Abstract is missing.
- Arabic Text Stemming Using Query Expansion MethodNuhu Yusuf, Mohd Amin Mohd Yunus, Norfaradilla Wahid. 3-11 [doi]
- The Adoption of Business Intelligence Systems in Textile and Apparel Industry: Case StudiesSumera Ahmad, Suraya Miskon. 12-23 [doi]
- Review on Feature Selection Methods for Gene Expression Data ClassificationTalal Almutiri, Faisal Saeed. 24-34 [doi]
- Data Governance Support for Business Intelligence in Higher Education: A Systematic Literature ReviewSoliudeen Muhammed Jamiu, Norris Syed Abdullah, Suraya Miskon, Nazmona Mat Ali. 35-44 [doi]
- Big Data Analytics Adoption Model for Malaysian SMEsEu Lay Tien, Nazmona Mat Ali, Suraya Miskon, Norasnita Ahmad, Norris Syed Abdullah. 45-53 [doi]
- Aedes Entomological Prediction Analytical Dashboard Application for Dengue Outbreak SurveillanceYong Keong Tan, Noraini Ibrahim, Shahliza Abd Halim. 54-65 [doi]
- A Study on the Impact of Crowd-Sourced Rating on Tweets for the Credibility of Information SpreadingNur Liyana Mohd Ramlan, Nor Athiyah Abdullah, Kamal Karkonasasi, Seyed Aliakbar Mousavi. 66-78 [doi]
- A Study of Deterioration in Classification Models in Real-Time Big Data EnvironmentVali Uddin, Syed Sajjad Hussain Rizvi, Manzoor Ahmed Hashmani, Syed Muslim Jameel, Tayyab Ansari. 79-87 [doi]
- Missing Data Characteristics and the Choice of Imputation Technique: An Empirical StudyOyekale Abel Alade, Roselina Sallehuddin, Nor Haizan Mohamed Radzi, Ali Selamat. 88-97 [doi]
- Semantic Annotation of Scientific Publications Based on Integration of Concept KnowledgeShwe Sin Phyo, Nyein Nyein Myo. 98-109 [doi]
- Genetic Algorithm Based Feature Selection for Predicting Student's Academic PerformanceAl Farissi, Halina Mohamed Dahlan, Samsuryadi. 110-117 [doi]
- Morphosyntactic Preprocessing Impact on Document Embedding: An Empirical Study on Semantic SimilarityNourelhouda Yahi, Hacene Belhadef. 118-126 [doi]
- Text Steganography with High Embedding Capacity Using Arabic CalligraphyAli A. Hamzah, Hanaa Bayomi. 127-138 [doi]
- A Genetic Algorithm-Based Grey Model Combined with Fourier Series for Forecasting Tourism Arrivals in Langkawi Island MalaysiaAbdulsamad E. Yahya, Ruhaidah Samsudin, Ani Shabri Ilman. 139-151 [doi]
- Drought Forecasting Using Gaussian Process Regression (GPR) and Empirical Wavelet Transform (EWT)-GPR in Gua MusangMuhammad Akram Shaari, Ruhaidah Samsudin, Ani Shabri Ilman, Abdulsamad E. Yahya. 152-161 [doi]
- Xword: A Multi-lingual Framework for Expanding WordsFaisal Alshargi, Saeedeh Shekarpour, Waseem Alromema. 162-175 [doi]
- Context-Aware Ontology for Dengue SurveillanceSiti Zulaikha Mohd Zuki, Radziah Mohamad, Nor Azizah Sa'adon. 179-188 [doi]
- A Proposed Gradient Tree Boosting with Different Loss Function in Crime Forecasting and AnalysisAlif Ridzuan Khairuddin, Razana Alwee, Habibollah Haron. 189-198 [doi]
- Derivation of Test Cases for Model-based Testing of Software Product Line with Hybrid Heuristic ApproachR. Aduni Sulaiman, Dayang N. A. Jawawi, Shahliza Abd Halim. 199-208 [doi]
- Occluded Face Detection, Face in Niqab DatasetAbdulaziz Ali Saleh Alashbi, Mohd Shahrizal Sunar. 209-215 [doi]
- Spin-Image Descriptors for Text-Independent Speaker RecognitionSuhaila N. Mohammed, Adnan J. Jabir, Zaid Ali Abbas. 216-226 [doi]
- Convergence-Based Task Scheduling Techniques in Cloud Computing: A ReviewAjoze Abdulraheem Zubair, Shukor bin Abd Razak, Md. Asri Bin Ngadi, Aliyu Ahmed, Syed Hamid Hussain Madni. 227-234 [doi]
- Imperative Selection Intensity of Parent Selection Operator in Evolutionary Algorithm Hybridization for Nurse Scheduling ProblemHuai Tein Lim, Irene-SeokChing Yong, PehSang Ng. 235-244 [doi]
- Detection of Cirrhosis Through Ultrasound ImagingKaran Aggarwal, Manjit Singh Bhamrah, Hardeep Singh Ryait. 245-258 [doi]
- Methods to Improve Ranking Chemical Structures in Ligand-Based Virtual ScreeningMohammed Mumtaz Al-Dabbagh, Naomie Salim, Faisal Saeed. 259-269 [doi]
- Analysis on Misclassification in Existing Contraction of Fuzzy Min-Max ModelsEssam Alhroob, Mohammed Falah Mohammed, Osama Nayel Al Sayaydeh, Fadhl Hujainah, Ngahzaifa Ab Ghani. 270-278 [doi]
- Modified Opposition Based Learning to Improve Harmony Search Variants ExplorationAlaa A. Alomoush, AbdulRahman A. Al-Sewari, Hammoudeh S. Alamri, Kamal Z. Zamli, Waleed Alomoush, Mohammed I. Younis. 279-287 [doi]
- Word Embedding-Based Biomedical Text SummarizationOussama Rouane, Hacene Belhadef, Mustapha Bouakkaz. 288-297 [doi]
- Discrete Particle Swarm Optimization Based Filter Feature Selection Technique for the Severity of Road Traffic Accident PredictionLawal Haruna, Roselina Sallehuddin, Haizan Mohammed Radzi. 298-310 [doi]
- Classification of Mammogram Images Using Radial Basis Function Neural NetworkAshraf Osman Ibrahim, Ali Ahmed, Aleya Abdu, Rahma Abd-alaziz, Mohamed Alhaj Alobeed, Abdulrazak Yahya Saleh, Abubakar Elsafi. 311-320 [doi]
- Cycle Generative Adversarial Network for Unpaired Sketch-to-Character TranslationLeena Alsaati, Siti Zaiton Mohd Hashim. 321-329 [doi]
- Rabies Outbreak Prediction Using Deep Learning with Long Short-Term MemoryAbdulrazak Yahya Saleh, Shahrulnizam Anak Medang, Ashraf Osman Ibrahim. 330-340 [doi]
- Bioactivity Prediction Using Convolutional Neural NetworkHamza Hentabli, Maged Nasser, Naomie Salim, Faisal Saeed. 341-351 [doi]
- An Improved Jaya Algorithm-Based Strategy for T-Way Test Suite GenerationAbdullah B. Nasser, Fadhl Hujainah, AbdulRahman A. Al-Sewari, Kamal Z. Zamli. 352-361 [doi]
- Artificial Intelligence Techniques for Predicting the Flashover Voltage on Polluted Cup-Pin InsulatorsAli. A. Salem, R. Abd-Rahman, Samir A. Al-Gailani, M. S. Kamarudin, N. A. Othman, N. A. M. Jamail. 362-372 [doi]
- Heart Disease Diagnosis Using Diverse Neural Network CategoriesMostafa Ibrahem Hassan, Ahmed Hamza Osman, Eltahir Mohamed Hussein. 373-385 [doi]
- Solving the Minimum Dominating Set Problem of Partitioned Graphs Using a Hybrid Bat AlgorithmSaad Adnan Abed, Helmi Md Rais. 386-395 [doi]
- A Voice Morphing Model Based on the Gaussian Mixture Model and Generative Topographic MappingMurad A. Rassam, Rasha Almekhlafi, Eman Alosaily, Haneen Hassan, Reem Hassan, Eman Saeed, Elham Alqershi. 396-406 [doi]
- A Semantic Taxonomy for Weighting Assumptions to Reduce Feature Selection from Social Media and Forum PostsAli Muttaleb Hasan, Taha Hussein Rassem, Noorhuzaimi Mohd Noor, Ahmed Muttaleb Hasan. 407-419 [doi]
- Content-Based Scientific Figure Plagiarism Detection Using Semantic MappingTaiseer Abdalla Elfadil Eisa, Naomie Salim, Abdelzahir Abdelmaboud. 420-427 [doi]
- TwitterBERT: Framework for Twitter Sentiment Analysis Based on Pre-trained Language Model RepresentationsNoureddine Azzouza, Karima Akli-Astouati, Roliana Ibrahim. 428-437 [doi]
- Evaluation of SRAM PUF Characteristics and Generation of Stable Bits for IoT SecurityPyi Phyo Aung, Koichiro Mashiko, Nordinah Binti Ismail, Chia Yee Ooi. 441-450 [doi]
- Generic 5G Infrastructure for IoT EcosystemSaeed Khorashadizadeh, Adeyemi Richard Ikuesan, Victor R. Kebande. 451-462 [doi]
- Sensor Network in Automated Hand Hygiene Systems Using IoT for Public BuildingMichael O. Omoyibo, Tawfik Al Hadhrami, Funminiyi Olajide, Ahmad Lotfi, Ahmed M. Elmisery. 463-476 [doi]
- Security Attacks in IEEE 802.15.4: A Review Disassociation ProcedureAbdullah A. Alabdulatif. 477-485 [doi]
- Traditional Versus Decentralized Access Control for Internet of Things (IoT): SurveyMohammed Saghir, Bassam Ahmed H. Abu Al Khair, Jamil Hamodi, Nibras Abdullah. 486-494 [doi]
- Antenna Design Using UWB Configuration for GPR Scanning ApplicationsJawad Ali, Noorsaliza Abdullah, Asim Ali Khan, Roshayati Yahya, Muzammil Jusoh, Ezri Mohd. 497-510 [doi]
- A Robust Hybrid Model Based on Kalman-SVM for Bus Arrival Time PredictionAbdirahman Osman Hashi, Siti Zaiton Mohd Hashim, Toni Anwar, Abdullahi Ahmed. 511-519 [doi]
- Future Internet ArchitecturesMuhammad Ali Naeem, Shahrudin Awang Nor, Suhaidi Hassan. 520-532 [doi]
- Compute and Data Grids Simulation Tools: A Comparative AnalysisS. M. Argungu, A. Suki M. Arif, Mohd. Hasbullah Omar. 533-544 [doi]
- Resource Discovery Mechanisms in Shared Computing Infrastructure: A SurveyMowafaq Salem Alzboon, M. Mahmuddin, Suki Arif. 545-556 [doi]
- Improving QoS for Non-trivial Applications in Grid ComputingOmar Dakkak, Shahrudin Awang Nor, Suki Arif, Yousef Fazea. 557-568 [doi]
- The Role of Management Techniques for High-Performance Pending Interest Table: A SurveyRaaid Alubady, Suhaidi Hassan, Adib Habbal. 569-582 [doi]
- Software Defined Network Partitioning with Graph Partitioning AlgorithmsShivaleela Arlimatti, Walid Elbrieki, Suhaidi Hassan, Adib Habbal. 583-593 [doi]
- Organizing Named Data Objects in Distributed Name Resolution System for Information-Centric NetworksWalid Elbrieki, Suhaidi Hassan, Shivaleela Arlimatti, Adib Habbal. 594-603 [doi]
- Scheduling Criteria Evaluation with Longer Job First in Information Centric NetworkIbrahim Abdullahi, A. Suki M. Arif, Yousef Fazea. 604-614 [doi]
- An Evaluation of Performance of Location-Based and Location-Free Routing Protocols in Underwater Sensor NetworksNasarudin Ismail, Mohd Murtadha Mohamad. 615-624 [doi]
- Development of WDM System in Optical Amplifiers by Manipulating Fiber Length and Bandwidth for Telecommunication SystemRoby Ikhsan, Romi Fadli Syahputra, Suhardi, Saktioto, Nor Ain Husein, Okfalisa. 625-633 [doi]
- 5G Channel Propagation at 28 GHz in Indoor EnvironmentAhmed M. Al-Samman, Tharek Abdul Rahman, Tawfik Al Hadhrami. 634-642 [doi]
- Design Specification of Context Cognitive Trust Evaluation Model for V2V Communication in IoVAbdul Rehman, Mohd Fadzil Bin Hassan. 643-652 [doi]
- Small and Bandwidth Efficient Multi-band Microstrip Patch Antennas for Future 5G CommunicationsAbdulguddoos S. A. Gaid, Osaid A. S. Qaid, Moheeb A. A. Ameer, Fadi F. M. Qaid, Belal S. A. Ahmed. 653-662 [doi]
- Compact and Bandwidth Efficient Multi-band Microstrip Patch Antennas for 5G ApplicationsAbdulguddoos S. A. Gaid, Amjad M. H. Alhakimi, Osama Y. A. Sae'ed, Mohammed S. Alasadee, Ali A. Ali. 663-672 [doi]
- Towards the Development of a Smart Energy GridMoamin A. Mahmoud, Alicia Y. C. Tang, Andino Maseleno, Fung-Cheng Lim, Hairoladenan Kasim, Christine Yong. 673-682 [doi]
- A Survey of Geocast Routing Protocols in Opportunistic NetworksAliyu M. Abali, Norafida Bte Ithnin, Tekenate Amah Ebibio, Muhammad Dawood, Wadzani A. Gadzama. 683-694 [doi]
- Hybrid Storage Management Method for Video-on-Demand ServerOla Ahmed Al-wesabi, Nibras Abdullah, Putra Sumari. 695-704 [doi]
- New Architecture Design of Cloud Computing Using Software Defined Networking and Network Function Virtualization TechnologyAbdullah Ahmed Bahashwan, Mohammed Anbar, Nibras Abdullah. 705-713 [doi]
- Movement Pattern Extraction Method in OppNet Geocast RoutingAliyu M. Abali, Norafida Bte Ithnin, Muhammad Dawood, Tekenate Amah Ebibio, Wadzani A. Gadzama, Fuad A. Ghaleb. 714-723 [doi]
- A Framework for Privacy and Security Model Based on Agents in E-Health Care SystemsMohammed Ateeq Alanezi, Z. Faizal Khan. 727-733 [doi]
- Normal Profile Updating Method for Enhanced Packet Header Anomaly DetectionWalid Mohamed Alsharafi, Mohd Nizam Omar, Nashwan Ahmed Al-Majmar, Yousef Fazea. 734-747 [doi]
- Hybrid Solution for Privacy-Preserving Data Mining on the Cloud ComputingHuda Osman, Mohd Aizaini Maarof, Maheyzah Md Siraj. 748-758 [doi]
- Detecting False Messages in the Smartphone Fault Reporting SystemSharmiladevi Rajoo, Pritheega Magalingam, Ganthan Narayana Samy, Nurazean Maarop, Norbik Bashah Idris, Bharanidharan Shanmugam, Sundaresan Perumal. 759-768 [doi]
- Local Descriptor and Feature Selection Based Palmprint Recognition SystemChérif Taouche, Hacene Belhadef. 769-778 [doi]
- A Harmony Search-Based Feature Selection Technique for Cloud Intrusion DetectionWidad Mirghani Makki, Maheyzah M. D. Siraj, Nurudeen Mahmud Ibrahim. 779-788 [doi]
- Security Assessment Model to Analysis DOS Attacks in WSNAbdulaziz Aborujilah, Rasheed Mohammad Nassr, Tawfik Al Hadhrami, Mohd Nizam Husen, Nor Azlina Ali, AbdulAleem Al-Othmani, Nur Syahela, Hideya Ochiai. 789-800 [doi]
- Information Security Research for Instant Messaging Service in Taiwan - Build a Private Instant MessagingWeng Chia-Cheng, Chen Ching-Wen. 801-809 [doi]
- A Model of Information Security Policy Compliance for Public Universities: A Conceptual ModelAngraini, Rose Alinda Alias, Okfalisa. 810-818 [doi]
- A Framework for Preserving Location Privacy for Continuous QueriesRaed Saeed Al-Dhubhani, Jonathan Cazalas, Rashid Mehmood, Iyad Katib, Faisal Saeed. 819-832 [doi]
- Deliberate Exponential Chaotic Encryption MapAladdein M. S. Amro. 833-838 [doi]
- Using Hyperledger Fabric Blockchain to Maintain the Integrity of Digital Evidence in a Containerised Cloud EcosystemKenny Awuson-David, Tawfik Al Hadhrami, Funminiyi Olajide, Ahmad Lotfi. 839-848 [doi]
- Phishing Email: Could We Get Rid of It? A Review on Solutions to Combat Phishing EmailsGhassan Ahmed Ali. 849-856 [doi]
- Deauthentication and Disassociation Detection and Mitigation Scheme Using Artificial Neural NetworkAbdallah Elhigazi Abdallah, Shukor Abd Razak, Fuad A. Ghalib. 857-866 [doi]
- Influence of Smart Interactive Advertising Based on Age and Gender: A Case Study from Sri LankaWiraj Udara Wickramaarachchi, W. M. S. L. Weerasinghe, R. M. K. T. Rathnayaka. 869-880 [doi]
- Eliciting Requirements for Designing Self-reflective Visualizations: A Healthcare Professional PerspectiveArchanaa Visvalingam, Jaspaljeet Singh Dhillon, Saraswathy Shamini Gunasekaran, Alan Cheah Kah Hoe. 881-893 [doi]
- A Conceptual Framework for Adopting Automation and Robotics Innovations in the Transformational Companies in the Kingdom of Saudi ArabiaMohammed Aldossari, Abdullah Mohd Zin. 894-905 [doi]
- Smart Group Decision Making on Leadership Style Identification Using Bayes TheoremOkfalisa, Frica A. Ambarwati, Fitri Insani, Toto Saktioto, Angraini. 906-916 [doi]
- Factors Influencing the Adoption of Social Media in Service Sector Small and Medium Enterprises (SMEs)Alice Tabitha Ramachandran, Norasnita Ahmad, Suraya Miskon, Noorminshah A. Iahad, Nazmona Mat Ali. 917-925 [doi]
- Communication and Learning: Social Networking Platforms for Higher EducationNani Amalina Zulkanain, Suraya Miskon, Norris Syed Abdullah, Nazmona Mat Ali, Norasnita Ahmad. 926-935 [doi]
- The Role of Cloud Electronic Records Management System (ERMS) Technology in the Competency of Educational InstitutionsMuaadh Mukred, Zawiyah Mohammad Yusof, Nor Azian Binti Md. Noor, Bakare Kazeem Kayode, Ruqiah Al-Duais. 936-946 [doi]
- Computerized Decision Aid for First-Time HomebuyersS. M. Sarif, S. F. P. Mohamed, M. S. Khalid. 947-959 [doi]
- Malaysian Health Centers' Intention to Use an SMS-Based Vaccination Reminder and Management System: A Conceptual ModelKamal Karkonasasi, Yu-N Cheah, Seyed Aliakbar Mousavi, Ahmad Suhaimi Baharudin. 960-969 [doi]
- Current Knowledge Management Activities in a Manufacturing Company in Malaysia: A Case StudyPutri Norlyana Mustafa Kamal, Norlida Buniyamin, Azmi Osman. 970-979 [doi]
- Determinants of Users' Intention to Use IoT: A Conceptual FrameworkNura Muhammad Baba, Ahmad Suhaimi Baharudin. 980-990 [doi]
- Augmented Reality in Library Services: A Panacea to Achieving Education and Learning 4.0Rifqah Okunlaya, Norris Syed Abdullah, Rose Alinda Alias. 991-998 [doi]
- A Systematic Review on Humanizing Factors for Online SystemLina Fatini Azmi, Norasnita Ahmad. 999-1008 [doi]
- Factors Influence the Intention to Use E-Portfolio in Saudi Technical and Vocational Training Corporation (TVTC) Sector: Pilot ReviewSaeed Matar Alshahrani, Hazura Mohamed, Muriati Mukhtar, Umi Asma' Mokhtar. 1009-1019 [doi]
- Design and Development of Knowledge Management System in the Small and Medium-Scale Enterprises Base on Mobile Apps (SMEs at Indonesia)Junita Juwita Siregar, R. A. Aryanti Wardaya Puspokusumo. 1020-1030 [doi]
- A Review on the Methods to Evaluate Crowd Contributions in Crowdsourcing ApplicationsHazleen Aris, Aqilah Azizan. 1031-1041 [doi]
- Exploring Process of Information Systems and Information Technology for Enterprise AgilityOlatorera Williams, Funminiyi Olajide, Tawfik Al Hadhrami, Ahmad Lotfi. 1042-1051 [doi]
- Cloud Computing Services Adoption by University Students: Pilot Study ResultsAbdulwahab Ali Almazroi, Haifeng Shen, Fathey Mohammed, Nabil Hasan Al-Kumaim. 1052-1060 [doi]
- Development of a Theoretical Framework for Customer Loyalty in AustraliaHassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan. 1061-1075 [doi]
- Exploring the Software Quality Criteria and Sustainable Development Targets: A Case Study of Digital Library in Malaysian Higher Learning InstitutionMasrina A. Salleh, Mahadi Bahari, Waidah Ismail. 1076-1086 [doi]
- Motivations of Teaching in Massive Open Online Course: Review of the LiteratureMuhammad Aliif Ahmad, Ab Razak Che Hussin, Ahmad Fadhil Yusof. 1087-1097 [doi]
- Green Information Technology Adoption Antecedence: A Conceptual FrameworkHussein Mohammed Esmail Abu Al-Rejal, Zulkifli Mohamed Udin, Mohamad Ghozali Hassan, Kamal Imran Mohd Sharif, Waleed Mugahed Al-Rahmi, Nabil Hasan Al-Kumaim. 1098-1108 [doi]
- Search Space Reduction Approach for Self-adaptive Web Service Discovery in Dynamic Mobile EnvironmentSalisu Garba, Radziah Mohamad, Nor Azizah Saadon. 1111-1121 [doi]
- Modeling Reliable Intelligent Blockchain with Architectural PatternSin Ban Ho, Nur Azyyati Ahmad, Ian Chai, Chuie Hong Tan, Swee-Ling Chean. 1122-1131 [doi]
- The Organisational Factors of Software Process Improvement in Small Software Industry: Comparative StudyShuib Basri, Malek Ahmad Theeb Almomani, Abdullahi Abubakar Imam, Thangiah Murugan, Abdul Rehman Gilal, Abdullateef Oluwagbemiga Balogun. 1132-1143 [doi]
- Missing Data Imputation Techniques for Software Effort Estimation: A Study of Recent Issues and ChallengesAyman Jalal Hassan Almutlaq, Dayang N. A. Jawawi. 1144-1158 [doi]
- CarbonFree - A Multi-platform Application for Low Carbon EducationHan Xin Hui, Noraini Ibrahim, Fatin Aliah Phang. 1159-1169 [doi]
- Load Balancing Approach of Protection in Datacenters: A Narrative ReviewLegenda Prameswono Pratama, Safaa Najah Saud, Risma Ekawati, Mauludi Manfaluthy. 1170-1183 [doi]