Showing
1 - 6
results of
6
for search '
Ahmad, R.B
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Ahmad, R.B
Showing
1 - 6
results of
6
for search '
Ahmad, R.B
'
, query time: 0.11s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Brain Computer Interface: Assessment of Spinal Cord Injury Patient towards Motor Movement through EEG application
by
Syam Syahrull Hi-Fi
,
Lakany Heba
,
Ahmad
R.B
.
,
Conway Bernard A.
Published 2017-01-01
Get full text
Article
2
Comparing Common Average Referencing to Laplacian Referencing in Detecting Imagination and Intention of Movement for Brain Computer Interface
by
Syam Syahrull Hi-Fi
,
Lakany Heba
,
Ahmad
R.B
.
,
Conway Bernard A.
Published 2017-01-01
Get full text
Article
3
A preliminary review on web session hijacking
by
Ahmad
,
R.B
,
Elias, S.J
,
Ismail, N.N.S
,
Warip, M.N.M
Published 2018
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
4
802.11p optimization for delay sensitive in non-safety messages in VANETs
by
Ahmad
,
R.B
,
Darus, M.Y
,
Elias, S.J
,
Elshaikh, M.
,
Warip, M.N.M
Published 2018
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
5
Routing performance of structured overlay in distributed hash tables (DHT) for P2P
by
Ahmad
,
R.B
,
Elias, S.J
,
Kamarudin, N.K
,
Ruslan, R.
,
Zailani, A.S.M
,
Zukri, N.H.M
Published 2019
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
6
Congestion control in vehicular adhoc network: A survey
by
Abdullah, S.
,
Ahmad
,
R.B
,
Darus, M.Y
,
Elias, S.J
,
Hatim, S.M
,
Jasmis, J.
,
Khang, A.W.Y
Published 2019
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Chord
Congestion control (CC)
DHT
Information security
Kademlia
Network optimization
Non-safety applications
P2P
Pastry
Session hijacking
Taguchi method
VANET
Vehicular ad hoc network
Web attack
Web security
Loading...