Abstract is missing.
- A Mean Mutual Information Based Approach for Selecting Clustering AttributeHongwu Qin, Xiuqin Ma, Jasni Mohamad Zain, Norrozila Sulaiman, Tutut Herawan. 1-15 [doi]
- A Soft Set Model on Information System and Its Application in Clustering Attribute SelectionHongwu Qin, Xiuqin Ma, Jasni Mohamad Zain, Norrozila Sulaiman, Tutut Herawan. 16-27 [doi]
- Alternative Model for Extracting Multidimensional Data Based-On Comparative Dimension ReductionRahmat Widia Sembiring, Jasni Mohamad Zain, Abdullah Embong. 28-42 [doi]
- Knowledge Taxonomy for Developing Organizational Memory System (OMS) for Public Institutions of Higher Learning (IHL) in MalaysiaSuzana Basaruddin, Haryani Haron. 43-57 [doi]
- A Framework for Optimizing Malware Classification by Using Genetic AlgorithmMohd Najwadi Yusoff, Aman Jantan. 58-72 [doi]
- Building a Corpus-Derived Gazetteer for Named Entity RecognitionNorshuhani Zamin, Alan Oxley. 73-80 [doi]
- Fuzzy Goal Programming for Multi-level Multi-objective Problem: An Additive ModelNureize Arbaiy, Junzo Watada. 81-95 [doi]
- Software Agents for E-Commerce Data Workflow ManagementFaiz M. Al-Shrouf, Aiman Turani, Khalil Al-Shqeerat. 96-106 [doi]
- Mining Opinions in User-Generated Contents to Improve Course EvaluationAlaa El-Halees. 107-115 [doi]
- Rough Set Theory Approach for Classifying Multimedia DataMohd Nordin Abdul Rahman, Yuzarimi M. Lazim, Farham Mohamed, Suhailan Safei, Sufian Mat Deris, Mohd Kamir Yusof. 116-124 [doi]
- Application of Rasch Model in Validating the Content of Measurement Instrument for Blog QualityZuhaira Muhammad Zain, Abdul Azim Abdul Ghani, Rusli Abdullah, Rodziah Binti Atan, Razali Yaakob. 125-136 [doi]
- Super Attribute Representative for Decision Attribute SelectionRabiei Mamat, Tutut Herawan, Mustafa Mat Deris. 137-147 [doi]
- The Normal Parameter Value Reduction of Soft Sets and Its AlgorithmXiuqin Ma, Norrozila Sulaiman. 148-156 [doi]
- Improving Language Identification of Web Page Using Optimum ProfileChoon-Ching Ng, Ali Selamat. 157-166 [doi]
- The Grounded Process of KMS Adoption: The Case Study of Knowledge Sharing and CoPs in Oil and Gas Industry in MalaysiaSureena Matayong, Ahmad Kamil Bin Mahmood. 167-176 [doi]
- File Integrity Monitor Scheduling Based on File Security Level ClassificationZul Hilmi Abdullah, Nur Izura Udzir, Ramlan Mahmod, Khairulmizam Samsudin. 177-189 [doi]
- A Convex Hull-Based Fuzzy Regression to Information Granules Problem - An Efficient Solution to Real-Time Data AnalysisAzizul Azhar Ramli, Junzo Watada, Witold Pedrycz. 190-204 [doi]
- Genetic Algorithm Approach to Path Planning for Intelligent Camera Control for Scientific VisualizationDjamalladine Mahamat Pierre, Nordin Zakaria. 205-213 [doi]
- Software Risk Assessment: A Review on Small and Medium Software ProjectsAbdullahi Mohamud Sharif, Shuib Basri. 214-224 [doi]
- Building Knowledge Representation for Multiple Documents Using Semantic Skolem IndexingKasturi Dewi Varathan, Tengku M. T. Sembok, Rabiah Abdul Kadir, Nazlia Omar. 225-231 [doi]
- Synchronous Replication: Novel Strategy of Software Persistence Layer Supporting Heterogeneous SystemAbul Hashem Beg, Noraziah Ahmad, Ahmed N. Abd Alla, E. I. Sultan, Noriyani Mohd Zin. 232-243 [doi]
- Preserving Data Replication Consistency through ROWA-MSTSNoraziah Ahmad, Roslina Mohd Sidek, Mohammad F. J. Klaib, Ainul Azila Che Fauzi, Mohd Helmy Abd Wahab, Wan Maseri Binti Wan Mohd. 244-253 [doi]
- Halal Product Price Indicator Portal: Promoting Malaysia's Local Halal SMEsAlfi Khairiansyah Machfud, Jawdat Khatib, Ahmed Abdulaziz Haji-Ahmed, Abdul Rahman Ahmad Dahlan. 254-262 [doi]
- A Pattern for Structuring the Information System Architecture -Introducing an EA Framework for Organizing TasksShokoofeh Ketabchi, Navid Karimi Sani, Kecheng Liu. 263-273 [doi]
- The Specifications of the Weakly Hard Real-Time Systems: A ReviewHabibah Ismail, Dayang N. A. Jawawi. 274-288 [doi]
- Extracting Named Entities from Prophetic Narration Texts (Hadith)Fouzi Harrag, Eyas El-Qawasmeh, AbdulMalik S. Al-Salman. 289-297 [doi]
- Security as a Service for User Customized Data ProtectionKenichi Takahashi, Takanori Matsuzaki, Tsunenori Mine, Takao Kawamura, Kazunori Sugahara. 298-309 [doi]
- Challenges and Opportunities in the Information Systems Security Evaluation and Position of ISO / IEC 15408Nasser Vali, Nasser Modiri. 321-334 [doi]
- Computer Security Threats Towards the E-Learning System AssetsZainal Fikri Zamzuri, Mazani Manaf, Adnan Ahmad, Yuzaimi Yunus. 335-345 [doi]
- User Acceptance for Extended Function Point Analysis in Software Security CostingNur Atiqah Sia Abdullah, Rusli Abdullah, Mohd Hasan Selamat, Azmi Jaafar. 346-360 [doi]
- Analyzing Framework for Alternate Execution of Workflows for Different Types of Intrusion ThreatsSohail Safdar, Mohd. Fadzil Hassan. 361-375 [doi]
- Taxonomy of C Overflow Vulnerabilities AttackNurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan. 376-390 [doi]
- A Secure Storage Model to Preserve Evidence in Network ForensicsMohd Izham Ibrahim, Aman Jantan. 391-402 [doi]
- Attack Intention Analysis Model for Network ForensicsMohammad Rasmi, Aman Jantan. 403-411 [doi]
- A New Stream Cipher Using Natural Numbers Based on Conventional Encryption Techniques: MINNSCRajendra Hegadi. 427-436 [doi]
- Remote User Authentication Scheme with Hardware-Based AttestationFazli Bin Mat Nor, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan. 437-447 [doi]
- Optimal Camera Placement for 3D EnvironmentSiti Kamaliah Mohd Yusoff, Abas Md Said, Idris Ismail. 448-459 [doi]
- XRecursive: AStorage Method for XML Document Based on Relational DatabaseMohammed Adam Ibrahim Fakharaldien, Jasni Mohamad Zain, Norrozila Sulaiman. 460-469 [doi]
- Enhancement Algorithms for SQL-Based ChatbotAbbas Saliimi Lokman, Jasni Mohamad Zain. 470-479 [doi]
- An Alternative Measure for Mining Weighted Least Association Rule and Its FrameworkZailani Abdullah, Tutut Herawan, Mustafa Mat Deris. 480-494 [doi]
- Mining Interesting Association Rules of Student Suffering Mathematics AnxietyTutut Herawan, Prima Vitasari, Zailani Abdullah. 495-508 [doi]
- Methodology for Measuring the Quality of Education Using Fuzzy LogicSergio Valdés-Pasarón, Bogart Yail Márquez, Juan Manuel Ocegueda-Hernández. 509-515 [doi]
- Rough Set Theory for Feature Ranking of Traditional Malay Musical Instruments Sounds DatasetNorhalina Senan, Rosziati Ibrahim, Nazri Mohd Nawi, Iwan Tri Riyadi Yanto, Tutut Herawan. 516-529 [doi]
- Pi-Sigma Neural Network for Temperature Forecasting in Batu PahatNoor Aida Husaini, Rozaida Ghazali, Nazri Mohd Nawi, Lokman Hakim Ismail. 530-541 [doi]
- Revisiting Protocol for Privacy Preserving Sharing Distributed Data: A Review with Recent ResultsAhmed HajYasien. 542-555 [doi]
- The Performance of Compound Enhancement Algorithm on Abnormality Detection Analysis of Intra-oral Dental Radiograph ImagesSiti Arpah Ahmad, Mohd Nasir Taib, NoorElaiza Abd Khalid, Rohana Ahmad, Haslina Taib. 556-566 [doi]
- Performance Study of Two-Dimensional Orthogonal Systolic ArrayAhmad Husni Mohd Shapri, Norazeani Abdul Rahman, Mohamad Halim Abd. Wahid. 567-574 [doi]
- Similarity Approach on Fuzzy Soft Set Based Numerical Data ClassificationBana Handaga, Mustafa Mat Deris. 575-589 [doi]
- An Empirical Study of Density and Distribution Functions for Ant Swarm Optimized Rough ReductsLustiana Pratiwi, Yun-Huoy Choo, Azah Kamilah Muda. 590-604 [doi]
- The UTLEA: Uniformization of Non-uniform Iteration Spaces in Three-Level Perfect Nested Loops Using an Evolutionary AlgorithmShabnam Mahjoub, Shahriar Lotfi. 605-617 [doi]
- A Discrete Event Simulation for Utility Accrual Scheduling in Uniprocessor EnvironmentIdawaty Ahmad, Shamala Subramaniam, Mohamed Othman, Zuriati Zukarnain. 618-626 [doi]
- Engineering Design Analysis Using Evolutionary Grammars with Kano's Model to Refine Product Design StrategiesHo Cheong Lee. 627-641 [doi]
- Applications of Interval-Valued Intuitionistic Fuzzy Soft Sets in a Decision Making ProblemXiuqin Ma, Norrozila Sulaiman, Mamta Rani. 642-651 [doi]
- Elasticity Study: DBrain Project Grid-Cloud IntegrationDani Adhipta, Mohd. Fadzil Hassan, Ahmad Kamil Mahmood. 652-662 [doi]
- Embedded Backups for Link Failure Recovery in Shortest Path TreesMuhammad Aasim Qureshi, Mohd. Fadzil Hassan. 663-671 [doi]
- Managing Differentiated Services in Upstream EPONNurul Asyikin Mohamed Radzi, Norashidah Md. Din, Mohammed Hayder Al-Mansoori, Mohd. Shahmi Abdul Majid. 672-679 [doi]
- Real-Time Volume Shadow Using Stencil BufferHoshang Kolivand, Mohd Shahrizal Sunar, Yousef Farhang, Haniyeh Fattahi. 680-687 [doi]
- Highest Response Ratio Next (HRRN) vs First Come First Served (FCFS) Scheduling Algorithm in Grid EnvironmentRohaya Latip, Zulkhairi Idris. 688-693 [doi]
- Reduced Support Vector Machine Based on k-Mode Clustering for Classification Large Categorical DatasetSanti Wulan Purnami, Jasni Mohamad Zain, Abdullah Embong. 694-702 [doi]
- Fractal Analysis of Surface Electromyography (EMG) Signal for Identify Hand Movements Using Critical Exponent AnalysisAngkoon Phinyomark, Montri Phothisonothai, Pornpana Suklaead, Pornchai Phukpattaranont, Chusak Limsakul. 703-713 [doi]
- Robust Eye Movement Recognition Using EOG Signal for Human-Computer InterfaceSiriwadee Aungsakun, Angkoon Phinyomark, Pornchai Phukpattaranont, Chusak Limsakul. 714-723 [doi]
- Recognizing Patterns of Music Signals to Songs Classification Using Modified AIS-Based ClassifierNoor Azilah Draman, Sabrina Ahmad, Azah Kamilah Muda. 724-737 [doi]