KEY NOTE ADDRESS
Paper Title | Author |
Innovation, Information Technology, Organisational Improvement and Research |
Craig Standing |
Operations Research and Knowledge Modeling in Data Mining | Masato KODA |
ICT – Can It Be An Enabler Of The Knowledge Economy? | Mohamad Salmi Mohd. Sohod |
Paper Title |
Authors |
PID |
Personas based Support Tool for Requirements Elicitation |
Mehrnaz Kazemi Bavani Rodina Ahmad |
|
Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network |
Mohd.Taufiq Norhizat Zulkifli Ishak Mohd Suhaimi Sauti Md Zaini Jamaludin |
|
Design a MATLAB-based System Architecture for Locating Fiber Fault in Optical Access Network |
Ng Boon Chuan |
|
Develop a FTTH Network Management System using Visual Basic |
Ng Boon Chuan Mohammad Syuhaimi Ab-Rahman Aswir Premadi Kasmiran Jumari |
|
Identity Credential Issuance with Trusted Computing |
Norazah Abd Aziz Lucyantie Mazalan |
|
Crisp Set Implementation On Video Images For The Application Of Surveillance Systems |
Altahir A. Altahir Vijanth S. Asirvadam Patrick Sebastian |
|
Computer Aided Preoperative Planning Application for Shoulder Hemiarthroplasty |
Lee Thian Seng Indra Mohd Zin, Abdul Yazid Mohd Kassim Suhail Abdullah Riza Sulaiman |
|
Augmented Reality Based Educational Tool on Live Solar System (LSS) |
Aw Kien Sin Halimah Badioze Zaman |
|
A New Approach in Solving Illumination and Facial Expression Problems for Face Recognition |
Yee Wan Wong Kah Phooi Seng Li-Minn Ang |
|
Warehouse Management System and Business Performance: Case Study of a Regional Distribution Centre |
Au Yong Hui Nee |
|
An Implementation Review of Occlusion-Based Interaction in Augmented Reality Environment |
Mohamad Shahrul Shahidan Nazrita Ibrahim Mohd Hazli Mohamed Zabil Azlan Yusof |
|
Towards Developing Distributed Heterogeneous Mobile Phone Applications |
Ali R. Mustafa Kattan Rosni Abdullah Rosalina Abdul Salam Sureswaran Ramadass |
|
User's Perception on Information Security Policy at Institutes of Higher Learning |
Haniza Sharif Zuraini Ismail Maslin Masrom |
|
Threshold verification using Statistical Approach for Fast Attack Detection |
Mohd Faizal Abdollah Mohd Zaki Mas'ud Shahrin Sahib@Sahibuddin Robiah Yusof Siti Rahayu Selamat |
|
Vision-based Frontal Vehicle Detection and Tracking |
King Hann LIM Kah Phooi SENG Li-Minn ANG Siew Wen CHIN |
|
Critical Thinking in Various Risk Assessment Issues to Benefit Malaysian Small and Medium Sized Enterprises (SMEs) |
Ryan Yang Guo Su Yan Lee |
|
Empirical Study on Implementation of Organizational Memory in Preparatory Center |
Saidatul Rahah Hamidi Zeti Darleena Eri |
|
Kernelized Radial Basis Probabilistic Neural Network for Classification of River Water Quality |
Lim Eng Aik Zarita Zainuddin |
|
Evaluating Current Authentication Methods: Prediction of a More Suitable Authentication Approach for Public Interaction |
Jimoh Rasheed Gbeng Norshuhada Shiratuddin |
|
Preliminary Analysis Of Problem Solving Method In Online PBL (Case Study In It Security Subject At UTEM) |
Nurhazirah bt Mohd Bakri Faaizah Shahbodin, Norasiken bt Bakar |
|
DIFS Modifications to Support QoS in IEEE 802.11 DCF AD-hoc Networks |
Mohd Najwan Md Khambari Shahrin Sahib Mohd Fairuz Iskandar Othman |
|
IP Spoofing Defense: An Introduction |
Lee Soon Mohamed Othman Nur Izura Udzir |
|
Identifying Fiber Fault in Fiber to the Home Using Access Control System |
Aswir Premadi Mohammad Syuhaimi Ab-Rahman MOhamad Najib Mohd. Saupe Ng Boon Chuan Kasmiran Jumari |
|
A Survey On 2nd Object Tracking in Digital Video |
A.S. Khobragade C.G. Dethe K.D. Kulat |
|
The Effectiveness of Using Internet as a Principal Information Resource in Teaching and Learning Activity in Higher Educational Institutions in Malaysia |
Farahiza Zaihan Azizan |
|
Exploiting Inter-reference Time Characteristic of Web Cache Workload for Web Cache Replacement Design |
Agung Sediyono |
|
Entertaining and Fun: Experience-focused eLearning Material |
Ariffin Abdul Mutalib Norshuhada Shiratuddin |
|
A New Generation For Intelligent Anti-Internet Worm Early System Detection |
Mohammad M. Rasheed Norita Md Norwawi Mohammed M. Kadhum Osman Ghazali |
|
An Approach for efficient energy consumption and delay guarantee MAC Protocol for Wireless Sensor Networks |
Marwan Ihsan Shukur Vooi Voon Yap |
|
The Analysis of Achieving TCP Fairness in IEEE 802.11 Infrastructure WLAN |
Tareq Rasul Mohamed Othman |
|
Improving Mining Efficiency: A New Scheme for Extracting Association Rules |
Aiman Moyaid Said P D D. Dominic Azween B Abdullah |
|
Balanced Load Sharing Protocol for Wireless Sensor Networks |
Maytham Safar Rabie Al Mejbas |
|
The Development of an Integrated and Intelligent Support Tool for Software Certification Process |
Jamaiah Haji Yahaya Aziz Deraman Abdul Razak Hamdan Siti Zahidah Abdullah Fauziah Baharom |
|
Role of Business Process Models in Requirements Engineering |
Fatima Ashraf Mohd Syazwan Abdullah |
|
Requirements Analysis Method For Extracting-Transformation-Loading (Etl) In Data Warehouse Systems |
Azman Taa Mohd Syazwan Abdullah Norita Md. Norwawi |
|
A Near-Optimal Centroids Initialization in K-means Algorithm Using Bees Algorithm |
M. Mahmuddin Y. Yusof |
|
Parking Space: A Design of WLAN Mobile Phone Application in Urban Area |
Ghassan Thabit Jebur Massudi Mahmuddin |
|
Automated Safety & Online Healthcare System |
Laxmi Narayan Sharmaa Raj Kumar Pal B.Vasavi |
|
Non-uniform Face Mesh for 3D Face Recognition |
Wei Jen Chew Kah Phooi Seng Li-Minn Ang |
|
Practical and User Friendly of Analytic Hierarchy Process for Decision Making |
Abd Samad Hasan Basari Burairah Hussin Abdul Samad Shibghatullah |
|
Course Profiling System |
K. H. Yew S. J. R. Chiau |
|
Measuring Doctor’s Quickness and Effort of Using Key-Stroke Level Model: A Case Study of Drug Order Entry |
Mohd Haslina Mohamad Sh. Mastura |
|
Handoff Scheme for Terrestrial Mobile and Satellite Convergence Networks with incorpration of Pattern Recognition Algorithm |
Kwong Chiew Foong |
|
Prioritization scheme for QoS in IEEE 802.11e WLAN |
Yakubu Suleiman Baguda Norsheila Fisal |
|
Socio-Economic Benefits Of Telecentre Implementation In Peninsular Malaysia |
Zulkhairi MD. Nor Iadah, Y. Huda, I. Mohd. Khairudin K. Zahurin, MA. |
|
Bluetooth-Based Alarm System |
Mohd. Helmy Abd. Wahab Nor Ezna Juniza Md. Janah Ayob Johari Danial Md. Nor Rahmat Sanudin |
|
Graphical Web based Tool for Generating Query from Star Schema |
Mohammed Anbar Ku Ruhana Ku-Mahamud |
|
Reading Discrepency and the Promise of Computer Technology |
Hafiza Abas Halimah Badioze Zaman |
|
Simulation of Diagonal Data Replication in Mesh |
Rohaya Latip Hamidah Ibrahim Mohamed Othman Md. Nasir Sulaiman Azizol Abdullah |
|
Extension of Dynamic Source Routing Protocol in Mobile Ad hoc Network |
Osman Ghazali Suhaidi Hassan Naseer Ali Nur Ziadah Harun Saichai a/p Eh Song Norhidayah Abdullah |
|
Salient Region Detection Using Contrast-Based Saliency and Watershed Segmentation |
Christopher Wing Hong Ngau Li-Minn Ang Kah Phooi Seng |
|
Multimedia Package For Learning English Based On Learners’ Profile |
Norshahriah Wahab Halimah Badioze Zaman |
|
Development of Contact Lens Suitability System (ClenSyst) |
Syaratul Ain Muhammed Hafiz Noraidah Sahari @ Ashaari Jemaima Che Hamzah Syariza Razak |
|
A New Enhancement Of Fingerprint Classification For The Damaged Fingerprint With Adaptive Features |
R. Josphineleela M. Ramakrishnan Gunasekaran |
|
Multi-Agent Information Inferencing Fusion System for Decision Support System |
Arwin Datumaya Wahyudi Sumari Adang Suwandi Ahmad Aciek Ida Wuryandari Jaka Sembiring. |
|
Predictive Maintenance Framework for Hard Disk Media Production |
Megat Norulazmi Megat Mohamed Noor Shaidah Jusoh |
|
State-of-the-Art Application of Artificial Neural Network in Digital Watermarking and the way Forward |
Rashidah F. Olanrewaju Aburas Ali Abdurazzag Othman O. Khalifa Aishah Abdalla |
|
Forest Fire Pattern Extraction and Rule Generation using Sliding Window Technique |
Ku Ruhana Ku-Mahamud Khor Jia Yun |
|
Determination of the plan of the A Famosa Fortress, Malaysia |
M. Izania A. Bridges A.Razak |
|
Dynamic Carpooling Notification System For Rural Areas |
Omar Alharbi Nor Laily Hashim |
|
Trusted Computing: Challenges & Solutions |
Nor Fatimah Bt Awang |
|
Basic Model For Information Retrieval Based On Free-Text In Database Application. |
Mohd Adan Omar Md Zahir Mat Cha Mohd Rushdi Idrus |
|
New Control for Two Mass Positioning System Using Nominal Characteristic Trajectory Following Controller |
Fitri.MY Wahyudi R. Akmeliawati Andika A.Wijaya |
|
Reconstruction a Protein 3D Structure From It Contact Map: Tools Comparison |
Hamed J. Al-Fawareh Nawal T.Alomoush Jehad Q. Odeh |
|
Determining Wireless Local Area Network (WLAN) Vulnerabilities on Academic Network |
Fazli Azzali Amran Ahmad Ali Yusny Daud |
|
Product Assembly and Disassembly Sequence Optimization based on Genetic Algorithm and Design for Assembly Methodologies |
Azman Yasin Nurnasran Puteh Ruslizam Daud |
|
Silent Alarm: Link Prediction Modeling for Fast Routing in VANET |
Nik Nur Saneiah Kamaruzaman Halabi Hasbullah |
|
Development of an Instrument to Measure Smart Card Technology Acceptance |
Hamed Taherdoost Maslin Masrom Zuraini Ismail |
|
Extracting Semantics for Information Extraction |
Hejab M. Al Fawareh Shaidah Jusoh |
|
Segmentation of Nastaliq Script for OCR |
Sohail A. Sattar Shamsul Haque Mahmood K. Pathan |
|
A Dynamic Replication Strategy based on Exponential Growth/Decay Rate |
Mohammed Madi Suhaidi Hassan Yuhanis Yusof |
|
Stagnation Control Using Interacted Multiple Ant Colonies |
Alaa Al-Janabya Ku Ruhana Ku-Mahamud Norita Norwawi |
|
The Architectures of SMS Management System as a Tool for Communication |
Azmi Md Saman Shafiz Affendi Mohd Yusof Salman Sha’ri |
|
PDF Digital Watermarking: Grayscale Photocopy Detection of Printed Documents |
Norhaziah Md. Salleh Soong Hoong Cheng |
|
Extreme Programming and Its Positive Affect on Software Engineering Teams |
Sharifah Lailee Syed-Abdullah Mazni Omar |
|
Optimizing Security and Flexibility by Designing a High Security System for E-Government Servers |
Y.Y Abdul Talib B.B Zaidan A.A Zaidan A.W.Naji |
|
Blood Cell Image Segmentation Using Unsupervised Clustering Techniques |
T. Zalizam T. Muda Rosalina Abdul Salam |
|
A Tactical Role for Reverse Auctions: A Market Maker Perspective |
Susan Standing Craig Standing Peter Love |
|
An Automated Text Summarization Methodology |
Shaidah Jusoh Abdulsalam Masoud Hejab M. Al Fawareh |
|
Classification of Capital Expenditures and Revenue Expenditures: An Analysis of Correlation and Neural Networks |
Fadzilah Siraj Nurazzah Abu Bakar Adnan Abolgasim, |
|
Investigating the Effect of Data Representation On Neural Network and Regression |
Fadzilah Siraj Ehab A. Omer El Fallah |
|
Looking into the Definition and Characteristics of U-Learning |
Erny Arniza Ahmad Saadiah Yahya Kamarularifin Abd. Jalil |
|
Hybrid Ant Colony Optimization for Grid Computing |
Husna Jamal Abdul Nasir Ku Ruhana Ku-Mahamud |
|
Indicator Selection based on Rough Set Theory |
Faudziah Ahmad Azuraliza Abu Bakar Abdul Razak Hamdan |
|
Pronunciation Variations and Context-dependent Model to Improve ASR Performance for Dyslexic Children’s Read Speech |
Husniza Husni Zulikha Jamaludin |
|
Pattern Extraction for Programming Performance Evaluation Using Directed Apriori |
Mohamad Farhan Mohamad Mohsin Mohd Fairuz Zaiyadi Norita Md Norwawi Mohd Helmy Abd Wahab |
|
Data Mining Reduction Methods and Performances of Rules |
Faudziah Ahmad Mohammad Aizat Basir |
|
Assessment of Enterprise Architecture (EA) Implementation Using The Open Group Architecture Framework (TOGAF) |
Nini Aniza Zakaria Rafidah Abd Razak Zulkhairi Md Dahalin |