Collection's Items (Sorted by Submit Date in Descending order): 1801 to 1820 of 2844
| Issue Date | Title | Author(s) |
| 2015 | Design, development, and fabrication of a 6 DOF humanoid welding robot manipulator | Hajjaj, S.S.H. ; Khonbreh, M. |
| 2013 | Design and development an insect-inspired humanoid gripper that is structurally sound, yet very flexible | Hajjaj, S. ; Pun, N. |
| 2014 | Review of research in the area of agriculture mobile robots | Hajjaj, S.S.H. ; Sahari, K.S.M. |
| 2017 | Establishing remote networks for ROS applications via Port Forwarding: A detailed tutorial | Hajjaj, S.S.H. ; Sahari, K.S.M. |
| 2013 | Investigation of voltage swell mitigation using STATCOM | Razak, N.A.A. ; Jaafar, S. ; Hussain, I.S. |
| 2017 | Linking knowledge and industry needs through problem-based learning in power electronics course | Hussain, I.S. ; Jaafar, S. |
| 2003 | A security architecture for reputation systems | Ismail, R. ; Boyd, C. ; Josang, A. ; Russell, S. |
| 2008 | Congestion avoidance: Network based schemes solution | Shaii, A.Q. ; Ismail, R. ; Jais, J. ; Manan, J. |
| 2007 | A survey of trust and reputation systems for online service provision | Jøsang, A. ; Ismail, R. ; Boyd, C. |
| 2009 | A review on extended role based access control (E-RBAC) model in pervasive computing environment | Bakar, A.A. ; Ismail, R. ; Jais, J. ; Manan, J.-L.A. |
| 2009 | Forming trust in mobile ad -hoc network | Abu Bakar, A. ; Ismail, R. ; Jais, J. ; Abdul Manan, J.-L. |
| 2009 | A routing protocol based on trusted and shortest path selection for mobile ad hoc network | Jassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. |
| 2009 | Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks | Bakar, A.A. ; Ismail, R. ; Ahmad, A.R. ; Abdul Manan, J.-L. ; Jais, J. |
| 2010 | Trust formation based on subjective logic and PGP web-of-trust for information sharing in mobile ad-hoc network | Bakar, A.A. ; Ahmad, A.R. ; Manan, J.-L.A. ; Ismail, R. |
| 2009 | Group Based Access Control scheme (GBAC): Keeping information sharing secure in mobile ad-hoc environment | Bakar, A.A. ; Ismail, R. ; Ahmad, A.R. ; Manan, J.-L.A. ; Jais, J. |
| 2010 | Adopting hadith verification techniques in to digital evidence authentication | Yusoff, Y. ; Ismail, R. ; Hassan, Z. |
| 2012 | Representing e-mail semantically for automated ontology building | Beseiso, M. ; Ahmad, A.R. ; Ismail, R. |
| 2011 | An Arabic language framework for semantic web | Beseiso, M. ; Ahmad, A.R. ; Ismail, R. |
| 2012 | Subjective trust model for mobile ad-hoc network in emergency environment | Abu Bakar, A. ; Ismail, R. ; Ahmad, A.R. ; Abdul Manan, J.-L. |
| 2013 | Multilingual Ontology Learning Algorithm for Emails | Beseiso, M. ; Ahmad, A.R. ; Ismail, R. ; Taher, M. |
Collection's Items (Sorted by Submit Date in Descending order): 1801 to 1820 of 2844