Special Issue on International Conference on Recent Advancements in Science and Technology (ICoRAST)
Chief Guest Editor: Dr Mahdi Esmaeilzadeh , Scientific Research Publishing House ; Mehdi_dna@yahoo.com
Guest Editor 1 : Dr. Farida Hazwani Mohd Ridzuan, Universiti Sains Islam Malaysia, farida@usim.edu.my
Guest Editor 2 : Associate Professor Dr Ernie Suzana Ali, Universiti Sains Islam Malaysia, ernie@usim.edu.my
Guest Editor 3 : Zairi Ismael Rizman , Universiti Teknologi MARA , zairi576@tganu.uitm.edu.my
Table of Contents
Articles
Performance Evaluation of Hadoop in Cloud for Big Data |
![]() ![]() |
Mohammed Fakherldin, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21363 |
User Engagement and Satisfaction: The Case of Web Digital Library |
![]() ![]() |
Mohamad Noorman Masrek, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21364 |
Random Forest and Novel Under-Sampling Strategy for Data Imbalance in Software Defect Prediction |
![]() ![]() |
Utomo Pujianto, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21368 |
RAPID-Risk Assessment of Android Permission and Application Programming Interface (API) Call for Android Botnet |
![]() ![]() |
Zubaile Abdullah, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21370 |
Comparative Study of Traditional and Next Generation IPS |
![]() ![]() |
Mohammed Nadir Ali, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21371 |
A New Mobile Malware Classification for Audio Exploitation |
![]() ![]() |
Muhamad Nur Arif, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21372 |
Coverage-based Approach for Model-based Testing in Software Product Line |
![]() ![]() |
Rabatul Aduni Sulaiman, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21373 |
Mobile Botnet Classification by using Hybrid Analysis |
![]() ![]() |
Muhammad Yusof, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21429 |
Signature-Based Malware Detection Using Sequences of N-grams |
![]() ![]() |
Alogba Moshood Abiola, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21432 |
Trustworthy E-Commerce Model for Small Medium Enterprises (SMEs) |
![]() ![]() |
Hamed F.H.O, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21435 |
Assessment and Analysis of Locating Housing and its Impact on Development Patterns in Damghan |
![]() ![]() |
Ahmad Arjmand, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21437 |
A Narrative Review: Risk Factors of Low Back Pain in Military Personnel/Recruits |
![]() ![]() |
Ebby Waqqash, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21439 |
A Preliminary Study on Injury Risk Factors of Perak Athletes |
![]() ![]() |
Lee Ai Choo, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21441 |
Performance Comparison of Routing Protocols for Underwater Sensor Networks |
![]() ![]() |
Komal Memon, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21442 |
A Review of Individual Factors on Knowledge Sharing: Evidence from the Empirical Literature |
![]() ![]() |
Salah Shehab, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21444 |
Guiding Principles to Foster Higher Order Thinking Skills in Teaching and Learning of Mathematics |
![]() ![]() |
Nor’ain Mohd Tajudin, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21445 |
Analysis of Internal Risk Management in Indonesian Seaweed Farming |
![]() ![]() |
Harifuddin Thahir, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21446 |
Ethnic Conflict and Economic Cooperation in the Borderlands: Burma, Thailand, and the Karen |
![]() ![]() |
Sirinya Siriyanun, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.21448 |
Computer Games as Learning Tool towards Children Road Safety Education |
![]() ![]() |
Masnida Hussin, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.22995 |
The Requirement for Information Governance Policy Framework in Malaysian Public Sector |
![]() ![]() |
Noursilawati Abdul Halim, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.22996 |
Sentiment Analysis on Mobile Banking Application Using Naive Bayes Classifer and Association Methods |
![]() ![]() |
Rabiatul Adawiyah, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.22998 |
Refusal of Youth to Vote in Shah Alam, Selangor, Malaysia |
![]() ![]() |
Mohd Ramlan Mohd Arshad, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.22999 |
Implementing Fully Privately Run Public Schools: Top View |
![]() ![]() |
Sheikh Muhamad Hizam Sheikh Khairuddin, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23001 |
Crop Recommender System for the Farmers using Mamdani Fuzzy Inference Model |
![]() ![]() |
Madhusree Kuanr, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23006 |
Ensemble Comparative Study for Diagnosis of Breast Cancer Datasets |
![]() ![]() |
Bibhuprasad Sahu, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23007 |
A Hybrid Technique for Smart Parking Management System in a Smart City |
![]() ![]() |
Patita Paban Panda, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23009 |
Optimum Tilt Angles for PV Modules in a Semi-Arid Region of the Southern Hemisphere |
![]() ![]() |
Pierre E Hertzog, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23010 |
Serially Concatenated Low-density Parity Check Codes as Compatible Pairs |
![]() ![]() |
Amjad Ali Jassim, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23013 |
Flat sheet of Zinc material as a filter for gamma photons in Tc-99mm SPECT imaging |
![]() ![]() |
Nazifah Abdullah, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23018 |
Energy Efficiency in Virtualized Data Center |
![]() ![]() |
Tehmina Karamat Khan, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23019 |
Performance Evaluation of Distributed Multi Media Wireless Sensor Network |
![]() ![]() |
Tehmina Karamat Khan, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23020 |
Performance Optimization of Wireless Sensor network for Multimedia services |
![]() ![]() |
Tehmina Karamat Khan, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23021 |
Theoretical and Experimental Analysis of Solar Still with Integrated Built-in Condenser |
![]() ![]() |
Ghaleb Ibrahim, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23022 |
Building Pocket Code build-variants |
![]() ![]() |
Kirshan Kumar Luhana, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23023 |
FoRex Trading Using Supervised Machine Learning |
![]() ![]() |
Thuy Nguyen Thi Thu, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23024 |
Relationship between the voltage applied to MZM arms and the generation of optical frequency comb |
![]() ![]() |
Yousif I. Hammadi, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23591 |
Social Engineering for Ethical Dilemma about Anti-Corruption Intellectual Consciousness |
![]() ![]() |
Arie Wahyu Prananta, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.23593 |
A Research Framework for Supervised Image Classification For Tornado Chaos Phenomena |
![]() ![]() |
W Wanayumini, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.25254 |
The Difference in the Learning Achevement in Civic Education by Using Blended Learning Models |
![]() ![]() |
Evi Susilawati, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.25255 |
Determination of Number of New Elements for Sequence of Fuzzy Topographic Topological Mapping |
![]() ![]() |
Azrul Azim Mohd Yunus, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.25757 |
Determine Process Training Key Factors and Job Performance in Higher Education Sector |
![]() ![]() |
Z. M. Sharif, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.25759 |
A Logging Scheme for Reducing Update Workloads in Flash Storage |
![]() ![]() |
Seong-Chae Lim, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.25762 |
A Survey of User Preferences on Biometric Authentication for Smartphones |
![]() ![]() |
Nur Syabila Zabidi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.25763 |
Self-Esteem Impact on Organizational Affective and Normative Commitment |
![]() ![]() |
Siti Sarawati Johar, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.25764 |
Analysis the Components of SNOW 3G and ZUC Ciphers in Mobile Systems |
![]() ![]() |
Khalid Fadhil Jasim, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.26324 |
Primary School Teachers’ Understanding of Critical Thinking in KSSR Classroom and Its Importance to Students |
![]() ![]() |
Wirawani Kamarulzaman, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.28108 |
Information Hiding Based on Audio Steganography using Least Significant Bit |
![]() ![]() |
Fatma Susilawati Mohamad, ![]() ![]() DOI: 10.14419/ijet.v7i4.15.28363 |
Active Appearance Model for Age Prediction: A Comparison |
![]() ![]() |
Musab Iqtait, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.15.28364 |