default search action
IRICT 2019: Johor, Malaysia
- Faisal Saeed, Fathey Mohammed, Nadhmi Gazem:
Emerging Trends in Intelligent Computing and Informatics - Data Science, Intelligent Information Systems and Smart Computing, International Conference of Reliable Information and Communication Technology, IRICT 2019, Johor, Malaysia, 22-23 September, 2019. Advances in Intelligent Systems and Computing 1073, Springer 2020, ISBN 978-3-030-33581-6
Data Science and Big Data Analytics
- Nuhu Yusuf, Mohd Amin Mohd Yunus, Norfaradilla Wahid:
Arabic Text Stemming Using Query Expansion Method. 3-11 - Sumera Ahmad, Suraya Miskon:
The Adoption of Business Intelligence Systems in Textile and Apparel Industry: Case Studies. 12-23 - Talal Almutiri, Faisal Saeed:
Review on Feature Selection Methods for Gene Expression Data Classification. 24-34 - Soliudeen Muhammed Jamiu, Norris Syed Abdullah, Suraya Miskon, Nazmona Mat Ali:
Data Governance Support for Business Intelligence in Higher Education: A Systematic Literature Review. 35-44 - Eu Lay Tien, Nazmona Mat Ali, Suraya Miskon, Norasnita Ahmad, Norris Syed Abdullah:
Big Data Analytics Adoption Model for Malaysian SMEs. 45-53 - Yong Keong Tan, Noraini Ibrahim, Shahliza Abd Halim:
Aedes Entomological Prediction Analytical Dashboard Application for Dengue Outbreak Surveillance. 54-65 - Nur Liyana Mohd Ramlan, Nor Athiyah Abdullah, Kamal Karkonasasi, Seyed Aliakbar Mousavi:
A Study on the Impact of Crowd-Sourced Rating on Tweets for the Credibility of Information Spreading. 66-78 - Vali Uddin, Syed Sajjad Hussain Rizvi, Manzoor Ahmed Hashmani, Syed Muslim Jameel, Tayyab Ansari:
A Study of Deterioration in Classification Models in Real-Time Big Data Environment. 79-87 - Oyekale Abel Alade, Roselina Sallehuddin, Nor Haizan Mohamed Radzi, Ali Selamat:
Missing Data Characteristics and the Choice of Imputation Technique: An Empirical Study. 88-97 - Shwe Sin Phyo, Nyein Nyein Myo:
Semantic Annotation of Scientific Publications Based on Integration of Concept Knowledge. 98-109 - Al Farissi, Halina Mohamed Dahlan, Samsuryadi:
Genetic Algorithm Based Feature Selection for Predicting Student's Academic Performance. 110-117 - Nourelhouda Yahi, Hacene Belhadef:
Morphosyntactic Preprocessing Impact on Document Embedding: An Empirical Study on Semantic Similarity. 118-126 - Ali A. Hamzah, Hanaa Bayomi:
Text Steganography with High Embedding Capacity Using Arabic Calligraphy. 127-138 - Abdulsamad E. Yahya, Ruhaidah Samsudin, Ani Shabri Ilman:
A Genetic Algorithm-Based Grey Model Combined with Fourier Series for Forecasting Tourism Arrivals in Langkawi Island Malaysia. 139-151 - Muhammad Akram Shaari, Ruhaidah Samsudin, Ani Shabri Ilman, Abdulsamad E. Yahya:
Drought Forecasting Using Gaussian Process Regression (GPR) and Empirical Wavelet Transform (EWT)-GPR in Gua Musang. 152-161 - Faisal Alshargi, Saeedeh Shekarpour, Waseem Alromema:
Xword: A Multi-lingual Framework for Expanding Words. 162-175
Artificial Intelligence and Soft Computing
- Siti Zulaikha Mohd Zuki, Radziah Mohamad, Nor Azizah Sa'adon:
Context-Aware Ontology for Dengue Surveillance. 179-188 - Alif Ridzuan Khairuddin, Razana Alwee, Habibollah Haron:
A Proposed Gradient Tree Boosting with Different Loss Function in Crime Forecasting and Analysis. 189-198 - Rabatul Aduni Sulaiman, Dayang N. A. Jawawi, Shahliza Abd Halim:
Derivation of Test Cases for Model-based Testing of Software Product Line with Hybrid Heuristic Approach. 199-208 - Abdulaziz Ali Saleh Alashbi, Mohd Shahrizal Sunar:
Occluded Face Detection, Face in Niqab Dataset. 209-215 - Suhaila Najim Mohammed, Adnan J. Jabir, Zaid Ali Abbas:
Spin-Image Descriptors for Text-Independent Speaker Recognition. 216-226 - Ajoze Abdulraheem Zubair, Shukor bin Abd Razak, Md. Asri Bin Ngadi, Ahmed Aliyu, Syed Hamid Hussain Madni:
Convergence-Based Task Scheduling Techniques in Cloud Computing: A Review. 227-234 - Huai Tein Lim, Irene-SeokChing Yong, PehSang Ng:
Imperative Selection Intensity of Parent Selection Operator in Evolutionary Algorithm Hybridization for Nurse Scheduling Problem. 235-244 - Karan Aggarwal, Manjit Singh Bhamrah, Hardeep Singh Ryait:
Detection of Cirrhosis Through Ultrasound Imaging. 245-258 - Mohammed Mumtaz Al-Dabbagh, Naomie Salim, Faisal Saeed:
Methods to Improve Ranking Chemical Structures in Ligand-Based Virtual Screening. 259-269 - Essam Alhroob, Mohammed Falah Mohammed, Osama Nayel Al Sayaydeh, Fadhl Hujainah, Ngahzaifa Ab Ghani:
Analysis on Misclassification in Existing Contraction of Fuzzy Min-Max Models. 270-278 - Alaa A. Alomoush, AbdulRahman A. Al-Sewari, Hammoudeh S. Alamri, Kamal Z. Zamli, Waleed Alomoush, Mohammed Issam Younis:
Modified Opposition Based Learning to Improve Harmony Search Variants Exploration. 279-287 - Oussama Rouane, Hacene Belhadef, Mustapha Bouakkaz:
Word Embedding-Based Biomedical Text Summarization. 288-297 - Lawal Haruna, Roselina Sallehuddin, Haizan Mohammed Radzi:
Discrete Particle Swarm Optimization Based Filter Feature Selection Technique for the Severity of Road Traffic Accident Prediction. 298-310 - Ashraf Osman Ibrahim, Ali Ahmed, Aleya Abdu, Rahma Abd-alaziz, Mohamed Alhaj Alobeed, Abdulrazak Yahya Saleh, Abubakar Elsafi:
Classification of Mammogram Images Using Radial Basis Function Neural Network. 311-320 - Leena Alsaati, Siti Zaiton Mohd Hashim:
Cycle Generative Adversarial Network for Unpaired Sketch-to-Character Translation. 321-329 - Abdulrazak Yahya Saleh, Shahrulnizam Anak Medang, Ashraf Osman Ibrahim:
Rabies Outbreak Prediction Using Deep Learning with Long Short-Term Memory. 330-340 - Hamza Hentabli, Maged Nasser, Naomie Salim, Faisal Saeed:
Bioactivity Prediction Using Convolutional Neural Network. 341-351 - Abdullah B. Nasser, Fadhl Hujainah, AbdulRahman A. Al-Sewari, Kamal Z. Zamli:
An Improved Jaya Algorithm-Based Strategy for T-Way Test Suite Generation. 352-361 - Ali Ahmed Salem, Rahisham Abd-Rahman, Samir Ahmed Al-Gailani, Muhammad Saufi Kamarudin, N. A. Othman, N. A. M. Jamail:
Artificial Intelligence Techniques for Predicting the Flashover Voltage on Polluted Cup-Pin Insulators. 362-372 - Mostafa Ibrahem Hassan, Ahmed Hamza Osman, Eltahir Mohamed Hussein:
Heart Disease Diagnosis Using Diverse Neural Network Categories. 373-385 - Saad Adnan Abed, Helmi Md Rais:
Solving the Minimum Dominating Set Problem of Partitioned Graphs Using a Hybrid Bat Algorithm. 386-395 - Murad A. Rassam, Rasha Almekhlafi, Eman Alosaily, Haneen Hassan, Reem Hassan, Eman Saeed, Elham Alqershi:
A Voice Morphing Model Based on the Gaussian Mixture Model and Generative Topographic Mapping. 396-406 - Ali Muttaleb Hasan, Taha Hussein Rassem, Noorhuzaimi Karimah Mohd Noor, Ahmed Muttaleb Hasan:
A Semantic Taxonomy for Weighting Assumptions to Reduce Feature Selection from Social Media and Forum Posts. 407-419 - Taiseer Abdalla Elfadil Eisa, Naomie Salim, Abdelzahir Abdelmaboud:
Content-Based Scientific Figure Plagiarism Detection Using Semantic Mapping. 420-427 - Noureddine Azzouza, Karima Akli-Astouati, Roliana Ibrahim:
TwitterBERT: Framework for Twitter Sentiment Analysis Based on Pre-trained Language Model Representations. 428-437
Internet of Things (IoT)
- Pyi Phyo Aung, Koichiro Mashiko, Nordinah Binti Ismail, Chia Yee Ooi:
Evaluation of SRAM PUF Characteristics and Generation of Stable Bits for IoT Security. 441-450 - Saeed Khorashadizadeh, Adeyemi Richard Ikuesan, Victor R. Kebande:
Generic 5G Infrastructure for IoT Ecosystem. 451-462 - Michael O. Omoyibo, Tawfik Al Hadhrami, Funminiyi Olajide, Ahmad Lotfi, Ahmed M. Elmisery:
Sensor Network in Automated Hand Hygiene Systems Using IoT for Public Building. 463-476 - Abdullah A. Alabdulatif:
Security Attacks in IEEE 802.15.4: A Review Disassociation Procedure. 477-485 - Mohammed Saghir, Bassam Ahmed H. Abu Al Khair, Jamil Hamodi, Nibras Abdullah:
Traditional Versus Decentralized Access Control for Internet of Things (IoT): Survey. 486-494
Intelligent Communication Systems
- Jawad Ali, Noorsaliza Abdullah, Asim Ali Khan, Roshayati Yahya, Muzammil Jusoh, Ezri Mohd:
Antenna Design Using UWB Configuration for GPR Scanning Applications. 497-510 - Abdirahman Osman Hashi, Siti Zaiton Mohd Hashim, Toni Anwar, Abdullahi Ahmed:
A Robust Hybrid Model Based on Kalman-SVM for Bus Arrival Time Prediction. 511-519 - Muhammad Ali Naeem, Shahrudin Awang Nor, Suhaidi Hassan:
Future Internet Architectures. 520-532 - S. M. Argungu, A. Suki M. Arif, Mohd. Hasbullah Omar:
Compute and Data Grids Simulation Tools: A Comparative Analysis. 533-544 - Mowafaq Salem Alzboon, M. Mahmuddin, Suki Arif:
Resource Discovery Mechanisms in Shared Computing Infrastructure: A Survey. 545-556 - Omar Dakkak, Shahrudin Awang Nor, Suki Arif, Yousef Fazea:
Improving QoS for Non-trivial Applications in Grid Computing. 557-568 - Raaid Alubady, Suhaidi Hassan, Adib Habbal:
The Role of Management Techniques for High-Performance Pending Interest Table: A Survey. 569-582 - Shivaleela Arlimatti, Walid Elbrieki, Suhaidi Hassan, Adib Habbal:
Software Defined Network Partitioning with Graph Partitioning Algorithms. 583-593 - Walid Elbrieki, Suhaidi Hassan, Shivaleela Arlimatti, Adib Habbal:
Organizing Named Data Objects in Distributed Name Resolution System for Information-Centric Networks. 594-603 - Ibrahim Abdullahi, A. Suki M. Arif, Yousef Fazea:
Scheduling Criteria Evaluation with Longer Job First in Information Centric Network. 604-614 - Nasarudin Ismail, Mohd Murtadha Mohamad:
An Evaluation of Performance of Location-Based and Location-Free Routing Protocols in Underwater Sensor Networks. 615-624 - Roby Ikhsan, Romi Fadli Syahputra, Suhardi, Saktioto, Nor Ain Husein, Okfalisa:
Development of WDM System in Optical Amplifiers by Manipulating Fiber Length and Bandwidth for Telecommunication System. 625-633 - Ahmed Mohammed Al-Samman, Tharek Abdul Rahman, Tawfik Al Hadhrami:
5G Channel Propagation at 28 GHz in Indoor Environment. 634-642 - Abdul Rehman, Mohd Fadzil Bin Hassan:
Design Specification of Context Cognitive Trust Evaluation Model for V2V Communication in IoV. 643-652 - Abdulguddoos S. A. Gaid, Osaid A. S. Qaid, Moheeb A. A. Ameer, Fadi F. M. Qaid, Belal S. A. Ahmed:
Small and Bandwidth Efficient Multi-band Microstrip Patch Antennas for Future 5G Communications. 653-662 - Abdulguddoos S. A. Gaid, Amjad M. H. Alhakimi, Osama Y. A. Saeed, Mohammed S. Alasadee, Ali A. Ali:
Compact and Bandwidth Efficient Multi-band Microstrip Patch Antennas for 5G Applications. 663-672 - Moamin A. Mahmoud, Alicia Y. C. Tang, Andino Maseleno, Fung-Cheng Lim, Hairoladenan Kasim, Christine Yong:
Towards the Development of a Smart Energy Grid. 673-682 - Aliyu M. Abali, Norafida Bte Ithnin, Tekenate Amah Ebibio, Muhammad Dawood, Wadzani A. Gadzama:
A Survey of Geocast Routing Protocols in Opportunistic Networks. 683-694 - Ola Ahmed Al-wesabi, Nibras Abdullah, Putra Sumari:
Hybrid Storage Management Method for Video-on-Demand Server. 695-704 - Abdullah Ahmed Bahashwan, Mohammed Anbar, Nibras Abdullah:
New Architecture Design of Cloud Computing Using Software Defined Networking and Network Function Virtualization Technology. 705-713 - Aliyu M. Abali, Norafida Bte Ithnin, Muhammad Dawood, Tekenate Amah Ebibio, Wadzani A. Gadzama, Fuad A. Ghaleb:
Movement Pattern Extraction Method in OppNet Geocast Routing. 714-723
Advances in Information Security
- Mohammed Ateeq Alanezi, Z. Faizal Khan:
A Framework for Privacy and Security Model Based on Agents in E-Health Care Systems. 727-733 - Walid Mohamed Alsharafi, Mohd Nizam Omar, Nashwan Ahmed Al-Majmar, Yousef Fazea:
Normal Profile Updating Method for Enhanced Packet Header Anomaly Detection. 734-747 - Huda Osman, Mohd Aizaini Maarof, Maheyzah Md Siraj:
Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing. 748-758 - Sharmiladevi Rajoo, Pritheega Magalingam, Ganthan Narayana Samy, Nurazean Maarop, Norbik Bashah Idris, Bharanidharan Shanmugam, Sundaresan Perumal:
Detecting False Messages in the Smartphone Fault Reporting System. 759-768 - Chérif Taouche, Hacene Belhadef:
Local Descriptor and Feature Selection Based Palmprint Recognition System. 769-778 - Widad Mirghani Makki, Maheyzah M. D. Siraj, Nurudeen Mahmud Ibrahim:
A Harmony Search-Based Feature Selection Technique for Cloud Intrusion Detection. 779-788 - Abdulaziz Aborujilah, Rasheed Mohammad Nassr, Tawfik Al Hadhrami, Mohd Nizam Husen, Nor Azlina Ali, AbdulAleem Al-Othmani, Nur Syahela, Hideya Ochiai:
Security Assessment Model to Analysis DOS Attacks in WSN. 789-800 - Weng Chia-Cheng, Chen Ching-Wen:
Information Security Research for Instant Messaging Service in Taiwan - Build a Private Instant Messaging. 801-809 - Angraini, Rose Alinda Alias, Okfalisa:
A Model of Information Security Policy Compliance for Public Universities: A Conceptual Model. 810-818 - Raed Saeed Al-Dhubhani, Jonathan Cazalas, Rashid Mehmood, Iyad A. Katib, Faisal Saeed:
A Framework for Preserving Location Privacy for Continuous Queries. 819-832 - Aladdein M. S. Amro:
Deliberate Exponential Chaotic Encryption Map. 833-838 - Kenny Awuson-David, Tawfik Al Hadhrami, Funminiyi Olajide, Ahmad Lotfi:
Using Hyperledger Fabric Blockchain to Maintain the Integrity of Digital Evidence in a Containerised Cloud Ecosystem. 839-848 - Ghassan Ahmed Ali:
Phishing Email: Could We Get Rid of It? A Review on Solutions to Combat Phishing Emails. 849-856 - Abdallah Elhigazi Abdallah, Shukor Abd Razak, Fuad A. Ghaleb:
Deauthentication and Disassociation Detection and Mitigation Scheme Using Artificial Neural Network. 857-866
Advances in Information Systems
- Wiraj Udara Wickramaarachchi, W. M. S. L. Weerasinghe, R. M. K. T. Rathnayaka:
Influence of Smart Interactive Advertising Based on Age and Gender: A Case Study from Sri Lanka. 869-880 - Archanaa Visvalingam, Jaspaljeet Singh Dhillon, Saraswathy Shamini Gunasekaran, Alan Cheah Kah Hoe:
Eliciting Requirements for Designing Self-reflective Visualizations: A Healthcare Professional Perspective. 881-893 - Mohammed Aldossari, Abdullah Mohd Zin:
A Conceptual Framework for Adopting Automation and Robotics Innovations in the Transformational Companies in the Kingdom of Saudi Arabia. 894-905 - Okfalisa, Frica A. Ambarwati, Fitri Insani, Toto Saktioto, Angraini:
Smart Group Decision Making on Leadership Style Identification Using Bayes Theorem. 906-916 - Alice Tabitha Ramachandran, Norasnita Ahmad, Suraya Miskon, Noorminshah A. Iahad, Nazmona Mat Ali:
Factors Influencing the Adoption of Social Media in Service Sector Small and Medium Enterprises (SMEs). 917-925 - Nani Amalina Zulkanain, Suraya Miskon, Norris Syed Abdullah, Nazmona Mat Ali, Norasnita Ahmad:
Communication and Learning: Social Networking Platforms for Higher Education. 926-935 - Muaadh Mukred, Zawiyah Mohammad Yusof, Nor Azian Binti Md. Noor, Bakare Kazeem Kayode, Ruqiah Al-Duais:
The Role of Cloud Electronic Records Management System (ERMS) Technology in the Competency of Educational Institutions. 936-946 - S. M. Sarif, Shafinah Farvin Packeer Mohamed, M. S. Khalid:
Computerized Decision Aid for First-Time Homebuyers. 947-959 - Kamal Karkonasasi, Yu-N Cheah, Seyed Aliakbar Mousavi, Ahmad Suhaimi Baharudin:
Malaysian Health Centers' Intention to Use an SMS-Based Vaccination Reminder and Management System: A Conceptual Model. 960-969 - Putri Norlyana Mustafa Kamal, Norlida Buniyamin, Azmi Osman:
Current Knowledge Management Activities in a Manufacturing Company in Malaysia: A Case Study. 970-979 - Nura Muhammad Baba, Ahmad Suhaimi Baharudin:
Determinants of Users' Intention to Use IoT: A Conceptual Framework. 980-990 - Rifqah Okunlaya, Norris Syed Abdullah, Rose Alinda Alias:
Augmented Reality in Library Services: A Panacea to Achieving Education and Learning 4.0. 991-998 - Lina Fatini Azmi, Norasnita Ahmad:
A Systematic Review on Humanizing Factors for Online System. 999-1008 - Saeed Matar Alshahrani, Hazura Mohamed, Muriati Mukhtar, Umi Asma' Mokhtar:
Factors Influence the Intention to Use E-Portfolio in Saudi Technical and Vocational Training Corporation (TVTC) Sector: Pilot Review. 1009-1019 - Junita Juwita Siregar, R. A. Aryanti Wardaya Puspokusumo:
Design and Development of Knowledge Management System in the Small and Medium-Scale Enterprises Base on Mobile Apps (SMEs at Indonesia). 1020-1030 - Hazleen Aris, Aqilah Azizan:
A Review on the Methods to Evaluate Crowd Contributions in Crowdsourcing Applications. 1031-1041 - Olatorera Williams, Funminiyi Olajide, Tawfik Al Hadhrami, Ahmad Lotfi:
Exploring Process of Information Systems and Information Technology for Enterprise Agility. 1042-1051 - Abdulwahab Ali Almazroi, Haifeng Shen, Fathey Mohammed, Nabil Hasan Al-Kumaim:
Cloud Computing Services Adoption by University Students: Pilot Study Results. 1052-1060 - Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan:
Development of a Theoretical Framework for Customer Loyalty in Australia. 1061-1075 - Masrina A. Salleh, Mahadi Bahari, Waidah Ismail:
Exploring the Software Quality Criteria and Sustainable Development Targets: A Case Study of Digital Library in Malaysian Higher Learning Institution. 1076-1086 - Muhammad Aliif Ahmad, Ab Razak Che Hussin, Ahmad Fadhil Yusof:
Motivations of Teaching in Massive Open Online Course: Review of the Literature. 1087-1097 - Hussein Mohammed Esmail Abu Al-Rejal, Zulkifli Mohamed Udin, Mohamad Ghozali Hassan, Kamal Imran Bin Mohd Sharif, Waleed Mugahed Al-Rahmi, Nabil Hasan Al-Kumaim:
Green Information Technology Adoption Antecedence: A Conceptual Framework. 1098-1108
Software Engineering
- Salisu Garba, Radziah Mohamad, Nor Azizah Saadon:
Search Space Reduction Approach for Self-adaptive Web Service Discovery in Dynamic Mobile Environment. 1111-1121 - Sin Ban Ho, Nur Azyyati Ahmad, Ian Chai, Chuie Hong Tan, Swee-Ling Chean:
Modeling Reliable Intelligent Blockchain with Architectural Pattern. 1122-1131 - Shuib Basri, Malek Ahmad Theeb Almomani, Abdullahi Abubakar Imam, Thangiah Murugan, Abdul Rehman Gilal, Abdullateef Oluwagbemiga Balogun:
The Organisational Factors of Software Process Improvement in Small Software Industry: Comparative Study. 1132-1143 - Ayman Jalal Hassan Almutlaq, Dayang N. A. Jawawi:
Missing Data Imputation Techniques for Software Effort Estimation: A Study of Recent Issues and Challenges. 1144-1158 - Han Xin Hui, Noraini Ibrahim, Fatin Aliah Phang:
CarbonFree - A Multi-platform Application for Low Carbon Education. 1159-1169 - Legenda Prameswono Pratama, Safaa Najah Saud, Risma Ekawati, Mauludi Manfaluthy:
Load Balancing Approach of Protection in Datacenters: A Narrative Review. 1170-1183
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.