Abstract is missing.
- Towards Android malware detection using intelligent agentsAbdullah J. Alzahrani, Ali A. Ghorbani. 1-8 [doi]
- Simulating Get-Understand-Share-Connect model for personal knowledge management in learning environmentShahrinaz Ismail. 9-15 [doi]
- Workflow analysis for self-adaptive agent-based simulation modelYim Ling Loo, Alicia Y. C. Tang, Azhana Ahmad, Aida Mustapha. 16-21 [doi]
- Detection of data confidentiality violations using Runtime Verification and Quality AssessmentNajwa Abu Bakar, Ali Selamat. 22-26 [doi]
- Cross-fertilization of ideas in Collective Intelligence Model (CIM)Saraswathy Shamini Gunasekaran, Salama A. Mostafa, Mohd Sharifuddin Ahmad, Alicia Y. C. Tang. 27-33 [doi]
- Evaluating students engagement in classrooms using agent-based social simulationLatha Subramainan, Moamin A. Mahmoud, Mohd Sharifuddin Ahmad, Mohd Zaliman Mohd Yusoff. 34-39 [doi]
- A prototype for context identification of scientific papers via agent-based text miningMoamin A. Mahmoud, Mohd Sharifuddin Ahmad. 40-44 [doi]
- A new model of agent spawning and mobilityOsama Treef Alshaki, Mohd Sharifuddin Ahmad, Moamin A. Mahmoud. 45-50 [doi]
- An explanatory review of mandatory taskSean Goh Ka Hong, Azhana Ahmad. 51-56 [doi]
- Wireless Sensor Network: Smart greenhouse prototype with smart designMohd Taha Ismail, Mohd Nazri Ismail, Sera Syarmila Sameon, Zalhan Mohd Zin, Norhatta Mohd. 57-62 [doi]
- The rationality of sincere software agent in task completionNur Huda Jaafar, Mohd Sharifuddin Ahmad, Azhana Ahmad. 63-68 [doi]
- A Value-added Service Analyzer (VaSA) sub-model for Agents of Things (AoT) conceptAnas M. Mzahm, Mohd Sharifuddin Ahmad, Alicia Y. C. Tang, Azhana Ahmad. 69-72 [doi]
- Group decision by house-hunting agents in multi-robot systemsSifat Momen, Tamanna Islam Lima, Raian Siddika. 73-78 [doi]
- Norms trust evaluation for norm adoption in open normative multi-agent systemsNurzeatul Hamimah Abdul Hamid, Mohd Sharifuddin Ahmad, Azhana Ahmad, Aida Mustapha. 79-85 [doi]
- Agent-mediated self-regulated learning: A conceptual model based on knowledge management at agent levelSiti Haryani Shaikh Ali, Shahrinaz Ismail, Mohamad Hasbullah Abu Bakar. 86-91 [doi]
- Privacy and security gaps in mitigating Cyber crime: The reviewAmna Saad, Ahmad Roshidi Amran, Ijlal Ibrahim Afif, Ahmad Hariri Zolkeple, Aidy Izzuddin Ahmad Said, Muhammad Fiqri Hamzah, Wan Nor Salwani Wan Salim. 92-99 [doi]
- Hybrid neural networks for dimension reduction and clustering of multidimensional dataZalhan Mohd Zin, Rubiyah Yusof, Ehsan Mesbahi. 100-105 [doi]
- A Flexible Human-Agent Interaction model for supervised autonomous systemsSalama A. Mostafa, Mohd Sharifuddin Ahmad, Azhana Ahmad, Muthukkaruppan Annamalai, Saraswathy Shamini Gunasekaran. 106-111 [doi]
- Preliminary usability and heuristics model for mobile games, in the aspect of Control FeatureFarahwahida Mohd, Ezri Hielmi Che Daud, Shamsul Anuar Mokhtar. 112-116 [doi]
- Alternate end effector contour tracking for hyper redundant robotic systemSamsi Md Said, Amir Sharizam Ismail, Tengku Mohd Azahar, Jamel Othman. 117-123 [doi]
- A computational model of a norm's yieldAl-Mutazbellah Khamees Itaiwi, Mohd Sharifuddin Ahmad, Alicia Y. C. Tang, Moamin A. Mahmoud. 124-127 [doi]
- Rule-based agent for social media sentiment detectionSiti Salwa BtHasbullah. 128-132 [doi]
- A Conceptual Multi-agent Semantic Web Model of a self-adaptive website for intelligent strategic marketing in learning institutionsAzlan Yusof, Moamin A. Mahmoud, Mohd Sharifuddin Ahmad. 133-138 [doi]
- The architecture of Agent-Based Intelligent Tutoring System for the learning of software engineering Function Point MetricsAedah Abd Rahman, Munaisyah Abdullah, Siti Hajar Alias. 139-144 [doi]
- Lego Bricks Color Sorting MachineSazly Anuar, Allya Badzura Baharuddin, Amirah Mohammad. 145-148 [doi]
- Initial stage of developing a rolling robot to move on various terrainsMurniwati Anwar, Yusof Mohd Ekhsan, Nurzulaikhah Nadzri, Lukman Hakim Omar, Norsehah Abdul Karim, Muhammad Qayyum Harun, Muhammad Akmal Jamain. 149-153 [doi]
- The Collective Intelligence concept: A literature review from the behavioral and cognitive perspectiveSaraswathy Shamini Gunasekaran, Mohd Sharifuddin Ahmad, Alicia Y. C. Tang, Salama A. Mostafa. 154-159 [doi]
- The hybrid encryption algorithm of lightweight data in cloud storageChengliang Liang, Ning Ye, Reza Malekian, Ruchuan Wang. 160-166 [doi]