Welcome ,
   
List of Journal
   

MJCS

MLIS

 

MALAYSIAN JOURNAL OF COMPUTER SCIENCE (MJCS)

No.
Author
Title
Research Area
Keyword
Full Paper
Year
1 Ramli, R ; Arof, H ; Ibrahim, F ; Idris, MYI ; khairuddin, ASM Classification Of Eyelid Position And Eyeball Movement Using EEG Signals Computer Science EEG signals, EOG artifacts, Hybrid BCI, Eyeball Movement, Eyelid Position, Real-time Link 2015
2 Shah, Asad Ali; Ravana, Sri Devi Enhancing Collaborative Learning In Wikis Through An Iterative Model By Supporting Various User Roles Computer Science Wikis; Computer-Supported Collaborative Learning; Users; Roles; Process Checks Link 2014
3 Varathan, KD ; Sembok, TMT ; Kadir, RA ; Omar, N Semantic Indexing For Question Answering System Computer Science Skolem clauses; Skolem indexing; semantic indexing; question answering Link 2014
4 Ismail, A ; Idris, MYI ; Noor, NM ; Razak, Z ; Yusoff, ZM MFCC-VQ Approach for Qalqalah Tajweed Rule Checking Computer Science : Speech Recognition, Tajweed Recognition, MFCC, VQ Link 2014
5 Safa, NS ; Ghani, NA ; Ismail, MA An Artificial Neural Network Classification Approach For Improving Accuracy Of Customer Identification In E-Commerce Computer Science Customer identification, Behavioral pattern, Profile, e-Commerce Link 2014
6 Rajagopal, P ; Ravana, SD ; Ismail, MA Relevance Judgements Exclusive Of Human Assessors In Large Scale Information Retrieval Experimentation Computer Science Information retrieval, relevance judgments, retrieval evaluation, large scale experimentation Link 2014
7 Emami, A ; Jalooli, A ; Michael, Oche ; Noor, RM ; Ahmedy, I ; Salleh, R Performance Evaluation Of Enhanced Velocity-Based Handoff Algorithm For Vanet Computer Science VANET, Handoff, Velocity, Simulation, Performance Link 2014
8 Chong, CY ; Lee, SP ; Ling, TC Prioritizing And Fulfilling Quality Attributes For Virtual Lab Development Through Application Of Fuzzy Analytic Hierarchy Process And Software Development Guidelines Computer Science quality attributes, priority assessment, fuzzy analytic hierarchy process, software development guideline, virtual lab Link 2014
9 Obaidellah, U ; Azizul, Z ; Faizal, ERM ; Raj, RG Craniofacial Tissue Simulation Using Contact Analysis Of The Finite Element Method Computer Science Finite element modelling, craniofacial surgery, soft tissue simulation, surgery planning, biomechanics Link 2014
10 Feizollah, A ; Anuar, NB ; Salleh, R ; Amalina, F ; Ma'arof, RR ; Shamshirband, S A Study Of Machine Learning Classifier For Anomaly-Based Mobile Botnet Detection Computer Science Mobile botnet, machine learning classifiers, anomaly-based detection, intrusion detection systems Link 2013
11 Rostami, R ; Chiew, TK Adapting Web Content Based On User Connection Speed To Ensure Response Time Computer Science Web Content Adaptation, User Connection Speed, Page Size Link 2013
12 Memon, RN ; Ahmad, R ; Salim, SS A Direction Framework To Address Problems In Requirements Engineering Education Computer Science Requirements Engineering, Requirements Engineering education, Integrated View Link 2013
13 Barakat, HM ; Ismail, MA ; Ravana, SD Utilization Of Cross-Terms To Enhance The Language Model For Information Retrieval Computer Science information retrieval, cross-terms, kernel, proximity, language model Link 2013
14 Ahmed, E ; Shiraz, M ; Gani, A Spectrum-Aware Distributed Channel Assignment For Cognitive Radio Wireless Mesh Networks Computer Science Cognitive Radio Networks, Channel Assignment, Dynamic Spectrum Access, Wireless Mesh Networks Link 2013
15 Naji, S ; Zainuddin, R ; Kareem, SA ; Jalab, HA Detecting Faces In Colored Images Using Multi-Skin Color Models And Neural Network With Texture Analysis Computer Science Face Detection, Skin Color Segmentation, Artificial Neural Network, Texture Analysis Link 2013
16 Tofighy, SM ; Raj, RG ; Javadi, HHS AHP Techniques For Persian Text Summarization Computer Science Text Evaluation, Summary, Traditional Features Link 2013
17 Zare, MR ; Seng, WC ; Mueen, A Automatic Classification Of Medical X-Ray Images Computer Science Classification, X-Ray, Image Processing Link 2013
18 Al-Sewari, AA ; Khamis, N ; Zamli, KZ Greedy Interaction Elements Coverage Analysis For AI-Based T-Way Strategies Computer Science Software Engineering, Interaction Testing, T-Way Testing, Harmony Search Algorithm Link 2013
19 Christopher, C ; Noor, RM ; Mostajeran, E Optimizing Wireless Channel Using Adaptive Modulation To Improve QQS In Vanet Computer Science VANET, MANET, Quality of Service, Modulation, BER, SNR Link 2013
20 Ranathunga, L ; Abdullah, NA ; Zainuddin, R User's Visual Intention Driven Retrieval Model For Semantic Video Search And Retrieval Computer Science CDPC, Visual concepts depiction, Semantic gap, Semantic video retrieval, Semantic video search Link 2012
21 Al-Obaidi, AM ; Lee, SP A Concurrent Multi-Stealing Scheduler Model For Divide And Conquer Problems Computer Science Concurrency, Multithreading, Colored Petri Nets, Divide and Conquer, Matrix Multiplication Link 2012
22 Darwis, SA ; Abdullah, R ; Idris, N Exhaustive Affix Stripping And A Malay Word Register To Solve Stemming Erros And Ambiguity Problem In Malay Stemmers Computer Science Malay language, stemming, Malay Language stemmers, Malay word register, ambiguity problem, under stemming, over stemming Link 2012
23 Mansourvar, M ; Raj, RG ; Ismail, M ; Kareem, SA ; Shanmugam, S ; Wahid, S ; Mahmud, R ; Abdullah, R ; Nasaruddin, F ; Idris, N Automated Web Based System For Bone Age Assessment Using Histogram Technique Computer Science Forensic Science,Bone Age Assessment (BAA),ImageProcessing,Content Based Image Retrieval (CBIR), Histogram Link 2012
24 Phang, Kk ; Ling, TC ; Ang, TF Traffic Engineering With Rerouting In Diffserv MPLS Networks Computer Science Routing, Rerouting, MPLS, DiffServ, QoS Link 2012
25 Yuso, RJR, Zainuddin, R ; Baba, MS ; Jomhari, N ; Yusoff, ZM ; Visualizing Qur'anic Words With Parallel Plot Computer Science Information Visualization, Parallel plot, Scatter plot, Multidimensional, GOMS analysis Link 2012
26 Huang, LB ; Balakrishnan, V ; Raj, RG Improving The Relevancy Of Document Search Using The Multi-Term Adjacency Keyword-Order Model Computer Science Information retrieval, keyword-order, vector space model, adjacency terms relationship Link 2012
27 Idris, N ; Baba, S ; Abdullah, R Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm Computer Science summary writing, summarizing strategies, heuristic rules, position-based method, summary sentence decomposition algorithm Link 2011
28 Raj, Rg ; Abdul-Kareem, S A Pattern Based Approach For The Derivation Of Base Forms Of Verbs From Participles And Tenses For Flexibles NLP Computer Science tense, participle, algorithm, pattern Link 2011
29 Seng, Wc ; Fong, LL ; Shing, NL ; Noudeh, SAH Robust Watermarking Using Hand Gesture For Enhanced Authentication Computer Science Watermarking, Robust, Authentication, Hand Gesture, Biometrics, DWT, LSB Link 2011
30 Noor, Rm ; Edwards, C Evaluating User Class Approach For Network Mobility Protocol Computer Science Mobile Network, User Class, Quality of Service, WLAN, Mobile WiMAX, Simulation Link 2011
31 Raj, Rg ; Balakrishnan, V A model For Determining The Degree Of Contradictions In Information Computer Science Information, contradiction, vector space model Link 2011
32 Kareem, Sa ; Raviraja, S ; Awadh, NA ; Kamaruzaman, A ; Kajindran, A Classification And Regression Tree in Prediction Of Survival Of Aids Patients Computer Science Medical prognosis; medical decision making; ANN; AIDS survival; Medical informatics; CART Link 2010
33 Seng, WC ; Chitsaz, M Handgrip Strength Evaluation Using Neuro Fuzzy Approach Computer Science Handgrip strength evaluation, Neuro-Fuzzy system, Fuzzy Logic, Neural network Link 2010
34 Ling, TC ; Lee, JF ; Hoh, KP Reducing Handoff Delay In WLAN Using Selective Proactive Context Caching Computer Science Handoff Delay, Context Caching, Re-association, Selective Proactive Context Caching Link 2010
35 Ranathunga, L ; Zainuddin, R ; Abdullah, NA Compacted Dither Pattern Codes Over MPEG-7 Dominant Colour Descriptor In Video Visual Depiction Computer Science Bhattacharyya classifier, Compacted Dither Pattern Code, Dominant Colour Descriptor, Generalised Lloyds Algorithm, MPEG-7, Video Content Analysis, Visual Concept Depiction, Visual Features Link 2010
36 Riza, A ; Chaw, LT ; Keong, PK ; Pee, HK Improving QoS In WLAN Using Dynamic Weighted Fair Scheduling Computer Science QoS, Dynamic Weighted Fair Scheduling Link 2010
37 Mustafa, MB ; Ainon, RN ; Zainuddin, R ; Don, ZM ; Knowles, G ; Mokhtar, S Prosodic Analysis And Modelling For Malay Emotional Speech Synthesis Computer Science Emotional speech re-synthesis; Prosody conversion; Rule-based approach, MBROLA Link 2010
38 Yee, PL ; Kiah, MLM Shoulder Surfing Resistance Using Penup Event And Neighbouring Connectivity Manipulation Computer Science Picture-Based Password, Graphical Authentication, Shoulder Surfing, Drawmetric, Background Pass-Go Link 2010
39 Ghauth, KI ; Abdullah, NA An Empirical Evaluation of Learner Performance In E-Leraning Recommender Systems And An Adaptive Hypermedia System Computer Science E-learning, Recommendation System, Adaptive Hypermedia System, Content-based Filtering, Collaborative Filtering Link 2010
40 Tahir, A ; Ahmad, R ; Kasirun, ZM Maintainability Dynamic Metrics Data Collection Based On Aspect-Oriented Technology Computer Science Software Quality, Software Maintainability, Dynamic Metrics, Dynamic Coupling, Aspect-Oriented Programming Link 2010
41 Zainab, An ; Anyi, KWU ; Anuar, NB A Single Journal Study: Malaysian Journal Of Computer Science Computer Science Single journal study, journal productivity, authorship pattern, citation analysis, Bibliometrics Link 2009
42 Razak, Z ; Zulkiflee, K ; Noor, NM ; Salleh, R ; Yaacob, M Off-Line Handwritten Jawi Character Segmentation Using Histogram Normalization And Sliding Window Approach For Hardware Implementation Computer Science Optical Character Recognition (OCR), character segmentation, cursive script, image processing, handwriting recognition Link 2009
43 Seng, WC ; Du, J ; Pham, B Semi Fragile Watermark With Self Authentication And Self Recovery Computer Science Semi fragile watermark, self authentication, self recovery Link 2009
44 Qabajeh, LK ; Kiah, MLM ; Qabajeh, MM A Scalable And Secure Position-Based Routing Protocol For Ad-Hoc Networks Computer Science position-based routing, secure routing, scalable routing, ad-hoc networks, wireless networks Link 2009
45 Alyahya, MA ; Ahmad, R ; Lee, Sp Effect Of CMMI-Based Software Process Maturity On Software Schedule Estimation Computer Science Schedule estimation, scale factor, cost driver, COCOMO, SW-CMM, CMMI Link 2009
46 Raj, Rg ; Abdul-Kareem, S Information Dissemination And Storage For Tele-Text Based Conversational Systems' Learning Computer Science Information/sentence dissemination, conjunctions, prepositions, correlative conjunctions, informationally correct responses Link 2009
47 Phang, Kk ; Ling, TC ; Ang, TF QoS Routing In Diffserv MPLS Networks Computer Science QoS Routing, OSPF, MPLS, DiffServ Link 2009
48 Ali, BS ; Kasirun, ZM Crosscutting Concern Identification At Requirements Level Computer Science Requirements Engineering, Aspect-oriented Requirements Engineering, Crosscutting Concern, Crosscutting Identification Link 2008
49 Chaw, LT ; Keong, PK ; Fong, AT ; Pei, LG Multi-Area QOS Provisioning Using Hierarchical Bandwidth Brokers Architecture Computer Science QoS, Bandwidth Broker, OSPF, MPLS, Hierarchical Network Link 2008
50 Anuar, NB ; Sallehuddin, H ; Gani, A ; Zakari, O Identifying False Alarm For Network Intrusion Detection System Using Hybrid Data mining And Decision Tree Computer Science False Positive, False Negative, Intrusion Detection, Data Mining, Decision Tree, Rule-Based Link 2008