ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Proceeding

The Second International Conference on Informatics Engineering & Information Science (ICIEIS)

Publisher: The Society of Digital Information and Wireless Communications (SDIWC)

Editors: Prof. Azizah Abd Manaf

ISBN: 978-0-9891305-2-3

Date: 2013-11-12 - 2013-11-14

Conference Venue: Kuala Lumpur, Malaysia Malaysia

Proceeding URL: http://sdiwc.net/digital-library/browse/77external

  1. HS-SLA: A Hierarchical Self-Healing SLA Model for Cloud Computing

    Authors: Ahmad Mosallanejad; Rodziah Atan; Rusli Abdullah; Masrha Azmi Murad; Taghi Javdani

  2. Packet Internet Billing Framework to Enhance Service Level Agreement (SLA) In Convergence Network

    Authors: Ahmad Kamal Ramli; Paridah Daud; Noor Azma Ismail

  3. Experiment Design for Prediction of Human Personality through Analysis of Activities Stored in Electronic Organizer

    Authors: Andi Putra; Mohd. Juzaiddin Ab Aziz; Mohd. Rosmadi Mokhtar

  4. Integrated High-Performance and Web-Oriented System of The Kazakh Language Text Recognition

    Authors: Bakyt M. Kairakbay; Daniyar B. Nurseitov; Yuriy Y. Stolyarov; Ilyas E. Tursunov; Igor A. Ugay; David L. Zaurbekov

  5. HP Model Protein Folding with Hybrid Algorithm using Genetic Algorithm and Estimation of Distribution Algorithm

    Authors: Kenji Tamura

  6. Experimental Comparison of Uninformed and Heuristic AI Algorithms for N Puzzle Solution

    Authors: Kuruvilla Mathew; Mujahid Tabassum; Mohana Ramakrishnan

  7. A Genetic Algorithm Approach Towards Image Optimization

    Authors: Mujahid Tabassum; Kuruvilla Mathew; Sailesh Choytooa

  8. Regularized Independent Component Analysis in Face Verification

    Authors: Ying Han Pang; Chuan Chin Teo; Shih Yin Ooi; Siong Hoe Lau; Fu San Hiew; Yee Ping Liew

  9. Coronary Plaque Boundary Detection in Intravascular Ultrasound Image by Using Hybrid Modified Level Set Method and Fuzzy Inference

    Authors: Syaiful Anam; Eiji Uchino; Noriaki Suetake

  10. An Enhanced Steganographic System for Data Hiding in True Color Images

    Authors: Saad M. Darwish; Shawkat K. Guirguis; Wesam A. Alatafy

  11. A Hybrid Keystroke Authentication Dynamics

    Authors: Saleh M. Abu-Soud

  12. A Robust Digital Image Watermarking against Salt and Pepper using Sudoku

    Authors: Shamsul Kamal Ahmad Khalid; Mustafa Mat Deris; Kamaruddin Malik Mohamad

  13. A Steganographic Technique for Highly Compressed JPEG Images

    Authors: Shamsul Kamal Ahmad Khalid; Mustafa Mat Deris; Kamaruddin Malik Mohamad

  14. Review of Information Security Vulnerability: Human Perspective

    Authors: Malahat Pouransafara; Nurazean Maroop; Zuraini Ismail; Maral Cheperli

  15. An Improvement for Hiding Data in Audio Using Echo Modulation

    Authors: Huynh Ba Dieu

  16. A Framework for a Corporation Cyber War Strategy

    Authors: Walid Al-Ahmad

  17. Text Based Chipper Notation for Angklung Music Compositions

    Authors: Eko Mursito Budi; Asep Suhada; Hermawan K. Dipojono; Andrianto Handojo; Joko Sarwono

  18. Improved MIDI Message for Robotic Angklung Choir

    Authors: Eko Mursito Budi; Asep Suhada; Hermawan K. Dipojono; Andrianto Handojo; Joko Sarwono

  19. Self-adaptive SSH Honeypot Model Capable of Reasoning

    Authors: Adrian Pauna; Victor Valeriu Patriciu

  20. Feature Selection Based on Genetic Algorithm and SupportVector Machine for Intrusion Detection System

    Authors: Amin Dastanpour; Raja Azlina Raja Mahmood

  21. A Normal Profile Updating Method for False Positives Reduction in Anomaly Detection Systems

    Authors: Walid Mohamed Alsharafi; Mohd Nizam Omar

  22. An Experimental Study to Analyze SIP Traffic over LAN

    Authors: Mujahid Tabassum; Kuruvilla Mathew; Mohana Ramakrishnan; Duaa Fatima S Khan

  23. Toward an Update of a Similarity Measurement for a Better Calculation of the Semantic Distance between Ontology Concepts

    Authors: Abdeslem Dennai; Sidi Mohammed Benslimane

  24. Automatic Extraction of Structures of Issues Based on Newspaper Articles

    Authors: Hirohide Haga

  25. The Need For Usability Risk Assessment Model

    Authors: Jayaletchumi T.; Sambantha Moorthy; Suhaimi Ibrahim; Mohd Naz’ri Mahrin

  26. Risk Generating Situations of Requirement Engineering in Global Software Development

    Authors: Huma Hayat Khan; Mohd. Naz’ri Mahrin; Suriayati Chuprat

  27. Standards and Models on and Around Software Requirement Engineering: A Review with Perspective of Varying Situations

    Authors: Huma Hayat Khan; Mohd. Naz’ri Mahrin; Suriayati Chuprat

  28. Smart Data: A System for Generating Application-Agnostic Interactive Data

    Authors: Ashraf Gaffar; Abdessamad Tridane; Kris Pribadi

  29. Consumers' Perception on Hotel Websites: Implications for Operational Performance

    Authors: Uchenna Cyril Eze; Chew-Beng Tan; Siang-Ling Loh

  30. Multi-Algorithm Ontology Mapping with Automatic Weight Assignments and Background Knowledge

    Authors: Shailendra Singh; Cheah Yu-N

  31. Mobile Learning: The Effects of Gender and Age on Perceptions of the Use of Mobile Tools

    Authors: Sarah Snell; Catherine Snell-Siddle

  32. Perceptions of Mobile Technologies and Associations with Attitudinal Outcomes in a Tertiary Environment

    Authors: Catherine Snell-Siddle; Sarah Snell

  33. Dynamic Controller Selection in Smart Home Networks

    Authors: Hiroaki Higaki

  34. Simple Scheduling Scheme for Smart Home and Ambient Assisted Living

    Authors: Hamdan Sayuti; Rozeha A. Rashid; Nurul Mu'azzah Abdul Latiff; Norsheila Fisal; Mohd Adib Sarijari; Abdul Hadi Fikri Abdul Hamid; R ozaini Abd Rahim.

  35. An Interactive Webbased Expert System Degree Planner

    Authors: Neil Dunstan

  36. The Challenges in Implementing Risk Management for Information Technology Projects

    Authors: Amine Nehari Talet; Razali Mat-Zin; Maaradj Houari

  37. Measurements of Distances from Compound Projection for GIS

    Authors: Mohammed Sabri Akresh

  38. Critical Factors Influencing the Registration of Domain Name

    Authors: Norul Bahriyah Shaari

  39. Oscillating Behaviors on Graph-rewriting Automata

    Authors: Kohji Tomita; Akiya Kamimura; Haruhisa Kurokawa

  40. Individual Acceptance of e-Government: A Literature Review

    Authors: Tony Dwi Susanto

  41. Service-Oriented GIS System for Risk Mapping of Oil Spills Integrated with High Performance Cluster

    Authors: Kairat A. Bostanbekov; Jalal K. Jamalov; Dmitriy K. Kim; Daniyar B. Nurseitov; Ilyas E. Tursunov; Edige A. Zakarin; David L. Zaurbek ov

  42. Privacy in Cloud Based E-Learning

    Authors: Maher Alghali; Najwa Hayaati Mohd Alwi; Roesnita Ismail

  43. Past, Present and Future of Search Engine Optimization

    Authors: Saeid Saberi; Golnaz Saberi; Masnizah Mohd

  44. An Analysis of the Code Coverage-based Greedy Algorithms for Test Suite Reduction

    Authors: Saif Ur Rehman Khan; Sai peck Lee; Reza Meimandi Parizi; Manzoor Elahi