Abstract is missing.
- A Hybrid Singular Spectrum Analysis and Neural Networks for Forecasting Inflow and Outflow Currency of Bank IndonesiaSuhartono, Endah Setyowati, Novi Ajeng Salehah, Muhammad Hisyam Lee, Santi Puteri Rahayu, Brodjol Sutijo Suprih Ulama. 3-18 [doi]
- Scalable Single-Source Shortest Path Algorithms on Distributed Memory SystemsThap Panitanarak. 19-33 [doi]
- Simulation Study of Feature Selection on Survival Least Square Support Vector Machines with Application to Health DataDedy Dwi Prastyo, Halwa Annisa Khoiri, Santi Wulan Purnami, Suhartono, Soo-Fen Fam. 34-45 [doi]
- VAR and GSTAR-Based Feature Selection in Support Vector Regression for Multivariate Spatio-Temporal ForecastingDedy Dwi Prastyo, Feby Sandi Nabila, Suhartono, Muhammad Hisyam Lee, Novri Suhermi, Soo-Fen Fam. 46-57 [doi]
- Feature and Architecture Selection on Deep Feedforward Network for Roll Motion Time Series PredictionNovri Suhermi, Suhartono, Santi Puteri Rahayu, Fadilla Indrayuni Prastyasari, Baharuddin Ali, Muhammad Idrus Fachruddin. 58-71 [doi]
- Acoustic Surveillance Intrusion Detection with Linear Predictive Coding and Random ForestMarina Yusoff, Amirul Sadikin Md. Afendi. 72-84 [doi]
- Timing-of-Delivery Prediction Model to Visualize Delivery Trends for Pos Laju Malaysia by Machine Learning TechniquesJo Wei Quah, Chin Hai Ang, Regupathi Divakar, Rosnah Idrus, Nasuha Lee Abdullah, XinYing Chew. 85-95 [doi]
- Cervical Nuclei Segmentation in Whole Slide Histopathology Images Using Convolution Neural NetworkQiuju Yang, Kaijie Wu 0002, Hao Cheng 0004, Chaochen Gu, Yuan Liu, Shawn Patrick Casey, Xinping Guan. 99-109 [doi]
- Performance of SVM and ANFIS for Classification of Malaria Parasite and Its Life-Cycle-Stages in Blood SmearSri Hartati, Agus Harjoko, Rika Rosnelly, Ika Chandradewi, Faizah. 110-121 [doi]
- Digital Image Quality Evaluation for Spatial Domain Text SteganographyJasni Mohamad Zain, Nur Imana Balqis Ramli. 122-133 [doi]
- Exploratory Analysis of MNIST Handwritten Digit for Machine Learning ModellingMohd. Razif Shamsuddin, Shuzlina Abdul Rahman, Azlinah Mohamed. 134-145 [doi]
- Improved Conditional Value-at-Risk (CVaR) Based Method for Diversified Bond Portfolio OptimizationNor Idayu Mat Rifin, Nuru'l-'Izzah Othman, Shahirulliza Shamsul Ambia, Rashidah Ismail. 149-160 [doi]
- Ranking by Fuzzy Weak Autocatalytic SetSiti Salwana Mamat, Tahir Ahmad, Siti-Rahmah Awang, Muhammad Zillullah Mukaram. 161-172 [doi]
- Fortified Offspring Fuzzy Neural Networks AlgorithmKefaya Qaddoum. 173-185 [doi]
- Forecasting Value at Risk of Foreign Exchange Rate by Integrating Geometric Brownian MotionSiti Noorfaera Karim, Maheran Mohd Jaffar. 186-198 [doi]
- Fog of Search Resolver for Minimum Remaining Values Strategic Colouring of GraphSaajid Abuluaih, Azlinah Mohamed, Muthukkaruppan Annamalai, Hiroyuki Iida. 201-215 [doi]
- Incremental Software Development Model for Solving Exam Scheduling ProblemsMaryam Khanian Najafabadi, Azlinah Mohamed. 216-229 [doi]
- Visualization of Frequently Changed Patterns Based on the Behaviour of Dung BeetlesIsrael Edem Agbehadji, Richard C. Millham, Surendra Thakur, Hongji Yang, Hillar Addo. 230-245 [doi]
- Applications of Machine Learning Techniques for Software Engineering Learning and Early Prediction of Students' PerformanceMohamed Alloghani, Dhiya Al-Jumeily, Thar Baker, Abir Hussain, Jamila Mustafina, Ahmed J. Aljaaf. 246-258 [doi]
- Opinion Mining for Skin Care Products on TwitterPakawan Pugsee, Vasinee Nussiri, Wansiri Kittirungruang. 261-271 [doi]
- Tweet Hybrid Recommendation Based on Latent Dirichlet AllocationArisara Pornwattanavichai, Prawpan Brahmasakha Na Sakolnagara, Pongsakorn Jirachanchaisiri, Janekhwan Kitsupapaisan, Saranya Maneeroj. 272-285 [doi]
- Assessing Structured Examination Question Using Automated Keyword Expansion ApproachRayner Alfred, Kay Lie Chan. 286-298 [doi]
- Improving Topical Social Media Sentiment Analysis by Correcting Unknown Words AutomaticallyRayner Alfred, Rui Wen Teoh. 299-308 [doi]
- Big Data Security in the Web-Based Cloud Storage System Using 3D-AES Block Cipher Cryptography AlgorithmNur Afifah Nadzirah Adnan, Suriyani Ariffin. 309-321 [doi]
- An Empirical Study of Classifier Behavior in Rattle ToolWahyu Wibowo, Shuzlina Abdul Rahman. 322-334 [doi]
- Clutter-Reduction Technique of Parallel Coordinates Plot for Photovoltaic Solar DataMuhaafidz Md Saufi, Zainura Idrus, Sharifah Aliman, Nur Atiqah Sia Abdullah. 337-349 [doi]
- Data Visualization of Violent Crime Hotspots in MalaysiaNamelya Binti Anuar, Bee Wah Yap. 350-363 [doi]
- Malaysia Election Data Visualization Using Hexagon Tile Grid MapNur Atiqah Sia Abdullah, Muhammad Nadzmi Mohamed Idzham, Sharifah Aliman, Zainura Idrus. 364-373 [doi]
- A Computerized Tool Based on Cellular Automata and Modified Game of Life for Urban Growth Region AnalysisSiti Z. Z. Abidin, Nur Azmina Mohamad Zamani, Sharifah Aliman. 374-386 [doi]
- Staff Employment Platform (StEP) Using Job Profiling AnalyticsEzzatul Akmal Kamaru-Zaman, Ahmad Farhan Ahmad Kamal, Azlinah Mohamed, Azlin Ahmad, Raja Aisyah Zahira Raja Mohd Zamri. 387-401 [doi]