


default search action
Mohd Adham Isa
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Qichen Su
, Haza Nuzly Abdull Hamed
, Mohd Adham Isa
, Xue Hao
, Xin Dai
:
A GAN-Based Data Augmentation Method for Imbalanced Multi-Class Skin Lesion Classification. IEEE Access 12: 16498-16513 (2024) - [j13]Nurul Nazihah Jamal
, Dayang N. A. Jawawi, Rohayanti Hassan, Radziah Mohamad, Shahliza Abd Halim, Nor Azizah Sa'adon, Mohd Adham Isa, Haza Nuzly Abdul Hamed:
Adaptive learning framework for learning computational thinking using educational robotics. Comput. Appl. Eng. Educ. 32(4) (2024) - 2023
- [j12]Ako A. Jaafar
, Dayang N. A. Jawawi
, Mohd Adham Isa, Nor Azizah Saadon:
Service selection model based on user intention and context. J. King Saud Univ. Comput. Inf. Sci. 35(4): 209-223 (2023) - 2022
- [j11]Dayang Norhayati Abang Jawawi, Nurul Nazihah Jamal, Shahliza Abd Halim, Nor Azizah Sa'adon, Rosbi Bin Mamat, Mohd Adham Isa, Radziah Mohamad, Haza Nuzly Abdull Hamed:
Nurturing Secondary School Student Computational Thinking Through Educational Robotics. Int. J. Emerg. Technol. Learn. 17(3): 117-128 (2022) - [j10]Nurbaity Sabri, Haza Nuzly Abdull Hamed, Zaidah Ibrahim, Kamalnizat Ibrahim, Mohd Adham Isa, Norizan Mat Diah:
The hybrid feature extraction method for classification of adolescence idiopathic scoliosis using Evolving Spiking Neural Network. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 8899-8908 (2022) - [j9]Muhammad Luqman Mohd Shafie
, Wan Mohd Nasir Wan-Kadir, Horst Lichter, Muhammad Khatibsyarbini, Mohd Adham Isa:
Model-based test case generation and prioritization: a systematic literature review. Softw. Syst. Model. 21(2): 717-753 (2022) - 2021
- [j8]Muhammad Khatibsyarbini
, Mohd Adham Isa
, Dayang N. A. Jawawi
, Muhammad Luqman Mohd Shafie
, Wan Mohd Nasir Wan-Kadir
, Haza Nuzly Abdull Hamed
, Muhammad Dhiauddin Mohamed Suffian
:
Trend Application of Machine Learning in Test Case Prioritization: A Review on Techniques. IEEE Access 9: 166262-166282 (2021) - [j7]Afifah M. Ashari, Shahliza Abd Halim, Dayang N. A. Jawawi, Ushananthiny Suvelayutnan, Mohd Adham Isa:
Quality Driven Approach for Product Line Architecture Customization in Patient Navigation Program Software Product Line. KSII Trans. Internet Inf. Syst. 15(7): 2455-2475 (2021) - 2020
- [j6]Muhammad Arif Shah
, Dayang Norhayati Abang Jawawi
, Mohd Adham Isa
, Muhammad Younas
, Abdelzahir Abdelmaboud
, Fauzi Sholichin
:
Ensembling Artificial Bee Colony With Analogy-Based Estimation to Improve Software Development Effort Prediction. IEEE Access 8: 58402-58415 (2020) - [j5]Ali Syariati Mohd Salleh
, Haza Nuzly Abdul Hamed
, Mohd Adham Isa
, Habibollah Haron
:
Hydrofluoroether Impurities - Chemical Detection Using a Deep Learning Laser Speckle Contrast Evolving Spiking Neural Network. IEEE Access 8: 216419-216436 (2020)
2010 – 2019
- 2019
- [j4]Muhammad Khatibsyarbini
, Mohd Adham Isa, Dayang N. A. Jawawi, Haza Nuzly Abdull Hamed, Muhammad Dhiauddin Mohamed Suffian:
Test Case Prioritization Using Firefly Algorithm for Software Testing. IEEE Access 7: 132360-132373 (2019) - 2018
- [j3]Muhammad Khatibsyarbini
, Mohd Adham Isa, Dayang N. A. Jawawi, Rooster Tumeng:
Test case prioritization approaches in regression testing: A systematic literature review. Inf. Softw. Technol. 93: 74-93 (2018) - 2014
- [j2]Mohd Adham Isa
, Dayang Norhayati Abang Jawawi
, Mohd Z. M. Zaki:
Model-driven estimation approach for system reliability using integrated tasks and resources. Softw. Qual. J. 22(4): 661-697 (2014) - 2013
- [j1]Mohd Adham Isa
, Mohd Z. M. Zaki, Dayang N. A. Jawawi:
A Survey of Design Model for Quality Analysis: From a Performance and Reliability Perspective. Comput. Inf. Sci. 6(2): 55-70 (2013) - 2011
- [c2]Mohd Z. M. Zaki, Mohd Adham Isa
, Dayang N. A. Jawawi
:
Meta-model Validation of Integrated MARTE and Component-Based Methodology Component Model for Embedded Real-Time Software. ICSECS (3) 2011: 246-256 - [c1]Mohd Adham Isa
, Dayang N. A. Jawawi
:
Comparative Evaluation of Performance Assessment and Modeling Method for Software Architecture. ICSECS (3) 2011: 764-776
Coauthor Index
aka: Dayang Norhayati Abang Jawawi

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint