default search action
Rohani Binti Abu Bakar
Person information
- affiliation: Universiti Malaysia Pahang, Malaysia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c11]Siti NurSyafiqah Binti Rusli, Rohani Binti Abu Bakar, Siti Suhaila Abdul Hamid:
An Improvement of Interactive Priorization Technique for Requirements Interdependency in Prioritization Process. ICSECS 2023: 320-325 - [c10]Azma binti Abdullah, Rohani Abu Bakar, Kiriyadhatshini Gunaratnam, Fadhl Hujainah, Mohd Fairus Abdul Farid:
Safety Property Attributes in Critical Systems for Requirement Specification: A Review. ICSECS 2023: 481-486 - 2021
- [j7]Fadhl Hujainah, Rohani Binti Abu Bakar, Abdullah B. Nasser, Basheer Al-haimi, Kamal Z. Zamli:
SRPTackle: A semi-automated requirements prioritisation technique for scalable requirements of software system projects. Inf. Softw. Technol. 131: 106501 (2021) - [j6]M. Shahkhir Mozamir, Rohani Binti Abu Bakar, Wan Isni Soffiah Wan Din, Zalili Binti Musa:
Improved GbLN-PSO Algorithm for Indoor Localization in Wireless Sensor Network. J. Commun. 16(6): 242-249 (2021) - 2020
- [c9]Fadhl Hujainah, Rohani Abu Bakar, Essam Alhroob, Basheer Al-haimi, Abdullah B. Nasser:
Interrelated Elements in Formulating an Efficient Requirements Prioritization Technique: Review. ICCSCE 2020: 97-101
2010 – 2019
- 2019
- [j5]Fadhl Hujainah, Rohani Binti Abu Bakar, Mansoor Abdullateef Abdulgabber:
StakeQP: A semi-automated stakeholder quantification and prioritisation technique for requirement selection in software system projects. Decis. Support Syst. 121: 94-108 (2019) - 2018
- [j4]Fadhl Hujainah, Rohani Binti Abu Bakar, Mansoor Abdullateef Abdulgabber, Kamal Z. Zamli:
Software Requirements Prioritisation: A Systematic Literature Review on Significance, Stakeholders, Techniques and Challenges. IEEE Access 6: 71497-71523 (2018) - [j3]Fadhl Hujainah, Rohani Binti Abu Bakar, Basheer Al-haimi, Mansoor Abdullateef Abdulgabber:
Stakeholder quantification and prioritisation research: A systematic literature review. Inf. Softw. Technol. 102: 85-99 (2018) - 2016
- [j2]Zalili Binti Musa, Mohd Zuki Salleh, Rohani Binti Abu Bakar, Junzo Watada:
GbLN-PSO and Model-Based Particle Filter Approach for Tracking Human Movements in Large View Cases. IEEE Trans. Circuits Syst. Video Technol. 26(8): 1433-1446 (2016) - [c8]Noor Suhana Sulaiman, Rohani Abu Bakar:
Rough Set Significant Reduction and Rules of Intrusion Detection System. ICADIWT 2016: 65-76 - [c7]Noor Suhana Sulaiman, Rohani Abu Bakar:
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System. ICADIWT 2016: 77-87 - 2013
- [c6]Rofilde Hasudungan, Rohani Abu Bakar:
DNA computing for solving distribution center location problem. ICCSCE 2013: 563-567
2000 – 2009
- 2009
- [c5]Rohani Binti Abu Bakar, Junzo Watada:
Evidential Reasoning Based on DNA Computation. KES (2) 2009: 212-219 - 2008
- [j1]Rohani Binti Abu Bakar, Junzo Watada, Witold Pedrycz:
DNA approach to solve clustering problem based on a mutual order. Biosyst. 91(1): 1-12 (2008) - [c4]Junzo Watada, Rohani Binti Abu Bakar:
DNA Computing and Its Applications. ISDA (2) 2008: 288-294 - [c3]Rohani Binti Abu Bakar, Junzo Watada:
Biological Clustering Method for Logistic Place Decision Making. KES (3) 2008: 136-143 - 2007
- [c2]Rohani Binti Abu Bakar, Junzo Watada:
A Bio-soft Computing Approach to Re-arrange a Flexible Manufacturing Robot. KES (3) 2007: 308-315 - [c1]Don Jyh-Fu Jeng, Rohani Binti Abu Bakar, Junzo Watada:
DNA Computing Approach to Management Engineering. KES (3) 2007: 370-377
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint