KEYNOTE ADDRESS

 

  • DIGITAL GRAPHIC NOVELS: TECHNOLOGY ENHANCED NARRATIVE FOR LEARNING
    Zulikha Jamaludin

01

CHAPTER 1

  • USER INTERFACE DESIGN: A STUDY OF EXPECTATION-CONFIRMATION THEORY
    Aslina Baharum and Azizah Jaafar
17
  • ASSESSING THE SIMULATION PERFORMANCES OF MULTIPLE MODEL SELECTION ALGORITHM
    Norhayati Yusof, Suzilah Ismail and T Zalizam T Muda
25
  • ALGORITHMIC APPROACHES IN MODEL SELECTION OF THE AIR PASSENGERS FLOWS DATA
    Suzilah Ismail, Norhayati Yusof and T Zalizam T Muda
32

CHAPTER 2

  • IMPLEMENTATION OF AN AUTOMATED SMART HOME CONTROL FOR DETECTING HUMAN EMOTIONS VIA FACIAL DETECTION
    Lim Teck Boon, Mohd Heikal Husin, Zarul Fitri Zaaba and Mohd Azam Osman
39
  • THE SENTINEL: A PROPOSED POTENTIAL INTRUDER ALERT SYSTEM BASED ON HUMAN BEHAVIOURS
    Lee Chi Ngan, Mohd Azam Osman, Zarul Fitri Zaaba and Wan Mohd Nazmee Wan Zainon
46
  • COOKING GUIDE: DIRECT AND INDIRECT FORM OF INTERACTION IN THE DIGITAL KITCHEN ENVIRONMENT
    K.N.F. Ku. Azir, Chris Baber and M.Jusoh
52
  • FACE-VOICE ASSOCIATION TOWARDS MULTIMODAL-BASED AUTHENTICATION USING MODULATED SPIKE-TIME DEPENDENT LEARNING
    Nooraini Yusoff and Mohammed Fadhil Ibrahim
58
  • ENHANCING THE PERFORMANCE OF MULTI-MODALITY ONTOLOGY SEMANTIC IMAGE RETRIEVAL USING OBJECT PROPERTIES FILTER
    Mohd Suffian Sulaiman,Sharifalillah Nordin and Nursuriati Jamil
65
  • COMPARISON BETWEEN PIXEL-BASED AND OBJECT-BASED CLASSIFICATIONS USING RADAR SATELLITE IMAGE IN EXTRACTING MASSIVE FLOOD EXTENT AT NORTHERN REGION OF PENINSULAR MALAYSIA
    Syaifulnizam Abd Manaf, Norwati Mustapha, Helmi Zulhaidi Mohd Shafri, Md Nasir Sulaiman and Nor Azura Husin
73

CHAPTER 3

 
  • A CONCEPTUAL MODEL OF UBIQUITOUS LANGUAGE LEARNING ENVIRONMENT (ULLE)
    Mohd Khairul Ikhwan Zolkefley, Zurainee Mohd Tahir, Anitawati Mohd Lokman, Azhar Abd Aziz, and Shamsudin Md Sharif
81
  • LEARNING FROM NEWS: IS ONLINE BETTER THAN PRINT?
    Bahiyah Omar
89
  • A CONCEPTUAL FRAMEWORK FOR MEASURING THE ACCEPTANCE OF PERVASIVE LEARNING
    Muhammad Yaqoob Koondhar, Nurul Nuha Binti Abdul Molok, Fida Chandio, Muhammad Malook Rind, Ali Raza, and Asadullah Shah
97
  • A FRAMEWORK FOR THE ANALYSIS OF DETERMINANTS OF SOCIAL MEDIA ACCEPTANCE IN HIGHER EDUCATIONAL INSTITUTESOF PAKISTAN
    Ali Raza, Fida Hussain Chandio, M Yaqoob Koondhar, M Malook Rind, and Asadullah Shah
104

CHAPTER 4

 
  • DEVELOPMENT OF INSTRUMENT FOR EVALUATING WEBSITE USABILITY FOCUSING ON UNIVERSITY WEBSITE
    Nur Sukinah Aziz and Adzhar Kamaludin
114
  • TELEHEALTH IN YEMEN: AN OVERVIEW AND A PROPOSED MODEL
    Abdulrahman A Al-Fadhli, Marini Othman, Abdullah Rashed, and Ammuthavali Ramasamy
121
  • AN EMPIRICAL INVESTIGATION ON THE REQUIRED ICT COMPETENCY READINESS TOWARDS THE DIGITAL ECONOMY IN THAILAND
    Kriengkrai Bhuvanij,M.L.Kulthon Kasemsan and Prasong Praneetpolgrang
127

CHAPTER 5

 
  • PROJECTING IMAGE ON NON-PLANAR SURFACE WITH ZERO-TH ORDER GEOMETRIC CONTINUITY USING SIMPLE DUAL-LINEAR FUNCTION AND MANIPULATION OF STRICT INTEGER IMPLEMENTATION IN PROGRAMMING LANGUAGE
    Fakhrul Hazman Yusoff and Muhammad Amirul Azhar
134
  • EXPERIMENTAL ANALYSIS OF CAMERA CALIBRATION TECHNIQUES USED FOR EYE TRACKING Zeenat AlKassim and Qurban Memon
142
  • USING SOUND FOR STRESS THERAPY IN A VIRTUAL-REALITY ENVIRONMENT
    Rubijesmin Abdul Latif, Rozita Ismail and Ahmad Redza Razieff Zainudin
152
  • THE POTENTIAL USE OF AUGMENTED REALITY IN GAMIFICATION
    Nurtihah Mohamed Noor, Fakhrul Hazman Yusoff, Rahmah Lob Yussof and Marina Ismail
159
  • ESTABLISHING A FRAMEWORK FOR VISUALISING MUSIC MOOD USING VISUAL TEXTURE
    Adzira Husain, Mohd Fairuz Shiratuddin and Kok Wai Wong
168
  • MULTICLASS CLASSIFICATION FOR CHEST X-RAY IMAGES BASED ON LESION LOCATION IN LUNG ZONES
    Mohd Nizam Saad, Zurina Muda,Noraidah Sahari and Hamzaini Abd Hamid
174
  • FIRST CYCLE OF USER EXPERIENCE ON ASSISTIVE COURSEWARE FOR YOUNG LOW VISION (AC4LV) LEARNERS
    Nurulnadwan Aziz, Ariffin Abdul Mutalib and Siti Mahfuzah Sarif
180
  • SOCIAL ENGINEERING AWARENESS GAME (SEAG): AN EMPIRICAL EVALUATION OF USING GAME TOWARDS IMPROVING INFORMATION SECURITY AWARENESS
    Abdus-Samad Temitope Olanrewaju and Nur Haryani Zakaria
187
  • CAN AUDITORY ICONS INDUCE FOOD INTAKE MIMICRY?
    Nadiah Zin, Hanif Baharin, and Athirah Rosli
194
  • ACCESSIBILITY FACTORS FOR TOTALLY BLIND USERS OF PALESTINIAN UNIVERSITIES WEBSITES
    Mohammed Saleh Hassouna, Noraidah Sahari, and Amirah Ismail
200
  • THE USE OF MODIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY 2 TO PREDICT PROSPECTIVE USERS’ INTENTION IN ADOPTING TV STREAMING
    Indrawati and Kusumoaji Sri Haryoto
206
  • MALAY COMPUTER-AIDED SPEECH THERAPY USING AUDIO-FINGERPRINT AND VISUALIZATION
    Nor Azan Mat Zin, Seyed Yashar Banihashem, Salwani Mohd Daud, Siti Norul Huda Sheikh Abdullah and Hiroyuki Iida
216
  • A USER-CENTERED DESIGN: METHODOLOGICAL TOOLS TO DESIGN AND DEVELOP COMPUTER GAMES FOR MOTOR-IMPAIRED USERS
    Nurul Hidayah Mat Zain, Azizah Jaafar and Fariza Hanis Abdul Razak
223
  • DESIGN OF ASSISTIVE VIDEO FOR HEARING-IMPAIRED (AV4HI) BASED ON VISUAL PERCEPTION THEORY
    Ariffin Abdul Mutalib, Syarifah Nadia Syed Yahaya, Sobihatun Nur Ab Salam, Mazida Ahmad, Massudi Mahmuddin
229
  • APPLICABILITY OF MOBILE AUGMENTED REALITY USAGE AT MELAKA CULTURAL HERITAGE SITES
    Syamsul Bahrin Zaibon, Ulka Chandini Pendit and Juliana Aida Abu Bakar
235
  • SMART PRAYER MAT: A TEXTILE-BASED PRESSURE SENSOR TO ASSIST ELDERLY WITH COGNITIVE IMPAIRMENT IN PRAYING ACTIVITY
    Juhaida Ismail, Nor Laila Md Noor and Wan Abdul Rahim Wan Mohd Isa
241
  • SMART PHONE MENU LAYOUT FOR ELDERLY USERS
    Nur Hamizah and Fariza Hanis Abdul Razak
247
  • WEB BASED 3D TERRAIN VISUALIZATION USING GAME ENGINE
    Ruzinoor Che Mat, Abdul Rashid Mohamed Shariff, Abdul Nasir Zulkifli, Mohd Shafry Mohd Rahim and Mohd Hafiz Mahayudin
254
  • AN APPROACH TO RESTRICT VIEWING OF MEDIA
    Norazah Abd Aziz and Raja Mohamad Fairuz R. Mohamad Yusoff
261
  • PERSONA DEVELOPMENT: ANALYZING VARYING CHARACTERISTICS OF SLOW LEARNER CONTEXT IN RELATION TO READING ABILITIES
    Marzita Mansor, Wan Adilah Wan Adnan and Natrah Abdullah
267

CHAPTER 6

 
  • EVOLUTIONARY ALGORITHM APPROACH FOR SOLVING ANIMAL DIET FORMULATION
    Rosshairy Abd. Rahman, Razamin Ramli, Zainoddin Jamari and Ku Ruhana Ku-Mahamud
274
  • ADOPTING GENETIC ALGORITHM TO ENHANCE STATE-SENSITIVITY PARTITIONING
    Ammar Mohammed Sultan, Salmi Baharom, Abdul Azim Abd Ghani, Jamilah Din and Hazura Zulzalil
280
  • FOOD TOUR RECOMMENDATION USING MODIFIED ANT COLONY ALGORITHM
    Kritsada Sriphaew and Kannita Sombatsricharoen
287
  • CELLULAR AUTOMATA MODEL FOR PEDESTRIAN EVACUATION IN FIRE SPREADING CONDITIONS
    Omar Khair Alla Alidmat, Fadratul Hafinaz Hassan and Ahamad Tajudin Khader
293
  • REACTIVE MAX-MIN ANT SYSTEM: AN EXPERIMENTAL ANALYSIS OF THE COMBINATION WITH K-OPT LOCAL SEARCHES
    Rafid Sagban, Ku Ruhana Ku-Mahamud and Muhamad Shahbani Abu Bakar
300
  • LOW AND HIGH LEVEL HYBRIDIZATION OF ANT COLONY SYSTEM AND GENETIC ALGORITHM FOR JOB SCHEDULING IN GRID COMPUTING
    Mustafa Muwafak Alobaedy and Ku Ruhana Ku-Mahamud
306
  • IMPROVED CHEMOTAXIS DIFFERENTIAL EVOLUTION OPTIMIZATION ALGORITHM
    Y. Emre Yıldız, Oğuz Altun and A. Osman Topal
312
  • INTELLIGENT EXAMINATION TIMETABLING SYSTEM USING HYBRID INTELLIGENT WATER DROPS ALGORITHM
    Bashar A. AlDeeb, Norita Md Norwawi, Mohammed A. Al-Betar, and Mohd Z. Jali
318
  • ANT SYSTEM-BASED FEATURE SET PARTITIONING ALGORITHM FOR K-NN AND LDA ENSEMBLES CONSTRUCTION
    Abdullah and Ku Ruhana Ku-Mahamud
326

CHAPTER 7

 
  • UTILIZING INTELLIGENT RESOURCE MANAGEMENT SYSTEM (IRMS) DASHBOARD TO AUTOMATE BUSINESS REPORTING TASK
    Noorhasmaniza Ahmad
334
  • ANALYZING COLOR FOR PERCEPTION BY FUZZY LOGIC
    Waiwit Chanwimalueng
340
  • ADDING SMP SUPPORT TO FASTPATHS IN AN L4 MICROKERNEL
    Petre Eftime, Lucian Mogosanu, Mihai Carabas,Laura Gheorghe and Razvan Deaconescu
347
  • REVIEWS ON FUNCTIONAL SIZE MEASUREMENT IN MOBILE APPLICATION AND UML MODEL
    Nur Atiqah Sia Abdullah and Nur Ida Aniza Rusli
353
  • MONITORING TASK PERFORMANCE USING VALUE STREAM MAPPING (VSM) TECHNIQUE
    Mazni Omar and Ku Munirah Ku Aman
359
  • LOCALIZING USER EXPERIENCE FOR MOBILE APPLICATION: A CASE STUDY AMONG USM UNDERGRADUATES
    Jap Show Fong, Lok Li Ching, Khor Choon Chiat, Nurul Hashimah Ahamed Hassain Malim, Mohd Heikal Husin and Manmeet Mahinderjit Singh
366
  • THE SOFTWARE REQUIREMENTS FRAMEWORK FOR DOCUMENT CHANGES USING REVERSE ENGINERING APPROACH
    Hannani Aman and Rosziati Ibrahim
374

CHAPTER 8

 
  • DCT DOMAIN STEGASVM-SHIFTED LSB MODEL FOR HIGHLY IMPERCEPTIBLE AND ROBUST COVER-IMAGE
    Saadiah Yahya, Hanizan Shaker Hussain and Fakariah Hani M. Ali
381
  • EXPLORING THE ROLE OF SOCIAL MEDIA CREDENTIALS IN MOBILE LEARNING: THE ENGAGEMENT PERSPECTIVE
    Norliza Katuk, Kang Hean Yong and Nur Haryani Zakaria
388
  • SMART METER: APPLICATIONS, SECURITY ISSUES AND CHALLENGES
    Imen Aouini and Lamia Ben Azzouz
395
  • ENHANCED RISK ASSESSMENT EQUATION FOR IPV6 DEPLOYMENT
    Athirah Rosli, Abidah Mat Taib, Hanif Baharin, Wan Nor Ashiqin Wan Ali and Ros Syamsul Hamid
403
  • UTILIZING PERSUASION APPROACH TO IMPROVE COMPLIANCE BEHAVIOUR WITH PASSWORD GUIDELINES
    Nur Haryani Zakaria
410
  • CONTEXT-AWARE ANALYSIS FOR ADAPTIVE UNIFIED AUTHENTICATION PLATFORM
    Khairul Azmi Abu Bakar and Galoh Rashidah Haron
417
  • A PARALLEL PREVENTION ALGORITHM FOR BLACK HOLE ATTACKS IN MANET
    Abdul Razak Yaakub and Khalil I. Ghathwan
423
  • RSA AUTHENTICATION MECHANISMS IN CONTROL GRID COMPUTING ENVIRONMENT USING GRIDSIM TOOLKIT
    Saiful Adli Ismail, Md Asri Ngadi, Johan Mohd Sharif, Mohd Nazri Kama and Haslina Sarkan
432
  • STEPPING-STONE DETECTION TECHNIQUE FOR RECOGNIZING LEGITIMATE AND ATTACK CONNECTIONS
    Ali Yusny Daud, Osman Ghazali and Mohd Nizam Omar
440
  • MOBILE QURAN APP SECURITY VULNERABILITIES
    Shuhaili Talib, Murni Mahmud, Emilia Sarah Abd Rahman, Anis Suraya Songib, and Adamu Abubakar
447
  • INFORMATION SECURITY CULTURE: A SYSTEMATIC LITERATURE REVIEW
    Noor Hafizah Hassan, Zuraini Ismail and Nurazean Maarop
456
  • HYBRID MACHINE LEARNING TECHNIQUE FOR INTRUSION DETECTION SYSTEM
    Hatim Mohamad Tahir, Wael Hasan, Abas Md Said, Nur Haryani Zakaria, Norliza Katuk, Nur Farzana Kabir, Mohd Hasbullah Omar, Osman Ghazali and Noor Izzah Yahya
464
  • JPEG2000 COMPATIBLE NEURAL NETWORK BASED CIPHER
    Qurban A Memon
473

CHAPTER 9

 
  • WABS: A WEB ACCESSIBILITY BARRIER SEVERITY METRIC
    Hayfa.Y.Abuaddous, Mohd Zalisham Jali and Nurlida Basir
481
  • ADAPTIVE WEB SERVICE SELECTION BASED ON DATA TYPE MATCHING FOR DYNAMIC WEB SERVICE COMPOSITION
    AR Kanesaraj Ramasamy, Fang-Fang Chua, Su-Cheng Haw and Chin- Kuan Ho
488
  • ASSESSING MALAYSIAN CROWDSOURCING PLATFORMS USING WEB OF SYSTEM PERFORMANCE (WOSP) MODEL
    Adib Habbal, Suwannit Chareen Chit, Rahayu Ahmad and Musyrifah Mahmod
495
  • A SURVEY OF EXPLORATORY SEARCH SYSTEMS BASED ON LOD RESOURCES
    Karwan Jacksi, Nazife Dimililer and Subhi R. M. Zeebaree
501
  • WEB-BASED REWARD AND REDEMPTION SYSTEM FOR SMART RECYCLE SYSTEM
    Mohd Helmy Abd Wahab, Aeslina Abdul Kadir, Mohd Razali Md Tomari and Mohamad Hairol Jabbar
510

CHAPTER 10

 
  • FORMULATION OF A KNOWLEDGE TRANSFER FRAMEWORK FOR UNIVERSITY STUDENT ORGANIZATIONS
    Sulfeeza Mohd Drus and Mohd Shahimi Mohd Yusoff
519
  • KNOWLEDGE MANAGEMENT ADOPTION: A CASE STUDY OF MALAYSIAN ELECTRICITY SUPPLY INDUSTRY
    Sulfeeza Mohd Drus, Siti Salbiah Mohamed Shariff and Marini Othman
524
  • CONTRIBUTING FACTOR TO BUSINESS CONTINUITY MANAGEMENT (BCM) FAILURE– A CASE OF MALAYSIA PUBLIC SECTOR
    Nurul Aisyah Sim Abdullah, Nor Laila Md Noor and Emma Nuraihan Mior Ibrahim
530
  • INTEGRATED PROJECT DELIVERY FRAMEWORK FOR SUSTAINABLE CAMPUS DEVELOPMENT: A QUALITATIVE STUDY ON JPP UUM
    Faizatul Akmar Abdul Nifa, Mohd Nasrun Mohd Nawi, Suria Musa and Wan Nadzri Osman.
539
  • MEASURING THE EFFECTIVENESS OF UNDERGRADUATE PROGRAMS BY A NONPARAMETRIC METHOD
    Maznah Mat Kasim, Rosmaini Kashim, Rahela Abdul Rahim and Siti Safura Hassan
545
  • A TEST MODEL FOR TELECENTRE VALUE CREATION
    Zulkhairi Md Dahalin, Nor Iadah Yusop, Huda Ibrahim, Zahurin Mat Aji, Nafishah Othman, Rosmadi Bakar, Yussalita Md Yussop and Mohd Khairudin Kasiran
551

CHAPTER 11

 
  • ANALYSIS OF USAGE OF INFORMATION SYSTEMS AND TECHNOLOGY: CLOUD COMPUTING
    Anass Bayaga
558
  • CLOUD COMPUTING: USE AND IMPACT OF TECHNOLOGY
    Haslinda Hassan and Noor Azizi Ismail
564
  • DESIGN OF A MULTICAST ROUTER FOR NETWORK-ON-CHIP ARCHITECTURES WITH IRREGULAR TOPOLOGIES
    Hsi-Che Tseng, Zhi-Hong Ye, and Hsin-Chou Chi
570
  • UNEQUAL ERROR PROTECTION OF H.264/AVC VIDEO TRANSMITTED OVER WIRELESS NETWORK
    Boudjadja Rima, Azni Mohamed and Zennir M.Nadjib
576
  • CAPACITY ENRICHMENT OCDMA BASED ON ALGORITHM OF NOVEL FLEXIBLE CROSS CORRELATION (FCC) ADDRESS CODE
    Rashidi, C. B. M., Aljunid, S. A., Anuar, M. S., and Rahman, A. K.
583

CHAPTER 12

 
  • INFORMATION SEEKING BEHAVIOUR AND INTERNATIONAL STUDENTS: THE ROLE OF SOCIAL MEDIA IN ADDRESSING CHALLENGES WHILE ABROAD
    Suraya Hamid and Sarah Bukhari
590
  • DOING PROBES DIARY WITH CHILDREN IN REPORTING SOCIAL NETWORKING BEHAVIOUR
    Noor Hidayah Azmi and Fariza Hanis Abdul Razak
597
  • KNOWLEDGE SHARING PROCESS FOR PAIR PROGRAMMING PRACTICE AMONG UNIVERSITY STUDENTS
    Syamsul Bahrin Zaibon, Mazida Ahmad, Mazni Omar and Azida Zainol
604
  • A PROBLEM BASED LEARNING MODEL FOR IT COURSES
    Norida Muhd Darus, Haslina Mohd, Nurnasran Puteh, Zaharin Marzuki @ Matt, Fauziah Baharom, Mohamed Ali Saip, Mohd Zabidin Husain, Azman Yasin
611
  • CURRENT PRACTICES OF VIRTUAL COMMUNITY AND THEIR INFLUENCE ON SOCIAL COHESION
    Zulkhairi Md Dahalin, Nor Iadah Yusop, Zahurin Mat Aji, Huda Hj Ibrahim and Mohd Khairudin Kasiran
618
  • CIVILIANS HEROES: A SOCIAL NETWORK ANALYSIS OF INFORMATION STRUCTURE ON SOCIAL MEDIA DURING DISASTER
    Rahayu binti Ahmad, and Abdus-samad Temitope Olanrewaju
625

CHAPTER 13

 
  • A SENTIMENT-BASED FILTERATION AND DATA ANALYSIS FRAMEWORK FOR SOCIAL MEDIA
    Norjihan Abd Ghani and Siti Syahidah Mohamad Kamal
632
  • FUZZY AND SMOTE RESAMPLING TECHNIQUE FOR IMBALANCED DATA SETS
    Maisarah Zorkeflee, Aniza Mohamed Din and Ku Ruhana Ku-Mahamud
638
  • EXPONENTIAL SMOOTHING TECHNIQUES ON TIME SERIES RIVER WATER LEVEL DATA
    Noor Shahifah Muhamad and Aniza Mohamed Din
644

CHAPTER 14

 
  • DIETARY ASSESSMENT AND OBESITY AVOIDANCE SYSTEM BASED ON VISION: A REVIEW
    Salwa Khalid Abdulateef, Massudi Mahmuddin, Nor Hazlyna Harun and Yazan Aljeroudi
651
  • USING SENTIMENT ANALYSIS TECHNIQUE FOR ANALYZING THAI CUSTOMER SATISFACTION FROM SOCIAL MEDIA
    Todsanai Chumwatana
659
  • STRUCTURAL COMPONENTS OF STUDENTS’ DATA-FOCUSED INFORMATION VISUALIZATION
    Semiu A. Akanmu and Zulikha Jamaludin
665
  • SINGLE DECISION TREE CLASSIFIERS’ ACCURACY ON MEDICAL DATA.
    Md. Rajib Hasan, Nur Azzah Abu Bakar, Fadzilah Siraj, Mohd Shamrie Sainin and Shariful Hasan
671
  • RULE BASED REASONING AND CASE BASED REASONING TECHNIQUES FOR JUVENILE DELINQUENCY LEGAL REASONING MODEL
    Sharifah Lailee Syed-Abdullah, Hidayah Daniyal, Rusnadewi A.Rashid, Sarina M Noor, and Noorzila Sharif
677
  • APPLICATION OF GIS ON THE DETERMINATION ANALYSIS OF SUSTAINABLE FOOD AGRICULTURAL LAND IN SERANG REGENCY
    Rifiati Safariah and Denny Kurniadie
684
  • FORECASTING MODEL FOR THE CHANGE OF RESERVOIR WATER LEVEL STAGE BASED ON TEMPORAL PATTERN OF RESERVOIR WATER LEVEL
    Nur Athirah Ashaary, Wan Hussain Wan Ishak, and Ku Ruhana Ku Mahamud
692
  • INTELLIGENT SUPPORT MODEL FOR FLOOD VICTIMS
    Noraziah ChePa, Azizi Ab Aziz, Vera Aulia, Juliana Aida Abu Bakar, Asmidah Alwi and Ahmad Hanis Mohd Shabli
698
  • ACADEMIC LEADERSHIP BIO-INSPIRED CLASSIFICATION MODEL USING NEGATIVE SELECTION ALGORITHM
    Hamidah Jantan, Siti ‘Aisyah Sa’dan, and Nur Hamizah Syafiqah Che Azemi
706
  • FORECASTING LINEAR TIME SERIES MODELS WITH HETEROSKEDASTIC ERRORS IN A BAYESIAN APPROACH
    Esmail Amiri
713

CHAPTER 15

 
  • A SYSTEMATIC REVIEW OF ENTERPRISE ARCHITECTURE ESTABLISHMENT PROCESS
    Nur Azaliah A.Bakar, Nazri Kama and Harihodin S
720
  • USE OF INFOSTRUCTURE FOR DISASTER: TOWARDS DEFINITION OF INFOSTRUCTURE
    Aliza Abdul Latif, Noor Habibah Arshad and Norjansalika Janom
728
  • PROPOSING A MODEL ON RISK MITIGATION IN IT GOVERNANCE
    Noraini Che Pa, Bokolo A. J., Rozi Nor Haizan Nor and Yusmadi Yah Jusoh
737
  • ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS
    Siti Rahayu Abdul Aziz,Mohamad Ibrahim and Suhaimi Sauti
743

CHAPTER 16

 
  • ENSEMBLE CLASSIFIER AND RESAMPLING FOR IMBALANCED MULTICLASS LEARNING
    Mohd Shamrie Sainin, Faudziah Ahmad and Rayner Alfred
751
  • OCTASOM- AN OCTAGONAL BASED SOM LATTICE STRUCTURE FOR BIOMEDICAL PROBLEMS
    Shafaatunnur Hasan and Siti Mariyam Shamsuddin
757
  • ADVERTISING THEORIES IN IMPULSE PURCHASE ELEMENTS FOR ITV ADVERTISEMENT
    Azizah Che Omar, Siti Mahfuzah Sarif, and Norshuhada Shiratuddin
763
  • PREDICTING INSTANT MESSENGER APPLICATION ADOPTION USING A UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY 2
    Indrawati and Gusti Ayu Made Mas Marhaeni
772
  • EVALUATION OF SOFTWARE QUALITY ATTRIBUTES FOR VESSEL TRACKING MANAGEMENT SYSTEM (VTMS)
    Hazura Zulzalil, Hazliana Talha and Khaironi Yatim Sharif
779

KEYWORD INDEX

785


AUTHOR INDEX

788


PAPER SIMILARITY INDEX

792

 

    ICOCI2015 URL: http://icoci.uum.edu.my

   

ICOCI 2015, International Conference on Computing and Informatics, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah Darul Aman, Malaysia