


default search action
8th ICSECS 2023: Penang, Malaysia
- 8th IEEE International Conference On Software Engineering and Computer Systems, ICSECS 2023, Penang, Malaysia, August 25-27, 2023. IEEE 2023, ISBN 979-8-3503-1093-1

- Jasmin Z. K. Chu

, Joel C. M. Than, Pun Liang Thon
, Hudyjaya Siswoyo Jo:
Investigation on Insurance Purchase Classification for Insurance Recommendation Using Deep Learning and Class Propagation. 1-6 - Chang Hoong Jack

, See Kwee Teck, Lim Tong Ming, Ding Ying Hong:
An Overview Analysis of Authentication Mechanism in Microservices-Based Software Architecture: A Discussion Paper. 1-6 - You Wu, Muataz Salam Al Daweri, Burra Venkata Durga Kumar:

Emotional Analysis Based On LSTM-CNN Hybrid Neural Network Model. 1-6 - Syafie Nizam, Mohd Adli Md Ali, Mohd Radhwan Abidin

:
AI-Generated CT Scan Image for Improving Colorectal Cancer Classification. 1-6 - Venkata Venugopal Rao Gudlur:

Fintech Future Business & Cyber Vulnerabilities and Challenges. 1-4 - Farah Aini Amin Nordin:

Project Cost's Early Warning Analysis via Microsoft Power BI (Business Intelligence). 1-6 - Tanvir Ahmad, Nor Syahidatul Nadiah Binti Ismail, Md. Arafatur Rahman, Quadri Waseem

, Abdullah Mat Safri
:
Hop Restricted-AODV (HR-AODV) Routing and Its Applicability on Different Wireless Channels for Vehicular Network. 1-6 - Paul Law Lik Pao, Mohd Arfian Ismail

:
Loan Eligibility Classification Using Logistic Regression. 1-4 - Muhamad Idaham Umar Ong

, Mohamed Ariff Ameeden:
A Meta-Requirement Approach to Validate User Requirement Specification: Threshold Definition. 5-10 - Xue Yi Lee, Yu-Beng Leau:

PErformance Evaluation of Detection Mechanisms Towards the Slow Ddos Attack of Edge Computing. 11-16 - Shi Ru Lim, Nur Shazwani Kamarudin, Nur Hafieza Ismail, Nik Ahmad Hisham Ismail, Nor Ashikin Mohamad Kamal:

Predicting Mental Health Disorder on Twitter Using Machine Learning Techniques. 23-27 - Kelvin Liew Kai Xuan, Mohaiminul Islam Bhuiyan, Nur Shazwani Kamarudin, Ahmad Fakhri Ab. Nasir, Muhammad Zulfahmi Toh Abdullah:

COVID-19 Fake News Detection Model on Social Media Data Using Machine Learning Techniques. 28-34 - Nur Atiqah Mustapa, Azlyna Senawi, Chuan Zun Liang:

Feature Selection Using Law of Total Variance with Fast Correlation-Based Filter. 35-40 - I Made Suwija Putra, Daniel Siahaan, Ahmad Saikhu:

Recognition Textual Entailment on Bahasa Using Biplet Individual Comparison and BiLSTM. 41-46 - Mohammad Haris

, Fang-Fang Chua, Amy Hui-Lan Lim:
An Ensemble-Based Framework to Estimate Software Project Effort. 47-52 - Safa'a Bataieneh

, Samer Hanna:
Real-Time Data Visualization and Analysis Using ASP.NET Core's Tag Helpers in Business Intelligence Applications. 53-57 - Mochamad Alfan Rosid, Daniel Siahaan, Ahmad Saikhu:

Improving Sarcasm Detection in Mash-Up Language Through Hybrid Pretrained Word Embedding. 58-63 - Loh Zheung Yik, Wan Mohd Nasir Wan-Kadir, Noraini binti Ibrahim:

A Systematic Literature Review on Solutions of Mutation Testing Problems. 64-71 - Yunianita Rahmawati

, Daniel Siahaan, Diana Purwitasari:
Text Segmentation Methods for Annotation on eHealth Consultation with Interview Function Labels: A Comparative Study. 72-77 - Aftab Alam Janisar

, Khairul Shafee Kalid, Aliza bt Sarlan, Abdul Rehman Gilal:
Security Requirements Assurance: An Assurance Case Perspective. 78-83 - Najihah Binti Nasir, Jiyong Moon, Seong Baeg Kim:

Metaverse in Education: Insights from South Korea and Potentials for Malaysia. 84-88 - Chi Log Chua, Tong Ming Lim, Kwee Teck See:

An Overview of Part-of-Speech Tagging Methods and Datasets for Malay Language. 89-95 - Misbachul Falach Asy'ari, Chastine Fatichah, Nanik Suciati:

Parking Space Detection in Different Weather Conditions Based on YOLOv5 Method. 96-100 - Yusuf Gladiensyah Bihanda

, Chastine Fatichah, Anny Yuniarti:
Comparative Analysis of ConvNext and Mobilenet on Traffic Vehicle Detection. 101-105 - JunSeong Moon, RaeEun Yang, SoMin Cha, Seong Baeg Kim:

chatGPT vs Mentor : Programming Language Learning Assistance System for Beginners. 106-110 - Humaira Noor, Niful Islam

, Md. Saddam Hossain Mukta, Nur Shazwani Binti Kamarudin, Mohaimenul Azam Khan Raiaan, Sami Azam:
Determining the Optimal Number of GAT and GCN Layers for Node Classification in Graph Neural Networks. 111-116 - Tanvir Ahmad, Nor Syahidatul Nadiah Binti Ismail, Abdullah Mat Safri

, Md. Arafatur Rahman, Mohammad Sojon Beg, M. Taher Bin Bakhtiar:
SDN Enabled Big Data Analytics and Framework for Sensor Data of Vehicle Health, Safety and Monitoring System. 117-121 - Trirat Arromrit

, Korrapin Srisakaew, Napatsakorn Roswhan, Wiriya Mahikul
:
A Supervised Machine Learning Method for Predicting the Employees Turnover Decisions. 122-127 - Ding Ying Hong, See Kwee Teck, Lim Tong Ming, Chang Hoong Jack:

Customizing of ERP In Microservice SaaS Architecture: An Overview of Intrusive & Non-Intrusive Approach. 134-138 - Suraya Alias, Mazliah Majalin, Nur Hayatin:

A Visualized Hybrid Keyword-Cluster Approach for Extractive Text Summarizer Tool for STEM Education in Malaysia. 139-144 - Rattakorn Poonsuph

:
Design and Implementation of a LCDP with Enhanced Functionality. 145-151 - Harvindran Chandrasekaran, Tan Yu Xuan, Tang Kok Mang:

High Performance Business Intelligence Dashboard. 158-163 - Brian Rizqi Paradisiaca Darnoto

, Daniel Siahaan, Diana Purwitasari:
A Comprehensive Ensemble Deep Learning Method for Identifying Native Advertising in News Articles. 164-169 - Saydul Akbar Murad, Zafril Rizal M. Azmi, Faria Jerin Brishti, Md Saib, Anupam Kumar Bairagi:

Priority Based Fair Scheduling: Enhancing Efficiency in Cloud Job Distribution. 170-175 - Dharshika Singarathnam, Swathi Ganesan

, Sangita Pokhrel, Nalinda Prasad Somasiri:
Exploring Cryptographic Techniques for Data security in Resource-Constrained Wireless Sensor Networks:Performance Evaluation and Considerations. 176-180 - Qinyan Gong, Hadyan Hafizh, Muhammad Ateeq, Anwar P. P. Abdul Majeed, Matilda Isaac, Bintao Hu

:
Machine Learning Regression Models for Real-Time Touchless Interaction Applications. 181-186 - Frank Ebbers

:
Effects of the GDPR in Southeast Asia vs. Europe - A Large-Scale Analysis of IoT Devices. 187-194 - Azamuddin Abdul Rahman:

RSSI-Guided Cluster Head Selection for Optimal Optimization in IoT-Enabled WSNs. 195-199 - Aisyah Ibrahim, Tuty Asmawaty Abdul Kadir

, Roderick H. MacDonald, Hamdan Daniyal:
Hand Calibration with Limited Data As The Initial Step Towards System Dynamics Model Validation For COVID-19 Case In Malaysia. 200-204 - Muhamad Wafi Bin Abdul Aziz

, Muhammad Faiz Bin Ramli:
Monocular Camera Free Region Detection Method of Obstacle Avoidance Using Pixel Volume Expansion for Micro - Sized UAV. 205-210 - Yanche Ari Kustiawan

, Tek Yong Lim:
User Stories in Requirements Elicitation: A Systematic Literature Review. 211-216 - Che Akmal Che Yahaya

, Ahmad Firdaus, Azlee Zabidi, Noor Akma Bt Abu Bakar, Mukrimah Bt Nawir
, Philimal Normelissa Ani Abdul Malek:
Cloud of Word vs DroidKungfu: Performance Evaluation in Detecting Root Exploit Malware with Deep Learning Approach. 217-222 - Syamsul Azrin Bin Kamaruddin, Hairulazwan Bin Hashim

, Elmy Johana Binti Mohamad, Nazwa Hidayah Binti Mohamad, Halim Bin Mamat:
Effective Visualization Electrification System via PSCADA Event Log in Railway Industry. 223-228 - Syahrul Nizam Junaini

, Sopian Bujang, Nadri Aetis Basmawi
, Jusmawati Fauzaman:
Shaping the Digital Future of Civil Service: An Assessment of Digital Transformation and Data Science Competencies. 229-234 - Nurul Amira Binti Mohd Zin, Mohd Faizal Ab Razak, Ahmad Firdaus, Ferda Ernawan, Nor Saradatul Akmar Zulkifli:

Machine Learning Technique for Phishing Website Detection. 235-239 - Nur Afiqah Mohd Azman, M. Izham Mohd Jaya

, Azlee Zabidi:
Real-time Fault Diagnostic in Rotating Shaft using IoT-based Architecture and Fuzzy Logic Analysis. 240-245 - Mohammad Faris Bin Mahdhir, Nor Saradatul Akmar Binti Zulkifli, Mohd Zamri Bin Osman, Azlee Bin Zabidi, Mohd Izham Bin Mohd Jaya:

SAISMS: Transforming Ammunition Management Through loT-Enabled Inventory and Safety Monitoring System. 246-251 - Quadri Waseem

, Wan Isni Sofiah Wan Din, Azamuddin Abdul Rahman, Kashif Nisar:
Exploring Machine Learning in IoT Smart Home Automation. 252-257 - Muhammad Arif Mohamad, Zalili Binti Musa, Amelia Ritahani Ismail

:
Crow Search Freeman Chain Code (CS-FCC) Feature Extraction Algorithm for Handwritten Character Recognition. 258-262 - Sharvinteraan C. Mogan, Zuriani Mustaffa, Mohd Herwan Sulaiman, Ferda Ernawan:

Product Recommendation using Deep Learning in Computer Vision. 263-267 - Nur Izzaty Ariffin, Muhd. Aidil Syazwan Hamdan, Syafiq Fauzi Kamarulzaman:

Internet of Things Intercommunication Using SocketIO and WebSocket with WebRTC in Local Area Network as Emergency Communication Devices. 268-273 - Andrew Lim Wei Chin, Lim Gim Wen, Syafiq Fauzi Kamarulzaman:

Intelligent Humanoid Emotion Response Based on Human Emotion Recognition for Virtual Intercommunication Simulator. 274-279 - Nurul Syafiqah Zaidi, Al-Fahim Mubarak-Ali, Abdul Sahli Fakhrudin, Rahiwan Nazar Romli:

Determining the Best Weightage Feature in Parameterization Process of GCCD Model for Clone Detection in C-Based Applications. 280-285 - Mohamed Nur Ayuni, Mok Fock Lin, Loong Qing Zhe:

Deep Learning-Based Classification Approach for Wire Bonding Defects Inspection. 286-290 - Azrie Bin Salleh, Danakorn Nincarean Eh Phon, Nur Shamsiah Abdul Rahman, Suhaizal Bin Hashim, Noor Hidayah Che Lah

:
Examining the Correlations Between Teacher Profiling, ICT Skills, and the Readiness of Integrating Augmented Reality in Education. 303-308 - Azlee Zabidi, Mohd. Izham Jaya

, Hasliza Abu Hassan, Ihsan Mohd Yassin
:
Enhancing Chiller Plant Modelling Performance Through NARX-Based Feature Optimization. 309-313 - Siti NurSyafiqah Binti Rusli, Rohani Binti Abu Bakar, Siti Suhaila Abdul Hamid

:
An Improvement of Interactive Priorization Technique for Requirements Interdependency in Prioritization Process. 320-325 - Siti Normaziah Binti Ihsan

, Tuty Asmawaty Abdul Kadir
, Nurul Ishafira Ismail, Kerk Zhi Yuan, Yeow Song Jie:
Implementation of Serious Games for Data Privacy and Protection Awareness in Cybersecurity. 330-335 - Hanizan Shaker Hussain, Fazali Ghazali, Hafiza A. S., Hanif Mohd Ali, Anbuselvan Sangodiah, Kante Koli Oumar:

A New SVM-STEG Embedding Model in Steganography. 336-341 - Nur Shamsiah Abdul Rahman, Noor Azida Sahabudin, Danakorn Nincarean Eh Phon, Mohd Faizal Ab Razak, Anis Farihan Mat Raffei:

Factors Affecting Cyberbullying Behaviours Among University Students: A Review. 342-346 - Azim Zaliha Abd Aziz

, Nurul Nadzirah Adnan, Nur Farraliza Mansor, Wan Suryani Wan Awang, Ida Nurhaida, Safitri Jaya
:
SODIBOT: A TWO in ONE Real-Time Human Monitoring System using YOLO algorithms. 347-352 - Muhammad Shukri Che Lah, Nureize Arbaiy, Pei-Chun Lin

:
ARIMA-LP: A Hybrid Model for Air Pollution Forecasting with Uncertainty Data. 353-356 - Nur Izzati Nor Azaimi, Nor Bakiah Abd Warif

, Nor Syahidatul Nadiah Binti Ismail:
A Comparative Analysis on Three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection Method. 357-362 - Hong Chang

:
Analysis of Sentiment Towards Artificial Intelligent Industry Using Hybrid Natural Language Processing Technique. 363-370 - Putra Roskhairul Fitri Bin Kaha, Syarifah Bahiyah Rahayu, Andrianto Arfan Wardhana, Moon-Gul Lee, Ahmad Lutfi Ahmad Lokman, Norsyahida Noor Azmi:

Designing an E-Voting Framework Using Blockchain: A Secure and Transparent Attendance Approach. 371-376 - Ding Daorui, Hong Chang

, Burra Venkata Durga Kumar:
Optimized Energy Distribution in Smart Grid System Using Hybrid Machine Learning Techniques. 377-381 - Raed Abdullah Abobakr Busaeed, Wan Isni Sofiah Wan Din, Quadri Waseem

, Azlee Bin Zabidi:
Taxonomy of SQL Injection: ML Trends & Open Challenges. 382-387 - Imran Edzereiq Kamarudin, Mohamed Ariff Ameedeen, Muhamad Idaham Umar Ong

, Azlee Zabidi:
QSroute : A QoS Aware Routing Scheme for Software Defined Networking. 388-391 - Muhamad Aiman Ibrahim, Nur Hafieza Ismail, Nur Shazwani Kamarudin, Nur Syafiqah Mohd Nafis

, Ahmad Fakhri Ab. Nasir:
Identifying PTSD Symptoms Using Machine Learning Techniques on Social Media. 392-395 - Nur Khairani Kamarudin, Ahmad Firdaus, Azlee Zabidi, Mohd Faizal Ab Razak:

CAGDEEP: Mobile Malware Analysis Using Force Atlas 2 with Strong Gravity Call Graph And Deep Learning. 396-401 - Eisyah Hanun Zawawi, Micheal Drieberg, Azrina Abd Aziz, Patrick Sebastian, Lo Hai Hiung:

Development of Light Energy Harvesting for Wearable IoT. 402-407 - Ainie Hayati Noruzman, Ngahzaifa Ab Ghani, Nor Saradatul Akmar Zulkifli:

Enhancing Autism Screening Classification Using Feature Selection and Stacking Classifier. 408-413 - Ida Fadliza Binti Abu Zarin, Ngahzaifa Ab Ghani, Syafiq Fauzi Bin Kamarulzaman:

Machine Learning Classification to Detect Unattended Child in Vehicle Using Sensor Signal: A Review. 414-418 - Shakirah Binti Saidin, Syifak Binti Izhar Hisham:

A Survey on Supervised Machine Learning in Intrusion Detection Systems for Internet of Things. 419-423 - Nurul Izzatie Husna Fauzi, Zalili Binti Musa:

Inertia Weight Strategies in GbLN-PSO for Optimum Solution. 424-429 - Nurul Izzatie Husna Fauzi, Zalili Binti Musa:

A New Approach of Midrange Exploration Exploitation Searching Particle Swarm Optimization for Optimal Solution. 430-434 - Niful Islam

, Md. Mehedi Hasan Jony, Emam Hasan, Sunny Sutradhar, Atikur Rahman, Md. Motaharul Islam:
EWasteNet: A Two-Stream Data Efficient Image Transformer Approach for E-Waste Classification. 435-440 - Siti NurAishah Binti Nazri

, Tuty Asmawaty Abdul Kadir
, Siti Normaziah Binti Ihsan
:
Review on Serious-Education Games for Slow Learners. 441-446 - Jingjia Huang, Xincheng Huang:

Optimization of Data Protection in IoT Field of Cloud Computing Using Compiler Privacy Calculation Method. 447-452 - Xingnan Zhang, Jingjia Huang, Yue Feng:

A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques. 453-458 - Fuad Bajaber:

Enhancing Subcluster Identification in IoT Sensor Networks with Hierarchical Clustering Algorithms and Dendrograms. 459-464 - Manea Abdullah Badheyba, Rozlina Mohamed:

CHarity and Donation Tracking System Using Queue Structure. 465-469 - Salwana Mohamad Asmara, Noor Azida Sahabudin, Nor Syahidatul Nadiah Binti Ismail, Ily Amalina Ahmad Sabri:

A Review of Knowledge Graph Embedding Methods of TransE, TransH and TransR for Missing Links. 470-475 - Ferda Ernawan, Ahmad Hisyam, Prajanto Wahyu Adi, Zuriani Mustaffa, Mohd Faizal Ab Razak:

Robust Image Watermarking Using Hessenberg Decomposition and SVD with Integer Wavelet Transform. 476-480 - Azma binti Abdullah, Rohani Abu Bakar, Kiriyadhatshini Gunaratnam, Fadhl Hujainah, Mohd Fairus Abdul Farid:

Safety Property Attributes in Critical Systems for Requirement Specification: A Review. 481-486 - Muhammad Amirul Isyraf Rohismadi, Anis Farihan Mat Raffei, Nor Saradatul Akmar Zulkifli, Mohd. Hafidz Ithnin, Shah Farez Othman

:
An Automated Strabismus Classification Using Machine Learning Algorithm for Binocular Vision Management System. 487-492 - Saadiah Awang Salim, Noor Azida Sahabudin, Gausallyaa A P. Murugiah, Nur Shamsiah Abdul Rahman, Norhasyimah Hamzah:

Knowledge of the Utilization of Telegram for Learning Among Primary Students in Kuantan. 493-496

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














