No | Year | Article Name | Journal/Title Name |
1 | 2021 | TAMPER DETECTION AND LOCALIZATION FOR QURANIC TEXT WATERMARKING SCHEME BASED ON HYBRID TECHNIQUE | COMPUTERS, MATERIALS AND CONTINUA |
2 | 2021 | PAYLOAD CAPACITY SCHEME FOR QURAN TEXT WATERMARKING BASED ON VOWELS WITH KASHIDA | COMPUTERS |
3 | 2020 | APPLYING GAME THEORY TO MORTGAGE FRAMEWORK | IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING |
4 | 2020 | PREDICTING CHURN: HOW MULTILAYER PERCEPTRON METHOD CAN HELP WITH CUSTOMER RETENTION IN TELECOM INDUSTRY |
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING |
5 | 2020 | SUSTAINABLE SOFTWARE ENGINEERING: A PERSPECTIVE OF INDIVIDUAL SUSTAINABILITY | INTERNATIONAL JOURNAL ON ADVANCED SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY |
6 | 2020 | ADOPTING ISO/IEC 27005:2011-BASED RISK TREATMENT PLAN TO PREVENT PATIENTS DATA THEFT | INTERNATIONAL JOURNAL ON ADVANCED SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY |
7 | 2019 | INTEGRATING AND ENHANCING MATHEMATICAL KNOWLEDGE IN JELEBU SECONDARY SCHOOLS | JOURNAL OF PHYSICS: CONFERENCE SERIES 1174 |
8 | 2019 | SMS SPAM MESSAGE DETECTION USING TERM FREQUENCY-INVERSE DOCUMENT FREQUENCY AND RANDOM FOREST ALGORITHM | PROCEDIA COMPUTER SCIENCE |
9 | 2019 | ENHANCING PERFORMANCE ASPECT IN USABILITY GUIDELINES FOR MOBILE WEB APPLICATION | INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS |
10 | 2019 | BETWEEN HABIT AND ADDICTION: AN OVERVIEW OF PRELIMINARY FINDING ON SOCIAL NETWORKING SITES USAGE AMONG TEENAGERS | ACM INTERNATIONAL CONFERENCE PROCEEDING SERIES : INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS |
11 | 2018 | RECOGNITION OF COMPLEX HUMAN ACTIVITY USING MOBILE PHONES: A SYSTEMATIC LITERATURE REVIEW | JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY |
12 | 2018 | MOBILE BUSINESS INTELLIGENCE ACCEPTANCE MODEL FOR ORGANISATIONAL DECISION MAKING | BULLETIN OF ELECTRICAL ENGINEERING AND INFORMATICS |
13 | 2018 | DEVELOPMENT OF MCU ARCHITECTURE FOR IOT-BASED SYSTEM | ADVANCED SCIENCE LETTER |
14 | 2018 | ANALYZING TRAFFIC ACCIDENT AND CASUALTY TREND USING DATA VISUALIZATION | ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING |
15 | 2018 | SOCIAL NETWORKING SITES HABITS AND ADDICTION AMONG ADOLESCENTS IN KLANG VALLEY | INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS |
16 | 2017 | MULTI-VENDORS COMMUNICATION FRAMEWORK FOR OUTSOURCED PROJECT | JOURNAL OF TELECOMMUNICATION ELECTRONIC AND COMPUTER ENGINEERING |
17 | 2017 | BLURRED FACE IMAGE RESTORATION USING GRADIENT DISTRIBUTION PRIOR MODEL | SCIENCE INTERNATIONAL |
18 | 2017 | THE CHALLENGES OF EXTRACT, TRANSFORM AND LOADING (ETL) SYSTEM IMPLEMENTATION FOR NEAR REAL-TIME ENVIRONMENT: A BACK ROOM STAGING FOR DATA ANALYTICS |
INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS) |
19 | 2017 | THE CHALLENGES OF EXTRACT, TRANSFORM AND LOAD (ETL) FOR DATA INTEGRATION IN NEAR REAL-TIME ENVIRONMENT |
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY (JATIT) |
20 | 2017 | IMPROVING THE ACCURACY OF COLLABORATIVE FILTERING RECOMMENDATIONS USING CLUSTERING AND ASSOCIATION RULES MINING ON IMPLICIT DATA | COMPUTERS IN HUMAN BEHAVIOR |
21 | 2017 | DATA RECONSTRUCTION THROUGH SEQUENCE BASED MAPPING IN SECURED DATA PARTITIONING | ADVANCED SCIENCE LETTERS |
22 | 2017 | AN ALGORITHMIC-BASED CHANGE EFFORT ESTIMATION MODEL FOR SOFTWARE DEVELOPMENT | ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC |
23 | 2017 | HYBRID REAL-TIME TASK SCHEDULING ALGORITHM IN OVERLOAD SITUATION FOR MULTIPROCESSOR SYSTEM | JOURNAL OF TELECOMMUNICATION, ELECTRONIC AND COMPUTER ENGINEERING |
24 | 2016 | SINGLE IMAGE SUPER RESOLUTION BY NO-REFERENCE IMAGE QUALITY INDEX OPTIMIZATION IN PCA SUBSPACE |
2016 IEEE 12TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & ITS APPLICATIONS (CSPA2016), 4 – 6 MARCH 2016, MELAKA, MALAYSIA |
25 | 2015 | CONTROLLING TRAFFIC FLOW IN MULTILANE-ISOLATED INTERSECTION USING ANFIS APPROACH TECHNIQUES | JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY |
26 | 2015 | ANALYZING LOG IN BIG DATA ENVIRONMENT: A REVIEW | ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES |
27 | 2015 | RSA AUTHENTICATION MECHANISMS IN CONTROL GRID COMPUTING ENVIRONMENT USING GRIDSIM TOOLKIT | PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS |
28 | 2015 | AN INTERNET BUSINESS VISIBILITY CONCEPTUAL MODEL | 14TH INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE ACACOS 2015 |
29 | 2014 | MULTI-CRITERIA CONSENSUS-BASED SERVICE SELECTION USING CROWDSOURCING | ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014 28TH INTERNATIONAL CONFERENCE ON |
30 | 2013 | INTELLIGENT CONTROL OF TWIN-ROTOR MIMO SYSTEM USING FUZZY INFERENCE TECHNIQUES | INTERNATIONAL REVIEW OF AUTOMATIC CONTROL |
31 | 2012 | DEVELOPMENT OF MALAYSIAN’S DIGITAL FORENSICS INVESTIGATION TRAINING/EDUCATION PROGRAMS QUALITY ASSURANCE AND ACCREDITATION | 2012 INTERNATIONAL CONFERENCE ON E-LEARNING AND E-TECHNOLOGIES IN EDUCATION (ICEEE) |
32 | 2011 | A TAXONOMY OF TRUST ORIENTED APPROACHES FOR SERVICES COMPUTING | ACM INTERNATIONAL CONFERENCE PROCEEDING SERIES |