Three-dimensional quantitative evaluation of facial morphology in adults with unilateral cleft lip and palate, and patients without clefts SA Othman, R Ahmad, SM Asi, NH Ismail, ZAA Rahman British Journal of Oral and Maxillofacial Surgery 52 (3), 208-213, 2014 | 69 | 2014 |
Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers,'' SZS Idrus, SA Aljunid, SM Asi, S Sudin, RB Ahmad IJCSNS International Journal of Computer Science and Network Security 8 (1 …, 2008 | 56 | 2008 |
Performance Analysis of Needleman-Wunsch algorithm (global) and Smith-Waterman algorithm (local) in reducing search space and time for DNA sequence alignment FN Muhamad, RB Ahmad, SM Asi, MN Murad Journal of Physics: Conference Series 1019 (1), 012085, 2018 | 17 | 2018 |
Automatic craniofacial anthropometry landmarks detection and measurements for the orbital region SM Asi, NH Ismail, R Ahmad, EI Ramlan, ZAA Rahman Procedia Computer Science 42, 372-377, 2014 | 7 | 2014 |
Validity and reliability evaluation of data acquisition using Vectra 3D compare to direct method SM Asi, NH Ismail, ZAA Rahman 2012 IEEE-EMBS Conference on Biomedical Engineering and Sciences, 883-887, 2012 | 7 | 2012 |
Reducing the Search Space and Time Complexity of Needleman-Wunsch Algorithm (Global Alignment) and Smith-Waterman Algorithm (Local Algorithm) for DNA Sequence Alignment FN Muhamad, R Ahmad, SM Asi, M Murad School of Computer and Communication Engineering, 2011 | 7 | 2011 |
Low-End Embedded Linux Platform for Network Security Application–Port Scanning Detector N Ahmed, ZIA Khalib, RB Ahmad, S Sudin, S Asi 2008 International Conference on Advanced Computer Theory and Engineering …, 2008 | 5 | 2008 |
Eye Corners Detection using HAAR Cascade Classifiers in Controlled Environment SM Asi, NH Ismail, R Ahmad, EI Ramlan, ZAA Rahman Journal of Engineering and Technology (JET) 5 (1), 69-76, 2014 | 2 | 2014 |
Performance Evaluation of Encryption Algorithms' Key Length Size on Web Browsers SZS Idrus, SA Aljunid, SM Asi, S Sudin International Journal of Computer Science and Network Security 12 (5), 10-13, 2012 | 2 | 2012 |
Web-Based Portable Network Traffic Monitoring System Based on Embedded Linux and SBC M Rahman, ZIA Khalib, RB Ahmad, SM Asi 2009 International Conference on Future Computer and Communication, 310-313, 2009 | 2 | 2009 |
Embedded port scanner (epss) system using linux and single board computer N Ahmed, ZIA Khalib, RB Ahmed, WM Ghossoon, S Sudin, S Asi 2008 International Conference on Electronic Design, 1-5, 2008 | 2 | 2008 |
Low-End Embedded Linux Platform for Network Security Application–Smurf Based Attack Detection N Ahmed, ZIA Khalib, RB Ahmad, S Sudin, S Asi, Y Laalaoui IJCSNS 8 (11), 1, 2008 | 1 | 2008 |
Development of a Framework for Autonomous 3-Dimensional Craniofacial Anthropometric Data Acquisition SM Asi PQDT-Global, 2018 | | 2018 |
Embedded Intrusion Prevention System (eIPS) on linux-based single board computer in e-commerce security S Sudin, Z Abdul Khatib, S Asi, RB Ahmad, AN Che Rosli | | 2006 |
Memodelkan Kepakaran Permasalahan Anatomi Manusia Berdasarkan Pangkalan Kes S MOHD ASI Universiti Teknologi Malaysia, 1995 | | 1995 |
Portable Network Acquisition System using Single Board Computer & GNU/Linux MM Rahman, RB Ahmad, SM Asi, ZIA Khalib, WMA Mamat, ANC Rosli | | |
ESSENTIAL FEATURES AND DATA PATTERN OF NON-DESTRUCTIVE MANGO RIPENESS CLASSIFICATION N Helmee, YM Yacob, SM Asi, NAH Zahri, RSM Farook, Z Husin, ... | | |