Abstract is missing.
- Investigation on Insurance Purchase Classification for Insurance Recommendation Using Deep Learning and Class PropagationJasmin Z. K. Chu, Joel C. M. Than, Pun Liang Thon, Hudyjaya Siswoyo Jo. 1-6 [doi]
- An Overview Analysis of Authentication Mechanism in Microservices-Based Software Architecture: A Discussion PaperChang Hoong Jack, See Kwee Teck, Lim Tong Ming, Ding Ying Hong. 1-6 [doi]
- Emotional Analysis Based On LSTM-CNN Hybrid Neural Network ModelYou Wu, Muataz Salam Al Daweri, Venkata Durga Kumar. 1-6 [doi]
- AI-Generated CT Scan Image for Improving Colorectal Cancer ClassificationSyafie Nizam, Mohd Adli Md Ali, Mohd Radhwan Abidin. 1-6 [doi]
- Hop Restricted-AODV (HR-AODV) Routing and Its Applicability on Different Wireless Channels for Vehicular NetworkTanvir Ahmad, Nor Syahidatul Nadiah Ismail, Md. Arafatur Rahman, Quadri Waseem, Abdullah Mat Safri. 1-6 [doi]
- Fintech Future Business & Cyber Vulnerabilities and ChallengesVenkata Venugopal Rao Gudlur. 1-4 [doi]
- Project Cost's Early Warning Analysis via Microsoft Power BI (Business Intelligence)Farah Aini Amin Nordin. 1-6 [doi]
- Loan Eligibility Classification Using Logistic RegressionPaul Law Lik Pao, Mohd Arfian Ismail. 1-4 [doi]
- A Meta-Requirement Approach to Validate User Requirement Specification: Threshold DefinitionMuhamad Idaham Umar Ong, Mohamed Ariff Ameeden. 5-10 [doi]
- PErformance Evaluation of Detection Mechanisms Towards the Slow Ddos Attack of Edge ComputingXue Yi Lee, Yu-Beng Leau. 11-16 [doi]
- Predicting Mental Health Disorder on Twitter Using Machine Learning TechniquesShi Ru Lim, Nur Shazwani Kamarudin, Nur Hafieza Ismail, Nik Ahmad Hisham Ismail, Nor Ashikin Mohamad Kamal. 23-27 [doi]
- COVID-19 Fake News Detection Model on Social Media Data Using Machine Learning TechniquesKelvin Liew Kai Xuan, Mohaiminul Islam Bhuiyan, Nur Shazwani Kamarudin, Ahmad Fakhri Ab. Nasir, Muhammad Zulfahmi Toh Abdullah. 28-34 [doi]
- Feature Selection Using Law of Total Variance with Fast Correlation-Based FilterNur Atiqah Mustapa, Azlyna Senawi, Chuan Zun Liang. 35-40 [doi]
- Recognition Textual Entailment on Bahasa Using Biplet Individual Comparison and BiLSTMI Made Suwija Putra, Daniel Siahaan, Ahmad Saikhu. 41-46 [doi]
- An Ensemble-Based Framework to Estimate Software Project EffortMohammad Haris, Fang-Fang Chua, Amy Hui-Lan Lim. 47-52 [doi]
- Real-Time Data Visualization and Analysis Using ASP.NET Core's Tag Helpers in Business Intelligence ApplicationsSafa'a Bataieneh, Samer Hanna. 53-57 [doi]
- Improving Sarcasm Detection in Mash-Up Language Through Hybrid Pretrained Word EmbeddingMochamad Alfan Rosid, Daniel Siahaan, Ahmad Saikhu. 58-63 [doi]
- A Systematic Literature Review on Solutions of Mutation Testing ProblemsLoh Zheung Yik, Wan Mohd Nasir Wan-Kadir, Noraini binti Ibrahim. 64-71 [doi]
- Text Segmentation Methods for Annotation on eHealth Consultation with Interview Function Labels: A Comparative StudyYunianita Rahmawati, Daniel Siahaan, Diana Purwitasari. 72-77 [doi]
- Security Requirements Assurance: An Assurance Case PerspectiveAftab Alam Janisar, Khairul Shafee Kalid, Aliza bt Sarlan, Abdul Rehman Gilal. 78-83 [doi]
- Metaverse in Education: Insights from South Korea and Potentials for MalaysiaNajihah Binti Nasir, Jiyong Moon, Seong Baeg Kim. 84-88 [doi]
- An Overview of Part-of-Speech Tagging Methods and Datasets for Malay LanguageChi Log Chua, Tong-Ming Lim, Kwee Teck See. 89-95 [doi]
- Parking Space Detection in Different Weather Conditions Based on YOLOv5 MethodMisbachul Falach Asy'ari, Chastine Fatichah, Nanik Suciati. 96-100 [doi]
- Comparative Analysis of ConvNext and Mobilenet on Traffic Vehicle DetectionYusuf Gladiensyah Bihanda, Chastine Fatichah, Anny Yuniarti. 101-105 [doi]
- chatGPT vs Mentor : Programming Language Learning Assistance System for BeginnersJunSeong Moon, RaeEun Yang, SoMin Cha, Seong Baeg Kim. 106-110 [doi]
- Determining the Optimal Number of GAT and GCN Layers for Node Classification in Graph Neural NetworksHumaira Noor, Niful Islam, Md. Saddam Hossain Mukta, Nur Shazwani Binti Kamarudin, Mohaimenul Azam Khan Raiaan, Sami Azam. 111-116 [doi]
- SDN Enabled Big Data Analytics and Framework for Sensor Data of Vehicle Health, Safety and Monitoring SystemTanvir Ahmad, Nor Syahidatul Nadiah Binti Ismail, Abdullah Mat Safri, Md. Arafatur Rahman, Mohammad Sojon Beg, M. Taher Bin Bakhtiar. 117-121 [doi]
- A Supervised Machine Learning Method for Predicting the Employees Turnover DecisionsTrirat Arromrit, Korrapin Srisakaew, Napatsakorn Roswhan, Wiriya Mahikul. 122-127 [doi]
- Customizing of ERP In Microservice SaaS Architecture: An Overview of Intrusive & Non-Intrusive ApproachDing Ying Hong, See Kwee Teck, Lim Tong Ming, Chang Hoong Jack. 134-138 [doi]
- A Visualized Hybrid Keyword-Cluster Approach for Extractive Text Summarizer Tool for STEM Education in MalaysiaSuraya Alias, Mazliah Majalin, Nur Hayatin. 139-144 [doi]
- Design and Implementation of a LCDP with Enhanced FunctionalityRattakorn Poonsuph. 145-151 [doi]
- High Performance Business Intelligence DashboardHarvindran Chandrasekaran, Tan Yu Xuan, Tang Kok Mang. 158-163 [doi]
- A Comprehensive Ensemble Deep Learning Method for Identifying Native Advertising in News ArticlesBrian Rizqi Paradisiaca Darnoto, Daniel Siahaan, Diana Purwitasari. 164-169 [doi]
- Priority Based Fair Scheduling: Enhancing Efficiency in Cloud Job DistributionSaydul Akbar Murad, Zafril Rizal M. Azmi, Faria Jerin Brishti, Md Saib, Anupam Kumar Bairagi. 170-175 [doi]
- Exploring Cryptographic Techniques for Data security in Resource-Constrained Wireless Sensor Networks:Performance Evaluation and ConsiderationsDharshika Singarathnam, Swathi Ganesan, Sangita Pokhrel, Nalinda Prasad Somasiri. 176-180 [doi]
- Machine Learning Regression Models for Real-Time Touchless Interaction ApplicationsQinyan Gong, Hadyan Hafizh, Muhammad Ateeq, Anwar P. P. Abdul Majeed, Matilda Isaac, Bintao Hu. 181-186 [doi]
- Effects of the GDPR in Southeast Asia vs. Europe - A Large-Scale Analysis of IoT DevicesFrank Ebbers. 187-194 [doi]
- RSSI-Guided Cluster Head Selection for Optimal Optimization in IoT-Enabled WSNsAzamuddin Abdul Rahman. 195-199 [doi]
- Hand Calibration with Limited Data As The Initial Step Towards System Dynamics Model Validation For COVID-19 Case In MalaysiaAisyah Ibrahim, Tuty Asmawaty Abdul Kadir, Roderick H. MacDonald, Hamdan Daniyal. 200-204 [doi]
- Monocular Camera Free Region Detection Method of Obstacle Avoidance Using Pixel Volume Expansion for Micro - Sized UAVMuhamad Wafi Bin Abdul Aziz, Muhammad Faiz Bin Ramli. 205-210 [doi]
- User Stories in Requirements Elicitation: A Systematic Literature ReviewYanche Ari Kustiawan, Tek Yong Lim. 211-216 [doi]
- Cloud of Word vs DroidKungfu: Performance Evaluation in Detecting Root Exploit Malware with Deep Learning ApproachChe Akmal Che Yahaya, Ahmad Firdaus, Azlee Zabidi, Noor Akma Bt Abu Bakar, Mukrimah Bt Nawir, Philimal Normelissa Ani Abdul Malek. 217-222 [doi]
- Effective Visualization Electrification System via PSCADA Event Log in Railway IndustrySyamsul Azrin Bin Kamaruddin, Hairulazwan Bin Hashim, Elmy Johana Binti Mohamad, Nazwa Hidayah Binti Mohamad, Halim Bin Mamat. 223-228 [doi]
- Shaping the Digital Future of Civil Service: An Assessment of Digital Transformation and Data Science CompetenciesSyahrul Nizam Junaini, Sopian Bujang, Nadri Aetis Basmawi, Jusmawati Fauzaman. 229-234 [doi]
- Machine Learning Technique for Phishing Website DetectionNurul Amira Binti Mohd Zin, Mohd Faizal Ab Razak, Ahmad Firdaus, Ferda Ernawan, Nor Saradatul Akmar Zulkifli. 235-239 [doi]
- Real-time Fault Diagnostic in Rotating Shaft using IoT-based Architecture and Fuzzy Logic AnalysisNur Afiqah Mohd Azman, M. Izham Mohd Jaya, Azlee Zabidi. 240-245 [doi]
- SAISMS: Transforming Ammunition Management Through loT-Enabled Inventory and Safety Monitoring SystemMohammad Faris Bin Mahdhir, Nor Saradatul Akmar Binti Zulkifli, Mohd Zamri Bin Osman, Azlee Bin Zabidi, Mohd Izham Bin Mohd Jaya. 246-251 [doi]
- Exploring Machine Learning in IoT Smart Home AutomationQuadri Waseem, Wan Isni Sofiah Wan Din, Azamuddin Abdul Rahman, Kashif Nisar. 252-257 [doi]
- Crow Search Freeman Chain Code (CS-FCC) Feature Extraction Algorithm for Handwritten Character RecognitionMuhammad Arif Mohamad, Zalili Musa, Amelia Ritahani Ismail. 258-262 [doi]
- Product Recommendation using Deep Learning in Computer VisionSharvinteraan C. Mogan, Zuriani Mustaffa, Mohd Herwan Sulaiman, Ferda Ernawan. 263-267 [doi]
- Internet of Things Intercommunication Using SocketIO and WebSocket with WebRTC in Local Area Network as Emergency Communication DevicesNur Izzaty Ariffin, Muhd. Aidil Syazwan Hamdan, Syafiq Fauzi Kamarulzaman. 268-273 [doi]
- Intelligent Humanoid Emotion Response Based on Human Emotion Recognition for Virtual Intercommunication SimulatorAndrew Lim Wei Chin, Lim Gim Wen, Syafiq Fauzi Kamarulzaman. 274-279 [doi]
- Determining the Best Weightage Feature in Parameterization Process of GCCD Model for Clone Detection in C-Based ApplicationsNurul Syafiqah Zaidi, Al-Fahim Mubarak-Ali, Abdul Sahli Fakhrudin, Rahiwan Nazar Romli. 280-285 [doi]
- Deep Learning-Based Classification Approach for Wire Bonding Defects InspectionMohamed Nur Ayuni, Mok Fock Lin, Loong Qing Zhe. 286-290 [doi]
- Examining the Correlations Between Teacher Profiling, ICT Skills, and the Readiness of Integrating Augmented Reality in EducationAzrie Bin Salleh, Danakorn Nincarean Eh Phon, Nur Shamsiah Abdul Rahman, Suhaizal Bin Hashim, Noor Hidayah Che Lah. 303-308 [doi]
- Enhancing Chiller Plant Modelling Performance Through NARX-Based Feature OptimizationAzlee Zabidi, Mohd. Izham Jaya, Hasliza Abu Hassan, Ihsan Mohd Yassin. 309-313 [doi]
- An Improvement of Interactive Priorization Technique for Requirements Interdependency in Prioritization ProcessSiti NurSyafiqah Binti Rusli, Rohani Binti Abu Bakar, Siti Suhaila Abdul Hamid. 320-325 [doi]
- Implementation of Serious Games for Data Privacy and Protection Awareness in CybersecuritySiti Normaziah Ihsan, Tuty Asmawaty Abd Kadir, Nurul Ishafira Ismail, Kerk Zhi Yuan, Yeow Song Jie. 330-335 [doi]
- A New SVM-STEG Embedding Model in SteganographyHanizan Shaker Hussain, Fazali Ghazali, Hafiza A. S., Hanif Mohd Ali, Anbuselvan Sangodiah, Kante Koli Oumar. 336-341 [doi]
- Factors Affecting Cyberbullying Behaviours Among University Students: A ReviewNur Shamsiah Abdul Rahman, Noor Azida Sahabudin, Danakorn Nincarean Eh Phon, Mohd Faizal Ab Razak, Anis Farihan Mat Raffei. 342-346 [doi]
- SODIBOT: A TWO in ONE Real-Time Human Monitoring System using YOLO algorithmsAzim Zaliha Abd Aziz, Nurul Nadzirah Adnan, Nur Farraliza Mansor, Wan Suryani Wan Awang, Ida Nurhaida, Safitri Jaya. 347-352 [doi]
- ARIMA-LP: A Hybrid Model for Air Pollution Forecasting with Uncertainty DataMuhammad Shukri Che Lah, Nureize Arbaiy, Pei-Chun Lin. 353-356 [doi]
- A Comparative Analysis on Three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection MethodNur Izzati Nor Azaimi, Nor Bakiah Abd Warif, Nor-Syahidatul N. Ismail. 357-362 [doi]
- Analysis of Sentiment Towards Artificial Intelligent Industry Using Hybrid Natural Language Processing TechniqueHong Chang. 363-370 [doi]
- Designing an E-Voting Framework Using Blockchain: A Secure and Transparent Attendance ApproachPutra Roskhairul Fitri Bin Kaha, Syarifah Bahiyah Rahayu, Andrianto Arfan Wardhana, Moon-Gul Lee, Ahmad Lutfi Ahmad Lokman, Norsyahida Noor Azmi. 371-376 [doi]
- Optimized Energy Distribution in Smart Grid System Using Hybrid Machine Learning TechniquesDing Daorui, Hong Chang, Burra Venkata Durga Kumar. 377-381 [doi]
- Taxonomy of SQL Injection: ML Trends & Open ChallengesRaed Abdullah Abobakr Busaeed, Wan Isni Sofiah Wan Din, Quadri Waseem, Azlee Bin Zabidi. 382-387 [doi]
- QSroute : A QoS Aware Routing Scheme for Software Defined NetworkingImran Edzereiq Kamarudin, Mohamed Ariff Ameedeen, Muhamad Idaham Umar Ong, Azlee Zabidi. 388-391 [doi]
- Identifying PTSD Symptoms Using Machine Learning Techniques on Social MediaMuhamad Aiman Ibrahim, Nur Hafieza Ismail, Nur Shazwani Kamarudin, Nur Syafiqah Mohd Nafis, Ahmad Fakhri Ab. Nasir. 392-395 [doi]
- CAGDEEP: Mobile Malware Analysis Using Force Atlas 2 with Strong Gravity Call Graph And Deep LearningNur Khairani Kamarudin, Ahmad Firdaus, Azlee Zabidi, Mohd Faizal Ab Razak. 396-401 [doi]
- Development of Light Energy Harvesting for Wearable IoTEisyah Hanun Zawawi, Micheal Drieberg, Azrina Abd Aziz, Patrick Sebastian, Lo Hai Hiung. 402-407 [doi]
- Enhancing Autism Screening Classification Using Feature Selection and Stacking ClassifierAinie Hayati Noruzman, Ngahzaifa Ab Ghani, Nor Saradatul Akmar Zulkifli. 408-413 [doi]
- Machine Learning Classification to Detect Unattended Child in Vehicle Using Sensor Signal: A ReviewIda Fadliza Binti Abu Zarin, Ngahzaifa Ab Ghani, Syafiq Fauzi Bin Kamarulzaman. 414-418 [doi]
- A Survey on Supervised Machine Learning in Intrusion Detection Systems for Internet of ThingsShakirah Binti Saidin, Syifak Binti Izhar Hisham. 419-423 [doi]
- Inertia Weight Strategies in GbLN-PSO for Optimum SolutionNurul Izzatie Husna Fauzi, Zalili Musa. 424-429 [doi]
- A New Approach of Midrange Exploration Exploitation Searching Particle Swarm Optimization for Optimal SolutionNurul Izzatie Husna Fauzi, Zalili Musa. 430-434 [doi]
- EWasteNet: A Two-Stream Data Efficient Image Transformer Approach for E-Waste ClassificationNiful Islam, Md. Mehedi Hasan Jony, Emam Hasan, Sunny Sutradhar, Atikur Rahman, Md. Motaharul Islam. 435-440 [doi]
- Review on Serious-Education Games for Slow LearnersSiti NurAishah Binti Nazri, Tuty Asmawaty Abdul Kadir, Siti Normaziah Binti Ihsan. 441-446 [doi]
- Optimization of Data Protection in IoT Field of Cloud Computing Using Compiler Privacy Calculation MethodJingjia Huang, Xincheng Huang. 447-452 [doi]
- A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted TechniquesXingnan Zhang, Jingjia Huang, Yue Feng. 453-458 [doi]
- Enhancing Subcluster Identification in IoT Sensor Networks with Hierarchical Clustering Algorithms and DendrogramsFuad Bajaber. 459-464 [doi]
- CHarity and Donation Tracking System Using Queue StructureManea Abdullah Badheyba, Rozlina Mohamed. 465-469 [doi]
- A Review of Knowledge Graph Embedding Methods of TransE, TransH and TransR for Missing LinksSalwana Mohamad Asmara, Noor Azida Sahabudin, Nor Syahidatul Nadiah Ismail, Ily Amalina Ahmad Sabri. 470-475 [doi]
- Robust Image Watermarking Using Hessenberg Decomposition and SVD with Integer Wavelet TransformFerda Ernawan, Ahmad Hisyam, Prajanto Wahyu Adi, Zuriani Mustaffa, Mohd Faizal Ab Razak. 476-480 [doi]
- Safety Property Attributes in Critical Systems for Requirement Specification: A ReviewAzma Abdullah, Rohani Abu Bakar, Kiriyadhatshini Gunaratnam, Fadhl Hujainah, Mohd Fairus Abdul Farid. 481-486 [doi]
- An Automated Strabismus Classification Using Machine Learning Algorithm for Binocular Vision Management SystemMuhammad Amirul Isyraf Rohismadi, Anis Farihan Mat Raffei, Nor Saradatul Akmar Zulkifli, Mohd. Hafidz Ithnin, Shah Farez Othman. 487-492 [doi]
- Knowledge of the Utilization of Telegram for Learning Among Primary Students in KuantanSaadiah Awang Salim, Noor Azida Sahabudin, Gausallyaa A P. Murugiah, Nur Shamsiah Abdul Rahman, Norhasyimah Hamzah. 493-496 [doi]