default search action
CITA 2013: Kota Samarahan, Malaysia
- 8th International Conference on Information Technology in Asia, CITA 2013, Kota Samarahan, Malaysia, July 1-4, 2013. IEEE 2013
- Shahrinaz Ismail, Siti Farah Mohammad Suhaimi, Mohd Sharifuddin Ahmad:
The GUSC model in smart notification system: The quantitative analysis and conceptual model. 1-8 - Arshad Javed, Wang Yin Chai, Narayanan Kaluthramaiyer:
Segmentation of brain MR images with directional weighted optimized fuzzy C-means clustering. 1-7 - Sharifa Alghowinem, Michael Wagner, Roland Goecke:
AusTalk - The Australian speech database: Design framework, recording experience and localisation. 1-7 - Sharmin Nahar Sharwardy, Mohammad Zahidur Rahman, Sharmin Parveen, Hasan Sarwar, Asm Mobarak Hossain:
A cost-effective web-based teleconsultation system. 1-4 - Bali Ranaivo-Malançon, Terrin Lim, Jacey-Lynn Minoi, Amelia Jati Robert Jupit:
Automatic generation of fill-in clues and answers from raw texts for crosswords. 1-5 - Mus Chairil Samani, Poline Bala, Jamilah Maliki, Roger W. Harris:
Bario Community Radio: Engaging people making news. 1-6 - Kuruvilla Mathew, Biju Issac, Tan Chong Eng:
Ambient noise analysis on sound for use in wireless digital transmission. 1-4 - Elizabeth Papadopoulou, Nick K. Taylor, M. Howard Williams, Sarah Gallacher:
Learning user preferences in a system combining pervasive behaviour and social networking. 1-7 - Hannani Aman, Rosziati Ibrahim:
Reverse Engineering: From Xml to Uml for generation of software requirement specification. 1-6 - Irwan Shahbudin, Azizah Jaafar:
Rhetorical video argument analysis. 1-4 - Mira Kartiwi, Ali Rfieda, Teddy Surya Gunawan:
A conceptual framework for assessing electronic banking continued use. 1-7 - Mohd. Norasri Ismail, Rosziati Ibrahim, Mohd Farhan Md Fudzee:
Classifying content adaptation systems based on energy-aware requirements. 1-8 - David Vandyke, Michael Wagner, Roland Goecke:
Voice source waveforms for utterance level speaker identification using support vector machines. 1-7 - Laura Fernández Gallardo, Michael Wagner, Sebastian Möller:
Transmission channel effects on human speaker identification in multiparty conference calls. 1-6 - Muhammad Javed, Kartinah bt Hj Zen, Halikul Lenando, Hushairi Zen:
Fast association process (FAP) of beacon enabled for IEEE 802.15.4 in strong mobility. 1-8 - Onabajo Olawale Olusegun, Chong Eng Tan:
TCP throughput efficiency enhancement in IEEE 802.11n network. 1-5 - Muhammad Javed, Kartinah bt Hj Zen, Halikul Bin Lenando, Hushairi Zen:
Performance evaluation of beacon enabled IEEE 802.15.4 MAC for Mobile Wireless Sensor Networks under NS-2. 1-7 - Anifowose Fatai, Jane Labadin, Abdulazeez Abdulraheem:
Ensemble model of Artificial Neural Networks with randomized number of hidden neurons. 1-5 - Heike Winschiers-Theophilus, Kasper Rodil, Tariq Zaman, Alvin W. Yeo, Kasper Løvborg Jensen:
Mobile technologies for preservation of indigenous knowledge in rural communities. 1-4 - Nurulhuda Firdaus Mohd Azmi, Jon Timmis, Fiona Polack:
Scenario-based modeling to capture requirements for immune inspired profile adaptation. 1-6 - Pui Suk Ting, Jacey-Lynn Minoi:
Towards automatic landmarking on 2.5D face range images. 1-6 - Cynthia Kon, Jane Labadin:
Reaction-diffusion generic model for mosquito-borne diseases. 1-4 - Tay Sze Hui, Shapiee Abd Rahman, Jane Labadin:
Comparison between multiple regression and multivariate adaptive regression splines for predicting CO2 emissions in ASEAN countries. 1-5 - Eviyanti Saari, Aman Jantan:
E-Cyborg: The cybercrime evidence finder. 1-6 - Shahrinaz Ismail, Mohd Sharifuddin Ahmad, Zainuddin Hassan:
Regression analysis on agent roles in personal knowledge management processes: Significance of a connect agent in mediating human's personal knowledge management. 1-8 - Phang Piau, Ang Kean Siang, Jane Labadin:
An epidemic aggregate and individual-based model in a patchy environment. 1-5 - Joao Fradinho Oliveira:
The path force feedback belt. 1-6 - Daeng Ahmad Zuhri Zuhud:
From programming sequential machines to parallel smart mobile devices: Bringing back the imperative paradigm to today's perspective. 1-7 - Mohd Shahdi Ahmad, Nur Emyra Musa, Rathidevi Nadarajah, Rosilah Hassan, Nor Effendy Othman:
Comparison between android and iOS Operating System in terms of security. 1-4 - Laili Farhana Md Ibharim, Norhayati Borhan, Maizatul H. M. Yatim:
A field study of understanding child's knowledge, skills and interaction towards capacitive touch technology (iPad). 1-5 - Samuel Agianpuye, Jacey-Lynn Minoi:
3D Facial expression synthesis: A survey. 1-7 - Shakeel Ahmed Kamboh, Jane Labadin, Andrew Ragai Henry Rigit, Ling Teck Chaw:
Parallel computation of electric potential in the EHD ion-drag micropump and the performance analysis of the parallel system. 1-5 - Setia Budi, Vishv Malhotra:
Multi-objective optimization model in mobile data communication scheduling. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.