Vol 7, No 4.31 (2018)

Special Issue 31

  • Conference Name: The International Conference on Innovations in Computer Science and Engineering (iCiCSE2018)
  • Start date: 30 July 2018
  • End date: 31 July 2018
  • Country: Malaysia
  • Website: http://fyp.upm.edu.my/icicse2018/

Table of Contents


Articles


Identifying the Most Effective Feature Category in Machine Learning-based Phishing Website Detection

Choon Lin Tan, Kang Leng Chiew, Nadianatra Musa, Dayang Hanani Abang Ibrahim Pages: 1-6

DOI: 10.14419/ijet.v7i4.31.23331Published on: 09-12-2018

Building Standard Offline Anti-phishing Dataset for Benchmarking

Kang Leng Chiew, Ee Hung Chang, Choon Lin Tan, Johari Abdullah, Kelvin Sheng, Chek Yong Pages: 7-14

DOI: 10.14419/ijet.v7i4.31.23333Published on: 09-12-2018

Speckle Filtering Method in the Gonad Ultrasound Image for Mahseer’s Fish (Tor Tombroides)

Nurul Asmaa Abd Razak, Hizmawati Madzin, Fatimah Khalid, Mas Rina Mustaffa Pages: 15-19

DOI: 10.14419/ijet.v7i4.31.23334Published on: 09-12-2018

The Effectiveness of an Enhanced Weighted Method with a Unique Priority Value for Test Case Prioritization in Regression Testing

Asmaa Ammar, Salmi Baharom, Abdul Azim Abd Ghani, Jamilah Din Pages: 20-27

DOI: 10.14419/ijet.v7i4.31.23335Published on: 09-12-2018

Comparison of Different Feature Selection Techniques in Attribute Selection of Learning Style Prediction

Haziqah Shamsudin, Umi Kalsom Yusof, Maziani Sabudin Pages: 28-33

DOI: 10.14419/ijet.v7i4.31.23336Published on: 09-12-2018

An Efficient Iris Image Thresholding based on Binarization Threshold in Black Hole Search Method

Muktar Danlami, Sofia Najwa Ramli, Nur Izzah Syahira Jemain, Zahraddeen Pindar, Sapiee Jamel, Mustafa Mat Deris Pages: 34-39

DOI: 10.14419/ijet.v7i4.31.23337Published on: 09-12-2018

Comparing Web Vulnerability Scanners with a New Method for SQL Injection Vulnerabilities Detection and Removal EPSQLiFix

Kabir Umar, Abu Bakar Sultan, Hazura Zulzalil, Novia Admodisastro, Mohd Taufik Abdullah Pages: 40-45

DOI: 10.14419/ijet.v7i4.31.23338Published on: 09-12-2018

Enterprise Integration of Employee Onboarding Process Using Zachman Framework

Wan Faezah Abbas, Siti Hajar Ismail, Haryani Haron, Wan Nor Amalina Wan Hariri Pages: 46-51

DOI: 10.14419/ijet.v7i4.31.23340Published on: 09-12-2018

Association of People Factors with Successful Enterprise Architecture Implementation

Nur Azaliah Abu Bakar, Surya Sumarni Hussien Pages: 52-57

DOI: 10.14419/ijet.v7i4.31.23341Published on: 09-12-2018

An Automated Test Case Generating Tool Using UML Activity Diagram

Md Abdul Monim, Rozi Nor Haizan Nor Pages: 58-63

DOI: 10.14419/ijet.v7i4.31.23342Published on: 09-12-2018

An Industry Involvement to Enhance the HCI Small-Scale Project Learning Experience

Azrina Kamaruddin, Evi Indriasari Mansor, Novia Indriaty Admodisastro, Noris Mohd Norowi, Salfarina Abdullah Pages: 64-68

DOI: 10.14419/ijet.v7i4.31.23343Published on: 09-12-2018

Accessibility Design Issues with Malaysian News Websites: a Case Study Using a Checker and WAVE

Mariam Azwa Yazid, Azrul Hazri Jantan, Abdul Azim Abd Ghani, Azrina Kamaruddin, Novia Admodisastro Pages: 69-73

DOI: 10.14419/ijet.v7i4.31.23344Published on: 09-12-2018

Enhanced Bring your Own Device (BYOD) Environment Security based on Blockchain Technology

Fara Jamal, Mohd. Taufik Abdullah, Azizol Abdullah, Zurina Mohd. Hanapi Pages: 74-79

DOI: 10.14419/ijet.v7i4.31.23345Published on: 09-12-2018

Applying ITIL Framework to Analyze Problem Management Key Performance Indicator (KPI): a Case Study of Malay Owner Company (Mesiniaga Berhad)

Mudiana Mokhsin, Amer Shakir Zainol, Siti Nordianah Haihom, Mohd Husni Mohd Som, Abdul Jalil Abdul Rahim Pages: 80-86

DOI: 10.14419/ijet.v7i4.31.23346Published on: 09-12-2018

Design and Development of Topic-based Students’ Knowledge Modelling System using Fuzzy Set Theory and Visual Analytics

Wen Thing Ng, Chee Siong Teh, Chwen Jen Chen Pages: 87-94

DOI: 10.14419/ijet.v7i4.31.23347Published on: 09-12-2018

A Model on Multiple Perspectives of Citizens’ Trust in using Social Media for E-Government Services

Sohrab Khan, Nor Zairah Ab. Rahim, Nurazean Maarop Pages: 95-100

DOI: 10.14419/ijet.v7i4.31.23348Published on: 09-12-2018

The Enterprise Resource Planning System and Human Influences on Perceived Business Benefits

Jiansi Lim, Norshidah Mohamed, Nor Shahriza Abdul Karim Pages: 101-106

DOI: 10.14419/ijet.v7i4.31.23350Published on: 09-12-2018

Understanding Factors that Affect Information Technology Outsourcing of Government Shared Services

Fadzilah Ahmad, Rosmah Ali, Nurazean Maarop, Nurulhuda Firdaus Mohd Azmi Pages: 107-112

DOI: 10.14419/ijet.v7i4.31.23351Published on: 09-12-2018

Improving the Governance of Software Maintenance Process for Agile Software Development Team

Salfarina Abdullah, Mangaiarasi Subramaniam, Sazly Anuar Pages: 113-117

DOI: 10.14419/ijet.v7i4.31.23352Published on: 09-12-2018

Applying Agile Concepts from Software Development into the Design of Flood Disaster Management Framework

M. F.Mat Saad, A. Abdul Latif, M. Othman, M. S.A. MOHD NOOR Pages: 118-122

DOI: 10.14419/ijet.v7i4.31.23353Published on: 09-12-2018

Knowledge Management Strategy and Initiative for Development of Digital Energy Hub

Hairoladenan Bin Kasim, . ., . . Pages: 123-127

DOI: 10.14419/ijet.v7i4.31.23354Published on: 09-12-2018

Real Time Productivity Monitoring System for Small and Medium Size Manufacturing Industry

Wong Phaik-Ean, Nasuha Lee Abdullah, Rosnah Idrus, Pantea Keikhosrokiani Pages: 128-134

DOI: 10.14419/ijet.v7i4.31.23355Published on: 09-12-2018

Towards Employing Metrics in Measuring the Quality of Software Safety Critical Systems and Managing their Development

Jamilah Din, Rodziah Din, Yusmadi Yah Jusoh, Muhammed Basheer Jasser Pages: 135-139

DOI: 10.14419/ijet.v7i4.31.23356Published on: 09-12-2018

A Study of Web Design for Customer Billing Telephony System Using User Experience (UX) Approach

Noraini Che Pa, Raziera Bidin, Azrina Kamaruddin Pages: 140-144

DOI: 10.14419/ijet.v7i4.31.23357Published on: 09-12-2018

The Role of Employee in Information Security Risk Management

David Lau Keat Jin, Noor Hafizah Hassan, Nurazean Maarop, Ganthan Narayana Samy, Rasimah Che Mohd Yusof Pages: 145-150

DOI: 10.14419/ijet.v7i4.31.23358Published on: 09-12-2018

A Success Model for Semantic Technology based - Knowledge Management Systems: an Empirical Investigation

Abdulmajid Babangida Umar, Azmi Ja’afar, Marzanah A. Jabar, Masrah Azrifah Azmi Murad Pages: 151-159

DOI: 10.14419/ijet.v7i4.31.23359Published on: 09-12-2018

A Domain Ontology for Eliciting Usability Features

Chian Wen Too, Sa’adah Hassan, Abdul Azim Abdul Ghani, Jamilah Din Pages: 160-167

DOI: 10.14419/ijet.v7i4.31.23360Published on: 09-12-2018

Exploring Design Guidelines of Tangible Interaction in Learning for Children with Dyslexia

Siti Nurliana Jamali, Novia Admodisastro, Abdul Azim Abd Ghani, Sa’adah Hassan, Azrina Kamaruddin, Siti Suhaila Abdul Hamid Pages: 168-174

DOI: 10.14419/ijet.v7i4.31.23361Published on: 09-12-2018

Cognitive-Behaviour Intervention in Developing an Adaptive Learning Model for Students with Dyslexia

Siti Suhaila Abdul Hamid, Novia Admodisastro, Abdul Azim Abd. Ghani, Azrina Kamaruddin, Noridayu Manshor Pages: 175-181

DOI: 10.14419/ijet.v7i4.31.23362Published on: 09-12-2018

Dynamic Service Adaptation Framework for Context Aware Mobile Cloud Learning Using Semantic-Based Approach

Sufri Muhammad, Novia Admodisastro, Hafeez Osman, Norhayati Mohd Ali Pages: 182-190

DOI: 10.14419/ijet.v7i4.31.23363Published on: 09-12-2018

Goal-Directed Approach and Design Principle Approach: a Comparative Study

Hoo Meei Hao, Azizah Jaafar, Beh Hooi Ching Pages: 191-197

DOI: 10.14419/ijet.v7i4.31.23364Published on: 09-12-2018

Enhancing Scrum Framework: a Case at a Multinational Manufacturing Company in Malaysia

Shalini Mariyappan, Nasuha Lee Abdullah, Rosnah Idrus Pages: 198-203

DOI: 10.14419/ijet.v7i4.31.23367Published on: 09-12-2018

Recognition of Food with Monotonous Appearance using Speeded-Up Robust Feature (SURF)

Mohd Norhisham Razali, Noridayu Manshor, Alfian Abdul Halin, Razali Yaakob, Norwati Mustapha Pages: 204-208

DOI: 10.14419/ijet.v7i4.31.23368Published on: 09-12-2018

Mobile Malware Classification

Zolidah Kasiran, Norkhushaini Awang, Fatin Nurhanani Rusli Pages: 209-2013

DOI: 10.14419/ijet.v7i4.31.23369Published on: 09-12-2018

A Two Dimensional Facial Features Analysis for Gender-based Comparison Using Morphometrics Approach

Olalekan Agbolade, Azree Shahrel Ahmad, . . Pages: 214-219

DOI: 10.14419/ijet.v7i4.31.23370Published on: 09-12-2018

An Artificial Immune System Approach for Type E Assembly Line Balancing Problem

Mohd Nor Akmal Khalid, Umi Kalsom Yusof, Zarul Fitri Zaaba Pages: 220-227

DOI: 10.14419/ijet.v7i4.31.23371Published on: 09-12-2018

A Hybrid Feature Selection Technique for Classification of Group-based Holy Quran Verses

A. Adeleke, N. Samsudin Pages: 228-233

DOI: 10.14419/ijet.v7i4.31.23372Published on: 09-12-2018

A Library for Articulating the Measurement Streams with Columnar Data

Mario Diván, María Laura Sánchez Reynoso Pages: 234-241

DOI: 10.14419/ijet.v7i4.31.23373Published on: 09-12-2018

A Study on Detecting Misleading Online News Using Bigram and Cosine Similarity

Normala Che Eembi, Iskandar Ishak, Fatimah Sidi, Lilly Suriani Affendey Pages: 242-245

DOI: 10.14419/ijet.v7i4.31.23375Published on: 09-12-2018

RESQ Banjir: a Mobile Apps for Emergency Rescue, Evacuation and Relief Center Management

Muhammad Rafie Mohd Arshad, Hasimah Hj Mohamed, Mohd Heikal Husin, Fadratul Hafinaz Hassan, Wan Mohd Nazmee Wan Zainon, Abdul Rahim Ahmad, Maziani Sabudin, . . Pages: 246-250

DOI: 10.14419/ijet.v7i4.31.23376Published on: 09-12-2018

Systematic Review on Ear Identification

Ahmad Alemran, Bahbibi Binti Rahmatullah, Ali Hadi Pages: 251-259

DOI: 10.14419/ijet.v7i4.31.23377Published on: 09-12-2018

Price Changes Analysis Using Association Rule Mining on Online Shopping Portals

Aini Atikah Baharudin, Sofianita Mutalib, Nurzeatul Hamimah Abd Hamid, Nor Hayati Abdul Hamid Pages: 266-271

DOI: 10.14419/ijet.v7i4.31.23379Published on: 09-12-2018

Privacy Preserving Technique for Mitigating Anonymity Attack in Pervasive Social Networking Applications

Nur’ Ayuni binti Adnan, Manmeet Mahinderjit Singh, Aman Jantan Pages: 272-279

DOI: 10.14419/ijet.v7i4.31.23380Published on: 09-12-2018

Solving Classification Problem Using Ensemble Binarization Classifier

M. N. Shah Zainudin, Md. Nasir Sulaiman, Norwati Musapha, Thinagaran Perumal, Raihani Mohamed Pages: 280-284

DOI: 10.14419/ijet.v7i4.31.23381Published on: 09-12-2018

Case Study of UPNM Students Performance Classification Algorithms

Syarifah B. Rahayu, Nur D. Kamarudin, Zuraini Zainol Pages: 285-289

DOI: 10.14419/ijet.v7i4.31.23382Published on: 09-12-2018

Attributes Correspondence Discovery in Ontology Instance-based Matching and RDF Data Linkage using Clustering Method

Mansir Abubakar, Hazlina Hamdan, Norwati Mustapha, Teh Noranis Mohd Aris Pages: 290-297

DOI: 10.14419/ijet.v7i4.31.23383Published on: 09-12-2018

Near Field Communication (NFC) Technology Security Vulnerabilities and Countermeasures

Manmeet Mahinderjit Singh, Ku Aina Afiqah Ku Adzman, Rohail Hassan Pages: 298-305

DOI: 10.14419/ijet.v7i4.31.23384Published on: 09-12-2018

Near Field Communication (NFC) Technology Security Vulnerabilities and Countermeasures

Manmeet Mahinderjit Singh, Ku Aina Afiqah Ku Adzman, Rohail Hassan Pages: 298-305

DOI: 10.14419/ijet.v7i4.31.23385Published on: 09-12-2018

Role Minimization as an Optimization Metric in Role Mining Algorithms: a Literature Review

Nazirah Abd. Hamid, Rabiah Ahmad, Siti Rahayu Selamat Pages: 306-310

DOI: 10.14419/ijet.v7i4.31.23386Published on: 09-12-2018

Evaluation of Feature Selection Algorithm for Android Malware Detection

Nurul Hidayah Mazlan, Isredza Rahmi A Hamid Pages: 311-315

DOI: 10.14419/ijet.v7i4.31.23387Published on: 09-12-2018

Multi-Objective PSO-fuzzy Optimization Approach to Improve Interpretability and Accuracy in Medical Data

Alwatben Batoul Rashed A, Hazlina Hamdan, Md Nasir Sulaiman, Nurfadhlina Mohd Sharef Pages: 316-321

DOI: 10.14419/ijet.v7i4.31.23388Published on: 09-12-2018

HARIRAYA: a Novel Breast Cancer Pseudo-Color Feature for Multimodal Mammogram using Deep Learning

Azree Shahrel Ahmad Nazri, Olalekan Agbolade Pages: 322-325

DOI: 10.14419/ijet.v7i4.31.23389Published on: 09-12-2018

Case-Based Reasoning Approach to Map Similar Cases for Accident Injury Claims

Shuhaizan Sulaiman, Nurzeatul Hamimah Abdul Hamid, Nur Huda Jaafar, Shuzlina Abdul-Rahman Pages: 326-330

DOI: 10.14419/ijet.v7i4.31.23390Published on: 09-12-2018

Parameter Tuning of Groceries Scheduling by Genetic Algorithm

Mohd Nazmi Noor Shamsuazman, Shuzlina Abdul Rahman, Nurzeatul Hamimah Abdul Hamid Pages: 336-340

DOI: 10.14419/ijet.v7i4.31.23405Published on: 09-12-2018

Know your Hotels Well! an Online Review Analysis using Text Analytics

Angela S.H Lee, Zaharin Yusoff, Zuraini Zainol, Pillai V Pages: 341-347

DOI: 10.14419/ijet.v7i4.31.23406Published on: 09-12-2018

An Empirical Research on the Performance Analysis between Silicon and Quantum Computers

M. Aisar M.M.I, S. S.M.Fauzi, H. Baharin, W. A.W.M. Sobri, A. J. Suali, R. A.JM. Gining, M. N.F.Jamaluddin, Mohd Helmy Abdul Wahab Pages: 348-351

DOI: 10.14419/ijet.v7i4.31.23407Published on: 09-12-2018

A Super-Peer Approach for Scalable Collaborative Intrusion Detection Network (CIDN)

Yousef Bakhdlaghi, Nur Izura Udzir, Azizol Abdullah, Nor Fazlida Mohd Sani Pages: 352-356

DOI: 10.14419/ijet.v7i4.31.23408Published on: 09-12-2018

A Review: Replication Strategies for Big Data in Cloud Environment

M. A. Fazlina, Rohaya Latip, Hamidah Ibrahim, Azizol Abdullah Pages: 357-362

DOI: 10.14419/ijet.v7i4.31.23409Published on: 09-12-2018

An Enhanced Congestion Control Algorithm for LEO Satellite Networks

Fahrul Hakim Ayob, Shamala Subramaniam, Mohamed Othman, Zuriati Zulkarnain Pages: 363-367

DOI: 10.14419/ijet.v7i4.31.23410Published on: 09-12-2018

Channel Estimation in OFDM Multipath Fading Channel Systems According to Modulation Schemes

Alaa Abdullah Al-Saadi, Rohaya Latip, Abdullah Muhammed, Mohd Helmy Abd Wahab Pages: 368-374

DOI: 10.14419/ijet.v7i4.31.23714Published on:

Comparative Study for Load Management of HBase and Cassandra Distributed Databases in Big Data

Ali Y. Aldailamy, Abdullah Muhammed, Waidah Ismail, Abduljalil Radman Pages: 375-380

DOI: 10.14419/ijet.v7i4.31.23715Published on:

Optimising the Space Utilisation in Real-Time Flash Translation Layer Mapping Scheme

Mohd Bazli Ab. Karim, Amir Rizaan Rahiman, Rohaya Solid-State Disk (SSD) is a semic Latip, Hamidah Ibrahim Pages: 381-385

DOI: 10.14419/ijet.v7i4.31.23716Published on:

Performance Evaluation of Load Balancing Algorithm for Virtual Machine in Data Centre in Cloud Computing

Yuganes A/P Parmesivan, Sazlinah Hasan, Abdullah Muhammed Pages: 386-390

DOI: 10.14419/ijet.v7i4.31.23717Published on:

A Framework for Integrating Gamification Mechanics and Dynamics to Authentic Learning Environment (Ale) in Non-Game Context

Sharifah Nafisah Syed Muhammad, Rosnah Idrus, Nasuha Lee Abdullah, Pantea Keikhosrokiani Pages: 391-399

DOI: 10.14419/ijet.v7i4.31.23718Published on:

A Usability Evaluation of Image and Emojis in Graphical Password

Nur Syabila Zabidi, Noris Mohd Norowi, Rahmita Wirza O.K. Rahmat Pages: 400-407

DOI: 10.14419/ijet.v7i4.31.23719Published on:

Ilung: Interactive Holographic Medical Application for Lung CT Scans Using Hololens

Aala Al Khayer, Evi Indriasari Mansor Pages: 408-413

DOI: 10.14419/ijet.v7i4.31.23720Published on:

Designing an Expressive Virtual Kompang on Mobile Device with Tri-Axial Accelerometer

Hoo Yong Leng, Noris Mohd. Norowi, Azrul Hazri Jantan Pages: 414-419

DOI: 10.14419/ijet.v7i4.31.23721Published on:

Elderly Experience Evaluation through Medication Learning Application with Augmented Reality

Nuha Alnabit, Evi Indriasari Mansor Pages: 420-425

DOI: 10.14419/ijet.v7i4.31.23722Published on:

Uncovering the Satisfying MOOC Gamification Elements via fuzzy Analytic Hierarchy Process

Nie Hui Ling, Chwen Jen Chen, Chee Siong Teh Pages: 426-430

DOI: 10.14419/ijet.v7i4.31.23723Published on:

Using Continuous Spatial Configuration for Bezel Issues in a Multi-Mobile System

Ong Beng Liang, Teo Rhun Ming, Noris Mohd Norowi, Azrul Hazri Jantan Pages: 431-436

DOI: 10.14419/ijet.v7i4.31.23724Published on:

Head Gesture Recognition and Interaction Techniques in Virtual Reality: a Review

Nurul Nasuha Zolkefly, Ismahafezi Ismail, Suhailan Safei, Syadiah Nor Wan Shamsuddin, Mohd Azhar M. Arsad Pages: 437-440

DOI: 10.14419/ijet.v7i4.31.23725Published on:

User Behavior towards Video Content in Mobile Devices for Designing Individualistic Prefetching Algorithm

Shuria Saaidin, Zolidah Kasiran, . . Pages: 441-444

DOI: 10.14419/ijet.v7i4.31.23726Published on:

Design Models for Mobile Augmented Reality Exergames: State-of-the-Art Review

Hasdina Lynn Hashim, Azrina Kamaruddin, Rahmita Wirza O.K. Rahmat, Azrul Hazri Jantan Pages: 445-451

DOI: 10.14419/ijet.v7i4.31.23727Published on:

Fruits Recognition based on Texture Features and K-Nearest Neighbor

Nur Izzani Kamal Ariffin, Mas Rina Mustaffa, Lili Nurliyana Abdullah, Nurul Amelina Nasharuddin, . . Pages: 452-458

DOI: 10.14419/ijet.v7i4.31.23728Published on:

Educators’ Readiness in using Mobile Phone as a Pedagogical Tool for Teaching

Siti Nur’ain Hamsan, Maslina Abdul Aziz, Jamaliah Taslim Pages: 459-464

DOI: 10.14419/ijet.v7i4.31.23729Published on:

Fusion CLAHE-Based Image Enhancement with fuzzy Set Theory on Field Images

Elmaliana Albahari, Hizmawati Madzin, Mohamad Roff Mohd Noor Pages: 465-468

DOI: 10.14419/ijet.v7i4.31.23730Published on:

Musafir Ilmu Apps Development Using Mobile Application Development Life Cycle

Zan Azma Nasruddin, Irwan Mazlin, Maslina Abdul Aziz, Mohd Shukor Abd Rahman, Wan Adilah Wan Adnan Pages: 469-472

DOI: 10.14419/ijet.v7i4.31.23731Published on:

Ease of use and Usefulness Evaluation of Medical Family Tree Data Visualization

Siti Fatimah Bokhare, Wan Mohd Nazmee Wan Zainon, Mohd Azam Osman, Abdullah Zawawi Talib Pages: 473-478

DOI: 10.14419/ijet.v7i4.31.23732Published on:
science

Copyright © 2017 Science Publishing Corporation Inc. All rights reserved.