ISBN 978-983--44150-2-0
     

KEYNOTES

Innovation, Information Technology, Organisational Improvement and Research
Craig Standing
Operations Research and Knowledge Modeling in Data Mining
Masato KODA
ICT – Can It Be An Enabler Of The Knowledge Economy?
Mohamad Salmi Mohd. Sohod

LIST OF PAPERS

Paper Title
Authors
PID
Personas based Support Tool for Requirements Elicitation
Mehrnaz Kazemi Bavani
Rodina Ahmad

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Mohd.Taufiq Norhizat
Zulkifli Ishak
Mohd Suhaimi Sauti
Md Zaini Jamaludin
Design a MATLAB-based System Architecture for Locating Fiber Fault in Optical Access Network

Ng Boon Chuan
Siti Asma Che Aziz
Mohammad Syuhaimi Ab-Rahman
Kasmiran Jumari

Develop a FTTH Network Management System using Visual Basic
Ng Boon Chuan
Mohammad Syuhaimi Ab-Rahman
Aswir Premadi
Kasmiran Jumari
Identity Credential Issuance with Trusted Computing
Norazah Abd Aziz
Lucyantie Mazalan
Crisp Set Implementation On Video Images For The Application Of Surveillance Systems
Altahir A. Altahir
Vijanth S. Asirvadam
Patrick Sebastian
Computer Aided Preoperative Planning Application for Shoulder Hemiarthroplasty
Lee Thian Seng
Indra Mohd Zin,
Abdul Yazid Mohd Kassim
Suhail Abdullah
Riza Sulaiman

Augmented Reality Based Educational Tool on Live Solar System (LSS)
Aw Kien Sin
Halimah Badioze Zaman
A New Approach in Solving Illumination and Facial Expression Problems for Face Recognition
Yee Wan Wong
Kah Phooi Seng
Li-Minn Ang
Warehouse Management System and Business Performance:
Case Study of a Regional Distribution Centre
Au Yong Hui Nee
An Implementation Review of Occlusion-Based Interaction in Augmented Reality Environment
Mohamad Shahrul Shahidan
Nazrita Ibrahim
Mohd Hazli Mohamed Zabil
Azlan Yusof
Towards Developing Distributed Heterogeneous Mobile Phone Applications
Ali R. Mustafa Kattan
Rosni Abdullah
Rosalina Abdul Salam
Sureswaran Ramadass
User's Perception on Information Security Policy at Institutes of Higher Learning
Haniza Sharif
Zuraini Ismail
Maslin Masrom
Threshold verification using Statistical Approach for Fast Attack Detection
Mohd Faizal Abdollah
Mohd Zaki Mas'ud
Shahrin Sahib@Sahibuddin
Robiah Yusof
Siti Rahayu Selamat
Vision-based Frontal Vehicle Detection and Tracking
King Hann LIM
Kah Phooi SENG
Li-Minn ANG
Siew Wen CHIN
Critical Thinking in Various Risk Assessment Issues to Benefit Malaysian Small and Medium Sized Enterprises (SMEs)
Ryan Yang Guo
Su Yan Lee
Empirical Study on Implementation of Organizational Memory in Preparatory Center
Saidatul Rahah Hamidi
Zeti Darleena Eri
Kernelized Radial Basis Probabilistic Neural Network for Classification of River Water Quality
Lim Eng Aik
Zarita Zainuddin
Evaluating Current Authentication Methods: Prediction of a More Suitable Authentication Approach for Public Interaction
Jimoh Rasheed Gbeng
Norshuhada Shiratuddin
Preliminary Analysis Of Problem Solving Method In Online PBL (Case Study In It Security Subject At UTEM)
Nurhazirah bt Mohd Bakri
Faaizah Shahbodin, Norasiken bt Bakar
DIFS Modifications to Support QoS in IEEE 802.11 DCF AD-hoc Networks
Mohd Najwan Md Khambari
Shahrin Sahib
Mohd Fairuz Iskandar Othman
IP Spoofing Defense: An Introduction
Lee Soon
Mohamed Othman
Nur Izura Udzir
Identifying Fiber Fault in Fiber to the Home Using Access Control System
Aswir Premadi
Mohammad Syuhaimi Ab-Rahman
MOhamad Najib Mohd. Saupe
Ng Boon Chuan
Kasmiran Jumari
A Survey On 2nd Object Tracking in Digital Video
A.S. Khobragade
C.G. Dethe
K.D. Kulat
The Effectiveness of Using Internet as a Principal Information Resource in Teaching and Learning Activity in Higher Educational Institutions in Malaysia
Farahiza Zaihan Azizan
Exploiting Inter-reference Time Characteristic of Web Cache Workload for Web Cache Replacement Design
Agung Sediyono
Entertaining and Fun: Experience-focused eLearning Material
Ariffin Abdul Mutalib
Norshuhada Shiratuddin
A New Generation For Intelligent Anti-Internet Worm Early System Detection
Mohammad M. Rasheed
Norita Md Norwawi
Mohammed M. Kadhum
Osman Ghazali
An Approach for efficient energy consumption and delay guarantee MAC Protocol for Wireless Sensor Networks
Marwan Ihsan Shukur
Vooi Voon Yap
The Analysis of Achieving TCP Fairness in IEEE 802.11 Infrastructure WLAN
Tareq Rasul
Mohamed Othman
Improving Mining Efficiency: A New Scheme for Extracting Association Rules
Aiman Moyaid Said
P D D. Dominic
Azween B Abdullah
Balanced Load Sharing Protocol for Wireless Sensor Networks
Maytham Safar
Rabie Al Mejbas
The Development of an Integrated and Intelligent Support Tool for Software Certification Process
Jamaiah Haji Yahaya
Aziz Deraman
Abdul Razak Hamdan
Siti Zahidah Abdullah
Fauziah Baharom
Role of Business Process Models in Requirements Engineering
Fatima Ashraf
Mohd Syazwan Abdullah
Requirements Analysis Method For Extracting-Transformation-Loading (Etl) In Data Warehouse Systems
Azman Taa
Mohd Syazwan Abdullah
Norita Md. Norwawi
A Near-Optimal Centroids Initialization in K-means Algorithm Using Bees Algorithm
M. Mahmuddin
Y. Yusof
Parking Space: A Design of WLAN Mobile Phone Application in Urban Area
Ghassan Thabit Jebur
Massudi Mahmuddin
Automated Safety & Online Healthcare System
Laxmi Narayan Sharmaa
Raj Kumar Pal
B.Vasavi
Non-uniform Face Mesh for 3D Face Recognition
Wei Jen Chew
Kah Phooi Seng
Li-Minn Ang
Practical and User Friendly of Analytic Hierarchy Process for Decision Making
Abd Samad Hasan Basari
Burairah Hussin
Abdul Samad Shibghatullah
Course Profiling System
K. H. Yew
S. J. R. Chiau
Measuring Doctor’s Quickness and Effort of Using Key-Stroke Level Model: A Case Study of Drug Order Entry
Mohd Haslina
Mohamad Sh. Mastura
Handoff Scheme for Terrestrial Mobile and Satellite Convergence Networks with incorpration of Pattern Recognition Algorithm
Kwong Chiew Foong
Prioritization scheme for QoS in IEEE 802.11e WLAN
Yakubu Suleiman Baguda
Norsheila Fisal
Socio-Economic Benefits Of Telecentre Implementation In Peninsular Malaysia
Zulkhairi MD.
Nor Iadah, Y.
Huda, I.
Mohd. Khairudin K.
Zahurin, MA.
Bluetooth-Based Alarm System
Mohd. Helmy Abd. Wahab
Nor Ezna Juniza Md. Janah
Ayob Johari
Danial Md. Nor
Rahmat Sanudin
Graphical Web based Tool for Generating Query from Star Schema
Mohammed Anbar
Ku Ruhana Ku-Mahamud
Reading Discrepency and the Promise of Computer Technology
Hafiza Abas
Halimah Badioze Zaman
Simulation of Diagonal Data Replication in Mesh
Rohaya Latip
Hamidah Ibrahim
Mohamed Othman
Md. Nasir Sulaiman
Azizol Abdullah
Extension of Dynamic Source Routing Protocol in Mobile Ad hoc Network
Osman Ghazali
Suhaidi Hassan
Naseer Ali
Nur Ziadah Harun
Saichai a/p Eh Song
Norhidayah Abdullah
Salient Region Detection Using Contrast-Based Saliency and Watershed Segmentation
Christopher Wing Hong Ngau
Li-Minn Ang
Kah Phooi Seng
Multimedia Package For Learning English Based On Learners’ Profile
Norshahriah Wahab
Halimah Badioze Zaman
Development of Contact Lens Suitability System (ClenSyst)
Syaratul Ain Muhammed Hafiz
Noraidah Sahari @ Ashaari
Jemaima Che Hamzah
Syariza Razak
A New Enhancement Of Fingerprint Classification For The Damaged Fingerprint With Adaptive Features
R. Josphineleela
M. Ramakrishnan
Gunasekaran
Multi-Agent Information Inferencing Fusion System for Decision Support System
Arwin Datumaya Wahyudi Sumari
Adang Suwandi Ahmad
Aciek Ida Wuryandari
Jaka Sembiring.
Predictive Maintenance Framework for Hard Disk Media Production
Megat Norulazmi Megat Mohamed Noor
Shaidah Jusoh
State-of-the-Art Application of Artificial Neural Network in Digital Watermarking and the way Forward
Rashidah F. Olanrewaju
Aburas Ali Abdurazzag
Othman O. Khalifa
Aishah Abdalla
Forest Fire Pattern Extraction and Rule Generation using Sliding Window Technique
Ku Ruhana Ku-Mahamud
Khor Jia Yun
Determination of the plan of the A Famosa Fortress, Malaysia
M. Izania
A. Bridges
A.Razak
Dynamic Carpooling Notification System For Rural Areas
Omar Alharbi
Nor Laily Hashim
Trusted Computing: Challenges & Solutions
Nor Fatimah Bt Awang
Basic Model For Information Retrieval Based On Free-Text In Database Application.
Mohd Adan Omar
Md Zahir Mat Cha
Mohd Rushdi Idrus
New Control for Two Mass Positioning System Using Nominal Characteristic Trajectory Following Controller
Fitri.MY
Wahyudi
R. Akmeliawati
Andika A.Wijaya
Reconstruction a Protein 3D Structure From It Contact Map: Tools Comparison
Hamed J. Al-Fawareh
Nawal T.Alomoush
Jehad Q. Odeh
Determining Wireless Local Area Network (WLAN) Vulnerabilities on Academic Network
Fazli Azzali
Amran Ahmad
Ali Yusny Daud
Product Assembly and Disassembly Sequence Optimization based on Genetic Algorithm and Design for Assembly Methodologies
Azman Yasin
Nurnasran Puteh
Ruslizam Daud
Silent Alarm: Link Prediction Modeling for Fast Routing in VANET
Nik Nur Saneiah Kamaruzaman
Halabi Hasbullah
Development of an Instrument to Measure Smart Card Technology Acceptance
Hamed Taherdoost
Maslin Masrom
Zuraini Ismail
Extracting Semantics for Information Extraction
Hejab M. Al Fawareh
Shaidah Jusoh
Segmentation of Nastaliq Script for OCR
Sohail A. Sattar
Shamsul Haque
Mahmood K. Pathan
A Dynamic Replication Strategy based on Exponential Growth/Decay Rate
Mohammed Madi
Suhaidi Hassan
Yuhanis Yusof
Stagnation Control Using Interacted Multiple Ant Colonies
Alaa Al-Janabya
Ku Ruhana Ku-Mahamud
Norita Norwawi
The Architectures of SMS Management System as a Tool for Communication
Azmi Md Saman
Shafiz Affendi Mohd Yusof
Salman Sha’ri
PDF Digital Watermarking: Grayscale Photocopy Detection of Printed Documents
Norhaziah Md. Salleh
Soong Hoong Cheng
Extreme Programming and Its Positive Affect on Software Engineering Teams
Sharifah Lailee Syed-Abdullah
Mazni Omar
Optimizing Security and Flexibility by Designing a High Security System for E-Government Servers
Y.Y Abdul Talib
B.B Zaidan
A.A Zaidan
A.W.Naji
Blood Cell Image Segmentation Using Unsupervised Clustering Techniques
T. Zalizam T. Muda
Rosalina Abdul Salam
A Tactical Role for Reverse Auctions: A Market Maker Perspective
Susan Standing
Craig Standing
Peter Love
An Automated Text Summarization Methodology
Shaidah Jusoh
Abdulsalam Masoud
Hejab M. Al Fawareh
Classification of Capital Expenditures and Revenue Expenditures: An Analysis of Correlation and Neural Networks
Fadzilah Siraj
Nurazzah Abu Bakar
Adnan Abolgasim,
Investigating the Effect of Data Representation On Neural Network and Regression
Fadzilah Siraj
Ehab A. Omer El Fallah
Looking into the Definition and Characteristics of U-Learning
Erny Arniza Ahmad
Saadiah Yahya
Kamarularifin Abd. Jalil
Hybrid Ant Colony Optimization for Grid Computing
Husna Jamal Abdul Nasir
Ku Ruhana Ku-Mahamud
Indicator Selection based on Rough Set Theory
Faudziah Ahmad
Azuraliza Abu Bakar
Abdul Razak Hamdan
Pronunciation Variations and Context-dependent Model to Improve ASR Performance for Dyslexic Children’s Read Speech
Husniza Husni
Zulikha Jamaludin
Pattern Extraction for Programming Performance Evaluation Using Directed Apriori
Mohamad Farhan Mohamad Mohsin
Mohd Fairuz Zaiyadi
Norita Md Norwawi
Mohd Helmy Abd Wahab
Data Mining Reduction Methods and Performances of Rules
Faudziah Ahmad
Mohammad Aizat Basir
Assessment of Enterprise Architecture (EA) Implementation Using The Open Group Architecture Framework (TOGAF)
Nini Aniza Zakaria
Rafidah Abd Razak
Zulkhairi Md Dahalin

 

ICOCI 2009, International Conference on Computing and Informatics, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah Darul Aman, Malaysia