{"id":9526,"date":"2020-02-25T16:41:30","date_gmt":"2020-02-25T08:41:30","guid":{"rendered":"http:\/\/people.utm.my\/haslinasarkan\/?page_id=9526"},"modified":"2021-04-27T11:06:40","modified_gmt":"2021-04-27T03:06:40","slug":"latest-publications","status":"publish","type":"page","link":"https:\/\/people.utm.my\/haslinasarkan\/latest-publications\/","title":{"rendered":"Indexed Publications"},"content":{"rendered":"<table>\n<tbody>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\"><strong>No<\/strong><\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\"><strong>Year<\/strong><\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\"><strong>Article Name<\/strong><\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\"><strong>Journal\/Title Name<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">1<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2021<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">TAMPER DETECTION AND LOCALIZATION FOR QURANIC TEXT WATERMARKING SCHEME BASED ON HYBRID TECHNIQUE<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">COMPUTERS, MATERIALS AND CONTINUA<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">2<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2021<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">PAYLOAD CAPACITY SCHEME FOR QURAN TEXT WATERMARKING BASED ON VOWELS WITH KASHIDA<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">COMPUTERS<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">3<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2020<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">APPLYING GAME THEORY TO MORTGAGE FRAMEWORK<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">4<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2020<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">PREDICTING CHURN: HOW MULTILAYER PERCEPTRON METHOD CAN HELP WITH CUSTOMER RETENTION IN TELECOM<\/span><br \/>\n<span style=\"color: #000000\">\u00a0INDUSTRY<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">5<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2020<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">SUSTAINABLE SOFTWARE ENGINEERING: A PERSPECTIVE OF INDIVIDUAL SUSTAINABILITY<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">INTERNATIONAL JOURNAL ON ADVANCED SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">6<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2020<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">ADOPTING ISO\/IEC 27005:2011-BASED RISK TREATMENT PLAN TO PREVENT PATIENTS DATA THEFT<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">INTERNATIONAL JOURNAL ON ADVANCED SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">7<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2019<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">INTEGRATING AND ENHANCING MATHEMATICAL KNOWLEDGE IN JELEBU SECONDARY SCHOOLS<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">JOURNAL OF PHYSICS:\u00a0 CONFERENCE SERIES 1174<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">8<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2019<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">SMS SPAM MESSAGE DETECTION USING TERM FREQUENCY-INVERSE DOCUMENT FREQUENCY AND RANDOM FOREST ALGORITHM<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">PROCEDIA COMPUTER SCIENCE<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">9<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2019<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">ENHANCING PERFORMANCE ASPECT IN USABILITY GUIDELINES FOR MOBILE WEB APPLICATION<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">10<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2019<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">BETWEEN HABIT AND ADDICTION: AN OVERVIEW OF PRELIMINARY FINDING ON SOCIAL NETWORKING SITES USAGE AMONG TEENAGERS<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">ACM INTERNATIONAL CONFERENCE PROCEEDING SERIES : INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">11<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2018<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">RECOGNITION OF COMPLEX HUMAN ACTIVITY USING MOBILE PHONES: A SYSTEMATIC LITERATURE REVIEW<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">12<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2018<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">MOBILE BUSINESS INTELLIGENCE ACCEPTANCE MODEL FOR ORGANISATIONAL DECISION MAKING<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">BULLETIN OF ELECTRICAL ENGINEERING AND INFORMATICS<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">13<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2018<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">DEVELOPMENT OF MCU ARCHITECTURE FOR IOT-BASED SYSTEM<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">ADVANCED SCIENCE LETTER<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">14<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2018<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">ANALYZING TRAFFIC ACCIDENT AND CASUALTY TREND USING DATA VISUALIZATION<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">15<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2018<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">SOCIAL NETWORKING SITES HABITS AND ADDICTION AMONG ADOLESCENTS IN KLANG VALLEY<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">16<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2017<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">MULTI-VENDORS COMMUNICATION FRAMEWORK FOR OUTSOURCED PROJECT<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">JOURNAL OF TELECOMMUNICATION ELECTRONIC AND COMPUTER ENGINEERING<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">17<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2017<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">BLURRED FACE IMAGE RESTORATION USING GRADIENT DISTRIBUTION PRIOR MODEL<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">SCIENCE INTERNATIONAL<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">18<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2017<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">THE CHALLENGES OF EXTRACT, TRANSFORM AND LOADING (ETL) SYSTEM IMPLEMENTATION FOR NEAR REAL-TIME ENVIRONMENT:<\/span><br \/>\n<span style=\"color: #000000\">\u00a0A BACK ROOM STAGING FOR DATA ANALYTICS<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS)<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">19<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2017<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">THE CHALLENGES OF EXTRACT, TRANSFORM AND<\/span><br \/>\n<span style=\"color: #000000\">\u00a0LOAD (ETL) FOR DATA INTEGRATION IN NEAR REAL-TIME<\/span><br \/>\n<span style=\"color: #000000\">\u00a0ENVIRONMENT<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY (JATIT)<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">20<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2017<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">IMPROVING THE ACCURACY OF COLLABORATIVE FILTERING RECOMMENDATIONS USING CLUSTERING AND ASSOCIATION RULES MINING ON IMPLICIT DATA<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">COMPUTERS IN HUMAN BEHAVIOR<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">21<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2017<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">DATA RECONSTRUCTION THROUGH SEQUENCE BASED MAPPING IN SECURED DATA PARTITIONING<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">ADVANCED SCIENCE LETTERS<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">22<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2017<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">AN ALGORITHMIC-BASED CHANGE EFFORT ESTIMATION MODEL FOR SOFTWARE DEVELOPMENT<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">23<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2017<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">HYBRID REAL-TIME TASK SCHEDULING ALGORITHM IN OVERLOAD SITUATION FOR MULTIPROCESSOR SYSTEM<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">JOURNAL OF TELECOMMUNICATION, ELECTRONIC AND COMPUTER ENGINEERING<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">24<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2016<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">SINGLE IMAGE SUPER RESOLUTION BY NO-REFERENCE<\/span><br \/>\n<span style=\"color: #000000\">\u00a0IMAGE QUALITY INDEX OPTIMIZATION IN PCA SUBSPACE<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">2016 IEEE 12TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING &amp; ITS APPLICATIONS (CSPA2016), 4 &#8211; 6 MARCH 2016, MELAKA, MALAYSIA<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">25<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2015<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">CONTROLLING TRAFFIC FLOW IN MULTILANE-ISOLATED INTERSECTION USING ANFIS APPROACH TECHNIQUES<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">26<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2015<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">ANALYZING LOG IN BIG DATA ENVIRONMENT: A REVIEW<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">27<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2015<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">RSA AUTHENTICATION MECHANISMS IN CONTROL GRID COMPUTING ENVIRONMENT USING GRIDSIM TOOLKIT<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING &amp; INFORMATICS<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">28<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2015<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">AN INTERNET BUSINESS VISIBILITY CONCEPTUAL MODEL<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">14TH INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE<\/span><br \/>\n<span style=\"color: #000000\">\u00a0ACACOS 2015<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">29<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2014<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">MULTI-CRITERIA CONSENSUS-BASED SERVICE SELECTION USING CROWDSOURCING<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014 28TH INTERNATIONAL CONFERENCE ON<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">30<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2013<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">INTELLIGENT CONTROL OF TWIN-ROTOR MIMO SYSTEM USING FUZZY INFERENCE TECHNIQUES<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">INTERNATIONAL REVIEW OF AUTOMATIC CONTROL<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">31<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2012<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">DEVELOPMENT OF MALAYSIAN&#8217;S DIGITAL FORENSICS INVESTIGATION TRAINING\/EDUCATION PROGRAMS QUALITY ASSURANCE AND ACCREDITATION<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">2012 INTERNATIONAL CONFERENCE ON E-LEARNING AND E-TECHNOLOGIES IN EDUCATION (ICEEE)<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"32\"><span style=\"color: #000000\">32<\/span><\/td>\n<td width=\"44\"><span style=\"color: #000000\">2011<\/span><\/td>\n<td width=\"301\"><span style=\"color: #000000\">A TAXONOMY OF TRUST ORIENTED APPROACHES FOR SERVICES COMPUTING<\/span><\/td>\n<td width=\"223\"><span style=\"color: #000000\">ACM INTERNATIONAL CONFERENCE PROCEEDING SERIES<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>No Year Article Name Journal\/Title Name 1 2021 TAMPER DETECTION AND LOCALIZATION FOR QURANIC TEXT WATERMARKING SCHEME BASED ON HYBRID TECHNIQUE COMPUTERS, MATERIALS AND CONTINUA 2 2021 PAYLOAD CAPACITY SCHEME FOR QURAN TEXT WATERMARKING BASED ON VOWELS WITH KASHIDA COMPUTERS 3 2020 APPLYING GAME THEORY TO MORTGAGE FRAMEWORK IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING [&hellip;]<\/p>\n","protected":false},"author":6477,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-9526","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/haslinasarkan\/wp-json\/wp\/v2\/pages\/9526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/haslinasarkan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.utm.my\/haslinasarkan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/haslinasarkan\/wp-json\/wp\/v2\/users\/6477"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/haslinasarkan\/wp-json\/wp\/v2\/comments?post=9526"}],"version-history":[{"count":4,"href":"https:\/\/people.utm.my\/haslinasarkan\/wp-json\/wp\/v2\/pages\/9526\/revisions"}],"predecessor-version":[{"id":9922,"href":"https:\/\/people.utm.my\/haslinasarkan\/wp-json\/wp\/v2\/pages\/9526\/revisions\/9922"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/haslinasarkan\/wp-json\/wp\/v2\/media?parent=9526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}