Items where Division is "Faculty of Information Science and Technology (FIST)" and Year is 2012

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: A | B | C | G | H | J | K | L | M | N | O | P | S | T | W | Y
Number of items: 66.

A

Abdollah, Faizal Mohd and Mas’ud, Mohd Zaki and Sahib, Shahrin and Yaacob, Asrul Hadi and Yusof, Robiah and Selamat, Siti Rahayu (2012) Host based detection approach using time based module for fast attack detection behavior. In: Recent Progress in Data Engineering and Internet Technology. Lecture Notes in Electrical Engineering (157). Springer Berlin Heidelberg, pp. 163-171. ISBN 978-3-642-28797-8

Abdul Razak, Siti Fatimah and Simon, Sternly K. and Lee, Chin Poo (2012) Personalized mobile system application: A case study. International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), 2 (6). pp. 9-13. ISSN 2088-5334

Abdullah, M. F. A. and Lee, G. and Sayeed, M. S. and Choi, D. and Perwira Negara, A. F. and Kodirov, E. (2012) Arm's flex when responding call for implicit user authentication in smartphone. International Journal of Security and Its Applications, 6 (3). pp. 55-63. ISSN 1738-9976

Abusham, Eimad Eldin Abdu and Bashier, Housam Khalifa and Khalid, Fatimah and Sayeed, Md. Shohel and Hossen, Md. Jakir and Sonai Muthu, Kalaiarasi (2012) Illumination Normalization using Eimad-housam Technique. Trends in Applied Sciences Research, 7 (8). pp. 692-700. ISSN 1819-3579

Ahmad, Nazrul Muhaimin and Yaacob, Asrul Hadi (2012) IPSec over heterogeneous IPv4 and IPv6 Networks: Issues and implementation. International Journal of Computer Networks & Communications (IJCNC), 4 (5). pp. 57-72. ISSN 0974-9322

Ahsan, M. (2012) Health and Medical Informatics; Investigators at Multimedia University Zero in on Health and Medical Informatics. Information Technology Newsweekly. p. 563.

Akhlagh, Mojtaba Malek and Tan, Shing Chiang and Khak, Faiiaz (2012) Temporal data classification and rule extraction using a probabilistic decision tree. In: 2012 International Conference on Computer & Information Science (ICCIS). IEEE Xplore, pp. 346-351. ISBN 978-1-4673-1937-9

Ali Fahmi, P. N. and Kodirov, Elyor and Choi, Deok-Jai and Lee, Guee-Sang and Mohd Fikri Azli, A. and Sayeed, Shohel (2012) Implicit authentication based on ear shape biometrics using smartphone camera during a call. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE Xplore, pp. 2272-2276. ISBN 978-1-4673-1713-9

Anbananthen, K.S.M. and Pheng, F.C.H. and Subramaniam, S. and Sayeed, S. and Abusham, E.E.A.A. (2012) A rule extraction algorithm that scales between fidelity and comprehensibility. Asian Journal of Scientific Research, 5 (3). pp. 121-132. ISSN 19921454

Aris, Marjuni and Ahmad Fauzi, Mohammad Faizal and Heng, Swee-Huay and Rajasvaran, Logeswaran (2012) A joint filtering based SVD technique for image de-noising. In: 2012 IEEE Symposium on Computers & Informatics (ISCI). IEEE Xplore, pp. 237-240. ISBN 978-1-4673-1685-9

Aziz, Zirwatul Adilah (2012) Molecular characterisation of multi-drug resistant isolates of Mycobacterium Tuberculosis in Malaysia. Masters thesis, Multimedia University.

Azman, Afizan and Meng, Qinggang and Edirisinghe, Eran and Azman, Hartini (2012) Eye and mouth movements extraction for driver cognitive distraction detection. In: 2012 IEEE Business, Engineering & Industrial Applications Colloquium (BEIAC). IEEE Xplore, pp. 220-225. ISBN 978-1-4673-0425-2

B

Behnia, Rouzbeh and Heng, Swee-Huay and Gan, Che-Sheng (2012) Short and efficient identity-based undeniable signature scheme. In: Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science (7449). Springer Berlin Heidelberg, pp. 143-148. ISBN 978-3-642-32286-0

C

Chan, G.Y. (2012) Knowledge Engineering; Study Findings on Knowledge Engineering Are Outlined in Reports from Multimedia University. Journal of Robotics & Machine Learning. p. 260.

Chan, G.Y. (2012) Knowledge Engineering; Study Findings on Knowledge Engineering Are Outlined in Reports from Multimedia University. Journal of Robotics & Machine Learning. p. 260. ISSN 1944-1851

Chan, G.Y. (2012) Knowledge Engineering; Study Findings on Knowledge Engineering Are Outlined in Reports from Multimedia University. Journal of Robotics & Machine Learning. p. 260. ISSN 1944-1851

Chin, Yong Jian (2012) Multiple Hand Based Biometric Bit Extraction For Template Protection. Masters thesis, Multimedia University.

Choo, Siew Woh and Mohamed Yusoff, Aini and Wong, Yan Ling and Wee, Wei Yee and Ong, Chia Sui and Ng, Kee Peng and Ngeow, Yun Fong (2012) Genome Analysis of Mycobacterium massiliense Strain M172, Which Contains a Putative Mycobacteriophage. Journal of Bacteriology, 194 (18). p. 5128. ISSN 0021-9193

Choo, Siew Woh and Wong, Yan Ling and Mohamed Yusoff, Aini and Leong, Mee Lian and Wong, Guat Jah and Ong, Chia Sui and Ng, Kee Peng and Ngeow, Yun Fong (2012) Genome sequence of the Mycobacterium abscessus strain M93. Journal of Bacteriology, 194 (12). p. 3278. ISSN 0021-9193

Choo, Siew Woh and Wong, Yan Ling and Tan, Joon Liang and Ong, Chia Sui and Wong, Guat Jah and Ng, Kee Peng and Ngeow, Yun Fong (2012) Annotated Genome Sequence of Mycobacterium massiliense Strain M154, Belonging to the Recently Created Taxon Mycobacterium abscessus subsp. bolletii comb. nov. Journal of Bacteriology, 194 (17). p. 4778. ISSN 0021-9193

G

Goh, Michael Kah Ong and Tee, Connie and Teoh, Andrew Beng Jin (2012) A contactless biometric system using multiple hand features. Journal of Visual Communication and Image Representation, 23 (7). pp. 1068-1084. ISSN 10473203

Goh, Yong Li and Ooi, Shih Yin and Pang, Ying Han (2012) State of the art: A study on fall detection. International Science Index, 62. 0-280.

H

Ho, Sew Tiep and Tong, David Yoon Kin and Ahmed, Elsadig Musa and Lee, Chee Teck (2012) Factors influencing household electronic waste recycling intention. Advanced Materials Research, 622-62. pp. 1686-1690. ISSN 1662-8985

J

Jin, Zhe and Jin Teoh, Andrew Beng and Ong, Thian Song and Tee, Connie (2012) Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Systems with Applications, 39 (6). pp. 6157-6167. ISSN 09574174

K

Kwong, Kah Meng and Abdul Razak, Siti Fatimah and Chong, Siew Chin and Lim, Kian Ming and Lee, Chin Poo (2012) A color based touchless finger mouse. International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), 2 (1). pp. 66-69. ISSN 2088-5334

L

Lakhbir Singh, Sareen Kaur Bhar and Kannan, Subarmaniam and Chua, Yong Eng and Abu Bakar, Nor Azlah (2012) Language barriers: Feedback from the IT industry. Journal of Technical Education and Training, 4 (2). pp. 9-20. ISSN 2229-8932

Lau, Siong-Hoe and Liew, Tze Hui (2012) Understanding the user acceptance of gesture-based human-computer interactions. In: 2012 IEEE Symposium on Computers & Informatics (ISCI). IEEE Xplore, pp. 7-10. ISBN 978-1-4673-1685-9

Liew, T. H. and Law, C. Y and Lau, S. H. (2012) Understanding Children-Multitouch Edutainment Interaction (CMEI): A conceptual model. In: Proceedings of the International Conference On Management, Economics And Finance (ICMEF 2012),. Global Research, pp. 214-223. ISBN 978 - 967 - 5705 - 09 - 0

Loo, Chu Kiong and Cheong, Soon Fatt and Seldon, Margaret A. and Mand, Ali Afzalian and Muthu Anbananthen, Kalaiarasi Sonai and Liew, Wei Shiung and Lim, Einly (2012) Genetic-optimized classifier ensemble for cortisol salivary measurement mapping to electrocardiogram features for stress evaluation. In: PRICAI 2012: Trends in Artificial Intelligence. Lecture Notes in Computer Science (7458). Springer Berlin Heidelberg, pp. 274-284. ISBN 978-3-642-32694-3

M

M.T. Nuruzzaman, (2012) Security and Communication Networks; Studies from Multimedia University in the Area of Security and Communication Networks Published. Network Weekly News. p. 2932.

Mohseni, , Seyed Alireza and Tan, , Ai Hui (2012) Optimization of Neural Networks Using Variable Structure Systems. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 42 (6). pp. 1645-1653.

Muhamad Amin, Anang Hudaya (2012) A combined pattern recognition scheme with genetic algorithms for robot guidance using Wireless Sensor Networks. In: 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV). IEEE, pp. 759-764. ISBN 978-1-4673-1871-6

N

Neo, Han Foon and Yeow, Paul H. P. and Eze, Uchenna C. and Loo, Huck Soo (2012) Organizations adoption of MyKad initiative. Communications of the IBIMA, 2012. pp. 1-9. ISSN 1943-7765

Ngeow, Y. F. and Wee, W. Y. and Wong, Y. L. and Tan, J. L. and Ongi, C. S. and Ng, K. P. and Choo, S. W. (2012) Genomic Analysis of Mycobacterium abscessus Strain M139, Which Has an Ambiguous Subspecies Taxonomic Position. Journal of Bacteriology, 194 (21). pp. 6002-6003. ISSN 0021-9193

Ngeow, Yun Fong and Wong, Yan Ling and Lokanathan, Naline and Wong, Guat Jah and Ong, Chia Sui and Ng, Kee Peng and Choo, Siew Woh (2012) Genomic Analysis of Mycobacterium massiliense Strain M115, an Isolate from Human Sputum. Journal of Bacteriology, 194 (17). p. 4786. ISSN 0021-9193

Ngeow, Yun Fong and Wong, Yan Ling and Tan, Joon Liang and Arumugam, Ramitha and Wong, Guat Jah and Ong, Chia Sui and Ng, Kee Peng and Choo, Siew Woh (2012) Genome Sequence of Mycobacterium massiliense M18, Isolated from a Lymph Node Biopsy Specimen. Journal of Bacteriology, 194 (15). p. 4125. ISSN 0021-9193

Ngeow, Yun Fong and Wong, Yan Ling and Tan, Joon Liang and Ng, Kee Peng and Ong, Chia Sui and Choo, Siew Woh (2012) Genome sequence of Mycobacterium abscessus strain M152. Journal of Bacteriology, 194 (23). p. 6662. ISSN 0021-9193

O

Ooi, Shih-Yin and Hiew, Bee-Yan and Tee, Wilkin (2012) Camera-based signature verification system through Discrete Radon Transform (DRT) and Principle Component Analysis (PCA). Journal of Information Assurance & Security, 7. pp. 70-77.

P

Pang, Ying Han (2012) Graph embedding techniques in face verification. PhD thesis, Multimedia University.

Pang, Ying Han and Teoh, Andrew Beng Jin (2012) Kernel-based Regularized Neighbourhood Preserving Embedding in face recognition. In: 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA). IEEE Xplore, pp. 883-888. ISBN 978-1-4577-2118-2

Pang, Ying Han and Teoh, Andrew Beng Jin and Abas, Fazly Salleh (2012) Regularized locality preserving discriminant embedding for face recognition. Neurocomputing, 77 (1). pp. 156-166. ISSN 0925-2312

Purwanto, Purwanto, and C., Eswaran, and R., Logeswaran, (2012) An enhanced hybrid method for time series prediction using linear and neural network models. APPLIED INTELLIGENCE, 37 (4). pp. 511-519.

S

Sayeed, M. S. and Liew, W. S. and Loo, C. K. (2012) General pattern learning and recognition using genetically-optimized training of a biased ARTMAP ensemble voting system. International Journal of Innovative Computing, Information and Control (IJICIC), 8 (11). pp. 7543-7560. ISSN 1349-418X

Sayeed, Md. Shohel and Sonai Muthu Anbananthen, Kalaiarasi and Hossen, Md. Jakir and Yusof, Ibrahim and Al-Habsi, A. A. A. (2012) Securing Asp.Net Applications Against Sql Injections Attacks. Australian Journal of Basic and Applied Sciences, 6 (8). pp. 394-400. ISSN 1991-8178

Sek, Y. W. and Hussin, B. and Hasan Basri, A. S. and Lau, S. H. and Law, C. Y. (2012) Examining the behavior changes in belief and attitude among smart phone users for mobile learning. International Journal of Innovation, Management and Technology, 3 (4). pp. 437-439. ISSN 2010-0248

Sek, Yong-Wee and Che Pee, Ahmad Naim and Hasan Basri, Abd Samad and Lau, Siong-Hoe and Hisham, Syariffanor and Law, Check-Yee (2012) An empirical study of learning objects as alternative pedagogical tool in engineering education. International Proceedings of Economics Development and Research, 27. pp. 85-88. ISSN 2010-4626

Sek, Yong-Wee and Law, C. Y. and Lau, S. H. (2012) The effectiveness of learning objects as alternative pedagogical tool in laboratory engineering education. International Journal of e-Education, e-Business, e-Management and e-Learning, 2 (2). pp. 145-151. ISSN 2010-3654

Sek, Yong-Wee and Law, Check-Yee and Liew, Tze-Hui and Bt Hisham, Syariffanor and Lau, Siong-Hoe and Pee, Ahmad Naim Bin Chee (2012) E-assessment as a self-test quiz tool: The setting features and formative use. Procedia - Social and Behavioral Sciences, 65. pp. 737-742. ISSN 1877-0428

Simon, S.K. (2012) Health and Medical Informatics; Scientists at Multimedia University Target Health and Medical Informatics. Information Technology Newsweekly. p. 1320.

T

Tan, Choo-Kim (2012) Effects of the application of graphing calculator on students’ probability achievement. Computers & Education, 58 (4). pp. 1117-1126. ISSN 03601315

Tan, Syh-Yuan and Jin, Zhe and Teoh, Andrew Beng Jin and Heng, Swee-Huay and Goi, Bok-Min (2012) On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. Security and Communication Networks, 5 (12). pp. 1312-1324. ISSN 1939-0122

Tan , Choo Kim (2012) The Effects of Using Graphing Calculators on Students' Performance and Attitude Towards Probability Learning. Masters thesis, Multimedia University.

Taufiq Nuruzzaman, M. and Lee, Changmoo and Abdullah, Mohd. Fikri Azli and Choi, Deokjai (2012) Simple SMS spam filtering on independent mobile phone. Security and Communication Networks, 5 (10). pp. 1209-1220. ISSN 19390114

Tay, Noel Nuo Wi (2012) Biologically inspired framework for pose invariance in visual face recognition. Masters thesis, Multimedia University.

Tay, Noel Nuo Wi and Loo, Chu Kiong and Chockalingam, Letchumanan (2012) Biologically inspired face recognition: Toward pose-invariance. International Journal of Neural Systems, 22 (6). ISSN 0129-0657

Tee, Connie and Goh, Michael Kah Ong and Teoh, Andrew Beng Jin (2012) Grassmannian locality preserving discriminant analysis to view invariant gait recognition with image sets. In: Proceedings of the 27th Conference on Image and Vision Computing New Zealand - IVCNZ '12. ACM Digital Library, pp. 400-405. ISBN 978-1-4503-1473-2

W

Wee, Kuok Kwee and Roslee, Mardeni and Tan, Su Wei and Lee, Sze Wei (2012) Statistical approach in bandwidth granting process for IEEE 802.16 networks. In: 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing. IEEE Xplore, pp. 1-4. ISBN 978-1-61284-684-2

Wee, Kuok Kwee and Wong, Chee Onn and Wee, Yit Yin and New, W. K. (2012) Intensive bandwidth request and handling design in PMP. International Journal of Computer Science and Network Security, 12 (2). pp. 27-32. ISSN 1738-7906

Wee, Yit Yin and Cheah, Wooi Ping and Tan, Shing Chiang and Wee, Kuok Kwee (2012) Reasoning with cause and effect in intrusion detection. International Journal of Computer and Electrical Engineering, 4 (5). pp. 641-646. ISSN 1793-8163

Wong, Yan Ling and Choo, Siew Woh and Tan, Joon Liang and Ong, Chia Sui and Ng, Kee Peng and Ngeow, Yun Fong (2012) Draft Genome Sequence of Mycobacterium bolletii Strain M24, a Rapidly Growing Mycobacterium of Contentious Taxonomic Status. Journal of Bacteriology, 194 (16). p. 4475. ISSN 0021-9193

Wong, Yan Ling and Ong, Chia Sui and Ngeow, Yun Fong (2012) Molecular Typing of Mycobacterium abscessus Based on Tandem-Repeat Polymorphism. Journal of Clinical Microbiology, 50 (9). pp. 3084-3088. ISSN 0095-1137

Y

Yaacob, Asrul Hadi and Ahmad, Nazrul Muhaimin (2012) Virtual machine based autonomous web server. In: Recent Progress in Data Engineering and Internet Technology. Lecture Notes in Electrical Engineering, 2 (157). Springer Berlin Heidelberg, pp. 173-182. ISBN 978-3-642-28797-8

Yaacob, Asrul Hadi and Roslee, Mardeni and Ahmad, Nurul Nadia and Ahmad, Nazrul Muhaimin (2012) Moving towards positive security model for web application firewall. WASET International Science Index, 6 (12). pp. 1579-1584. ISSN 2010-376X

Yau, Wei Chuen and Heng, Swee Huay and Tan, Syh Yuan and Phan, Raphael Chung Wei and Goi, Bok Min (2012) Efficient encryption with keyword search in mobile networks. Security and Communication Networks, 5 (12). 1412-1422 . ISSN 1939-0122

Yau, Wei-Chuen and Phan, Raphael C. -W. and Heng, Swee-Huay and Goi, Bok-Min (2012) Security models for delegated keyword searching within encrypted contents. Journal of Internet Services and Applications, 3 (2). pp. 233-241. ISSN 1867-4828

Yau, Wei-Chuen and Phan, Raphael C.-W. and Heng, Swee-Huay and Goi, Bok-Min (2012) Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. International Journal of Computer Mathematics. pp. 1-7. ISSN 0020-7160

This list was generated on Wed Nov 22 02:24:12 2017 MYT.