Published Papers
Journal of Engineering Science and Technology (JESTEC)
- A hybrid model for forecasting communicable diseases in Maldives B. Rad, A. A. Shareef, V. Thiruchelvam, A. Afshar, M. Bamiah (1 - 13)
- Malware classification and detection using artificial neural network B. Rad, M. K. H. Nejad, M. Shahpasand (14 - 23)
- A review of latest Wannacry ransomware: Actions and preventions Askarifar, N. A. Abd Rahman, H. Osman (24 - 33)
- Dense-cluster based voting approach for license plate identification Asadzadehkaljahi, P. Shivakumara, S. Roy, M. S. Olatunde, M. H. Anisi, T. Lu, U. Pal (34 - 47)
- Human activity recognition based on optimal skeleton joints using convolutional neural network S . Suriani, S. N. F. Ahmad, M. N. Mohd, M. R. Tomari, W. N. W. Zakaria (48 - 57)
- A fuzzy model for detecting and predicting cloud quality of service violation M. Khan, G.Y. Chan, F.-F. Chua (58 - 77)
- Android malware detection technique via feature analysis P. Ng, K. L. Chiew, D. H. A. Ibrahim, W. K. Tiong, S. N. Sze, N. Musa (78 - 90)
- Hybrid segmentation technique for meningioma tumour detection in MRI brain images Kirubakaran, N. Senthilkumaran (91 - 103)
- Analysis of research topics and collaborative network of Thai government supported scholars Santirojanakul (104 - 115)
- Assessing the impact of presentation mining on understanding among visual learners Kasinathan, I. Medi, A. Mustapha, T. P. O’Daniel (116 – 131)
- The impact of web 2.0 on sustainable tourism A. Gharama, B. B. Rad, M. Ahmadi, M. F. C. Abdul Rani, M. Bamiah (132 - 143)
- Text summarization evaluation based on sentence scoring and clustering Azhari, Y. J. Kumar, O. S. Goh, B. Raza (144 - 151)
- Mobile malware call logs classification based on android package index (API) M. Saudi, A. A. Ismail , F. Ridzuan (152 - 161)
- Knowledge management systems: The current practice in Thailand Gunadham, N. Thammakoranonta (162 – 174)
- A non-invasive approach for human fall risk assessments Nizam, M. N. H. Mohd, M. M. Abdul Jamil (175 - 189)
- Smartwatches as an assistive technology for Arab elderly: A case study H. Al-Baity (190 - 203)
- Blockchain for a secured and forensically sound internet of things M. Shahapasand, S. Chandrashekhar, S. Sarupuri, V. Thiruchelvam (204 - 215)
- A shift in technological paradigm: Cloud computing to fog computing Ahmadi, B. B. Rad, M. O. Thomas, B. A. Onyimbo (216 - 228)
- Big data technology in education: Advantages, implementations, and challenges A. Bamiah, S. N. Brohi, B. B. Rad (229 - 241)
- Genetic algorithm fuzzy logic for medical knowledge-based pattern classification H. Tan, M. S. Tan, S.-W. Chang, K. S. Yap, H. J. Yap, S. Y. Wong (242 - 258)
Journal of Telecommunication, Electronic and Computer Engineering (JTEC)
Vol 10, No 3-2: Recent Trends in Computer Science and Information Technology
- Analysis of Feature Categories for Malware Visualization Ganthan Narayana Samy, Pritheega Magalingam, Aswami Fadillah Mohd Ariffin, Wafa Mohd Khairudin, Mohamad Firham Efendy Md Senan, Zahri Hj Yunos (1-5)
- The Design and Implementation of a Wireless Flood Monitoring System Yasir Hashim, Abdul Hafiz Mohd Idzha, Waheb A. Jabbar (7-11)
- Travel Planning Application: Combining Linear Programming and Shortest Route Problem to Optimize Travelers’ Satisfactions Athapol Ruangkanjanases, Phattharaphong Kaoian (13-19)
- Early Detection of Breast Cancer Using Machine Learning Techniques M. Tahmooresi, A. Afshar, B. Bashari Rad, K. B. Nowshath, M. A. Bamiah (21-27)
- A Graduation Certificate Verification Model via Utilization of the Blockchain Technology Osman Ghazali, Omar S. Saleh (29-34)
- Detection of Breast Thermograms using Ensemble Classifiers Dayakshini Sathish, Surekha Kamath (35-39)
- Dual Encryption Techniques for Secure Image Transmission Andik Setyono, De Rosal Ignatius Moses Setiadi, Muljono Muljono (41-46)
- Dynamic Virtual Machine Allocation Policy for Load Balancing using Principal Component Analysis and Clustering Technique in Cloud Computing Law Siew Xue, Nazatul Aini Abd Majid, Elankovan A. Sundararajan (47-52)
- Measurement Tool for Assessing Research Information Management System Success Mahmudul Hasan, Nurazean Maarop, Ganthan Narayana Samy, Roslina Mohammad, Nurulhuda Firdaus Azmi, Noor Hafizah Hassan, Nabilah Abdul Ghaffar (53-57)
- Statistical Analysis of Badminton Three-Zone Lunge: Training versus Singles J. J. J. Lee, W. P. Loh (59-64)
- Leaf Mechanical Resistance: Effect of Leaf Geometry Shapes for Maturity Classification C.W. H’ng, W.P. Loh (65-70)
- Mining Vibrational Effects on Off-line Handwriting Recognition L.C. Wong, W.P. Loh (71-75)
- A Review of Automatic License Plate Recognition System in Mobile based Platform L. Connie, C. Kim On, A. Patricia (77-82)
- The Determinant Factors Affecting Cloud Computing Adoption by Small and Medium Enterprises (SMEs) in Sabah, Malaysia C. Fook Ming, C. Kim On, A. Rayner, T. Tse Guan, A. Patricia (83-88)
- A CIMB Stock Price Prediction Case Study with Feedforward Neural Network and Recurrent Neural Network G. Kim Soon, C. Kim On, A. Rayner, A. Patricia, J. Teo (89-94)
- Classifying the Archery Performance with Conditional Effects on Angular and Linear Shooting Techniques W. P. Loh, Y. Y. Chong (95-99)
- TouristicAR: A Smart Glass Augmented Reality Application for UNESCO World Heritage Sites in Malaysia Waqas Khalid Obeidy, Haslina Arshad, Jiung Yao Huang (101-108)
- Palm Oil Fresh Fruit Bunch Ripeness Grading Recognition Using Convolutional Neural Network Zaidah Ibrahim, Nurbaity Sabri, Dino Isa (109-113)
- Hidden Sentiment Behind Letter Repetition in Online Reviews Irina Pak, Phoey Lee Teh, Yu-N Cheah (115-120)
- Blockchain-based Technology in the Coffee Supply Chain Trade: Case of Burundi Coffee Vinesh Thiruchelvam, Alexandre Shaka Mughisha, Maryam Shahpasand, Mervat Bamiah (121-125)
Vol 10, No 3: July - September 2018
- Tailoring Software Development Methodologies for Reliability Mohammad Ahmadi, Babak Bashari Rad, Michael Onuoha Thomas (117-121)
- Combining Geographic Information System (GIS) and Simulation for Crew Boat Scheduling Siri-on Setamanit, Khanittha Aem-on (123-127)