Archived Papers for Proceeding
The Second International Conference on Informatics Engineering & Information Science (ICIEIS)
Publisher: The Society of Digital Information and Wireless Communications (SDIWC)
Editors: Prof. Azizah Abd Manaf
ISBN: 978-0-9891305-2-3
Date: 2013-11-12 - 2013-11-14
Conference Venue: Kuala Lumpur, Malaysia
- HS-SLA: A Hierarchical Self-Healing SLA Model for Cloud ComputingAuthors: Ahmad Mosallanejad; Rodziah Atan; Rusli Abdullah; Masrha Azmi Murad; Taghi Javdani
- Packet Internet Billing Framework to Enhance Service Level Agreement (SLA) In Convergence NetworkAuthors: Ahmad Kamal Ramli; Paridah Daud; Noor Azma Ismail
- Experiment Design for Prediction of Human Personality through Analysis of Activities Stored in Electronic OrganizerAuthors: Andi Putra; Mohd. Juzaiddin Ab Aziz; Mohd. Rosmadi Mokhtar
- Integrated High-Performance and Web-Oriented System of The Kazakh Language Text RecognitionAuthors: Bakyt M. Kairakbay; Daniyar B. Nurseitov; Yuriy Y. Stolyarov; Ilyas E. Tursunov; Igor A. Ugay; David L. Zaurbekov
- HP Model Protein Folding with Hybrid Algorithm using Genetic Algorithm and Estimation of Distribution AlgorithmAuthors: Kenji Tamura
- Experimental Comparison of Uninformed and Heuristic AI Algorithms for N Puzzle SolutionAuthors: Kuruvilla Mathew; Mujahid Tabassum; Mohana Ramakrishnan
- A Genetic Algorithm Approach Towards Image OptimizationAuthors: Mujahid Tabassum; Kuruvilla Mathew; Sailesh Choytooa
- Regularized Independent Component Analysis in Face VerificationAuthors: Ying Han Pang; Chuan Chin Teo; Shih Yin Ooi; Siong Hoe Lau; Fu San Hiew; Yee Ping Liew
- Coronary Plaque Boundary Detection in Intravascular Ultrasound Image by Using Hybrid Modified Level Set Method and Fuzzy InferenceAuthors: Syaiful Anam; Eiji Uchino; Noriaki Suetake
- An Enhanced Steganographic System for Data Hiding in True Color ImagesAuthors: Saad M. Darwish; Shawkat K. Guirguis; Wesam A. Alatafy
- A Hybrid Keystroke Authentication DynamicsAuthors: Saleh M. Abu-Soud
- A Robust Digital Image Watermarking against Salt and Pepper using SudokuAuthors: Shamsul Kamal Ahmad Khalid; Mustafa Mat Deris; Kamaruddin Malik Mohamad
- A Steganographic Technique for Highly Compressed JPEG ImagesAuthors: Shamsul Kamal Ahmad Khalid; Mustafa Mat Deris; Kamaruddin Malik Mohamad
- Review of Information Security Vulnerability: Human PerspectiveAuthors: Malahat Pouransafara; Nurazean Maroop; Zuraini Ismail; Maral Cheperli
- An Improvement for Hiding Data in Audio Using Echo ModulationAuthors: Huynh Ba Dieu
- A Framework for a Corporation Cyber War StrategyAuthors: Walid Al-Ahmad
- Text Based Chipper Notation for Angklung Music CompositionsAuthors: Eko Mursito Budi; Asep Suhada; Hermawan K. Dipojono; Andrianto Handojo; Joko Sarwono
- Improved MIDI Message for Robotic Angklung ChoirAuthors: Eko Mursito Budi; Asep Suhada; Hermawan K. Dipojono; Andrianto Handojo; Joko Sarwono
- Self-adaptive SSH Honeypot Model Capable of ReasoningAuthors: Adrian Pauna; Victor Valeriu Patriciu
- Feature Selection Based on Genetic Algorithm and SupportVector Machine for Intrusion Detection SystemAuthors: Amin Dastanpour; Raja Azlina Raja Mahmood
- A Normal Profile Updating Method for False Positives Reduction in Anomaly Detection SystemsAuthors: Walid Mohamed Alsharafi; Mohd Nizam Omar
- An Experimental Study to Analyze SIP Traffic over LANAuthors: Mujahid Tabassum; Kuruvilla Mathew; Mohana Ramakrishnan; Duaa Fatima S Khan
- Toward an Update of a Similarity Measurement for a Better Calculation of the Semantic Distance between Ontology ConceptsAuthors: Abdeslem Dennai; Sidi Mohammed Benslimane
- Automatic Extraction of Structures of Issues Based on Newspaper ArticlesAuthors: Hirohide Haga
- The Need For Usability Risk Assessment ModelAuthors: Jayaletchumi T.; Sambantha Moorthy; Suhaimi Ibrahim; Mohd Naz’ri Mahrin
- Risk Generating Situations of Requirement Engineering in Global Software DevelopmentAuthors: Huma Hayat Khan; Mohd. Naz’ri Mahrin; Suriayati Chuprat
- Standards and Models on and Around Software Requirement Engineering: A Review with Perspective of Varying SituationsAuthors: Huma Hayat Khan; Mohd. Naz’ri Mahrin; Suriayati Chuprat
- Smart Data: A System for Generating Application-Agnostic Interactive DataAuthors: Ashraf Gaffar; Abdessamad Tridane; Kris Pribadi
- Consumers' Perception on Hotel Websites: Implications for Operational PerformanceAuthors: Uchenna Cyril Eze; Chew-Beng Tan; Siang-Ling Loh
- Multi-Algorithm Ontology Mapping with Automatic Weight Assignments and Background KnowledgeAuthors: Shailendra Singh; Cheah Yu-N
- Mobile Learning: The Effects of Gender and Age on Perceptions of the Use of Mobile ToolsAuthors: Sarah Snell; Catherine Snell-Siddle
- Perceptions of Mobile Technologies and Associations with Attitudinal Outcomes in a Tertiary EnvironmentAuthors: Catherine Snell-Siddle; Sarah Snell
- Dynamic Controller Selection in Smart Home NetworksAuthors: Hiroaki Higaki
- Simple Scheduling Scheme for Smart Home and Ambient Assisted LivingAuthors: Hamdan Sayuti; Rozeha A. Rashid; Nurul Mu'azzah Abdul Latiff; Norsheila Fisal; Mohd Adib Sarijari; Abdul Hadi Fikri Abdul Hamid; R ozaini Abd Rahim.
- An Interactive Webbased Expert System Degree PlannerAuthors: Neil Dunstan
- The Challenges in Implementing Risk Management for Information Technology ProjectsAuthors: Amine Nehari Talet; Razali Mat-Zin; Maaradj Houari
- Measurements of Distances from Compound Projection for GISAuthors: Mohammed Sabri Akresh
- Critical Factors Influencing the Registration of Domain NameAuthors: Norul Bahriyah Shaari
- Oscillating Behaviors on Graph-rewriting AutomataAuthors: Kohji Tomita; Akiya Kamimura; Haruhisa Kurokawa
- Individual Acceptance of e-Government: A Literature ReviewAuthors: Tony Dwi Susanto
- Service-Oriented GIS System for Risk Mapping of Oil Spills Integrated with High Performance ClusterAuthors: Kairat A. Bostanbekov; Jalal K. Jamalov; Dmitriy K. Kim; Daniyar B. Nurseitov; Ilyas E. Tursunov; Edige A. Zakarin; David L. Zaurbek ov
- Privacy in Cloud Based E-LearningAuthors: Maher Alghali; Najwa Hayaati Mohd Alwi; Roesnita Ismail
- Past, Present and Future of Search Engine OptimizationAuthors: Saeid Saberi; Golnaz Saberi; Masnizah Mohd
- An Analysis of the Code Coverage-based Greedy Algorithms for Test Suite ReductionAuthors: Saif Ur Rehman Khan; Sai peck Lee; Reza Meimandi Parizi; Manzoor Elahi