yet overlooked. Nature Computational Science. ISSN 2662-8457
J
Jabidin, Hafiz Zulhazmi and Ibrahim@Ghazali, Siti Azlida and Dzulkefly Zan, Mohd Saiful and Musa, Siti Musliha Aishah and Mansoor, Amilia and Ngo, Hong Yeap and Abdul Aziz, Nurul Ain and Choo, Kan Yeep and A. Bakar, Ahmad Ashrif and Mokhtar, Mohd Ridzuan and Tee, Connie and Abdul Rashid, Hairul Azhar (2024) Review on Digital Signal Processing (DSP) Algorithm for Distributed Acoustic Sensing (DAS) for Ground Disturbance Detection. International Journal of Integrated Engineering, 16 (2). pp. 102-113. ISSN 2229-838X
K
Kabir, Sohag and Kumar, Mohit and Tan, Kim Geok and Hossain, Ferdous and Yazdi, Mohammad (2020) A Method for Temporal Fault Tree Analysis Using Intuitionistic Fuzzy Set and Expert Elicitation. IEEE Access, 8. pp. 980-996. ISSN 2169-3536
Kim, Jongsung and Wu, Hongjun and Phan, Raphael Chung Wei (2018) Cryptography and Future Security. Discrete Applied Mathematics, 241. p. 1. ISSN 0166-218X
L
Lokman, Amar and Ramasamy, R. Kanesaraj and Ting, Choo Yee (2023) Scheduling and Predictive Maintenance for Smart Toilet. IEEE Access, 11. pp. 17983-17999. ISSN 2169-3536
M
Mohamad, Moesfa Soeheila and Chin, Ji Jian and Yap, Timothy Tzen Vun (2022) Searchable Symmetric Encryption: Improved Security Model. In: Postgraduate Colloquium December 2022, 1-15 December 2022, Multimedia University, Malaysia. (Submitted)
Mohamad, soeheila and Tan, Syh Yuan and Chin, Ji Jian (2019) Searchable Symmetric Encryption Security Definitions. Malaysian Journal of Mathematical Sciences, 13 (S). pp. 31-47.
N
Ng, Kean Haur and Tan, Saw Chin (2019) Time-Sensitive-Aware Scheduling Traffic (TSA-ST) Algorithm in Software-Defined Networking. Lecture Notes in Computer Science, 11874. pp. 248-259. ISSN 0302-9743
Ng, Yee Hao and Leow, Meng Chew and Yeoh, Chun Yeow (2024) Data analysis on how the renewable energy mitigate climate change. In: 3rd International Conference on Computer, Information Technology, and Intelligent Computing (CITIC2023), 26–28 July 2023, Virtual Conference.
P
Prakasam, P. and Madheswaran, M. and Sujith, K. P. and Sayeed, Md. Shohel (2021) An Enhanced Energy Efficient Lightweight Cryptography Method for various IoT devices. ICT Express. pp. 1-6. ISSN 2405-9595 (In Press)
S
Salagean, Ana and Winter, R. and Mandache-Salagean, Matei and Phan, Raphael Chung Wei (2016) Higher order differentiation over finite fields with applications to generalising the cube attack. Designs, Codes and Cryptography, 84 (3). pp. 425-449. ISSN 0925-1022
Salih, Nbhan D. and Mohd Isa, Wan Noorshahida and Abid, Abdelouahab (2019) An Efficient Method for Hand-Torn Document Reconstruction. International Journal of Engineering Research and Technology, 12 (7). pp. 986-992. ISSN 0974-3154
See, John Su Yang and Li, Yuxi and Lin, Weiyao and Xu, Ning and Xu, Shugong and Yan, Ke and Yang, Cong (2020) CFAD: Coarse-to-Fine Action Detector for Spatiotemporal Action Localization. In: CFAD: Coarse-to-Fine Action Detector for Spatiotemporal Action Localization. Springer Science and Business Media Deutschland GmbH, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 510-527. ISBN 9783030585167
Shahid, Muhammad Asim and Alam, Muhammad Mansoor and Mohd Su'ud, Mazliham (2023) Improved accuracy and less fault prediction errors via modified sequential minimal optimization algorithm. PLOS ONE, 18 (4). e0284209. ISSN 1932-6203
Singh, Ajay Kumar (2019) Modeling of electrical behavior of undoped symmetric Double-Gate (DG) MOSFET using carrier-based approach. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering, 38 (2). ISSN 0332-1649
T
Tso, Chih Ping and Ting, Fung Fung and Sim, Kok Swee and Leong, J. W. (2019) Signal-to-noise Ratio Estimation for SEM Single Image using Cubic Spline Interpolation with Linear Least Square Regression. Engineering Letters, 27 (1). pp. 151-165. ISSN 1816-093X
U
Umelo, Nnamdi Henry and Noordin, Nor Kamariah and Rasid, Mohd Fadlee A. and Tan, Kim Geok and Hashim, Fazirulhisyam (2023) Efficient Tag Grouping RFID Anti-Collision Algorithm for Internet of Things Applications Based on Improved K-Means Clustering. IEEE Access, 11. pp. 11102-11117. ISSN 2169-3536
Y
Yap, Wun She and Heng, Swee Huay and Goi, Bok Min (2018) Security analysis of M-DES and key-based coded permutation ciphers in wireless channels. IET Communications, 12 (10). pp. 1230-1235. ISSN 1751-8628
Yee, Jian Chew and Shih, Yin Ooi and Ying, Han Pang (2020) Experimental Exploratory of Temporal Sampling Forest in Forest Fire Regression and Classification. In: 2020 8th International Conference on Information and Communication Technology (ICoICT), 24.06.2020, Virtual Conference, Yogyakarta, Indonesia.
Yusof, Siti Nabilah and Kamel Ariffin, Muhammad Rezal and Yip, Sook Chin and Lau, Terry Shue Chien and Mahad, Zahari and Chin, Ji Jian and Ting, Choo Yee (2024) A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem. Heliyon, 10 (4). e25470. ISSN 2405-8440
Z
Zaw, Thein Oak Kyaw and Muthaiyah, Saravanan and Sehgar, Malik Manivanan and Arumugam, Ganes Raj Muthu (2023) COVID-19 Contact Tracing Using Low Calibrated Transmission Power from BLE—Approach and Algorithm Experimentation. Lecture Notes in Networks and Systems, 552. pp. 13-31. ISSN 2367-3370