Universiti Teknologi Malaysia Institutional Repository

Items where Year is 2014

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: A | B | C | D | E | G | H | I | K | M | N | O | P | R | S | T | W | Z
Number of items at this level: 79.

A

Ab. Rahim, Radhiah and Md. Noor, Norah and Mohd. Zaid, Norasykin (2014) Cognitive conflict strategies in video-based learning enhance students conceptual change. In: 6th Regional Conference on Engineering Education 2016 (RCEE 2016) and Research on Higher Education (RHED), 09-10 Dec, 2014, Berjaya Times Square Hotel Kuala Lumpur, Malaysia.

Abd. Elghariani, Kaiss Ali (2014) E-scholarship system for Libyan Embassy. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Abd. Manaf, Azizah and Ab Rahman, Muhammad Razif (2014) A review of database forensic analysis for SQL injection attack. VISION 2020: Sustainable Growth, Economic Development, and Global Competitiveness, Vols 1-5 . pp. 201-206.

Abd. Manaf, Azizah and Alariki,, Ala Abdulhakim (2014) Behavioral biometrics authentication using gesture-based. Advanced Science Letters, 20 (2). pp. 492-495. ISSN 1936-6612

Abd. Manaf, Azizah and Dadkhah,, Sajjad and Hori,, Yoshiak and Hassanien,, Aboulella and Sadeghi,, Somayeh (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Processing: Image Communication, 29 (10). pp. 1197-1210. ISSN 0923-5965

Abd. Manaf, Azizah and Dadkhah,, Sajjad and Sadeghi,, Somayeh (2014) An efficient image self-recovery and tamper detection using fragile watermarking. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8814 . pp. 504-513. ISSN 0302-9743

Abdul Manaf, Azizah and Alameen Saleh, Mohammed Abbas (2014) Protective frameworks and schemes to detect and prevent high rate DoS/DDoS and flash crowd attacks: a comprehensive review. Communications in Computer and Information Science, 488 . pp. 145-152. ISSN 1865-0929

Abdul Manaf, Azizah and Alariki, Ala Abdulhakim (2014) Investigation of touch-based user authentication features using android smartphone. Communications in Computer and Information Science, 488 . pp. 135-144. ISSN 1865-0929

Abdul Manaf, Azizah and Awang, Nor Fatimah and Zainudin, Wan Shafiuddin (2014) A survey on conducting vulnerability assessment in web-based application. Communications in Computer and Information Science, 488 . pp. 459-471. ISSN 1865-0929

Al-Mudhary, Abduljalil Saleh Mohammed (2014) Integrating outcome-based assessment in learning management systems. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computing.

Alariki, Ala Abdulhakim and Abdul Manaf, Azizah (2014) Touch gesture authentication framework for touch screen mobile devices. Journal of Theoretical and Applied Information Technology, 62 (2). pp. 493-498. ISSN 1817-3195

Albakri, Sameer Hasan and Shanmugam, Bharanidharan and Samy, Ganthan Narayana and Idris, Norbik Bashah and Ahmed, Azuan (2014) Traditional security risk assessment methods in cloud computing environment: usability analysis. In: International Conference of Recent Trends in Information and Communication Technologies (IRICT 2014), 12-13 Sept, 2014, Johor Bahru, Malaysia.

Ali, Haddadi (2014) Analysis and design of the Integrated Sistem Pemantauan Agensi Awam (ISPAAA). Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Ali, Syed Mubarak (2014) An interaction based collaborative filtering approach for personal learning environment. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Azizah Abdul Manaf, and Mahdi Sharifi, and Ali Memariani, and Homa Movahednejad, and Haslina Md Sarkan, and Amir Vahid Dastjerdi, (2014) Multi-criteria consensus-based service selection using crowdsourcing. Proceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014 . pp. 114-120.

Azizul Fata, Ahmad Zakwan and Kari, Sarudin and Mohamed, Farhan (2014) Autonomous tawaf crowd simulation. In: Third International Conference on Interactive Digital Media (ICIDM 2014), 2-4 Nov, 2014, Johor Bahru, Malaysia.

B

Bamiah, Mervat Adib and Brohi, Sarfraz Nawaz and Chuprat, Suriayati and Ab. Manan, Jamalul Lail (2014) Trusted cloud computing framework for healthcare sector. Journal of Computer Science, 10 (3). pp. 240-250. ISSN 1549-3636

Bashah Idris, Norbik and Mohamed,, Ashara Banu and Shanmugum,, Bharanidharan (2014) Alert processing method with data reduction and correlation technique. Recent Trends in Social and Behaviour Sciences - Proceedings of the 2nd International Congress on Interdisciplinary Behavior and Social Sciences 2013, ICIBSoS 2013 . pp. 183-189.

Bharanidharan Shanmugam, (2014) Factors affecting on security perception in online purchase intention. Advanced Science Letters, 20 (12). pp. 2004-2008. ISSN 1936-6612

Bijarchian, Amir and Ali, Rosmah (2014) Usability elements as benchmarking criteria for enterprise architecture methodologies. Jurnal Teknologi (Sciences and Engineering), 68 (2). pp. 45-48. ISSN 2180-3722

Brohi, Sarfraz Nawaz and Bamiah, Mervat Adib and Chuprat, Suriayati and Ab, Jamalul Lail (2014) Design and implementation of a privacy preserved off-premises cloud storage. Journal of Computer Science, 10 (2). pp. 210-223. ISSN 1549-3636

C

Che Mohd. Yusoff, Rasimah and Ibrahim, Roslina and Maarop, Nurazean and Mat Seman, Noor Azlinda (2014) Trust in virtual team software development. Advanced Science Letters, 20 (42289). pp. 2248-2251. ISSN 1936-6612

Chughtgai, Muhammad Waseem (2014) Goal-based filtering approach for recommender system. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Chuprat, Suriayati and Hedayatpour, Saman and Kama, Nazri Nazri (2014) A sticker-based model using DNA computing for generating real random numbers. International Journal of Security and Its Applications, 8 (4). pp. 113-122. ISSN 1738-9976

D

Diallo Abdoulaye, Kindy (2014) Using rough set through for classification of image segmentation data. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

E

Elhagari, Usama Tharwat and Shanmugam, Bharanidharan and Ab. Manan, Jamalul-lail (2014) Towards a new framework for TPM compliance testing. In: International Conference of Recent Trends in Information and Communication Technologies (IRICT 2014), 12-13 Sept, 2014, Johor Bahru, Malaysia.

Erfaneh Noroozi, and Salwani Mohd Daud, and Ali Sabouhi, and Mohammad Reza Salehnamadi, (2014) New algorithm to reduce file size and bandwidth of hashed digital signature for image steganography using LSB. Advanced Materials Research, 980 . pp. 194-197. ISSN 1022-6680

G

Ganthan Narayana Samy, (2014) Evaluation of students’ knowledge on information security at technical and vocational training corporation in Saudi Arabia. Advanced Science Letters, 20 (12). pp. 2198-2201. ISSN 1936-6612

Ghazizadeh, Eghbal and Zamani, Mazdak and Ab. Manan, Jamalul Lail and Alizadeh, Mojtaba (2014) Trusted computing strengthens cloud authentication. Scientific World Journal . ISSN 1537-744X

H

Hajmohammadi, Mohammad Sadegh and Ibrahim, Roliana and Selamat, Ali (2014) Cross-lingual sentiment classification using multiple source languages in multi-view semi-supervised learning. Engineering Applications of Artificial Intelligence, 36 . pp. 195-203. ISSN 0952-1976

Hamed Taherdoost, and Shamsul Sahibuddin, and Neda Jalaliyoon, (2014) Perceived barriers and benefits of web based services. Proceedings - 2014 International Conference on Computational Science and Computational Intelligence, CSCI 2014, 2 . pp. 34-39.

Hassan, Noor Hafizah and Abdul Rahim, Fiza and Ismail, Zuraini (2014) A review on barriers in adopting healthcare information system. Advanced Science Letters, 20 (12). pp. 2184-2187. ISSN 1936-6612

Hassan, Noor Hafizah and Ismail, Zuraini and Maarop, Nurazean (2014) Understanding relationship between security culture and knowledge management. Lecture Notes in Business Information Processing, 185 LN . pp. 397-402. ISSN 1865-1348

Hassan, Noor Hafizah and Ismail, Zuraini and Maarop, Nurazean (2014) Understanding relationship between security culture and knowledge management. In: 9th International Conference on Knowledge Management in Organizations, KMO 2014, 2-5 Sep, 2014, Santiago, Chile.

Homa Movahednejad, and Suhaimi Ibrahim, and Mahdi Sharifi, and Harihodin Bin Selamat, and Arash Habibi Lashkari, and Sayed Gholam, and Hassan Tabatabaei, (2014) Novel security conscious evaluation criteria for web service composition. Research Journal of Applied Sciences, Engineering and Technology, 7 (4). pp. 673-695. ISSN 2040-7459

Hosseinkhani, Javad and Ibrahim, Suhaimi and T. Chuprat, Suriayati and Naniz, Javid Hosseinkhani (2014) Web crime mining by means of data mining techniques. Research Journal of Applied Sciences, Engineering and Technology, 7 (10). pp. 2027-2032. ISSN 2040-7467

I

Ibrahim, Roliana and Salihu,, Zaharaddeen Kado and Khaidzir,, Khairul Anwar Mohamed Mohamed (2014) Agent parameters for building consultant teamwork in the agent-based simulation model development. ISTMET 2014 - 1st International Symposium on Technology Management and Emerging Technologies, Proceedings . pp. 212-217.

Ibrahim, Suhaimi and Abubakar, Adamu I. and Ameri, Sadegh R Hadian (2014) A navigation-aided framework for 3D map views on mobile devices. International Review on Computers and Software, 9 (9). pp. 1605-1611. ISSN 1828-6003

Ibrahim, Suhaimi and Shahid, Muhammad R (2014) A new code based test case prioritization technique. International Journal of Software Engineering and its Applications, 8 (6). pp. 31-38. ISSN 1738-9984

Ismail, Zuraini and Abdul Rahim, Fiza and Samy, Ganthan Narayana (2014) Information privacy concerns in electronic medical records: a preliminary investigation. Lecture Notes in Business Information Processing, 185 LN . pp. 177-185. ISSN 1865-1348

Ismail, Zuraini and Abdul Rahim, Fiza and Samy, Ganthan Narayana (2014) Information privacy concerns in the use of social media among healthcare practitioners: a systematic literature review. Advanced Science Letters, 20 (12). pp. 2176-2179. ISSN 1936-6612

K

Kama, Mohd. Nazri (2014) Input and output application programming interface for plaid standard library. International Journal of Software Engineering and its Applications, 8 (1). pp. 95-106. ISSN 1738-9984

Kama, Mohd. Nazri and A Bakar, Nur Azaliah and Selamat, Harihodin (2014) Influence factors in government enterprise architecture establishment process: a preliminary findings. VISION 2020: Sustainable Growth, Economic Development, and Global Competitiveness, Vols 1-5 . pp. 576-583.

Kama, Mohd. Nazri and Hedayatpour, Saman (2014) Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model. International Journal of Software Engineering and its Applications, 8 (8). pp. 171-180. ISSN 1738-9984

Kama, Mohd. Nazri and Sadabadi, Ali Tizkar (2014) A conceptual-operative framework for in-process decision support of software project management practice. International Journal of Software Engineering and its Applications, 8 (1). pp. 287-302. ISSN 1738-9984

Kama, Mohd. Nazri and Sadabadi, Ali Tizkar (2014) Generating policy for software project management decision support paradigm. Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS . pp. 58-63. ISSN 2327-0586

Kama, Mohd. Nazri and Hedayatpour,, Saman and Chuprat,, Suriayati (2014) Analyzing security aspects during software design phase using attack-based analysis model. International Journal of Software Engineering and its Applications, 8 (3). pp. 143-156. ISSN 1738-9984

Konjari, Marin (2014) Business intelligence in Melaka's tourism industry. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

M

Mazdak Zamani, (2014) Energy efficient routing in wireless sensor networks based on fuzzy ant colony optimization. International Journal of Distributed Sensor Networks . ISSN 1550-1329

Mohd. Anuar, Nurul Syuhada (2014) Development of survey feedback module for training feedback system. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Mohd. Azmi, Nurulhuda Firdaus and Md. Sarkan, Haslina and Ibrahim, Mohd. Hakimi Aiman and Lau, Hui Keng and Ibrahim, Nuzulha Khilwani (2014) Quantitative measure in image segmentation for skin lesion images: a preliminary study. International Conference on Quantitative Sciences and its Applications (ICOQSIA 2014), 1635 . pp. 65-71. ISSN 0094-243X

Mohd. Daud, Salwani and Davoudi, Vahid and Abosadeghi, Mahdieh and Oskooei, Meysam Ahmadi (2014) Improved indoors location awareness architecture in mobile phones. Advanced Science Letters, 20 (12). pp. 2078-2081. ISSN 1936-6612

Mohd. Naz'ri Mahrin, (2014) Feasibility study of tablet PC acceptance among school children in Malaysia. Jurnal Teknologi (Sciences and Engineering), 69 (2). pp. 39-44. ISSN 2180-3722

Mohebbi, Keyvan and Ibrahim, Suhaimi and Zamani, Mazdak and Khezrian, Mojtaba (2014) UltiMatch-NL: a web service matchmaker based on multiple semantic filters. Plos One, 9 (8). ISSN 1932-6203

Movahednejad, Homa and Ibrahim, Suhaimi and Sharifi, Mahdi and Selamat, Harihodin and Lashkari, Arash Habibi and Tabatabaei, Sayed Gholam Hassan (2014) QoS-aware evaluation criteria for web service composition. Journal of Theoretical and Applied Information Technology, 59 (1). pp. 27-44. ISSN 1992-8645

N

Nor Zairah Ab. Rahim, (2014) E-Book use by Malaysian primary school children. 2014 4th International Conference on Digital Information and Communication Technology and Its Applications, DICTAP 2014 . pp. 109-113.

O

Oskooei, Meysam Ahmadi and Mohd. Daud, Salwani and Chua, Fang Fang (2014) Modeling quality attributes and metrics for web service selection. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES, 1602 . pp. 945-952. ISSN 0094-243X

P

Parsazadeh, Nadia and Ali, Rosmah and Mohd. Zainuddin, Norziha Megat (2014) Technological aspects of e-learning system in Malaysian context. In: International Conference on Teaching and Learning in Computing and Engineering (LaTiCE), 11-13 April, 2014, Kuching, Sawarak.

R

Rathore, Azeem Saleem (2014) Human resource management system. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Rouhani, Babak Darvish and Mahrin, Mohd. Naz'ri and Nikpay, Fatemeh and Rouhani, Bita Darvish (2014) Current issues on enterprise architecture implementation methodology. Advances in Intelligent Systems and Computing, 276 (2). pp. 239-246. ISSN 2194-5357

S

Sadeghian, Amirmohammad and Zamani, Mazdak (2014) Detecting and preventing DDoS attacks in botnets by the help of self triggered black holes. 2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014 . pp. 38-42.

Saeidi, Mohammad Hosein Pour (2014) Enhancement of CMS for the university portal. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Sahibuddin, Shamsul and Taherdoost, Hamed and Namayandeh, Meysam and Jalaliyoon, Neda (2014) Computer and information security ethics - Models. Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013 . pp. 145-149.

Sahibuddin, Shamsul and Taherdoost,, Hamed and Jalaliyoon,, Neda (2014) Assessment of electronic service applications' practice: domains perspective. Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013 . pp. 534-537.

Sahibuddin, Shamsul and Taherdoost,, Hamed and Jalaliyoon,, Neda and Hosseinkhani,, Javad (2014) Classification of web based service user types. Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013 . pp. 495-499.

Salwani Mohd. Daud, (2014) Dyslexia baca' mobile app - the learning ecosystem for dyslexic children. Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013 . pp. 412-416.

Salwani Mohd. Daud, (2014) Enhancing secured data hiding using dynamic digital signature for authentication purpose. Jurnal Teknologi (Sciences and Engineering), 68 (2). pp. 39-44. ISSN 2180-3722

Sasan Karamizadeh, and Shahidan M. Abdullah, and Mazdak Zamani, and Atabak Kherikhah, (2014) Pattern recognition techniques: Studies on appropriate classifications. ARPN Journal of Engineering and Applied Sciences, 9 (8). pp. 1215-1219. ISSN 1819-6608

Selamat, Harihodin and Bakar,, Nur Azaliah A (2014) An assessment model for government enterprise architecture establishment phase. Advanced Science Letters, 20 (12). pp. 1987-1991. ISSN 1936-6612

Shahibuddin, Shamsul and Awang, Nor Hazilawati and Wan Kadir, Wan M. N (2014) A middleware and policy-based adaptation framework to simplify software evolution: an implementation on unit trust enterprise system. Journal of Theoretical and Applied Information Technology, 70 (3). pp. 390-398. ISSN 1992-8645

Shajari, Maziar and Ismail, Zuraini (2014) Constructing an adoption model for e-Government services. Jurnal Teknologi (Sciences and Engineering), 68 (2). pp. 29-37. ISSN 2180-3722

Shamsul Sahibuddin, (2014) Features' evaluation of goods, services and e-services, electronic service characteristics exploration. 7th International Conference Interdisciplinarity in Engineering (INTER-ENG 2013), 12 . pp. 204-211. ISSN 2212-0173

Shanmugam, Bharanidharan and Narayana Samy, Ganthan and Idris, Norbik Bashah and Saif Qaid, Samer Hasan and Ahmad, Azuan (2014) Security risk assessment framework for cloud computing environments. Security and Communication Networks, 7 (11). p. 2124. ISSN 1939-0114

Shanmugam, Bharanidharan and Albakri,, Sameer Hasan and Samy,, Ganthan Narayana and Idris,, Norbik Bashah and Ahmed,, Azuan (2014) Cloud computing adoption challenges. Advanced Science Letters, 20 (2). pp. 546-548. ISSN 1936-6612

Sharifi, Mahdi and Abdul Manaf, Azizah and Memariani, Ali and Movahednejad, Homa (2014) Consensus-based service selection using crowdsourcing under fuzzy preferences of users. Proceedings - 2014 IEEE International Conference on Services Computing, SCC 2014 . pp. 17-26.

T

Tele, Imam Musa Abiodunde (2014) The development of executive information management system for Felcra Bina. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

W

Wardah Zainal Abidin, (2014) E-portfolio development through activity theory in action research. Lecture Notes in Business Information Processing, 185 LN . pp. 311-320. ISSN 1865-1348

Z

Zamani, Mazdak and Abdul Manaf, Azizah and Abdullah, Mohd. Shahidan and Zadeh, Eghbal Ghazi and Khaleghparast, Reza and Shams Dolatabadi, Zahra Sadat (2014) Secure openID authentication model by using trusted computing. Abstract and Applied Analysis, 2014 . ISSN 1085-3375

Zuraini Ismail, (2014) Enhanced web log cleaning algorithm for web intrusion detection. Advances in Intelligent Systems and Computing, 265 AI . pp. 315-324. ISSN 2194-5357

This list was generated on Thu Sep 21 03:40:27 2017 +08.