|
CHAPTER 1: Data Science/Analytics
|
|
- TEXT ANALYTICS OF UNSTRUCTURED TEXTUAL DATA: A STUDY ON MILITARY PEACEKEEPING DOCUMENT USING R TEXT MINING PACKAGE
Zuraini Zainol, Puteri N.E. Nohuddin, Tengku A.T. Mohd, and Omar Zakaria
|
1 |
- PREDICTIVE ANALYTIC IN HEALTH CARE USING CASE-BASED REASONING (CBR)
Sukumar Letchmunan, Zulkefli Mansor, Nikki Lee Wan Yan, Low Kah Meng, and Nur Farhana Izwani Tahir
|
8 |
- IMPACT OF TWITTER ON HUMAN INTERACTION
Anis Naseerah Shaik Osman, Sharifah Sakinah Syed Ahmad, and Halizah Basiron
|
16 |
- AN ENHANCEMENT OF SLIDING WINDOW ALGORITHM FOR RAINFALL FORECASTING
Siti Nor Fathihah Azahari, Mahmod Othman, and Rizauddin Saian
|
23 |
- EFFECT OF FUZZY DISCRETIZATION IN THE ASSOCIATION PERFORMANCE WITH CONTINUOUS ATTRIBUTES
Nor Idayu Ahmad Azami, Nooraini Yusoff, and Ku Ruhana Ku-Mahamud
|
29 |
- FACTORS OF EMERGING INFECTIOUS DISEASE OUTBREAK PREDICTION USING BIG DATA ANALYTICS: A SYSTEMATIC LITERATURE REVIEW
Nur Laila Ab Ghani, Sulfeeza Mohd Drus, Noor Hafizah Hassan, and Aliza Abdul Latif
|
37 |
- 3D FACIAL EXPRESSION INTENSITY MEASUREMENT ANALYSIS
Alicia Cheong Chiek Ying, Hamimah Ujir, and Irwandi Hipiny
|
43 |
- ENHANCING SECURITY ELEMENTS FOR MAPREDUCE PROCESSING WITH WHITELIST
Adilah Sabtu and Nurulhuda Firdaus Mohd Azmi
|
49 |
- FUSSCYIER: MAMMOGRAM IMAGES CLASSIFICATION BASED ON SIMILARITY MEASURE FUZZY SOFT SET
Saima Anwar Lashari, Rosziati Ibrahim, and Norhalina Senan
|
56 |
- EXPONENTIAL SMOOTHING TECHNIQUES ON DAILY TEMPERATURE LEVEL DATA
Noor Shahifah Muhamad and Aniza Mohamed Din
|
62 |
CHAPTER 2: Optimization Algorithm
|
|
- ENHANCED SELECTION METHOD FOR GENETIC ALGORITHM TO SOLVE TRAVELING SALESMAN PROBLEM
Mohammed Bin Jubeir, Mishal Almazrooie, and Rosni Abdullah
|
69 |
- DERIVING SKYLINE POINTS OVER DYNAMIC AND INCOMPLETE DATABASES
Ghazaleh Babanejad, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi, and Ali Amer Alwan
|
77 |
- SKYLINE COMPUTATION OF UNCERTAIN DATABASE:
A SURVEY
Ma'aruf Mohammed Lawal, Hamidah Ibrahim, Fazlida Mohd Sani, and Razali Yaakob
|
84 |
- QUERY COST-REDUCTION FOR QURANIC-ARABIC INFORMATION RETRIEVAL USING HEXADECIMAL CONVERSION ALGORITHM
Ahmad Akmaluddin Mazlan, Norita Md Norwawi, Fauziah Abdul Wahid, Roesnita Ismail, and Ashraf Al Omoush
|
91 |
-
RESERVOIR GATE OPENING CLASSIFICATION USING MULTIPLE CLASSIFIER SYSTEM WITH ANT SYSTEM-BASED FEATURE DECOMPOSITION
Abdullah Husin and Ku Ruhana Ku-Mahamud
|
99 |
- THE COMPARISON OF INTERNET PRICING SCHEME IN MULTI LINK BOTTLENECK MULTI SERVICE NETWORK
Fitri Maya Puspita, Kamaruzzaman Seman, Bachok M. Taib, and Ismail Abdullah
|
105 |
- HEURISTIC METHOD FOR OPTIMUM SHIFT SCHEDULING DESIGN
Lee Kong Weng, Sze San Nah, and Phang Keat Keong
|
112 |
- HEURISTIC FACULTY COURSE TIMETABLING WITH STUDENT SECTIONING
Chia-Lih Bong, San-Nah Sze, Noor Alamshah Bolhassan,
and Kang-Leng Chiew
|
119 |
- COURIER DELIVERY SERVICES VISUALISOR (CDSV) WITH AN INTEGRATION OF GENETIC ALGORITHM AND A* ENGINE
Mohammad Fariduddin Jalaluddin, Ezzatul Akmal Kamaru-Zaman, and Shuzlina Abdul-Rahman, and Sofianita Mutalib
|
126 |
- TRUCK QUEUING ANALYSIS AT LANDFILL SITES IN A WASTE COLLECTION VEHICLE ROUTING PROBLEM
Aida Mauziah Benjamin, Ku Ruhana Ku-Mahamud, and Zanariah Idrus
|
132 |
CHAPTER 3: Software Engineering
|
|
- A CONCEPTUAL MODEL FOR SERVICE-ORIENTED ARCHITECTURE ADOPTION MATURITY MODEL
Mohd Hamdi Irwan Hamzah, Fauziah Baharom, and Haslina Mohd
|
139 |
- LIBRARY ADVISOR - AN INFORMATION MANAGEMENT SYSTEM ON STANDARD CELL LIBRARY
Lim Wei Pin, Kuay Chong Lee, Lim Kiang Leng, and Nurul Hashimah Ahamed Hassain Malim
|
146 |
- SOFTWARE DEVELOPMENT TEAM COMPOSITION: PERSONALITY TYPES OF PROGRAMMER AND COMPLEX NETWORKS
Abdul Rehman Gilal, Mazni Omar, Jafreezal Jaafar, Kamal Imran Sharif, Abdul Waheed Mahessar, and Shuib Basri
|
153 |
- AGENT ORIENTED METHODOLOGY FOR MALARIA TRANSMISSION MODELLING AND SIMULATION
Loh CheeWyai, Shane Nissom, Cheah WaiShiang, and Nurfauza binti Jali
|
160 |
- STORAGE OPTIMIZATION FOR DIGITAL QURAN USING SPARSE MATRIX WITH HEXADECIMAL REPRESENTATION
Ashraf Al_Omoush, Norita Md Norwawi, Roesnita Ismail, Fauziah Abdul Wahid, and Ahmad Akmaluddin Mazlan
|
167 |
- A CONCEPTUAL PRIVACY FRAMEWORK FOR
PRIVACY-AWARE IOT HEALTH APPLICATIONS
Kavenesh Thinakaran, Jaspaljeet Singh Dhillon, Saraswathy Shamini Gunasekaran, and Lim Fung Chen
|
175 |
- EXTRACTING SOFTWARE FEATURES FROM ONLINE REVIEWS TO DEMONSTRATE REQUIREMENTS REUSE IN SOFTWARE ENGINEERING
Noor Hasrina Bakar, Zarinah M. Kasirun, Norsaremah Salleh, and Azni H. Halim
|
184 |
- HADITH COMMENTARY REPOSITORY: AN ONTOLOGICAL APPROACH
Amir Hamzah Jaafar and Noraini Che Pa
|
191 |
- SOLVING THE PREFERENCE-BASED CONFERENCE SCHEDULING PROBLEM THROUGH DOMAIN TRANSFORMATION APPROACH
Siti Khatijah Nor Abdul Rahim, Amir Hamzah Jaafar, Andrzej Bargiela, and Faridah Zulkipli
|
199 |
CHAPTER 4: Intelligent Systems & Robotics
|
|
- SELF-TUNING FUZZY PID CONTROLLER USING ONLINE METHOD IN ESSENTIAL OIL EXTRACTION PROCESS
Zakiah Mohd Yusoff, Zuraida Muhammad, Amar Faiz Zainal Abidin, Mohd Azri Abdul Aziz, Nurlaila Ismail, and Mohd Hezri Fazalul Rahiman
|
208 |
- APPLYING A NEW HYBRID MODEL OF EMDEDDED SYSTEM DEVELOPMENT METHODOLOGY ON A FLOOD DETECTION SYSTEM
Azizah Suliman, Nursyazana Nazri, and Surizal Nazeri
|
215 |
- SPATIAL LAYOUT DESIGN FACTORS DURING PANIC SITUATIONS
KNajihah Ibrahim and Fadratul Hafinaz Hassan
|
222 |
- DETECTING VIDEO SPAMMERS IN YOUTUBE SOCIAL MEDIA
Yuhanis Yusof and Omar Hadeb Sadoon
|
228 |
- DISTANCE MEASUREMENT FOR SELF-DRIVING CARS USING STEREO CAMERA
Yasir Dawood Salman, Ku Ruhana Ku-Mahamud, and Eiji Kamioka
|
235 |
- ENHANCED PARALLEL SOM BASED ON HETEROGENEOUS SYSTEM PLATFORM
Muhammad Firdaus Mustapha, Noor Elaiza Abd Khalid, Mazani Manaf, and Azlan Ismail
|
243 |
- AN ADAPTIVE ANOMALY THRESHOLD IN ARTIFICIAL DENDRITE CELL ALGORITHM
Mohamad Farhan Mohamad Mohsin, Azuraliza Abu Bakar, and Abdul Razak Hamdan
|
250 |
- AGGRESSIVE MOVEMENT DETECTION USING OPTICAL FLOW FEATURES BASE ON DIGITAL & THERMAL CAMERA
Tuan Khalisah Tan Zizi @ Tuan Zizi, Suzaimah Ramli, Norulzahrah Mohd Zainudin, Nor Asiakin Hasbullah, Norshariah Abdul Wahab, Noor Afiza Mat Razali, and Norazlin Ibrahim
|
256 |
CHAPTER 5: Multimedia Support & Applications
|
|
- DEVELOPMENT OF MOBILE APPLICATION FOR AUTISTIC CHILDREN USING AUGMENTATIVE AND ALTERNATIVE COMMUNICATION TECHNIQUE
Wan Fatimah Wan Ahmad, Ahmad Sobri Hashim, and Aaina Nadia Mazlan
|
262 |
- SPEECH TO SINGING SYNTHESIS: INCORPORATING PATAH LAGU IN THE FUNDAMENTAL FREQUENCY CONTROL MODEL FOR MALAY ASLI SONG
Nurmaisara Za'ba, and Nursuriati Jamil
|
268 |
- A PROCESS MODEL FOR DESIGNING INFORMATION VISUALIZATION
Semiu A. Akanmu and Zulikha Jamaludin
|
276 |
- MODELLING CONTENTS STATUS FOR IPTV DELIVERY NETWORKS
Suliman Mohamed Fati,Putra Sumari, Siti Sophiayati Yuhaniz, and Nilam Nur Binti Amir Sjarif
|
282 |
- STRUCTURAL SEMANTIC FOLKTALE MODEL AS A VISUALIZATION MEANS OF STRUCTURAL AND SEMANTIC RELATIONSHIPS BETWEEN MALAYSIAN FOLKTALES' CLASSES
Harryizman Harun and Zulikha Jamaludin
|
291 |
- AUTOMATIC SHADER TOOL FOR 3D ANIMATION PRODUCTION IN THAI INDUSTRIES
Khachakrit Liamthaisong, Preut Thanarat, Shongchai Ubonpheun, and Manasawee Kaenampornpan
|
299 |
- A METHODOLOGY OF PERSONALIZED RECOMMENDATION SYSTEM ON MOBILE DEVICE FOR DIGITAL TELEVISION VIEWERS
Chumsak Sibunruan, and Jantima Polpinij
|
305 |
CHAPTER 6: E-Commerce, E-Business, M-Commerce
|
|
- CONSUMER'S PERCEPTION TOWARDS REAL-TIME VIRTUAL FITTING SYSTEM
Yuen Yee Yen, Kogilah Narayanasamy, Cheng Yi Lin, Devinaga Rasiah, and Suganthi Ramasamy
|
311 |
- THE TRUST EFFECT TOWARDS ONLINE SELLER IN SOCIAL COMMERCE
Ramona Ramli, Asmidar Abu Bakar, Roslan Ismail, and Norshakirah Aziz
|
317 |
- THE IMPACT OF SQL INJECTION ATTACKS ON THE SECURITY OF DATABASES
Rua Mohamed Thiyab, Musab A. M. Ali, Farooq Basil, and Abdulqader
|
323 |
- SHARIA COMPLIANCE SERVICE QUALITY METRICS FOR E-COMMERCE: AN EXPLORATORY ANALYSIS
Mohammed Bashir Ribadu and Wan Nurhayati Wan Ab. Rahman
|
332 |
- SOCIAL NETWORK ANALYSIS OF B2B NETWORKS
Abdul Hadi Mohamad, Fang Wang, Noor Widasuria Abu Bakar, and Pavan Kumar Jatavallabhula
|
341 |
- SOCIAL COMMERCE BEHAVIOR AMONG UNIVERSITY STUDENTS IN MALAYSIA
Mohamed Jalaldeen Mohamed Razi, Mohd Izzuddin Mohd Tamrin, and Husnayati Hussin
|
350 |
- FACTORS AFFECTING AWARENESS ON INFORMATION SECURITY IN INTERNET BANKING AMONG UNIVERSITI TEKNOLOGI PETRONAS (UTP) STUDENTS
Ahmad Sobri Hashim and Saipunidzam Mahamad
|
356 |
CHAPTER 7: Crowd Sourcing
|
|
- A HYBRID CROWDSOURCING INCENTIVE MECHANISM BASED ON USERS' PREFERENCE
Aqilah Azizan and Hazleen Aris
|
363 |
- USERS' INTELLECTUAL PROPERTY RIGHTS IN CROWDSOURCED SOFTWARE ENGINEERING TASKS
Hani Barjes Al-bloush and Badariah Solemon
|
369 |
- EXPLORING THE PUBLIC'S PERCEPTION TOWARDS CROWDSOURCED CRIME REPORTING
Wan Mohamad Luqman Wan Abu Bakar, and Badariah Solemon
|
377 |
- AN IMPLEMENTATION OF A NEAR REAL TIME DISASTER MANAGEMENT HUB BASED ON CROWDSOURCED DATA
Md Nabil Ahmad Zawawi
|
383 |
- CURRENT STATE OF CROWDSOURCING TAXONOMY RESEARCH: A SYSTEMATIC REVIEW
Hazleen Aris
|
392 |
- BLOCKCHAIN SADAQA MECHANISM FOR DISASTER AID CROWD FUNDING
Rizal Mohd Nor, M.M Hafizur Rahman, Towfiqur Rahman, and Adam Abdullah
|
400 |
CHAPTER 8: Mobile Technology
|
|
- CLOUD-BASED WEB SERVICE COMPOSITION USING ACTION SCRIPT
R Kanesaraj Ramasamy, Noor Ain Rosly, Illiana Azizan, and Fang-Fang Chua
|
406 |
- EXAM PAPER GENERATOR FOR MULTI-PLATFORM MOBILE APPLICATION OPTIMIZED BY CLOUD-BASED WEB SERVICE COMPOSITION
R Kanesaraj Ramasamy, Illiana Azizan, and Noor Ain Rosly
|
412 |
- A BARCODE SCANNING MOBILE APPLICATION FOR SEARCHING HALAL INFORMATION OF FOOD PRODUCTS
Mohd. Nur Faiz Abd Razak and Norliza Katuk
|
418 |
- A COHERENT AUTHENTICATION FRAMEWORK FOR MOBILE COMPUTING BASED ON HOMOMORPHIC SIGNATURE AND IMPLICIT AUTHENTICATION
Hamdun Mohammed, Suliman Mohamed Fati, Vasaki Ponnusamy, Ooi Boon Yaik, Robithoh Annur, and Liew Soung Yue
|
426 |
- MOBILE FLOOD ASSISTANT (MO-FA): ASSISTING FLOOD VICTIMS WITH MOBILE TECHNOLOGY
Marina Md. Din, Salman Yussof, and
Muhammad Rasul Abu Bakar
|
435 |
-
ADDRESSING USABILITY QUALITY ATTRIBUTES IN TECHO-SPRITUAL APPLICATION
Ahairul Afza Abd Wahab, Azrina Kamaruddin, Sa'adah Hassan, and Noraini Che Pa
|
443 |
CHAPTER 9: Educational Computing
|
|
-
AN ANALYSIS OF GAMIFICATION ELEMENTS IN ONLINE LEARNING TO ENHANCE LEARNING ENGAGEMENT
Siti Nurul Mahfuzah Mohamad, Sazilah Salam, and Norasiken Bakar
|
452 |
-
PERCEIVED LEARNING CONSTRUCTS AND INTERACTION PATTERNS IN A SOCIAL NETWORKING SITE
Mohd Nihra Haruzuan Mohamad Said, and Junaidah Yusup
|
461 |
-
MOBILE APPLICATION FOR DYSCALCULIA CHILDREN IN MALAYSIA
Mazeyanti Mohd Ariffin, Fiqa Azureen Abd Halim, and Norshakirah Abd Aziz
|
467 |
-
THE CHALLENGES OF MASSIVE OPEN ONLINE COURSES (MOOC) - A PRELIMINARY REVIEW
Almahdi .M Ejreaw, and Sulfeeza Mohd Drus
|
473 |
- IMPACT OF ICT AND ELECTRONIC GADGET AMONG YOUNG CHILDREN IN EDUCATION: A CONCEPTUAL MODEL
Mira Adila Mat Saruji, Noor Hafizah Hassan, and Sulfeeza Md. Drus
|
480 |
- MULTI-CRITERIA EVALUATION OF E-LEARNING APPROACHES
Husam Jasim Mohammed, Maznah Mat Kasim and Izwan Nizal Mohd Shaharanee
|
487 |
CHAPTER 10: Decision Support Systems & Expert System
|
|
-
ADAPTIVE THRESHOLD BASED APPROACH TO PERFECTLY DETECT HEART CYCLE IN ECG DATA
Mohamad Sabri Bin Sinal and Eiji Kamioka
|
492 |
-
ENHANCED DYNAMICINFRASTRUCTURE AS A SERVICEMODEL (EDIAAS) FOR SELECTING SERVICE PROVIDER
Yazeed Al Moaiad, Zainab Abu Bakar, and Najeeb Abbas Al-Sammaraie
|
499 |
-
DYNAMIC NODE LABELING SCHEMES FOR XML UPDATES
Xuan-Thuan Nguyen, Su-Cheng Haw, Samini Subramaniam,
and Cong-Kha Pham
|
505 |
-
GROUP-IN-THE-LOOP: ARCHITECTURE FOR HARNESSING AND CREATING COLLECTIVE INTELLIGENCE
Sayed Nafiz Haider, Su-Cheng Haw, and Fang-Fang Chua
|
511 |
-
A FRAMEWORK OF THAI TEXT RETRIEVAL USING SPEECH
Paponput Sopon, Thongparn Suksamer, Jantima Polpinij,
and Rapeeporn Chamchong
|
517 |
CHAPTER 11: Web-based Systems
|
|
-
IMPACT OF ONLINE GAMES AMONG UNDERGRADUATE STUDENTS
Rubijesmin Abdul Latif, Norshakirah Abdul Aziz, and Mohd Taufik Abdul Jalil
|
523 |
-
EVALUATING THE QUALITY OF PRIVATE UNIVERSITY WEBSITES IN MALAYSIA
Rubijesmin Abdul Latif
|
533 |
-
EVALUATION OF LOCALIZATION FOR E-LEARNING WEBSITE: A PRELIMINARY STUDY
Aslina Baharum, Punitha Turumugon, Nurul Hidayah Mat Zain, Chin Pei Yee, Salinah Dullah, and Farhana Abd. Lahin
|
541 |
-
PIAK: A PERSONALIZED INTERNET ACCESS FOR KIDS
Abrar Noor Akramin Kamarudin, Bali Ranaivo-Malançon, and Nadianatra Musa
|
547 |
-
MODEL OF CYBERBULLYING BEHAVIOUR FROM THE LENS OF MEDIA SYNCHRONICITY THEORY (MST)
Nurulhuda Ismail, Rahayu Ahmad, Shafiz Affendi Mohd Yusuf, and Abdul Bashah Mat Ali
|
553 |
CHAPTER 12: Knowledge Engineering
|
|
-
THE KNOWLEDGE NEEDED FOR SELF-REGULATED LEARNING: APPLYING THE CONCEPT OF COGNITIVE ENABLERS IN PERSONAL KNOWLEDGE MANAGEMENT
Shahrinaz Ismail, Siti Haryani Shaikh Ali, and Mohamad Hasbullah Abu Bakar
|
560 |
-
SKYLINE QUERY PROCESSING FOR INCOMPLETE DATA IN CLOUD ENVIRONMENT
Yonis Gulzar, Ali A. Alwan, Norsaremah Salleh, and Imad Fakhri Al-Shaikhli
|
567 |
-
WHICH EXTRACTIVE SUMMARIZATION METHOD FOR MALAY TEXTS?
Bali Ranaivo-Malancon and Hazimah Iboi
|
577 |
- KNOWLEDGE MANAGEMENT BEHAVIOR AMONG PRACTITIONERS IN MALAYSIA
Mohamed Jalaldeen Mohamed Razi, Mohd Izzuddin Mohd Tamrin, Abdul Rahman Ahmad Dahlan, and Noor Azian Mohamad Ali
|
583 |
CHAPTER 13: Green Computing/Eco-friendly Computing
|
|
-
THE PRACTICE OF USING GREEN INFORMATION SYSTEM (GREEN IS) SOLUTIONS FOR ECO-FRIENDLY ORGANISATIONS
Mohamad Taha Ijab
|
589 |
-
SOFTWARE SUSTAINABILITY DEVELOPMENT: IMPACTIBILITY CHARACTERISTIC FOCUSES ON SOCIAL APPROACH
Ruzita Ahmad, Fauziah Baharom, and Azham Hussain
|
595 |
-
PADDY WEED LEAF CLASSIFICATION USING NEURO-FUZZY SYSTEM
Mohd Zulhilmi Ab Jamil, Sofianita Mutalib, Shuzlina Abdul Rahman, and Zalilah Abd Aziz
|
601 |
- TOWARDS SUSTAINABLE INFORMATION SYSTEM THROUGH GREEN DESIGN
Noraini Che Pa, Sa'adah Hassan, Hazlina Hamdan, and Faizal Abdul Karim
|
607 |
CHAPTER 14: Management & Engineering of IT-Enabled Services
|
|
-
BIG DATA MATURITY MODEL- A PRELIMINARY EVALUATION
Sulfeeza Mohd Drus and Noor Hafizah Hassan
|
613 |
-
A REVIEW OF KNOWLEDGE MANAGEMENT IMPLEMENTATION THROUGH CLOUD COMPUTING IN MALAYSIA
Nabilah Mahmud and Sulfeeza Mohd Drus
|
621 |
- THE 2014 FLOOD DISASTER IN KEMAMAN, TERENGGANU: LESSONS FROM THE KEMAMAN EXPERIENCE
Mohamad Firdaus Mat Saad, Aliza Abdul Latif, and Marini Othman
|
628 |
- CHALLENGES IN THE IMPLEMENTATION OF HOSPITAL INFORMATION SYSTEMS IN MALAYSIAN PUBLIC HOSPITALS
Nur Azzah Abu Bakar, Noraziah ChePa, and Noorhayati Md Jasin
|
636 |
CHAPTER 15: Cooperative Work Support, Formal Methods, Pervasive Computing, Smart Technology, Smart Embedded Computing & Its Applications
|
|
-
THE ACCEPTANCE OF VIRTUAL PLATFORMS FOR PROMOTING KNOWLEDGE SHARING BEHAVIOR- A REVIEW OF THE TECHNOLOGY ACCEPTANCE MODEL (TAM)
Hairol Adenan Kasim
|
643 |
- GOVERNANCE OF FLOOD DISASTER FRAMEWORK: A WAY FORWARD USING THE FRAMEWORK
Siti Sarah Maidin, Marini Othman, and Mohamad Nazir Ahmad
|
650 |
- IMPROVING THE QUALITY OF REQUIREMENTS WORK PRODUCTS USING SCORING RUBRICS-ASSISTED READING
Emmanuel O.C. Mkpojiogu, and Nor Laily Hashim
|
656 |
- VALIDATION OF UC2VDM++ ARCHITECTURE
Swee Yin Wong, Edwin Mit, and Jonathan Sidi
|
663 |
- MULTI-LABEL CLASSIFICATION USING LABEL COMBINATION TO RECOGNIZE HUMAN ACTIVITY BASED ON VARIOUS SENSOR POSITIONS
M.N.Shah Zainudin, Raihani Mohamed, Md Nasir Sulaiman, Thinagaran Perumal, Norwati Mustapha, and Azree Sharel Ahmad Nazri
|
669 |
- SMARTHOME AND LOCATION POSITIONING SYSTEM (SLOPS): AN AMBIENT INTELLIGENCES SERVICE
Lim Poon Koon, Lau Khai Shien, Manmeet Mahinderjit Singh
|
675 |
- EXPLORING USABILITY OF VARIOUS TOUCH GESTURE IN TOUCH SCREEN IVIS USING PAPER PROTOTYPE
Fatin Shamimi Mohd Zuki and Suziah Sulaiman
|
683 |
- CONCEPTUAL FRAMEWORK FOR ENHANCING A WEARABLE DEVICE THAT CONVERTS SOUND, TEXT AND IMAGE INTO AUTOMATIC SIGN LANGUAGE RECOGNIZING SYSTEM (ASLR)
Shelena Soosay Nathan, Ahmed, Azham Hussain, Nor Laily Hashim, Toan Nguyen-Duc, and Eiji Kamioka
|
691 |
- VISUALIZATION OF SPOKEN LANGUAGE FOR DEAF PEOPLE
Toan Nguyen-Duc, Othmar Othmar Mwambe
Shelena Soosay Nathan, Mohammed Ahmed Taiye
Azham Hussain, Nor Laily Hashim, and Eiji Kamioka
|
696 |
- OBSTACLE DETECTION BASED ON HISTORY INFORMATION IN SELF-DRIVING VEHICLES
Swetha Indudhar Goudar, Keishi Usa, Eiji Kamioka, and Ku Ruhana Ku-Mahamud
|
702 |
CHAPTER 16: Systems & Network Security, Computer Systems & Networking
|
|
- MODALITY CONFLICT ANALYSIS IN XACML POLICY EVALUATION
Teo Poh Kuang, Hamidah Ibrahim, Fatimah Sidi, and Nur Izura Udzir
|
708 |
-
DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION
Baraa Tariq Hammad, Norziana Jamil, Mohd Ezanee Rusli, and Muhammad Reza Zaba
|
714 |
-
ENHANCE THE ROBUSTNESS OF SECURE RIJNDAEL KEY EXPANSION FUNCTION BASED ON INCREMENT CONFUSION AND DIFFUSION BITS
Hassan Mansour Hussien, Zaiton Muda, and Sharifah Md Yasin
|
722 |
-
AN ENHANCEMENT OF LIGHTWEIGHT ENCRYPTION FOR SECURITY OF BIOMETRIC FINGERPRINT DATA FOR SMART HOME ENVIRONMENT
Taqiyah Khadijah Ghazali and Nur Haryani Zakaria
|
729 |
- THE AUTHENTICATION TECHNIQUES FOR ENHANCING THE RPL SECURITY MODE: A SURVEY
Mohamad Faiz Razali, Mohd Ezanee Rusli, Norziana Jamil, Roslan Ismail, and Salman Yussof
|
735 |
- PRIVACY PRESERVATION FRAMEWORK FOR ADVANCED METERING INFRASTRUCTURE
Fiza Abdul Rahim, Asmidar Abu Bakar, Salman Yussof, Roslan Ismail, and Ramona Ramli
|
744 |
- EMAIL SPAM DETECTION: A METHOD OF METACLASSIFIERS STACKING
Mi ZhiWei, Manmeet Mahinderjit Singh, and Zarul Fitri Zaaba
|
750 |
- TIME CONSUMPTION IMPROVEMENT OF MATRIX MULTIPLICATION BY HYBRID EXECUTION OF MESSAGE PASSING INTERFACE AND OPEN MULTI-PROCESSING
Sajad Sajadpour, Jaspaljeet Singh Dhillon, and Abdul Rahim Ahmad
|
758 |
ICOCI2017 URL: http://icoci.uum.edu.my
|
ICOCI 2017, International
Conference on Computing and Informatics, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah Darul Aman,
Malaysia |
|