Items where Year is 2012
Number of items at this level: 36. ArticleAbd. Rahman, Aedah and Sahibuddin, Shamsul and Ibrahim, Suhaimi (2012) A multiprocess quality model: identification of of key processes in the integration approach. GSTF International Journal on Computing (JOC), 2 (1). pp. 208-213. ISSN 2010-2283 Abdullah, S. N. H. S. and Sudin, M. N. and Prabuwono, A. S. and Mantoro, T. (2012) License plate detection and segmentation using cluster run length smoothing algorithm. Journal of Information Technology Research, 5 (3). pp. 46-70. ISSN 1938-7857 Ahmad, Robiah and M.Samsuri, Saiful Farhan and Zakaria, Mohd. Zakimi (2012) Evapotranspiration prediction using system identification and genetic algorithm. Proceedings Of The Iasted International Conference On Modelling, Identification, And Control, Mic . pp. 176-183. ISSN 1025-8973 Al-Othmani, Abdulaleem Z. and Abdul Manaf, Azizah and Zeki, Akram M. (2012) A survey on steganography techniques in real time audio signals and evaluation. International Journal of Computer Science Issues, 9 (1(1)). pp. 30-37. ISSN 1694-0784 Bamiah, Mervat Adib and Brohi, Sarfraz Nawaz and Chuprat, Suriayati (2012) Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures. Proceedings Of Spie - The International Society For Optical Engineering, 8349 . ISSN 0277-786X Haron, Azlena and Harun, Mazlan and Sahibuddin, Shamsul and Zakaria, Nor Hawaniah (2012) Requirement engineering practice research framework for the public service organization. International Journal of Digital Content Technology and its Applications, 6 (22). ISSN 1975-9339 Hendrianto Pratomo, Awang and Prabuwono, Anton Satria and Abdullah, Saman and Nasrudin, Mohammad Faidzul and Shohaimi, Muhamad Syafiq and Mantoro, Teddy (2012) Adaptive robot soccer defence strategy via behavioural trail. Journal of Information Technology Research, 5 (3). pp. 25-45. ISSN 1938-7857 Janbeglou, Maziar and Zamani, Mazdak and Ibrahim, Suhaimi (2012) Improving the security of protected wireless internet access from insider attacks. Advances in Information Sciences and Service Sciences, 4 (12). pp. 170-181. ISSN 1976-3700 Maarop, Nurazean and Khin, Than Win (2012) Understanding the need of health care providers for teleconsultation and technological attributes in relation to the acceptance of teleconsultation in Malaysia: a mixed methods study. Journal of Medical Systems, 36 (5). pp. 2881-2892. ISSN 0148-5598 Mantoro, Teddy and A. Ayu, Media and Bidin, Ahmad Fakhrurrazi and Norhanipah, Saiful Azhar (2012) Framework for Domain Name System Security Extensions (DNSSEC) to support the IPv6 infrastructure. International Journal Communications Information Science and Management Engineering (CISME), 2 (12). pp. 64-70. ISSN 2222-1859 Mohamed Suffian, Muhammad Dhiauddin and Ibrahim, Suhaimi (2012) Adopting six sigma in formulating a defect prediction model for system testing. International Journal of Digital Content Technology and its Applications, 6 (21). pp. 60-76. ISSN 1975-9339 Mohebbi, K. and Ibrahim, Suhaimi and Idris, Norbik Bashah and Tabatabaei, S. G. H. (2012) A guideline for evaluating semantic web service discovery approaches. Advances in Information Sciences and Service Sciences, 4 (12). pp. 330-346. ISSN 1976-3700 Noroozi, Erfaneh and Mohd. Daud, Salwani and Sabouhi, Ali and Salehnamadi, Mohamadreza (2012) New implementation of hashing and encoding in digital signature. International Proceedings of Computer Science and Information Technology, 29 . pp. 50-54. ISSN 2010-460X Rahman, A. A. and Sahibuddin, Shamsul and Ibrahim, Suhaimi (2012) A taxonomy analysis for multi-model process improvement from the context of software engineering processes and services. International Journal of Digital Content Technology and its Applications, 6 (22). pp. 56-65. ISSN 1975-9339 Shahri, Ahmad Bakhtiyari and Ismail, Zuraini (2012) A tree model for identification of threats as the first stage of risk assessment in HIS. Journal of Information Security, 3 (2). pp. 169-176. ISSN 2153-1242 Shahri, Ahmad Bakhtiyari and Ismail, Zuraini and Ab.Rahim, Nor Zairah (2012) Security effectiveness in health information system: through improving the human factors by education and training. Australian Journal of Basic and Applied Sciences, 6 (12). pp. 226-233. ISSN 1991-8178 Solemon, Badariah and Sahibuddin, Shamsul and Abdul Ghani, Abdul Azim (2012) A new maturity model for requirements engineering process: an overview. Journal of Software Engineering and Applications, 2012 (5). pp. 340-350. ISSN 1945-3116 T., Mantoro and A.I., Abubakar and M.A., Ayu (2012) 3d graphics visualization for interactive mobile users navigation. WSEAS Transactions on Systems, 11 (8). pp. 453-464. ISSN 1109-2777 Zamani, Mazdak and Abdul Manaf, Azizah and Abdullah, Mohd. Shahidan (2012) An overview on audio steganography techniques. International Journal of Digital Content Technology and Its Applications, 6 (13). pp. 107-122. ISSN 1975-9339 (Print); 2233-9310 (Electronic) Zamani, Mazdak and Abdul Manaf, Azizah and M. Abdullah, Shahidan and Chaeikar, Saman Shojae (2012) Mazdak technique for PSNR estimation in audio steganography. Applied Mechanics and Materials, 229-23 . pp. 2798-2803. ISSN 1662-7482 Book SectionAhmad, Robiah and Mohd. Samsuri, Saiful Farhan and Zakaria, Mohd. Zakimi (2012) Evapotranspiration prediction using system identification and genetic algorithm. In: Proceedings of the 2nd IASTED Asian Conference on Modelling, Identification, and Control, AsiaMIC 2012. ACTA Press, Calgary, Canada, pp. 176-183. ISBN 978-088986911-0 Haron, Azlena and Harun, Mazlan and Mahrim, Mohd. Naz'ri and Sahibuddin, Shamsul and Zakaria, Nor Hawaniah and Abdul Rahman, Noorihan (2012) Understanding the requirement engineering for organization: the challenges. In: Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012. IEEE, New York, USA, pp. 561-567. ISBN 978-898867867-1 Jamaludin, Nor Azliana Akmal and Sahibuddin, Shamsul and Hashim, Mohd. Noor Husyairi and Shaharuddin, Shazman Asri (2012) Development of electronic learning industrial environment (ELIN) system for requirement engineering education. In: 2011 3Rd International Conference on Computer Technology and Development (Icctd 2011), Vol 3. Amer Soc Mechanical Engineers, New York, pp. 227-235. ISBN 978-0-7918-5991-9 Khiabani, H. and Idris, Norbik Bashah and Ab. Manan, J. L. (2012) Leveraging remote attestation to enhance the unified trust model for WSNs. In: Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012. IEEE, New York, USA, pp. 139-143. ISBN 978-146731425-1 KhorasaniZadeh, Hadi and Idris, Norbik Bashah and Ab. Manan, Jamalul-Lail (2012) Distributed intrusion detection trust management through integrity and expertise evaluation. In: Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012. IEEE, New York, pp. 133-138. ISBN 978-146731425-1 Meskaran, Fatemeh and Ismail, Zuraini (2012) Customers' trust in e-commerce: in collective culture setting. In: Proceedings - 2012 International Conference on Information Retrieval and Knowledge Management, CAMP'12. IEEE, New York, USA, pp. 182-186. ISBN 978-146731090-1 Mohamed, Ashara Banu and Idris, Norbik Bashah and Shanmugum, Bharanidharan (2012) Alert correlation framework using a novel clustering approach. In: 2012 International Conference on Computer and Information Science, ICCIS 2012 - A Conference of World Engineering, Science and Technology Congress, ESTCON 2012 - Conference Proceedings. IEEE, New York, USA, pp. 403-408. ISBN 978-146731938-6 Nasrul , Mohammad Ahmad and Md. Nor, Khalil and Masrom, Maslin and Syarief, Achmad (2012) Website user interface characteristics for multiracial settings in Malaysia. In: ICIMTR 2012 - 2012 International Conference on Innovation, Management and Technology Research. IEEE, New York, USA, pp. 252-257. ISBN 978-146730655-3 Nikbakhsh, Somayeh and Abdul Manaf, Azizah and Zaman, Mazdak and Janbeglou, Maziar (2012) A novel approach for rogue access point detection on the client-side. In: Proceedings - 26Th IEEE International Conference on Advanced Information Networking and Applications Workshops, Waina 2012. IEEE, New York, USA, pp. 684-687. ISBN 978-0-7695-4652-0 Zamani, Mazdak and Abdul Manaf, Azizah and Daruis, Rusni (2012) Azizah technique for efficiency measurement in steganography. In: Proceedings - ICIDT 2012, 8th International Conference on Information Science and Digital Content Technology. AICIT, Busan, Korea, pp. 480-484. ISBN 978-898867869-5 Conference or Workshop ItemBamiah, Mervat and Brohi, Sarfraz and Chuprat, Suriayati and Ab. Manan, Jamalul Lail (2012) A study on significances of adopting cloud computing paradigm in healthcare sector. In: Proceeding Of International Conference On Cloud Computing Technologies, Applications And Management (Iccctam-12), 8-10 Dec, 2012, Dubai. Ibrahim, Suhaimi (2012) A critical analysis of facial animation based on emotional condition and facial skin colour. In: Constructing a Model of Functional Defects Prediction for System Testing using Regression Analysis, 41214. Ibrahim, Suhaimi (2012) An ontology based approach for software redocumentation from the legacy source code. In: An Ontology Based Approach for Software Redocumentation from the Legacy Source Code, 2012. Ismail, Saiful Adli (2012) A change impact analysis approach for the software development phase: evaluating an integration approach. In: The 19th Asia-Pacific Software Engineering Conference, 4-7/12/12. Zamani, Mazdak and Abdul Manaf, Azizah and Daruis, Rusni (2012) Azizah technique for efficiency measurement in steganography. In: Proceeding of the 8th Information Science and Digital Content Technology (ICIDT) Indexed by IEEE Xplore, 2012, South Korea. ThesisShah, Jalal (2012) The development of a payroll system prototype. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School. |