Abstract is missing.
- Phishing email detection technique by using hybrid featuresLew May Form, Kang-Leng Chiew, San-Nah Sze, Wei King Tiong. 1-5 [doi]
- Automated machine for sorting Sarawak pepper berriesA. H. Fauzi, D. N. F. Awang Iskandar, M. Alif A. Suhaimi. 1-4 [doi]
- Building use Cases With Activity Reference Framework for Big Data AnalyticsSimon Boung-Yew Lau. 1-7 [doi]
- Feature selection with mutual information for regression problemsMuhammad Aliyu Sulaiman, Jane Labadin. 1-6 [doi]
- Measuring task performance using gaze regionsIrwandi Hipni Mohamad Hipiny, Hamimah Ujir. 1-8 [doi]
- Feature selection based on mutual informationMuhammad Aliyu Sulaiman, Jane Labadin. 1-6 [doi]
- A study on heuristic timetabling method for faculty course timetable problemBong Chia Lih, San-Nah Sze, Noor Alamshah Bolhassan. 1-3 [doi]
- Formalize the software quality measurement for heterogeneous requirementsEdwin Mit, Cheah Wai Shiang. 1-4 [doi]
- Wireless Body Area Networks channel decongestion algorithmSoh Brendard, Mujahid Tabassum, HongSiang Chua. 1-6 [doi]
- Predicting electricity consumption: A comparative analysis of the accuracy of various computational techniquesPatrick Ozoh, Shapiee Abd Rahman, Jane Labadin. 1-7 [doi]
- Impact of human diffusion and spatial heterogeneity on transmission dynamics of mosquito-borne diseasesCynthia Mui Lian Kon, Jane Labadin. 1-6 [doi]
- Enhancement of AODV routing protocol in MASNETsMohamad Nazim Jambli, W. B. Wan Mohd Shuhaimi, Halikul Lenando, Johari Abdullah, Sinarwati Mohamad Suhaili. 1-6 [doi]
- The effect of vaccination decision in disease modelling through simulationTeoh Shian Li, Jane Labadin, Phang Piau, Shapiee Abd Rahman, Ling Yeong Tyng. 1-6 [doi]
- Spatio-temporal semantic representation of Cardiac MRI in heart attack patientsD. N. F. Awang Iskandar, Hamimah Ujir. 1-5 [doi]
- Evaluation of clustering and multi-hop routing protocols in Mobile Ad-hoc Sensor NetworksMohamad Nazim Jambli, A. Hendrick, A. A. Julaihi, Johari Abdullah, Sinarwati Mohamad Suhaili. 1-5 [doi]
- Performance evaluation of ZigBee in indoor and outdoor environmentMujahid Tabassum, Kartinah Zen. 1-7 [doi]
- EFA for structure detection in image dataPhei-Chin Lim, Narayanan Kulathuramaiyer, D. N. F. Awang Iskandar, Kang-Leng Chiew. 1-5 [doi]
- Wi-fi fingerprint database construction using Chebyshev wavelet functionsAnvar Narzullaev, Azamjon Nemadaliev, Hasan Selamat Mohd, Mohamed Othman, Khaironi Yatim Sharif. 1-4 [doi]
- Hybrid ant colony system and flower pollination algorithms for global optimizationKu Ruhana Ku-Mahamud. 1-9 [doi]
- Information seeking features of a PICO-based medical question-answering systemWan-Tze Vong, Patrick Hang Hui Then. 1-7 [doi]
- Comparison of Data Driven Models (DDM) for soil moisture retrieval using microwave remote sensing dataLiauw Hephi, Soo-See Chai. 1-5 [doi]
- Neighbor selection protocol for heterogeneous information dissemination in Opportunistic NetworksHalikul Lenando, Abdallah Hassan Gharin, Mohamad Nazim Jambli, Johari Abdullah, Adnan Shahid Khan. 1-7 [doi]
- Hybrid rule-based approach for aspect extraction and categorization from customer reviewsToqir Ahmad Rana, Yu-N. Cheah. 1-5 [doi]
- Towards vulnerability prevention model for web browser using interceptor approachNayeem Khan, Johari Abdullah, Adnan Shahid Khan. 1-5 [doi]
- Green manufacturing and logistics in automotive industry: A simulation modelAbduaziz Jama Oumer, Jack Kie Cheng, Razman Mat Tahar. 1-6 [doi]
- Simulation of 2D surface flow in open channel using explicit finite difference methodShakeel Ahmed Kamboh, Izzatul Nabila bt Sarbini, Jane Labadin. 1-5 [doi]
- Improved H3K27ac histone mark prediction using k-mer proximity featurePui Kwan Fong, Nung Kion Lee. 1-6 [doi]
- Performance analysis of RTS/CTS protocol over Basic Access in wireless networksKuruvilla Mathew, Biju Issac 0001, Tan Chong Eng. 1-6 [doi]