


default search action
2. ICSECS 2011: Kuantan, Pahang, Malaysia
- Jasni Mohamad Zain

, Wan Maseri Binti Wan Mohd, Eyas El-Qawasmeh:
Software Engineering and Computer Systems - Second International Conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part II. Communications in Computer and Information Science 180, Springer 2011, ISBN 978-3-642-22190-3
Information and Data Management
- Hongwu Qin, Xiuqin Ma, Jasni Mohamad Zain

, Norrozila Sulaiman, Tutut Herawan
:
A Mean Mutual Information Based Approach for Selecting Clustering Attribute. 1-15 - Hongwu Qin, Xiuqin Ma, Jasni Mohamad Zain

, Norrozila Sulaiman, Tutut Herawan
:
A Soft Set Model on Information System and Its Application in Clustering Attribute Selection. 16-27 - Rahmat Widia Sembiring

, Jasni Mohamad Zain
, Abdullah Embong:
Alternative Model for Extracting Multidimensional Data Based-On Comparative Dimension Reduction. 28-42 - Suzana Basaruddin

, Haryani Haron:
Knowledge Taxonomy for Developing Organizational Memory System (OMS) for Public Institutions of Higher Learning (IHL) in Malaysia. 43-57 - Mohd Najwadi Yusoff

, Aman Jantan
:
A Framework for Optimizing Malware Classification by Using Genetic Algorithm. 58-72 - Norshuhani Zamin, Alan Oxley:

Building a Corpus-Derived Gazetteer for Named Entity Recognition. 73-80 - Nureize Arbaiy

, Junzo Watada:
Fuzzy Goal Programming for Multi-level Multi-objective Problem: An Additive Model. 81-95 - Faiz M. Al-Shrouf, Aiman Turani, Khalil Al-Shqeerat

:
Software Agents for E-Commerce Data Workflow Management. 96-106 - Alaa El-Halees:

Mining Opinions in User-Generated Contents to Improve Course Evaluation. 107-115 - Mohd Nordin Abdul Rahman

, Yuzarimi M. Lazim, Farham Mohamed, Suhailan Safei
, Sufian Mat Deris, Mohd Kamir Yusof:
Rough Set Theory Approach for Classifying Multimedia Data. 116-124 - Zuhaira Muhammad Zain

, Abdul Azim Abdul Ghani, Rusli Abdullah
, Rodziah Binti Atan
, Razali Yaakob
:
Application of Rasch Model in Validating the Content of Measurement Instrument for Blog Quality. 125-136 - Rabiei Mamat

, Tutut Herawan
, Mustafa Mat Deris:
Super Attribute Representative for Decision Attribute Selection. 137-147 - Xiuqin Ma, Norrozila Sulaiman:

The Normal Parameter Value Reduction of Soft Sets and Its Algorithm. 148-156 - Choon-Ching Ng, Ali Selamat:

Improving Language Identification of Web Page Using Optimum Profile. 157-166 - Sureena Matayong

, Ahmad Kamil Bin Mahmood:
The Grounded Process of KMS Adoption: The Case Study of Knowledge Sharing and CoPs in Oil and Gas Industry in Malaysia. 167-176 - Zul Hilmi Abdullah

, Nur Izura Udzir
, Ramlan Mahmod
, Khairulmizam Samsudin
:
File Integrity Monitor Scheduling Based on File Security Level Classification. 177-189 - Azizul Azhar Ramli

, Junzo Watada, Witold Pedrycz:
A Convex Hull-Based Fuzzy Regression to Information Granules Problem - An Efficient Solution to Real-Time Data Analysis. 190-204 - Djamalladine Mahamat Pierre, M. Nordin Zakaria:

Genetic Algorithm Approach to Path Planning for Intelligent Camera Control for Scientific Visualization. 205-213 - Abdullahi Mohamud Sharif, Shuib Basri:

Software Risk Assessment: A Review on Small and Medium Software Projects. 214-224 - Kasturi Dewi Varathan

, Tengku M. T. Sembok
, Rabiah Abdul Kadir
, Nazlia Omar
:
Building Knowledge Representation for Multiple Documents Using Semantic Skolem Indexing. 225-231 - Abul Hashem Beg, Noraziah Ahmad

, Ahmed N. Abd Alla
, E. I. Sultan, Noriyani Mohd Zin:
Synchronous Replication: Novel Strategy of Software Persistence Layer Supporting Heterogeneous System. 232-243 - Noraziah Ahmad

, Roslina Mohd Sidek, Mohammad F. J. Klaib, Ainul Azila Che Fauzi
, Mohd Helmy Abd Wahab
, Wan Maseri Binti Wan Mohd:
Preserving Data Replication Consistency through ROWA-MSTS. 244-253 - Alfi Khairiansyah Machfud, Jawdat Khatib, Ahmed Abdulaziz Haji-Ahmed, Abdul Rahman Ahmad Dahlan:

Halal Product Price Indicator Portal: Promoting Malaysia's Local Halal SMEs. 254-262 - Shokoofeh Ketabchi, Navid Karimi Sani, Kecheng Liu:

A Pattern for Structuring the Information System Architecture -Introducing an EA Framework for Organizing Tasks. 263-273 - Habibah Ismail, Dayang N. A. Jawawi

:
The Specifications of the Weakly Hard Real-Time Systems: A Review. 274-288 - Fouzi Harrag

, Eyas El-Qawasmeh, AbdulMalik S. Al-Salman
:
Extracting Named Entities from Prophetic Narration Texts (Hadith). 289-297
Engineering
- Kenichi Takahashi, Takanori Matsuzaki, Tsunenori Mine, Takao Kawamura, Kazunori Sugahara:

Security as a Service for User Customized Data Protection. 298-309
Software Security
- Nasser Vali, Nasser Modiri

:
Challenges and Opportunities in the Information Systems Security Evaluation and Position of ISO / IEC 15408. 321-334 - Zainal Fikri Zamzuri, Mazani Manaf, Adnan Ahmad, Yuzaimi Yunus:

Computer Security Threats Towards the E-Learning System Assets. 335-345 - Nur Atiqah Sia Abdullah

, Rusli Abdullah
, Mohd Hasan Selamat, Azmi Jaafar:
User Acceptance for Extended Function Point Analysis in Software Security Costing. 346-360 - Sohail Safdar, Mohd Fadzil Hassan:

Analyzing Framework for Alternate Execution of Workflows for Different Types of Intrusion Threats. 361-375 - Nurul Haszeli Ahmad

, Syed Ahmad Aljunid, Jamalul-lail Ab Manan
:
Taxonomy of C Overflow Vulnerabilities Attack. 376-390 - Mohd Izham Ibrahim, Aman Jantan

:
A Secure Storage Model to Preserve Evidence in Network Forensics. 391-402 - Mohammad Rasmi

, Aman Jantan
:
Attack Intention Analysis Model for Network Forensics. 403-411 - Rajendra S. Hegadi

:
A New Stream Cipher Using Natural Numbers Based on Conventional Encryption Techniques: MINNSC. 427-436 - Fazli Bin Mat Nor, Kamarularifin Abd. Jalil

, Jamalul-lail Ab Manan
:
Remote User Authentication Scheme with Hardware-Based Attestation. 437-447
Graphics and Multimedia
- Siti Kamaliah Mohd Yusoff, Abas Md Said, Idris Ismail

:
Optimal Camera Placement for 3D Environment. 448-459
Databases
- Mohammed Adam Ibrahim Fakharaldien, Jasni Mohamad Zain

, Norrozila Sulaiman:
XRecursive: AStorage Method for XML Document Based on Relational Database. 460-469 - Abbas Saliimi Lokman, Jasni Mohamad Zain

:
Enhancement Algorithms for SQL-Based Chatbot. 470-479 - Zailani Abdullah

, Tutut Herawan
, Mustafa Mat Deris:
An Alternative Measure for Mining Weighted Least Association Rule and Its Framework. 480-494 - Tutut Herawan

, Prima Vitasari
, Zailani Abdullah
:
Mining Interesting Association Rules of Student Suffering Mathematics Anxiety. 495-508 - Sergio Valdés-Pasarón, Bogart Yail Márquez

, Juan Manuel Ocegueda-Hernández:
Methodology for Measuring the Quality of Education Using Fuzzy Logic. 509-515 - Norhalina Senan

, Rosziati Ibrahim
, Nazri Mohd Nawi
, Iwan Tri Riyadi Yanto, Tutut Herawan
:
Rough Set Theory for Feature Ranking of Traditional Malay Musical Instruments Sounds Dataset. 516-529 - Noor Aida Husaini, Rozaida Ghazali

, Nazri Mohd Nawi
, Lokman Hakim Bin Ismail
:
Pi-Sigma Neural Network for Temperature Forecasting in Batu Pahat. 530-541 - Ahmed HajYasien:

Revisiting Protocol for Privacy Preserving Sharing Distributed Data: A Review with Recent Results. 542-555
Algorithms
- Siti Arpah Ahmad

, Mohd Nasir Taib
, Noor Elaiza Abdul Khalid, Rohana Ahmad
, Haslina Taib:
The Performance of Compound Enhancement Algorithm on Abnormality Detection Analysis of Intra-oral Dental Radiograph Images. 556-566 - Ahmad Husni Mohd Shapri

, Norazeani Abdul Rahman
, Mohamad Halim Abd. Wahid
:
Performance Study of Two-Dimensional Orthogonal Systolic Array. 567-574 - Bana Handaga

, Mustafa Mat Deris:
Similarity Approach on Fuzzy Soft Set Based Numerical Data Classification. 575-589 - Lustiana Pratiwi, Yun-Huoy Choo

, Azah Kamilah Muda
:
An Empirical Study of Density and Distribution Functions for Ant Swarm Optimized Rough Reducts. 590-604 - Shabnam Mahjoub, Shahriar Lotfi

:
The UTLEA: Uniformization of Non-uniform Iteration Spaces in Three-Level Perfect Nested Loops Using an Evolutionary Algorithm. 605-617 - Idawaty Ahmad, Shamala Subramaniam, Mohamed Othman, Zuriati Zukarnain

:
A Discrete Event Simulation for Utility Accrual Scheduling in Uniprocessor Environment. 618-626 - Ho Cheong Lee:

Engineering Design Analysis Using Evolutionary Grammars with Kano's Model to Refine Product Design Strategies. 627-641 - Xiuqin Ma, Norrozila Sulaiman, Mamta Rani:

Applications of Interval-Valued Intuitionistic Fuzzy Soft Sets in a Decision Making Problem. 642-651 - Dani Adhipta, Mohd Fadzil Hassan, Ahmad Kamil Mahmood:

Elasticity Study: DBrain Project Grid-Cloud Integration. 652-662 - Muhammad Aasim Qureshi

, Mohd Fadzil Hassan:
Embedded Backups for Link Failure Recovery in Shortest Path Trees. 663-671 - Nurul Asyikin Mohamed Radzi

, Norashidah Md. Din, Mohammed Hayder Al-Mansoori
, Mohd. Shahmi Abdul Majid:
Managing Differentiated Services in Upstream EPON. 672-679 - Hoshang Kolivand

, Mohd Shahrizal Sunar
, Yousef Farhang
, Haniyeh Fattahi:
Real-Time Volume Shadow Using Stencil Buffer. 680-687 - Rohaya Latip, Zulkhairi Idris:

Highest Response Ratio Next (HRRN) vs First Come First Served (FCFS) Scheduling Algorithm in Grid Environment. 688-693 - Santi Wulan Purnami, Jasni Mohamad Zain

, Abdullah Embong:
Reduced Support Vector Machine Based on k-Mode Clustering for Classification Large Categorical Dataset. 694-702
Signal Processings
- Angkoon Phinyomark

, Montri Phothisonothai, Pornpana Suklaead, Pornchai Phukpattaranont
, Chusak Limsakul:
Fractal Analysis of Surface Electromyography (EMG) Signal for Identify Hand Movements Using Critical Exponent Analysis. 703-713 - Siriwadee Aungsakun, Angkoon Phinyomark

, Pornchai Phukpattaranont
, Chusak Limsakul:
Robust Eye Movement Recognition Using EOG Signal for Human-Computer Interface. 714-723 - Noor Azilah Draman

, Sabrina Ahmad
, Azah Kamilah Muda
:
Recognizing Patterns of Music Signals to Songs Classification Using Modified AIS-Based Classifier. 724-737

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














