


default search action
9. CITA 2015: Sarawak, Kuching, Malaysia
- 9th International Conference on IT in Asia, CITA 2015, Sarawak, Kuching, Malaysia, August 4-5, 2015. IEEE 2015, ISBN 978-1-4799-9939-2
- Ku Ruhana Ku-Mahamud
:
Hybrid ant colony system and flower pollination algorithms for global optimization. 1-9 - Simon Boung-Yew Lau
:
Building use Cases With Activity Reference Framework for Big Data Analytics. 1-7 - Lew May Form, Kang-Leng Chiew
, San-Nah Sze
, Wei King Tiong
:
Phishing email detection technique by using hybrid features. 1-5 - Patrick Ozoh, Shapiee Abd Rahman, Jane Labadin
:
Predicting electricity consumption: A comparative analysis of the accuracy of various computational techniques. 1-7 - Toqir Ahmad Rana
, Yu-N Cheah
:
Hybrid rule-based approach for aspect extraction and categorization from customer reviews. 1-5 - Teoh Shian Li, Jane Labadin
, Phang Piau, Shapiee Abd Rahman, Ling Yeong Tyng:
The effect of vaccination decision in disease modelling through simulation. 1-6 - Cynthia Mui Lian Kon
, Jane Labadin
:
Impact of human diffusion and spatial heterogeneity on transmission dynamics of mosquito-borne diseases. 1-6 - Edwin Mit, Cheah Wai Shiang:
Formalize the software quality measurement for heterogeneous requirements. 1-4 - Kuruvilla Mathew, Biju Issac
, Tan Chong Eng
:
Performance analysis of RTS/CTS protocol over Basic Access in wireless networks. 1-6 - Mujahid Tabassum
, Kartinah bt Hj Zen:
Performance evaluation of ZigBee in indoor and outdoor environment. 1-7 - Muhammad Aliyu Sulaiman, Jane Labadin
:
Feature selection with mutual information for regression problems. 1-6 - Muhammad Aliyu Sulaiman, Jane Labadin
:
Feature selection based on mutual information. 1-6 - Wan-Tze Vong, Patrick Hang Hui Then:
Information seeking features of a PICO-based medical question-answering system. 1-7 - Shakeel Ahmed Kamboh, Izzatul Nabila bt Sarbini
, Jane Labadin
:
Simulation of 2D surface flow in open channel using explicit finite difference method. 1-5 - Pui Kwan Fong, Nung Kion Lee
:
Improved H3K27ac histone mark prediction using k-mer proximity feature. 1-6 - Soh Brendard, Mujahid Tabassum
, HongSiang Chua:
Wireless Body Area Networks channel decongestion algorithm. 1-6 - Bong Chia Lih, San-Nah Sze
, Noor Alamshah Bolhassan:
A study on heuristic timetabling method for faculty course timetable problem. 1-3 - Liauw Hephi, Soo-See Chai:
Comparison of Data Driven Models (DDM) for soil moisture retrieval using microwave remote sensing data. 1-5 - Mohamad Nazim Jambli, W. B. Wan Mohd Shuhaimi, Halikul Lenando
, Johari Abdullah, Sinarwati Mohamad Suhaili:
Enhancement of AODV routing protocol in MASNETs. 1-6 - Mohamad Nazim Jambli, A. Hendrick, A. A. Julaihi, Johari Abdullah, Sinarwati Mohamad Suhaili:
Evaluation of clustering and multi-hop routing protocols in Mobile Ad-hoc Sensor Networks. 1-5 - Irwandi Hipni Mohamad Hipiny
, Hamimah Ujir
:
Measuring task performance using gaze regions. 1-8 - Phei-Chin Lim, Narayanan Kulathuramaiyer, D. N. F. Awang Iskandar
, Kang-Leng Chiew
:
EFA for structure detection in image data. 1-5 - Halikul Lenando
, Abdallah Hassan Gharin, Mohamad Nazim Jambli, Johari Abdullah, Adnan Shahid Khan
:
Neighbor selection protocol for heterogeneous information dissemination in Opportunistic Networks. 1-7 - Abduaziz Jama Oumer, Jack Kie Cheng, Razman Mat Tahar:
Green manufacturing and logistics in automotive industry: A simulation model. 1-6 - A. H. Fauzi, D. N. F. Awang Iskandar
, M. Alif A. Suhaimi:
Automated machine for sorting Sarawak pepper berries. 1-4 - D. N. F. Awang Iskandar
, Hamimah Ujir
:
Spatio-temporal semantic representation of Cardiac MRI in heart attack patients. 1-5 - Nayeem Khan
, Johari Abdullah, Adnan Shahid Khan
:
Towards vulnerability prevention model for web browser using interceptor approach. 1-5 - Anvar Narzullaev
, Azamjon Nemadaliev, Mohd Hasan Selamat, Mohamed Othman, Khaironi Yatim Sharif
:
Wi-fi fingerprint database construction using Chebyshev wavelet functions. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.