Article |
2022 |
The trade-off between robustness and imperceptibility performance of watermarking technique with DWT and SCHUR decomposition for medical images. Journal of Theoretical and Applied Information Technology
, 100
(1)
pp.81-88
|
2021 |
Heart murmur detection using supervised machine learning. International Journal on Perceptive and Cognitive Computing (IJPCC)
|
2021 |
EXAMINING THE FACTORS INFLUENCING THE SUCCESS OF MOBILE MONEY IN AFGHANISTAN. Journal of Information Systems and Digital Technologies
, 3
(1)
pp.40-64
|
2021 |
Trust based security model for cloud systems in an organization. Journal of Information Systems and Digital Technologies
, 3
(2)
pp.50-67
|
2021 |
The static performance effect of hybrid-hierarchical interconnection by shifted completely connected network. IEEE
, 9
pp.99249-99265
|
2021 |
Subscribers' expectations of internet speed for multiplayer online battle arena (MOBA) game. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 7
(1)
pp.1-7
|
2021 |
The internet of everything from Islamic perspective. International Journal of Perceptive and Cognitive Computing (IJPCC)
, 7
(1)
pp.66-71
|
2021 |
Emoji's multi-interpretation effect on the intended emotion. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 7
(1)
pp.92-98
|
2021 |
Cryptocurrency adoption in e-payment: barrier of its implementation. Journal of Theoretical and Applied Information Technology
, 99
(9)
pp.4461-4481
|
2021 |
SRC voting system with face authentication. International Journal on Perceptive and Cognitive Computing (IJPCC)
|
2021 |
Breast cancer prediction using machine learning. International Journal on Perceptive and Cognitive Computing (IJPCC)
pp.1-5
|
2020 |
Internet of things: ideological prospects and its social implication to the Muslim community. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 6
(2)
pp.47-52
|
2020 |
Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach. IEEE Access
, 8
pp.197554-197566
|
2020 |
Islamic approach toward purification of transaction with cryptocurrency. Journal of Theoretical and Applied Information Technology
, 98
(6)
pp.1050-1067
|
2020 |
Unidirectional and bidirectional optimistic modes IP header compression for real-time video streaming. IEEE Access
, 8
pp.83155-83166
|
2020 |
Understanding Muslims self-presentation strategies in online dating. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 6
(2)
pp.81-89
|
2020 |
DDoS mitigation: a review of content delivery network and its DDoS defense techniques. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 6
(2)
pp.67-76
|
2020 |
End-to-end fully-informed network nodes associated with 433 MHz outdoor propagation environment. International Journal of Computing and Digital Systems
|
2020 |
Factors influencing adoption of cryptocurrency-based transaction from an Islamic perspective. Global Journal of Computer Science and Technology
, 20
(4)
pp.21-32
|
2020 |
Environmental monitoring and disease detection of plants in smart greenhouse using Internet of Things. Journal of Physics Communications
, 4
(5)
pp.1-12
|
2020 |
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review. Journal of Computer Science
, 16
(6)
pp.848-855
|
2020 |
Machine translation in natural language processing by implementing artificial neural network modelling techniques: an Analysis. International Journal on Perceptive and Cognitive Computing
, 6
(1)
pp.9-18
|
2020 |
Assessment of the influence of ICT facilities for sustainability of modern teaching excellence in education. International Journal on Perceptive and Cognitive Computing
, 6
(1)
pp.28-36
|
2019 |
Cotton crop cultivation oriented semantic framework based on IoT smart farming application. International Journal of Engineering & Advanced Technology (IJEAT)
, 8
(3)
pp.480-484
|
2019 |
Rift: a high-performance consensus algorithm for Consortium Blockchain. International Journal of Recent Technology and Engineering
, 7
(6S)
pp.989-997
|
2019 |
Recent advances in mobile touch screen security authentication methods: a systematic literature review. Computers & Security
, 85
pp.1-24
|
2019 |
Sensor enhanced health information systems: issues and challenges. International Journal of Interactive Mobile Technologies
, 13
(1)
pp.99-114
|
2019 |
Limit behavior of the trajectories of extreme doubly stochastic quadratic operators on two dimensional simplex. International Journal of Recent Technology and Engineering (IJRTE)
|
2019 |
The connectivity and the static-cost-effective analysis
of a shifted completely connected network. International Journal of Computational Intelligence Studies
, 8
(1/2)
pp.158-175
|
2019 |
Users perception of cryptocurrency system application from the Islamic views. International Journal on Islamic Applications in Computer Science And Technology
, 7
(1)
pp.13-25
|
2018 |
BSCL: Blockchain-Oriented SDN Controlled cloud based Li-Fi communication architecture for smart city network. International Journal of Engineering & Technology
, 7
(4)
pp.888-892
|
2018 |
Critical factors influencing effective of ICT resources and capabilities. Journal of Theoretical and Applied Information Technology
, 96
(6)
pp.1633 -1646
|
2018 |
Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems. Journal of Artificial Intelligence and Soft Computing Research
, 8
(1)
pp.49-61
|
2018 |
Small and medium-sized enterprise: prioritization of Internet bandwidth needs for business purposes. International Journal of Advanced Science and Technology
, 116
pp.151-166
|
2017 |
Dynamics of watermark position in audio watermarked
files using neural networks. Applied Mathematics & Information Sciences
, 11
(3)
pp.703-715
|
2017 |
Advances in teaching and learning on facebook in higher institutions. IEEE ACCESS
, 5
pp.480-500
|
2017 |
Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm. Applied Soft Computing
, 61
pp.149-173
|
2017 |
A review on soft set-based parameter reduction
and decision making. IEEE ACCESS
, 5
pp.4671-4689
|
2017 |
The dynamics of data packet in transmission session. IEEE ACCESS
, 5
pp.4329-4339
|
2017 |
CPU scheduling with a round Robin algorithm based on an effective time slice. Journal of Information Processing Systems
, 13
(4)
pp.941-950
|
2017 |
A Review on mobile SMS Spam filtering techniques. IEEE Access
, 5
pp.15650-15666
|
2017 |
Neural networks optimization through genetic algorithm searches: A review. Applied Mathematics and Information Sciences
, 11
(6)
pp.1543-1564
|
2017 |
Soft computing approach for predicting OPEC countries’ oil consumption. International Journal of Oil, Gas and Coal Technology
, 15
(3)
pp.298-316
|
2017 |
Online fake news detection algorithm. Journal of Theoretical and Applied Information Technology
, 95
(17)
pp.4114-4122
|
2017 |
Integrated modalities search framework for digital english language text Holy Qur’an and Tafsir. International Journal on Islamic Applications in Computer Science And Technology
, 5
(2)
pp.26-36
|
2016 |
Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia. International Journal of Advanced Research
, 4
(1)
pp.1443-1450
|
2016 |
A new approach for forecasting OPEC petroleum consumption based on neural network train by using flower pollination algorithm. Applied Soft Computing
, 48 (November 2016)
pp.50-58
|
2016 |
Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm. International Review on Computers and Software (IRECOS)
, 11
(9)
pp.752-763
|
2016 |
Studying the effect of training Levenberg
Marquardt neural network by using hybrid
meta-heuristic algorithms. Journal of Computational and Theoretical Nanoscience
, 13
(1)
pp.450-460
|
2016 |
Utilising key climate element variability for the
prediction of future climate change using a support
vector machine model. International Journal of Global Warming
, 9
(2)
pp.129-151
|
2016 |
Utilizing modular neural network for prediction of possible
emergencies locations within point of interest of Hajj pilgrimage. Modern Applied Science
, 10
(2)
pp.34-51
|
2016 |
Non-contact electrocardiogram (ECG) smart chair for ST segment elevation myocardial infarction detect. Journal of Theoretical and Applied Information Technology
, 84
(3)
pp.315-320
|
2016 |
A review on artificial intelligence methodologies for the forecasting of crude oil price. Intelligent Automation & Soft Computing
, 22
(3)
pp.449-462
|
2016 |
An intermediate significant bit (ISB) watermarking technique using neural networks. SpringerPlus
, 5
(1)
pp.868-1-868-25
|
2016 |
A support vector machine classification of
computational capabilities of 3D map on mobile
device for navigation aid. International Journal of Interactive Mobile Technologies
, 10
(3)
pp.4-10
|
2015 |
Visualisation of a three-dimensional (3D) object’s optimal reality in a 3D map on a mobile device. Applied Mathematics & Information Sciences
, 9
(6)
pp.3133-3145
|
2015 |
Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem . Applied Mathematics & Information Sciences
, 9
(5)
pp.2703-2714
|
2015 |
Global warming: predicting OPEC carbon dioxide emissions from petroleum consumption using neural network and hybrid cuckoo search algorithm. PLoS ONE
, 10
(8)
pp.1-21
|
2015 |
Optimization of neural network using cuckoo search for the classification of diabetes. Journal of Computational and Theoretical Nanoscience
, 12
(12)
pp.5755-5758
|
2015 |
A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Procedia Computer Science
, 62
pp.221-227
|
2015 |
Malaria severity classification through Jordan-Elman neural network based on features extracted from thick blood smear. Neural Network World
, 5
(15)
pp.565-584
|
2015 |
Intelligent decision support systems for oil price forecasting. International Journal of Information Science and Management (IJISM)
, Spec.
pp.47-59
|
2015 |
Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection. Journal of Theoretical and Applied Information Technology
, 71
(1)
pp.87-96
|
2015 |
An appraisal of Malaysian hospital websites as a new media tool for improving healthcare information: a systematic review. Australian Journal of Basic and Applied Sciences
, 9
(2)
pp.151-156
|
2014 |
Investigating the impact of audience response system on student’s performance outcomes. World Applied Sciences Journal
, 32
(7)
pp.1268-1283
|
2014 |
Modified low energy adaptive clustering hierarchy protocol for efficient energy consumption in wireless sensor networks. International Review on Computers and Software (I.RE.CO.S.)
, 9
(11)
pp.1904-1915
|
2014 |
A framework for realizing universal standardization for internet of things. Journal of Industrial and Intelligent Information
, 2
(2)
pp.147-153
|
2014 |
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology
, 61
(1)
pp.37-43
|
2014 |
Randomized text encryption: a new dimension in cryptography. International Review on Computers and Software (I.RE.CO.S.)
, 9
(2)
pp.365-373
|
2014 |
Implementation of server virualization to build energy efficient data centers. Journal of Power Technologies
, 94
(2)
pp.1-10
|
2014 |
Empirical investigation of visualization quality for
three-dimensional (3d) objects of 3d map on mobile device for navigation aid
. Journal of Theoretical and Applied Information Technology
, 63
(2)
pp.372-380
|
2014 |
A navigation-aided framework for 3D map views on mobile devices. International Review on Computers and Software (IRECOS)
, 9
(9)
pp.1605-1611
|
2014 |
Subjective assessment of audio watermarked quran. Ulum Islamiyyah - The Malaysian Journal of Islamic Sciences
, 13
(Sp. ed)
pp.75-90
|
2014 |
The state of online audio qur'an and its public perception. International Journal on Islamic Applications in Computer Science And Technology
, 2
(4)
pp.23-34
|
2013 |
Computational intelligence techniques with application to crude oil price projection: a literature survey from 2001–2012. Neural Network World
, 6
(13)
pp.523-551
|
2013 |
Effective utilization of 3D representation in mobile device for pedestrian navigation aid. International Journal of Humanities and Social Science
, 3
(4)
pp.182-188
|
2013 |
Visual interactive Islamic learning system for children. International Journal on Islamic Applications in Computer Science And Technology
, 1
(3)
pp.17-23
|
2013 |
Computational intelligence techniques with application to crude oil price projection: A literature survey from 2001-2012 . Neural Network World: International Journal On Non-Standard Computing And Artificial Intelligence
, 23
(6)
pp.523-551
|
2012 |
3D graphics visualization for interactive mobile users navigation. WSEAS Transactions on Systems
, 11
(8)
pp.453-464
|
Conference or Workshop Item |
2021 |
Analysis of watermarking techniques with wavelet and cosine transform for imperceptibility on image.
In: 18th International Multi-Conference on Systems, Signals & Devices (SSD) 2021
|
2021 |
The factors influencing the adoption of bitcoin investment during covid-19.
In: International Conference on Computing and Technological Solutions with Artificial Intelligence (ICCTSAI 2021) International Islamic University Malaysia THE FACTORS INFLUENCING THE ADOPTION OF BITCOIN INVESTMENT
|
2021 |
A framework for adopting blockchain technology in
medical health records in Nigeria.
In: ICT4M
|
2021 |
Bitcoin Adoption in Banking and Finance: The Critical Factors of its Implementation.
In: International Conference on Innovative Research in Engineering and Technology (ICIRET-2021)
|
2021 |
Imperceptibility Analysis for Watermarking Technique Based on Image Block Division Scheme.
In: 18th IEEE International Multi-Conference on Systems, Signals and Devices, SSD 2021
|
2020 |
Analyzing DWT and IWT Techniques for Fitness Evaluation in Watermarking Technique Imperceptibility Performance for Medical Images.
In: The 1st International Conference of Science and Technology toward New Normal Era
|
2020 |
Real-time video traffic communication over the Internet Protocol (IP) Network.
In: 2020 International Conference on Communications, Information System and Computer Engineering(CISCE 2020)
|
2019 |
Nature inspired meta-heuristic algorithms for deep learning: recent progress and novel perspective.
In: Computer Vision Conference (CVC) 2019
|
2019 |
Hybrid of swarm intelligent algorithms in medical applications.
In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015)
|
2019 |
Hybrid of swarm intelligent algorithms in medical applications.
In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015)
|
2018 |
MapReduce a comprehensive review.
In: 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE 2018)
|
2018 |
Cloud computing platforms for delivering computer science and mathematics instructional course content to learners.
In: 3rd IEEE International Conference on Electro-Technology for National Development, NIGERCON 2017
|
2018 |
Window size and round-trip-time in a network transmission session.
In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
|
2018 |
Software defined-network for real-time operations of business intelligence tasks.
In: International Conference on Business, Humanities and Education (ICBHE 2018)
|
2018 |
An improved chaotic image encryption algorithm.
In: 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018
|
2018 |
Information-based interactive services and support system.
In: 2017 IEEE Conference on Systems, Process and Control (ICSPC 2017)
|
2017 |
Successful business intelligence system for SME: An
analytical study in Malaysia.
In: International Research and Innovation Summit (IRIS2017)
|
2017 |
The trend of business intelligence adoption and maturity.
In: 2nd International Conference on Computer Science and Engineering
|
2016 |
TCP Skudai: A high performance TCP variant for Collaborative Virtual Environment systems.
In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
|
2016 |
Stegano-image as a digital signature to improve security authentication system in mobile computing.
In: 2016 International Conference on Informatics and Computing (ICIC)
|
2016 |
VisUN-3D: User navigation with visualized 3D maps for mobile users.
In: 2016 International Conference on Informatics and Computing (ICIC)
|
2016 |
The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
The extreme doubly stochastic quadratic operators on two dimensional simplex.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
Electrocardiogram identification: Use a simple set of features in QRS complex to identify individuals.
In: 12th International Conference on Computing and Information Technology (IC2 IT)
|
2016 |
User awareness in the authenticity of mobile Quran apps.
In: Simposium Kebangsaan Sistem Autentikasi Al-Quran dan Al-Hadith (SAHIH 2016)
|
2016 |
An appraisal of online audio Qur'an as a new media tool for civilization.
In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015
|
2015 |
An evaluation of mobile Quran apps.
In: CHIuXiD 2015 Conference, ACM In Coop International Conference in HCI and UX, Bandung, 8-10 April 2015
|
2015 |
A novel algorithm to detect a QPSK signal with the minimum number of samples.
In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014)
|
2015 |
An ensemble CRT, RVFLN, SVM method for estimating Propane Spot Price.
In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014)
|
2015 |
Mobile Quran app security vulnerabilities.
In: 5th International Conference on Computing and Informatics, ICOCI 2015
|
2015 |
A review of the applications of bio-inspired flower pollination algorithm.
In: 2015 International Conference on Soft Computing and Software Engineering (SCSE'15)
|
2015 |
A framework for non-contact ECG signal detection device on smart chair and its implementation.
In: Second International Conference on Advanced Data and Information Engineering (DaEng-2015)
|
2015 |
Comparing performances of neural network models
built through transformed and original data.
In: International Conference on Computer, Communications, and Control Technology (I4CT), 2015
|
2014 |
Perceptions of library and information science community towards open source software adoption in libraries of Oman.
In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
RFID based smart hospital management system: A conceptual framework.
In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
|
2014 |
Comparing performances of Markov Blanket and Tree Augmented Naïve-Bayes on the IRIS dataset.
In: International MultiConference of Engineers and Computer Scientists 2014 (IMECS 2014)
|
2014 |
Optimization of neural network through genetic algorithm searches for the prediction of international crude oil price based on energy products prices.
In: CF '14 Proceedings of the 11th ACM Conference on Computing Frontiers
|
2014 |
An empirical study of customers’ adoption of mobile money transfer services in Somaliland.
In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014)
|
2014 |
Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models.
In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Investigating how the sources of online audio Qur’an empower listeners.
In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Text normalization algorithm for facebook chats in Hausa language.
In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on
|
2014 |
Automatic face reconstruction system.
In: 2014 6th International Conference on Computer Science and Information Technology (CSIT)
|
2014 |
Modified neural network activation function.
In: 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology (ICAIET 2014)
|
2014 |
Exploring the challenges of MP3 audio steganography.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2014 |
Investigating the act of deception in
online-Islamic content.
In: 2014 3rd International Conference on User Science and Engineering (i-USEr)
|
2014 |
Throughput analysis of TCP congestion control algorithms in a cloud based collaborative virtual environment.
In: 2014 First International Conference on Systems Informatics, Modelling and Simulation
|
2014 |
Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm.
In: The First International Conference on Soft Computing and Data Mining (SCDM-2014)
|
2013 |
Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network.
In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
3D mobile map visualization concept for remote rendered
dataset.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2013 |
Investigating digital watermark dynamics on carrier file by feed-forward neural network.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2013 |
Automatic interactive security monitoring system.
In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS)
|
2013 |
Investigating the dynamics of watermark features in audio streams.
In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA)
|
2013 |
Intelligent system for predicting the price of natural gas based on non-oil commodities.
In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA2013)
|
|
Empirical investigation on the barriers of adoption of cryptocurrency-based transaction from an Islamic perspective.
In: 8th International Conference on Information and Communication Technology for the Muslim World
|
Book Section |
2019 |
Estimation of Middle-East oil
consumption using hybrid
meta-heuristic algorithms.
In: Lecture Notes in Electrical Engineering
Springer Nature Singapore
. ISBN 978-981-13-1797-2
, pp.139-150
|
2019 |
Bio-inspired algorithm optimization of neural network for the prediction of Dubai crude oil price.
In: Lecture Notes in Electrical Engineering
Springer Nature Singapore
. ISBN 978-3-030-17794-2
, pp.151-162
|
2019 |
A framework for non-contact ECG signal detection device on smart chair and its implementation.
In: Lecture Notes in Electrical Engineering
Springer Nature Singapore
. ISBN 978-981-13-1797-2
, pp.639-646
|
2019 |
A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption.
In: Green Energy and Technology
Springer Verlag
. ISBN 978-3-319-69889-2
, pp.1-20
|
2019 |
Visualizing pathway on 3D maps for an interactive user navigation in mobile devices.
In: Algorithms, Methods, and Applications in Mobile Computing and Communications
IGI Global
. ISBN 978-1522556930
, pp.237-260
|
2018 |
A new static cost-effective parameter for interconnection networks of massively parallel computer systems.
In: Soft computing in data analytics
Springer Nature
. ISBN 978-981-13-0513-9 / 978-981-13-0514-6
, pp.147-155
|
2015 |
Fundamentals of multimedia.
In: Multimedia and Its Applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.1-23
|
2015 |
Text in multimedia.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.64-72
|
2015 |
Practices of handling audio.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.126-138
|
2015 |
Video.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.139-148
|
2015 |
Fundamentals of computer networks: wired/wireless.
In: Internet Applications
IIUM Press
. ISBN 9789674183134
, pp.1-15
|
2015 |
Multimedia security and the internet.
In: Internet Applications
IIUM Press
. ISBN 9789674183134
, pp.48-62
|
2015 |
Spread spectrum audio watermarking using vector space projections.
In: Advances in Intelligent Informatics
Springer International Publishing
. ISBN 978-3-319-11218-3
, pp.297-307
|
2014 |
Usability evaluation of hospital websites in Nigeria: what affects end users’ preferences?.
In: HCI International 2014 - Posters’ extended abstracts: International Conference, HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings, Part II
Springer International Publishing
. ISBN 978-3-319-07853-3 (P), 978-3-319-07854-0 (O)
, pp.430-434
|
2014 |
Kernel functions for the support vector machine: comparing performances on crude oil price data.
In: Recent advances on soft computing and data mining: proceedings of The First International Conference on Soft Computing and Data Mining (SCDM-2014) Universiti Tun Hussein Onn Malaysia, Johor, MalaysiaJune 16th-18th, 2014
Springer International Publishing
. ISBN 9783319076911
, pp.273-281
|
2013 |
A framework for selecting the optimal technique suitable for application in a data mining task .
In: Future information technology
SpringerLink
. ISBN 978-3-642-40860-1 (P), 978-3-642-40861-8 (O)
, pp.163-169
|
2011 |
Web application development process.
In: The Web : Its Utilisation, Evaluation and Security
IIUM Press
. ISBN 978-967-418-112-3
, pp.189-197
|