No. |
Author |
Title |
Research Area |
Keyword |
Full Paper |
Year |
| 1 |
Ramli, R ; Arof, H ; Ibrahim, F ; Idris, MYI ; khairuddin, ASM |
Classification Of Eyelid Position And Eyeball Movement Using EEG Signals |
Computer Science |
EEG signals, EOG artifacts, Hybrid BCI, Eyeball Movement, Eyelid Position, Real-time |
Link |
2015 |
| 2 |
Shah, Asad Ali; Ravana, Sri Devi |
Enhancing Collaborative Learning In Wikis Through An Iterative Model By Supporting Various User Roles |
Computer Science |
Wikis; Computer-Supported Collaborative Learning; Users; Roles; Process Checks |
Link |
2014 |
| 3 |
Varathan, KD ; Sembok, TMT ; Kadir, RA ; Omar, N |
Semantic Indexing For Question Answering System |
Computer Science |
Skolem clauses; Skolem indexing; semantic indexing; question answering |
Link |
2014 |
| 4 |
Ismail, A ; Idris, MYI ; Noor, NM ; Razak, Z ; Yusoff, ZM |
MFCC-VQ Approach for Qalqalah Tajweed Rule Checking |
Computer Science |
: Speech Recognition, Tajweed Recognition, MFCC, VQ |
Link |
2014 |
| 5 |
Safa, NS ; Ghani, NA ; Ismail, MA |
An Artificial Neural Network Classification Approach For Improving Accuracy Of Customer Identification In E-Commerce |
Computer Science |
Customer identification, Behavioral pattern, Profile, e-Commerce |
Link |
2014 |
| 6 |
Rajagopal, P ; Ravana, SD ; Ismail, MA |
Relevance Judgements Exclusive Of Human Assessors In Large Scale Information Retrieval Experimentation |
Computer Science |
Information retrieval, relevance judgments, retrieval evaluation, large scale experimentation |
Link |
2014 |
| 7 |
Emami, A ; Jalooli, A ; Michael, Oche ; Noor, RM ; Ahmedy, I ; Salleh, R |
Performance Evaluation Of Enhanced Velocity-Based Handoff Algorithm For Vanet |
Computer Science |
VANET, Handoff, Velocity, Simulation, Performance |
Link |
2014 |
| 8 |
Chong, CY ; Lee, SP ; Ling, TC |
Prioritizing And Fulfilling Quality Attributes For Virtual Lab Development Through Application Of Fuzzy Analytic Hierarchy Process And Software Development Guidelines |
Computer Science |
quality attributes, priority assessment, fuzzy analytic hierarchy process, software development guideline, virtual lab |
Link |
2014 |
| 9 |
Obaidellah, U ; Azizul, Z ; Faizal, ERM ; Raj, RG |
Craniofacial Tissue Simulation Using Contact Analysis Of The Finite Element Method |
Computer Science |
Finite element modelling, craniofacial surgery, soft tissue simulation, surgery planning, biomechanics |
Link |
2014 |
| 10 |
Feizollah, A ; Anuar, NB ; Salleh, R ; Amalina, F ; Ma'arof, RR ; Shamshirband, S |
A Study Of Machine Learning Classifier For Anomaly-Based Mobile Botnet Detection |
Computer Science |
Mobile botnet, machine learning classifiers, anomaly-based detection, intrusion detection systems |
Link |
2013 |
| 11 |
Rostami, R ; Chiew, TK |
Adapting Web Content Based On User Connection Speed To Ensure Response Time |
Computer Science |
Web Content Adaptation, User Connection Speed, Page Size |
Link |
2013 |
| 12 |
Memon, RN ; Ahmad, R ; Salim, SS |
A Direction Framework To Address Problems In Requirements Engineering Education |
Computer Science |
Requirements Engineering, Requirements Engineering education, Integrated View |
Link |
2013 |
| 13 |
Barakat, HM ; Ismail, MA ; Ravana, SD |
Utilization Of Cross-Terms To Enhance The Language Model For Information Retrieval |
Computer Science |
information retrieval, cross-terms, kernel, proximity, language model |
Link |
2013 |
| 14 |
Ahmed, E ; Shiraz, M ; Gani, A |
Spectrum-Aware Distributed Channel Assignment For Cognitive Radio Wireless Mesh Networks |
Computer Science |
Cognitive Radio Networks, Channel Assignment, Dynamic Spectrum Access, Wireless Mesh Networks |
Link |
2013 |
| 15 |
Naji, S ; Zainuddin, R ; Kareem, SA ; Jalab, HA |
Detecting Faces In Colored Images Using Multi-Skin Color Models And Neural Network With Texture Analysis |
Computer Science |
Face Detection, Skin Color Segmentation, Artificial Neural Network, Texture Analysis |
Link |
2013 |
| 16 |
Tofighy, SM ; Raj, RG ; Javadi, HHS |
AHP Techniques For Persian Text Summarization |
Computer Science |
Text Evaluation, Summary, Traditional Features |
Link |
2013 |
| 17 |
Zare, MR ; Seng, WC ; Mueen, A |
Automatic Classification Of Medical X-Ray Images |
Computer Science |
Classification, X-Ray, Image Processing |
Link |
2013 |
| 18 |
Al-Sewari, AA ; Khamis, N ; Zamli, KZ |
Greedy Interaction Elements Coverage Analysis For AI-Based T-Way Strategies |
Computer Science |
Software Engineering, Interaction Testing, T-Way Testing, Harmony Search Algorithm |
Link |
2013 |
| 19 |
Christopher, C ; Noor, RM ; Mostajeran, E |
Optimizing Wireless Channel Using Adaptive Modulation To Improve QQS In Vanet |
Computer Science |
VANET, MANET, Quality of Service, Modulation, BER, SNR |
Link |
2013 |
| 20 |
Ranathunga, L ; Abdullah, NA ; Zainuddin, R |
User's Visual Intention Driven Retrieval Model For Semantic Video Search And Retrieval |
Computer Science |
CDPC, Visual concepts depiction, Semantic gap, Semantic video retrieval, Semantic video search |
Link |
2012 |
| 21 |
Al-Obaidi, AM ; Lee, SP |
A Concurrent Multi-Stealing Scheduler Model For Divide And Conquer Problems |
Computer Science |
Concurrency, Multithreading, Colored Petri Nets, Divide and Conquer, Matrix Multiplication |
Link |
2012 |
| 22 |
Darwis, SA ; Abdullah, R ; Idris, N |
Exhaustive Affix Stripping And A Malay Word Register To Solve Stemming Erros And Ambiguity Problem In Malay Stemmers |
Computer Science |
Malay language, stemming, Malay Language stemmers, Malay word register, ambiguity problem, under stemming, over stemming |
Link |
2012 |
| 23 |
Mansourvar, M ; Raj, RG ; Ismail, M ; Kareem, SA ; Shanmugam, S ; Wahid, S ; Mahmud, R ; Abdullah, R ; Nasaruddin, F ; Idris, N |
Automated Web Based System For Bone Age Assessment Using Histogram Technique |
Computer Science |
Forensic Science,Bone Age Assessment (BAA),ImageProcessing,Content Based Image Retrieval (CBIR), Histogram |
Link |
2012 |
| 24 |
Phang, Kk ; Ling, TC ; Ang, TF |
Traffic Engineering With Rerouting In Diffserv MPLS Networks |
Computer Science |
Routing, Rerouting, MPLS, DiffServ, QoS |
Link |
2012 |
| 25 |
Yuso, RJR, Zainuddin, R ; Baba, MS ; Jomhari, N ; Yusoff, ZM ; |
Visualizing Qur'anic Words With Parallel Plot |
Computer Science |
Information Visualization, Parallel plot, Scatter plot, Multidimensional, GOMS analysis |
Link |
2012 |
| 26 |
Huang, LB ; Balakrishnan, V ; Raj, RG |
Improving The Relevancy Of Document Search Using The Multi-Term Adjacency Keyword-Order Model |
Computer Science |
Information retrieval, keyword-order, vector space model, adjacency terms relationship |
Link |
2012 |
| 27 |
Idris, N ; Baba, S ; Abdullah, R |
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm |
Computer Science |
summary writing, summarizing strategies, heuristic rules, position-based method, summary sentence decomposition algorithm |
Link |
2011 |
| 28 |
Raj, Rg ; Abdul-Kareem, S |
A Pattern Based Approach For The Derivation Of Base Forms Of Verbs From Participles And Tenses For Flexibles NLP |
Computer Science |
tense, participle, algorithm, pattern |
Link |
2011 |
| 29 |
Seng, Wc ; Fong, LL ; Shing, NL ; Noudeh, SAH |
Robust Watermarking Using Hand Gesture For Enhanced Authentication |
Computer Science |
Watermarking, Robust, Authentication, Hand Gesture, Biometrics, DWT, LSB |
Link |
2011 |
| 30 |
Noor, Rm ; Edwards, C |
Evaluating User Class Approach For Network Mobility Protocol |
Computer Science |
Mobile Network, User Class, Quality of Service, WLAN, Mobile WiMAX, Simulation |
Link |
2011 |
| 31 |
Raj, Rg ; Balakrishnan, V |
A model For Determining The Degree Of Contradictions In Information |
Computer Science |
Information, contradiction, vector space model |
Link |
2011 |
| 32 |
Kareem, Sa ; Raviraja, S ; Awadh, NA ; Kamaruzaman, A ; Kajindran, A |
Classification And Regression Tree in Prediction Of Survival Of Aids Patients |
Computer Science |
Medical prognosis; medical decision making; ANN; AIDS survival; Medical informatics; CART |
Link |
2010 |
| 33 |
Seng, WC ; Chitsaz, M |
Handgrip Strength Evaluation Using Neuro Fuzzy Approach |
Computer Science |
Handgrip strength evaluation, Neuro-Fuzzy system, Fuzzy Logic, Neural network |
Link |
2010 |
| 34 |
Ling, TC ; Lee, JF ; Hoh, KP |
Reducing Handoff Delay In WLAN Using Selective Proactive Context Caching |
Computer Science |
Handoff Delay, Context Caching, Re-association, Selective Proactive Context Caching |
Link |
2010 |
| 35 |
Ranathunga, L ; Zainuddin, R ; Abdullah, NA |
Compacted Dither Pattern Codes Over MPEG-7 Dominant Colour Descriptor In Video Visual Depiction |
Computer Science |
Bhattacharyya classifier, Compacted Dither Pattern Code, Dominant Colour Descriptor, Generalised Lloyds Algorithm, MPEG-7, Video Content Analysis, Visual Concept Depiction, Visual Features |
Link |
2010 |
| 36 |
Riza, A ; Chaw, LT ; Keong, PK ; Pee, HK |
Improving QoS In WLAN Using Dynamic Weighted Fair Scheduling |
Computer Science |
QoS, Dynamic Weighted Fair Scheduling |
Link |
2010 |
| 37 |
Mustafa, MB ; Ainon, RN ; Zainuddin, R ; Don, ZM ; Knowles, G ; Mokhtar, S |
Prosodic Analysis And Modelling For Malay Emotional Speech Synthesis |
Computer Science |
Emotional speech re-synthesis; Prosody conversion; Rule-based approach, MBROLA |
Link |
2010 |
| 38 |
Yee, PL ; Kiah, MLM |
Shoulder Surfing Resistance Using Penup Event And Neighbouring Connectivity Manipulation |
Computer Science |
Picture-Based Password, Graphical Authentication, Shoulder Surfing, Drawmetric, Background Pass-Go |
Link |
2010 |
| 39 |
Ghauth, KI ; Abdullah, NA |
An Empirical Evaluation of Learner Performance In E-Leraning Recommender Systems And An Adaptive Hypermedia System |
Computer Science |
E-learning, Recommendation System, Adaptive Hypermedia System, Content-based Filtering, Collaborative Filtering |
Link |
2010 |
| 40 |
Tahir, A ; Ahmad, R ; Kasirun, ZM |
Maintainability Dynamic Metrics Data Collection Based On Aspect-Oriented Technology |
Computer Science |
Software Quality, Software Maintainability, Dynamic Metrics, Dynamic Coupling, Aspect-Oriented Programming |
Link |
2010 |
| 41 |
Zainab, An ; Anyi, KWU ; Anuar, NB |
A Single Journal Study: Malaysian Journal Of Computer Science |
Computer Science |
Single journal study, journal productivity, authorship pattern, citation analysis, Bibliometrics |
Link |
2009 |
| 42 |
Razak, Z ; Zulkiflee, K ; Noor, NM ; Salleh, R ; Yaacob, M |
Off-Line Handwritten Jawi Character Segmentation Using Histogram Normalization And Sliding Window Approach For Hardware Implementation |
Computer Science |
Optical Character Recognition (OCR), character segmentation, cursive script, image processing, handwriting recognition |
Link |
2009 |
| 43 |
Seng, WC ; Du, J ; Pham, B |
Semi Fragile Watermark With Self Authentication And Self Recovery |
Computer Science |
Semi fragile watermark, self authentication, self recovery |
Link |
2009 |
| 44 |
Qabajeh, LK ; Kiah, MLM ; Qabajeh, MM |
A Scalable And Secure Position-Based Routing Protocol For Ad-Hoc Networks |
Computer Science |
position-based routing, secure routing, scalable routing, ad-hoc networks, wireless networks |
Link |
2009 |
| 45 |
Alyahya, MA ; Ahmad, R ; Lee, Sp |
Effect Of CMMI-Based Software Process Maturity On Software Schedule Estimation |
Computer Science |
Schedule estimation, scale factor, cost driver, COCOMO, SW-CMM, CMMI |
Link |
2009 |
| 46 |
Raj, Rg ; Abdul-Kareem, S |
Information Dissemination And Storage For Tele-Text Based Conversational Systems' Learning |
Computer Science |
Information/sentence dissemination, conjunctions, prepositions, correlative conjunctions, informationally correct responses |
Link |
2009 |
| 47 |
Phang, Kk ; Ling, TC ; Ang, TF |
QoS Routing In Diffserv MPLS Networks |
Computer Science |
QoS Routing, OSPF, MPLS, DiffServ |
Link |
2009 |
| 48 |
Ali, BS ; Kasirun, ZM |
Crosscutting Concern Identification At Requirements Level |
Computer Science |
Requirements Engineering, Aspect-oriented Requirements Engineering, Crosscutting Concern, Crosscutting Identification |
Link |
2008 |
| 49 |
Chaw, LT ; Keong, PK ; Fong, AT ; Pei, LG |
Multi-Area QOS Provisioning Using Hierarchical Bandwidth Brokers Architecture |
Computer Science |
QoS, Bandwidth Broker, OSPF, MPLS, Hierarchical Network |
Link |
2008 |
| 50 |
Anuar, NB ; Sallehuddin, H ; Gani, A ; Zakari, O |
Identifying False Alarm For Network Intrusion Detection System Using Hybrid Data mining And Decision Tree |
Computer Science |
False Positive, False Negative, Intrusion Detection, Data Mining, Decision Tree, Rule-Based |
Link |
2008 |
| |
|
|
|
|
|
|
| |
|
|
|
|
|
|