CHAPTER 1: Data Science/Analytics

  • TEXT ANALYTICS OF UNSTRUCTURED TEXTUAL DATA: A STUDY ON MILITARY PEACEKEEPING DOCUMENT USING R TEXT MINING PACKAGE
    Zuraini Zainol, Puteri N.E. Nohuddin, Tengku A.T. Mohd, and Omar Zakaria
1
  • PREDICTIVE ANALYTIC IN HEALTH CARE USING CASE-BASED REASONING (CBR)
    Sukumar Letchmunan, Zulkefli Mansor, Nikki Lee Wan Yan, Low Kah Meng, and Nur Farhana Izwani Tahir
8
  • IMPACT OF TWITTER ON HUMAN INTERACTION
    Anis Naseerah Shaik Osman, Sharifah Sakinah Syed Ahmad, and Halizah Basiron
16
  • AN ENHANCEMENT OF SLIDING WINDOW ALGORITHM FOR RAINFALL FORECASTING
    Siti Nor Fathihah Azahari, Mahmod Othman, and Rizauddin Saian
23
  • EFFECT OF FUZZY DISCRETIZATION IN THE ASSOCIATION PERFORMANCE WITH CONTINUOUS ATTRIBUTES
    Nor Idayu Ahmad Azami, Nooraini Yusoff, and Ku Ruhana Ku-Mahamud
29
  • FACTORS OF EMERGING INFECTIOUS DISEASE OUTBREAK PREDICTION USING BIG DATA ANALYTICS: A SYSTEMATIC LITERATURE REVIEW
    Nur Laila Ab Ghani, Sulfeeza Mohd Drus, Noor Hafizah Hassan, and Aliza Abdul Latif
37
  • 3D FACIAL EXPRESSION INTENSITY MEASUREMENT ANALYSIS
    Alicia Cheong Chiek Ying, Hamimah Ujir, and Irwandi Hipiny
43
  • ENHANCING SECURITY ELEMENTS FOR MAPREDUCE PROCESSING WITH WHITELIST
    Adilah Sabtu and Nurulhuda Firdaus Mohd Azmi
49
  • FUSSCYIER: MAMMOGRAM IMAGES CLASSIFICATION BASED ON SIMILARITY MEASURE FUZZY SOFT SET
    Saima Anwar Lashari, Rosziati Ibrahim, and Norhalina Senan
56
  • EXPONENTIAL SMOOTHING TECHNIQUES ON DAILY TEMPERATURE LEVEL DATA
    Noor Shahifah Muhamad and Aniza Mohamed Din
62

CHAPTER 2: Optimization Algorithm

  • ENHANCED SELECTION METHOD FOR GENETIC ALGORITHM TO SOLVE TRAVELING SALESMAN PROBLEM
    Mohammed Bin Jubeir, Mishal Almazrooie, and Rosni Abdullah
69
  • DERIVING SKYLINE POINTS OVER DYNAMIC AND INCOMPLETE DATABASES
    Ghazaleh Babanejad, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi, and Ali Amer Alwan
77
  • SKYLINE COMPUTATION OF UNCERTAIN DATABASE: A SURVEY
    Ma'aruf Mohammed Lawal, Hamidah Ibrahim, Fazlida Mohd Sani, and Razali Yaakob
84
  • QUERY COST-REDUCTION FOR QURANIC-ARABIC INFORMATION RETRIEVAL USING HEXADECIMAL CONVERSION ALGORITHM
    Ahmad Akmaluddin Mazlan, Norita Md Norwawi, Fauziah Abdul Wahid, Roesnita Ismail, and Ashraf Al Omoush
91
  • RESERVOIR GATE OPENING CLASSIFICATION USING MULTIPLE CLASSIFIER SYSTEM WITH ANT SYSTEM-BASED FEATURE DECOMPOSITION
    Abdullah Husin and Ku Ruhana Ku-Mahamud
99
  • THE COMPARISON OF INTERNET PRICING SCHEME IN MULTI LINK BOTTLENECK MULTI SERVICE NETWORK
    Fitri Maya Puspita, Kamaruzzaman Seman, Bachok M. Taib, and Ismail Abdullah
105
  • HEURISTIC METHOD FOR OPTIMUM SHIFT SCHEDULING DESIGN
    Lee Kong Weng, Sze San Nah, and Phang Keat Keong
112
  • HEURISTIC FACULTY COURSE TIMETABLING WITH STUDENT SECTIONING
    Chia-Lih Bong, San-Nah Sze, Noor Alamshah Bolhassan, and Kang-Leng Chiew
119
  • COURIER DELIVERY SERVICES VISUALISOR (CDSV) WITH AN INTEGRATION OF GENETIC ALGORITHM AND A* ENGINE
    Mohammad Fariduddin Jalaluddin, Ezzatul Akmal Kamaru-Zaman, and Shuzlina Abdul-Rahman, and Sofianita Mutalib
126
  • TRUCK QUEUING ANALYSIS AT LANDFILL SITES IN A WASTE COLLECTION VEHICLE ROUTING PROBLEM
    Aida Mauziah Benjamin, Ku Ruhana Ku-Mahamud, and Zanariah Idrus
132

CHAPTER 3: Software Engineering

 
  • A CONCEPTUAL MODEL FOR SERVICE-ORIENTED ARCHITECTURE ADOPTION MATURITY MODEL
    Mohd Hamdi Irwan Hamzah, Fauziah Baharom, and Haslina Mohd
139
  • LIBRARY ADVISOR - AN INFORMATION MANAGEMENT SYSTEM ON STANDARD CELL LIBRARY
    Lim Wei Pin, Kuay Chong Lee, Lim Kiang Leng, and Nurul Hashimah Ahamed Hassain Malim
146
  • SOFTWARE DEVELOPMENT TEAM COMPOSITION: PERSONALITY TYPES OF PROGRAMMER AND COMPLEX NETWORKS
    Abdul Rehman Gilal, Mazni Omar, Jafreezal Jaafar, Kamal Imran Sharif, Abdul Waheed Mahessar, and Shuib Basri
153
  • AGENT ORIENTED METHODOLOGY FOR MALARIA TRANSMISSION MODELLING AND SIMULATION
    Loh CheeWyai, Shane Nissom, Cheah WaiShiang, and Nurfauza binti Jali
160
  • STORAGE OPTIMIZATION FOR DIGITAL QURAN USING SPARSE MATRIX WITH HEXADECIMAL REPRESENTATION
    Ashraf Al_Omoush, Norita Md Norwawi, Roesnita Ismail, Fauziah Abdul Wahid, and Ahmad Akmaluddin Mazlan
167
  • A CONCEPTUAL PRIVACY FRAMEWORK FOR PRIVACY-AWARE IOT HEALTH APPLICATIONS
    Kavenesh Thinakaran, Jaspaljeet Singh Dhillon, Saraswathy Shamini Gunasekaran, and Lim Fung Chen
175
  • EXTRACTING SOFTWARE FEATURES FROM ONLINE REVIEWS TO DEMONSTRATE REQUIREMENTS REUSE IN SOFTWARE ENGINEERING
    Noor Hasrina Bakar, Zarinah M. Kasirun, Norsaremah Salleh, and Azni H. Halim
184
  • HADITH COMMENTARY REPOSITORY: AN ONTOLOGICAL APPROACH
    Amir Hamzah Jaafar and Noraini Che Pa
191
  • SOLVING THE PREFERENCE-BASED CONFERENCE SCHEDULING PROBLEM THROUGH DOMAIN TRANSFORMATION APPROACH
    Siti Khatijah Nor Abdul Rahim, Amir Hamzah Jaafar, Andrzej Bargiela, and Faridah Zulkipli
199

CHAPTER 4: Intelligent Systems & Robotics

 
  • SELF-TUNING FUZZY PID CONTROLLER USING ONLINE METHOD IN ESSENTIAL OIL EXTRACTION PROCESS
    Zakiah Mohd Yusoff, Zuraida Muhammad, Amar Faiz Zainal Abidin, Mohd Azri Abdul Aziz, Nurlaila Ismail, and Mohd Hezri Fazalul Rahiman
208
  • APPLYING A NEW HYBRID MODEL OF EMDEDDED SYSTEM DEVELOPMENT METHODOLOGY ON A FLOOD DETECTION SYSTEM
    Azizah Suliman, Nursyazana Nazri, and Surizal Nazeri
215
  • SPATIAL LAYOUT DESIGN FACTORS DURING PANIC SITUATIONS
    KNajihah Ibrahim and Fadratul Hafinaz Hassan
222
  • DETECTING VIDEO SPAMMERS IN YOUTUBE SOCIAL MEDIA
    Yuhanis Yusof and Omar Hadeb Sadoon
228
  • DISTANCE MEASUREMENT FOR SELF-DRIVING CARS USING STEREO CAMERA
    Yasir Dawood Salman, Ku Ruhana Ku-Mahamud, and Eiji Kamioka
235
  • ENHANCED PARALLEL SOM BASED ON HETEROGENEOUS SYSTEM PLATFORM
    Muhammad Firdaus Mustapha, Noor Elaiza Abd Khalid, Mazani Manaf, and Azlan Ismail
243
  • AN ADAPTIVE ANOMALY THRESHOLD IN ARTIFICIAL DENDRITE CELL ALGORITHM
    Mohamad Farhan Mohamad Mohsin, Azuraliza Abu Bakar, and Abdul Razak Hamdan
250
  • AGGRESSIVE MOVEMENT DETECTION USING OPTICAL FLOW FEATURES BASE ON DIGITAL & THERMAL CAMERA
    Tuan Khalisah Tan Zizi @ Tuan Zizi, Suzaimah Ramli, Norulzahrah Mohd Zainudin, Nor Asiakin Hasbullah, Norshariah Abdul Wahab, Noor Afiza Mat Razali, and Norazlin Ibrahim
256

CHAPTER 5: Multimedia Support & Applications

 
  • DEVELOPMENT OF MOBILE APPLICATION FOR AUTISTIC CHILDREN USING AUGMENTATIVE AND ALTERNATIVE COMMUNICATION TECHNIQUE
    Wan Fatimah Wan Ahmad, Ahmad Sobri Hashim, and Aaina Nadia Mazlan
262
  • SPEECH TO SINGING SYNTHESIS: INCORPORATING PATAH LAGU IN THE FUNDAMENTAL FREQUENCY CONTROL MODEL FOR MALAY ASLI SONG
    Nurmaisara Za'ba, and Nursuriati Jamil
268
  • A PROCESS MODEL FOR DESIGNING INFORMATION VISUALIZATION
    Semiu A. Akanmu and Zulikha Jamaludin
276
  • MODELLING CONTENTS STATUS FOR IPTV DELIVERY NETWORKS
    Suliman Mohamed Fati,Putra Sumari, Siti Sophiayati Yuhaniz, and Nilam Nur Binti Amir Sjarif
282
  • STRUCTURAL SEMANTIC FOLKTALE MODEL AS A VISUALIZATION MEANS OF STRUCTURAL AND SEMANTIC RELATIONSHIPS BETWEEN MALAYSIAN FOLKTALES' CLASSES
    Harryizman Harun and Zulikha Jamaludin
291
  • AUTOMATIC SHADER TOOL FOR 3D ANIMATION PRODUCTION IN THAI INDUSTRIES
    Khachakrit Liamthaisong, Preut Thanarat, Shongchai Ubonpheun, and Manasawee Kaenampornpan
299
  • A METHODOLOGY OF PERSONALIZED RECOMMENDATION SYSTEM ON MOBILE DEVICE FOR DIGITAL TELEVISION VIEWERS
    Chumsak Sibunruan, and Jantima Polpinij
305

CHAPTER 6: E-Commerce, E-Business, M-Commerce

 
  • CONSUMER'S PERCEPTION TOWARDS REAL-TIME VIRTUAL FITTING SYSTEM
    Yuen Yee Yen, Kogilah Narayanasamy, Cheng Yi Lin, Devinaga Rasiah, and Suganthi Ramasamy
311
  • THE TRUST EFFECT TOWARDS ONLINE SELLER IN SOCIAL COMMERCE
    Ramona Ramli, Asmidar Abu Bakar, Roslan Ismail, and Norshakirah Aziz
317
  • THE IMPACT OF SQL INJECTION ATTACKS ON THE SECURITY OF DATABASES
    Rua Mohamed Thiyab, Musab A. M. Ali, Farooq Basil, and Abdulqader
323
  • SHARIA COMPLIANCE SERVICE QUALITY METRICS FOR E-COMMERCE: AN EXPLORATORY ANALYSIS
    Mohammed Bashir Ribadu and Wan Nurhayati Wan Ab. Rahman
332
  • SOCIAL NETWORK ANALYSIS OF B2B NETWORKS
    Abdul Hadi Mohamad, Fang Wang, Noor Widasuria Abu Bakar, and Pavan Kumar Jatavallabhula
341
  • SOCIAL COMMERCE BEHAVIOR AMONG UNIVERSITY STUDENTS IN MALAYSIA
    Mohamed Jalaldeen Mohamed Razi, Mohd Izzuddin Mohd Tamrin, and Husnayati Hussin
350
  • FACTORS AFFECTING AWARENESS ON INFORMATION SECURITY IN INTERNET BANKING AMONG UNIVERSITI TEKNOLOGI PETRONAS (UTP) STUDENTS
    Ahmad Sobri Hashim and Saipunidzam Mahamad
356

CHAPTER 7: Crowd Sourcing

 
  • A HYBRID CROWDSOURCING INCENTIVE MECHANISM BASED ON USERS' PREFERENCE
    Aqilah Azizan and Hazleen Aris
363
  • USERS' INTELLECTUAL PROPERTY RIGHTS IN CROWDSOURCED SOFTWARE ENGINEERING TASKS
    Hani Barjes Al-bloush and Badariah Solemon
369
  • EXPLORING THE PUBLIC'S PERCEPTION TOWARDS CROWDSOURCED CRIME REPORTING
    Wan Mohamad Luqman Wan Abu Bakar, and Badariah Solemon
377
  • AN IMPLEMENTATION OF A NEAR REAL TIME DISASTER MANAGEMENT HUB BASED ON CROWDSOURCED DATA
    Md Nabil Ahmad Zawawi
383
  • CURRENT STATE OF CROWDSOURCING TAXONOMY RESEARCH: A SYSTEMATIC REVIEW
    Hazleen Aris
392
  • BLOCKCHAIN SADAQA MECHANISM FOR DISASTER AID CROWD FUNDING
    Rizal Mohd Nor, M.M Hafizur Rahman, Towfiqur Rahman, and Adam Abdullah
400

CHAPTER 8: Mobile Technology

 
  • CLOUD-BASED WEB SERVICE COMPOSITION USING ACTION SCRIPT
    R Kanesaraj Ramasamy, Noor Ain Rosly, Illiana Azizan, and Fang-Fang Chua
406
  • EXAM PAPER GENERATOR FOR MULTI-PLATFORM MOBILE APPLICATION OPTIMIZED BY CLOUD-BASED WEB SERVICE COMPOSITION
    R Kanesaraj Ramasamy, Illiana Azizan, and Noor Ain Rosly
412
  • A BARCODE SCANNING MOBILE APPLICATION FOR SEARCHING HALAL INFORMATION OF FOOD PRODUCTS
    Mohd. Nur Faiz Abd Razak and Norliza Katuk
418
  • A COHERENT AUTHENTICATION FRAMEWORK FOR MOBILE COMPUTING BASED ON HOMOMORPHIC SIGNATURE AND IMPLICIT AUTHENTICATION
    Hamdun Mohammed, Suliman Mohamed Fati, Vasaki Ponnusamy, Ooi Boon Yaik, Robithoh Annur, and Liew Soung Yue
426
  • MOBILE FLOOD ASSISTANT (MO-FA): ASSISTING FLOOD VICTIMS WITH MOBILE TECHNOLOGY
    Marina Md. Din, Salman Yussof, and Muhammad Rasul Abu Bakar
435
  • ADDRESSING USABILITY QUALITY ATTRIBUTES IN TECHO-SPRITUAL APPLICATION
    Ahairul Afza Abd Wahab, Azrina Kamaruddin, Sa'adah Hassan, and Noraini Che Pa
443

CHAPTER 9: Educational Computing

 
  • AN ANALYSIS OF GAMIFICATION ELEMENTS IN ONLINE LEARNING TO ENHANCE LEARNING ENGAGEMENT
    Siti Nurul Mahfuzah Mohamad, Sazilah Salam, and Norasiken Bakar
452
  • PERCEIVED LEARNING CONSTRUCTS AND INTERACTION PATTERNS IN A SOCIAL NETWORKING SITE
    Mohd Nihra Haruzuan Mohamad Said, and Junaidah Yusup
461
  • MOBILE APPLICATION FOR DYSCALCULIA CHILDREN IN MALAYSIA
    Mazeyanti Mohd Ariffin, Fiqa Azureen Abd Halim, and Norshakirah Abd Aziz
467
  • THE CHALLENGES OF MASSIVE OPEN ONLINE COURSES (MOOC) - A PRELIMINARY REVIEW
    Almahdi .M Ejreaw, and Sulfeeza Mohd Drus
473
  • IMPACT OF ICT AND ELECTRONIC GADGET AMONG YOUNG CHILDREN IN EDUCATION: A CONCEPTUAL MODEL
    Mira Adila Mat Saruji, Noor Hafizah Hassan, and Sulfeeza Md. Drus
480
  • MULTI-CRITERIA EVALUATION OF E-LEARNING APPROACHES
    Husam Jasim Mohammed, Maznah Mat Kasim and Izwan Nizal Mohd Shaharanee
487

CHAPTER 10: Decision Support Systems & Expert System

 
  • ADAPTIVE THRESHOLD BASED APPROACH TO PERFECTLY DETECT HEART CYCLE IN ECG DATA
    Mohamad Sabri Bin Sinal and Eiji Kamioka
492
  • ENHANCED DYNAMICINFRASTRUCTURE AS A SERVICEMODEL (EDIAAS) FOR SELECTING SERVICE PROVIDER
    Yazeed Al Moaiad, Zainab Abu Bakar, and Najeeb Abbas Al-Sammaraie
499
  • DYNAMIC NODE LABELING SCHEMES FOR XML UPDATES
    Xuan-Thuan Nguyen, Su-Cheng Haw, Samini Subramaniam, and Cong-Kha Pham
505
  • GROUP-IN-THE-LOOP: ARCHITECTURE FOR HARNESSING AND CREATING COLLECTIVE INTELLIGENCE
    Sayed Nafiz Haider, Su-Cheng Haw, and Fang-Fang Chua
511
  • A FRAMEWORK OF THAI TEXT RETRIEVAL USING SPEECH
    Paponput Sopon, Thongparn Suksamer, Jantima Polpinij, and Rapeeporn Chamchong
517

CHAPTER 11: Web-based Systems

 
  • IMPACT OF ONLINE GAMES AMONG UNDERGRADUATE STUDENTS
    Rubijesmin Abdul Latif, Norshakirah Abdul Aziz, and Mohd Taufik Abdul Jalil
523
  • EVALUATING THE QUALITY OF PRIVATE UNIVERSITY WEBSITES IN MALAYSIA
    Rubijesmin Abdul Latif
533
  • EVALUATION OF LOCALIZATION FOR E-LEARNING WEBSITE: A PRELIMINARY STUDY
    Aslina Baharum, Punitha Turumugon, Nurul Hidayah Mat Zain, Chin Pei Yee, Salinah Dullah, and Farhana Abd. Lahin
541
  • PIAK: A PERSONALIZED INTERNET ACCESS FOR KIDS
    Abrar Noor Akramin Kamarudin, Bali Ranaivo-Malançon, and Nadianatra Musa
547
  • MODEL OF CYBERBULLYING BEHAVIOUR FROM THE LENS OF MEDIA SYNCHRONICITY THEORY (MST)
    Nurulhuda Ismail, Rahayu Ahmad, Shafiz Affendi Mohd Yusuf, and Abdul Bashah Mat Ali
553

CHAPTER 12: Knowledge Engineering

 
  • THE KNOWLEDGE NEEDED FOR SELF-REGULATED LEARNING: APPLYING THE CONCEPT OF COGNITIVE ENABLERS IN PERSONAL KNOWLEDGE MANAGEMENT
    Shahrinaz Ismail, Siti Haryani Shaikh Ali, and Mohamad Hasbullah Abu Bakar
560
  • SKYLINE QUERY PROCESSING FOR INCOMPLETE DATA IN CLOUD ENVIRONMENT
    Yonis Gulzar, Ali A. Alwan, Norsaremah Salleh, and Imad Fakhri Al-Shaikhli
567
  • WHICH EXTRACTIVE SUMMARIZATION METHOD FOR MALAY TEXTS?
    Bali Ranaivo-Malancon and Hazimah Iboi
577
  • KNOWLEDGE MANAGEMENT BEHAVIOR AMONG PRACTITIONERS IN MALAYSIA
    Mohamed Jalaldeen Mohamed Razi, Mohd Izzuddin Mohd Tamrin, Abdul Rahman Ahmad Dahlan, and Noor Azian Mohamad Ali
583

CHAPTER 13: Green Computing/Eco-friendly Computing

 
  • THE PRACTICE OF USING GREEN INFORMATION SYSTEM (GREEN IS) SOLUTIONS FOR ECO-FRIENDLY ORGANISATIONS
    Mohamad Taha Ijab
589
  • SOFTWARE SUSTAINABILITY DEVELOPMENT: IMPACTIBILITY CHARACTERISTIC FOCUSES ON SOCIAL APPROACH
    Ruzita Ahmad, Fauziah Baharom, and Azham Hussain
595
  • PADDY WEED LEAF CLASSIFICATION USING NEURO-FUZZY SYSTEM
    Mohd Zulhilmi Ab Jamil, Sofianita Mutalib, Shuzlina Abdul Rahman, and Zalilah Abd Aziz
601
  • TOWARDS SUSTAINABLE INFORMATION SYSTEM THROUGH GREEN DESIGN
    Noraini Che Pa, Sa'adah Hassan, Hazlina Hamdan, and Faizal Abdul Karim
607

CHAPTER 14: Management & Engineering of IT-Enabled Services

 
  • BIG DATA MATURITY MODEL- A PRELIMINARY EVALUATION
    Sulfeeza Mohd Drus and Noor Hafizah Hassan
613
  • A REVIEW OF KNOWLEDGE MANAGEMENT IMPLEMENTATION THROUGH CLOUD COMPUTING IN MALAYSIA
    Nabilah Mahmud and Sulfeeza Mohd Drus
621
  • THE 2014 FLOOD DISASTER IN KEMAMAN, TERENGGANU: LESSONS FROM THE KEMAMAN EXPERIENCE
    Mohamad Firdaus Mat Saad, Aliza Abdul Latif, and Marini Othman
628
  • CHALLENGES IN THE IMPLEMENTATION OF HOSPITAL INFORMATION SYSTEMS IN MALAYSIAN PUBLIC HOSPITALS
    Nur Azzah Abu Bakar, Noraziah ChePa, and Noorhayati Md Jasin
636

CHAPTER 15: Cooperative Work Support, Formal Methods, Pervasive Computing, Smart Technology, Smart Embedded Computing & Its Applications

 
  • THE ACCEPTANCE OF VIRTUAL PLATFORMS FOR PROMOTING KNOWLEDGE SHARING BEHAVIOR- A REVIEW OF THE TECHNOLOGY ACCEPTANCE MODEL (TAM)
    Hairol Adenan Kasim
643
  • GOVERNANCE OF FLOOD DISASTER FRAMEWORK: A WAY FORWARD USING THE FRAMEWORK
    Siti Sarah Maidin, Marini Othman, and Mohamad Nazir Ahmad
650
  • IMPROVING THE QUALITY OF REQUIREMENTS WORK PRODUCTS USING SCORING RUBRICS-ASSISTED READING
    Emmanuel O.C. Mkpojiogu, and Nor Laily Hashim
656
  • VALIDATION OF UC2VDM++ ARCHITECTURE
    Swee Yin Wong, Edwin Mit, and Jonathan Sidi
663
  • MULTI-LABEL CLASSIFICATION USING LABEL COMBINATION TO RECOGNIZE HUMAN ACTIVITY BASED ON VARIOUS SENSOR POSITIONS
    M.N.Shah Zainudin, Raihani Mohamed, Md Nasir Sulaiman, Thinagaran Perumal, Norwati Mustapha, and Azree Sharel Ahmad Nazri
669
  • SMARTHOME AND LOCATION POSITIONING SYSTEM (SLOPS): AN AMBIENT INTELLIGENCES SERVICE
    Lim Poon Koon, Lau Khai Shien, Manmeet Mahinderjit Singh
675
  • EXPLORING USABILITY OF VARIOUS TOUCH GESTURE IN TOUCH SCREEN IVIS USING PAPER PROTOTYPE
    Fatin Shamimi Mohd Zuki and Suziah Sulaiman
683
  • CONCEPTUAL FRAMEWORK FOR ENHANCING A WEARABLE DEVICE THAT CONVERTS SOUND, TEXT AND IMAGE INTO AUTOMATIC SIGN LANGUAGE RECOGNIZING SYSTEM (ASLR)
    Shelena Soosay Nathan, Ahmed, Azham Hussain, Nor Laily Hashim, Toan Nguyen-Duc, and Eiji Kamioka
691
  • VISUALIZATION OF SPOKEN LANGUAGE FOR DEAF PEOPLE
    Toan Nguyen-Duc, Othmar Othmar Mwambe Shelena Soosay Nathan, Mohammed Ahmed Taiye Azham Hussain, Nor Laily Hashim, and Eiji Kamioka
696
  • OBSTACLE DETECTION BASED ON HISTORY INFORMATION IN SELF-DRIVING VEHICLES
    Swetha Indudhar Goudar, Keishi Usa, Eiji Kamioka, and Ku Ruhana Ku-Mahamud
702

CHAPTER 16: Systems & Network Security, Computer Systems & Networking

 
  • MODALITY CONFLICT ANALYSIS IN XACML POLICY EVALUATION
    Teo Poh Kuang, Hamidah Ibrahim, Fatimah Sidi, and Nur Izura Udzir
708
  • DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION
    Baraa Tariq Hammad, Norziana Jamil, Mohd Ezanee Rusli, and Muhammad Reza Zaba
714
  • ENHANCE THE ROBUSTNESS OF SECURE RIJNDAEL KEY EXPANSION FUNCTION BASED ON INCREMENT CONFUSION AND DIFFUSION BITS
    Hassan Mansour Hussien, Zaiton Muda, and Sharifah Md Yasin
722
  • AN ENHANCEMENT OF LIGHTWEIGHT ENCRYPTION FOR SECURITY OF BIOMETRIC FINGERPRINT DATA FOR SMART HOME ENVIRONMENT
    Taqiyah Khadijah Ghazali and Nur Haryani Zakaria
729
  • THE AUTHENTICATION TECHNIQUES FOR ENHANCING THE RPL SECURITY MODE: A SURVEY
    Mohamad Faiz Razali, Mohd Ezanee Rusli, Norziana Jamil, Roslan Ismail, and Salman Yussof
735
  • PRIVACY PRESERVATION FRAMEWORK FOR ADVANCED METERING INFRASTRUCTURE
    Fiza Abdul Rahim, Asmidar Abu Bakar, Salman Yussof, Roslan Ismail, and Ramona Ramli
744
  • EMAIL SPAM DETECTION: A METHOD OF METACLASSIFIERS STACKING
    Mi ZhiWei, Manmeet Mahinderjit Singh, and Zarul Fitri Zaaba
750
  • TIME CONSUMPTION IMPROVEMENT OF MATRIX MULTIPLICATION BY HYBRID EXECUTION OF MESSAGE PASSING INTERFACE AND OPEN MULTI-PROCESSING
    Sajad Sajadpour, Jaspaljeet Singh Dhillon, and Abdul Rahim Ahmad
758

 

    ICOCI2017 URL: http://icoci.uum.edu.my

   

ICOCI 2017, International Conference on Computing and Informatics, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah Darul Aman, Malaysia