Cryptography: A new approach of classical Hill cipher MNA Rahman, AFA Abidin, MK Yusof, NSM Usop International Journal of Security and Its Applications 7 (2), 179-190, 2013 | 30 | 2013 |
Achieving of tabu search algorithm for scheduling technique in grid computing using GridSim simulation tool: multiple jobs on limited resource MK Yusof, K Badak, M Stapa Int J Grid Distributed Comput 3 (4), 19-32, 2010 | 18 | 2010 |
Ontology and semantic web approaches for heterogeneous database access MK Yusof, MNA Rahman, MAM Amin International Journal of Database Theory and Application 4 (4), 13-24, 2011 | 15 | 2011 |
A secure private instant messenger MK Yusof, AFA Abidin The 17th Asia Pacific conference on communications, 821-825, 2011 | 14 | 2011 |
Adoption of near field communication in S-Library application for information science MK Yusof, A Abel, MY Saman, MNA Rahman New Library World, 2015 | 9 | 2015 |
Notice of Retraction: High Performance of DOM Technique in XML for Data Retrieval YM Kamir, MAM Atar 2009 International Conference on Information and Multimedia Technology, 303-305, 2009 | 9 | 2009 |
Efficiency of JSON for data retrieval in big data MK Yusof, M Man Indonesian Journal of Electrical Engineering and Computer Science 7 (1), 250-262, 2017 | 8 | 2017 |
Applying time granularity in multimedia data management MNA Rahman, F Mohamed, S Safei, SM Deris, MK Yusof Proceedings of 2010 International Conference on Computational Intelligence …, 2010 | 8 | 2010 |
The Adoption and Implementation of RFID: A Literature Survey. MK Yusof, MY Saman LIBRES: Library & Information Science Research Electronic Journal 26 (1), 2016 | 7 | 2016 |
Efficiency of JSON approach for data extraction and query retrieval MK Yusof, M Man Indonesian Journal of Electrical Engineering and Computer Science, 2016 | 7 | 2016 |
Rules generation for multimedia data classifying usin rough sets theory MNA Rahman, YM Lazim, F Mohamed, SIA Saany, MKM Yusof International Journal of Hybrid Information Technology 6 (5), 209-218, 2013 | 7 | 2013 |
Comparative study of techniques in reducing inconsistent data MK Yusof, A Azlan International Journal of Database Theory and Application 5 (1), 37-46, 2012 | 5 | 2012 |
Architecture for Accessing Heterogeneous Databases MK Yusof, AFA Abidin, MNA Rahman IJ Information Technology and Computer Science 4 (1), 1, 2012 | 3 | 2012 |
Designing a Secure Architecture for Private Instant Messenger Application MK Yusof, SM Usop, AF AmriAbidin International Conference on Computer Science and Information Technology …, 2011 | 3 | 2011 |
Performance Comparison of Wireless Ad Hoc Routing Protocols Ad Hoc On-Demand Distance Vector Routing, Dynamic Source Routing and Destination-Sequenced Distance-Vector AFA Abidin, NSM Usop, MK Yusof | 3 | 2011 |
Comparative study a performance and capability scheduling techniques in grid computing MK Yusof, MA Stapa International Journal on Computer Science & Engineering, 2010 | 3 | 2010 |
Database integration via mediator approach for integrated applications with NFC technology MK Yusof, S Safei, MYM Saman, A Embong Proceedings of the 2nd International Conference on Advances in Computer and …, 2013 | 2 | 2013 |
An architecture for securing a private instant messenger MK Yusof, AFA Abidin, MAM Amin SmartCR 2 (1), 60-70, 2012 | 2 | 2012 |
Designing an architecture for improving web query processing in heterogeneous databases access MK Yusof, AFA Abidin, S Usop, SM Deris Proceedings of the International Conference on Web Intelligence, Mining and …, 2011 | 2 | 2011 |
Improving Web Query Processing through Mapping Algorithm to Data Warehouse for Bioinformatics MK Yusof, AFA Abidin, MSM Deris J Inform Tech Soft Engg 1 (102), 2, 2011 | 2 | 2011 |