Search Results - "Robiah, Y."

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Arsenic toxicity, health hazards and removal techniques from water: an overview by Choong, Thomas S.Y., Chuah, T.G., Robiah, Y., Gregory Koay, F.L., Azni, I.

    Published in Desalination (05-11-2007)
    “…Arsenic contamination in water, especially groundwater, has been recognized as a major problem of catastrophic proportions. The toxicology and health hazard…”
    Get full text
    Journal Article
  2. 2

    Biomass as the Renewable Energy Sources in Malaysia: An Overview by Chuah, T.G., Wan Azlina, A.G. K., Robiah, Y., Omar, R.

    Published in International journal of green energy (01-09-2006)
    “…Past and current economic growths of Malaysia have been primarily energized by fossil fuels. Malaysia has very substantial potential for biomass energy…”
    Get full text
    Journal Article
  3. 3

    Crude palm oil as a bioadditive in polypropylene blown film by Jusoh, Emiliana R., Ismail, M. Halim Shah, Abdullah, Luqman C., Y., Robiah, Wan Abdul Rahman, W. A.

    Published in Bioresources (07-01-2012)
    “…Growing public concern about environment and potential risks to health in the polymer and plasticizer industry promises to increase the market for a safer…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System by M.A., Faizal, M., Mohd Zaki, Sahib, Shahrin, Y., Robiah, S., Siti Rahayu, Y., Asrul Hadi

    “…In recent years network attack are easily launch since the tools to execute the attack are freely available on the Internet. Even the script kiddies can…”
    Get full text
    Conference Proceeding
  6. 6

    An improved traditional worm attack pattern by Robiah, Y, Rahayu, S S, Sahib, S, Zaki, M M, Faizal, M A, Marliza, R

    “…The significant threats of traditional worms such as Blaster, Sasser, Code Red and Slammer are still continuing due to their hasty spreading nature on the…”
    Get full text
    Conference Proceeding
  7. 7

    CRUDE PALM OIL AS A BIOADDITIVE IN POLYPROPYLENE BLOWN FILMS by Emiliana Rose Jusoh, Mohd Halim Shah Ismail, Luqman Chuah Abdullah, Robiah Yunus, Wan Aizan Wan Abdul Rahman

    Published in Bioresources (01-01-2012)
    “…Growing public concern about environment and potential risks to health in the polymer and plasticizer industry promises to increase the market for a safer…”
    Get full text
    Journal Article
  8. 8

    Single and binary adsorptions isotherms of Cd(II) and Zn(II) on palm kernel shell based activated carbon by Muhammad, Chuah, T.G., Robiah, Yunus, Suraya, A.R., Choong, T.S.Y.

    Published in Desalination and water treatment (01-05-2011)
    “…A batch adsorption study was conducted to investigate the suitability of palm kernel shell (PKS)-based activated carbon for the removal of cadmium and zinc…”
    Get full text
    Journal Article
  9. 9

    Plasmodium berghei: eosinophilic depression of infection in mice by Zainal-Abidin, B A, Robiah, Y, Ismail, G

    Published in Experimental parasitology (01-01-1984)
    “…The effects of eosinophilia on the course of Plasmodium berghei infection in mice were studied. Eosinophilia was induced by intravenous injection of Ascaris…”
    Get more information
    Journal Article
  10. 10

    Advanced Trace Pattern For Computer Intrusion Discovery by Rahayu, S. Siti, Robiah, Y, Shahrin, S, Zaki, M. Mohd, Faizal, M. A, Zaheera, Z. A

    Published 23-06-2010
    “…Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617 The number of crime committed based on the malware intrusion is never ending as the…”
    Get full text
    Journal Article
  11. 11

    Scenario Based Worm Trace Pattern Identification Technique by Rahayu, S. Siti, Robiah, Y, Shahrin, S, Zaki, Mohd M, Irda, R, Faizal, M. A

    Published 08-02-2010
    “…International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 1-9, January 2010, USA The number of malware variants is growing…”
    Get full text
    Journal Article
  12. 12

    New Multi-step Worm Attack Model by Robiah, Y, Rahayu, S. Siti, Shahrin, S, Faizal, M. A, Zaki, M. Mohd, Marliza, R

    Published 20-01-2010
    “…Journal of Computing, Vol. 2, Issue 1, January 2010 The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable…”
    Get full text
    Journal Article
  13. 13

    A New Generic Taxonomy on Hybrid Malware Detection Technique by Robiah, Y, Rahayu, S. Siti, Zaki, M. Mohd, Shahrin, S, Faizal, M. A, Marliza, R

    Published 26-09-2009
    “…Robiah Y, Siti Rahayu S., Mohd Zaki M, Shahrin S., Faizal M. A., Marliza R., International Journal of Computer Science and Information Security, IJCSIS, Vol…”
    Get full text
    Journal Article
  14. 14

    Tracing Technique for Blaster Attack by S, Siti Rahayu, Y, Robiah, S, Shahrin, A, Faizal M, M, Mohd Zaki, R, Irda

    Published 25-08-2009
    “…International Journal of Computer Science and Information Security, IJCSIS, Volume 4, No. 1, August 2009, USA Blaster worm of 2003 is still persistent, the…”
    Get full text
    Journal Article
  15. 15

    Threshold Verification Technique for Network Intrusion Detection System by Faizal, M. A, Zaki, M. Mohd, Shahrin, S, Robiah, Y, Rahayu, S. Siti, Nazrulazhar, B

    Published 21-06-2009
    “…IJCSIS Vol.2, No.1, June 2009 Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the…”
    Get full text
    Journal Article