Items where Subject is "Q Science > QA Mathematics > QA76 Computer software"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | C | D | E | H | J | K | L | M | N | P | R | S | T | V
Number of items at this level: 37.

A

Abdulla, R. (2014) A conceptual study of long range active RFID system for reliable data communication. In: International Conference on Frontiers of Communications, Networks and Applications, ICFCNA 2014; Kuala Lumpur; Malaysia; 3 November 2014 through 5 November 2014.

Al-Hakimy, A.M. and Rajadurai, K.P. and Ravi, M.I. (2011) Formulating a defensive technique to prevent the threat of prohibited reverse engineering. In: 2011 International Conference and Workshop on the Current Trends in Information Technology, CTIT'11; Dubai; United Arab Emirates; 26 October 2011 through 27 October 2011.

B

Bargshady, G. and Ahmadi, M. and Abdulrazzaq, A.W. and Zahraee, S.M. (2015) Evaluation of firm’s potential in adoption of Green IT. American-Eurasian Journal of Sustainable Agriculture., 8 (4). pp. 8-13. ISSN 1995-0748

Brooke, N.M. and Scott, S.D. (2012) Visual and audiovisual synthesis and recognition of speech by computers. Cambridge University Press, pp. 159-192.

C

Chai, J.C. (2016) Queue management system (Q4ME) (Undergraduate FYP). Other thesis, Asia Pacific University of Technology and Innovation..

Che Abdul Rani, M.F. and Rohizan, R. and Abd Rahman, N.A. (2014) Web-based learning tool for primary school student with dyscalculia. In: 6th International Conference on Information Technology and Multimedia, ICIMU 2014; UNITENPutrajaya; Malaysia; 18 November 2014 through 20 November 2014.

Cheong, S.N. and Chai, I. and Logeswaran, R. (2016) Mobiquitous learning system with NFC smartphone and TV through Raspberry PI. In: International Conference of Computer Science Engineering and Technology (COMSCET 2016), 23-24 January 2016, Kuala Lumpur, Malaysia. (Submitted)

Cheong, S.N. and Chai, I. and Logeswaran, R. (2015) Quick response multimodal learning system with Raspberry PI. In: International Conference on Knowledge and Education Technology (ICKET 2015), 9-11 December 2015, Langkawi, Malaysia. (Submitted)

Cheong, S.N. and Chai, I. and Logeswaran, R. (2015) Tap-to-learn paradigm for t-Learning via near field communication-enabled raspberry PI. Advanced Science Letters, 21 (7). pp. 2205-2209.

D

Duraikannan, S. and Awadh, M.S. (2013) Design optimization for diminution of 5.75 GHZ Chebyshev bandpass filter. In: 2013 IEEE International Conference on Circuits and Systems: "Advanced Circuits and Systems for Sustainability", ICCAS 2013; Kuala Lumpur; Malaysia; 18 September 2013 through 19 September 2013.

E

Eaganathan, U. and Dehkordi, M.K. and Ali, A.F. (2015) A study of object oriented software complexity and sizing measure. In: Global Congress on Computing and Media Technologies (GCMT '15), November 25th - 27th, 2015, Chennai, India.

Eslahi, M. and Naseri, M.V. and Hashim, H. and Tahir, N.M. and Saad, E.H.M. (2015) BYOD: Current state and security challenges. In: 2014 IEEE Symposium on Computer Applications and Industrial Electronics, ISCAIE 2014; Penang; Malaysia; 7 April 2014 through 8 April 2014.

Eslahi, M. and Rostami, M.R. and Hashim, H. and Tahir, N.M. and Naseri, M.V. (2014) A data collection approach for Mobile Botnet analysis and detection. In: 2014 IEEE Symposium on Wireless Technology and Applications, ISWTA 2014; Sutera Harbour ResortKota Kinabalu; Malaysia; 28 September 2014 through 1 October 2014.

H

Hajivali, M. and Alrashdan, M.T. and Fatemi Moghaddam, F. and Alothmani, A.Z.M. (2013) Applying an agent-based user authentication and access control model for cloud servers. In: 2013 International Conference on Information and Communication Technology Convergence, ICTC 2013; Jeju Island; South Korea; 14 October 2013 through 16 October 2013.

Haron, H. and Mohd Yusop, Z. and Rani, Mohamad Firdaus Che Abdul (2010) Developing an email violation prevention model based on web 3.0 technology. In: 2010 International Conference on Science and Social Research, CSSR 2010; Kuala Lumpur; Malaysia; 5 December 2010 through 7 December 2010.

Ho, V. and Dehghantanha, A. and Shanmugam, K. (2010) A guideline to enforce data protection and privacy digital laws in Malaysia. In: 2nd International Conference on Computer Research and Development, ICCRD 2010; Kuala Lumpur; Malaysia; 7 May 2010 through 10 May 2010.

J

Jayabalan, M. and Barakat, Z.A.H. and Ramiah, S. (2015) Data exchange model for classified advertisement using Android. In: Conference Proceedings 2015 IEEE Student Conference on Research and Development (SCOReD). Institute of Electrical and Electronics Engineers Inc., New York, USA, pp. 266-271. ISBN 9781467395724

John, S. and Wi-Mei, M.H. (2006) A proposed framework for an effective integration of supporting environments for smart client application development. In: 2006 International Conference on Computing and Informatics, ICOCI '06; Kuala Lumpur; Malaysia; 6 June 2006 through 8 June 2006.

K

Khan, S.M.H. and Hussain, A. (2016) A hybrid approach to content based image retrieval using computational intelligence techniques. Indian Journal of Science and Technology, 9 (21). ISSN 0974-6846

L

Laidey, N. M. (2015) Privacy vs. national security: where do we draw the line? World Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, 9 (6). pp. 2194-2197.

Lakshmanan, R. and Selvaperumal, S.K. and Chow, H.M. (2014) Improved speech recognition using neural network. International Journal of Applied Engineering Research, 9 (18). pp. 4297-4326.

Lau, C.Y and Watts, O. and King, S. (2015) Combining lightly-supervised learning and user feedback to construct andimprove a statistical parametric speech synthesizer for Malay. Research Journal of Applied Sciences, Engineering and Technology, 11 (11). pp. 1227-1232. ISSN 2040-7459

Lee, Q.H. (2016) Web-based food ordering system using QR code (Undergraduate FYP). Other thesis, Asia Pacific University of Technology and Innovation..

Logeswaran, R. and Chen, L.C. (2002) Issues on service creation in TINA. In: TINA Workshop 2002, 02-04 October 2002, Petaling Jaya, Malaysia.

M

Mahmood, F.M. and Abdul Salam, Z.A. (2013) A conceptual framework for personalized location-based Services (LBS) tourism mobile application leveraging semantic web to enhance tourism experience. In: 2013 3rd IEEE International Advance Computing Conference, IACC 2013; Ghaziabad; India; 22 February 2013 through 23 February 2013.

Moghaddam, F.F. and Yezdanpanah, M. and Khodadadi, T. and Ahmadi, M. and Eslami, M. (2014) VDCI: Variable data classification index to ensure data protection in cloud computing environments. In: 2014 IEEE Conference on System, Process and Control, ICSPC 2014; Impiana KLCC Hotel13, Jalan PinangKuala Lumpur; Malaysia; 12 December 2014 through 14 December 2014.

Mohanarajah, S. and Jabar, M.A. (2014) Software development methodologies: A perspective of different strategies linked to a similar goal. In: 6th International Conference on Information Technology and Multimedia, ICIMU 2014; UNITENPutrajaya; Malaysia; 18 November 2014 through 20 November 2014.

N

Ng, S.T.Y. (2016) Mobile flood disaster rescue system (Undergraduate FYP). Other thesis, Asia Pacific University of Technology and Innovation.

Nor Azlina, A. R. and Khalida, S. H. and Yusnita, Y (2013) SMS banking transaction as an alternative for information, transfer and payment at merchant shops in Malaysia. In: 3rd International Conference on Information Technology and e-Services, ICITeS 2013; Sousse; Tunisia; 24 March 2013 through 26 March 2013.

P

Pla, J.J. and Tan, K.Y. and Dehollain, J.P. and Lim, W.H. and Morton, J.J.L. and Zwanenburg, F.A. and Jamieson, D.N. and Dzurak, A.S. and Morello, A. (2013) High-fidelity readout and control of a nuclear spin qubit in silicon. Nature, 496 (7445). pp. 334-338.

R

Ramiah, S. and Liong, T.Y and Jayabalan, M. (2015) Detecting text based image with optical character recognition for English translation and speech using Android. In: Conference Proceedings 2015 IEEE Student Conference on Research and Development (SCOReD). Institute of Electrical and Electronics Engineers Inc., New York, USA, pp. 272-277. ISBN 9781467395724

Rana, M.E. and Dauren, J. and Kumaran, S. (2015) An improved Requirements Engineering framework for cloud based application development. In: Conference Proceedings 2015 IEEE Student Conference on Research and Development (SCOReD). Institute of Electrical and Electronics Engineers Inc., New York, USA, pp. 702-709. ISBN 9781467395724

S

Sabena, F. and Dehghantanha, A. and Andrew, P.S. (2010) A review of vulnerabilities in identity management using biometrics. In: 2nd International Conference on Future Networks, ICFN 2010; Sanya, Hainan; China; 22 January 2010 through 24 January 2010.

Shakeel, I. and Dehghan, A. and Broujerdi, H.G. (2010) A framework for digital law enforcement in Maldives. In: 2nd International Conference on Computer Research and Development, ICCRD 2010; Kuala Lumpur; Malaysia; 7 May 2010 through 10 May 2010.

T

TzeTzuen, Y. and Dehghantanha, A. and Seddon, A. and Mohtasebi, S.H. (2012) Greening digital forensics: Opportunities and challenges. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 62 LNI. pp. 114-119.

V

Vasudavan, H. and Jayabalan, M. and Ramiah, S. (2015) A preliminary study on designing tour website for older people. In: Conference Proceedings 2015 IEEE Student Conference on Research and Development (SCOReD). Institute of Electrical and Electronics Engineers Inc., New York, USA, pp. 111-116. ISBN 9781467395724

Vijayan, G. and Vistro, D.M. (2015) Effectiveness of multimedia assessment tools in Moodle Virtual Learning. In: The Global Congress on Computing and Media Technologies (GCMT 2015). Sathyabama University Press, Chennai, India, pp. 68-75. ISBN 9789383409112

This list was generated on Tue Sep 26 15:21:31 2017 MYT.