Follow
Salina Mohd Asi
Salina Mohd Asi
School of Computer and Communication Engineering
Verified email at unimap.edu.my
Title
Cited by
Cited by
Year
Three-dimensional quantitative evaluation of facial morphology in adults with unilateral cleft lip and palate, and patients without clefts
SA Othman, R Ahmad, SM Asi, NH Ismail, ZAA Rahman
British Journal of Oral and Maxillofacial Surgery 52 (3), 208-213, 2014
692014
Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers,''
SZS Idrus, SA Aljunid, SM Asi, S Sudin, RB Ahmad
IJCSNS International Journal of Computer Science and Network Security 8 (1 …, 2008
562008
Performance Analysis of Needleman-Wunsch algorithm (global) and Smith-Waterman algorithm (local) in reducing search space and time for DNA sequence alignment
FN Muhamad, RB Ahmad, SM Asi, MN Murad
Journal of Physics: Conference Series 1019 (1), 012085, 2018
172018
Automatic craniofacial anthropometry landmarks detection and measurements for the orbital region
SM Asi, NH Ismail, R Ahmad, EI Ramlan, ZAA Rahman
Procedia Computer Science 42, 372-377, 2014
72014
Validity and reliability evaluation of data acquisition using Vectra 3D compare to direct method
SM Asi, NH Ismail, ZAA Rahman
2012 IEEE-EMBS Conference on Biomedical Engineering and Sciences, 883-887, 2012
72012
Reducing the Search Space and Time Complexity of Needleman-Wunsch Algorithm (Global Alignment) and Smith-Waterman Algorithm (Local Algorithm) for DNA Sequence Alignment
FN Muhamad, R Ahmad, SM Asi, M Murad
School of Computer and Communication Engineering, 2011
72011
Low-End Embedded Linux Platform for Network Security Application–Port Scanning Detector
N Ahmed, ZIA Khalib, RB Ahmad, S Sudin, S Asi
2008 International Conference on Advanced Computer Theory and Engineering …, 2008
52008
Eye Corners Detection using HAAR Cascade Classifiers in Controlled Environment
SM Asi, NH Ismail, R Ahmad, EI Ramlan, ZAA Rahman
Journal of Engineering and Technology (JET) 5 (1), 69-76, 2014
22014
Performance Evaluation of Encryption Algorithms' Key Length Size on Web Browsers
SZS Idrus, SA Aljunid, SM Asi, S Sudin
International Journal of Computer Science and Network Security 12 (5), 10-13, 2012
22012
Web-Based Portable Network Traffic Monitoring System Based on Embedded Linux and SBC
M Rahman, ZIA Khalib, RB Ahmad, SM Asi
2009 International Conference on Future Computer and Communication, 310-313, 2009
22009
Embedded port scanner (epss) system using linux and single board computer
N Ahmed, ZIA Khalib, RB Ahmed, WM Ghossoon, S Sudin, S Asi
2008 International Conference on Electronic Design, 1-5, 2008
22008
Low-End Embedded Linux Platform for Network Security Application–Smurf Based Attack Detection
N Ahmed, ZIA Khalib, RB Ahmad, S Sudin, S Asi, Y Laalaoui
IJCSNS 8 (11), 1, 2008
12008
Development of a Framework for Autonomous 3-Dimensional Craniofacial Anthropometric Data Acquisition
SM Asi
PQDT-Global, 2018
2018
Embedded Intrusion Prevention System (eIPS) on linux-based single board computer in e-commerce security
S Sudin, Z Abdul Khatib, S Asi, RB Ahmad, AN Che Rosli
2006
Memodelkan Kepakaran Permasalahan Anatomi Manusia Berdasarkan Pangkalan Kes
S MOHD ASI
Universiti Teknologi Malaysia, 1995
1995
Portable Network Acquisition System using Single Board Computer & GNU/Linux
MM Rahman, RB Ahmad, SM Asi, ZIA Khalib, WMA Mamat, ANC Rosli
ESSENTIAL FEATURES AND DATA PATTERN OF NON-DESTRUCTIVE MANGO RIPENESS CLASSIFICATION
N Helmee, YM Yacob, SM Asi, NAH Zahri, RSM Farook, Z Husin, ...
The system can't perform the operation now. Try again later.
Articles 1–17