default search action
Mohd Yamani Idna Bin Idris
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j68]Kimchai Yeow, Mohd Yamani Idna Bin Idris, Abdullah Gani, Ismail Ahmedy, Saqib Hakak:
BRAPTOR: An efficient method for instant asset-transfer and generic application in blockchain. Comput. Electr. Eng. 120: 109636 (2024) - [j67]Mohd Yamani Idna Bin Idris, Ismail Ahmedy, Tey Kok Soon, Muktar Yahuza, Abubakar Bello Tambuwal, Usman Ali:
Cognitive radio and machine learning modalities for enhancing the smart transportation system: A systematic literature review. ICT Express 10(4): 693-734 (2024) - [j66]Tarak Nandy, Rafidah Md Noor, Raenu Kolandaisamy, Mohd Yamani Idna Bin Idris, Sananda Bhattacharyya:
A review of security attacks and intrusion detection in the vehicular networks. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101945 (2024) - [j65]Madihah Mohd Saudi, Muhammad Afif Husainiamer, Azuan Ahmad, Mohd Yamani Idna Bin Idris:
iOS mobile malware analysis: a state-of-the-art. J. Comput. Virol. Hacking Tech. 20(4): 533-562 (2024) - 2023
- [j64]T. Rehannara Beegum, Mohd Yamani Idna Bin Idris, Mohamad Nizam Bin Ayub, Hisham A. Shehadeh:
Optimized Routing of UAVs Using Bio-Inspired Algorithm in FANET: A Systematic Review. IEEE Access 11: 15588-15622 (2023) - [j63]Mohamud Ahmed Jimale, Nor Aniza Abdullah, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Muhammad Reza Z'aba, Norziana Jamil, Mohd Saufy Rohmad:
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection. IEEE Access 11: 59661-59674 (2023) - [j62]Noor Jamaliah Ibrahim, Mohd Yamani Idna Bin Idris, Mohd. Yakub Zulkifli Bin Mohd. Yusoff, Roziana Ramli, Raja Jamilah Raja Yusof:
The Study of Malay's Prosodic Features Impact on Classical Arabic Accents Recognition. IEEE Access 11: 94589-94612 (2023) - [j61]Usman Ali, Mohd Yamani Idna Bin Idris, Jaroslav Frnda, Mohamad Nizam Bin Ayub, Muhammad Asghar Khan, Nauman Khan, T. Rehannara Beegum, Ahmed Abdulhadi Jasim, Insaf Ullah, Mohammad Babar:
Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for Internet of Things environment. Internet Things 24: 100923 (2023) - [c11]Shahin Hasan, Raja Jamilah Raja Yusof, Hazrina Sofian, Rodina Binti Ahmad, Nazean Jomhari, Asmiza Abdul Sani, Siti Hafizah Ab Hamid, Azah Anir Norman, Unaizah Hanum Obaidellah, Saaidal Razalli Azzuhri, Mohd Yamani Idna Bin Idris:
Preliminary Study for Identifying Personnel for Innovative Software Engineering Project. EDUCON 2023: 1-5 - 2022
- [j60]Hadi Naghavipour, Tey Kok Soon, Mohd Yamani Idna Bin Idris, Morteza Namvar, Rosli Bin Salleh, Abdullah Gani:
Hybrid Metaheuristics for QoS-Aware Service Composition: A Systematic Mapping Study. IEEE Access 10: 12678-12701 (2022) - [j59]Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad:
Authenticated Encryption Schemes: A Systematic Review. IEEE Access 10: 14739-14766 (2022) - [j58]Utpal Kumar Das, Kok Soon Tey, Mohd Yamani Idna Bin Idris, Saad Mekhilef, Mehdi Seyedmahmoudian, Alex Stojcevski, Ben Horan:
Optimized Support Vector Regression-Based Model for Solar Power Generation Forecasting on the Basis of Online Weather Reports. IEEE Access 10: 15594-15604 (2022) - [j57]Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad:
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces. IEEE Access 10: 50819-50838 (2022) - [j56]Bryan Raj, Ismail Ahmedy, Mohd Yamani Idna Bin Idris, Rafidah Md. Noor:
A Hybrid Sperm Swarm Optimization and Genetic Algorithm for Unimodal and Multimodal Optimization Problems. IEEE Access 10: 109580-109596 (2022) - [j55]Hadi Naghavipour, Mohd Yamani Idna Bin Idris, Tey Kok Soon, Rosli Bin Salleh, Abdullah Gani:
Hybrid Metaheuristics Using Rough Sets for QoS-Aware Service Composition. IEEE Access 10: 112609-112628 (2022) - [j54]Salmah Fattah, Ismail Ahmedy, Mohd Yamani Idna Bin Idris, Abdullah Gani:
Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks. Int. J. Distributed Sens. Networks 18(9): 155013292211235 (2022) - [j53]Nor Bakiah Abd Warif, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Abdul Wahab, Nor Syahidatul Nadiah Binti Ismail, Rosli Salleh:
A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review. Multim. Tools Appl. 81(11): 15171-15203 (2022) - [j52]Shapla Khanam, Ismail Ahmedy, Mohd Yamani Idna Bin Idris, Mohamed Hisham Jaward:
Towards an Effective Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things (IoT). Sensors 22(15): 5822 (2022) - [j51]M. A. Manazir Ahsan, Ihsan Ali, Muhammad Imran, Mohd Yamani Idna Bin Idris, Suleman Khan, Anwar Khan:
A Fog-Centric Secure Cloud Storage Scheme. IEEE Trans. Sustain. Comput. 7(2): 250-262 (2022) - [j50]Nura Modi Shagari, Rosli Bin Salleh, Ismail Ahmedy, Mohd Yamani Idna Bin Idris, Ghulam Murtaza, Usman Ali, Salisu Modi:
A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism. Wirel. Networks 28(5): 2077-2104 (2022) - 2021
- [j49]Muhammad Asif Hasan, Norli Anida Abdullah, Mohammad Mustaneer Rahman, Mohd Yamani Idna Bin Idris, Omar F. Tawfiq:
Dental Impression Tray Selection From Maxillary Arch Images Using Multi-Feature Fusion and Ensemble Classifier. IEEE Access 9: 30573-30586 (2021) - [j48]Muktar Yahuza, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Abdul Wahab, Tarak Nandy, Ismail Bin Ahmedy, Roziana Ramli:
An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network. IEEE Access 9: 31420-31440 (2021) - [j47]Usman Ali, Mohd Yamani Idna Bin Idris, Mohamad Nizam Bin Ayub, Insaf Ullah, Ihsan Ali, Tarak Nandy, Muktar Yahuza, Nauman Khan:
RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption. IEEE Access 9: 49942-49959 (2021) - [j46]Muktar Yahuza, Mohd Yamani Idna Bin Idris, Ismail Bin Ahmedy, Ainuddin Wahid Abdul Wahab, Tarak Nandy, Noorzaily Mohamed Noor, Abubakar Bala:
Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges. IEEE Access 9: 57243-57270 (2021) - [j45]Tarak Nandy, Mohd Yamani Idna Bin Idris, Rafidah Md Noor, Ashok Kumar Das, Xiong Li, Norjihan Binti Abdul Ghani, Sananda Bhattacharyya:
An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network. Comput. Commun. 177: 57-76 (2021) - [j44]Ahmed Abdulhadi Jasim, Mohd Yamani Idna Bin Idris, Saaidal Razalli Azzuhri, Noor Riyadh Issa, Muhammad Towfiqur Rahman, Muhammad Farris b Khyasudeen:
Energy-Efficient Wireless Sensor Network with an Unequal Clustering Protocol Based on a Balanced Energy Method (EEUCB). Sensors 21(3): 784 (2021) - [j43]M. A. Manazir Ahsan, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris, Suleman Khan, Eric Bachura, Kim-Kwang Raymond Choo:
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics. IEEE Trans. Sustain. Comput. 6(2): 184-196 (2021) - [j42]Prashant Shrivastava, Kok Soon Tey, Mohd Yamani Idna Bin Idris, Saad Mekhilef, Syed Bahari Ramadzan Syed Adnan:
Combined State of Charge and State of Energy Estimation of Lithium-Ion Battery Using Dual Forgetting Factor-Based Adaptive Extended Kalman Filter for Electric Vehicle Applications. IEEE Trans. Veh. Technol. 70(2): 1200-1215 (2021) - [j41]Nura Modi Shagari, Mohd Yamani Idna Bin Idris, Rosli Bin Salleh, Ismail Ahmedy, Ghulam Murtaza, Aznul Qalid Md Sabri:
A hybridization strategy using equal and unequal clustering schemes to mitigate idle listening for lifetime maximization of wireless sensor network. Wirel. Networks 27(4): 2641-2670 (2021) - 2020
- [j40]Nura Modi Shagari, Mohd Yamani Idna Bin Idris, Rosli Bin Salleh, Ismail Ahmedy, Ghulam Murtaza, Hisham A. Shehadeh:
Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network. IEEE Access 8: 12232-12252 (2020) - [j39]Reza Mashayekhi, Mohd Yamani Idna Bin Idris, Mohammad Hossein Anisi, Ismail Ahmedy:
Hybrid RRT: A Semi-Dual-Tree RRT-Based Motion Planner. IEEE Access 8: 18658-18668 (2020) - [j38]Reza Mashayekhi, Mohd Yamani Idna Bin Idris, Mohammad Hossein Anisi, Ismail Ahmedy, Ihsan Ali:
Informed RRT*-Connect: An Asymptotically Optimal Single-Query Path Planning Method. IEEE Access 8: 19842-19852 (2020) - [j37]Muktar Yahuza, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Anthony T. S. Ho, Suleman Khan, Siti Nurmaya Binti Musa, Azni Zarina Binti Taha:
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities. IEEE Access 8: 76541-76567 (2020) - [j36]Shapla Khanam, Ismail Bin Ahmedy, Mohd Yamani Idna Bin Idris, Mohamed Hisham Jaward, Aznul Qalid Md Sabri:
A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things. IEEE Access 8: 219709-219743 (2020) - [j35]Roziana Ramli, Mohd Yamani Idna Bin Idris, Khairunnisa Hasikin, Noor Khairiah A. Karim, Ainuddin Wahid Abdul Wahab, Ismail Ahmedy, Fatimah Ahmedy, Hamzah Arof:
Local descriptor for retinal fundus image registration. IET Comput. Vis. 14(4): 144-153 (2020) - [j34]M. A. Manazir Ahsan, Ihsan Ali, Mohd Yamani Idna Bin Idris, Muhammad Imran, Muhammad Shoaib:
Countering Statistical Attacks in Cloud-Based Searchable Encryption. Int. J. Parallel Program. 48(3): 470-495 (2020) - [j33]M. A. Manazir Ahsan, Ihsan Ali, Mohd Yamani Idna Bin Idris, Muhammad Imran, Muhammad Shoaib:
Correction to: Countering Statistical Attacks in Cloud-Based Searchable Encryption. Int. J. Parallel Program. 48(3): 580 (2020) - [j32]Maryam Asadzadeh Kaljahi, Palaiahnakote Shivakumara, Saqib Hakak, Mohd Yamani Idna Bin Idris, Mohammad Hossein Anisi, Deepu Rajan:
Saliency-based bit plane detection for network applications. Multim. Tools Appl. 79(25-26): 18495-18513 (2020) - [j31]Fawad Ali Khan, Rafidah Md Noor, Miss Laiha Mat Kiah, Ismail Ahmedy, Mohd Yamani Idna Bin Idris, Tey Kok Soon, Muneer Ahmad:
Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things. Sensors 20(1): 283 (2020) - [j30]Salmah Fattah, Abdullah Gani, Ismail Ahmedy, Mohd Yamani Idna Bin Idris, Ibrahim Abaker Targio Hashem:
A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges. Sensors 20(18): 5393 (2020) - [j29]Hisham A. Shehadeh, Mohd Yamani Idna Bin Idris, Ismail Ahmedy, Hani Ragab Hassen:
Optimal Placement of Near Ground VHF/UHF Radio Communication Network as a Multi Objective Problem. Wirel. Pers. Commun. 110(3): 1169-1197 (2020) - [c10]Mohammad Asif Hossain, Ismail Ahmedy, Muhammad Zar Mohd. Zaid Harith, Mohd Yamani Idna Bin Idris, Tey Kok Soon, Rafidah Md Noor, Sumiani Binti Yusoff:
Route Optimization by using Dijkstra's Algorithm for the Waste Management System. ICISS 2020: 110-114 - [c9]Tarak Nandy, Mohd Yamani Idna Bin Idris, Rafidah Md Noor, Ismail Ahmedy, Sananda Bhattacharyya:
An Enhanced Two-factor Authentication Protocol for V2V Communication in VANETs. ICISS 2020: 171-176
2010 – 2019
- 2019
- [j28]Tarak Nandy, Mohd Yamani Idna Bin Idris, Rafidah Md Noor, Miss Laiha Mat Kiah, Sian Lun Lau, Nor Badrul Annuar Juma'at, Ismail Ahmedy, Norjihan Binti Abdul Ghani, Sananda Bhattacharyya:
Review on Security of Internet of Things Authentication Mechanism. IEEE Access 7: 151054-151089 (2019) - [j27]Ahmed Abdulhadi Jasim, Mohd Yamani Idna Bin Idris, Saaidal Razalli Azzuhri, Noor Riyadh Issa, Noorzaily Bin Mohamed Noor, Jagadeesh Kakarla, Iraj Sadegh Amiri:
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model. IEEE Access 7: 164327-164343 (2019) - [j26]Maryam Asadzadeh Kaljahi, Palaiahnakote Shivakumara, Mohd Yamani Idna Bin Idris, Mohammad Hossein Anisi, Tong Lu, Michael Blumenstein, Noorzaily Mohamed Noor:
An automatic zone detection system for safe landing of UAVs. Expert Syst. Appl. 122: 319-333 (2019) - [j25]Saqib Hakak, Amirrudin Kamsin, Omar Tayan, Mohd Yamani Idna Bin Idris, Gulshan Amin Gilkar:
Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges. Inf. Process. Manag. 56(2): 367-380 (2019) - [j24]Maryam Asadzadeh Kaljahi, Palaiahnakote Shivakumara, Mohd Yamani Idna Bin Idris, Mohammad Hossein Anisi, Michael Blumenstein:
A new image size reduction model for an efficient visual sensor network. J. Vis. Commun. Image Represent. 63 (2019) - [j23]Maryam Asadzadeh Kaljahi, Shivakumara Palaiahnakote, Mohammad Hossein Anisi, Mohd Yamani Idna Bin Idris, Michael Blumenstein, Muhammad Khurram Khan:
A scene image classification technique for a ubiquitous visual surveillance system. Multim. Tools Appl. 78(5): 5791-5818 (2019) - [j22]Ahsiah Ismail, Mohd Yamani Idna Bin Idris, Mohamad Nizam Ayub, Lip Yee Por:
Investigation of Fusion Features for Apple Classification in Smart Manufacturing. Symmetry 11(10): 1194 (2019) - [j21]Lip Yee Por, Lateef Adekunle Adebimpe, Mohd Yamani Idna Bin Idris, Chee Siong Khaw, Chin Soon Ku:
LocPass: A Graphical Password Method to Prevent Shoulder-Surfing. Symmetry 11(10): 1252 (2019) - 2018
- [j20]Mohamad Nazrin Napiah, Mohd Yamani Idna Bin Idris, Roziana Ramli, Ismail Ahmedy:
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol. IEEE Access 6: 16623-16638 (2018) - [j19]Abdel-Rahiem A. Hashem, Mohd Yamani Idna Bin Idris, Abd El-Baset A. Ahmad:
Comparative study of different binarization methods through their effects in characters localization in scene images. Data Knowl. Eng. 117: 216-224 (2018) - [j18]Muhammad Zar Mohd. Zaid Harith, Noorzaily Mohamed Noor, Mohd Yamani Idna Bin Idris, Emran Mohd Tamil:
Intersection and Complement Set (IACS) Method to Reduce Redundant Node in Mobile WSN Localization. Sensors 18(7): 2344 (2018) - [j17]Ahsiah Ismail, Mohd Yamani Idna Bin Idris, Mohamad Nizam Ayub, Lip Yee Por:
Vision-Based Apple Classification for Smart Manufacturing. Sensors 18(12): 4353 (2018) - [j16]Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Anthony T. S. Ho, Ki-Hyun Jung:
Image steganography in spatial domain: A survey. Signal Process. Image Commun. 65: 46-66 (2018) - [j15]M. A. Manazir Ahsan, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Ihsan Ali, Nawsher Khan, Mohammed Ali Al-Garwi, Atiq Ur Rahman:
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme. Symmetry 10(5): 161 (2018) - [c8]Saqib Hakak, Amirrudin Kamsin, Palaiahnakote Shivakumara, Omar Tayan, Mohd Yamani Idna Bin Idris, Gulshan Amin Gilkar:
An Efficient Text Representation for Searching and Retrieving Classical Diacritical Arabic Text. ACLING 2018: 150-157 - [c7]Hisham A. Shehadeh, Ismail Ahmedy, Mohd Yamani Idna Bin Idris:
Sperm Swarm Optimization Algorithm for Optimizing Wireless Sensor Network Challenges. ICCBN 2018: 53-59 - [c6]Hisham A. Shehadeh, Ismail Ahmedy, Mohd Yamani Idna Bin Idris:
Empirical Study of Sperm Swarm Optimization Algorithm. IntelliSys (2) 2018: 1082-1104 - 2017
- [j14]Saqib Hakak, Amirrudin Kamsin, Omar Tayan, Mohd Yamani Idna Bin Idris, Abdullah Gani, Saber Zerdoumi:
Preserving Content Integrity of Digital Holy Quran: Survey and Open Challenges. IEEE Access 5: 7305-7325 (2017) - [j13]Ammar M. A. Abu znaid, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Abdul Wahab, Liana Khamis Qabajeh, Omar Adil Mahdi:
Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review. J. Sensors 2017: 1430145:1-1430145:19 (2017) - [j12]Nor Bakiah Abd Warif, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Rosli Salleh, Fazidah Othman:
SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack. J. Vis. Commun. Image Represent. 46: 219-232 (2017) - [j11]Hisham A. Shehadeh, Mohd Yamani Idna Bin Idris, Ismail Ahmedy:
Multi-Objective Optimization Algorithm Based on Sperm Fertilization Procedure (MOSFP). Symmetry 9(10): 241 (2017) - [j10]Ismail Ahmedy, Hisham A. Shehadeh, Mohd Yamani Idna Bin Idris:
An Estimation of QoS for Classified Based Approach and Nonclassified Based Approach of Wireless Agriculture Monitoring Network Using a Network Model. Wirel. Commun. Mob. Comput. 2017 (2017) - [j9]Mohammad Hossein Anisi, Gaddafi Abdul-Salaam, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Abdul Wahab, Ismail Ahmedy:
Energy harvesting and battery power based routing in wireless sensor networks. Wirel. Networks 23(1): 249-266 (2017) - [j8]Ammar M. A. Abu znaid, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Abdul Wahab, Liana Khamis Qabajeh, Omar Adil Mahdi:
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks. Wirel. Networks 23(3): 737-747 (2017) - 2016
- [j7]Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Suleman Khan, Kim-Kwang Raymond Choo:
Chroma key background detection for digital video using statistical correlation of blurring artifact. Digit. Investig. 19: 29-43 (2016) - [j6]Nor Bakiah Abd Warif, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Roziana Ramli, Rosli Salleh, Shahaboddin Shamshirband, Kim-Kwang Raymond Choo:
Copy-move forgery detection: Survey, challenges and future directions. J. Netw. Comput. Appl. 75: 259-278 (2016) - [j5]Omar Adil Mahdi, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Ammar M. A. Abu znaid, Yusor Rafid Bahar Al-Mayouf, Suleman Khan:
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs. J. Sensors 2016: 3428730:1-3428730:12 (2016) - [j4]Omar Adil Mahdi, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Ammar M. A. Abu znaid, Suleman Khan, Yusor Rafid Bahar Al-Mayouf, Nadra Guizani:
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation. Wirel. Commun. Mob. Comput. 16(16): 2663-2676 (2016) - 2015
- [j3]Roziana Ramli, Hamzah Arof, Fatimah Ibrahim, Norrima Mokhtar, Mohd Yamani Idna Bin Idris:
Using finite state machine and a hybrid of EEG signal and EOG artifacts for an asynchronous wheelchair navigation. Expert Syst. Appl. 42(5): 2451-2463 (2015) - 2014
- [j2]Mehdi Jahanirad, Ainuddin Wahid Abdul Wahab, Nor Badrul Anuar, Mohd Yamani Idna Bin Idris, Mohamad Nizam Ayub:
Blind source mobile device identification based on recorded call. Eng. Appl. Artif. Intell. 36: 320-331 (2014) - [c5]Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Mohd Yamani Idna Bin Idris, Suleman Khan, Zaidi Razak, Muhammad Rezal Kamel Ariffin:
Passive video forgery detection techniques: A survey. IAS 2014: 29-34 - 2013
- [j1]Mohd Yamani Idna Bin Idris, Moraali Sivalingam, Emran Mohd Tamil, Zaidi Razak, Noorzaily Mohamed Noor:
Emergency vehicle preemption system based on global positioning system (GPS), A-star (A*) algorithm and FPGA. Comput. Syst. Sci. Eng. 28(3) (2013)
2000 – 2009
- 2009
- [c4]Mohd Yamani Idna Bin Idris, Suraya Abu Bakar, Emran Mohd Tamil, Zaidi Razak, Noorzaily Mohamed Noor:
High-Speed Shortest Path Co-processor Design. Asia International Conference on Modelling and Simulation 2009: 626-631 - 2008
- [c3]Emran Mohd Tamil, Mohd Yamani Idna Bin Idris, Chiew Ming Thong, Madihah Mohd Saudi, Mohd Zalisham Jali:
Needleman Wunsch Implementation for SPAM/UCE Inline Filter. INC 2008: 141-147 - [c2]Madihah Mohd Saudi, Emran Mohd Tamil, Andrea J. Cullen, Mike E. Woodward, Mohd Yamani Idna Bin Idris:
Reverse Engineering: EDOWA Worm Analysis and Classification. World Congress on Engineering (Selected Papers) 2008: 277-288 - 2005
- [c1]Amirrudin Kamsin, Mohd Yamani Idna Bin Idris:
The Use of Virtual Reality in Science Subjects among Form Four to Form Six Students in Malaysia. iiWAS 2005: 313-324
Coauthor Index
aka: Ismail Ahmedy
aka: Ainuddin Wahid Bin Abdul Wahab
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint