default search action
8th ICSECS 2023: Penang, Malaysia
- 8th IEEE International Conference On Software Engineering and Computer Systems, ICSECS 2023, Penang, Malaysia, August 25-27, 2023. IEEE 2023, ISBN 979-8-3503-1093-1
- Jasmin Z. K. Chu, Joel C. M. Than, Pun Liang Thon, Hudyjaya Siswoyo Jo:
Investigation on Insurance Purchase Classification for Insurance Recommendation Using Deep Learning and Class Propagation. 1-6 - Chang Hoong Jack, See Kwee Teck, Lim Tong Ming, Ding Ying Hong:
An Overview Analysis of Authentication Mechanism in Microservices-Based Software Architecture: A Discussion Paper. 1-6 - You Wu, Muataz Salam Al Daweri, Burra Venkata Durga Kumar:
Emotional Analysis Based On LSTM-CNN Hybrid Neural Network Model. 1-6 - Syafie Nizam, Mohd Adli Md Ali, Mohd Radhwan Abidin:
AI-Generated CT Scan Image for Improving Colorectal Cancer Classification. 1-6 - Venkata Venugopal Rao Gudlur:
Fintech Future Business & Cyber Vulnerabilities and Challenges. 1-4 - Farah Aini Amin Nordin:
Project Cost's Early Warning Analysis via Microsoft Power BI (Business Intelligence). 1-6 - Tanvir Ahmad, Nor Syahidatul Nadiah Binti Ismail, Md. Arafatur Rahman, Quadri Waseem, Abdullah Mat Safri:
Hop Restricted-AODV (HR-AODV) Routing and Its Applicability on Different Wireless Channels for Vehicular Network. 1-6 - Paul Law Lik Pao, Mohd Arfian Ismail:
Loan Eligibility Classification Using Logistic Regression. 1-4 - Muhamad Idaham Umar Ong, Mohamed Ariff Ameeden:
A Meta-Requirement Approach to Validate User Requirement Specification: Threshold Definition. 5-10 - Xue Yi Lee, Yu-Beng Leau:
PErformance Evaluation of Detection Mechanisms Towards the Slow Ddos Attack of Edge Computing. 11-16 - Shi Ru Lim, Nur Shazwani Kamarudin, Nur Hafieza Ismail, Nik Ahmad Hisham Ismail, Nor Ashikin Mohamad Kamal:
Predicting Mental Health Disorder on Twitter Using Machine Learning Techniques. 23-27 - Kelvin Liew Kai Xuan, Mohaiminul Islam Bhuiyan, Nur Shazwani Kamarudin, Ahmad Fakhri Ab. Nasir, Muhammad Zulfahmi Toh Abdullah:
COVID-19 Fake News Detection Model on Social Media Data Using Machine Learning Techniques. 28-34 - Nur Atiqah Mustapa, Azlyna Senawi, Chuan Zun Liang:
Feature Selection Using Law of Total Variance with Fast Correlation-Based Filter. 35-40 - I Made Suwija Putra, Daniel Siahaan, Ahmad Saikhu:
Recognition Textual Entailment on Bahasa Using Biplet Individual Comparison and BiLSTM. 41-46 - Mohammad Haris, Fang-Fang Chua, Amy Hui-Lan Lim:
An Ensemble-Based Framework to Estimate Software Project Effort. 47-52 - Safa'a Bataieneh, Samer Hanna:
Real-Time Data Visualization and Analysis Using ASP.NET Core's Tag Helpers in Business Intelligence Applications. 53-57 - Mochamad Alfan Rosid, Daniel Siahaan, Ahmad Saikhu:
Improving Sarcasm Detection in Mash-Up Language Through Hybrid Pretrained Word Embedding. 58-63 - Loh Zheung Yik, Wan Mohd Nasir Wan-Kadir, Noraini binti Ibrahim:
A Systematic Literature Review on Solutions of Mutation Testing Problems. 64-71 - Yunianita Rahmawati, Daniel Siahaan, Diana Purwitasari:
Text Segmentation Methods for Annotation on eHealth Consultation with Interview Function Labels: A Comparative Study. 72-77 - Aftab Alam Janisar, Khairul Shafee Kalid, Aliza bt Sarlan, Abdul Rehman Gilal:
Security Requirements Assurance: An Assurance Case Perspective. 78-83 - Najihah Binti Nasir, Jiyong Moon, Seong Baeg Kim:
Metaverse in Education: Insights from South Korea and Potentials for Malaysia. 84-88 - Chi Log Chua, Tong Ming Lim, Kwee Teck See:
An Overview of Part-of-Speech Tagging Methods and Datasets for Malay Language. 89-95 - Misbachul Falach Asy'ari, Chastine Fatichah, Nanik Suciati:
Parking Space Detection in Different Weather Conditions Based on YOLOv5 Method. 96-100 - Yusuf Gladiensyah Bihanda, Chastine Fatichah, Anny Yuniarti:
Comparative Analysis of ConvNext and Mobilenet on Traffic Vehicle Detection. 101-105 - JunSeong Moon, RaeEun Yang, SoMin Cha, Seong Baeg Kim:
chatGPT vs Mentor : Programming Language Learning Assistance System for Beginners. 106-110 - Humaira Noor, Niful Islam, Md. Saddam Hossain Mukta, Nur Shazwani Binti Kamarudin, Mohaimenul Azam Khan Raiaan, Sami Azam:
Determining the Optimal Number of GAT and GCN Layers for Node Classification in Graph Neural Networks. 111-116 - Tanvir Ahmad, Nor Syahidatul Nadiah Binti Ismail, Abdullah Mat Safri, Md. Arafatur Rahman, Mohammad Sojon Beg, M. Taher Bin Bakhtiar:
SDN Enabled Big Data Analytics and Framework for Sensor Data of Vehicle Health, Safety and Monitoring System. 117-121 - Trirat Arromrit, Korrapin Srisakaew, Napatsakorn Roswhan, Wiriya Mahikul:
A Supervised Machine Learning Method for Predicting the Employees Turnover Decisions. 122-127 - Ding Ying Hong, See Kwee Teck, Lim Tong Ming, Chang Hoong Jack:
Customizing of ERP In Microservice SaaS Architecture: An Overview of Intrusive & Non-Intrusive Approach. 134-138 - Suraya Alias, Mazliah Majalin, Nur Hayatin:
A Visualized Hybrid Keyword-Cluster Approach for Extractive Text Summarizer Tool for STEM Education in Malaysia. 139-144 - Rattakorn Poonsuph:
Design and Implementation of a LCDP with Enhanced Functionality. 145-151 - Harvindran Chandrasekaran, Tan Yu Xuan, Tang Kok Mang:
High Performance Business Intelligence Dashboard. 158-163 - Brian Rizqi Paradisiaca Darnoto, Daniel Siahaan, Diana Purwitasari:
A Comprehensive Ensemble Deep Learning Method for Identifying Native Advertising in News Articles. 164-169 - Saydul Akbar Murad, Zafril Rizal M. Azmi, Faria Jerin Brishti, Md Saib, Anupam Kumar Bairagi:
Priority Based Fair Scheduling: Enhancing Efficiency in Cloud Job Distribution. 170-175 - Dharshika Singarathnam, Swathi Ganesan, Sangita Pokhrel, Nalinda Prasad Somasiri:
Exploring Cryptographic Techniques for Data security in Resource-Constrained Wireless Sensor Networks:Performance Evaluation and Considerations. 176-180 - Qinyan Gong, Hadyan Hafizh, Muhammad Ateeq, Anwar P. P. Abdul Majeed, Matilda Isaac, Bintao Hu:
Machine Learning Regression Models for Real-Time Touchless Interaction Applications. 181-186 - Frank Ebbers:
Effects of the GDPR in Southeast Asia vs. Europe - A Large-Scale Analysis of IoT Devices. 187-194 - Azamuddin Abdul Rahman:
RSSI-Guided Cluster Head Selection for Optimal Optimization in IoT-Enabled WSNs. 195-199 - Aisyah Ibrahim, Tuty Asmawaty Abdul Kadir, Roderick H. MacDonald, Hamdan Daniyal:
Hand Calibration with Limited Data As The Initial Step Towards System Dynamics Model Validation For COVID-19 Case In Malaysia. 200-204 - Muhamad Wafi Bin Abdul Aziz, Muhammad Faiz Bin Ramli:
Monocular Camera Free Region Detection Method of Obstacle Avoidance Using Pixel Volume Expansion for Micro - Sized UAV. 205-210 - Yanche Ari Kustiawan, Tek Yong Lim:
User Stories in Requirements Elicitation: A Systematic Literature Review. 211-216 - Che Akmal Che Yahaya, Ahmad Firdaus, Azlee Zabidi, Noor Akma Bt Abu Bakar, Mukrimah Bt Nawir, Philimal Normelissa Ani Abdul Malek:
Cloud of Word vs DroidKungfu: Performance Evaluation in Detecting Root Exploit Malware with Deep Learning Approach. 217-222 - Syamsul Azrin Bin Kamaruddin, Hairulazwan Bin Hashim, Elmy Johana Binti Mohamad, Nazwa Hidayah Binti Mohamad, Halim Bin Mamat:
Effective Visualization Electrification System via PSCADA Event Log in Railway Industry. 223-228 - Syahrul Nizam Junaini, Sopian Bujang, Nadri Aetis Basmawi, Jusmawati Fauzaman:
Shaping the Digital Future of Civil Service: An Assessment of Digital Transformation and Data Science Competencies. 229-234 - Nurul Amira Binti Mohd Zin, Mohd Faizal Ab Razak, Ahmad Firdaus, Ferda Ernawan, Nor Saradatul Akmar Zulkifli:
Machine Learning Technique for Phishing Website Detection. 235-239 - Nur Afiqah Mohd Azman, M. Izham Mohd Jaya, Azlee Zabidi:
Real-time Fault Diagnostic in Rotating Shaft using IoT-based Architecture and Fuzzy Logic Analysis. 240-245 - Mohammad Faris Bin Mahdhir, Nor Saradatul Akmar Binti Zulkifli, Mohd Zamri Bin Osman, Azlee Bin Zabidi, Mohd Izham Bin Mohd Jaya:
SAISMS: Transforming Ammunition Management Through loT-Enabled Inventory and Safety Monitoring System. 246-251 - Quadri Waseem, Wan Isni Sofiah Wan Din, Azamuddin Abdul Rahman, Kashif Nisar:
Exploring Machine Learning in IoT Smart Home Automation. 252-257 - Muhammad Arif Mohamad, Zalili Binti Musa, Amelia Ritahani Ismail:
Crow Search Freeman Chain Code (CS-FCC) Feature Extraction Algorithm for Handwritten Character Recognition. 258-262 - Sharvinteraan C. Mogan, Zuriani Mustaffa, Mohd Herwan Sulaiman, Ferda Ernawan:
Product Recommendation using Deep Learning in Computer Vision. 263-267 - Nur Izzaty Ariffin, Muhd. Aidil Syazwan Hamdan, Syafiq Fauzi Kamarulzaman:
Internet of Things Intercommunication Using SocketIO and WebSocket with WebRTC in Local Area Network as Emergency Communication Devices. 268-273 - Andrew Lim Wei Chin, Lim Gim Wen, Syafiq Fauzi Kamarulzaman:
Intelligent Humanoid Emotion Response Based on Human Emotion Recognition for Virtual Intercommunication Simulator. 274-279 - Nurul Syafiqah Zaidi, Al-Fahim Mubarak-Ali, Abdul Sahli Fakhrudin, Rahiwan Nazar Romli:
Determining the Best Weightage Feature in Parameterization Process of GCCD Model for Clone Detection in C-Based Applications. 280-285 - Mohamed Nur Ayuni, Mok Fock Lin, Loong Qing Zhe:
Deep Learning-Based Classification Approach for Wire Bonding Defects Inspection. 286-290 - Azrie Bin Salleh, Danakorn Nincarean Eh Phon, Nur Shamsiah Abdul Rahman, Suhaizal Bin Hashim, Noor Hidayah Che Lah:
Examining the Correlations Between Teacher Profiling, ICT Skills, and the Readiness of Integrating Augmented Reality in Education. 303-308 - Azlee Zabidi, Mohd. Izham Jaya, Hasliza Abu Hassan, Ihsan Mohd Yassin:
Enhancing Chiller Plant Modelling Performance Through NARX-Based Feature Optimization. 309-313 - Siti NurSyafiqah Binti Rusli, Rohani Binti Abu Bakar, Siti Suhaila Abdul Hamid:
An Improvement of Interactive Priorization Technique for Requirements Interdependency in Prioritization Process. 320-325 - Siti Normaziah Binti Ihsan, Tuty Asmawaty Abdul Kadir, Nurul Ishafira Ismail, Kerk Zhi Yuan, Yeow Song Jie:
Implementation of Serious Games for Data Privacy and Protection Awareness in Cybersecurity. 330-335 - Hanizan Shaker Hussain, Fazali Ghazali, Hafiza A. S., Hanif Mohd Ali, Anbuselvan Sangodiah, Kante Koli Oumar:
A New SVM-STEG Embedding Model in Steganography. 336-341 - Nur Shamsiah Abdul Rahman, Noor Azida Sahabudin, Danakorn Nincarean Eh Phon, Mohd Faizal Ab Razak, Anis Farihan Mat Raffei:
Factors Affecting Cyberbullying Behaviours Among University Students: A Review. 342-346 - Azim Zaliha Abd Aziz, Nurul Nadzirah Adnan, Nur Farraliza Mansor, Wan Suryani Wan Awang, Ida Nurhaida, Safitri Jaya:
SODIBOT: A TWO in ONE Real-Time Human Monitoring System using YOLO algorithms. 347-352 - Muhammad Shukri Che Lah, Nureize Arbaiy, Pei-Chun Lin:
ARIMA-LP: A Hybrid Model for Air Pollution Forecasting with Uncertainty Data. 353-356 - Nur Izzati Nor Azaimi, Nor Bakiah Abd Warif, Nor Syahidatul Nadiah Binti Ismail:
A Comparative Analysis on Three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection Method. 357-362 - Hong Chang:
Analysis of Sentiment Towards Artificial Intelligent Industry Using Hybrid Natural Language Processing Technique. 363-370 - Putra Roskhairul Fitri Bin Kaha, Syarifah Bahiyah Rahayu, Andrianto Arfan Wardhana, Moon-Gul Lee, Ahmad Lutfi Ahmad Lokman, Norsyahida Noor Azmi:
Designing an E-Voting Framework Using Blockchain: A Secure and Transparent Attendance Approach. 371-376 - Ding Daorui, Hong Chang, Burra Venkata Durga Kumar:
Optimized Energy Distribution in Smart Grid System Using Hybrid Machine Learning Techniques. 377-381 - Raed Abdullah Abobakr Busaeed, Wan Isni Sofiah Wan Din, Quadri Waseem, Azlee Bin Zabidi:
Taxonomy of SQL Injection: ML Trends & Open Challenges. 382-387 - Imran Edzereiq Kamarudin, Mohamed Ariff Ameedeen, Muhamad Idaham Umar Ong, Azlee Zabidi:
QSroute : A QoS Aware Routing Scheme for Software Defined Networking. 388-391 - Muhamad Aiman Ibrahim, Nur Hafieza Ismail, Nur Shazwani Kamarudin, Nur Syafiqah Mohd Nafis, Ahmad Fakhri Ab. Nasir:
Identifying PTSD Symptoms Using Machine Learning Techniques on Social Media. 392-395 - Nur Khairani Kamarudin, Ahmad Firdaus, Azlee Zabidi, Mohd Faizal Ab Razak:
CAGDEEP: Mobile Malware Analysis Using Force Atlas 2 with Strong Gravity Call Graph And Deep Learning. 396-401 - Eisyah Hanun Zawawi, Micheal Drieberg, Azrina Abd Aziz, Patrick Sebastian, Lo Hai Hiung:
Development of Light Energy Harvesting for Wearable IoT. 402-407 - Ainie Hayati Noruzman, Ngahzaifa Ab Ghani, Nor Saradatul Akmar Zulkifli:
Enhancing Autism Screening Classification Using Feature Selection and Stacking Classifier. 408-413 - Ida Fadliza Binti Abu Zarin, Ngahzaifa Ab Ghani, Syafiq Fauzi Bin Kamarulzaman:
Machine Learning Classification to Detect Unattended Child in Vehicle Using Sensor Signal: A Review. 414-418 - Shakirah Binti Saidin, Syifak Binti Izhar Hisham:
A Survey on Supervised Machine Learning in Intrusion Detection Systems for Internet of Things. 419-423 - Nurul Izzatie Husna Fauzi, Zalili Binti Musa:
Inertia Weight Strategies in GbLN-PSO for Optimum Solution. 424-429 - Nurul Izzatie Husna Fauzi, Zalili Binti Musa:
A New Approach of Midrange Exploration Exploitation Searching Particle Swarm Optimization for Optimal Solution. 430-434 - Niful Islam, Md. Mehedi Hasan Jony, Emam Hasan, Sunny Sutradhar, Atikur Rahman, Md. Motaharul Islam:
EWasteNet: A Two-Stream Data Efficient Image Transformer Approach for E-Waste Classification. 435-440 - Siti NurAishah Binti Nazri, Tuty Asmawaty Abdul Kadir, Siti Normaziah Binti Ihsan:
Review on Serious-Education Games for Slow Learners. 441-446 - Jingjia Huang, Xincheng Huang:
Optimization of Data Protection in IoT Field of Cloud Computing Using Compiler Privacy Calculation Method. 447-452 - Xingnan Zhang, Jingjia Huang, Yue Feng:
A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques. 453-458 - Fuad Bajaber:
Enhancing Subcluster Identification in IoT Sensor Networks with Hierarchical Clustering Algorithms and Dendrograms. 459-464 - Manea Abdullah Badheyba, Rozlina Mohamed:
CHarity and Donation Tracking System Using Queue Structure. 465-469 - Salwana Mohamad Asmara, Noor Azida Sahabudin, Nor Syahidatul Nadiah Binti Ismail, Ily Amalina Ahmad Sabri:
A Review of Knowledge Graph Embedding Methods of TransE, TransH and TransR for Missing Links. 470-475 - Ferda Ernawan, Ahmad Hisyam, Prajanto Wahyu Adi, Zuriani Mustaffa, Mohd Faizal Ab Razak:
Robust Image Watermarking Using Hessenberg Decomposition and SVD with Integer Wavelet Transform. 476-480 - Azma binti Abdullah, Rohani Abu Bakar, Kiriyadhatshini Gunaratnam, Fadhl Hujainah, Mohd Fairus Abdul Farid:
Safety Property Attributes in Critical Systems for Requirement Specification: A Review. 481-486 - Muhammad Amirul Isyraf Rohismadi, Anis Farihan Mat Raffei, Nor Saradatul Akmar Zulkifli, Mohd. Hafidz Ithnin, Shah Farez Othman:
An Automated Strabismus Classification Using Machine Learning Algorithm for Binocular Vision Management System. 487-492 - Saadiah Awang Salim, Noor Azida Sahabudin, Gausallyaa A P. Murugiah, Nur Shamsiah Abdul Rahman, Norhasyimah Hamzah:
Knowledge of the Utilization of Telegram for Learning Among Primary Students in Kuantan. 493-496
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.